1 | Hi; here's a target-arm pullreq. Mostly this is RTH's FEAT_RME | 1 | The following changes since commit 5767815218efd3cbfd409505ed824d5f356044ae: |
---|---|---|---|
2 | series; there are also a handful of bug fixes including some | ||
3 | which aren't arm-specific but which it's convenient to include | ||
4 | here. | ||
5 | 2 | ||
6 | thanks | 3 | Merge tag 'for_upstream' of https://git.kernel.org/pub/scm/virt/kvm/mst/qemu into staging (2024-02-14 15:45:52 +0000) |
7 | -- PMM | ||
8 | |||
9 | The following changes since commit b455ce4c2f300c8ba47cba7232dd03261368a4cb: | ||
10 | |||
11 | Merge tag 'q800-for-8.1-pull-request' of https://github.com/vivier/qemu-m68k into staging (2023-06-22 10:18:32 +0200) | ||
12 | 4 | ||
13 | are available in the Git repository at: | 5 | are available in the Git repository at: |
14 | 6 | ||
15 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20230623 | 7 | https://git.linaro.org/people/pmaydell/qemu-arm.git tags/pull-target-arm-20240215 |
16 | 8 | ||
17 | for you to fetch changes up to 497fad38979c16b6412388927401e577eba43d26: | 9 | for you to fetch changes up to f780e63fe731b058fe52d43653600d8729a1b5f2: |
18 | 10 | ||
19 | pc-bios/keymaps: Use the official xkb name for Arabic layout, not the legacy synonym (2023-06-23 11:46:02 +0100) | 11 | docs: Add documentation for the mps3-an536 board (2024-02-15 14:32:39 +0000) |
20 | 12 | ||
21 | ---------------------------------------------------------------- | 13 | ---------------------------------------------------------------- |
22 | target-arm queue: | 14 | target-arm queue: |
23 | * Add (experimental) support for FEAT_RME | 15 | * hw/arm/xilinx_zynq: Wire FIQ between CPU <> GIC |
24 | * host-utils: Avoid using __builtin_subcll on buggy versions of Apple Clang | 16 | * linux-user/aarch64: Choose SYNC as the preferred MTE mode |
25 | * target/arm: Restructure has_vfp_d32 test | 17 | * Fix some errors in SVE/SME handling of MTE tags |
26 | * hw/arm/sbsa-ref: add ITS support in SBSA GIC | 18 | * hw/pci-host/raven.c: Mark raven_io_ops as implementing unaligned accesses |
27 | * target/arm: Fix sve predicate store, 8 <= VQ <= 15 | 19 | * hw/block/tc58128: Don't emit deprecation warning under qtest |
28 | * pc-bios/keymaps: Use the official xkb name for Arabic layout, not the legacy synonym | 20 | * tests/qtest: Fix handling of npcm7xx and GMAC tests |
21 | * hw/arm/virt: Wire up non-secure EL2 virtual timer IRQ | ||
22 | * tests/qtest/npcm7xx_emc-test: Connect all NICs to a backend | ||
23 | * Don't assert on vmload/vmsave of M-profile CPUs | ||
24 | * hw/arm/smmuv3: add support for stage 1 access fault | ||
25 | * hw/arm/stellaris: QOM cleanups | ||
26 | * Use new CBAR encoding for all v8 CPUs, not all aarch64 CPUs | ||
27 | * Improve Cortex_R52 IMPDEF sysreg modelling | ||
28 | * Allow access to SPSR_hyp from hyp mode | ||
29 | * New board model mps3-an536 (Cortex-R52) | ||
29 | 30 | ||
30 | ---------------------------------------------------------------- | 31 | ---------------------------------------------------------------- |
31 | Peter Maydell (2): | 32 | Luc Michel (1): |
32 | host-utils: Avoid using __builtin_subcll on buggy versions of Apple Clang | 33 | hw/arm/smmuv3: add support for stage 1 access fault |
33 | pc-bios/keymaps: Use the official xkb name for Arabic layout, not the legacy synonym | ||
34 | 34 | ||
35 | Richard Henderson (23): | 35 | Nabih Estefan (1): |
36 | target/arm: Add isar_feature_aa64_rme | 36 | tests/qtest: Fix GMAC test to run on a machine in upstream QEMU |
37 | target/arm: Update SCR and HCR for RME | ||
38 | target/arm: SCR_EL3.NS may be RES1 | ||
39 | target/arm: Add RME cpregs | ||
40 | target/arm: Introduce ARMSecuritySpace | ||
41 | include/exec/memattrs: Add two bits of space to MemTxAttrs | ||
42 | target/arm: Adjust the order of Phys and Stage2 ARMMMUIdx | ||
43 | target/arm: Introduce ARMMMUIdx_Phys_{Realm,Root} | ||
44 | target/arm: Remove __attribute__((nonnull)) from ptw.c | ||
45 | target/arm: Pipe ARMSecuritySpace through ptw.c | ||
46 | target/arm: NSTable is RES0 for the RME EL3 regime | ||
47 | target/arm: Handle Block and Page bits for security space | ||
48 | target/arm: Handle no-execute for Realm and Root regimes | ||
49 | target/arm: Use get_phys_addr_with_struct in S1_ptw_translate | ||
50 | target/arm: Move s1_is_el0 into S1Translate | ||
51 | target/arm: Use get_phys_addr_with_struct for stage2 | ||
52 | target/arm: Add GPC syndrome | ||
53 | target/arm: Implement GPC exceptions | ||
54 | target/arm: Implement the granule protection check | ||
55 | target/arm: Add cpu properties for enabling FEAT_RME | ||
56 | docs/system/arm: Document FEAT_RME | ||
57 | target/arm: Restructure has_vfp_d32 test | ||
58 | target/arm: Fix sve predicate store, 8 <= VQ <= 15 | ||
59 | 37 | ||
60 | Shashi Mallela (1): | 38 | Peter Maydell (22): |
61 | hw/arm/sbsa-ref: add ITS support in SBSA GIC | 39 | hw/pci-host/raven.c: Mark raven_io_ops as implementing unaligned accesses |
40 | hw/block/tc58128: Don't emit deprecation warning under qtest | ||
41 | tests/qtest/meson.build: Don't include qtests_npcm7xx in qtests_aarch64 | ||
42 | tests/qtest/bios-tables-test: Allow changes to virt GTDT | ||
43 | hw/arm/virt: Wire up non-secure EL2 virtual timer IRQ | ||
44 | tests/qtest/bios-tables-tests: Update virt golden reference | ||
45 | hw/arm/npcm7xx: Call qemu_configure_nic_device() for GMAC modules | ||
46 | tests/qtest/npcm7xx_emc-test: Connect all NICs to a backend | ||
47 | target/arm: Don't get MDCR_EL2 in pmu_counter_enabled() before checking ARM_FEATURE_PMU | ||
48 | target/arm: Use new CBAR encoding for all v8 CPUs, not all aarch64 CPUs | ||
49 | target/arm: The Cortex-R52 has a read-only CBAR | ||
50 | target/arm: Add Cortex-R52 IMPDEF sysregs | ||
51 | target/arm: Allow access to SPSR_hyp from hyp mode | ||
52 | hw/misc/mps2-scc: Fix condition for CFG3 register | ||
53 | hw/misc/mps2-scc: Factor out which-board conditionals | ||
54 | hw/misc/mps2-scc: Make changes needed for AN536 FPGA image | ||
55 | hw/arm/mps3r: Initial skeleton for mps3-an536 board | ||
56 | hw/arm/mps3r: Add CPUs, GIC, and per-CPU RAM | ||
57 | hw/arm/mps3r: Add UARTs | ||
58 | hw/arm/mps3r: Add GPIO, watchdog, dual-timer, I2C devices | ||
59 | hw/arm/mps3r: Add remaining devices | ||
60 | docs: Add documentation for the mps3-an536 board | ||
62 | 61 | ||
63 | docs/system/arm/cpu-features.rst | 23 ++ | 62 | Philippe Mathieu-Daudé (5): |
64 | docs/system/arm/emulation.rst | 1 + | 63 | hw/arm/xilinx_zynq: Wire FIQ between CPU <> GIC |
65 | docs/system/arm/sbsa.rst | 14 + | 64 | hw/arm/stellaris: Convert ADC controller to Resettable interface |
66 | include/exec/memattrs.h | 9 +- | 65 | hw/arm/stellaris: Convert I2C controller to Resettable interface |
67 | include/qemu/compiler.h | 13 + | 66 | hw/arm/stellaris: Add missing QOM 'machine' parent |
68 | include/qemu/host-utils.h | 2 +- | 67 | hw/arm/stellaris: Add missing QOM 'SoC' parent |
69 | target/arm/cpu.h | 151 ++++++++--- | 68 | |
70 | target/arm/internals.h | 27 ++ | 69 | Richard Henderson (6): |
71 | target/arm/syndrome.h | 10 + | 70 | linux-user/aarch64: Choose SYNC as the preferred MTE mode |
72 | hw/arm/sbsa-ref.c | 33 ++- | 71 | target/arm: Fix nregs computation in do_{ld,st}_zpa |
73 | target/arm/cpu.c | 32 ++- | 72 | target/arm: Adjust and validate mtedesc sizem1 |
74 | target/arm/helper.c | 162 ++++++++++- | 73 | target/arm: Split out make_svemte_desc |
75 | target/arm/ptw.c | 570 +++++++++++++++++++++++++++++++-------- | 74 | target/arm: Handle mte in do_ldrq, do_ldro |
76 | target/arm/tcg/cpu64.c | 53 ++++ | 75 | target/arm: Fix SVE/SME gross MTE suppression checks |
77 | target/arm/tcg/tlb_helper.c | 96 ++++++- | 76 | |
78 | target/arm/tcg/translate-sve.c | 2 +- | 77 | MAINTAINERS | 3 +- |
79 | pc-bios/keymaps/meson.build | 2 +- | 78 | docs/system/arm/mps2.rst | 37 +- |
80 | 17 files changed, 1034 insertions(+), 166 deletions(-) | 79 | configs/devices/arm-softmmu/default.mak | 1 + |
80 | hw/arm/smmuv3-internal.h | 1 + | ||
81 | include/hw/arm/smmu-common.h | 1 + | ||
82 | include/hw/arm/virt.h | 2 + | ||
83 | include/hw/misc/mps2-scc.h | 1 + | ||
84 | linux-user/aarch64/target_prctl.h | 29 +- | ||
85 | target/arm/internals.h | 2 +- | ||
86 | target/arm/tcg/translate-a64.h | 2 + | ||
87 | hw/arm/mps3r.c | 640 ++++++++++++++++++++++++++++++++ | ||
88 | hw/arm/npcm7xx.c | 1 + | ||
89 | hw/arm/smmu-common.c | 11 + | ||
90 | hw/arm/smmuv3.c | 1 + | ||
91 | hw/arm/stellaris.c | 47 ++- | ||
92 | hw/arm/virt-acpi-build.c | 20 +- | ||
93 | hw/arm/virt.c | 60 ++- | ||
94 | hw/arm/xilinx_zynq.c | 2 + | ||
95 | hw/block/tc58128.c | 4 +- | ||
96 | hw/misc/mps2-scc.c | 138 ++++++- | ||
97 | hw/pci-host/raven.c | 1 + | ||
98 | target/arm/helper.c | 14 +- | ||
99 | target/arm/tcg/cpu32.c | 109 ++++++ | ||
100 | target/arm/tcg/op_helper.c | 43 ++- | ||
101 | target/arm/tcg/sme_helper.c | 8 +- | ||
102 | target/arm/tcg/sve_helper.c | 12 +- | ||
103 | target/arm/tcg/translate-sme.c | 15 +- | ||
104 | target/arm/tcg/translate-sve.c | 83 +++-- | ||
105 | target/arm/tcg/translate.c | 19 +- | ||
106 | tests/qtest/npcm7xx_emc-test.c | 5 +- | ||
107 | tests/qtest/npcm_gmac-test.c | 84 +---- | ||
108 | hw/arm/Kconfig | 5 + | ||
109 | hw/arm/meson.build | 1 + | ||
110 | tests/data/acpi/virt/FACP | Bin 276 -> 276 bytes | ||
111 | tests/data/acpi/virt/GTDT | Bin 96 -> 104 bytes | ||
112 | tests/qtest/meson.build | 4 +- | ||
113 | 36 files changed, 1184 insertions(+), 222 deletions(-) | ||
114 | create mode 100644 hw/arm/mps3r.c | ||
115 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Philippe Mathieu-Daudé <philmd@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | One cannot test for feature aa32_simd_r32 without first | 3 | Similarly to commits dadbb58f59..5ae79fe825 for other ARM boards, |
4 | testing if AArch32 mode is supported at all. This leads to | 4 | connect FIQ output of the GIC CPU interfaces to the CPU. |
5 | 5 | ||
6 | qemu-system-aarch64: ARM CPUs must have both VFP-D32 and Neon or neither | 6 | Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org> |
7 | 7 | Message-id: 20240130152548.17855-1-philmd@linaro.org | |
8 | for Apple M1 cpus. | 8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
9 | |||
10 | We already have a check for ARMv8-A never setting vfp-d32 true, | ||
11 | so restructure the code so that AArch64 avoids the test entirely. | ||
12 | |||
13 | Reported-by: Mads Ynddal <mads@ynddal.dk> | ||
14 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
15 | Tested-by: Philippe Mathieu-Daudé <philmd@linaro.org> | ||
16 | Tested-by: Mads Ynddal <m.ynddal@samsung.com> | ||
17 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> | ||
18 | Reviewed-by: Cédric Le Goater <clg@kaod.org> | ||
19 | Reviewed-by: Mads Ynddal <m.ynddal@samsung.com> | ||
20 | Message-id: 20230619140216.402530-1-richard.henderson@linaro.org | ||
21 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
22 | --- | 10 | --- |
23 | target/arm/cpu.c | 28 +++++++++++++++------------- | 11 | hw/arm/xilinx_zynq.c | 2 ++ |
24 | 1 file changed, 15 insertions(+), 13 deletions(-) | 12 | 1 file changed, 2 insertions(+) |
25 | 13 | ||
26 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | 14 | diff --git a/hw/arm/xilinx_zynq.c b/hw/arm/xilinx_zynq.c |
27 | index XXXXXXX..XXXXXXX 100644 | 15 | index XXXXXXX..XXXXXXX 100644 |
28 | --- a/target/arm/cpu.c | 16 | --- a/hw/arm/xilinx_zynq.c |
29 | +++ b/target/arm/cpu.c | 17 | +++ b/hw/arm/xilinx_zynq.c |
30 | @@ -XXX,XX +XXX,XX @@ void arm_cpu_post_init(Object *obj) | 18 | @@ -XXX,XX +XXX,XX @@ static void zynq_init(MachineState *machine) |
31 | * KVM does not currently allow us to lie to the guest about its | 19 | sysbus_mmio_map(busdev, 0, MPCORE_PERIPHBASE); |
32 | * ID/feature registers, so the guest always sees what the host has. | 20 | sysbus_connect_irq(busdev, 0, |
33 | */ | 21 | qdev_get_gpio_in(DEVICE(cpu), ARM_CPU_IRQ)); |
34 | - if (arm_feature(&cpu->env, ARM_FEATURE_AARCH64) | 22 | + sysbus_connect_irq(busdev, 1, |
35 | - ? cpu_isar_feature(aa64_fp_simd, cpu) | 23 | + qdev_get_gpio_in(DEVICE(cpu), ARM_CPU_FIQ)); |
36 | - : cpu_isar_feature(aa32_vfp, cpu)) { | 24 | |
37 | - cpu->has_vfp = true; | 25 | for (n = 0; n < 64; n++) { |
38 | - if (!kvm_enabled()) { | 26 | pic[n] = qdev_get_gpio_in(dev, n); |
39 | - qdev_property_add_static(DEVICE(obj), &arm_cpu_has_vfp_property); | ||
40 | + if (arm_feature(&cpu->env, ARM_FEATURE_AARCH64)) { | ||
41 | + if (cpu_isar_feature(aa64_fp_simd, cpu)) { | ||
42 | + cpu->has_vfp = true; | ||
43 | + cpu->has_vfp_d32 = true; | ||
44 | + if (tcg_enabled() || qtest_enabled()) { | ||
45 | + qdev_property_add_static(DEVICE(obj), | ||
46 | + &arm_cpu_has_vfp_property); | ||
47 | + } | ||
48 | } | ||
49 | - } | ||
50 | - | ||
51 | - if (cpu->has_vfp && cpu_isar_feature(aa32_simd_r32, cpu)) { | ||
52 | - cpu->has_vfp_d32 = true; | ||
53 | - if (!kvm_enabled()) { | ||
54 | + } else if (cpu_isar_feature(aa32_vfp, cpu)) { | ||
55 | + cpu->has_vfp = true; | ||
56 | + if (cpu_isar_feature(aa32_simd_r32, cpu)) { | ||
57 | + cpu->has_vfp_d32 = true; | ||
58 | /* | ||
59 | * The permitted values of the SIMDReg bits [3:0] on | ||
60 | * Armv8-A are either 0b0000 and 0b0010. On such CPUs, | ||
61 | * make sure that has_vfp_d32 can not be set to false. | ||
62 | */ | ||
63 | - if (!(arm_feature(&cpu->env, ARM_FEATURE_V8) && | ||
64 | - !arm_feature(&cpu->env, ARM_FEATURE_M))) { | ||
65 | + if ((tcg_enabled() || qtest_enabled()) | ||
66 | + && !(arm_feature(&cpu->env, ARM_FEATURE_V8) | ||
67 | + && !arm_feature(&cpu->env, ARM_FEATURE_M))) { | ||
68 | qdev_property_add_static(DEVICE(obj), | ||
69 | &arm_cpu_has_vfp_d32_property); | ||
70 | } | ||
71 | -- | 27 | -- |
72 | 2.34.1 | 28 | 2.34.1 |
73 | 29 | ||
74 | 30 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Do not provide a fast-path for physical addresses, | 3 | The API does not generate an error for setting ASYNC | SYNC; that merely |
4 | as those will need to be validated for GPC. | 4 | constrains the selection vs the per-cpu default. For qemu linux-user, |
5 | choose SYNC as the default. | ||
5 | 6 | ||
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 7 | Cc: qemu-stable@nongnu.org |
8 | Reported-by: Gustavo Romero <gustavo.romero@linaro.org> | ||
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 9 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
8 | Message-id: 20230620124418.805717-15-richard.henderson@linaro.org | 10 | Tested-by: Gustavo Romero <gustavo.romero@linaro.org> |
11 | Message-id: 20240207025210.8837-2-richard.henderson@linaro.org | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 13 | --- |
11 | target/arm/ptw.c | 44 +++++++++++++++++--------------------------- | 14 | linux-user/aarch64/target_prctl.h | 29 +++++++++++++++++------------ |
12 | 1 file changed, 17 insertions(+), 27 deletions(-) | 15 | 1 file changed, 17 insertions(+), 12 deletions(-) |
13 | 16 | ||
14 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c | 17 | diff --git a/linux-user/aarch64/target_prctl.h b/linux-user/aarch64/target_prctl.h |
15 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/ptw.c | 19 | --- a/linux-user/aarch64/target_prctl.h |
17 | +++ b/target/arm/ptw.c | 20 | +++ b/linux-user/aarch64/target_prctl.h |
18 | @@ -XXX,XX +XXX,XX @@ static bool S1_ptw_translate(CPUARMState *env, S1Translate *ptw, | 21 | @@ -XXX,XX +XXX,XX @@ static abi_long do_prctl_set_tagged_addr_ctrl(CPUArchState *env, abi_long arg2) |
19 | * From gdbstub, do not use softmmu so that we don't modify the | 22 | env->tagged_addr_enable = arg2 & PR_TAGGED_ADDR_ENABLE; |
20 | * state of the cpu at all, including softmmu tlb contents. | 23 | |
24 | if (cpu_isar_feature(aa64_mte, cpu)) { | ||
25 | - switch (arg2 & PR_MTE_TCF_MASK) { | ||
26 | - case PR_MTE_TCF_NONE: | ||
27 | - case PR_MTE_TCF_SYNC: | ||
28 | - case PR_MTE_TCF_ASYNC: | ||
29 | - break; | ||
30 | - default: | ||
31 | - return -EINVAL; | ||
32 | - } | ||
33 | - | ||
34 | /* | ||
35 | * Write PR_MTE_TCF to SCTLR_EL1[TCF0]. | ||
36 | - * Note that the syscall values are consistent with hw. | ||
37 | + * | ||
38 | + * The kernel has a per-cpu configuration for the sysadmin, | ||
39 | + * /sys/devices/system/cpu/cpu<N>/mte_tcf_preferred, | ||
40 | + * which qemu does not implement. | ||
41 | + * | ||
42 | + * Because there is no performance difference between the modes, and | ||
43 | + * because SYNC is most useful for debugging MTE errors, choose SYNC | ||
44 | + * as the preferred mode. With this preference, and the way the API | ||
45 | + * uses only two bits, there is no way for the program to select | ||
46 | + * ASYMM mode. | ||
21 | */ | 47 | */ |
22 | - if (regime_is_stage2(s2_mmu_idx)) { | 48 | - env->cp15.sctlr_el[1] = |
23 | - S1Translate s2ptw = { | 49 | - deposit64(env->cp15.sctlr_el[1], 38, 2, arg2 >> PR_MTE_TCF_SHIFT); |
24 | - .in_mmu_idx = s2_mmu_idx, | 50 | + unsigned tcf = 0; |
25 | - .in_ptw_idx = ptw_idx_for_stage_2(env, s2_mmu_idx), | 51 | + if (arg2 & PR_MTE_TCF_SYNC) { |
26 | - .in_secure = s2_mmu_idx == ARMMMUIdx_Stage2_S, | 52 | + tcf = 1; |
27 | - .in_space = (s2_mmu_idx == ARMMMUIdx_Stage2_S ? ARMSS_Secure | 53 | + } else if (arg2 & PR_MTE_TCF_ASYNC) { |
28 | - : space == ARMSS_Realm ? ARMSS_Realm | 54 | + tcf = 2; |
29 | - : ARMSS_NonSecure), | 55 | + } |
30 | - .in_debug = true, | 56 | + env->cp15.sctlr_el[1] = deposit64(env->cp15.sctlr_el[1], 38, 2, tcf); |
31 | - }; | 57 | |
32 | - GetPhysAddrResult s2 = { }; | 58 | /* |
33 | + S1Translate s2ptw = { | 59 | * Write PR_MTE_TAG to GCR_EL1[Exclude]. |
34 | + .in_mmu_idx = s2_mmu_idx, | ||
35 | + .in_ptw_idx = ptw_idx_for_stage_2(env, s2_mmu_idx), | ||
36 | + .in_secure = s2_mmu_idx == ARMMMUIdx_Stage2_S, | ||
37 | + .in_space = (s2_mmu_idx == ARMMMUIdx_Stage2_S ? ARMSS_Secure | ||
38 | + : space == ARMSS_Realm ? ARMSS_Realm | ||
39 | + : ARMSS_NonSecure), | ||
40 | + .in_debug = true, | ||
41 | + }; | ||
42 | + GetPhysAddrResult s2 = { }; | ||
43 | |||
44 | - if (get_phys_addr_lpae(env, &s2ptw, addr, MMU_DATA_LOAD, | ||
45 | - false, &s2, fi)) { | ||
46 | - goto fail; | ||
47 | - } | ||
48 | - ptw->out_phys = s2.f.phys_addr; | ||
49 | - pte_attrs = s2.cacheattrs.attrs; | ||
50 | - ptw->out_secure = s2.f.attrs.secure; | ||
51 | - ptw->out_space = s2.f.attrs.space; | ||
52 | - } else { | ||
53 | - /* Regime is physical. */ | ||
54 | - ptw->out_phys = addr; | ||
55 | - pte_attrs = 0; | ||
56 | - ptw->out_secure = s2_mmu_idx == ARMMMUIdx_Phys_S; | ||
57 | - ptw->out_space = (s2_mmu_idx == ARMMMUIdx_Phys_S ? ARMSS_Secure | ||
58 | - : space == ARMSS_Realm ? ARMSS_Realm | ||
59 | - : ARMSS_NonSecure); | ||
60 | + if (get_phys_addr_with_struct(env, &s2ptw, addr, | ||
61 | + MMU_DATA_LOAD, &s2, fi)) { | ||
62 | + goto fail; | ||
63 | } | ||
64 | + ptw->out_phys = s2.f.phys_addr; | ||
65 | + pte_attrs = s2.cacheattrs.attrs; | ||
66 | ptw->out_host = NULL; | ||
67 | ptw->out_rw = false; | ||
68 | + ptw->out_secure = s2.f.attrs.secure; | ||
69 | + ptw->out_space = s2.f.attrs.space; | ||
70 | } else { | ||
71 | #ifdef CONFIG_TCG | ||
72 | CPUTLBEntryFull *full; | ||
73 | -- | 60 | -- |
74 | 2.34.1 | 61 | 2.34.1 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Brown bag time: store instead of load results in uninitialized temp. | 3 | The field is encoded as [0-3], which is convenient for |
4 | indexing our array of function pointers, but the true | ||
5 | value is [1-4]. Adjust before calling do_mem_zpa. | ||
4 | 6 | ||
7 | Add an assert, and move the comment re passing ZT to | ||
8 | the helper back next to the relevant code. | ||
5 | 9 | ||
6 | Resolves: https://gitlab.com/qemu-project/qemu/-/issues/1704 | 10 | Cc: qemu-stable@nongnu.org |
7 | Reported-by: Mark Rutland <mark.rutland@arm.com> | 11 | Fixes: 206adacfb8d ("target/arm: Add mte helpers for sve scalar + int loads") |
8 | Tested-by: Alex Bennée <alex.bennee@linaro.org> | ||
9 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 12 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
10 | Message-id: 20230620134659.817559-1-richard.henderson@linaro.org | 13 | Tested-by: Gustavo Romero <gustavo.romero@linaro.org> |
11 | Fixes: e6dd5e782be ("target/arm: Use tcg_gen_qemu_{ld, st}_i128 in gen_sve_{ld, st}r") | 14 | Message-id: 20240207025210.8837-3-richard.henderson@linaro.org |
12 | Tested-by: Alex Bennée <alex.bennee@linaro.org> | ||
13 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
14 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 15 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
16 | --- | 17 | --- |
17 | target/arm/tcg/translate-sve.c | 2 +- | 18 | target/arm/tcg/translate-sve.c | 16 ++++++++-------- |
18 | 1 file changed, 1 insertion(+), 1 deletion(-) | 19 | 1 file changed, 8 insertions(+), 8 deletions(-) |
19 | 20 | ||
20 | diff --git a/target/arm/tcg/translate-sve.c b/target/arm/tcg/translate-sve.c | 21 | diff --git a/target/arm/tcg/translate-sve.c b/target/arm/tcg/translate-sve.c |
21 | index XXXXXXX..XXXXXXX 100644 | 22 | index XXXXXXX..XXXXXXX 100644 |
22 | --- a/target/arm/tcg/translate-sve.c | 23 | --- a/target/arm/tcg/translate-sve.c |
23 | +++ b/target/arm/tcg/translate-sve.c | 24 | +++ b/target/arm/tcg/translate-sve.c |
24 | @@ -XXX,XX +XXX,XX @@ void gen_sve_str(DisasContext *s, TCGv_ptr base, int vofs, | 25 | @@ -XXX,XX +XXX,XX @@ static void do_mem_zpa(DisasContext *s, int zt, int pg, TCGv_i64 addr, |
25 | /* Predicate register stores can be any multiple of 2. */ | 26 | TCGv_ptr t_pg; |
26 | if (len_remain >= 8) { | 27 | int desc = 0; |
27 | t0 = tcg_temp_new_i64(); | 28 | |
28 | - tcg_gen_st_i64(t0, base, vofs + len_align); | 29 | - /* |
29 | + tcg_gen_ld_i64(t0, base, vofs + len_align); | 30 | - * For e.g. LD4, there are not enough arguments to pass all 4 |
30 | tcg_gen_qemu_st_i64(t0, clean_addr, midx, MO_LEUQ | MO_ATOM_NONE); | 31 | - * registers as pointers, so encode the regno into the data field. |
31 | len_remain -= 8; | 32 | - * For consistency, do this even for LD1. |
32 | len_align += 8; | 33 | - */ |
34 | + assert(mte_n >= 1 && mte_n <= 4); | ||
35 | if (s->mte_active[0]) { | ||
36 | int msz = dtype_msz(dtype); | ||
37 | |||
38 | @@ -XXX,XX +XXX,XX @@ static void do_mem_zpa(DisasContext *s, int zt, int pg, TCGv_i64 addr, | ||
39 | addr = clean_data_tbi(s, addr); | ||
40 | } | ||
41 | |||
42 | + /* | ||
43 | + * For e.g. LD4, there are not enough arguments to pass all 4 | ||
44 | + * registers as pointers, so encode the regno into the data field. | ||
45 | + * For consistency, do this even for LD1. | ||
46 | + */ | ||
47 | desc = simd_desc(vsz, vsz, zt | desc); | ||
48 | t_pg = tcg_temp_new_ptr(); | ||
49 | |||
50 | @@ -XXX,XX +XXX,XX @@ static void do_ld_zpa(DisasContext *s, int zt, int pg, | ||
51 | * accessible via the instruction encoding. | ||
52 | */ | ||
53 | assert(fn != NULL); | ||
54 | - do_mem_zpa(s, zt, pg, addr, dtype, nreg, false, fn); | ||
55 | + do_mem_zpa(s, zt, pg, addr, dtype, nreg + 1, false, fn); | ||
56 | } | ||
57 | |||
58 | static bool trans_LD_zprr(DisasContext *s, arg_rprr_load *a) | ||
59 | @@ -XXX,XX +XXX,XX @@ static void do_st_zpa(DisasContext *s, int zt, int pg, TCGv_i64 addr, | ||
60 | if (nreg == 0) { | ||
61 | /* ST1 */ | ||
62 | fn = fn_single[s->mte_active[0]][be][msz][esz]; | ||
63 | - nreg = 1; | ||
64 | } else { | ||
65 | /* ST2, ST3, ST4 -- msz == esz, enforced by encoding */ | ||
66 | assert(msz == esz); | ||
67 | fn = fn_multiple[s->mte_active[0]][be][nreg - 1][msz]; | ||
68 | } | ||
69 | assert(fn != NULL); | ||
70 | - do_mem_zpa(s, zt, pg, addr, msz_dtype(s, msz), nreg, true, fn); | ||
71 | + do_mem_zpa(s, zt, pg, addr, msz_dtype(s, msz), nreg + 1, true, fn); | ||
72 | } | ||
73 | |||
74 | static bool trans_ST_zprr(DisasContext *s, arg_rprr_store *a) | ||
33 | -- | 75 | -- |
34 | 2.34.1 | 76 | 2.34.1 |
35 | |||
36 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Handle GPC Fault types in arm_deliver_fault, reporting as | 3 | When we added SVE_MTEDESC_SHIFT, we effectively limited the |
4 | either a GPC exception at EL3, or falling through to insn | 4 | maximum size of MTEDESC. Adjust SIZEM1 to consume the remaining |
5 | or data aborts at various exception levels. | 5 | bits (32 - 10 - 5 - 12 == 5). Assert that the data to be stored |
6 | fits within the field (expecting 8 * 4 - 1 == 31, exact fit). | ||
6 | 7 | ||
8 | Cc: qemu-stable@nongnu.org | ||
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
8 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 10 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
9 | Message-id: 20230620124418.805717-19-richard.henderson@linaro.org | 11 | Tested-by: Gustavo Romero <gustavo.romero@linaro.org> |
12 | Message-id: 20240207025210.8837-4-richard.henderson@linaro.org | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | --- | 14 | --- |
12 | target/arm/cpu.h | 1 + | 15 | target/arm/internals.h | 2 +- |
13 | target/arm/internals.h | 27 +++++++++++ | 16 | target/arm/tcg/translate-sve.c | 7 ++++--- |
14 | target/arm/helper.c | 5 ++ | 17 | 2 files changed, 5 insertions(+), 4 deletions(-) |
15 | target/arm/tcg/tlb_helper.c | 96 +++++++++++++++++++++++++++++++++++-- | ||
16 | 4 files changed, 126 insertions(+), 3 deletions(-) | ||
17 | 18 | ||
18 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
19 | index XXXXXXX..XXXXXXX 100644 | ||
20 | --- a/target/arm/cpu.h | ||
21 | +++ b/target/arm/cpu.h | ||
22 | @@ -XXX,XX +XXX,XX @@ | ||
23 | #define EXCP_UNALIGNED 22 /* v7M UNALIGNED UsageFault */ | ||
24 | #define EXCP_DIVBYZERO 23 /* v7M DIVBYZERO UsageFault */ | ||
25 | #define EXCP_VSERR 24 | ||
26 | +#define EXCP_GPC 25 /* v9 Granule Protection Check Fault */ | ||
27 | /* NB: add new EXCP_ defines to the array in arm_log_exception() too */ | ||
28 | |||
29 | #define ARMV7M_EXCP_RESET 1 | ||
30 | diff --git a/target/arm/internals.h b/target/arm/internals.h | 19 | diff --git a/target/arm/internals.h b/target/arm/internals.h |
31 | index XXXXXXX..XXXXXXX 100644 | 20 | index XXXXXXX..XXXXXXX 100644 |
32 | --- a/target/arm/internals.h | 21 | --- a/target/arm/internals.h |
33 | +++ b/target/arm/internals.h | 22 | +++ b/target/arm/internals.h |
34 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMFaultType { | 23 | @@ -XXX,XX +XXX,XX @@ FIELD(MTEDESC, TBI, 4, 2) |
35 | ARMFault_ICacheMaint, | 24 | FIELD(MTEDESC, TCMA, 6, 2) |
36 | ARMFault_QEMU_NSCExec, /* v8M: NS executing in S&NSC memory */ | 25 | FIELD(MTEDESC, WRITE, 8, 1) |
37 | ARMFault_QEMU_SFault, /* v8M: SecureFault INVTRAN, INVEP or AUVIOL */ | 26 | FIELD(MTEDESC, ALIGN, 9, 3) |
38 | + ARMFault_GPCFOnWalk, | 27 | -FIELD(MTEDESC, SIZEM1, 12, SIMD_DATA_BITS - 12) /* size - 1 */ |
39 | + ARMFault_GPCFOnOutput, | 28 | +FIELD(MTEDESC, SIZEM1, 12, SIMD_DATA_BITS - SVE_MTEDESC_SHIFT - 12) /* size - 1 */ |
40 | } ARMFaultType; | 29 | |
41 | 30 | bool mte_probe(CPUARMState *env, uint32_t desc, uint64_t ptr); | |
42 | +typedef enum ARMGPCF { | 31 | uint64_t mte_check(CPUARMState *env, uint32_t desc, uint64_t ptr, uintptr_t ra); |
43 | + GPCF_None, | 32 | diff --git a/target/arm/tcg/translate-sve.c b/target/arm/tcg/translate-sve.c |
44 | + GPCF_AddressSize, | ||
45 | + GPCF_Walk, | ||
46 | + GPCF_EABT, | ||
47 | + GPCF_Fail, | ||
48 | +} ARMGPCF; | ||
49 | + | ||
50 | /** | ||
51 | * ARMMMUFaultInfo: Information describing an ARM MMU Fault | ||
52 | * @type: Type of fault | ||
53 | + * @gpcf: Subtype of ARMFault_GPCFOn{Walk,Output}. | ||
54 | * @level: Table walk level (for translation, access flag and permission faults) | ||
55 | * @domain: Domain of the fault address (for non-LPAE CPUs only) | ||
56 | * @s2addr: Address that caused a fault at stage 2 | ||
57 | + * @paddr: physical address that caused a fault for gpc | ||
58 | + * @paddr_space: physical address space that caused a fault for gpc | ||
59 | * @stage2: True if we faulted at stage 2 | ||
60 | * @s1ptw: True if we faulted at stage 2 while doing a stage 1 page-table walk | ||
61 | * @s1ns: True if we faulted on a non-secure IPA while in secure state | ||
62 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMFaultType { | ||
63 | typedef struct ARMMMUFaultInfo ARMMMUFaultInfo; | ||
64 | struct ARMMMUFaultInfo { | ||
65 | ARMFaultType type; | ||
66 | + ARMGPCF gpcf; | ||
67 | target_ulong s2addr; | ||
68 | + target_ulong paddr; | ||
69 | + ARMSecuritySpace paddr_space; | ||
70 | int level; | ||
71 | int domain; | ||
72 | bool stage2; | ||
73 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t arm_fi_to_lfsc(ARMMMUFaultInfo *fi) | ||
74 | case ARMFault_Exclusive: | ||
75 | fsc = 0x35; | ||
76 | break; | ||
77 | + case ARMFault_GPCFOnWalk: | ||
78 | + assert(fi->level >= -1 && fi->level <= 3); | ||
79 | + if (fi->level < 0) { | ||
80 | + fsc = 0b100011; | ||
81 | + } else { | ||
82 | + fsc = 0b100100 | fi->level; | ||
83 | + } | ||
84 | + break; | ||
85 | + case ARMFault_GPCFOnOutput: | ||
86 | + fsc = 0b101000; | ||
87 | + break; | ||
88 | default: | ||
89 | /* Other faults can't occur in a context that requires a | ||
90 | * long-format status code. | ||
91 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
92 | index XXXXXXX..XXXXXXX 100644 | 33 | index XXXXXXX..XXXXXXX 100644 |
93 | --- a/target/arm/helper.c | 34 | --- a/target/arm/tcg/translate-sve.c |
94 | +++ b/target/arm/helper.c | 35 | +++ b/target/arm/tcg/translate-sve.c |
95 | @@ -XXX,XX +XXX,XX @@ void arm_log_exception(CPUState *cs) | 36 | @@ -XXX,XX +XXX,XX @@ static void do_mem_zpa(DisasContext *s, int zt, int pg, TCGv_i64 addr, |
96 | [EXCP_UNALIGNED] = "v7M UNALIGNED UsageFault", | ||
97 | [EXCP_DIVBYZERO] = "v7M DIVBYZERO UsageFault", | ||
98 | [EXCP_VSERR] = "Virtual SERR", | ||
99 | + [EXCP_GPC] = "Granule Protection Check", | ||
100 | }; | ||
101 | |||
102 | if (idx >= 0 && idx < ARRAY_SIZE(excnames)) { | ||
103 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_do_interrupt_aarch64(CPUState *cs) | ||
104 | } | ||
105 | |||
106 | switch (cs->exception_index) { | ||
107 | + case EXCP_GPC: | ||
108 | + qemu_log_mask(CPU_LOG_INT, "...with MFAR 0x%" PRIx64 "\n", | ||
109 | + env->cp15.mfar_el3); | ||
110 | + /* fall through */ | ||
111 | case EXCP_PREFETCH_ABORT: | ||
112 | case EXCP_DATA_ABORT: | ||
113 | /* | ||
114 | diff --git a/target/arm/tcg/tlb_helper.c b/target/arm/tcg/tlb_helper.c | ||
115 | index XXXXXXX..XXXXXXX 100644 | ||
116 | --- a/target/arm/tcg/tlb_helper.c | ||
117 | +++ b/target/arm/tcg/tlb_helper.c | ||
118 | @@ -XXX,XX +XXX,XX @@ static uint32_t compute_fsr_fsc(CPUARMState *env, ARMMMUFaultInfo *fi, | ||
119 | return fsr; | ||
120 | } | ||
121 | |||
122 | +static bool report_as_gpc_exception(ARMCPU *cpu, int current_el, | ||
123 | + ARMMMUFaultInfo *fi) | ||
124 | +{ | ||
125 | + bool ret; | ||
126 | + | ||
127 | + switch (fi->gpcf) { | ||
128 | + case GPCF_None: | ||
129 | + return false; | ||
130 | + case GPCF_AddressSize: | ||
131 | + case GPCF_Walk: | ||
132 | + case GPCF_EABT: | ||
133 | + /* R_PYTGX: GPT faults are reported as GPC. */ | ||
134 | + ret = true; | ||
135 | + break; | ||
136 | + case GPCF_Fail: | ||
137 | + /* | ||
138 | + * R_BLYPM: A GPF at EL3 is reported as insn or data abort. | ||
139 | + * R_VBZMW, R_LXHQR: A GPF at EL[0-2] is reported as a GPC | ||
140 | + * if SCR_EL3.GPF is set, otherwise an insn or data abort. | ||
141 | + */ | ||
142 | + ret = (cpu->env.cp15.scr_el3 & SCR_GPF) && current_el != 3; | ||
143 | + break; | ||
144 | + default: | ||
145 | + g_assert_not_reached(); | ||
146 | + } | ||
147 | + | ||
148 | + assert(cpu_isar_feature(aa64_rme, cpu)); | ||
149 | + assert(fi->type == ARMFault_GPCFOnWalk || | ||
150 | + fi->type == ARMFault_GPCFOnOutput); | ||
151 | + if (fi->gpcf == GPCF_AddressSize) { | ||
152 | + assert(fi->level == 0); | ||
153 | + } else { | ||
154 | + assert(fi->level >= 0 && fi->level <= 1); | ||
155 | + } | ||
156 | + | ||
157 | + return ret; | ||
158 | +} | ||
159 | + | ||
160 | +static unsigned encode_gpcsc(ARMMMUFaultInfo *fi) | ||
161 | +{ | ||
162 | + static uint8_t const gpcsc[] = { | ||
163 | + [GPCF_AddressSize] = 0b000000, | ||
164 | + [GPCF_Walk] = 0b000100, | ||
165 | + [GPCF_Fail] = 0b001100, | ||
166 | + [GPCF_EABT] = 0b010100, | ||
167 | + }; | ||
168 | + | ||
169 | + /* Note that we've validated fi->gpcf and fi->level above. */ | ||
170 | + return gpcsc[fi->gpcf] | fi->level; | ||
171 | +} | ||
172 | + | ||
173 | static G_NORETURN | ||
174 | void arm_deliver_fault(ARMCPU *cpu, vaddr addr, | ||
175 | MMUAccessType access_type, | ||
176 | int mmu_idx, ARMMMUFaultInfo *fi) | ||
177 | { | 37 | { |
178 | CPUARMState *env = &cpu->env; | 38 | unsigned vsz = vec_full_reg_size(s); |
179 | - int target_el; | 39 | TCGv_ptr t_pg; |
180 | + int target_el = exception_target_el(env); | 40 | + uint32_t sizem1; |
181 | + int current_el = arm_current_el(env); | 41 | int desc = 0; |
182 | bool same_el; | 42 | |
183 | uint32_t syn, exc, fsr, fsc; | 43 | assert(mte_n >= 1 && mte_n <= 4); |
184 | 44 | + sizem1 = (mte_n << dtype_msz(dtype)) - 1; | |
185 | - target_el = exception_target_el(env); | 45 | + assert(sizem1 <= R_MTEDESC_SIZEM1_MASK >> R_MTEDESC_SIZEM1_SHIFT); |
186 | + if (report_as_gpc_exception(cpu, current_el, fi)) { | 46 | if (s->mte_active[0]) { |
187 | + target_el = 3; | 47 | - int msz = dtype_msz(dtype); |
188 | + | 48 | - |
189 | + fsr = compute_fsr_fsc(env, fi, target_el, mmu_idx, &fsc); | 49 | desc = FIELD_DP32(desc, MTEDESC, MIDX, get_mem_index(s)); |
190 | + | 50 | desc = FIELD_DP32(desc, MTEDESC, TBI, s->tbid); |
191 | + syn = syn_gpc(fi->stage2 && fi->type == ARMFault_GPCFOnWalk, | 51 | desc = FIELD_DP32(desc, MTEDESC, TCMA, s->tcma); |
192 | + access_type == MMU_INST_FETCH, | 52 | desc = FIELD_DP32(desc, MTEDESC, WRITE, is_write); |
193 | + encode_gpcsc(fi), 0, fi->s1ptw, | 53 | - desc = FIELD_DP32(desc, MTEDESC, SIZEM1, (mte_n << msz) - 1); |
194 | + access_type == MMU_DATA_STORE, fsc); | 54 | + desc = FIELD_DP32(desc, MTEDESC, SIZEM1, sizem1); |
195 | + | 55 | desc <<= SVE_MTEDESC_SHIFT; |
196 | + env->cp15.mfar_el3 = fi->paddr; | 56 | } else { |
197 | + switch (fi->paddr_space) { | 57 | addr = clean_data_tbi(s, addr); |
198 | + case ARMSS_Secure: | ||
199 | + break; | ||
200 | + case ARMSS_NonSecure: | ||
201 | + env->cp15.mfar_el3 |= R_MFAR_NS_MASK; | ||
202 | + break; | ||
203 | + case ARMSS_Root: | ||
204 | + env->cp15.mfar_el3 |= R_MFAR_NSE_MASK; | ||
205 | + break; | ||
206 | + case ARMSS_Realm: | ||
207 | + env->cp15.mfar_el3 |= R_MFAR_NSE_MASK | R_MFAR_NS_MASK; | ||
208 | + break; | ||
209 | + default: | ||
210 | + g_assert_not_reached(); | ||
211 | + } | ||
212 | + | ||
213 | + exc = EXCP_GPC; | ||
214 | + goto do_raise; | ||
215 | + } | ||
216 | + | ||
217 | + /* If SCR_EL3.GPF is unset, GPF may still be routed to EL2. */ | ||
218 | + if (fi->gpcf == GPCF_Fail && target_el < 2) { | ||
219 | + if (arm_hcr_el2_eff(env) & HCR_GPF) { | ||
220 | + target_el = 2; | ||
221 | + } | ||
222 | + } | ||
223 | + | ||
224 | if (fi->stage2) { | ||
225 | target_el = 2; | ||
226 | env->cp15.hpfar_el2 = extract64(fi->s2addr, 12, 47) << 4; | ||
227 | @@ -XXX,XX +XXX,XX @@ void arm_deliver_fault(ARMCPU *cpu, vaddr addr, | ||
228 | env->cp15.hpfar_el2 |= HPFAR_NS; | ||
229 | } | ||
230 | } | ||
231 | - same_el = (arm_current_el(env) == target_el); | ||
232 | |||
233 | + same_el = current_el == target_el; | ||
234 | fsr = compute_fsr_fsc(env, fi, target_el, mmu_idx, &fsc); | ||
235 | |||
236 | if (access_type == MMU_INST_FETCH) { | ||
237 | @@ -XXX,XX +XXX,XX @@ void arm_deliver_fault(ARMCPU *cpu, vaddr addr, | ||
238 | exc = EXCP_DATA_ABORT; | ||
239 | } | ||
240 | |||
241 | + do_raise: | ||
242 | env->exception.vaddress = addr; | ||
243 | env->exception.fsr = fsr; | ||
244 | raise_exception(env, exc, syn, target_el); | ||
245 | -- | 58 | -- |
246 | 2.34.1 | 59 | 2.34.1 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Introduce both the enumeration and functions to retrieve | 3 | Share code that creates mtedesc and embeds within simd_desc. |
4 | the current state, and state outside of EL3. | ||
5 | 4 | ||
5 | Cc: qemu-stable@nongnu.org | ||
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
8 | Message-id: 20230620124418.805717-6-richard.henderson@linaro.org | 8 | Tested-by: Gustavo Romero <gustavo.romero@linaro.org> |
9 | Message-id: 20240207025210.8837-5-richard.henderson@linaro.org | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 11 | --- |
11 | target/arm/cpu.h | 89 ++++++++++++++++++++++++++++++++++----------- | 12 | target/arm/tcg/translate-a64.h | 2 ++ |
12 | target/arm/helper.c | 60 ++++++++++++++++++++++++++++++ | 13 | target/arm/tcg/translate-sme.c | 15 +++-------- |
13 | 2 files changed, 127 insertions(+), 22 deletions(-) | 14 | target/arm/tcg/translate-sve.c | 47 ++++++++++++++++++---------------- |
15 | 3 files changed, 31 insertions(+), 33 deletions(-) | ||
14 | 16 | ||
15 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 17 | diff --git a/target/arm/tcg/translate-a64.h b/target/arm/tcg/translate-a64.h |
16 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/cpu.h | 19 | --- a/target/arm/tcg/translate-a64.h |
18 | +++ b/target/arm/cpu.h | 20 | +++ b/target/arm/tcg/translate-a64.h |
19 | @@ -XXX,XX +XXX,XX @@ static inline int arm_feature(CPUARMState *env, int feature) | 21 | @@ -XXX,XX +XXX,XX @@ bool logic_imm_decode_wmask(uint64_t *result, unsigned int immn, |
20 | 22 | bool sve_access_check(DisasContext *s); | |
21 | void arm_cpu_finalize_features(ARMCPU *cpu, Error **errp); | 23 | bool sme_enabled_check(DisasContext *s); |
22 | 24 | bool sme_enabled_check_with_svcr(DisasContext *s, unsigned); | |
23 | -#if !defined(CONFIG_USER_ONLY) | 25 | +uint32_t make_svemte_desc(DisasContext *s, unsigned vsz, uint32_t nregs, |
24 | /* | 26 | + uint32_t msz, bool is_write, uint32_t data); |
25 | + * ARM v9 security states. | 27 | |
26 | + * The ordering of the enumeration corresponds to the low 2 bits | 28 | /* This function corresponds to CheckStreamingSVEEnabled. */ |
27 | + * of the GPI value, and (except for Root) the concat of NSE:NS. | 29 | static inline bool sme_sm_enabled_check(DisasContext *s) |
28 | + */ | 30 | diff --git a/target/arm/tcg/translate-sme.c b/target/arm/tcg/translate-sme.c |
31 | index XXXXXXX..XXXXXXX 100644 | ||
32 | --- a/target/arm/tcg/translate-sme.c | ||
33 | +++ b/target/arm/tcg/translate-sme.c | ||
34 | @@ -XXX,XX +XXX,XX @@ static bool trans_LDST1(DisasContext *s, arg_LDST1 *a) | ||
35 | |||
36 | TCGv_ptr t_za, t_pg; | ||
37 | TCGv_i64 addr; | ||
38 | - int svl, desc = 0; | ||
39 | + uint32_t desc; | ||
40 | bool be = s->be_data == MO_BE; | ||
41 | bool mte = s->mte_active[0]; | ||
42 | |||
43 | @@ -XXX,XX +XXX,XX @@ static bool trans_LDST1(DisasContext *s, arg_LDST1 *a) | ||
44 | tcg_gen_shli_i64(addr, cpu_reg(s, a->rm), a->esz); | ||
45 | tcg_gen_add_i64(addr, addr, cpu_reg_sp(s, a->rn)); | ||
46 | |||
47 | - if (mte) { | ||
48 | - desc = FIELD_DP32(desc, MTEDESC, MIDX, get_mem_index(s)); | ||
49 | - desc = FIELD_DP32(desc, MTEDESC, TBI, s->tbid); | ||
50 | - desc = FIELD_DP32(desc, MTEDESC, TCMA, s->tcma); | ||
51 | - desc = FIELD_DP32(desc, MTEDESC, WRITE, a->st); | ||
52 | - desc = FIELD_DP32(desc, MTEDESC, SIZEM1, (1 << a->esz) - 1); | ||
53 | - desc <<= SVE_MTEDESC_SHIFT; | ||
54 | - } else { | ||
55 | + if (!mte) { | ||
56 | addr = clean_data_tbi(s, addr); | ||
57 | } | ||
58 | - svl = streaming_vec_reg_size(s); | ||
59 | - desc = simd_desc(svl, svl, desc); | ||
29 | + | 60 | + |
30 | +typedef enum ARMSecuritySpace { | 61 | + desc = make_svemte_desc(s, streaming_vec_reg_size(s), 1, a->esz, a->st, 0); |
31 | + ARMSS_Secure = 0, | 62 | |
32 | + ARMSS_NonSecure = 1, | 63 | fns[a->esz][be][a->v][mte][a->st](tcg_env, t_za, t_pg, addr, |
33 | + ARMSS_Root = 2, | 64 | tcg_constant_i32(desc)); |
34 | + ARMSS_Realm = 3, | 65 | diff --git a/target/arm/tcg/translate-sve.c b/target/arm/tcg/translate-sve.c |
35 | +} ARMSecuritySpace; | 66 | index XXXXXXX..XXXXXXX 100644 |
67 | --- a/target/arm/tcg/translate-sve.c | ||
68 | +++ b/target/arm/tcg/translate-sve.c | ||
69 | @@ -XXX,XX +XXX,XX @@ static const uint8_t dtype_esz[16] = { | ||
70 | 3, 2, 1, 3 | ||
71 | }; | ||
72 | |||
73 | -static void do_mem_zpa(DisasContext *s, int zt, int pg, TCGv_i64 addr, | ||
74 | - int dtype, uint32_t mte_n, bool is_write, | ||
75 | - gen_helper_gvec_mem *fn) | ||
76 | +uint32_t make_svemte_desc(DisasContext *s, unsigned vsz, uint32_t nregs, | ||
77 | + uint32_t msz, bool is_write, uint32_t data) | ||
78 | { | ||
79 | - unsigned vsz = vec_full_reg_size(s); | ||
80 | - TCGv_ptr t_pg; | ||
81 | uint32_t sizem1; | ||
82 | - int desc = 0; | ||
83 | + uint32_t desc = 0; | ||
84 | |||
85 | - assert(mte_n >= 1 && mte_n <= 4); | ||
86 | - sizem1 = (mte_n << dtype_msz(dtype)) - 1; | ||
87 | + /* Assert all of the data fits, with or without MTE enabled. */ | ||
88 | + assert(nregs >= 1 && nregs <= 4); | ||
89 | + sizem1 = (nregs << msz) - 1; | ||
90 | assert(sizem1 <= R_MTEDESC_SIZEM1_MASK >> R_MTEDESC_SIZEM1_SHIFT); | ||
91 | + assert(data < 1u << SVE_MTEDESC_SHIFT); | ||
36 | + | 92 | + |
37 | +/* Return true if @space is secure, in the pre-v9 sense. */ | 93 | if (s->mte_active[0]) { |
38 | +static inline bool arm_space_is_secure(ARMSecuritySpace space) | 94 | desc = FIELD_DP32(desc, MTEDESC, MIDX, get_mem_index(s)); |
39 | +{ | 95 | desc = FIELD_DP32(desc, MTEDESC, TBI, s->tbid); |
40 | + return space == ARMSS_Secure || space == ARMSS_Root; | 96 | @@ -XXX,XX +XXX,XX @@ static void do_mem_zpa(DisasContext *s, int zt, int pg, TCGv_i64 addr, |
97 | desc = FIELD_DP32(desc, MTEDESC, WRITE, is_write); | ||
98 | desc = FIELD_DP32(desc, MTEDESC, SIZEM1, sizem1); | ||
99 | desc <<= SVE_MTEDESC_SHIFT; | ||
100 | - } else { | ||
101 | + } | ||
102 | + return simd_desc(vsz, vsz, desc | data); | ||
41 | +} | 103 | +} |
42 | + | 104 | + |
43 | +/* Return the ARMSecuritySpace for @secure, assuming !RME or EL[0-2]. */ | 105 | +static void do_mem_zpa(DisasContext *s, int zt, int pg, TCGv_i64 addr, |
44 | +static inline ARMSecuritySpace arm_secure_to_space(bool secure) | 106 | + int dtype, uint32_t nregs, bool is_write, |
107 | + gen_helper_gvec_mem *fn) | ||
45 | +{ | 108 | +{ |
46 | + return secure ? ARMSS_Secure : ARMSS_NonSecure; | 109 | + TCGv_ptr t_pg; |
47 | +} | 110 | + uint32_t desc; |
48 | + | 111 | + |
49 | +#if !defined(CONFIG_USER_ONLY) | 112 | + if (!s->mte_active[0]) { |
50 | +/** | 113 | addr = clean_data_tbi(s, addr); |
51 | + * arm_security_space_below_el3: | 114 | } |
52 | + * @env: cpu context | 115 | |
53 | + * | 116 | @@ -XXX,XX +XXX,XX @@ static void do_mem_zpa(DisasContext *s, int zt, int pg, TCGv_i64 addr, |
54 | + * Return the security space of exception levels below EL3, following | 117 | * registers as pointers, so encode the regno into the data field. |
55 | + * an exception return to those levels. Unlike arm_security_space, | 118 | * For consistency, do this even for LD1. |
56 | + * this doesn't care about the current EL. | 119 | */ |
57 | + */ | 120 | - desc = simd_desc(vsz, vsz, zt | desc); |
58 | +ARMSecuritySpace arm_security_space_below_el3(CPUARMState *env); | 121 | + desc = make_svemte_desc(s, vec_full_reg_size(s), nregs, |
122 | + dtype_msz(dtype), is_write, zt); | ||
123 | t_pg = tcg_temp_new_ptr(); | ||
124 | |||
125 | tcg_gen_addi_ptr(t_pg, tcg_env, pred_full_reg_offset(s, pg)); | ||
126 | @@ -XXX,XX +XXX,XX @@ static void do_mem_zpz(DisasContext *s, int zt, int pg, int zm, | ||
127 | int scale, TCGv_i64 scalar, int msz, bool is_write, | ||
128 | gen_helper_gvec_mem_scatter *fn) | ||
129 | { | ||
130 | - unsigned vsz = vec_full_reg_size(s); | ||
131 | TCGv_ptr t_zm = tcg_temp_new_ptr(); | ||
132 | TCGv_ptr t_pg = tcg_temp_new_ptr(); | ||
133 | TCGv_ptr t_zt = tcg_temp_new_ptr(); | ||
134 | - int desc = 0; | ||
135 | - | ||
136 | - if (s->mte_active[0]) { | ||
137 | - desc = FIELD_DP32(desc, MTEDESC, MIDX, get_mem_index(s)); | ||
138 | - desc = FIELD_DP32(desc, MTEDESC, TBI, s->tbid); | ||
139 | - desc = FIELD_DP32(desc, MTEDESC, TCMA, s->tcma); | ||
140 | - desc = FIELD_DP32(desc, MTEDESC, WRITE, is_write); | ||
141 | - desc = FIELD_DP32(desc, MTEDESC, SIZEM1, (1 << msz) - 1); | ||
142 | - desc <<= SVE_MTEDESC_SHIFT; | ||
143 | - } | ||
144 | - desc = simd_desc(vsz, vsz, desc | scale); | ||
145 | + uint32_t desc; | ||
146 | |||
147 | tcg_gen_addi_ptr(t_pg, tcg_env, pred_full_reg_offset(s, pg)); | ||
148 | tcg_gen_addi_ptr(t_zm, tcg_env, vec_full_reg_offset(s, zm)); | ||
149 | tcg_gen_addi_ptr(t_zt, tcg_env, vec_full_reg_offset(s, zt)); | ||
59 | + | 150 | + |
60 | +/** | 151 | + desc = make_svemte_desc(s, vec_full_reg_size(s), 1, msz, is_write, scale); |
61 | + * arm_is_secure_below_el3: | 152 | fn(tcg_env, t_zt, t_pg, t_zm, scalar, tcg_constant_i32(desc)); |
62 | + * @env: cpu context | ||
63 | + * | ||
64 | * Return true if exception levels below EL3 are in secure state, | ||
65 | - * or would be following an exception return to that level. | ||
66 | - * Unlike arm_is_secure() (which is always a question about the | ||
67 | - * _current_ state of the CPU) this doesn't care about the current | ||
68 | - * EL or mode. | ||
69 | + * or would be following an exception return to those levels. | ||
70 | */ | ||
71 | static inline bool arm_is_secure_below_el3(CPUARMState *env) | ||
72 | { | ||
73 | - assert(!arm_feature(env, ARM_FEATURE_M)); | ||
74 | - if (arm_feature(env, ARM_FEATURE_EL3)) { | ||
75 | - return !(env->cp15.scr_el3 & SCR_NS); | ||
76 | - } else { | ||
77 | - /* If EL3 is not supported then the secure state is implementation | ||
78 | - * defined, in which case QEMU defaults to non-secure. | ||
79 | - */ | ||
80 | - return false; | ||
81 | - } | ||
82 | + ARMSecuritySpace ss = arm_security_space_below_el3(env); | ||
83 | + return ss == ARMSS_Secure; | ||
84 | } | 153 | } |
85 | 154 | ||
86 | /* Return true if the CPU is AArch64 EL3 or AArch32 Mon */ | ||
87 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_is_el3_or_mon(CPUARMState *env) | ||
88 | return false; | ||
89 | } | ||
90 | |||
91 | -/* Return true if the processor is in secure state */ | ||
92 | +/** | ||
93 | + * arm_security_space: | ||
94 | + * @env: cpu context | ||
95 | + * | ||
96 | + * Return the current security space of the cpu. | ||
97 | + */ | ||
98 | +ARMSecuritySpace arm_security_space(CPUARMState *env); | ||
99 | + | ||
100 | +/** | ||
101 | + * arm_is_secure: | ||
102 | + * @env: cpu context | ||
103 | + * | ||
104 | + * Return true if the processor is in secure state. | ||
105 | + */ | ||
106 | static inline bool arm_is_secure(CPUARMState *env) | ||
107 | { | ||
108 | - if (arm_feature(env, ARM_FEATURE_M)) { | ||
109 | - return env->v7m.secure; | ||
110 | - } | ||
111 | - if (arm_is_el3_or_mon(env)) { | ||
112 | - return true; | ||
113 | - } | ||
114 | - return arm_is_secure_below_el3(env); | ||
115 | + return arm_space_is_secure(arm_security_space(env)); | ||
116 | } | ||
117 | |||
118 | /* | ||
119 | @@ -XXX,XX +XXX,XX @@ static inline bool arm_is_el2_enabled(CPUARMState *env) | ||
120 | } | ||
121 | |||
122 | #else | ||
123 | +static inline ARMSecuritySpace arm_security_space_below_el3(CPUARMState *env) | ||
124 | +{ | ||
125 | + return ARMSS_NonSecure; | ||
126 | +} | ||
127 | + | ||
128 | static inline bool arm_is_secure_below_el3(CPUARMState *env) | ||
129 | { | ||
130 | return false; | ||
131 | } | ||
132 | |||
133 | +static inline ARMSecuritySpace arm_security_space(CPUARMState *env) | ||
134 | +{ | ||
135 | + return ARMSS_NonSecure; | ||
136 | +} | ||
137 | + | ||
138 | static inline bool arm_is_secure(CPUARMState *env) | ||
139 | { | ||
140 | return false; | ||
141 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
142 | index XXXXXXX..XXXXXXX 100644 | ||
143 | --- a/target/arm/helper.c | ||
144 | +++ b/target/arm/helper.c | ||
145 | @@ -XXX,XX +XXX,XX @@ void aarch64_sve_change_el(CPUARMState *env, int old_el, | ||
146 | } | ||
147 | } | ||
148 | #endif | ||
149 | + | ||
150 | +#ifndef CONFIG_USER_ONLY | ||
151 | +ARMSecuritySpace arm_security_space(CPUARMState *env) | ||
152 | +{ | ||
153 | + if (arm_feature(env, ARM_FEATURE_M)) { | ||
154 | + return arm_secure_to_space(env->v7m.secure); | ||
155 | + } | ||
156 | + | ||
157 | + /* | ||
158 | + * If EL3 is not supported then the secure state is implementation | ||
159 | + * defined, in which case QEMU defaults to non-secure. | ||
160 | + */ | ||
161 | + if (!arm_feature(env, ARM_FEATURE_EL3)) { | ||
162 | + return ARMSS_NonSecure; | ||
163 | + } | ||
164 | + | ||
165 | + /* Check for AArch64 EL3 or AArch32 Mon. */ | ||
166 | + if (is_a64(env)) { | ||
167 | + if (extract32(env->pstate, 2, 2) == 3) { | ||
168 | + if (cpu_isar_feature(aa64_rme, env_archcpu(env))) { | ||
169 | + return ARMSS_Root; | ||
170 | + } else { | ||
171 | + return ARMSS_Secure; | ||
172 | + } | ||
173 | + } | ||
174 | + } else { | ||
175 | + if ((env->uncached_cpsr & CPSR_M) == ARM_CPU_MODE_MON) { | ||
176 | + return ARMSS_Secure; | ||
177 | + } | ||
178 | + } | ||
179 | + | ||
180 | + return arm_security_space_below_el3(env); | ||
181 | +} | ||
182 | + | ||
183 | +ARMSecuritySpace arm_security_space_below_el3(CPUARMState *env) | ||
184 | +{ | ||
185 | + assert(!arm_feature(env, ARM_FEATURE_M)); | ||
186 | + | ||
187 | + /* | ||
188 | + * If EL3 is not supported then the secure state is implementation | ||
189 | + * defined, in which case QEMU defaults to non-secure. | ||
190 | + */ | ||
191 | + if (!arm_feature(env, ARM_FEATURE_EL3)) { | ||
192 | + return ARMSS_NonSecure; | ||
193 | + } | ||
194 | + | ||
195 | + /* | ||
196 | + * Note NSE cannot be set without RME, and NSE & !NS is Reserved. | ||
197 | + * Ignoring NSE when !NS retains consistency without having to | ||
198 | + * modify other predicates. | ||
199 | + */ | ||
200 | + if (!(env->cp15.scr_el3 & SCR_NS)) { | ||
201 | + return ARMSS_Secure; | ||
202 | + } else if (env->cp15.scr_el3 & SCR_NSE) { | ||
203 | + return ARMSS_Realm; | ||
204 | + } else { | ||
205 | + return ARMSS_NonSecure; | ||
206 | + } | ||
207 | +} | ||
208 | +#endif /* !CONFIG_USER_ONLY */ | ||
209 | -- | 155 | -- |
210 | 2.34.1 | 156 | 2.34.1 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | We will need 2 bits to represent ARMSecurityState. | 3 | These functions "use the standard load helpers", but |
4 | fail to clean_data_tbi or populate mtedesc. | ||
4 | 5 | ||
5 | Do not attempt to replace or widen secure, even though it | 6 | Cc: qemu-stable@nongnu.org |
6 | logically overlaps the new field -- there are uses within | ||
7 | e.g. hw/block/pflash_cfi01.c, which don't know anything | ||
8 | specific about ARM. | ||
9 | |||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
11 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 8 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
12 | Message-id: 20230620124418.805717-7-richard.henderson@linaro.org | 9 | Tested-by: Gustavo Romero <gustavo.romero@linaro.org> |
10 | Message-id: 20240207025210.8837-6-richard.henderson@linaro.org | ||
13 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
14 | --- | 12 | --- |
15 | include/exec/memattrs.h | 9 ++++++++- | 13 | target/arm/tcg/translate-sve.c | 15 +++++++++++++-- |
16 | 1 file changed, 8 insertions(+), 1 deletion(-) | 14 | 1 file changed, 13 insertions(+), 2 deletions(-) |
17 | 15 | ||
18 | diff --git a/include/exec/memattrs.h b/include/exec/memattrs.h | 16 | diff --git a/target/arm/tcg/translate-sve.c b/target/arm/tcg/translate-sve.c |
19 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
20 | --- a/include/exec/memattrs.h | 18 | --- a/target/arm/tcg/translate-sve.c |
21 | +++ b/include/exec/memattrs.h | 19 | +++ b/target/arm/tcg/translate-sve.c |
22 | @@ -XXX,XX +XXX,XX @@ typedef struct MemTxAttrs { | 20 | @@ -XXX,XX +XXX,XX @@ static void do_ldrq(DisasContext *s, int zt, int pg, TCGv_i64 addr, int dtype) |
23 | * "didn't specify" if necessary. | 21 | unsigned vsz = vec_full_reg_size(s); |
24 | */ | 22 | TCGv_ptr t_pg; |
25 | unsigned int unspecified:1; | 23 | int poff; |
26 | - /* ARM/AMBA: TrustZone Secure access | 24 | + uint32_t desc; |
27 | + /* | 25 | |
28 | + * ARM/AMBA: TrustZone Secure access | 26 | /* Load the first quadword using the normal predicated load helpers. */ |
29 | * x86: System Management Mode access | 27 | + if (!s->mte_active[0]) { |
30 | */ | 28 | + addr = clean_data_tbi(s, addr); |
31 | unsigned int secure:1; | 29 | + } |
32 | + /* | 30 | + |
33 | + * ARM: ArmSecuritySpace. This partially overlaps secure, but it is | 31 | poff = pred_full_reg_offset(s, pg); |
34 | + * easier to have both fields to assist code that does not understand | 32 | if (vsz > 16) { |
35 | + * ARMv9 RME, or no specific knowledge of ARM at all (e.g. pflash). | 33 | /* |
36 | + */ | 34 | @@ -XXX,XX +XXX,XX @@ static void do_ldrq(DisasContext *s, int zt, int pg, TCGv_i64 addr, int dtype) |
37 | + unsigned int space:2; | 35 | |
38 | /* Memory access is usermode (unprivileged) */ | 36 | gen_helper_gvec_mem *fn |
39 | unsigned int user:1; | 37 | = ldr_fns[s->mte_active[0]][s->be_data == MO_BE][dtype][0]; |
38 | - fn(tcg_env, t_pg, addr, tcg_constant_i32(simd_desc(16, 16, zt))); | ||
39 | + desc = make_svemte_desc(s, 16, 1, dtype_msz(dtype), false, zt); | ||
40 | + fn(tcg_env, t_pg, addr, tcg_constant_i32(desc)); | ||
41 | |||
42 | /* Replicate that first quadword. */ | ||
43 | if (vsz > 16) { | ||
44 | @@ -XXX,XX +XXX,XX @@ static void do_ldro(DisasContext *s, int zt, int pg, TCGv_i64 addr, int dtype) | ||
45 | unsigned vsz_r32; | ||
46 | TCGv_ptr t_pg; | ||
47 | int poff, doff; | ||
48 | + uint32_t desc; | ||
49 | |||
50 | if (vsz < 32) { | ||
51 | /* | ||
52 | @@ -XXX,XX +XXX,XX @@ static void do_ldro(DisasContext *s, int zt, int pg, TCGv_i64 addr, int dtype) | ||
53 | } | ||
54 | |||
55 | /* Load the first octaword using the normal predicated load helpers. */ | ||
56 | + if (!s->mte_active[0]) { | ||
57 | + addr = clean_data_tbi(s, addr); | ||
58 | + } | ||
59 | |||
60 | poff = pred_full_reg_offset(s, pg); | ||
61 | if (vsz > 32) { | ||
62 | @@ -XXX,XX +XXX,XX @@ static void do_ldro(DisasContext *s, int zt, int pg, TCGv_i64 addr, int dtype) | ||
63 | |||
64 | gen_helper_gvec_mem *fn | ||
65 | = ldr_fns[s->mte_active[0]][s->be_data == MO_BE][dtype][0]; | ||
66 | - fn(tcg_env, t_pg, addr, tcg_constant_i32(simd_desc(32, 32, zt))); | ||
67 | + desc = make_svemte_desc(s, 32, 1, dtype_msz(dtype), false, zt); | ||
68 | + fn(tcg_env, t_pg, addr, tcg_constant_i32(desc)); | ||
69 | |||
40 | /* | 70 | /* |
71 | * Replicate that first octaword. | ||
41 | -- | 72 | -- |
42 | 2.34.1 | 73 | 2.34.1 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Richard Henderson <richard.henderson@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | With Realm security state, bit 55 of a block or page descriptor during | 3 | The TBI and TCMA bits are located within mtedesc, not desc. |
4 | the stage2 walk becomes the NS bit; during the stage1 walk the bit 5 | ||
5 | NS bit is RES0. With Root security state, bit 11 of the block or page | ||
6 | descriptor during the stage1 walk becomes the NSE bit. | ||
7 | 4 | ||
8 | Rather than collecting an NS bit and applying it later, compute the | 5 | Cc: qemu-stable@nongnu.org |
9 | output pa space from the input pa space and unconditionally assign. | ||
10 | This means that we no longer need to adjust the output space earlier | ||
11 | for the NSTable bit. | ||
12 | |||
13 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
14 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> |
15 | Message-id: 20230620124418.805717-13-richard.henderson@linaro.org | 8 | Tested-by: Gustavo Romero <gustavo.romero@linaro.org> |
9 | Message-id: 20240207025210.8837-7-richard.henderson@linaro.org | ||
16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
17 | --- | 11 | --- |
18 | target/arm/ptw.c | 89 +++++++++++++++++++++++++++++++++++++++--------- | 12 | target/arm/tcg/sme_helper.c | 8 ++++---- |
19 | 1 file changed, 73 insertions(+), 16 deletions(-) | 13 | target/arm/tcg/sve_helper.c | 12 ++++++------ |
14 | 2 files changed, 10 insertions(+), 10 deletions(-) | ||
20 | 15 | ||
21 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c | 16 | diff --git a/target/arm/tcg/sme_helper.c b/target/arm/tcg/sme_helper.c |
22 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
23 | --- a/target/arm/ptw.c | 18 | --- a/target/arm/tcg/sme_helper.c |
24 | +++ b/target/arm/ptw.c | 19 | +++ b/target/arm/tcg/sme_helper.c |
25 | @@ -XXX,XX +XXX,XX @@ static int get_S2prot(CPUARMState *env, int s2ap, int xn, bool s1_is_el0) | 20 | @@ -XXX,XX +XXX,XX @@ void sme_ld1_mte(CPUARMState *env, void *za, uint64_t *vg, |
26 | * @mmu_idx: MMU index indicating required translation regime | 21 | desc = extract32(desc, 0, SIMD_DATA_SHIFT + SVE_MTEDESC_SHIFT); |
27 | * @is_aa64: TRUE if AArch64 | 22 | |
28 | * @ap: The 2-bit simple AP (AP[2:1]) | 23 | /* Perform gross MTE suppression early. */ |
29 | - * @ns: NS (non-secure) bit | 24 | - if (!tbi_check(desc, bit55) || |
30 | * @xn: XN (execute-never) bit | 25 | - tcma_check(desc, bit55, allocation_tag_from_addr(addr))) { |
31 | * @pxn: PXN (privileged execute-never) bit | 26 | + if (!tbi_check(mtedesc, bit55) || |
32 | + * @in_pa: The original input pa space | 27 | + tcma_check(mtedesc, bit55, allocation_tag_from_addr(addr))) { |
33 | + * @out_pa: The output pa space, modified by NSTable, NS, and NSE | 28 | mtedesc = 0; |
34 | */ | ||
35 | static int get_S1prot(CPUARMState *env, ARMMMUIdx mmu_idx, bool is_aa64, | ||
36 | - int ap, int ns, int xn, int pxn) | ||
37 | + int ap, int xn, int pxn, | ||
38 | + ARMSecuritySpace in_pa, ARMSecuritySpace out_pa) | ||
39 | { | ||
40 | ARMCPU *cpu = env_archcpu(env); | ||
41 | bool is_user = regime_is_user(env, mmu_idx); | ||
42 | @@ -XXX,XX +XXX,XX @@ static int get_S1prot(CPUARMState *env, ARMMMUIdx mmu_idx, bool is_aa64, | ||
43 | } | ||
44 | } | 29 | } |
45 | 30 | ||
46 | - if (ns && arm_is_secure(env) && (env->cp15.scr_el3 & SCR_SIF)) { | 31 | @@ -XXX,XX +XXX,XX @@ void sme_st1_mte(CPUARMState *env, void *za, uint64_t *vg, target_ulong addr, |
47 | + if (out_pa == ARMSS_NonSecure && in_pa == ARMSS_Secure && | 32 | desc = extract32(desc, 0, SIMD_DATA_SHIFT + SVE_MTEDESC_SHIFT); |
48 | + (env->cp15.scr_el3 & SCR_SIF)) { | 33 | |
49 | return prot_rw; | 34 | /* Perform gross MTE suppression early. */ |
35 | - if (!tbi_check(desc, bit55) || | ||
36 | - tcma_check(desc, bit55, allocation_tag_from_addr(addr))) { | ||
37 | + if (!tbi_check(mtedesc, bit55) || | ||
38 | + tcma_check(mtedesc, bit55, allocation_tag_from_addr(addr))) { | ||
39 | mtedesc = 0; | ||
50 | } | 40 | } |
51 | 41 | ||
52 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw, | 42 | diff --git a/target/arm/tcg/sve_helper.c b/target/arm/tcg/sve_helper.c |
53 | int32_t stride; | 43 | index XXXXXXX..XXXXXXX 100644 |
54 | int addrsize, inputsize, outputsize; | 44 | --- a/target/arm/tcg/sve_helper.c |
55 | uint64_t tcr = regime_tcr(env, mmu_idx); | 45 | +++ b/target/arm/tcg/sve_helper.c |
56 | - int ap, ns, xn, pxn; | 46 | @@ -XXX,XX +XXX,XX @@ void sve_ldN_r_mte(CPUARMState *env, uint64_t *vg, target_ulong addr, |
57 | + int ap, xn, pxn; | 47 | desc = extract32(desc, 0, SIMD_DATA_SHIFT + SVE_MTEDESC_SHIFT); |
58 | uint32_t el = regime_el(env, mmu_idx); | 48 | |
59 | uint64_t descaddrmask; | 49 | /* Perform gross MTE suppression early. */ |
60 | bool aarch64 = arm_el_is_aa64(env, el); | 50 | - if (!tbi_check(desc, bit55) || |
61 | uint64_t descriptor, new_descriptor; | 51 | - tcma_check(desc, bit55, allocation_tag_from_addr(addr))) { |
62 | + ARMSecuritySpace out_space; | 52 | + if (!tbi_check(mtedesc, bit55) || |
63 | 53 | + tcma_check(mtedesc, bit55, allocation_tag_from_addr(addr))) { | |
64 | /* TODO: This code does not support shareability levels. */ | 54 | mtedesc = 0; |
65 | if (aarch64) { | ||
66 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw, | ||
67 | } | 55 | } |
68 | 56 | ||
69 | ap = extract32(attrs, 6, 2); | 57 | @@ -XXX,XX +XXX,XX @@ void sve_ldnfff1_r_mte(CPUARMState *env, void *vg, target_ulong addr, |
70 | + out_space = ptw->in_space; | 58 | desc = extract32(desc, 0, SIMD_DATA_SHIFT + SVE_MTEDESC_SHIFT); |
71 | if (regime_is_stage2(mmu_idx)) { | 59 | |
72 | - ns = mmu_idx == ARMMMUIdx_Stage2; | 60 | /* Perform gross MTE suppression early. */ |
73 | + /* | 61 | - if (!tbi_check(desc, bit55) || |
74 | + * R_GYNXY: For stage2 in Realm security state, bit 55 is NS. | 62 | - tcma_check(desc, bit55, allocation_tag_from_addr(addr))) { |
75 | + * The bit remains ignored for other security states. | 63 | + if (!tbi_check(mtedesc, bit55) || |
76 | + */ | 64 | + tcma_check(mtedesc, bit55, allocation_tag_from_addr(addr))) { |
77 | + if (out_space == ARMSS_Realm && extract64(attrs, 55, 1)) { | 65 | mtedesc = 0; |
78 | + out_space = ARMSS_NonSecure; | ||
79 | + } | ||
80 | xn = extract64(attrs, 53, 2); | ||
81 | result->f.prot = get_S2prot(env, ap, xn, s1_is_el0); | ||
82 | } else { | ||
83 | - ns = extract32(attrs, 5, 1); | ||
84 | + int nse, ns = extract32(attrs, 5, 1); | ||
85 | + switch (out_space) { | ||
86 | + case ARMSS_Root: | ||
87 | + /* | ||
88 | + * R_GVZML: Bit 11 becomes the NSE field in the EL3 regime. | ||
89 | + * R_XTYPW: NSE and NS together select the output pa space. | ||
90 | + */ | ||
91 | + nse = extract32(attrs, 11, 1); | ||
92 | + out_space = (nse << 1) | ns; | ||
93 | + if (out_space == ARMSS_Secure && | ||
94 | + !cpu_isar_feature(aa64_sel2, cpu)) { | ||
95 | + out_space = ARMSS_NonSecure; | ||
96 | + } | ||
97 | + break; | ||
98 | + case ARMSS_Secure: | ||
99 | + if (ns) { | ||
100 | + out_space = ARMSS_NonSecure; | ||
101 | + } | ||
102 | + break; | ||
103 | + case ARMSS_Realm: | ||
104 | + switch (mmu_idx) { | ||
105 | + case ARMMMUIdx_Stage1_E0: | ||
106 | + case ARMMMUIdx_Stage1_E1: | ||
107 | + case ARMMMUIdx_Stage1_E1_PAN: | ||
108 | + /* I_CZPRF: For Realm EL1&0 stage1, NS bit is RES0. */ | ||
109 | + break; | ||
110 | + case ARMMMUIdx_E2: | ||
111 | + case ARMMMUIdx_E20_0: | ||
112 | + case ARMMMUIdx_E20_2: | ||
113 | + case ARMMMUIdx_E20_2_PAN: | ||
114 | + /* | ||
115 | + * R_LYKFZ, R_WGRZN: For Realm EL2 and EL2&1, | ||
116 | + * NS changes the output to non-secure space. | ||
117 | + */ | ||
118 | + if (ns) { | ||
119 | + out_space = ARMSS_NonSecure; | ||
120 | + } | ||
121 | + break; | ||
122 | + default: | ||
123 | + g_assert_not_reached(); | ||
124 | + } | ||
125 | + break; | ||
126 | + case ARMSS_NonSecure: | ||
127 | + /* R_QRMFF: For NonSecure state, the NS bit is RES0. */ | ||
128 | + break; | ||
129 | + default: | ||
130 | + g_assert_not_reached(); | ||
131 | + } | ||
132 | xn = extract64(attrs, 54, 1); | ||
133 | pxn = extract64(attrs, 53, 1); | ||
134 | - result->f.prot = get_S1prot(env, mmu_idx, aarch64, ap, ns, xn, pxn); | ||
135 | + | ||
136 | + /* | ||
137 | + * Note that we modified ptw->in_space earlier for NSTable, but | ||
138 | + * result->f.attrs retains a copy of the original security space. | ||
139 | + */ | ||
140 | + result->f.prot = get_S1prot(env, mmu_idx, aarch64, ap, xn, pxn, | ||
141 | + result->f.attrs.space, out_space); | ||
142 | } | 66 | } |
143 | 67 | ||
144 | if (!(result->f.prot & (1 << access_type))) { | 68 | @@ -XXX,XX +XXX,XX @@ void sve_stN_r_mte(CPUARMState *env, uint64_t *vg, target_ulong addr, |
145 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw, | 69 | desc = extract32(desc, 0, SIMD_DATA_SHIFT + SVE_MTEDESC_SHIFT); |
146 | } | 70 | |
71 | /* Perform gross MTE suppression early. */ | ||
72 | - if (!tbi_check(desc, bit55) || | ||
73 | - tcma_check(desc, bit55, allocation_tag_from_addr(addr))) { | ||
74 | + if (!tbi_check(mtedesc, bit55) || | ||
75 | + tcma_check(mtedesc, bit55, allocation_tag_from_addr(addr))) { | ||
76 | mtedesc = 0; | ||
147 | } | 77 | } |
148 | 78 | ||
149 | - if (ns) { | ||
150 | - /* | ||
151 | - * The NS bit will (as required by the architecture) have no effect if | ||
152 | - * the CPU doesn't support TZ or this is a non-secure translation | ||
153 | - * regime, because the attribute will already be non-secure. | ||
154 | - */ | ||
155 | - result->f.attrs.secure = false; | ||
156 | - result->f.attrs.space = ARMSS_NonSecure; | ||
157 | - } | ||
158 | + result->f.attrs.space = out_space; | ||
159 | + result->f.attrs.secure = arm_space_is_secure(out_space); | ||
160 | |||
161 | if (regime_is_stage2(mmu_idx)) { | ||
162 | result->cacheattrs.is_s2_format = true; | ||
163 | -- | 79 | -- |
164 | 2.34.1 | 80 | 2.34.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | The raven_io_ops MemoryRegionOps is the only one in the source tree | ||
2 | which sets .valid.unaligned to indicate that it should support | ||
3 | unaligned accesses and which does not also set .impl.unaligned to | ||
4 | indicate that its read and write functions can do the unaligned | ||
5 | handling themselves. This is a problem, because at the moment the | ||
6 | core memory system does not implement the support for handling | ||
7 | unaligned accesses by doing a series of aligned accesses and | ||
8 | combining them (system/memory.c:access_with_adjusted_size() has a | ||
9 | TODO comment noting this). | ||
1 | 10 | ||
11 | Fortunately raven_io_read() and raven_io_write() will correctly deal | ||
12 | with the case of being passed an unaligned address, so we can fix the | ||
13 | missing unaligned access support by setting .impl.unaligned in the | ||
14 | MemoryRegionOps struct. | ||
15 | |||
16 | Fixes: 9a1839164c9c8f06 ("raven: Implement non-contiguous I/O region") | ||
17 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
18 | Tested-by: Cédric Le Goater <clg@redhat.com> | ||
19 | Reviewed-by: Cédric Le Goater <clg@redhat.com> | ||
20 | Message-id: 20240112134640.1775041-1-peter.maydell@linaro.org | ||
21 | --- | ||
22 | hw/pci-host/raven.c | 1 + | ||
23 | 1 file changed, 1 insertion(+) | ||
24 | |||
25 | diff --git a/hw/pci-host/raven.c b/hw/pci-host/raven.c | ||
26 | index XXXXXXX..XXXXXXX 100644 | ||
27 | --- a/hw/pci-host/raven.c | ||
28 | +++ b/hw/pci-host/raven.c | ||
29 | @@ -XXX,XX +XXX,XX @@ static const MemoryRegionOps raven_io_ops = { | ||
30 | .write = raven_io_write, | ||
31 | .endianness = DEVICE_LITTLE_ENDIAN, | ||
32 | .impl.max_access_size = 4, | ||
33 | + .impl.unaligned = true, | ||
34 | .valid.unaligned = true, | ||
35 | }; | ||
36 | |||
37 | -- | ||
38 | 2.34.1 | ||
39 | |||
40 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | Suppress the deprecation warning when we're running under qtest, | ||
2 | to avoid "make check" including warning messages in its output. | ||
1 | 3 | ||
4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
5 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> | ||
6 | Message-id: 20240206154151.155620-1-peter.maydell@linaro.org | ||
7 | --- | ||
8 | hw/block/tc58128.c | 4 +++- | ||
9 | 1 file changed, 3 insertions(+), 1 deletion(-) | ||
10 | |||
11 | diff --git a/hw/block/tc58128.c b/hw/block/tc58128.c | ||
12 | index XXXXXXX..XXXXXXX 100644 | ||
13 | --- a/hw/block/tc58128.c | ||
14 | +++ b/hw/block/tc58128.c | ||
15 | @@ -XXX,XX +XXX,XX @@ static sh7750_io_device tc58128 = { | ||
16 | |||
17 | int tc58128_init(struct SH7750State *s, const char *zone1, const char *zone2) | ||
18 | { | ||
19 | - warn_report_once("The TC58128 flash device is deprecated"); | ||
20 | + if (!qtest_enabled()) { | ||
21 | + warn_report_once("The TC58128 flash device is deprecated"); | ||
22 | + } | ||
23 | init_dev(&tc58128_devs[0], zone1); | ||
24 | init_dev(&tc58128_devs[1], zone2); | ||
25 | return sh7750_register_io_device(s, &tc58128); | ||
26 | -- | ||
27 | 2.34.1 | ||
28 | |||
29 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | We deliberately don't include qtests_npcm7xx in qtests_aarch64, | ||
2 | because we already get the coverage of those tests via qtests_arm, | ||
3 | and we don't want to use extra CI minutes testing them twice. | ||
1 | 4 | ||
5 | In commit 327b680877b79c4b we added it to qtests_aarch64; revert | ||
6 | that change. | ||
7 | |||
8 | Fixes: 327b680877b79c4b ("tests/qtest: Creating qtest for GMAC Module") | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> | ||
11 | Message-id: 20240206163043.315535-1-peter.maydell@linaro.org | ||
12 | --- | ||
13 | tests/qtest/meson.build | 1 - | ||
14 | 1 file changed, 1 deletion(-) | ||
15 | |||
16 | diff --git a/tests/qtest/meson.build b/tests/qtest/meson.build | ||
17 | index XXXXXXX..XXXXXXX 100644 | ||
18 | --- a/tests/qtest/meson.build | ||
19 | +++ b/tests/qtest/meson.build | ||
20 | @@ -XXX,XX +XXX,XX @@ qtests_aarch64 = \ | ||
21 | (config_all_devices.has_key('CONFIG_RASPI') ? ['bcm2835-dma-test'] : []) + \ | ||
22 | (config_all_accel.has_key('CONFIG_TCG') and \ | ||
23 | config_all_devices.has_key('CONFIG_TPM_TIS_I2C') ? ['tpm-tis-i2c-test'] : []) + \ | ||
24 | - (config_all_devices.has_key('CONFIG_NPCM7XX') ? qtests_npcm7xx : []) + \ | ||
25 | ['arm-cpu-features', | ||
26 | 'numa-test', | ||
27 | 'boot-serial-test', | ||
28 | -- | ||
29 | 2.34.1 | ||
30 | |||
31 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | Allow changes to the virt GTDT -- we are going to add the IRQ | ||
2 | entry for a new timer to it. | ||
1 | 3 | ||
4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
5 | Reviewed-by: Ard Biesheuvel <ardb@kernel.org> | ||
6 | Message-id: 20240122143537.233498-2-peter.maydell@linaro.org | ||
7 | --- | ||
8 | tests/qtest/bios-tables-test-allowed-diff.h | 2 ++ | ||
9 | 1 file changed, 2 insertions(+) | ||
10 | |||
11 | diff --git a/tests/qtest/bios-tables-test-allowed-diff.h b/tests/qtest/bios-tables-test-allowed-diff.h | ||
12 | index XXXXXXX..XXXXXXX 100644 | ||
13 | --- a/tests/qtest/bios-tables-test-allowed-diff.h | ||
14 | +++ b/tests/qtest/bios-tables-test-allowed-diff.h | ||
15 | @@ -1 +1,3 @@ | ||
16 | /* List of comma-separated changed AML files to ignore */ | ||
17 | +"tests/data/acpi/virt/FACP", | ||
18 | +"tests/data/acpi/virt/GTDT", | ||
19 | -- | ||
20 | 2.34.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | 1 | Armv8.1+ CPUs have the Virtual Host Extension (VHE) which adds a | |
2 | non-secure EL2 virtual timer. We implemented the timer itself in the | ||
3 | CPU model, but never wired up its IRQ line to the GIC. | ||
4 | |||
5 | Wire up the IRQ line (this is always safe whether the CPU has the | ||
6 | interrupt or not, since it always creates the outbound IRQ line). | ||
7 | Report it to the guest via dtb and ACPI if the CPU has the feature. | ||
8 | |||
9 | The DTB binding is documented in the kernel's | ||
10 | Documentation/devicetree/bindings/timer/arm\,arch_timer.yaml | ||
11 | and the ACPI table entries are documented in the ACPI specification | ||
12 | version 6.3 or later. | ||
13 | |||
14 | Because the IRQ line ACPI binding is new in 6.3, we need to bump the | ||
15 | FADT table rev to show that we might be using 6.3 features. | ||
16 | |||
17 | Note that exposing this IRQ in the DTB will trigger a bug in EDK2 | ||
18 | versions prior to edk2-stable202311, for users who use the virt board | ||
19 | with 'virtualization=on' to enable EL2 emulation and are booting an | ||
20 | EDK2 guest BIOS, if that EDK2 has assertions enabled. The effect is | ||
21 | that EDK2 will assert on bootup: | ||
22 | |||
23 | ASSERT [ArmTimerDxe] /home/kraxel/projects/qemu/roms/edk2/ArmVirtPkg/Library/ArmVirtTimerFdtClientLib/ArmVirtTimerFdtClientLib.c(72): PropSize == 36 || PropSize == 48 | ||
24 | |||
25 | If you see that assertion you should do one of: | ||
26 | * update your EDK2 binaries to edk2-stable202311 or newer | ||
27 | * use the 'virt-8.2' versioned machine type | ||
28 | * not use 'virtualization=on' | ||
29 | |||
30 | (The versions shipped with QEMU itself have the fix.) | ||
31 | |||
32 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
33 | Reviewed-by: Ard Biesheuvel <ardb@kernel.org> | ||
34 | Message-id: 20240122143537.233498-3-peter.maydell@linaro.org | ||
35 | --- | ||
36 | include/hw/arm/virt.h | 2 ++ | ||
37 | hw/arm/virt-acpi-build.c | 20 ++++++++++---- | ||
38 | hw/arm/virt.c | 60 ++++++++++++++++++++++++++++++++++------ | ||
39 | 3 files changed, 67 insertions(+), 15 deletions(-) | ||
40 | |||
41 | diff --git a/include/hw/arm/virt.h b/include/hw/arm/virt.h | ||
42 | index XXXXXXX..XXXXXXX 100644 | ||
43 | --- a/include/hw/arm/virt.h | ||
44 | +++ b/include/hw/arm/virt.h | ||
45 | @@ -XXX,XX +XXX,XX @@ struct VirtMachineClass { | ||
46 | /* Machines < 6.2 have no support for describing cpu topology to guest */ | ||
47 | bool no_cpu_topology; | ||
48 | bool no_tcg_lpa2; | ||
49 | + bool no_ns_el2_virt_timer_irq; | ||
50 | }; | ||
51 | |||
52 | struct VirtMachineState { | ||
53 | @@ -XXX,XX +XXX,XX @@ struct VirtMachineState { | ||
54 | PCIBus *bus; | ||
55 | char *oem_id; | ||
56 | char *oem_table_id; | ||
57 | + bool ns_el2_virt_timer_irq; | ||
58 | }; | ||
59 | |||
60 | #define VIRT_ECAM_ID(high) (high ? VIRT_HIGH_PCIE_ECAM : VIRT_PCIE_ECAM) | ||
61 | diff --git a/hw/arm/virt-acpi-build.c b/hw/arm/virt-acpi-build.c | ||
62 | index XXXXXXX..XXXXXXX 100644 | ||
63 | --- a/hw/arm/virt-acpi-build.c | ||
64 | +++ b/hw/arm/virt-acpi-build.c | ||
65 | @@ -XXX,XX +XXX,XX @@ build_srat(GArray *table_data, BIOSLinker *linker, VirtMachineState *vms) | ||
66 | } | ||
67 | |||
68 | /* | ||
69 | - * ACPI spec, Revision 5.1 | ||
70 | - * 5.2.24 Generic Timer Description Table (GTDT) | ||
71 | + * ACPI spec, Revision 6.5 | ||
72 | + * 5.2.25 Generic Timer Description Table (GTDT) | ||
73 | */ | ||
74 | static void | ||
75 | build_gtdt(GArray *table_data, BIOSLinker *linker, VirtMachineState *vms) | ||
76 | @@ -XXX,XX +XXX,XX @@ build_gtdt(GArray *table_data, BIOSLinker *linker, VirtMachineState *vms) | ||
77 | uint32_t irqflags = vmc->claim_edge_triggered_timers ? | ||
78 | 1 : /* Interrupt is Edge triggered */ | ||
79 | 0; /* Interrupt is Level triggered */ | ||
80 | - AcpiTable table = { .sig = "GTDT", .rev = 2, .oem_id = vms->oem_id, | ||
81 | + AcpiTable table = { .sig = "GTDT", .rev = 3, .oem_id = vms->oem_id, | ||
82 | .oem_table_id = vms->oem_table_id }; | ||
83 | |||
84 | acpi_table_begin(&table, table_data); | ||
85 | @@ -XXX,XX +XXX,XX @@ build_gtdt(GArray *table_data, BIOSLinker *linker, VirtMachineState *vms) | ||
86 | build_append_int_noprefix(table_data, 0, 4); | ||
87 | /* Platform Timer Offset */ | ||
88 | build_append_int_noprefix(table_data, 0, 4); | ||
89 | - | ||
90 | + if (vms->ns_el2_virt_timer_irq) { | ||
91 | + /* Virtual EL2 Timer GSIV */ | ||
92 | + build_append_int_noprefix(table_data, ARCH_TIMER_NS_EL2_VIRT_IRQ, 4); | ||
93 | + /* Virtual EL2 Timer Flags */ | ||
94 | + build_append_int_noprefix(table_data, irqflags, 4); | ||
95 | + } else { | ||
96 | + build_append_int_noprefix(table_data, 0, 4); | ||
97 | + build_append_int_noprefix(table_data, 0, 4); | ||
98 | + } | ||
99 | acpi_table_end(linker, &table); | ||
100 | } | ||
101 | |||
102 | @@ -XXX,XX +XXX,XX @@ build_madt(GArray *table_data, BIOSLinker *linker, VirtMachineState *vms) | ||
103 | static void build_fadt_rev6(GArray *table_data, BIOSLinker *linker, | ||
104 | VirtMachineState *vms, unsigned dsdt_tbl_offset) | ||
105 | { | ||
106 | - /* ACPI v6.0 */ | ||
107 | + /* ACPI v6.3 */ | ||
108 | AcpiFadtData fadt = { | ||
109 | .rev = 6, | ||
110 | - .minor_ver = 0, | ||
111 | + .minor_ver = 3, | ||
112 | .flags = 1 << ACPI_FADT_F_HW_REDUCED_ACPI, | ||
113 | .xdsdt_tbl_offset = &dsdt_tbl_offset, | ||
114 | }; | ||
115 | diff --git a/hw/arm/virt.c b/hw/arm/virt.c | ||
116 | index XXXXXXX..XXXXXXX 100644 | ||
117 | --- a/hw/arm/virt.c | ||
118 | +++ b/hw/arm/virt.c | ||
119 | @@ -XXX,XX +XXX,XX @@ static void create_randomness(MachineState *ms, const char *node) | ||
120 | qemu_fdt_setprop(ms->fdt, node, "rng-seed", seed.rng, sizeof(seed.rng)); | ||
121 | } | ||
122 | |||
123 | +/* | ||
124 | + * The CPU object always exposes the NS EL2 virt timer IRQ line, | ||
125 | + * but we don't want to advertise it to the guest in the dtb or ACPI | ||
126 | + * table unless it's really going to do something. | ||
127 | + */ | ||
128 | +static bool ns_el2_virt_timer_present(void) | ||
129 | +{ | ||
130 | + ARMCPU *cpu = ARM_CPU(qemu_get_cpu(0)); | ||
131 | + CPUARMState *env = &cpu->env; | ||
132 | + | ||
133 | + return arm_feature(env, ARM_FEATURE_AARCH64) && | ||
134 | + arm_feature(env, ARM_FEATURE_EL2) && cpu_isar_feature(aa64_vh, cpu); | ||
135 | +} | ||
136 | + | ||
137 | static void create_fdt(VirtMachineState *vms) | ||
138 | { | ||
139 | MachineState *ms = MACHINE(vms); | ||
140 | @@ -XXX,XX +XXX,XX @@ static void fdt_add_timer_nodes(const VirtMachineState *vms) | ||
141 | "arm,armv7-timer"); | ||
142 | } | ||
143 | qemu_fdt_setprop(ms->fdt, "/timer", "always-on", NULL, 0); | ||
144 | - qemu_fdt_setprop_cells(ms->fdt, "/timer", "interrupts", | ||
145 | - GIC_FDT_IRQ_TYPE_PPI, | ||
146 | - INTID_TO_PPI(ARCH_TIMER_S_EL1_IRQ), irqflags, | ||
147 | - GIC_FDT_IRQ_TYPE_PPI, | ||
148 | - INTID_TO_PPI(ARCH_TIMER_NS_EL1_IRQ), irqflags, | ||
149 | - GIC_FDT_IRQ_TYPE_PPI, | ||
150 | - INTID_TO_PPI(ARCH_TIMER_VIRT_IRQ), irqflags, | ||
151 | - GIC_FDT_IRQ_TYPE_PPI, | ||
152 | - INTID_TO_PPI(ARCH_TIMER_NS_EL2_IRQ), irqflags); | ||
153 | + if (vms->ns_el2_virt_timer_irq) { | ||
154 | + qemu_fdt_setprop_cells(ms->fdt, "/timer", "interrupts", | ||
155 | + GIC_FDT_IRQ_TYPE_PPI, | ||
156 | + INTID_TO_PPI(ARCH_TIMER_S_EL1_IRQ), irqflags, | ||
157 | + GIC_FDT_IRQ_TYPE_PPI, | ||
158 | + INTID_TO_PPI(ARCH_TIMER_NS_EL1_IRQ), irqflags, | ||
159 | + GIC_FDT_IRQ_TYPE_PPI, | ||
160 | + INTID_TO_PPI(ARCH_TIMER_VIRT_IRQ), irqflags, | ||
161 | + GIC_FDT_IRQ_TYPE_PPI, | ||
162 | + INTID_TO_PPI(ARCH_TIMER_NS_EL2_IRQ), irqflags, | ||
163 | + GIC_FDT_IRQ_TYPE_PPI, | ||
164 | + INTID_TO_PPI(ARCH_TIMER_NS_EL2_VIRT_IRQ), irqflags); | ||
165 | + } else { | ||
166 | + qemu_fdt_setprop_cells(ms->fdt, "/timer", "interrupts", | ||
167 | + GIC_FDT_IRQ_TYPE_PPI, | ||
168 | + INTID_TO_PPI(ARCH_TIMER_S_EL1_IRQ), irqflags, | ||
169 | + GIC_FDT_IRQ_TYPE_PPI, | ||
170 | + INTID_TO_PPI(ARCH_TIMER_NS_EL1_IRQ), irqflags, | ||
171 | + GIC_FDT_IRQ_TYPE_PPI, | ||
172 | + INTID_TO_PPI(ARCH_TIMER_VIRT_IRQ), irqflags, | ||
173 | + GIC_FDT_IRQ_TYPE_PPI, | ||
174 | + INTID_TO_PPI(ARCH_TIMER_NS_EL2_IRQ), irqflags); | ||
175 | + } | ||
176 | } | ||
177 | |||
178 | static void fdt_add_cpu_nodes(const VirtMachineState *vms) | ||
179 | @@ -XXX,XX +XXX,XX @@ static void create_gic(VirtMachineState *vms, MemoryRegion *mem) | ||
180 | [GTIMER_VIRT] = ARCH_TIMER_VIRT_IRQ, | ||
181 | [GTIMER_HYP] = ARCH_TIMER_NS_EL2_IRQ, | ||
182 | [GTIMER_SEC] = ARCH_TIMER_S_EL1_IRQ, | ||
183 | + [GTIMER_HYPVIRT] = ARCH_TIMER_NS_EL2_VIRT_IRQ, | ||
184 | }; | ||
185 | |||
186 | for (unsigned irq = 0; irq < ARRAY_SIZE(timer_irq); irq++) { | ||
187 | @@ -XXX,XX +XXX,XX @@ static void machvirt_init(MachineState *machine) | ||
188 | qdev_realize(DEVICE(cpuobj), NULL, &error_fatal); | ||
189 | object_unref(cpuobj); | ||
190 | } | ||
191 | + | ||
192 | + /* Now we've created the CPUs we can see if they have the hypvirt timer */ | ||
193 | + vms->ns_el2_virt_timer_irq = ns_el2_virt_timer_present() && | ||
194 | + !vmc->no_ns_el2_virt_timer_irq; | ||
195 | + | ||
196 | fdt_add_timer_nodes(vms); | ||
197 | fdt_add_cpu_nodes(vms); | ||
198 | |||
199 | @@ -XXX,XX +XXX,XX @@ DEFINE_VIRT_MACHINE_AS_LATEST(9, 0) | ||
200 | |||
201 | static void virt_machine_8_2_options(MachineClass *mc) | ||
202 | { | ||
203 | + VirtMachineClass *vmc = VIRT_MACHINE_CLASS(OBJECT_CLASS(mc)); | ||
204 | + | ||
205 | virt_machine_9_0_options(mc); | ||
206 | compat_props_add(mc->compat_props, hw_compat_8_2, hw_compat_8_2_len); | ||
207 | + /* | ||
208 | + * Don't expose NS_EL2_VIRT timer IRQ in DTB on ACPI on 8.2 and | ||
209 | + * earlier machines. (Exposing it tickles a bug in older EDK2 | ||
210 | + * guest BIOS binaries.) | ||
211 | + */ | ||
212 | + vmc->no_ns_el2_virt_timer_irq = true; | ||
213 | } | ||
214 | DEFINE_VIRT_MACHINE(8, 2) | ||
215 | |||
216 | -- | ||
217 | 2.34.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | 1 | Update the virt golden reference files to say that the FACP is ACPI | |
2 | v6.3, and the GTDT table is a revision 3 table with space for the | ||
3 | virtual EL2 timer. | ||
4 | |||
5 | Diffs from iasl: | ||
6 | |||
7 | @@ -XXX,XX +XXX,XX @@ | ||
8 | /* | ||
9 | * Intel ACPI Component Architecture | ||
10 | * AML/ASL+ Disassembler version 20200925 (64-bit version) | ||
11 | * Copyright (c) 2000 - 2020 Intel Corporation | ||
12 | * | ||
13 | - * Disassembly of tests/data/acpi/virt/FACP, Mon Jan 22 13:48:40 2024 | ||
14 | + * Disassembly of /tmp/aml-W8RZH2, Mon Jan 22 13:48:40 2024 | ||
15 | * | ||
16 | * ACPI Data Table [FACP] | ||
17 | * | ||
18 | * Format: [HexOffset DecimalOffset ByteLength] FieldName : FieldValue | ||
19 | */ | ||
20 | |||
21 | [000h 0000 4] Signature : "FACP" [Fixed ACPI Description Table (FADT)] | ||
22 | [004h 0004 4] Table Length : 00000114 | ||
23 | [008h 0008 1] Revision : 06 | ||
24 | -[009h 0009 1] Checksum : 15 | ||
25 | +[009h 0009 1] Checksum : 12 | ||
26 | [00Ah 0010 6] Oem ID : "BOCHS " | ||
27 | [010h 0016 8] Oem Table ID : "BXPC " | ||
28 | [018h 0024 4] Oem Revision : 00000001 | ||
29 | [01Ch 0028 4] Asl Compiler ID : "BXPC" | ||
30 | [020h 0032 4] Asl Compiler Revision : 00000001 | ||
31 | |||
32 | [024h 0036 4] FACS Address : 00000000 | ||
33 | [028h 0040 4] DSDT Address : 00000000 | ||
34 | [02Ch 0044 1] Model : 00 | ||
35 | [02Dh 0045 1] PM Profile : 00 [Unspecified] | ||
36 | [02Eh 0046 2] SCI Interrupt : 0000 | ||
37 | [030h 0048 4] SMI Command Port : 00000000 | ||
38 | [034h 0052 1] ACPI Enable Value : 00 | ||
39 | [035h 0053 1] ACPI Disable Value : 00 | ||
40 | [036h 0054 1] S4BIOS Command : 00 | ||
41 | [037h 0055 1] P-State Control : 00 | ||
42 | @@ -XXX,XX +XXX,XX @@ | ||
43 | Use APIC Physical Destination Mode (V4) : 0 | ||
44 | Hardware Reduced (V5) : 1 | ||
45 | Low Power S0 Idle (V5) : 0 | ||
46 | |||
47 | [074h 0116 12] Reset Register : [Generic Address Structure] | ||
48 | [074h 0116 1] Space ID : 00 [SystemMemory] | ||
49 | [075h 0117 1] Bit Width : 00 | ||
50 | [076h 0118 1] Bit Offset : 00 | ||
51 | [077h 0119 1] Encoded Access Width : 00 [Undefined/Legacy] | ||
52 | [078h 0120 8] Address : 0000000000000000 | ||
53 | |||
54 | [080h 0128 1] Value to cause reset : 00 | ||
55 | [081h 0129 2] ARM Flags (decoded below) : 0003 | ||
56 | PSCI Compliant : 1 | ||
57 | Must use HVC for PSCI : 1 | ||
58 | |||
59 | -[083h 0131 1] FADT Minor Revision : 00 | ||
60 | +[083h 0131 1] FADT Minor Revision : 03 | ||
61 | [084h 0132 8] FACS Address : 0000000000000000 | ||
62 | [08Ch 0140 8] DSDT Address : 0000000000000000 | ||
63 | [094h 0148 12] PM1A Event Block : [Generic Address Structure] | ||
64 | [094h 0148 1] Space ID : 00 [SystemMemory] | ||
65 | [095h 0149 1] Bit Width : 00 | ||
66 | [096h 0150 1] Bit Offset : 00 | ||
67 | [097h 0151 1] Encoded Access Width : 00 [Undefined/Legacy] | ||
68 | [098h 0152 8] Address : 0000000000000000 | ||
69 | |||
70 | [0A0h 0160 12] PM1B Event Block : [Generic Address Structure] | ||
71 | [0A0h 0160 1] Space ID : 00 [SystemMemory] | ||
72 | [0A1h 0161 1] Bit Width : 00 | ||
73 | [0A2h 0162 1] Bit Offset : 00 | ||
74 | [0A3h 0163 1] Encoded Access Width : 00 [Undefined/Legacy] | ||
75 | [0A4h 0164 8] Address : 0000000000000000 | ||
76 | |||
77 | @@ -XXX,XX +XXX,XX @@ | ||
78 | [0F5h 0245 1] Bit Width : 00 | ||
79 | [0F6h 0246 1] Bit Offset : 00 | ||
80 | [0F7h 0247 1] Encoded Access Width : 00 [Undefined/Legacy] | ||
81 | [0F8h 0248 8] Address : 0000000000000000 | ||
82 | |||
83 | [100h 0256 12] Sleep Status Register : [Generic Address Structure] | ||
84 | [100h 0256 1] Space ID : 00 [SystemMemory] | ||
85 | [101h 0257 1] Bit Width : 00 | ||
86 | [102h 0258 1] Bit Offset : 00 | ||
87 | [103h 0259 1] Encoded Access Width : 00 [Undefined/Legacy] | ||
88 | [104h 0260 8] Address : 0000000000000000 | ||
89 | |||
90 | [10Ch 0268 8] Hypervisor ID : 00000000554D4551 | ||
91 | |||
92 | Raw Table Data: Length 276 (0x114) | ||
93 | |||
94 | - 0000: 46 41 43 50 14 01 00 00 06 15 42 4F 43 48 53 20 // FACP......BOCHS | ||
95 | + 0000: 46 41 43 50 14 01 00 00 06 12 42 4F 43 48 53 20 // FACP......BOCHS | ||
96 | 0010: 42 58 50 43 20 20 20 20 01 00 00 00 42 58 50 43 // BXPC ....BXPC | ||
97 | 0020: 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // ................ | ||
98 | 0030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // ................ | ||
99 | 0040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // ................ | ||
100 | 0050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // ................ | ||
101 | 0060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // ................ | ||
102 | 0070: 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 // ................ | ||
103 | - 0080: 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // ................ | ||
104 | + 0080: 00 03 00 03 00 00 00 00 00 00 00 00 00 00 00 00 // ................ | ||
105 | 0090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // ................ | ||
106 | 00A0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // ................ | ||
107 | 00B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // ................ | ||
108 | 00C0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // ................ | ||
109 | 00D0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // ................ | ||
110 | 00E0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // ................ | ||
111 | 00F0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 // ................ | ||
112 | 0100: 00 00 00 00 00 00 00 00 00 00 00 00 51 45 4D 55 // ............QEMU | ||
113 | 0110: 00 00 00 00 // .... | ||
114 | |||
115 | @@ -XXX,XX +XXX,XX @@ | ||
116 | /* | ||
117 | * Intel ACPI Component Architecture | ||
118 | * AML/ASL+ Disassembler version 20200925 (64-bit version) | ||
119 | * Copyright (c) 2000 - 2020 Intel Corporation | ||
120 | * | ||
121 | - * Disassembly of tests/data/acpi/virt/GTDT, Mon Jan 22 13:48:40 2024 | ||
122 | + * Disassembly of /tmp/aml-XDSZH2, Mon Jan 22 13:48:40 2024 | ||
123 | * | ||
124 | * ACPI Data Table [GTDT] | ||
125 | * | ||
126 | * Format: [HexOffset DecimalOffset ByteLength] FieldName : FieldValue | ||
127 | */ | ||
128 | |||
129 | [000h 0000 4] Signature : "GTDT" [Generic Timer Description Table] | ||
130 | -[004h 0004 4] Table Length : 00000060 | ||
131 | -[008h 0008 1] Revision : 02 | ||
132 | -[009h 0009 1] Checksum : 9C | ||
133 | +[004h 0004 4] Table Length : 00000068 | ||
134 | +[008h 0008 1] Revision : 03 | ||
135 | +[009h 0009 1] Checksum : 93 | ||
136 | [00Ah 0010 6] Oem ID : "BOCHS " | ||
137 | [010h 0016 8] Oem Table ID : "BXPC " | ||
138 | [018h 0024 4] Oem Revision : 00000001 | ||
139 | [01Ch 0028 4] Asl Compiler ID : "BXPC" | ||
140 | [020h 0032 4] Asl Compiler Revision : 00000001 | ||
141 | |||
142 | [024h 0036 8] Counter Block Address : FFFFFFFFFFFFFFFF | ||
143 | [02Ch 0044 4] Reserved : 00000000 | ||
144 | |||
145 | [030h 0048 4] Secure EL1 Interrupt : 0000001D | ||
146 | [034h 0052 4] EL1 Flags (decoded below) : 00000000 | ||
147 | Trigger Mode : 0 | ||
148 | Polarity : 0 | ||
149 | Always On : 0 | ||
150 | |||
151 | [038h 0056 4] Non-Secure EL1 Interrupt : 0000001E | ||
152 | @@ -XXX,XX +XXX,XX @@ | ||
153 | |||
154 | [040h 0064 4] Virtual Timer Interrupt : 0000001B | ||
155 | [044h 0068 4] VT Flags (decoded below) : 00000000 | ||
156 | Trigger Mode : 0 | ||
157 | Polarity : 0 | ||
158 | Always On : 0 | ||
159 | |||
160 | [048h 0072 4] Non-Secure EL2 Interrupt : 0000001A | ||
161 | [04Ch 0076 4] NEL2 Flags (decoded below) : 00000000 | ||
162 | Trigger Mode : 0 | ||
163 | Polarity : 0 | ||
164 | Always On : 0 | ||
165 | [050h 0080 8] Counter Read Block Address : FFFFFFFFFFFFFFFF | ||
166 | |||
167 | [058h 0088 4] Platform Timer Count : 00000000 | ||
168 | [05Ch 0092 4] Platform Timer Offset : 00000000 | ||
169 | +[060h 0096 4] Virtual EL2 Timer GSIV : 00000000 | ||
170 | +[064h 0100 4] Virtual EL2 Timer Flags : 00000000 | ||
171 | |||
172 | -Raw Table Data: Length 96 (0x60) | ||
173 | +Raw Table Data: Length 104 (0x68) | ||
174 | |||
175 | - 0000: 47 54 44 54 60 00 00 00 02 9C 42 4F 43 48 53 20 // GTDT`.....BOCHS | ||
176 | + 0000: 47 54 44 54 68 00 00 00 03 93 42 4F 43 48 53 20 // GTDTh.....BOCHS | ||
177 | 0010: 42 58 50 43 20 20 20 20 01 00 00 00 42 58 50 43 // BXPC ....BXPC | ||
178 | 0020: 01 00 00 00 FF FF FF FF FF FF FF FF 00 00 00 00 // ................ | ||
179 | 0030: 1D 00 00 00 00 00 00 00 1E 00 00 00 04 00 00 00 // ................ | ||
180 | 0040: 1B 00 00 00 00 00 00 00 1A 00 00 00 00 00 00 00 // ................ | ||
181 | 0050: FF FF FF FF FF FF FF FF 00 00 00 00 00 00 00 00 // ................ | ||
182 | + 0060: 00 00 00 00 00 00 00 00 // ........ | ||
183 | |||
184 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
185 | Reviewed-by: Ard Biesheuvel <ardb@kernel.org> | ||
186 | Message-id: 20240122143537.233498-4-peter.maydell@linaro.org | ||
187 | --- | ||
188 | tests/qtest/bios-tables-test-allowed-diff.h | 2 -- | ||
189 | tests/data/acpi/virt/FACP | Bin 276 -> 276 bytes | ||
190 | tests/data/acpi/virt/GTDT | Bin 96 -> 104 bytes | ||
191 | 3 files changed, 2 deletions(-) | ||
192 | |||
193 | diff --git a/tests/qtest/bios-tables-test-allowed-diff.h b/tests/qtest/bios-tables-test-allowed-diff.h | ||
194 | index XXXXXXX..XXXXXXX 100644 | ||
195 | --- a/tests/qtest/bios-tables-test-allowed-diff.h | ||
196 | +++ b/tests/qtest/bios-tables-test-allowed-diff.h | ||
197 | @@ -1,3 +1 @@ | ||
198 | /* List of comma-separated changed AML files to ignore */ | ||
199 | -"tests/data/acpi/virt/FACP", | ||
200 | -"tests/data/acpi/virt/GTDT", | ||
201 | diff --git a/tests/data/acpi/virt/FACP b/tests/data/acpi/virt/FACP | ||
202 | index XXXXXXX..XXXXXXX 100644 | ||
203 | GIT binary patch | ||
204 | delta 25 | ||
205 | gcmbQjG=+)F&CxkPgpq-PO=u!l<;2F$$vli407<0<)c^nh | ||
206 | |||
207 | delta 28 | ||
208 | kcmbQjG=+)F&CxkPgpq-PO>`nx<-|!<6Akz$^DuG%0AAS!ssI20 | ||
209 | |||
210 | diff --git a/tests/data/acpi/virt/GTDT b/tests/data/acpi/virt/GTDT | ||
211 | index XXXXXXX..XXXXXXX 100644 | ||
212 | GIT binary patch | ||
213 | delta 25 | ||
214 | bcmYeu;BpUf3CUn!U|^m+kt>V?$N&QXMtB4L | ||
215 | |||
216 | delta 16 | ||
217 | Xcmc~u;BpUf2}xjJU|^avkt+-UB60)u | ||
218 | |||
219 | -- | ||
220 | 2.34.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | The patchset adding the GMAC ethernet to this SoC crossed in the | ||
2 | mail with the patchset cleaning up the NIC handling. When we | ||
3 | create the GMAC modules we must call qemu_configure_nic_device() | ||
4 | so that the user has the opportunity to use the -nic commandline | ||
5 | option to create a network backend and connect it to the GMACs. | ||
1 | 6 | ||
7 | Add the missing call. | ||
8 | |||
9 | Fixes: 21e5326a7c ("hw/arm: Add GMAC devices to NPCM7XX SoC") | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Reviewed-by: David Woodhouse <dwmw@amazon.co.uk> | ||
12 | Message-id: 20240206171231.396392-2-peter.maydell@linaro.org | ||
13 | --- | ||
14 | hw/arm/npcm7xx.c | 1 + | ||
15 | 1 file changed, 1 insertion(+) | ||
16 | |||
17 | diff --git a/hw/arm/npcm7xx.c b/hw/arm/npcm7xx.c | ||
18 | index XXXXXXX..XXXXXXX 100644 | ||
19 | --- a/hw/arm/npcm7xx.c | ||
20 | +++ b/hw/arm/npcm7xx.c | ||
21 | @@ -XXX,XX +XXX,XX @@ static void npcm7xx_realize(DeviceState *dev, Error **errp) | ||
22 | for (i = 0; i < ARRAY_SIZE(s->gmac); i++) { | ||
23 | SysBusDevice *sbd = SYS_BUS_DEVICE(&s->gmac[i]); | ||
24 | |||
25 | + qemu_configure_nic_device(DEVICE(sbd), false, NULL); | ||
26 | /* | ||
27 | * The device exists regardless of whether it's connected to a QEMU | ||
28 | * netdev backend. So always instantiate it even if there is no | ||
29 | -- | ||
30 | 2.34.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | Currently QEMU will warn if there is a NIC on the board that | ||
2 | is not connected to a backend. By default the '-nic user' will | ||
3 | get used for all NICs, but if you manually connect a specific | ||
4 | NIC to a specific backend, then the other NICs on the board | ||
5 | have no backend and will be warned about: | ||
1 | 6 | ||
7 | qemu-system-arm: warning: nic npcm7xx-emc.1 has no peer | ||
8 | qemu-system-arm: warning: nic npcm-gmac.0 has no peer | ||
9 | qemu-system-arm: warning: nic npcm-gmac.1 has no peer | ||
10 | |||
11 | So suppress those warnings by manually connecting every NIC | ||
12 | on the board to some backend. | ||
13 | |||
14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
15 | Reviewed-by: David Woodhouse <dwmw@amazon.co.uk> | ||
16 | Reviewed-by: Thomas Huth <thuth@redhat.com> | ||
17 | Message-id: 20240206171231.396392-3-peter.maydell@linaro.org | ||
18 | --- | ||
19 | tests/qtest/npcm7xx_emc-test.c | 5 ++++- | ||
20 | 1 file changed, 4 insertions(+), 1 deletion(-) | ||
21 | |||
22 | diff --git a/tests/qtest/npcm7xx_emc-test.c b/tests/qtest/npcm7xx_emc-test.c | ||
23 | index XXXXXXX..XXXXXXX 100644 | ||
24 | --- a/tests/qtest/npcm7xx_emc-test.c | ||
25 | +++ b/tests/qtest/npcm7xx_emc-test.c | ||
26 | @@ -XXX,XX +XXX,XX @@ static int *packet_test_init(int module_num, GString *cmd_line) | ||
27 | * KISS and use -nic. The driver accepts 'emc0' and 'emc1' as aliases | ||
28 | * in the 'model' field to specify the device to match. | ||
29 | */ | ||
30 | - g_string_append_printf(cmd_line, " -nic socket,fd=%d,model=emc%d ", | ||
31 | + g_string_append_printf(cmd_line, " -nic socket,fd=%d,model=emc%d " | ||
32 | + "-nic user,model=npcm7xx-emc " | ||
33 | + "-nic user,model=npcm-gmac " | ||
34 | + "-nic user,model=npcm-gmac", | ||
35 | test_sockets[1], module_num); | ||
36 | |||
37 | g_test_queue_destroy(packet_test_clear, test_sockets); | ||
38 | -- | ||
39 | 2.34.1 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | It doesn't make sense to read the value of MDCR_EL2 on a non-A-profile |
---|---|---|---|
2 | CPU, and in fact if you try to do it we will assert: | ||
2 | 3 | ||
3 | Define the missing SCR and HCR bits, allow SCR_NSE and {SCR,HCR}_GPF | 4 | #6 0x00007ffff4b95e96 in __GI___assert_fail |
4 | to be set, and invalidate TLBs when NSE changes. | 5 | (assertion=0x5555565a8c70 "!arm_feature(env, ARM_FEATURE_M)", file=0x5555565a6e5c "../../target/arm/helper.c", line=12600, function=0x5555565a9560 <__PRETTY_FUNCTION__.0> "arm_security_space_below_el3") at ./assert/assert.c:101 |
6 | #7 0x0000555555ebf412 in arm_security_space_below_el3 (env=0x555557bc8190) at ../../target/arm/helper.c:12600 | ||
7 | #8 0x0000555555ea6f89 in arm_is_el2_enabled (env=0x555557bc8190) at ../../target/arm/cpu.h:2595 | ||
8 | #9 0x0000555555ea942f in arm_mdcr_el2_eff (env=0x555557bc8190) at ../../target/arm/internals.h:1512 | ||
5 | 9 | ||
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 10 | We might call pmu_counter_enabled() on an M-profile CPU (for example |
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 11 | from the migration pre/post hooks in machine.c); this should always |
8 | Message-id: 20230620124418.805717-3-richard.henderson@linaro.org | 12 | return false because these CPUs don't set ARM_FEATURE_PMU. |
13 | |||
14 | Avoid the assertion by not calling arm_mdcr_el2_eff() before we | ||
15 | have done the early return for "PMU not present". | ||
16 | |||
17 | This fixes an assertion failure if you try to do a loadvm or | ||
18 | savevm for an M-profile board. | ||
19 | |||
20 | Cc: qemu-stable@nongnu.org | ||
21 | Resolves: https://gitlab.com/qemu-project/qemu/-/issues/2155 | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 22 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
23 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> | ||
24 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
25 | Message-id: 20240208153346.970021-1-peter.maydell@linaro.org | ||
10 | --- | 26 | --- |
11 | target/arm/cpu.h | 5 +++-- | 27 | target/arm/helper.c | 12 ++++++++++-- |
12 | target/arm/helper.c | 10 ++++++++-- | 28 | 1 file changed, 10 insertions(+), 2 deletions(-) |
13 | 2 files changed, 11 insertions(+), 4 deletions(-) | ||
14 | 29 | ||
15 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | ||
16 | index XXXXXXX..XXXXXXX 100644 | ||
17 | --- a/target/arm/cpu.h | ||
18 | +++ b/target/arm/cpu.h | ||
19 | @@ -XXX,XX +XXX,XX @@ static inline void xpsr_write(CPUARMState *env, uint32_t val, uint32_t mask) | ||
20 | #define HCR_TERR (1ULL << 36) | ||
21 | #define HCR_TEA (1ULL << 37) | ||
22 | #define HCR_MIOCNCE (1ULL << 38) | ||
23 | -/* RES0 bit 39 */ | ||
24 | +#define HCR_TME (1ULL << 39) | ||
25 | #define HCR_APK (1ULL << 40) | ||
26 | #define HCR_API (1ULL << 41) | ||
27 | #define HCR_NV (1ULL << 42) | ||
28 | @@ -XXX,XX +XXX,XX @@ static inline void xpsr_write(CPUARMState *env, uint32_t val, uint32_t mask) | ||
29 | #define HCR_NV2 (1ULL << 45) | ||
30 | #define HCR_FWB (1ULL << 46) | ||
31 | #define HCR_FIEN (1ULL << 47) | ||
32 | -/* RES0 bit 48 */ | ||
33 | +#define HCR_GPF (1ULL << 48) | ||
34 | #define HCR_TID4 (1ULL << 49) | ||
35 | #define HCR_TICAB (1ULL << 50) | ||
36 | #define HCR_AMVOFFEN (1ULL << 51) | ||
37 | @@ -XXX,XX +XXX,XX @@ static inline void xpsr_write(CPUARMState *env, uint32_t val, uint32_t mask) | ||
38 | #define SCR_TRNDR (1ULL << 40) | ||
39 | #define SCR_ENTP2 (1ULL << 41) | ||
40 | #define SCR_GPF (1ULL << 48) | ||
41 | +#define SCR_NSE (1ULL << 62) | ||
42 | |||
43 | #define HSTR_TTEE (1 << 16) | ||
44 | #define HSTR_TJDBX (1 << 17) | ||
45 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 30 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
46 | index XXXXXXX..XXXXXXX 100644 | 31 | index XXXXXXX..XXXXXXX 100644 |
47 | --- a/target/arm/helper.c | 32 | --- a/target/arm/helper.c |
48 | +++ b/target/arm/helper.c | 33 | +++ b/target/arm/helper.c |
49 | @@ -XXX,XX +XXX,XX @@ static void scr_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | 34 | @@ -XXX,XX +XXX,XX @@ static bool pmu_counter_enabled(CPUARMState *env, uint8_t counter) |
50 | if (cpu_isar_feature(aa64_fgt, cpu)) { | 35 | bool enabled, prohibited = false, filtered; |
51 | valid_mask |= SCR_FGTEN; | 36 | bool secure = arm_is_secure(env); |
52 | } | 37 | int el = arm_current_el(env); |
53 | + if (cpu_isar_feature(aa64_rme, cpu)) { | 38 | - uint64_t mdcr_el2 = arm_mdcr_el2_eff(env); |
54 | + valid_mask |= SCR_NSE | SCR_GPF; | 39 | - uint8_t hpmn = mdcr_el2 & MDCR_HPMN; |
55 | + } | 40 | + uint64_t mdcr_el2; |
56 | } else { | 41 | + uint8_t hpmn; |
57 | valid_mask &= ~(SCR_RW | SCR_ST); | 42 | |
58 | if (cpu_isar_feature(aa32_ras, cpu)) { | 43 | + /* |
59 | @@ -XXX,XX +XXX,XX @@ static void scr_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | 44 | + * We might be called for M-profile cores where MDCR_EL2 doesn't |
60 | env->cp15.scr_el3 = value; | 45 | + * exist and arm_mdcr_el2_eff() will assert, so this early-exit check |
61 | 46 | + * must be before we read that value. | |
62 | /* | 47 | + */ |
63 | - * If SCR_EL3.NS changes, i.e. arm_is_secure_below_el3, then | 48 | if (!arm_feature(env, ARM_FEATURE_PMU)) { |
64 | + * If SCR_EL3.{NS,NSE} changes, i.e. change of security state, | 49 | return false; |
65 | * we must invalidate all TLBs below EL3. | ||
66 | */ | ||
67 | - if (changed & SCR_NS) { | ||
68 | + if (changed & (SCR_NS | SCR_NSE)) { | ||
69 | tlb_flush_by_mmuidx(env_cpu(env), (ARMMMUIdxBit_E10_0 | | ||
70 | ARMMMUIdxBit_E20_0 | | ||
71 | ARMMMUIdxBit_E10_1 | | ||
72 | @@ -XXX,XX +XXX,XX @@ static void do_hcr_write(CPUARMState *env, uint64_t value, uint64_t valid_mask) | ||
73 | if (cpu_isar_feature(aa64_fwb, cpu)) { | ||
74 | valid_mask |= HCR_FWB; | ||
75 | } | ||
76 | + if (cpu_isar_feature(aa64_rme, cpu)) { | ||
77 | + valid_mask |= HCR_GPF; | ||
78 | + } | ||
79 | } | 50 | } |
80 | 51 | ||
81 | if (cpu_isar_feature(any_evt, cpu)) { | 52 | + mdcr_el2 = arm_mdcr_el2_eff(env); |
53 | + hpmn = mdcr_el2 & MDCR_HPMN; | ||
54 | + | ||
55 | if (!arm_feature(env, ARM_FEATURE_EL2) || | ||
56 | (counter < hpmn || counter == 31)) { | ||
57 | e = env->cp15.c9_pmcr & PMCRE; | ||
82 | -- | 58 | -- |
83 | 2.34.1 | 59 | 2.34.1 |
60 | |||
61 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Nabih Estefan <nabihestefan@google.com> |
---|---|---|---|
2 | 2 | ||
3 | Add input and output space members to S1Translate. Set and adjust | 3 | Fix the nocm_gmac-test.c file to run on a nuvoton 7xx machine instead |
4 | them in S1_ptw_translate, and the various points at which we drop | 4 | of 8xx. Also fix comments referencing this and values expecting 8xx. |
5 | secure state. Initialize the space in get_phys_addr; for now leave | ||
6 | get_phys_addr_with_secure considering only secure vs non-secure spaces. | ||
7 | 5 | ||
6 | Change-Id: Iabd0fba14910c3f1e883c4a9521350f3db9ffab8 | ||
7 | Signed-Off-By: Nabih Estefan <nabihestefan@google.com> | ||
8 | Reviewed-by: Tyrone Ting <kfting@nuvoton.com> | ||
9 | Message-id: 20240208194759.2858582-2-nabihestefan@google.com | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 11 | [PMM: commit message tweaks] |
10 | Message-id: 20230620124418.805717-11-richard.henderson@linaro.org | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 13 | --- |
13 | target/arm/ptw.c | 86 +++++++++++++++++++++++++++++++++++++++--------- | 14 | tests/qtest/npcm_gmac-test.c | 84 +----------------------------------- |
14 | 1 file changed, 71 insertions(+), 15 deletions(-) | 15 | tests/qtest/meson.build | 3 +- |
16 | 2 files changed, 4 insertions(+), 83 deletions(-) | ||
15 | 17 | ||
16 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c | 18 | diff --git a/tests/qtest/npcm_gmac-test.c b/tests/qtest/npcm_gmac-test.c |
17 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/target/arm/ptw.c | 20 | --- a/tests/qtest/npcm_gmac-test.c |
19 | +++ b/target/arm/ptw.c | 21 | +++ b/tests/qtest/npcm_gmac-test.c |
20 | @@ -XXX,XX +XXX,XX @@ | 22 | @@ -XXX,XX +XXX,XX @@ typedef struct TestData { |
21 | typedef struct S1Translate { | 23 | const GMACModule *module; |
22 | ARMMMUIdx in_mmu_idx; | 24 | } TestData; |
23 | ARMMMUIdx in_ptw_idx; | 25 | |
24 | + ARMSecuritySpace in_space; | 26 | -/* Values extracted from hw/arm/npcm8xx.c */ |
25 | bool in_secure; | 27 | +/* Values extracted from hw/arm/npcm7xx.c */ |
26 | bool in_debug; | 28 | static const GMACModule gmac_module_list[] = { |
27 | bool out_secure; | 29 | { |
28 | bool out_rw; | 30 | .irq = 14, |
29 | bool out_be; | 31 | @@ -XXX,XX +XXX,XX @@ static const GMACModule gmac_module_list[] = { |
30 | + ARMSecuritySpace out_space; | 32 | .irq = 15, |
31 | hwaddr out_virt; | 33 | .base_addr = 0xf0804000 |
32 | hwaddr out_phys; | 34 | }, |
33 | void *out_host; | 35 | - { |
34 | @@ -XXX,XX +XXX,XX @@ static bool S2_attrs_are_device(uint64_t hcr, uint8_t attrs) | 36 | - .irq = 16, |
35 | static bool S1_ptw_translate(CPUARMState *env, S1Translate *ptw, | 37 | - .base_addr = 0xf0806000 |
36 | hwaddr addr, ARMMMUFaultInfo *fi) | 38 | - }, |
39 | - { | ||
40 | - .irq = 17, | ||
41 | - .base_addr = 0xf0808000 | ||
42 | - } | ||
43 | }; | ||
44 | |||
45 | /* Returns the index of the GMAC module. */ | ||
46 | @@ -XXX,XX +XXX,XX @@ static uint32_t gmac_read(QTestState *qts, const GMACModule *mod, | ||
47 | return qtest_readl(qts, mod->base_addr + regno); | ||
48 | } | ||
49 | |||
50 | -static uint16_t pcs_read(QTestState *qts, const GMACModule *mod, | ||
51 | - NPCMRegister regno) | ||
52 | -{ | ||
53 | - uint32_t write_value = (regno & 0x3ffe00) >> 9; | ||
54 | - qtest_writel(qts, PCS_BASE_ADDRESS + NPCM_PCS_IND_AC_BA, write_value); | ||
55 | - uint32_t read_offset = regno & 0x1ff; | ||
56 | - return qtest_readl(qts, PCS_BASE_ADDRESS + read_offset); | ||
57 | -} | ||
58 | - | ||
59 | /* Check that GMAC registers are reset to default value */ | ||
60 | static void test_init(gconstpointer test_data) | ||
37 | { | 61 | { |
38 | + ARMSecuritySpace space = ptw->in_space; | 62 | const TestData *td = test_data; |
39 | bool is_secure = ptw->in_secure; | 63 | const GMACModule *mod = td->module; |
40 | ARMMMUIdx mmu_idx = ptw->in_mmu_idx; | 64 | - QTestState *qts = qtest_init("-machine npcm845-evb"); |
41 | ARMMMUIdx s2_mmu_idx = ptw->in_ptw_idx; | 65 | + QTestState *qts = qtest_init("-machine npcm750-evb"); |
42 | @@ -XXX,XX +XXX,XX @@ static bool S1_ptw_translate(CPUARMState *env, S1Translate *ptw, | 66 | |
43 | .in_mmu_idx = s2_mmu_idx, | 67 | #define CHECK_REG32(regno, value) \ |
44 | .in_ptw_idx = ptw_idx_for_stage_2(env, s2_mmu_idx), | 68 | do { \ |
45 | .in_secure = s2_mmu_idx == ARMMMUIdx_Stage2_S, | 69 | g_assert_cmphex(gmac_read(qts, mod, (regno)), ==, (value)); \ |
46 | + .in_space = (s2_mmu_idx == ARMMMUIdx_Stage2_S ? ARMSS_Secure | 70 | } while (0) |
47 | + : space == ARMSS_Realm ? ARMSS_Realm | 71 | |
48 | + : ARMSS_NonSecure), | 72 | -#define CHECK_REG_PCS(regno, value) \ |
49 | .in_debug = true, | 73 | - do { \ |
50 | }; | 74 | - g_assert_cmphex(pcs_read(qts, mod, (regno)), ==, (value)); \ |
51 | GetPhysAddrResult s2 = { }; | 75 | - } while (0) |
52 | @@ -XXX,XX +XXX,XX @@ static bool S1_ptw_translate(CPUARMState *env, S1Translate *ptw, | 76 | - |
53 | ptw->out_phys = s2.f.phys_addr; | 77 | CHECK_REG32(NPCM_DMA_BUS_MODE, 0x00020100); |
54 | pte_attrs = s2.cacheattrs.attrs; | 78 | CHECK_REG32(NPCM_DMA_XMT_POLL_DEMAND, 0); |
55 | ptw->out_secure = s2.f.attrs.secure; | 79 | CHECK_REG32(NPCM_DMA_RCV_POLL_DEMAND, 0); |
56 | + ptw->out_space = s2.f.attrs.space; | 80 | @@ -XXX,XX +XXX,XX @@ static void test_init(gconstpointer test_data) |
57 | } else { | 81 | CHECK_REG32(NPCM_GMAC_PTP_TAR, 0); |
58 | /* Regime is physical. */ | 82 | CHECK_REG32(NPCM_GMAC_PTP_TTSR, 0); |
59 | ptw->out_phys = addr; | 83 | |
60 | pte_attrs = 0; | 84 | - /* TODO Add registers PCS */ |
61 | ptw->out_secure = s2_mmu_idx == ARMMMUIdx_Phys_S; | 85 | - if (mod->base_addr == 0xf0802000) { |
62 | + ptw->out_space = (s2_mmu_idx == ARMMMUIdx_Phys_S ? ARMSS_Secure | 86 | - CHECK_REG_PCS(NPCM_PCS_SR_CTL_ID1, 0x699e); |
63 | + : space == ARMSS_Realm ? ARMSS_Realm | 87 | - CHECK_REG_PCS(NPCM_PCS_SR_CTL_ID2, 0); |
64 | + : ARMSS_NonSecure); | 88 | - CHECK_REG_PCS(NPCM_PCS_SR_CTL_STS, 0x8000); |
65 | } | 89 | - |
66 | ptw->out_host = NULL; | 90 | - CHECK_REG_PCS(NPCM_PCS_SR_MII_CTRL, 0x1140); |
67 | ptw->out_rw = false; | 91 | - CHECK_REG_PCS(NPCM_PCS_SR_MII_STS, 0x0109); |
68 | @@ -XXX,XX +XXX,XX @@ static bool S1_ptw_translate(CPUARMState *env, S1Translate *ptw, | 92 | - CHECK_REG_PCS(NPCM_PCS_SR_MII_DEV_ID1, 0x699e); |
69 | ptw->out_rw = full->prot & PAGE_WRITE; | 93 | - CHECK_REG_PCS(NPCM_PCS_SR_MII_DEV_ID2, 0x0ced0); |
70 | pte_attrs = full->pte_attrs; | 94 | - CHECK_REG_PCS(NPCM_PCS_SR_MII_AN_ADV, 0x0020); |
71 | ptw->out_secure = full->attrs.secure; | 95 | - CHECK_REG_PCS(NPCM_PCS_SR_MII_LP_BABL, 0); |
72 | + ptw->out_space = full->attrs.space; | 96 | - CHECK_REG_PCS(NPCM_PCS_SR_MII_AN_EXPN, 0); |
73 | #else | 97 | - CHECK_REG_PCS(NPCM_PCS_SR_MII_EXT_STS, 0xc000); |
74 | g_assert_not_reached(); | 98 | - |
75 | #endif | 99 | - CHECK_REG_PCS(NPCM_PCS_SR_TIM_SYNC_ABL, 0x0003); |
76 | @@ -XXX,XX +XXX,XX @@ static uint32_t arm_ldl_ptw(CPUARMState *env, S1Translate *ptw, | 100 | - CHECK_REG_PCS(NPCM_PCS_SR_TIM_SYNC_TX_MAX_DLY_LWR, 0x0038); |
77 | } | 101 | - CHECK_REG_PCS(NPCM_PCS_SR_TIM_SYNC_TX_MAX_DLY_UPR, 0); |
78 | } else { | 102 | - CHECK_REG_PCS(NPCM_PCS_SR_TIM_SYNC_TX_MIN_DLY_LWR, 0x0038); |
79 | /* Page tables are in MMIO. */ | 103 | - CHECK_REG_PCS(NPCM_PCS_SR_TIM_SYNC_TX_MIN_DLY_UPR, 0); |
80 | - MemTxAttrs attrs = { .secure = ptw->out_secure }; | 104 | - CHECK_REG_PCS(NPCM_PCS_SR_TIM_SYNC_RX_MAX_DLY_LWR, 0x0058); |
81 | + MemTxAttrs attrs = { | 105 | - CHECK_REG_PCS(NPCM_PCS_SR_TIM_SYNC_RX_MAX_DLY_UPR, 0); |
82 | + .secure = ptw->out_secure, | 106 | - CHECK_REG_PCS(NPCM_PCS_SR_TIM_SYNC_RX_MIN_DLY_LWR, 0x0048); |
83 | + .space = ptw->out_space, | 107 | - CHECK_REG_PCS(NPCM_PCS_SR_TIM_SYNC_RX_MIN_DLY_UPR, 0); |
84 | + }; | 108 | - |
85 | AddressSpace *as = arm_addressspace(cs, attrs); | 109 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_MMD_DIG_CTRL1, 0x2400); |
86 | MemTxResult result = MEMTX_OK; | 110 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_AN_CTRL, 0); |
87 | 111 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_AN_INTR_STS, 0x000a); | |
88 | @@ -XXX,XX +XXX,XX @@ static uint64_t arm_ldq_ptw(CPUARMState *env, S1Translate *ptw, | 112 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_TC, 0); |
89 | #endif | 113 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_DBG_CTRL, 0); |
90 | } else { | 114 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_EEE_MCTRL0, 0x899c); |
91 | /* Page tables are in MMIO. */ | 115 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_EEE_TXTIMER, 0); |
92 | - MemTxAttrs attrs = { .secure = ptw->out_secure }; | 116 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_EEE_RXTIMER, 0); |
93 | + MemTxAttrs attrs = { | 117 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_LINK_TIMER_CTRL, 0); |
94 | + .secure = ptw->out_secure, | 118 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_EEE_MCTRL1, 0); |
95 | + .space = ptw->out_space, | 119 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_DIG_STS, 0x0010); |
96 | + }; | 120 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_ICG_ERRCNT1, 0); |
97 | AddressSpace *as = arm_addressspace(cs, attrs); | 121 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_MISC_STS, 0); |
98 | MemTxResult result = MEMTX_OK; | 122 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_RX_LSTS, 0); |
99 | 123 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_MP_TX_BSTCTRL0, 0x00a); | |
100 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_v6(CPUARMState *env, S1Translate *ptw, | 124 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_MP_TX_LVLCTRL0, 0x007f); |
101 | * regime, because the attribute will already be non-secure. | 125 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_MP_TX_GENCTRL0, 0x0001); |
102 | */ | 126 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_MP_TX_GENCTRL1, 0); |
103 | result->f.attrs.secure = false; | 127 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_MP_TX_STS, 0); |
104 | + result->f.attrs.space = ARMSS_NonSecure; | 128 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_MP_RX_GENCTRL0, 0x0100); |
105 | } | 129 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_MP_RX_GENCTRL1, 0x1100); |
106 | result->f.phys_addr = phys_addr; | 130 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_MP_RX_LOS_CTRL0, 0x000e); |
107 | return false; | 131 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_MP_MPLL_CTRL0, 0x0100); |
108 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw, | 132 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_MP_MPLL_CTRL1, 0x0032); |
109 | * regime, because the attribute will already be non-secure. | 133 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_MP_MPLL_STS, 0x0001); |
110 | */ | 134 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_MP_MISC_CTRL2, 0); |
111 | result->f.attrs.secure = false; | 135 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_MP_LVL_CTRL, 0x0019); |
112 | + result->f.attrs.space = ARMSS_NonSecure; | 136 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_MP_MISC_CTRL0, 0); |
113 | } | 137 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_MP_MISC_CTRL1, 0); |
114 | 138 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_DIG_CTRL2, 0); | |
115 | if (regime_is_stage2(mmu_idx)) { | 139 | - CHECK_REG_PCS(NPCM_PCS_VR_MII_DIG_ERRCNT_SEL, 0); |
116 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_pmsav8(CPUARMState *env, uint32_t address, | 140 | - } |
117 | */ | 141 | - |
118 | if (sattrs.ns) { | 142 | qtest_quit(qts); |
119 | result->f.attrs.secure = false; | ||
120 | + result->f.attrs.space = ARMSS_NonSecure; | ||
121 | } else if (!secure) { | ||
122 | /* | ||
123 | * NS access to S memory must fault. | ||
124 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw, | ||
125 | bool is_secure = ptw->in_secure; | ||
126 | bool ret, ipa_secure; | ||
127 | ARMCacheAttrs cacheattrs1; | ||
128 | + ARMSecuritySpace ipa_space; | ||
129 | bool is_el0; | ||
130 | uint64_t hcr; | ||
131 | |||
132 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw, | ||
133 | |||
134 | ipa = result->f.phys_addr; | ||
135 | ipa_secure = result->f.attrs.secure; | ||
136 | + ipa_space = result->f.attrs.space; | ||
137 | |||
138 | is_el0 = ptw->in_mmu_idx == ARMMMUIdx_Stage1_E0; | ||
139 | ptw->in_mmu_idx = ipa_secure ? ARMMMUIdx_Stage2_S : ARMMMUIdx_Stage2; | ||
140 | ptw->in_secure = ipa_secure; | ||
141 | + ptw->in_space = ipa_space; | ||
142 | ptw->in_ptw_idx = ptw_idx_for_stage_2(env, ptw->in_mmu_idx); | ||
143 | |||
144 | /* | ||
145 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_with_struct(CPUARMState *env, S1Translate *ptw, | ||
146 | ARMMMUIdx s1_mmu_idx; | ||
147 | |||
148 | /* | ||
149 | - * The page table entries may downgrade secure to non-secure, but | ||
150 | - * cannot upgrade an non-secure translation regime's attributes | ||
151 | - * to secure. | ||
152 | + * The page table entries may downgrade Secure to NonSecure, but | ||
153 | + * cannot upgrade a NonSecure translation regime's attributes | ||
154 | + * to Secure or Realm. | ||
155 | */ | ||
156 | result->f.attrs.secure = is_secure; | ||
157 | + result->f.attrs.space = ptw->in_space; | ||
158 | |||
159 | switch (mmu_idx) { | ||
160 | case ARMMMUIdx_Phys_S: | ||
161 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_with_struct(CPUARMState *env, S1Translate *ptw, | ||
162 | |||
163 | default: | ||
164 | /* Single stage uses physical for ptw. */ | ||
165 | - ptw->in_ptw_idx = is_secure ? ARMMMUIdx_Phys_S : ARMMMUIdx_Phys_NS; | ||
166 | + ptw->in_ptw_idx = arm_space_to_phys(ptw->in_space); | ||
167 | break; | ||
168 | } | ||
169 | |||
170 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, | ||
171 | S1Translate ptw = { | ||
172 | .in_mmu_idx = mmu_idx, | ||
173 | .in_secure = is_secure, | ||
174 | + .in_space = arm_secure_to_space(is_secure), | ||
175 | }; | ||
176 | return get_phys_addr_with_struct(env, &ptw, address, access_type, | ||
177 | result, fi); | ||
178 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
179 | MMUAccessType access_type, ARMMMUIdx mmu_idx, | ||
180 | GetPhysAddrResult *result, ARMMMUFaultInfo *fi) | ||
181 | { | ||
182 | - bool is_secure; | ||
183 | + S1Translate ptw = { | ||
184 | + .in_mmu_idx = mmu_idx, | ||
185 | + }; | ||
186 | + ARMSecuritySpace ss; | ||
187 | |||
188 | switch (mmu_idx) { | ||
189 | case ARMMMUIdx_E10_0: | ||
190 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | ||
191 | case ARMMMUIdx_Stage1_E1: | ||
192 | case ARMMMUIdx_Stage1_E1_PAN: | ||
193 | case ARMMMUIdx_E2: | ||
194 | - is_secure = arm_is_secure_below_el3(env); | ||
195 | + ss = arm_security_space_below_el3(env); | ||
196 | break; | ||
197 | case ARMMMUIdx_Stage2: | ||
198 | + /* | ||
199 | + * For Secure EL2, we need this index to be NonSecure; | ||
200 | + * otherwise this will already be NonSecure or Realm. | ||
201 | + */ | ||
202 | + ss = arm_security_space_below_el3(env); | ||
203 | + if (ss == ARMSS_Secure) { | ||
204 | + ss = ARMSS_NonSecure; | ||
205 | + } | ||
206 | + break; | ||
207 | case ARMMMUIdx_Phys_NS: | ||
208 | case ARMMMUIdx_MPrivNegPri: | ||
209 | case ARMMMUIdx_MUserNegPri: | ||
210 | case ARMMMUIdx_MPriv: | ||
211 | case ARMMMUIdx_MUser: | ||
212 | - is_secure = false; | ||
213 | + ss = ARMSS_NonSecure; | ||
214 | break; | ||
215 | - case ARMMMUIdx_E3: | ||
216 | case ARMMMUIdx_Stage2_S: | ||
217 | case ARMMMUIdx_Phys_S: | ||
218 | case ARMMMUIdx_MSPrivNegPri: | ||
219 | case ARMMMUIdx_MSUserNegPri: | ||
220 | case ARMMMUIdx_MSPriv: | ||
221 | case ARMMMUIdx_MSUser: | ||
222 | - is_secure = true; | ||
223 | + ss = ARMSS_Secure; | ||
224 | + break; | ||
225 | + case ARMMMUIdx_E3: | ||
226 | + if (arm_feature(env, ARM_FEATURE_AARCH64) && | ||
227 | + cpu_isar_feature(aa64_rme, env_archcpu(env))) { | ||
228 | + ss = ARMSS_Root; | ||
229 | + } else { | ||
230 | + ss = ARMSS_Secure; | ||
231 | + } | ||
232 | + break; | ||
233 | + case ARMMMUIdx_Phys_Root: | ||
234 | + ss = ARMSS_Root; | ||
235 | + break; | ||
236 | + case ARMMMUIdx_Phys_Realm: | ||
237 | + ss = ARMSS_Realm; | ||
238 | break; | ||
239 | default: | ||
240 | g_assert_not_reached(); | ||
241 | } | ||
242 | - return get_phys_addr_with_secure(env, address, access_type, mmu_idx, | ||
243 | - is_secure, result, fi); | ||
244 | + | ||
245 | + ptw.in_space = ss; | ||
246 | + ptw.in_secure = arm_space_is_secure(ss); | ||
247 | + return get_phys_addr_with_struct(env, &ptw, address, access_type, | ||
248 | + result, fi); | ||
249 | } | 143 | } |
250 | 144 | ||
251 | hwaddr arm_cpu_get_phys_page_attrs_debug(CPUState *cs, vaddr addr, | 145 | diff --git a/tests/qtest/meson.build b/tests/qtest/meson.build |
252 | @@ -XXX,XX +XXX,XX @@ hwaddr arm_cpu_get_phys_page_attrs_debug(CPUState *cs, vaddr addr, | 146 | index XXXXXXX..XXXXXXX 100644 |
253 | { | 147 | --- a/tests/qtest/meson.build |
254 | ARMCPU *cpu = ARM_CPU(cs); | 148 | +++ b/tests/qtest/meson.build |
255 | CPUARMState *env = &cpu->env; | 149 | @@ -XXX,XX +XXX,XX @@ qtests_npcm7xx = \ |
256 | + ARMMMUIdx mmu_idx = arm_mmu_idx(env); | 150 | 'npcm7xx_sdhci-test', |
257 | + ARMSecuritySpace ss = arm_security_space(env); | 151 | 'npcm7xx_smbus-test', |
258 | S1Translate ptw = { | 152 | 'npcm7xx_timer-test', |
259 | - .in_mmu_idx = arm_mmu_idx(env), | 153 | - 'npcm7xx_watchdog_timer-test'] + \ |
260 | - .in_secure = arm_is_secure(env), | 154 | + 'npcm7xx_watchdog_timer-test', |
261 | + .in_mmu_idx = mmu_idx, | 155 | + 'npcm_gmac-test'] + \ |
262 | + .in_space = ss, | 156 | (slirp.found() ? ['npcm7xx_emc-test'] : []) |
263 | + .in_secure = arm_space_is_secure(ss), | 157 | qtests_aspeed = \ |
264 | .in_debug = true, | 158 | ['aspeed_hace-test', |
265 | }; | ||
266 | GetPhysAddrResult res = {}; | ||
267 | -- | 159 | -- |
268 | 2.34.1 | 160 | 2.34.1 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Luc Michel <luc.michel@amd.com> |
---|---|---|---|
2 | 2 | ||
3 | It will be helpful to have ARMMMUIdx_Phys_* to be in the same | 3 | An access fault is raised when the Access Flag is not set in the |
4 | relative order as ARMSecuritySpace enumerators. This requires | 4 | looked-up PTE and the AFFD field is not set in the corresponding context |
5 | the adjustment to the nstable check. While there, check for being | 5 | descriptor. This was already implemented for stage 2. Implement it for |
6 | in secure state rather than rely on clearing the low bit making | 6 | stage 1 as well. |
7 | no change to non-secure state. | ||
8 | 7 | ||
9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 8 | Signed-off-by: Luc Michel <luc.michel@amd.com> |
10 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 9 | Reviewed-by: Mostafa Saleh <smostafa@google.com> |
11 | Message-id: 20230620124418.805717-8-richard.henderson@linaro.org | 10 | Reviewed-by: Eric Auger <eric.auger@redhat.com> |
11 | Tested-by: Mostafa Saleh <smostafa@google.com> | ||
12 | Message-id: 20240213082211.3330400-1-luc.michel@amd.com | ||
13 | [PMM: tweaked comment text] | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 14 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
13 | --- | 15 | --- |
14 | target/arm/cpu.h | 12 ++++++------ | 16 | hw/arm/smmuv3-internal.h | 1 + |
15 | target/arm/ptw.c | 12 +++++------- | 17 | include/hw/arm/smmu-common.h | 1 + |
16 | 2 files changed, 11 insertions(+), 13 deletions(-) | 18 | hw/arm/smmu-common.c | 11 +++++++++++ |
19 | hw/arm/smmuv3.c | 1 + | ||
20 | 4 files changed, 14 insertions(+) | ||
17 | 21 | ||
18 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 22 | diff --git a/hw/arm/smmuv3-internal.h b/hw/arm/smmuv3-internal.h |
19 | index XXXXXXX..XXXXXXX 100644 | 23 | index XXXXXXX..XXXXXXX 100644 |
20 | --- a/target/arm/cpu.h | 24 | --- a/hw/arm/smmuv3-internal.h |
21 | +++ b/target/arm/cpu.h | 25 | +++ b/hw/arm/smmuv3-internal.h |
22 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdx { | 26 | @@ -XXX,XX +XXX,XX @@ static inline int pa_range(STE *ste) |
23 | ARMMMUIdx_E2 = 6 | ARM_MMU_IDX_A, | 27 | #define CD_EPD(x, sel) extract32((x)->word[0], (16 * (sel)) + 14, 1) |
24 | ARMMMUIdx_E3 = 7 | ARM_MMU_IDX_A, | 28 | #define CD_ENDI(x) extract32((x)->word[0], 15, 1) |
25 | 29 | #define CD_IPS(x) extract32((x)->word[1], 0 , 3) | |
26 | - /* TLBs with 1-1 mapping to the physical address spaces. */ | 30 | +#define CD_AFFD(x) extract32((x)->word[1], 3 , 1) |
27 | - ARMMMUIdx_Phys_NS = 8 | ARM_MMU_IDX_A, | 31 | #define CD_TBI(x) extract32((x)->word[1], 6 , 2) |
28 | - ARMMMUIdx_Phys_S = 9 | ARM_MMU_IDX_A, | 32 | #define CD_HD(x) extract32((x)->word[1], 10 , 1) |
29 | - | 33 | #define CD_HA(x) extract32((x)->word[1], 11 , 1) |
30 | /* | 34 | diff --git a/include/hw/arm/smmu-common.h b/include/hw/arm/smmu-common.h |
31 | * Used for second stage of an S12 page table walk, or for descriptor | 35 | index XXXXXXX..XXXXXXX 100644 |
32 | * loads during first stage of an S1 page table walk. Note that both | 36 | --- a/include/hw/arm/smmu-common.h |
33 | * are in use simultaneously for SecureEL2: the security state for | 37 | +++ b/include/hw/arm/smmu-common.h |
34 | * the S2 ptw is selected by the NS bit from the S1 ptw. | 38 | @@ -XXX,XX +XXX,XX @@ typedef struct SMMUTransCfg { |
35 | */ | 39 | bool disabled; /* smmu is disabled */ |
36 | - ARMMMUIdx_Stage2 = 10 | ARM_MMU_IDX_A, | 40 | bool bypassed; /* translation is bypassed */ |
37 | - ARMMMUIdx_Stage2_S = 11 | ARM_MMU_IDX_A, | 41 | bool aborted; /* translation is aborted */ |
38 | + ARMMMUIdx_Stage2_S = 8 | ARM_MMU_IDX_A, | 42 | + bool affd; /* AF fault disable */ |
39 | + ARMMMUIdx_Stage2 = 9 | ARM_MMU_IDX_A, | 43 | uint32_t iotlb_hits; /* counts IOTLB hits */ |
44 | uint32_t iotlb_misses; /* counts IOTLB misses*/ | ||
45 | /* Used by stage-1 only. */ | ||
46 | diff --git a/hw/arm/smmu-common.c b/hw/arm/smmu-common.c | ||
47 | index XXXXXXX..XXXXXXX 100644 | ||
48 | --- a/hw/arm/smmu-common.c | ||
49 | +++ b/hw/arm/smmu-common.c | ||
50 | @@ -XXX,XX +XXX,XX @@ static int smmu_ptw_64_s1(SMMUTransCfg *cfg, | ||
51 | pte_addr, pte, iova, gpa, | ||
52 | block_size >> 20); | ||
53 | } | ||
40 | + | 54 | + |
41 | + /* TLBs with 1-1 mapping to the physical address spaces. */ | 55 | + /* |
42 | + ARMMMUIdx_Phys_S = 10 | ARM_MMU_IDX_A, | 56 | + * QEMU does not currently implement HTTU, so if AFFD and PTE.AF |
43 | + ARMMMUIdx_Phys_NS = 11 | ARM_MMU_IDX_A, | 57 | + * are 0 we take an Access flag fault. (5.4. Context Descriptor) |
44 | 58 | + * An Access flag fault takes priority over a Permission fault. | |
45 | /* | 59 | + */ |
46 | * These are not allocated TLBs and are used only for AT system | 60 | + if (!PTE_AF(pte) && !cfg->affd) { |
47 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c | 61 | + info->type = SMMU_PTW_ERR_ACCESS; |
62 | + goto error; | ||
63 | + } | ||
64 | + | ||
65 | ap = PTE_AP(pte); | ||
66 | if (is_permission_fault(ap, perm)) { | ||
67 | info->type = SMMU_PTW_ERR_PERMISSION; | ||
68 | diff --git a/hw/arm/smmuv3.c b/hw/arm/smmuv3.c | ||
48 | index XXXXXXX..XXXXXXX 100644 | 69 | index XXXXXXX..XXXXXXX 100644 |
49 | --- a/target/arm/ptw.c | 70 | --- a/hw/arm/smmuv3.c |
50 | +++ b/target/arm/ptw.c | 71 | +++ b/hw/arm/smmuv3.c |
51 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw, | 72 | @@ -XXX,XX +XXX,XX @@ static int decode_cd(SMMUTransCfg *cfg, CD *cd, SMMUEventInfo *event) |
52 | descaddr |= (address >> (stride * (4 - level))) & indexmask; | 73 | cfg->oas = MIN(oas2bits(SMMU_IDR5_OAS), cfg->oas); |
53 | descaddr &= ~7ULL; | 74 | cfg->tbi = CD_TBI(cd); |
54 | nstable = !regime_is_stage2(mmu_idx) && extract32(tableattrs, 4, 1); | 75 | cfg->asid = CD_ASID(cd); |
55 | - if (nstable) { | 76 | + cfg->affd = CD_AFFD(cd); |
56 | + if (nstable && ptw->in_secure) { | 77 | |
57 | /* | 78 | trace_smmuv3_decode_cd(cfg->oas); |
58 | * Stage2_S -> Stage2 or Phys_S -> Phys_NS | 79 | |
59 | - * Assert that the non-secure idx are even, and relative order. | ||
60 | + * Assert the relative order of the secure/non-secure indexes. | ||
61 | */ | ||
62 | - QEMU_BUILD_BUG_ON((ARMMMUIdx_Phys_NS & 1) != 0); | ||
63 | - QEMU_BUILD_BUG_ON((ARMMMUIdx_Stage2 & 1) != 0); | ||
64 | - QEMU_BUILD_BUG_ON(ARMMMUIdx_Phys_NS + 1 != ARMMMUIdx_Phys_S); | ||
65 | - QEMU_BUILD_BUG_ON(ARMMMUIdx_Stage2 + 1 != ARMMMUIdx_Stage2_S); | ||
66 | - ptw->in_ptw_idx &= ~1; | ||
67 | + QEMU_BUILD_BUG_ON(ARMMMUIdx_Phys_S + 1 != ARMMMUIdx_Phys_NS); | ||
68 | + QEMU_BUILD_BUG_ON(ARMMMUIdx_Stage2_S + 1 != ARMMMUIdx_Stage2); | ||
69 | + ptw->in_ptw_idx += 1; | ||
70 | ptw->in_secure = false; | ||
71 | } | ||
72 | if (!S1_ptw_translate(env, ptw, descaddr, fi)) { | ||
73 | -- | 80 | -- |
74 | 2.34.1 | 81 | 2.34.1 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Philippe Mathieu-Daudé <philmd@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Place the check at the end of get_phys_addr_with_struct, | 3 | Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org> |
4 | so that we check all physical results. | ||
5 | |||
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 4 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 5 | Message-id: 20240213155214.13619-2-philmd@linaro.org |
8 | Message-id: 20230620124418.805717-20-richard.henderson@linaro.org | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
10 | --- | 7 | --- |
11 | target/arm/ptw.c | 249 +++++++++++++++++++++++++++++++++++++++++++---- | 8 | hw/arm/stellaris.c | 6 ++++-- |
12 | 1 file changed, 232 insertions(+), 17 deletions(-) | 9 | 1 file changed, 4 insertions(+), 2 deletions(-) |
13 | 10 | ||
14 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c | 11 | diff --git a/hw/arm/stellaris.c b/hw/arm/stellaris.c |
15 | index XXXXXXX..XXXXXXX 100644 | 12 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/ptw.c | 13 | --- a/hw/arm/stellaris.c |
17 | +++ b/target/arm/ptw.c | 14 | +++ b/hw/arm/stellaris.c |
18 | @@ -XXX,XX +XXX,XX @@ typedef struct S1Translate { | 15 | @@ -XXX,XX +XXX,XX @@ static void stellaris_adc_trigger(void *opaque, int irq, int level) |
19 | void *out_host; | ||
20 | } S1Translate; | ||
21 | |||
22 | -static bool get_phys_addr_with_struct(CPUARMState *env, S1Translate *ptw, | ||
23 | - target_ulong address, | ||
24 | - MMUAccessType access_type, | ||
25 | - GetPhysAddrResult *result, | ||
26 | - ARMMMUFaultInfo *fi); | ||
27 | +static bool get_phys_addr_nogpc(CPUARMState *env, S1Translate *ptw, | ||
28 | + target_ulong address, | ||
29 | + MMUAccessType access_type, | ||
30 | + GetPhysAddrResult *result, | ||
31 | + ARMMMUFaultInfo *fi); | ||
32 | + | ||
33 | +static bool get_phys_addr_gpc(CPUARMState *env, S1Translate *ptw, | ||
34 | + target_ulong address, | ||
35 | + MMUAccessType access_type, | ||
36 | + GetPhysAddrResult *result, | ||
37 | + ARMMMUFaultInfo *fi); | ||
38 | |||
39 | /* This mapping is common between ID_AA64MMFR0.PARANGE and TCR_ELx.{I}PS. */ | ||
40 | static const uint8_t pamax_map[] = { | ||
41 | @@ -XXX,XX +XXX,XX @@ static bool regime_translation_disabled(CPUARMState *env, ARMMMUIdx mmu_idx, | ||
42 | return (regime_sctlr(env, mmu_idx) & SCTLR_M) == 0; | ||
43 | } | ||
44 | |||
45 | +static bool granule_protection_check(CPUARMState *env, uint64_t paddress, | ||
46 | + ARMSecuritySpace pspace, | ||
47 | + ARMMMUFaultInfo *fi) | ||
48 | +{ | ||
49 | + MemTxAttrs attrs = { | ||
50 | + .secure = true, | ||
51 | + .space = ARMSS_Root, | ||
52 | + }; | ||
53 | + ARMCPU *cpu = env_archcpu(env); | ||
54 | + uint64_t gpccr = env->cp15.gpccr_el3; | ||
55 | + unsigned pps, pgs, l0gptsz, level = 0; | ||
56 | + uint64_t tableaddr, pps_mask, align, entry, index; | ||
57 | + AddressSpace *as; | ||
58 | + MemTxResult result; | ||
59 | + int gpi; | ||
60 | + | ||
61 | + if (!FIELD_EX64(gpccr, GPCCR, GPC)) { | ||
62 | + return true; | ||
63 | + } | ||
64 | + | ||
65 | + /* | ||
66 | + * GPC Priority 1 (R_GMGRR): | ||
67 | + * R_JWCSM: If the configuration of GPCCR_EL3 is invalid, | ||
68 | + * the access fails as GPT walk fault at level 0. | ||
69 | + */ | ||
70 | + | ||
71 | + /* | ||
72 | + * Configuration of PPS to a value exceeding the implemented | ||
73 | + * physical address size is invalid. | ||
74 | + */ | ||
75 | + pps = FIELD_EX64(gpccr, GPCCR, PPS); | ||
76 | + if (pps > FIELD_EX64(cpu->isar.id_aa64mmfr0, ID_AA64MMFR0, PARANGE)) { | ||
77 | + goto fault_walk; | ||
78 | + } | ||
79 | + pps = pamax_map[pps]; | ||
80 | + pps_mask = MAKE_64BIT_MASK(0, pps); | ||
81 | + | ||
82 | + switch (FIELD_EX64(gpccr, GPCCR, SH)) { | ||
83 | + case 0b10: /* outer shareable */ | ||
84 | + break; | ||
85 | + case 0b00: /* non-shareable */ | ||
86 | + case 0b11: /* inner shareable */ | ||
87 | + /* Inner and Outer non-cacheable requires Outer shareable. */ | ||
88 | + if (FIELD_EX64(gpccr, GPCCR, ORGN) == 0 && | ||
89 | + FIELD_EX64(gpccr, GPCCR, IRGN) == 0) { | ||
90 | + goto fault_walk; | ||
91 | + } | ||
92 | + break; | ||
93 | + default: /* reserved */ | ||
94 | + goto fault_walk; | ||
95 | + } | ||
96 | + | ||
97 | + switch (FIELD_EX64(gpccr, GPCCR, PGS)) { | ||
98 | + case 0b00: /* 4KB */ | ||
99 | + pgs = 12; | ||
100 | + break; | ||
101 | + case 0b01: /* 64KB */ | ||
102 | + pgs = 16; | ||
103 | + break; | ||
104 | + case 0b10: /* 16KB */ | ||
105 | + pgs = 14; | ||
106 | + break; | ||
107 | + default: /* reserved */ | ||
108 | + goto fault_walk; | ||
109 | + } | ||
110 | + | ||
111 | + /* Note this field is read-only and fixed at reset. */ | ||
112 | + l0gptsz = 30 + FIELD_EX64(gpccr, GPCCR, L0GPTSZ); | ||
113 | + | ||
114 | + /* | ||
115 | + * GPC Priority 2: Secure, Realm or Root address exceeds PPS. | ||
116 | + * R_CPDSB: A NonSecure physical address input exceeding PPS | ||
117 | + * does not experience any fault. | ||
118 | + */ | ||
119 | + if (paddress & ~pps_mask) { | ||
120 | + if (pspace == ARMSS_NonSecure) { | ||
121 | + return true; | ||
122 | + } | ||
123 | + goto fault_size; | ||
124 | + } | ||
125 | + | ||
126 | + /* GPC Priority 3: the base address of GPTBR_EL3 exceeds PPS. */ | ||
127 | + tableaddr = env->cp15.gptbr_el3 << 12; | ||
128 | + if (tableaddr & ~pps_mask) { | ||
129 | + goto fault_size; | ||
130 | + } | ||
131 | + | ||
132 | + /* | ||
133 | + * BADDR is aligned per a function of PPS and L0GPTSZ. | ||
134 | + * These bits of GPTBR_EL3 are RES0, but are not a configuration error, | ||
135 | + * unlike the RES0 bits of the GPT entries (R_XNKFZ). | ||
136 | + */ | ||
137 | + align = MAX(pps - l0gptsz + 3, 12); | ||
138 | + align = MAKE_64BIT_MASK(0, align); | ||
139 | + tableaddr &= ~align; | ||
140 | + | ||
141 | + as = arm_addressspace(env_cpu(env), attrs); | ||
142 | + | ||
143 | + /* Level 0 lookup. */ | ||
144 | + index = extract64(paddress, l0gptsz, pps - l0gptsz); | ||
145 | + tableaddr += index * 8; | ||
146 | + entry = address_space_ldq_le(as, tableaddr, attrs, &result); | ||
147 | + if (result != MEMTX_OK) { | ||
148 | + goto fault_eabt; | ||
149 | + } | ||
150 | + | ||
151 | + switch (extract32(entry, 0, 4)) { | ||
152 | + case 1: /* block descriptor */ | ||
153 | + if (entry >> 8) { | ||
154 | + goto fault_walk; /* RES0 bits not 0 */ | ||
155 | + } | ||
156 | + gpi = extract32(entry, 4, 4); | ||
157 | + goto found; | ||
158 | + case 3: /* table descriptor */ | ||
159 | + tableaddr = entry & ~0xf; | ||
160 | + align = MAX(l0gptsz - pgs - 1, 12); | ||
161 | + align = MAKE_64BIT_MASK(0, align); | ||
162 | + if (tableaddr & (~pps_mask | align)) { | ||
163 | + goto fault_walk; /* RES0 bits not 0 */ | ||
164 | + } | ||
165 | + break; | ||
166 | + default: /* invalid */ | ||
167 | + goto fault_walk; | ||
168 | + } | ||
169 | + | ||
170 | + /* Level 1 lookup */ | ||
171 | + level = 1; | ||
172 | + index = extract64(paddress, pgs + 4, l0gptsz - pgs - 4); | ||
173 | + tableaddr += index * 8; | ||
174 | + entry = address_space_ldq_le(as, tableaddr, attrs, &result); | ||
175 | + if (result != MEMTX_OK) { | ||
176 | + goto fault_eabt; | ||
177 | + } | ||
178 | + | ||
179 | + switch (extract32(entry, 0, 4)) { | ||
180 | + case 1: /* contiguous descriptor */ | ||
181 | + if (entry >> 10) { | ||
182 | + goto fault_walk; /* RES0 bits not 0 */ | ||
183 | + } | ||
184 | + /* | ||
185 | + * Because the softmmu tlb only works on units of TARGET_PAGE_SIZE, | ||
186 | + * and because we cannot invalidate by pa, and thus will always | ||
187 | + * flush entire tlbs, we don't actually care about the range here | ||
188 | + * and can simply extract the GPI as the result. | ||
189 | + */ | ||
190 | + if (extract32(entry, 8, 2) == 0) { | ||
191 | + goto fault_walk; /* reserved contig */ | ||
192 | + } | ||
193 | + gpi = extract32(entry, 4, 4); | ||
194 | + break; | ||
195 | + default: | ||
196 | + index = extract64(paddress, pgs, 4); | ||
197 | + gpi = extract64(entry, index * 4, 4); | ||
198 | + break; | ||
199 | + } | ||
200 | + | ||
201 | + found: | ||
202 | + switch (gpi) { | ||
203 | + case 0b0000: /* no access */ | ||
204 | + break; | ||
205 | + case 0b1111: /* all access */ | ||
206 | + return true; | ||
207 | + case 0b1000: | ||
208 | + case 0b1001: | ||
209 | + case 0b1010: | ||
210 | + case 0b1011: | ||
211 | + if (pspace == (gpi & 3)) { | ||
212 | + return true; | ||
213 | + } | ||
214 | + break; | ||
215 | + default: | ||
216 | + goto fault_walk; /* reserved */ | ||
217 | + } | ||
218 | + | ||
219 | + fi->gpcf = GPCF_Fail; | ||
220 | + goto fault_common; | ||
221 | + fault_eabt: | ||
222 | + fi->gpcf = GPCF_EABT; | ||
223 | + goto fault_common; | ||
224 | + fault_size: | ||
225 | + fi->gpcf = GPCF_AddressSize; | ||
226 | + goto fault_common; | ||
227 | + fault_walk: | ||
228 | + fi->gpcf = GPCF_Walk; | ||
229 | + fault_common: | ||
230 | + fi->level = level; | ||
231 | + fi->paddr = paddress; | ||
232 | + fi->paddr_space = pspace; | ||
233 | + return false; | ||
234 | +} | ||
235 | + | ||
236 | static bool S2_attrs_are_device(uint64_t hcr, uint8_t attrs) | ||
237 | { | ||
238 | /* | ||
239 | @@ -XXX,XX +XXX,XX @@ static bool S1_ptw_translate(CPUARMState *env, S1Translate *ptw, | ||
240 | }; | ||
241 | GetPhysAddrResult s2 = { }; | ||
242 | |||
243 | - if (get_phys_addr_with_struct(env, &s2ptw, addr, | ||
244 | - MMU_DATA_LOAD, &s2, fi)) { | ||
245 | + if (get_phys_addr_gpc(env, &s2ptw, addr, MMU_DATA_LOAD, &s2, fi)) { | ||
246 | goto fail; | ||
247 | } | ||
248 | + | ||
249 | ptw->out_phys = s2.f.phys_addr; | ||
250 | pte_attrs = s2.cacheattrs.attrs; | ||
251 | ptw->out_host = NULL; | ||
252 | @@ -XXX,XX +XXX,XX @@ static bool S1_ptw_translate(CPUARMState *env, S1Translate *ptw, | ||
253 | |||
254 | fail: | ||
255 | assert(fi->type != ARMFault_None); | ||
256 | + if (fi->type == ARMFault_GPCFOnOutput) { | ||
257 | + fi->type = ARMFault_GPCFOnWalk; | ||
258 | + } | ||
259 | fi->s2addr = addr; | ||
260 | fi->stage2 = true; | ||
261 | fi->s1ptw = true; | ||
262 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_disabled(CPUARMState *env, target_ulong address, | ||
263 | ARMMMUFaultInfo *fi) | ||
264 | { | ||
265 | uint8_t memattr = 0x00; /* Device nGnRnE */ | ||
266 | - uint8_t shareability = 0; /* non-sharable */ | ||
267 | + uint8_t shareability = 0; /* non-shareable */ | ||
268 | int r_el; | ||
269 | |||
270 | switch (mmu_idx) { | ||
271 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_disabled(CPUARMState *env, target_ulong address, | ||
272 | } else { | ||
273 | memattr = 0x44; /* Normal, NC, No */ | ||
274 | } | ||
275 | - shareability = 2; /* outer sharable */ | ||
276 | + shareability = 2; /* outer shareable */ | ||
277 | } | ||
278 | result->cacheattrs.is_s2_format = false; | ||
279 | break; | ||
280 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw, | ||
281 | ARMSecuritySpace ipa_space; | ||
282 | uint64_t hcr; | ||
283 | |||
284 | - ret = get_phys_addr_with_struct(env, ptw, address, access_type, result, fi); | ||
285 | + ret = get_phys_addr_nogpc(env, ptw, address, access_type, result, fi); | ||
286 | |||
287 | /* If S1 fails, return early. */ | ||
288 | if (ret) { | ||
289 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw, | ||
290 | cacheattrs1 = result->cacheattrs; | ||
291 | memset(result, 0, sizeof(*result)); | ||
292 | |||
293 | - ret = get_phys_addr_with_struct(env, ptw, ipa, access_type, result, fi); | ||
294 | + ret = get_phys_addr_nogpc(env, ptw, ipa, access_type, result, fi); | ||
295 | fi->s2addr = ipa; | ||
296 | |||
297 | /* Combine the S1 and S2 perms. */ | ||
298 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw, | ||
299 | return false; | ||
300 | } | ||
301 | |||
302 | -static bool get_phys_addr_with_struct(CPUARMState *env, S1Translate *ptw, | ||
303 | +static bool get_phys_addr_nogpc(CPUARMState *env, S1Translate *ptw, | ||
304 | target_ulong address, | ||
305 | MMUAccessType access_type, | ||
306 | GetPhysAddrResult *result, | ||
307 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_with_struct(CPUARMState *env, S1Translate *ptw, | ||
308 | } | 16 | } |
309 | } | 17 | } |
310 | 18 | ||
311 | +static bool get_phys_addr_gpc(CPUARMState *env, S1Translate *ptw, | 19 | -static void stellaris_adc_reset(StellarisADCState *s) |
312 | + target_ulong address, | 20 | +static void stellaris_adc_reset_hold(Object *obj) |
313 | + MMUAccessType access_type, | 21 | { |
314 | + GetPhysAddrResult *result, | 22 | + StellarisADCState *s = STELLARIS_ADC(obj); |
315 | + ARMMMUFaultInfo *fi) | 23 | int n; |
316 | +{ | 24 | |
317 | + if (get_phys_addr_nogpc(env, ptw, address, access_type, result, fi)) { | 25 | for (n = 0; n < 4; n++) { |
318 | + return true; | 26 | @@ -XXX,XX +XXX,XX @@ static void stellaris_adc_init(Object *obj) |
319 | + } | 27 | memory_region_init_io(&s->iomem, obj, &stellaris_adc_ops, s, |
320 | + if (!granule_protection_check(env, result->f.phys_addr, | 28 | "adc", 0x1000); |
321 | + result->f.attrs.space, fi)) { | 29 | sysbus_init_mmio(sbd, &s->iomem); |
322 | + fi->type = ARMFault_GPCFOnOutput; | 30 | - stellaris_adc_reset(s); |
323 | + return true; | 31 | qdev_init_gpio_in(dev, stellaris_adc_trigger, 1); |
324 | + } | ||
325 | + return false; | ||
326 | +} | ||
327 | + | ||
328 | bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, | ||
329 | MMUAccessType access_type, ARMMMUIdx mmu_idx, | ||
330 | bool is_secure, GetPhysAddrResult *result, | ||
331 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr_with_secure(CPUARMState *env, target_ulong address, | ||
332 | .in_secure = is_secure, | ||
333 | .in_space = arm_secure_to_space(is_secure), | ||
334 | }; | ||
335 | - return get_phys_addr_with_struct(env, &ptw, address, access_type, | ||
336 | - result, fi); | ||
337 | + return get_phys_addr_gpc(env, &ptw, address, access_type, result, fi); | ||
338 | } | 32 | } |
339 | 33 | ||
340 | bool get_phys_addr(CPUARMState *env, target_ulong address, | 34 | @@ -XXX,XX +XXX,XX @@ static const TypeInfo stellaris_i2c_info = { |
341 | @@ -XXX,XX +XXX,XX @@ bool get_phys_addr(CPUARMState *env, target_ulong address, | 35 | static void stellaris_adc_class_init(ObjectClass *klass, void *data) |
342 | 36 | { | |
343 | ptw.in_space = ss; | 37 | DeviceClass *dc = DEVICE_CLASS(klass); |
344 | ptw.in_secure = arm_space_is_secure(ss); | 38 | + ResettableClass *rc = RESETTABLE_CLASS(klass); |
345 | - return get_phys_addr_with_struct(env, &ptw, address, access_type, | 39 | |
346 | - result, fi); | 40 | + rc->phases.hold = stellaris_adc_reset_hold; |
347 | + return get_phys_addr_gpc(env, &ptw, address, access_type, result, fi); | 41 | dc->vmsd = &vmstate_stellaris_adc; |
348 | } | 42 | } |
349 | 43 | ||
350 | hwaddr arm_cpu_get_phys_page_attrs_debug(CPUState *cs, vaddr addr, | ||
351 | @@ -XXX,XX +XXX,XX @@ hwaddr arm_cpu_get_phys_page_attrs_debug(CPUState *cs, vaddr addr, | ||
352 | ARMMMUFaultInfo fi = {}; | ||
353 | bool ret; | ||
354 | |||
355 | - ret = get_phys_addr_with_struct(env, &ptw, addr, MMU_DATA_LOAD, &res, &fi); | ||
356 | + ret = get_phys_addr_gpc(env, &ptw, addr, MMU_DATA_LOAD, &res, &fi); | ||
357 | *attrs = res.f.attrs; | ||
358 | |||
359 | if (ret) { | ||
360 | -- | 44 | -- |
361 | 2.34.1 | 45 | 2.34.1 |
46 | |||
47 | diff view generated by jsdifflib |
1 | From: Shashi Mallela <shashi.mallela@linaro.org> | 1 | From: Philippe Mathieu-Daudé <philmd@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Create ITS as part of SBSA platform GIC initialization. | 3 | Suggested-by: Peter Maydell <peter.maydell@linaro.org> |
4 | 4 | Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org> | |
5 | GIC ITS information is in DeviceTree so TF-A can pass it to EDK2. | 5 | Message-id: 20240213155214.13619-3-philmd@linaro.org |
6 | |||
7 | Bumping platform version to 0.2 as this is important hardware change. | ||
8 | |||
9 | Signed-off-by: Shashi Mallela <shashi.mallela@linaro.org> | ||
10 | Signed-off-by: Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org> | ||
11 | Message-id: 20230619170913.517373-2-marcin.juszkiewicz@linaro.org | ||
12 | Co-authored-by: Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org> | ||
13 | Signed-off-by: Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org> | ||
14 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
15 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
16 | --- | 8 | --- |
17 | docs/system/arm/sbsa.rst | 14 ++++++++++++++ | 9 | hw/arm/stellaris.c | 26 ++++++++++++++++++++++---- |
18 | hw/arm/sbsa-ref.c | 33 ++++++++++++++++++++++++++++++--- | 10 | 1 file changed, 22 insertions(+), 4 deletions(-) |
19 | 2 files changed, 44 insertions(+), 3 deletions(-) | ||
20 | 11 | ||
21 | diff --git a/docs/system/arm/sbsa.rst b/docs/system/arm/sbsa.rst | 12 | diff --git a/hw/arm/stellaris.c b/hw/arm/stellaris.c |
22 | index XXXXXXX..XXXXXXX 100644 | 13 | index XXXXXXX..XXXXXXX 100644 |
23 | --- a/docs/system/arm/sbsa.rst | 14 | --- a/hw/arm/stellaris.c |
24 | +++ b/docs/system/arm/sbsa.rst | 15 | +++ b/hw/arm/stellaris.c |
25 | @@ -XXX,XX +XXX,XX @@ to be a complete compliant DT. It currently reports: | 16 | @@ -XXX,XX +XXX,XX @@ static void stellaris_sys_instance_init(Object *obj) |
26 | - platform version | 17 | s->sysclk = qdev_init_clock_out(DEVICE(s), "SYSCLK"); |
27 | - GIC addresses | 18 | } |
28 | 19 | ||
29 | +Platform version | 20 | -/* I2C controller. */ |
30 | +'''''''''''''''' | 21 | +/* |
22 | + * I2C controller. | ||
23 | + * ??? For now we only implement the master interface. | ||
24 | + */ | ||
25 | |||
26 | #define TYPE_STELLARIS_I2C "stellaris-i2c" | ||
27 | OBJECT_DECLARE_SIMPLE_TYPE(stellaris_i2c_state, STELLARIS_I2C) | ||
28 | @@ -XXX,XX +XXX,XX @@ static void stellaris_i2c_write(void *opaque, hwaddr offset, | ||
29 | stellaris_i2c_update(s); | ||
30 | } | ||
31 | |||
32 | -static void stellaris_i2c_reset(stellaris_i2c_state *s) | ||
33 | +static void stellaris_i2c_reset_enter(Object *obj, ResetType type) | ||
34 | { | ||
35 | + stellaris_i2c_state *s = STELLARIS_I2C(obj); | ||
31 | + | 36 | + |
32 | The platform version is only for informing platform firmware about | 37 | if (s->mcs & STELLARIS_I2C_MCS_BUSBSY) |
33 | what kind of ``sbsa-ref`` board it is running on. It is neither | 38 | i2c_end_transfer(s->bus); |
34 | a QEMU versioned machine type nor a reflection of the level of the | ||
35 | @@ -XXX,XX +XXX,XX @@ SBSA/SystemReady SR support provided. | ||
36 | The ``machine-version-major`` value is updated when changes breaking | ||
37 | fw compatibility are introduced. The ``machine-version-minor`` value | ||
38 | is updated when features are added that don't break fw compatibility. | ||
39 | + | ||
40 | +Platform version changes: | ||
41 | + | ||
42 | +0.0 | ||
43 | + Devicetree holds information about CPUs, memory and platform version. | ||
44 | + | ||
45 | +0.1 | ||
46 | + GIC information is present in devicetree. | ||
47 | + | ||
48 | +0.2 | ||
49 | + GIC ITS information is present in devicetree. | ||
50 | diff --git a/hw/arm/sbsa-ref.c b/hw/arm/sbsa-ref.c | ||
51 | index XXXXXXX..XXXXXXX 100644 | ||
52 | --- a/hw/arm/sbsa-ref.c | ||
53 | +++ b/hw/arm/sbsa-ref.c | ||
54 | @@ -XXX,XX +XXX,XX @@ enum { | ||
55 | SBSA_CPUPERIPHS, | ||
56 | SBSA_GIC_DIST, | ||
57 | SBSA_GIC_REDIST, | ||
58 | + SBSA_GIC_ITS, | ||
59 | SBSA_SECURE_EC, | ||
60 | SBSA_GWDT_WS0, | ||
61 | SBSA_GWDT_REFRESH, | ||
62 | @@ -XXX,XX +XXX,XX @@ static const MemMapEntry sbsa_ref_memmap[] = { | ||
63 | [SBSA_CPUPERIPHS] = { 0x40000000, 0x00040000 }, | ||
64 | [SBSA_GIC_DIST] = { 0x40060000, 0x00010000 }, | ||
65 | [SBSA_GIC_REDIST] = { 0x40080000, 0x04000000 }, | ||
66 | + [SBSA_GIC_ITS] = { 0x44081000, 0x00020000 }, | ||
67 | [SBSA_SECURE_EC] = { 0x50000000, 0x00001000 }, | ||
68 | [SBSA_GWDT_REFRESH] = { 0x50010000, 0x00001000 }, | ||
69 | [SBSA_GWDT_CONTROL] = { 0x50011000, 0x00001000 }, | ||
70 | @@ -XXX,XX +XXX,XX @@ static void sbsa_fdt_add_gic_node(SBSAMachineState *sms) | ||
71 | 2, sbsa_ref_memmap[SBSA_GIC_REDIST].base, | ||
72 | 2, sbsa_ref_memmap[SBSA_GIC_REDIST].size); | ||
73 | |||
74 | + nodename = g_strdup_printf("/intc/its"); | ||
75 | + qemu_fdt_add_subnode(sms->fdt, nodename); | ||
76 | + qemu_fdt_setprop_sized_cells(sms->fdt, nodename, "reg", | ||
77 | + 2, sbsa_ref_memmap[SBSA_GIC_ITS].base, | ||
78 | + 2, sbsa_ref_memmap[SBSA_GIC_ITS].size); | ||
79 | + | ||
80 | g_free(nodename); | ||
81 | } | ||
82 | + | ||
83 | /* | ||
84 | * Firmware on this machine only uses ACPI table to load OS, these limited | ||
85 | * device tree nodes are just to let firmware know the info which varies from | ||
86 | @@ -XXX,XX +XXX,XX @@ static void create_fdt(SBSAMachineState *sms) | ||
87 | * fw compatibility. | ||
88 | */ | ||
89 | qemu_fdt_setprop_cell(fdt, "/", "machine-version-major", 0); | ||
90 | - qemu_fdt_setprop_cell(fdt, "/", "machine-version-minor", 1); | ||
91 | + qemu_fdt_setprop_cell(fdt, "/", "machine-version-minor", 2); | ||
92 | |||
93 | if (ms->numa_state->have_numa_distance) { | ||
94 | int size = nb_numa_nodes * nb_numa_nodes * 3 * sizeof(uint32_t); | ||
95 | @@ -XXX,XX +XXX,XX @@ static void create_secure_ram(SBSAMachineState *sms, | ||
96 | memory_region_add_subregion(secure_sysmem, base, secram); | ||
97 | } | ||
98 | |||
99 | -static void create_gic(SBSAMachineState *sms) | ||
100 | +static void create_its(SBSAMachineState *sms) | ||
101 | +{ | ||
102 | + const char *itsclass = its_class_name(); | ||
103 | + DeviceState *dev; | ||
104 | + | ||
105 | + dev = qdev_new(itsclass); | ||
106 | + | ||
107 | + object_property_set_link(OBJECT(dev), "parent-gicv3", OBJECT(sms->gic), | ||
108 | + &error_abort); | ||
109 | + sysbus_realize_and_unref(SYS_BUS_DEVICE(dev), &error_fatal); | ||
110 | + sysbus_mmio_map(SYS_BUS_DEVICE(dev), 0, sbsa_ref_memmap[SBSA_GIC_ITS].base); | ||
111 | +} | 39 | +} |
112 | + | 40 | + |
113 | +static void create_gic(SBSAMachineState *sms, MemoryRegion *mem) | 41 | +static void stellaris_i2c_reset_hold(Object *obj) |
42 | +{ | ||
43 | + stellaris_i2c_state *s = STELLARIS_I2C(obj); | ||
44 | |||
45 | s->msa = 0; | ||
46 | s->mcs = 0; | ||
47 | @@ -XXX,XX +XXX,XX @@ static void stellaris_i2c_reset(stellaris_i2c_state *s) | ||
48 | s->mimr = 0; | ||
49 | s->mris = 0; | ||
50 | s->mcr = 0; | ||
51 | +} | ||
52 | + | ||
53 | +static void stellaris_i2c_reset_exit(Object *obj) | ||
54 | +{ | ||
55 | + stellaris_i2c_state *s = STELLARIS_I2C(obj); | ||
56 | + | ||
57 | stellaris_i2c_update(s); | ||
58 | } | ||
59 | |||
60 | @@ -XXX,XX +XXX,XX @@ static void stellaris_i2c_init(Object *obj) | ||
61 | memory_region_init_io(&s->iomem, obj, &stellaris_i2c_ops, s, | ||
62 | "i2c", 0x1000); | ||
63 | sysbus_init_mmio(sbd, &s->iomem); | ||
64 | - /* ??? For now we only implement the master interface. */ | ||
65 | - stellaris_i2c_reset(s); | ||
66 | } | ||
67 | |||
68 | /* Analogue to Digital Converter. This is only partially implemented, | ||
69 | @@ -XXX,XX +XXX,XX @@ type_init(stellaris_machine_init) | ||
70 | static void stellaris_i2c_class_init(ObjectClass *klass, void *data) | ||
114 | { | 71 | { |
115 | unsigned int smp_cpus = MACHINE(sms)->smp.cpus; | 72 | DeviceClass *dc = DEVICE_CLASS(klass); |
116 | SysBusDevice *gicbusdev; | 73 | + ResettableClass *rc = RESETTABLE_CLASS(klass); |
117 | @@ -XXX,XX +XXX,XX @@ static void create_gic(SBSAMachineState *sms) | 74 | |
118 | qdev_prop_set_uint32(sms->gic, "len-redist-region-count", 1); | 75 | + rc->phases.enter = stellaris_i2c_reset_enter; |
119 | qdev_prop_set_uint32(sms->gic, "redist-region-count[0]", redist0_count); | 76 | + rc->phases.hold = stellaris_i2c_reset_hold; |
120 | 77 | + rc->phases.exit = stellaris_i2c_reset_exit; | |
121 | + object_property_set_link(OBJECT(sms->gic), "sysmem", | 78 | dc->vmsd = &vmstate_stellaris_i2c; |
122 | + OBJECT(mem), &error_fatal); | ||
123 | + qdev_prop_set_bit(sms->gic, "has-lpi", true); | ||
124 | + | ||
125 | gicbusdev = SYS_BUS_DEVICE(sms->gic); | ||
126 | sysbus_realize_and_unref(gicbusdev, &error_fatal); | ||
127 | sysbus_mmio_map(gicbusdev, 0, sbsa_ref_memmap[SBSA_GIC_DIST].base); | ||
128 | @@ -XXX,XX +XXX,XX @@ static void create_gic(SBSAMachineState *sms) | ||
129 | sysbus_connect_irq(gicbusdev, i + 3 * smp_cpus, | ||
130 | qdev_get_gpio_in(cpudev, ARM_CPU_VFIQ)); | ||
131 | } | ||
132 | + create_its(sms); | ||
133 | } | 79 | } |
134 | 80 | ||
135 | static void create_uart(const SBSAMachineState *sms, int uart, | ||
136 | @@ -XXX,XX +XXX,XX @@ static void sbsa_ref_init(MachineState *machine) | ||
137 | |||
138 | create_secure_ram(sms, secure_sysmem); | ||
139 | |||
140 | - create_gic(sms); | ||
141 | + create_gic(sms, sysmem); | ||
142 | |||
143 | create_uart(sms, SBSA_UART, sysmem, serial_hd(0)); | ||
144 | create_uart(sms, SBSA_SECURE_UART, secure_sysmem, serial_hd(1)); | ||
145 | -- | 81 | -- |
146 | 2.34.1 | 82 | 2.34.1 |
83 | |||
84 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Philippe Mathieu-Daudé <philmd@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 3 | QDev objects created with qdev_new() need to manually add |
4 | Reviewed-by: Alex Bennée <alex.bennee@linaro.org> | 4 | their parent relationship with object_property_add_child(). |
5 | Message-id: 20230622143046.1578160-1-richard.henderson@linaro.org | 5 | |
6 | [PMM: fixed typo; note experimental status in emulation.rst too] | 6 | This commit plug the devices which aren't part of the SoC; |
7 | they will be plugged into a SoC container in the next one. | ||
8 | |||
9 | Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org> | ||
10 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | Message-id: 20240213155214.13619-4-philmd@linaro.org | ||
7 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
8 | --- | 13 | --- |
9 | docs/system/arm/cpu-features.rst | 23 +++++++++++++++++++++++ | 14 | hw/arm/stellaris.c | 4 ++++ |
10 | docs/system/arm/emulation.rst | 1 + | 15 | 1 file changed, 4 insertions(+) |
11 | 2 files changed, 24 insertions(+) | ||
12 | 16 | ||
13 | diff --git a/docs/system/arm/cpu-features.rst b/docs/system/arm/cpu-features.rst | 17 | diff --git a/hw/arm/stellaris.c b/hw/arm/stellaris.c |
14 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
15 | --- a/docs/system/arm/cpu-features.rst | 19 | --- a/hw/arm/stellaris.c |
16 | +++ b/docs/system/arm/cpu-features.rst | 20 | +++ b/hw/arm/stellaris.c |
17 | @@ -XXX,XX +XXX,XX @@ As with ``sve-default-vector-length``, if the default length is larger | 21 | @@ -XXX,XX +XXX,XX @@ static void stellaris_init(MachineState *ms, stellaris_board_info *board) |
18 | than the maximum vector length enabled, the actual vector length will | 22 | &error_fatal); |
19 | be reduced. If this property is set to ``-1`` then the default vector | 23 | |
20 | length is set to the maximum possible length. | 24 | ssddev = qdev_new("ssd0323"); |
21 | + | 25 | + object_property_add_child(OBJECT(ms), "oled", OBJECT(ssddev)); |
22 | +RME CPU Properties | 26 | qdev_prop_set_uint8(ssddev, "cs", 1); |
23 | +================== | 27 | qdev_realize_and_unref(ssddev, bus, &error_fatal); |
24 | + | 28 | |
25 | +The status of RME support with QEMU is experimental. At this time we | 29 | gpio_d_splitter = qdev_new(TYPE_SPLIT_IRQ); |
26 | +only support RME within the CPU proper, not within the SMMU or GIC. | 30 | + object_property_add_child(OBJECT(ms), "splitter", |
27 | +The feature is enabled by the CPU property ``x-rme``, with the ``x-`` | 31 | + OBJECT(gpio_d_splitter)); |
28 | +prefix present as a reminder of the experimental status, and defaults off. | 32 | qdev_prop_set_uint32(gpio_d_splitter, "num-lines", 2); |
29 | + | 33 | qdev_realize_and_unref(gpio_d_splitter, NULL, &error_fatal); |
30 | +The method for enabling RME will change in some future QEMU release | 34 | qdev_connect_gpio_out( |
31 | +without notice or backward compatibility. | 35 | @@ -XXX,XX +XXX,XX @@ static void stellaris_init(MachineState *ms, stellaris_board_info *board) |
32 | + | 36 | DeviceState *gpad; |
33 | +RME Level 0 GPT Size Property | 37 | |
34 | +----------------------------- | 38 | gpad = qdev_new(TYPE_STELLARIS_GAMEPAD); |
35 | + | 39 | + object_property_add_child(OBJECT(ms), "gamepad", OBJECT(gpad)); |
36 | +To aid firmware developers in testing different possible CPU | 40 | for (i = 0; i < ARRAY_SIZE(gpad_keycode); i++) { |
37 | +configurations, ``x-l0gptsz=S`` may be used to specify the value | 41 | qlist_append_int(gpad_keycode_list, gpad_keycode[i]); |
38 | +to encode into ``GPCCR_EL3.L0GPTSZ``, a read-only field that | 42 | } |
39 | +specifies the size of the Level 0 Granule Protection Table. | ||
40 | +Legal values for ``S`` are 30, 34, 36, and 39; the default is 30. | ||
41 | + | ||
42 | +As with ``x-rme``, the ``x-l0gptsz`` property may be renamed or | ||
43 | +removed in some future QEMU release. | ||
44 | diff --git a/docs/system/arm/emulation.rst b/docs/system/arm/emulation.rst | ||
45 | index XXXXXXX..XXXXXXX 100644 | ||
46 | --- a/docs/system/arm/emulation.rst | ||
47 | +++ b/docs/system/arm/emulation.rst | ||
48 | @@ -XXX,XX +XXX,XX @@ the following architecture extensions: | ||
49 | - FEAT_RAS (Reliability, availability, and serviceability) | ||
50 | - FEAT_RASv1p1 (RAS Extension v1.1) | ||
51 | - FEAT_RDM (Advanced SIMD rounding double multiply accumulate instructions) | ||
52 | +- FEAT_RME (Realm Management Extension) (NB: support status in QEMU is experimental) | ||
53 | - FEAT_RNG (Random number generator) | ||
54 | - FEAT_S2FWB (Stage 2 forced Write-Back) | ||
55 | - FEAT_SB (Speculation Barrier) | ||
56 | -- | 43 | -- |
57 | 2.34.1 | 44 | 2.34.1 |
58 | 45 | ||
59 | 46 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | From: Philippe Mathieu-Daudé <philmd@linaro.org> |
---|---|---|---|
2 | 2 | ||
3 | With FEAT_RME, there are four physical address spaces. | 3 | QDev objects created with qdev_new() need to manually add |
4 | For now, just define the symbols, and mention them in | 4 | their parent relationship with object_property_add_child(). |
5 | the same spots as the other Phys indexes in ptw.c. | ||
6 | 5 | ||
7 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> | 6 | Since we don't model the SoC, just use a QOM container. |
7 | |||
8 | Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org> | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 9 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> |
9 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 10 | Message-id: 20240213155214.13619-5-philmd@linaro.org |
10 | Message-id: 20230620124418.805717-9-richard.henderson@linaro.org | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
12 | --- | 12 | --- |
13 | target/arm/cpu.h | 23 +++++++++++++++++++++-- | 13 | hw/arm/stellaris.c | 11 ++++++++++- |
14 | target/arm/ptw.c | 10 ++++++++-- | 14 | 1 file changed, 10 insertions(+), 1 deletion(-) |
15 | 2 files changed, 29 insertions(+), 4 deletions(-) | ||
16 | 15 | ||
17 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 16 | diff --git a/hw/arm/stellaris.c b/hw/arm/stellaris.c |
18 | index XXXXXXX..XXXXXXX 100644 | 17 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/target/arm/cpu.h | 18 | --- a/hw/arm/stellaris.c |
20 | +++ b/target/arm/cpu.h | 19 | +++ b/hw/arm/stellaris.c |
21 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMMMUIdx { | 20 | @@ -XXX,XX +XXX,XX @@ static void stellaris_init(MachineState *ms, stellaris_board_info *board) |
22 | ARMMMUIdx_Stage2 = 9 | ARM_MMU_IDX_A, | 21 | * 400fe000 system control |
23 | 22 | */ | |
24 | /* TLBs with 1-1 mapping to the physical address spaces. */ | 23 | |
25 | - ARMMMUIdx_Phys_S = 10 | ARM_MMU_IDX_A, | 24 | + Object *soc_container; |
26 | - ARMMMUIdx_Phys_NS = 11 | ARM_MMU_IDX_A, | 25 | DeviceState *gpio_dev[7], *nvic; |
27 | + ARMMMUIdx_Phys_S = 10 | ARM_MMU_IDX_A, | 26 | qemu_irq gpio_in[7][8]; |
28 | + ARMMMUIdx_Phys_NS = 11 | ARM_MMU_IDX_A, | 27 | qemu_irq gpio_out[7][8]; |
29 | + ARMMMUIdx_Phys_Root = 12 | ARM_MMU_IDX_A, | 28 | @@ -XXX,XX +XXX,XX @@ static void stellaris_init(MachineState *ms, stellaris_board_info *board) |
30 | + ARMMMUIdx_Phys_Realm = 13 | ARM_MMU_IDX_A, | 29 | flash_size = (((board->dc0 & 0xffff) + 1) << 1) * 1024; |
30 | sram_size = ((board->dc0 >> 18) + 1) * 1024; | ||
31 | |||
32 | + soc_container = object_new("container"); | ||
33 | + object_property_add_child(OBJECT(ms), "soc", soc_container); | ||
34 | + | ||
35 | /* Flash programming is done via the SCU, so pretend it is ROM. */ | ||
36 | memory_region_init_rom(flash, NULL, "stellaris.flash", flash_size, | ||
37 | &error_fatal); | ||
38 | @@ -XXX,XX +XXX,XX @@ static void stellaris_init(MachineState *ms, stellaris_board_info *board) | ||
39 | * need its sysclk output. | ||
40 | */ | ||
41 | ssys_dev = qdev_new(TYPE_STELLARIS_SYS); | ||
42 | + object_property_add_child(soc_container, "sys", OBJECT(ssys_dev)); | ||
31 | 43 | ||
32 | /* | 44 | /* |
33 | * These are not allocated TLBs and are used only for AT system | 45 | * Most devices come preprogrammed with a MAC address in the user data. |
34 | @@ -XXX,XX +XXX,XX @@ typedef enum ARMASIdx { | 46 | @@ -XXX,XX +XXX,XX @@ static void stellaris_init(MachineState *ms, stellaris_board_info *board) |
35 | ARMASIdx_TagS = 3, | 47 | sysbus_realize_and_unref(SYS_BUS_DEVICE(ssys_dev), &error_fatal); |
36 | } ARMASIdx; | 48 | |
37 | 49 | nvic = qdev_new(TYPE_ARMV7M); | |
38 | +static inline ARMMMUIdx arm_space_to_phys(ARMSecuritySpace space) | 50 | + object_property_add_child(soc_container, "v7m", OBJECT(nvic)); |
39 | +{ | 51 | qdev_prop_set_uint32(nvic, "num-irq", NUM_IRQ_LINES); |
40 | + /* Assert the relative order of the physical mmu indexes. */ | 52 | qdev_prop_set_uint8(nvic, "num-prio-bits", NUM_PRIO_BITS); |
41 | + QEMU_BUILD_BUG_ON(ARMSS_Secure != 0); | 53 | qdev_prop_set_string(nvic, "cpu-type", ms->cpu_type); |
42 | + QEMU_BUILD_BUG_ON(ARMMMUIdx_Phys_NS != ARMMMUIdx_Phys_S + ARMSS_NonSecure); | 54 | @@ -XXX,XX +XXX,XX @@ static void stellaris_init(MachineState *ms, stellaris_board_info *board) |
43 | + QEMU_BUILD_BUG_ON(ARMMMUIdx_Phys_Root != ARMMMUIdx_Phys_S + ARMSS_Root); | 55 | |
44 | + QEMU_BUILD_BUG_ON(ARMMMUIdx_Phys_Realm != ARMMMUIdx_Phys_S + ARMSS_Realm); | 56 | dev = qdev_new(TYPE_STELLARIS_GPTM); |
45 | + | 57 | sbd = SYS_BUS_DEVICE(dev); |
46 | + return ARMMMUIdx_Phys_S + space; | 58 | + object_property_add_child(soc_container, "gptm[*]", OBJECT(dev)); |
47 | +} | 59 | qdev_connect_clock_in(dev, "clk", |
48 | + | 60 | qdev_get_clock_out(ssys_dev, "SYSCLK")); |
49 | +static inline ARMSecuritySpace arm_phys_to_space(ARMMMUIdx idx) | 61 | sysbus_realize_and_unref(sbd, &error_fatal); |
50 | +{ | 62 | @@ -XXX,XX +XXX,XX @@ static void stellaris_init(MachineState *ms, stellaris_board_info *board) |
51 | + assert(idx >= ARMMMUIdx_Phys_S && idx <= ARMMMUIdx_Phys_Realm); | 63 | |
52 | + return idx - ARMMMUIdx_Phys_S; | 64 | if (board->dc1 & (1 << 3)) { /* watchdog present */ |
53 | +} | 65 | dev = qdev_new(TYPE_LUMINARY_WATCHDOG); |
54 | + | 66 | - |
55 | static inline bool arm_v7m_csselr_razwi(ARMCPU *cpu) | 67 | + object_property_add_child(soc_container, "wdg", OBJECT(dev)); |
56 | { | 68 | qdev_connect_clock_in(dev, "WDOGCLK", |
57 | /* If all the CLIDR.Ctypem bits are 0 there are no caches, and | 69 | qdev_get_clock_out(ssys_dev, "SYSCLK")); |
58 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c | 70 | |
59 | index XXXXXXX..XXXXXXX 100644 | 71 | @@ -XXX,XX +XXX,XX @@ static void stellaris_init(MachineState *ms, stellaris_board_info *board) |
60 | --- a/target/arm/ptw.c | 72 | SysBusDevice *sbd; |
61 | +++ b/target/arm/ptw.c | 73 | |
62 | @@ -XXX,XX +XXX,XX @@ static bool regime_translation_disabled(CPUARMState *env, ARMMMUIdx mmu_idx, | 74 | dev = qdev_new("pl011_luminary"); |
63 | case ARMMMUIdx_E3: | 75 | + object_property_add_child(soc_container, "uart[*]", OBJECT(dev)); |
64 | break; | 76 | sbd = SYS_BUS_DEVICE(dev); |
65 | 77 | qdev_prop_set_chr(dev, "chardev", serial_hd(i)); | |
66 | - case ARMMMUIdx_Phys_NS: | 78 | sysbus_realize_and_unref(sbd, &error_fatal); |
67 | case ARMMMUIdx_Phys_S: | 79 | @@ -XXX,XX +XXX,XX @@ static void stellaris_init(MachineState *ms, stellaris_board_info *board) |
68 | + case ARMMMUIdx_Phys_NS: | 80 | DeviceState *enet; |
69 | + case ARMMMUIdx_Phys_Root: | 81 | |
70 | + case ARMMMUIdx_Phys_Realm: | 82 | enet = qdev_new("stellaris_enet"); |
71 | /* No translation for physical address spaces. */ | 83 | + object_property_add_child(soc_container, "enet", OBJECT(enet)); |
72 | return true; | 84 | if (nd) { |
73 | 85 | qdev_set_nic_properties(enet, nd); | |
74 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_disabled(CPUARMState *env, target_ulong address, | 86 | } else { |
75 | switch (mmu_idx) { | ||
76 | case ARMMMUIdx_Stage2: | ||
77 | case ARMMMUIdx_Stage2_S: | ||
78 | - case ARMMMUIdx_Phys_NS: | ||
79 | case ARMMMUIdx_Phys_S: | ||
80 | + case ARMMMUIdx_Phys_NS: | ||
81 | + case ARMMMUIdx_Phys_Root: | ||
82 | + case ARMMMUIdx_Phys_Realm: | ||
83 | break; | ||
84 | |||
85 | default: | ||
86 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_with_struct(CPUARMState *env, S1Translate *ptw, | ||
87 | switch (mmu_idx) { | ||
88 | case ARMMMUIdx_Phys_S: | ||
89 | case ARMMMUIdx_Phys_NS: | ||
90 | + case ARMMMUIdx_Phys_Root: | ||
91 | + case ARMMMUIdx_Phys_Realm: | ||
92 | /* Checking Phys early avoids special casing later vs regime_el. */ | ||
93 | return get_phys_addr_disabled(env, address, access_type, mmu_idx, | ||
94 | is_secure, result, fi); | ||
95 | -- | 87 | -- |
96 | 2.34.1 | 88 | 2.34.1 |
97 | 89 | ||
98 | 90 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | We support two different encodings for the AArch32 IMPDEF |
---|---|---|---|
2 | CBAR register -- older cores like the Cortex A9, A7, A15 | ||
3 | have this at 4, c15, c0, 0; newer cores like the | ||
4 | Cortex A35, A53, A57 and A72 have it at 1 c15 c0 0. | ||
2 | 5 | ||
3 | With RME, SEL2 must also be present to support secure state. | 6 | When we implemented this we picked which encoding to |
4 | The NS bit is RES1 if SEL2 is not present. | 7 | use based on whether the CPU set ARM_FEATURE_AARCH64. |
8 | However this isn't right for three cases: | ||
9 | * the qemu-system-arm 'max' CPU, which is supposed to be | ||
10 | a variant on a Cortex-A57; it ought to use the same | ||
11 | encoding the A57 does and which the AArch64 'max' | ||
12 | exposes to AArch32 guest code | ||
13 | * the Cortex-R52, which is AArch32-only but has the CBAR | ||
14 | at the newer encoding (and where we incorrectly are | ||
15 | not yet setting ARM_FEATURE_CBAR_RO anyway) | ||
16 | * any possible future support for other v8 AArch32 | ||
17 | only CPUs, or for supporting "boot the CPU into | ||
18 | AArch32 mode" on our existing cores like the A57 etc | ||
5 | 19 | ||
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 20 | Make the decision of the encoding be based on whether |
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 21 | the CPU implements the ARM_FEATURE_V8 flag instead. |
8 | Message-id: 20230620124418.805717-4-richard.henderson@linaro.org | 22 | |
23 | This changes the behaviour only for the qemu-system-arm | ||
24 | '-cpu max'. We don't expect anybody to be relying on the | ||
25 | old behaviour because: | ||
26 | * it's not what the real hardware Cortex-A57 does | ||
27 | (and that's what our ID register claims we are) | ||
28 | * we don't implement the memory-mapped GICv3 support | ||
29 | which is the only thing that exists at the peripheral | ||
30 | base address pointed to by the register | ||
31 | |||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 32 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
33 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
34 | Message-id: 20240206132931.38376-2-peter.maydell@linaro.org | ||
10 | --- | 35 | --- |
11 | target/arm/helper.c | 3 +++ | 36 | target/arm/helper.c | 2 +- |
12 | 1 file changed, 3 insertions(+) | 37 | 1 file changed, 1 insertion(+), 1 deletion(-) |
13 | 38 | ||
14 | diff --git a/target/arm/helper.c b/target/arm/helper.c | 39 | diff --git a/target/arm/helper.c b/target/arm/helper.c |
15 | index XXXXXXX..XXXXXXX 100644 | 40 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/helper.c | 41 | --- a/target/arm/helper.c |
17 | +++ b/target/arm/helper.c | 42 | +++ b/target/arm/helper.c |
18 | @@ -XXX,XX +XXX,XX @@ static void scr_write(CPUARMState *env, const ARMCPRegInfo *ri, uint64_t value) | 43 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) |
19 | } | 44 | * AArch64 cores we might need to add a specific feature flag |
20 | if (cpu_isar_feature(aa64_sel2, cpu)) { | 45 | * to indicate cores with "flavour 2" CBAR. |
21 | valid_mask |= SCR_EEL2; | 46 | */ |
22 | + } else if (cpu_isar_feature(aa64_rme, cpu)) { | 47 | - if (arm_feature(env, ARM_FEATURE_AARCH64)) { |
23 | + /* With RME and without SEL2, NS is RES1 (R_GSWWH, I_DJJQJ). */ | 48 | + if (arm_feature(env, ARM_FEATURE_V8)) { |
24 | + value |= SCR_NS; | 49 | /* 32 bit view is [31:18] 0...0 [43:32]. */ |
25 | } | 50 | uint32_t cbar32 = (extract64(cpu->reset_cbar, 18, 14) << 18) |
26 | if (cpu_isar_feature(aa64_mte, cpu)) { | 51 | | extract64(cpu->reset_cbar, 32, 12); |
27 | valid_mask |= SCR_ATA; | ||
28 | -- | 52 | -- |
29 | 2.34.1 | 53 | 2.34.1 | diff view generated by jsdifflib |
New patch | |||
---|---|---|---|
1 | The Cortex-R52 implements the Configuration Base Address Register | ||
2 | (CBAR), as a read-only register. Add ARM_FEATURE_CBAR_RO to this CPU | ||
3 | type, so that our implementation provides the register and the | ||
4 | associated qdev property. | ||
1 | 5 | ||
6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20240206132931.38376-3-peter.maydell@linaro.org | ||
9 | --- | ||
10 | target/arm/tcg/cpu32.c | 1 + | ||
11 | 1 file changed, 1 insertion(+) | ||
12 | |||
13 | diff --git a/target/arm/tcg/cpu32.c b/target/arm/tcg/cpu32.c | ||
14 | index XXXXXXX..XXXXXXX 100644 | ||
15 | --- a/target/arm/tcg/cpu32.c | ||
16 | +++ b/target/arm/tcg/cpu32.c | ||
17 | @@ -XXX,XX +XXX,XX @@ static void cortex_r52_initfn(Object *obj) | ||
18 | set_feature(&cpu->env, ARM_FEATURE_PMSA); | ||
19 | set_feature(&cpu->env, ARM_FEATURE_NEON); | ||
20 | set_feature(&cpu->env, ARM_FEATURE_GENERIC_TIMER); | ||
21 | + set_feature(&cpu->env, ARM_FEATURE_CBAR_RO); | ||
22 | cpu->midr = 0x411fd133; /* r1p3 */ | ||
23 | cpu->revidr = 0x00000000; | ||
24 | cpu->reset_fpsid = 0x41034023; | ||
25 | -- | ||
26 | 2.34.1 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | Add the Cortex-R52 IMPDEF sysregs, by defining them here and |
---|---|---|---|
2 | also by enabling the AUXCR feature which defines the ACTLR | ||
3 | and HACTLR registers. As is our usual practice, we make these | ||
4 | simple reads-as-zero stubs for now. | ||
2 | 5 | ||
3 | The function takes the fields as filled in by | 6 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
4 | the Arm ARM pseudocode for TakeGPCException. | 7 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
8 | Message-id: 20240206132931.38376-4-peter.maydell@linaro.org | ||
9 | --- | ||
10 | target/arm/tcg/cpu32.c | 108 +++++++++++++++++++++++++++++++++++++++++ | ||
11 | 1 file changed, 108 insertions(+) | ||
5 | 12 | ||
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 13 | diff --git a/target/arm/tcg/cpu32.c b/target/arm/tcg/cpu32.c |
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20230620124418.805717-18-richard.henderson@linaro.org | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | --- | ||
11 | target/arm/syndrome.h | 10 ++++++++++ | ||
12 | 1 file changed, 10 insertions(+) | ||
13 | |||
14 | diff --git a/target/arm/syndrome.h b/target/arm/syndrome.h | ||
15 | index XXXXXXX..XXXXXXX 100644 | 14 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/syndrome.h | 15 | --- a/target/arm/tcg/cpu32.c |
17 | +++ b/target/arm/syndrome.h | 16 | +++ b/target/arm/tcg/cpu32.c |
18 | @@ -XXX,XX +XXX,XX @@ enum arm_exception_class { | 17 | @@ -XXX,XX +XXX,XX @@ static void cortex_r5_initfn(Object *obj) |
19 | EC_SVEACCESSTRAP = 0x19, | 18 | define_arm_cp_regs(cpu, cortexr5_cp_reginfo); |
20 | EC_ERETTRAP = 0x1a, | ||
21 | EC_SMETRAP = 0x1d, | ||
22 | + EC_GPC = 0x1e, | ||
23 | EC_INSNABORT = 0x20, | ||
24 | EC_INSNABORT_SAME_EL = 0x21, | ||
25 | EC_PCALIGNMENT = 0x22, | ||
26 | @@ -XXX,XX +XXX,XX @@ static inline uint32_t syn_bxjtrap(int cv, int cond, int rm) | ||
27 | (cv << 24) | (cond << 20) | rm; | ||
28 | } | 19 | } |
29 | 20 | ||
30 | +static inline uint32_t syn_gpc(int s2ptw, int ind, int gpcsc, | 21 | +static const ARMCPRegInfo cortex_r52_cp_reginfo[] = { |
31 | + int cm, int s1ptw, int wnr, int fsc) | 22 | + { .name = "CPUACTLR", .cp = 15, .opc1 = 0, .crm = 15, |
32 | +{ | 23 | + .access = PL1_RW, .type = ARM_CP_CONST | ARM_CP_64BIT, .resetvalue = 0 }, |
33 | + /* TODO: FEAT_NV2 adds VNCR */ | 24 | + { .name = "IMP_ATCMREGIONR", |
34 | + return (EC_GPC << ARM_EL_EC_SHIFT) | ARM_EL_IL | (s2ptw << 21) | 25 | + .cp = 15, .opc1 = 0, .crn = 9, .crm = 1, .opc2 = 0, |
35 | + | (ind << 20) | (gpcsc << 14) | (cm << 8) | (s1ptw << 7) | 26 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, |
36 | + | (wnr << 6) | fsc; | 27 | + { .name = "IMP_BTCMREGIONR", |
37 | +} | 28 | + .cp = 15, .opc1 = 0, .crn = 9, .crm = 1, .opc2 = 1, |
29 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
30 | + { .name = "IMP_CTCMREGIONR", | ||
31 | + .cp = 15, .opc1 = 0, .crn = 9, .crm = 1, .opc2 = 2, | ||
32 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
33 | + { .name = "IMP_CSCTLR", | ||
34 | + .cp = 15, .opc1 = 1, .crn = 9, .crm = 1, .opc2 = 0, | ||
35 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
36 | + { .name = "IMP_BPCTLR", | ||
37 | + .cp = 15, .opc1 = 1, .crn = 9, .crm = 1, .opc2 = 1, | ||
38 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
39 | + { .name = "IMP_MEMPROTCLR", | ||
40 | + .cp = 15, .opc1 = 1, .crn = 9, .crm = 1, .opc2 = 2, | ||
41 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
42 | + { .name = "IMP_SLAVEPCTLR", | ||
43 | + .cp = 15, .opc1 = 0, .crn = 11, .crm = 0, .opc2 = 0, | ||
44 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
45 | + { .name = "IMP_PERIPHREGIONR", | ||
46 | + .cp = 15, .opc1 = 0, .crn = 15, .crm = 0, .opc2 = 0, | ||
47 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
48 | + { .name = "IMP_FLASHIFREGIONR", | ||
49 | + .cp = 15, .opc1 = 0, .crn = 15, .crm = 0, .opc2 = 1, | ||
50 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
51 | + { .name = "IMP_BUILDOPTR", | ||
52 | + .cp = 15, .opc1 = 0, .crn = 15, .crm = 2, .opc2 = 0, | ||
53 | + .access = PL1_R, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
54 | + { .name = "IMP_PINOPTR", | ||
55 | + .cp = 15, .opc1 = 0, .crn = 15, .crm = 2, .opc2 = 7, | ||
56 | + .access = PL1_R, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
57 | + { .name = "IMP_QOSR", | ||
58 | + .cp = 15, .opc1 = 1, .crn = 15, .crm = 3, .opc2 = 1, | ||
59 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
60 | + { .name = "IMP_BUSTIMEOUTR", | ||
61 | + .cp = 15, .opc1 = 1, .crn = 15, .crm = 3, .opc2 = 2, | ||
62 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
63 | + { .name = "IMP_INTMONR", | ||
64 | + .cp = 15, .opc1 = 1, .crn = 15, .crm = 3, .opc2 = 4, | ||
65 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
66 | + { .name = "IMP_ICERR0", | ||
67 | + .cp = 15, .opc1 = 2, .crn = 15, .crm = 0, .opc2 = 0, | ||
68 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
69 | + { .name = "IMP_ICERR1", | ||
70 | + .cp = 15, .opc1 = 2, .crn = 15, .crm = 0, .opc2 = 1, | ||
71 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
72 | + { .name = "IMP_DCERR0", | ||
73 | + .cp = 15, .opc1 = 2, .crn = 15, .crm = 1, .opc2 = 0, | ||
74 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
75 | + { .name = "IMP_DCERR1", | ||
76 | + .cp = 15, .opc1 = 2, .crn = 15, .crm = 1, .opc2 = 1, | ||
77 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
78 | + { .name = "IMP_TCMERR0", | ||
79 | + .cp = 15, .opc1 = 2, .crn = 15, .crm = 2, .opc2 = 0, | ||
80 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
81 | + { .name = "IMP_TCMERR1", | ||
82 | + .cp = 15, .opc1 = 2, .crn = 15, .crm = 2, .opc2 = 1, | ||
83 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
84 | + { .name = "IMP_TCMSYNDR0", | ||
85 | + .cp = 15, .opc1 = 2, .crn = 15, .crm = 2, .opc2 = 2, | ||
86 | + .access = PL1_R, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
87 | + { .name = "IMP_TCMSYNDR1", | ||
88 | + .cp = 15, .opc1 = 2, .crn = 15, .crm = 2, .opc2 = 3, | ||
89 | + .access = PL1_R, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
90 | + { .name = "IMP_FLASHERR0", | ||
91 | + .cp = 15, .opc1 = 2, .crn = 15, .crm = 3, .opc2 = 0, | ||
92 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
93 | + { .name = "IMP_FLASHERR1", | ||
94 | + .cp = 15, .opc1 = 2, .crn = 15, .crm = 3, .opc2 = 1, | ||
95 | + .access = PL1_RW, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
96 | + { .name = "IMP_CDBGDR0", | ||
97 | + .cp = 15, .opc1 = 3, .crn = 15, .crm = 0, .opc2 = 0, | ||
98 | + .access = PL1_R, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
99 | + { .name = "IMP_CBDGBR1", | ||
100 | + .cp = 15, .opc1 = 3, .crn = 15, .crm = 0, .opc2 = 1, | ||
101 | + .access = PL1_R, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
102 | + { .name = "IMP_TESTR0", | ||
103 | + .cp = 15, .opc1 = 4, .crn = 15, .crm = 0, .opc2 = 0, | ||
104 | + .access = PL1_R, .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
105 | + { .name = "IMP_TESTR1", | ||
106 | + .cp = 15, .opc1 = 4, .crn = 15, .crm = 0, .opc2 = 1, | ||
107 | + .access = PL1_W, .type = ARM_CP_NOP, .resetvalue = 0 }, | ||
108 | + { .name = "IMP_CDBGDCI", | ||
109 | + .cp = 15, .opc1 = 0, .crn = 15, .crm = 15, .opc2 = 0, | ||
110 | + .access = PL1_W, .type = ARM_CP_NOP, .resetvalue = 0 }, | ||
111 | + { .name = "IMP_CDBGDCT", | ||
112 | + .cp = 15, .opc1 = 3, .crn = 15, .crm = 2, .opc2 = 0, | ||
113 | + .access = PL1_W, .type = ARM_CP_NOP, .resetvalue = 0 }, | ||
114 | + { .name = "IMP_CDBGICT", | ||
115 | + .cp = 15, .opc1 = 3, .crn = 15, .crm = 2, .opc2 = 1, | ||
116 | + .access = PL1_W, .type = ARM_CP_NOP, .resetvalue = 0 }, | ||
117 | + { .name = "IMP_CDBGDCD", | ||
118 | + .cp = 15, .opc1 = 3, .crn = 15, .crm = 4, .opc2 = 0, | ||
119 | + .access = PL1_W, .type = ARM_CP_NOP, .resetvalue = 0 }, | ||
120 | + { .name = "IMP_CDBGICD", | ||
121 | + .cp = 15, .opc1 = 3, .crn = 15, .crm = 4, .opc2 = 1, | ||
122 | + .access = PL1_W, .type = ARM_CP_NOP, .resetvalue = 0 }, | ||
123 | +}; | ||
38 | + | 124 | + |
39 | static inline uint32_t syn_insn_abort(int same_el, int ea, int s1ptw, int fsc) | 125 | + |
126 | static void cortex_r52_initfn(Object *obj) | ||
40 | { | 127 | { |
41 | return (EC_INSNABORT << ARM_EL_EC_SHIFT) | (same_el << ARM_EL_EC_SHIFT) | 128 | ARMCPU *cpu = ARM_CPU(obj); |
129 | @@ -XXX,XX +XXX,XX @@ static void cortex_r52_initfn(Object *obj) | ||
130 | set_feature(&cpu->env, ARM_FEATURE_NEON); | ||
131 | set_feature(&cpu->env, ARM_FEATURE_GENERIC_TIMER); | ||
132 | set_feature(&cpu->env, ARM_FEATURE_CBAR_RO); | ||
133 | + set_feature(&cpu->env, ARM_FEATURE_AUXCR); | ||
134 | cpu->midr = 0x411fd133; /* r1p3 */ | ||
135 | cpu->revidr = 0x00000000; | ||
136 | cpu->reset_fpsid = 0x41034023; | ||
137 | @@ -XXX,XX +XXX,XX @@ static void cortex_r52_initfn(Object *obj) | ||
138 | |||
139 | cpu->pmsav7_dregion = 16; | ||
140 | cpu->pmsav8r_hdregion = 16; | ||
141 | + | ||
142 | + define_arm_cp_regs(cpu, cortex_r52_cp_reginfo); | ||
143 | } | ||
144 | |||
145 | static void cortex_r5f_initfn(Object *obj) | ||
42 | -- | 146 | -- |
43 | 2.34.1 | 147 | 2.34.1 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | Architecturally, the AArch32 MSR/MRS to/from banked register |
---|---|---|---|
2 | instructions are UNPREDICTABLE for attempts to access a banked | ||
3 | register that the guest could access in a more direct way (e.g. | ||
4 | using this insn to access r8_fiq when already in FIQ mode). QEMU has | ||
5 | chosen to UNDEF on all of these. | ||
2 | 6 | ||
3 | While Root and Realm may read and write data from other spaces, | 7 | However, for the case of accessing SPSR_hyp from hyp mode, it turns |
4 | neither may execute from other pa spaces. | 8 | out that real hardware permits this, with the same effect as if the |
9 | guest had directly written to SPSR. Further, there is some | ||
10 | guest code out there that assumes it can do this, because it | ||
11 | happens to work on hardware: an example Cortex-R52 startup code | ||
12 | fragment uses this, and it got copied into various other places, | ||
13 | including Zephyr. Zephyr was fixed to not use this: | ||
14 | https://github.com/zephyrproject-rtos/zephyr/issues/47330 | ||
15 | but other examples are still out there, like the selftest | ||
16 | binary for the MPS3-AN536. | ||
5 | 17 | ||
6 | This happens for Stage1 EL3, EL2, EL2&0, and Stage2 EL1&0. | 18 | For convenience of being able to run guest code, permit |
19 | this UNPREDICTABLE access instead of UNDEFing it. | ||
7 | 20 | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
9 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
10 | Message-id: 20230620124418.805717-14-richard.henderson@linaro.org | ||
11 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 21 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
22 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
23 | Message-id: 20240206132931.38376-5-peter.maydell@linaro.org | ||
12 | --- | 24 | --- |
13 | target/arm/ptw.c | 52 ++++++++++++++++++++++++++++++++++++++++++------ | 25 | target/arm/tcg/op_helper.c | 43 ++++++++++++++++++++++++++------------ |
14 | 1 file changed, 46 insertions(+), 6 deletions(-) | 26 | target/arm/tcg/translate.c | 19 +++++++++++------ |
27 | 2 files changed, 43 insertions(+), 19 deletions(-) | ||
15 | 28 | ||
16 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c | 29 | diff --git a/target/arm/tcg/op_helper.c b/target/arm/tcg/op_helper.c |
17 | index XXXXXXX..XXXXXXX 100644 | 30 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/target/arm/ptw.c | 31 | --- a/target/arm/tcg/op_helper.c |
19 | +++ b/target/arm/ptw.c | 32 | +++ b/target/arm/tcg/op_helper.c |
20 | @@ -XXX,XX +XXX,XX @@ do_fault: | 33 | @@ -XXX,XX +XXX,XX @@ static void msr_mrs_banked_exc_checks(CPUARMState *env, uint32_t tgtmode, |
21 | * @xn: XN (execute-never) bits | 34 | */ |
22 | * @s1_is_el0: true if this is S2 of an S1+2 walk for EL0 | 35 | int curmode = env->uncached_cpsr & CPSR_M; |
23 | */ | 36 | |
24 | -static int get_S2prot(CPUARMState *env, int s2ap, int xn, bool s1_is_el0) | 37 | - if (regno == 17) { |
25 | +static int get_S2prot_noexecute(int s2ap) | 38 | - /* ELR_Hyp: a special case because access from tgtmode is OK */ |
26 | { | 39 | - if (curmode != ARM_CPU_MODE_HYP && curmode != ARM_CPU_MODE_MON) { |
27 | int prot = 0; | 40 | - goto undef; |
28 | 41 | + if (tgtmode == ARM_CPU_MODE_HYP) { | |
29 | @@ -XXX,XX +XXX,XX @@ static int get_S2prot(CPUARMState *env, int s2ap, int xn, bool s1_is_el0) | 42 | + /* |
30 | if (s2ap & 2) { | 43 | + * Handle Hyp target regs first because some are special cases |
31 | prot |= PAGE_WRITE; | 44 | + * which don't want the usual "not accessible from tgtmode" check. |
32 | } | 45 | + */ |
33 | + return prot; | 46 | + switch (regno) { |
34 | +} | 47 | + case 16 ... 17: /* ELR_Hyp, SPSR_Hyp */ |
35 | + | 48 | + if (curmode != ARM_CPU_MODE_HYP && curmode != ARM_CPU_MODE_MON) { |
36 | +static int get_S2prot(CPUARMState *env, int s2ap, int xn, bool s1_is_el0) | 49 | + goto undef; |
37 | +{ | ||
38 | + int prot = get_S2prot_noexecute(s2ap); | ||
39 | |||
40 | if (cpu_isar_feature(any_tts2uxn, env_archcpu(env))) { | ||
41 | switch (xn) { | ||
42 | @@ -XXX,XX +XXX,XX @@ static int get_S1prot(CPUARMState *env, ARMMMUIdx mmu_idx, bool is_aa64, | ||
43 | } | ||
44 | } | ||
45 | |||
46 | - if (out_pa == ARMSS_NonSecure && in_pa == ARMSS_Secure && | ||
47 | - (env->cp15.scr_el3 & SCR_SIF)) { | ||
48 | - return prot_rw; | ||
49 | + if (in_pa != out_pa) { | ||
50 | + switch (in_pa) { | ||
51 | + case ARMSS_Root: | ||
52 | + /* | ||
53 | + * R_ZWRVD: permission fault for insn fetched from non-Root, | ||
54 | + * I_WWBFB: SIF has no effect in EL3. | ||
55 | + */ | ||
56 | + return prot_rw; | ||
57 | + case ARMSS_Realm: | ||
58 | + /* | ||
59 | + * R_PKTDS: permission fault for insn fetched from non-Realm, | ||
60 | + * for Realm EL2 or EL2&0. The corresponding fault for EL1&0 | ||
61 | + * happens during any stage2 translation. | ||
62 | + */ | ||
63 | + switch (mmu_idx) { | ||
64 | + case ARMMMUIdx_E2: | ||
65 | + case ARMMMUIdx_E20_0: | ||
66 | + case ARMMMUIdx_E20_2: | ||
67 | + case ARMMMUIdx_E20_2_PAN: | ||
68 | + return prot_rw; | ||
69 | + default: | ||
70 | + break; | ||
71 | + } | 50 | + } |
72 | + break; | 51 | + break; |
73 | + case ARMSS_Secure: | 52 | + case 13: |
74 | + if (env->cp15.scr_el3 & SCR_SIF) { | 53 | + if (curmode != ARM_CPU_MODE_MON) { |
75 | + return prot_rw; | 54 | + goto undef; |
76 | + } | 55 | + } |
77 | + break; | 56 | + break; |
78 | + default: | 57 | + default: |
79 | + /* Input NonSecure must have output NonSecure. */ | ||
80 | + g_assert_not_reached(); | 58 | + g_assert_not_reached(); |
59 | } | ||
60 | return; | ||
61 | } | ||
62 | @@ -XXX,XX +XXX,XX @@ static void msr_mrs_banked_exc_checks(CPUARMState *env, uint32_t tgtmode, | ||
63 | } | ||
64 | } | ||
65 | |||
66 | - if (tgtmode == ARM_CPU_MODE_HYP) { | ||
67 | - /* SPSR_Hyp, r13_hyp: accessible from Monitor mode only */ | ||
68 | - if (curmode != ARM_CPU_MODE_MON) { | ||
69 | - goto undef; | ||
70 | - } | ||
71 | - } | ||
72 | - | ||
73 | return; | ||
74 | |||
75 | undef: | ||
76 | @@ -XXX,XX +XXX,XX @@ void HELPER(msr_banked)(CPUARMState *env, uint32_t value, uint32_t tgtmode, | ||
77 | |||
78 | switch (regno) { | ||
79 | case 16: /* SPSRs */ | ||
80 | - env->banked_spsr[bank_number(tgtmode)] = value; | ||
81 | + if (tgtmode == (env->uncached_cpsr & CPSR_M)) { | ||
82 | + /* Only happens for SPSR_Hyp access in Hyp mode */ | ||
83 | + env->spsr = value; | ||
84 | + } else { | ||
85 | + env->banked_spsr[bank_number(tgtmode)] = value; | ||
81 | + } | 86 | + } |
82 | } | 87 | break; |
83 | 88 | case 17: /* ELR_Hyp */ | |
84 | /* TODO have_wxn should be replaced with | 89 | env->elr_el[2] = value; |
85 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw, | 90 | @@ -XXX,XX +XXX,XX @@ uint32_t HELPER(mrs_banked)(CPUARMState *env, uint32_t tgtmode, uint32_t regno) |
91 | |||
92 | switch (regno) { | ||
93 | case 16: /* SPSRs */ | ||
94 | - return env->banked_spsr[bank_number(tgtmode)]; | ||
95 | + if (tgtmode == (env->uncached_cpsr & CPSR_M)) { | ||
96 | + /* Only happens for SPSR_Hyp access in Hyp mode */ | ||
97 | + return env->spsr; | ||
98 | + } else { | ||
99 | + return env->banked_spsr[bank_number(tgtmode)]; | ||
100 | + } | ||
101 | case 17: /* ELR_Hyp */ | ||
102 | return env->elr_el[2]; | ||
103 | case 13: | ||
104 | diff --git a/target/arm/tcg/translate.c b/target/arm/tcg/translate.c | ||
105 | index XXXXXXX..XXXXXXX 100644 | ||
106 | --- a/target/arm/tcg/translate.c | ||
107 | +++ b/target/arm/tcg/translate.c | ||
108 | @@ -XXX,XX +XXX,XX @@ static bool msr_banked_access_decode(DisasContext *s, int r, int sysm, int rn, | ||
109 | break; | ||
110 | case ARM_CPU_MODE_HYP: | ||
86 | /* | 111 | /* |
87 | * R_GYNXY: For stage2 in Realm security state, bit 55 is NS. | 112 | - * SPSR_hyp and r13_hyp can only be accessed from Monitor mode |
88 | * The bit remains ignored for other security states. | 113 | - * (and so we can forbid accesses from EL2 or below). elr_hyp |
89 | + * R_YMCSL: Executing an insn fetched from non-Realm causes | 114 | - * can be accessed also from Hyp mode, so forbid accesses from |
90 | + * a stage2 permission fault. | 115 | - * EL0 or EL1. |
116 | + * r13_hyp can only be accessed from Monitor mode, and so we | ||
117 | + * can forbid accesses from EL2 or below. | ||
118 | + * elr_hyp can be accessed also from Hyp mode, so forbid | ||
119 | + * accesses from EL0 or EL1. | ||
120 | + * SPSR_hyp is supposed to be in the same category as r13_hyp | ||
121 | + * and UNPREDICTABLE if accessed from anything except Monitor | ||
122 | + * mode. However there is some real-world code that will do | ||
123 | + * it because at least some hardware happens to permit the | ||
124 | + * access. (Notably a standard Cortex-R52 startup code fragment | ||
125 | + * does this.) So we permit SPSR_hyp from Hyp mode also, to allow | ||
126 | + * this (incorrect) guest code to run. | ||
91 | */ | 127 | */ |
92 | if (out_space == ARMSS_Realm && extract64(attrs, 55, 1)) { | 128 | - if (!arm_dc_feature(s, ARM_FEATURE_EL2) || s->current_el < 2 || |
93 | out_space = ARMSS_NonSecure; | 129 | - (s->current_el < 3 && *regno != 17)) { |
94 | + result->f.prot = get_S2prot_noexecute(ap); | 130 | + if (!arm_dc_feature(s, ARM_FEATURE_EL2) || s->current_el < 2 |
95 | + } else { | 131 | + || (s->current_el < 3 && *regno != 16 && *regno != 17)) { |
96 | + xn = extract64(attrs, 53, 2); | 132 | goto undef; |
97 | + result->f.prot = get_S2prot(env, ap, xn, s1_is_el0); | ||
98 | } | 133 | } |
99 | - xn = extract64(attrs, 53, 2); | 134 | break; |
100 | - result->f.prot = get_S2prot(env, ap, xn, s1_is_el0); | ||
101 | } else { | ||
102 | int nse, ns = extract32(attrs, 5, 1); | ||
103 | switch (out_space) { | ||
104 | -- | 135 | -- |
105 | 2.34.1 | 136 | 2.34.1 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | We currently guard the CFG3 register read with |
---|---|---|---|
2 | (scc_partno(s) == 0x524 && scc_partno(s) == 0x547) | ||
3 | which is clearly wrong as it is never true. | ||
2 | 4 | ||
3 | Instead of passing this to get_phys_addr_lpae, stash it | 5 | This register is present on all board types except AN524 |
4 | in the S1Translate structure. | 6 | and AN527; correct the condition. |
5 | 7 | ||
8 | Fixes: 6ac80818941829c0 ("hw/misc/mps2-scc: Implement changes for AN547") | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
6 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> | 10 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> |
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 11 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
8 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | 12 | Message-id: 20240206132931.38376-6-peter.maydell@linaro.org |
9 | Message-id: 20230620124418.805717-16-richard.henderson@linaro.org | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | 13 | --- |
12 | target/arm/ptw.c | 27 ++++++++++++--------------- | 14 | hw/misc/mps2-scc.c | 2 +- |
13 | 1 file changed, 12 insertions(+), 15 deletions(-) | 15 | 1 file changed, 1 insertion(+), 1 deletion(-) |
14 | 16 | ||
15 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c | 17 | diff --git a/hw/misc/mps2-scc.c b/hw/misc/mps2-scc.c |
16 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/ptw.c | 19 | --- a/hw/misc/mps2-scc.c |
18 | +++ b/target/arm/ptw.c | 20 | +++ b/hw/misc/mps2-scc.c |
19 | @@ -XXX,XX +XXX,XX @@ typedef struct S1Translate { | 21 | @@ -XXX,XX +XXX,XX @@ static uint64_t mps2_scc_read(void *opaque, hwaddr offset, unsigned size) |
20 | ARMSecuritySpace in_space; | 22 | r = s->cfg2; |
21 | bool in_secure; | 23 | break; |
22 | bool in_debug; | 24 | case A_CFG3: |
23 | + /* | 25 | - if (scc_partno(s) == 0x524 && scc_partno(s) == 0x547) { |
24 | + * If this is stage 2 of a stage 1+2 page table walk, then this must | 26 | + if (scc_partno(s) == 0x524 || scc_partno(s) == 0x547) { |
25 | + * be true if stage 1 is an EL0 access; otherwise this is ignored. | 27 | /* CFG3 reserved on AN524 */ |
26 | + * Stage 2 is indicated by in_mmu_idx set to ARMMMUIdx_Stage2{,_S}. | 28 | goto bad_offset; |
27 | + */ | ||
28 | + bool in_s1_is_el0; | ||
29 | bool out_secure; | ||
30 | bool out_rw; | ||
31 | bool out_be; | ||
32 | @@ -XXX,XX +XXX,XX @@ typedef struct S1Translate { | ||
33 | } S1Translate; | ||
34 | |||
35 | static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw, | ||
36 | - uint64_t address, | ||
37 | - MMUAccessType access_type, bool s1_is_el0, | ||
38 | + uint64_t address, MMUAccessType access_type, | ||
39 | GetPhysAddrResult *result, ARMMMUFaultInfo *fi); | ||
40 | |||
41 | static bool get_phys_addr_with_struct(CPUARMState *env, S1Translate *ptw, | ||
42 | @@ -XXX,XX +XXX,XX @@ static int check_s2_mmu_setup(ARMCPU *cpu, bool is_aa64, uint64_t tcr, | ||
43 | * @ptw: Current and next stage parameters for the walk. | ||
44 | * @address: virtual address to get physical address for | ||
45 | * @access_type: MMU_DATA_LOAD, MMU_DATA_STORE or MMU_INST_FETCH | ||
46 | - * @s1_is_el0: if @ptw->in_mmu_idx is ARMMMUIdx_Stage2 | ||
47 | - * (so this is a stage 2 page table walk), | ||
48 | - * must be true if this is stage 2 of a stage 1+2 | ||
49 | - * walk for an EL0 access. If @mmu_idx is anything else, | ||
50 | - * @s1_is_el0 is ignored. | ||
51 | * @result: set on translation success, | ||
52 | * @fi: set to fault info if the translation fails | ||
53 | */ | ||
54 | static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw, | ||
55 | uint64_t address, | ||
56 | - MMUAccessType access_type, bool s1_is_el0, | ||
57 | + MMUAccessType access_type, | ||
58 | GetPhysAddrResult *result, ARMMMUFaultInfo *fi) | ||
59 | { | ||
60 | ARMCPU *cpu = env_archcpu(env); | ||
61 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw, | ||
62 | result->f.prot = get_S2prot_noexecute(ap); | ||
63 | } else { | ||
64 | xn = extract64(attrs, 53, 2); | ||
65 | - result->f.prot = get_S2prot(env, ap, xn, s1_is_el0); | ||
66 | + result->f.prot = get_S2prot(env, ap, xn, ptw->in_s1_is_el0); | ||
67 | } | 29 | } |
68 | } else { | ||
69 | int nse, ns = extract32(attrs, 5, 1); | ||
70 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw, | ||
71 | bool ret, ipa_secure; | ||
72 | ARMCacheAttrs cacheattrs1; | ||
73 | ARMSecuritySpace ipa_space; | ||
74 | - bool is_el0; | ||
75 | uint64_t hcr; | ||
76 | |||
77 | ret = get_phys_addr_with_struct(env, ptw, address, access_type, result, fi); | ||
78 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw, | ||
79 | ipa_secure = result->f.attrs.secure; | ||
80 | ipa_space = result->f.attrs.space; | ||
81 | |||
82 | - is_el0 = ptw->in_mmu_idx == ARMMMUIdx_Stage1_E0; | ||
83 | + ptw->in_s1_is_el0 = ptw->in_mmu_idx == ARMMMUIdx_Stage1_E0; | ||
84 | ptw->in_mmu_idx = ipa_secure ? ARMMMUIdx_Stage2_S : ARMMMUIdx_Stage2; | ||
85 | ptw->in_secure = ipa_secure; | ||
86 | ptw->in_space = ipa_space; | ||
87 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw, | ||
88 | ret = get_phys_addr_pmsav8(env, ipa, access_type, | ||
89 | ptw->in_mmu_idx, is_secure, result, fi); | ||
90 | } else { | ||
91 | - ret = get_phys_addr_lpae(env, ptw, ipa, access_type, | ||
92 | - is_el0, result, fi); | ||
93 | + ret = get_phys_addr_lpae(env, ptw, ipa, access_type, result, fi); | ||
94 | } | ||
95 | fi->s2addr = ipa; | ||
96 | |||
97 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_with_struct(CPUARMState *env, S1Translate *ptw, | ||
98 | } | ||
99 | |||
100 | if (regime_using_lpae_format(env, mmu_idx)) { | ||
101 | - return get_phys_addr_lpae(env, ptw, address, access_type, false, | ||
102 | - result, fi); | ||
103 | + return get_phys_addr_lpae(env, ptw, address, access_type, result, fi); | ||
104 | } else if (arm_feature(env, ARM_FEATURE_V7) || | ||
105 | regime_sctlr(env, mmu_idx) & SCTLR_XP) { | ||
106 | return get_phys_addr_v6(env, ptw, address, access_type, result, fi); | ||
107 | -- | 30 | -- |
108 | 2.34.1 | 31 | 2.34.1 |
109 | 32 | ||
110 | 33 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | The MPS SCC device has a lot of different flavours for the various |
---|---|---|---|
2 | different MPS FPGA images, which look mostly similar but have | ||
3 | differences in how particular registers are handled. Currently we | ||
4 | deal with this with a lot of open-coded checks on scc_partno(), but | ||
5 | as we add more board types this is getting a bit hard to read. | ||
2 | 6 | ||
3 | This includes GPCCR, GPTBR, MFAR, the TLB flush insns PAALL, PAALLOS, | 7 | Factor out the conditions into some functions which we can |
4 | RPALOS, RPAOS, and the cache flush insns CIPAPA and CIGDPAPA. | 8 | give more descriptive names to. |
5 | 9 | ||
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20230620124418.805717-5-richard.henderson@linaro.org | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
11 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> | ||
12 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | ||
13 | Message-id: 20240206132931.38376-7-peter.maydell@linaro.org | ||
10 | --- | 14 | --- |
11 | target/arm/cpu.h | 19 ++++++++++ | 15 | hw/misc/mps2-scc.c | 45 +++++++++++++++++++++++++++++++-------------- |
12 | target/arm/helper.c | 84 +++++++++++++++++++++++++++++++++++++++++++++ | 16 | 1 file changed, 31 insertions(+), 14 deletions(-) |
13 | 2 files changed, 103 insertions(+) | ||
14 | 17 | ||
15 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 18 | diff --git a/hw/misc/mps2-scc.c b/hw/misc/mps2-scc.c |
16 | index XXXXXXX..XXXXXXX 100644 | 19 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/cpu.h | 20 | --- a/hw/misc/mps2-scc.c |
18 | +++ b/target/arm/cpu.h | 21 | +++ b/hw/misc/mps2-scc.c |
19 | @@ -XXX,XX +XXX,XX @@ typedef struct CPUArchState { | 22 | @@ -XXX,XX +XXX,XX @@ static int scc_partno(MPS2SCC *s) |
20 | uint64_t fgt_read[2]; /* HFGRTR, HDFGRTR */ | 23 | return extract32(s->id, 4, 8); |
21 | uint64_t fgt_write[2]; /* HFGWTR, HDFGWTR */ | 24 | } |
22 | uint64_t fgt_exec[1]; /* HFGITR */ | 25 | |
23 | + | 26 | +/* Is CFG_REG2 present? */ |
24 | + /* RME registers */ | 27 | +static bool have_cfg2(MPS2SCC *s) |
25 | + uint64_t gpccr_el3; | ||
26 | + uint64_t gptbr_el3; | ||
27 | + uint64_t mfar_el3; | ||
28 | } cp15; | ||
29 | |||
30 | struct { | ||
31 | @@ -XXX,XX +XXX,XX @@ struct ArchCPU { | ||
32 | uint64_t reset_cbar; | ||
33 | uint32_t reset_auxcr; | ||
34 | bool reset_hivecs; | ||
35 | + uint8_t reset_l0gptsz; | ||
36 | |||
37 | /* | ||
38 | * Intermediate values used during property parsing. | ||
39 | @@ -XXX,XX +XXX,XX @@ FIELD(MVFR1, SIMDFMAC, 28, 4) | ||
40 | FIELD(MVFR2, SIMDMISC, 0, 4) | ||
41 | FIELD(MVFR2, FPMISC, 4, 4) | ||
42 | |||
43 | +FIELD(GPCCR, PPS, 0, 3) | ||
44 | +FIELD(GPCCR, IRGN, 8, 2) | ||
45 | +FIELD(GPCCR, ORGN, 10, 2) | ||
46 | +FIELD(GPCCR, SH, 12, 2) | ||
47 | +FIELD(GPCCR, PGS, 14, 2) | ||
48 | +FIELD(GPCCR, GPC, 16, 1) | ||
49 | +FIELD(GPCCR, GPCP, 17, 1) | ||
50 | +FIELD(GPCCR, L0GPTSZ, 20, 4) | ||
51 | + | ||
52 | +FIELD(MFAR, FPA, 12, 40) | ||
53 | +FIELD(MFAR, NSE, 62, 1) | ||
54 | +FIELD(MFAR, NS, 63, 1) | ||
55 | + | ||
56 | QEMU_BUILD_BUG_ON(ARRAY_SIZE(((ARMCPU *)0)->ccsidr) <= R_V7M_CSSELR_INDEX_MASK); | ||
57 | |||
58 | /* If adding a feature bit which corresponds to a Linux ELF | ||
59 | diff --git a/target/arm/helper.c b/target/arm/helper.c | ||
60 | index XXXXXXX..XXXXXXX 100644 | ||
61 | --- a/target/arm/helper.c | ||
62 | +++ b/target/arm/helper.c | ||
63 | @@ -XXX,XX +XXX,XX @@ static const ARMCPRegInfo sme_reginfo[] = { | ||
64 | .access = PL2_RW, .accessfn = access_esm, | ||
65 | .type = ARM_CP_CONST, .resetvalue = 0 }, | ||
66 | }; | ||
67 | + | ||
68 | +static void tlbi_aa64_paall_write(CPUARMState *env, const ARMCPRegInfo *ri, | ||
69 | + uint64_t value) | ||
70 | +{ | 28 | +{ |
71 | + CPUState *cs = env_cpu(env); | 29 | + return scc_partno(s) == 0x524 || scc_partno(s) == 0x547; |
72 | + | ||
73 | + tlb_flush(cs); | ||
74 | +} | 30 | +} |
75 | + | 31 | + |
76 | +static void gpccr_write(CPUARMState *env, const ARMCPRegInfo *ri, | 32 | +/* Is CFG_REG3 present? */ |
77 | + uint64_t value) | 33 | +static bool have_cfg3(MPS2SCC *s) |
78 | +{ | 34 | +{ |
79 | + /* L0GPTSZ is RO; other bits not mentioned are RES0. */ | 35 | + return scc_partno(s) != 0x524 && scc_partno(s) != 0x547; |
80 | + uint64_t rw_mask = R_GPCCR_PPS_MASK | R_GPCCR_IRGN_MASK | | ||
81 | + R_GPCCR_ORGN_MASK | R_GPCCR_SH_MASK | R_GPCCR_PGS_MASK | | ||
82 | + R_GPCCR_GPC_MASK | R_GPCCR_GPCP_MASK; | ||
83 | + | ||
84 | + env->cp15.gpccr_el3 = (value & rw_mask) | (env->cp15.gpccr_el3 & ~rw_mask); | ||
85 | +} | 36 | +} |
86 | + | 37 | + |
87 | +static void gpccr_reset(CPUARMState *env, const ARMCPRegInfo *ri) | 38 | +/* Is CFG_REG5 present? */ |
39 | +static bool have_cfg5(MPS2SCC *s) | ||
88 | +{ | 40 | +{ |
89 | + env->cp15.gpccr_el3 = FIELD_DP64(0, GPCCR, L0GPTSZ, | 41 | + return scc_partno(s) == 0x524 || scc_partno(s) == 0x547; |
90 | + env_archcpu(env)->reset_l0gptsz); | ||
91 | +} | 42 | +} |
92 | + | 43 | + |
93 | +static void tlbi_aa64_paallos_write(CPUARMState *env, const ARMCPRegInfo *ri, | 44 | +/* Is CFG_REG6 present? */ |
94 | + uint64_t value) | 45 | +static bool have_cfg6(MPS2SCC *s) |
95 | +{ | 46 | +{ |
96 | + CPUState *cs = env_cpu(env); | 47 | + return scc_partno(s) == 0x524; |
97 | + | ||
98 | + tlb_flush_all_cpus_synced(cs); | ||
99 | +} | 48 | +} |
100 | + | 49 | + |
101 | +static const ARMCPRegInfo rme_reginfo[] = { | 50 | /* Handle a write via the SYS_CFG channel to the specified function/device. |
102 | + { .name = "GPCCR_EL3", .state = ARM_CP_STATE_AA64, | 51 | * Return false on error (reported to guest via SYS_CFGCTRL ERROR bit). |
103 | + .opc0 = 3, .opc1 = 6, .crn = 2, .crm = 1, .opc2 = 6, | 52 | */ |
104 | + .access = PL3_RW, .writefn = gpccr_write, .resetfn = gpccr_reset, | 53 | @@ -XXX,XX +XXX,XX @@ static uint64_t mps2_scc_read(void *opaque, hwaddr offset, unsigned size) |
105 | + .fieldoffset = offsetof(CPUARMState, cp15.gpccr_el3) }, | 54 | r = s->cfg1; |
106 | + { .name = "GPTBR_EL3", .state = ARM_CP_STATE_AA64, | 55 | break; |
107 | + .opc0 = 3, .opc1 = 6, .crn = 2, .crm = 1, .opc2 = 4, | 56 | case A_CFG2: |
108 | + .access = PL3_RW, .fieldoffset = offsetof(CPUARMState, cp15.gptbr_el3) }, | 57 | - if (scc_partno(s) != 0x524 && scc_partno(s) != 0x547) { |
109 | + { .name = "MFAR_EL3", .state = ARM_CP_STATE_AA64, | 58 | - /* CFG2 reserved on other boards */ |
110 | + .opc0 = 3, .opc1 = 6, .crn = 6, .crm = 0, .opc2 = 5, | 59 | + if (!have_cfg2(s)) { |
111 | + .access = PL3_RW, .fieldoffset = offsetof(CPUARMState, cp15.mfar_el3) }, | 60 | goto bad_offset; |
112 | + { .name = "TLBI_PAALL", .state = ARM_CP_STATE_AA64, | 61 | } |
113 | + .opc0 = 1, .opc1 = 6, .crn = 8, .crm = 7, .opc2 = 4, | 62 | r = s->cfg2; |
114 | + .access = PL3_W, .type = ARM_CP_NO_RAW, | 63 | break; |
115 | + .writefn = tlbi_aa64_paall_write }, | 64 | case A_CFG3: |
116 | + { .name = "TLBI_PAALLOS", .state = ARM_CP_STATE_AA64, | 65 | - if (scc_partno(s) == 0x524 || scc_partno(s) == 0x547) { |
117 | + .opc0 = 1, .opc1 = 6, .crn = 8, .crm = 1, .opc2 = 4, | 66 | - /* CFG3 reserved on AN524 */ |
118 | + .access = PL3_W, .type = ARM_CP_NO_RAW, | 67 | + if (!have_cfg3(s)) { |
119 | + .writefn = tlbi_aa64_paallos_write }, | 68 | goto bad_offset; |
120 | + /* | 69 | } |
121 | + * QEMU does not have a way to invalidate by physical address, thus | 70 | /* These are user-settable DIP switches on the board. We don't |
122 | + * invalidating a range of physical addresses is accomplished by | 71 | @@ -XXX,XX +XXX,XX @@ static uint64_t mps2_scc_read(void *opaque, hwaddr offset, unsigned size) |
123 | + * flushing all tlb entries in the outer sharable domain, | 72 | r = s->cfg4; |
124 | + * just like PAALLOS. | 73 | break; |
125 | + */ | 74 | case A_CFG5: |
126 | + { .name = "TLBI_RPALOS", .state = ARM_CP_STATE_AA64, | 75 | - if (scc_partno(s) != 0x524 && scc_partno(s) != 0x547) { |
127 | + .opc0 = 1, .opc1 = 6, .crn = 8, .crm = 4, .opc2 = 7, | 76 | - /* CFG5 reserved on other boards */ |
128 | + .access = PL3_W, .type = ARM_CP_NO_RAW, | 77 | + if (!have_cfg5(s)) { |
129 | + .writefn = tlbi_aa64_paallos_write }, | 78 | goto bad_offset; |
130 | + { .name = "TLBI_RPAOS", .state = ARM_CP_STATE_AA64, | 79 | } |
131 | + .opc0 = 1, .opc1 = 6, .crn = 8, .crm = 4, .opc2 = 3, | 80 | r = s->cfg5; |
132 | + .access = PL3_W, .type = ARM_CP_NO_RAW, | 81 | break; |
133 | + .writefn = tlbi_aa64_paallos_write }, | 82 | case A_CFG6: |
134 | + { .name = "DC_CIPAPA", .state = ARM_CP_STATE_AA64, | 83 | - if (scc_partno(s) != 0x524) { |
135 | + .opc0 = 1, .opc1 = 6, .crn = 7, .crm = 14, .opc2 = 1, | 84 | - /* CFG6 reserved on other boards */ |
136 | + .access = PL3_W, .type = ARM_CP_NOP }, | 85 | + if (!have_cfg6(s)) { |
137 | +}; | 86 | goto bad_offset; |
138 | + | 87 | } |
139 | +static const ARMCPRegInfo rme_mte_reginfo[] = { | 88 | r = s->cfg6; |
140 | + { .name = "DC_CIGDPAPA", .state = ARM_CP_STATE_AA64, | 89 | @@ -XXX,XX +XXX,XX @@ static void mps2_scc_write(void *opaque, hwaddr offset, uint64_t value, |
141 | + .opc0 = 1, .opc1 = 6, .crn = 7, .crm = 14, .opc2 = 5, | 90 | } |
142 | + .access = PL3_W, .type = ARM_CP_NOP }, | 91 | break; |
143 | +}; | 92 | case A_CFG2: |
144 | #endif /* TARGET_AARCH64 */ | 93 | - if (scc_partno(s) != 0x524 && scc_partno(s) != 0x547) { |
145 | 94 | - /* CFG2 reserved on other boards */ | |
146 | static void define_pmu_regs(ARMCPU *cpu) | 95 | + if (!have_cfg2(s)) { |
147 | @@ -XXX,XX +XXX,XX @@ void register_cp_regs_for_features(ARMCPU *cpu) | 96 | goto bad_offset; |
148 | if (cpu_isar_feature(aa64_fgt, cpu)) { | 97 | } |
149 | define_arm_cp_regs(cpu, fgt_reginfo); | 98 | /* AN524: QSPI Select signal */ |
150 | } | 99 | s->cfg2 = value; |
151 | + | 100 | break; |
152 | + if (cpu_isar_feature(aa64_rme, cpu)) { | 101 | case A_CFG5: |
153 | + define_arm_cp_regs(cpu, rme_reginfo); | 102 | - if (scc_partno(s) != 0x524 && scc_partno(s) != 0x547) { |
154 | + if (cpu_isar_feature(aa64_mte, cpu)) { | 103 | - /* CFG5 reserved on other boards */ |
155 | + define_arm_cp_regs(cpu, rme_mte_reginfo); | 104 | + if (!have_cfg5(s)) { |
156 | + } | 105 | goto bad_offset; |
157 | + } | 106 | } |
158 | #endif | 107 | /* AN524: ACLK frequency in Hz */ |
159 | 108 | s->cfg5 = value; | |
160 | if (cpu_isar_feature(any_predinv, cpu)) { | 109 | break; |
110 | case A_CFG6: | ||
111 | - if (scc_partno(s) != 0x524) { | ||
112 | - /* CFG6 reserved on other boards */ | ||
113 | + if (!have_cfg6(s)) { | ||
114 | goto bad_offset; | ||
115 | } | ||
116 | /* AN524: Clock divider for BRAM */ | ||
161 | -- | 117 | -- |
162 | 2.34.1 | 118 | 2.34.1 |
119 | |||
120 | diff view generated by jsdifflib |
1 | The xkb official name for the Arabic keyboard layout is 'ara'. | 1 | The MPS2 SCC device is broadly the same for all FPGA images, but has |
---|---|---|---|
2 | However xkb has for at least the past 15 years also permitted it to | 2 | minor differences in the behaviour of the CFG registers depending on |
3 | be named via the legacy synonym 'ar'. In xkeyboard-config 2.39 this | 3 | the image. In many cases we don't really care about the functionality |
4 | synoynm was removed, which breaks compilation of QEMU: | 4 | controlled by these registers and a reads-as-written or similar |
5 | 5 | behaviour is sufficient for the moment. | |
6 | FAILED: pc-bios/keymaps/ar | 6 | |
7 | /home/fred/qemu-git/src/qemu/build-full/qemu-keymap -f pc-bios/keymaps/ar -l ar | 7 | For the AN536 the required behaviour is: |
8 | xkbcommon: ERROR: Couldn't find file "symbols/ar" in include paths | 8 | |
9 | xkbcommon: ERROR: 1 include paths searched: | 9 | * A_CFG0 has CPU reset and halt bits |
10 | xkbcommon: ERROR: /usr/share/X11/xkb | 10 | - implement as reads-as-written for the moment |
11 | xkbcommon: ERROR: 3 include paths could not be added: | 11 | * A_CFG1 has flash or ATCM address 0 remap handling |
12 | xkbcommon: ERROR: /home/fred/.config/xkb | 12 | - QEMU doesn't model this; implement as reads-as-written |
13 | xkbcommon: ERROR: /home/fred/.xkb | 13 | * A_CFG2 has QSPI select (like AN524) |
14 | xkbcommon: ERROR: /etc/xkb | 14 | - implemented (no behaviour, as with AN524) |
15 | xkbcommon: ERROR: Abandoning symbols file "(unnamed)" | 15 | * A_CFG3 is MCC_MSB_ADDR "additional MCC addressing bits" |
16 | xkbcommon: ERROR: Failed to compile xkb_symbols | 16 | - QEMU doesn't care about these, so use the existing |
17 | xkbcommon: ERROR: Failed to compile keymap | 17 | RAZ behaviour for convenience |
18 | 18 | * A_CFG4 is board rev (like all other images) | |
19 | The upstream xkeyboard-config change removing the compat | 19 | - no change needed |
20 | mapping is: | 20 | * A_CFG5 is ACLK frq in hz (like AN524) |
21 | https://gitlab.freedesktop.org/xkeyboard-config/xkeyboard-config/-/commit/470ad2cd8fea84d7210377161d86b31999bb5ea6 | 21 | - implemented as reads-as-written, as for other boards |
22 | 22 | * A_CFG6 is core 0 vector table base address | |
23 | Make QEMU always ask for the 'ara' xkb layout, which should work on | 23 | - implemented as reads-as-written for the moment |
24 | both older and newer xkeyboard-config. We leave the QEMU name for | 24 | * A_CFG7 is core 1 vector table base address |
25 | this keyboard layout as 'ar'; it is not the only one where our name | 25 | - implemented as reads-as-written for the moment |
26 | for it deviates from the xkb standard name. | 26 | |
27 | 27 | Make the changes necessary for this; leave TODO comments where | |
28 | Cc: qemu-stable@nongnu.org | 28 | appropriate to indicate where we might want to come back and |
29 | implement things like CPU reset. | ||
30 | |||
31 | The other aspects of the device specific to this FPGA image (like the | ||
32 | values of the board ID and similar registers) will be set via the | ||
33 | device's qdev properties. | ||
34 | |||
29 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 35 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
30 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 36 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> |
31 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> | 37 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> |
32 | Reviewed-by: Daniel P. Berrangé <berrange@redhat.com> | 38 | Message-id: 20240206132931.38376-8-peter.maydell@linaro.org |
33 | Message-id: 20230620162024.1132013-1-peter.maydell@linaro.org | ||
34 | Resolves: https://gitlab.com/qemu-project/qemu/-/issues/1709 | ||
35 | --- | 39 | --- |
36 | pc-bios/keymaps/meson.build | 2 +- | 40 | include/hw/misc/mps2-scc.h | 1 + |
37 | 1 file changed, 1 insertion(+), 1 deletion(-) | 41 | hw/misc/mps2-scc.c | 101 +++++++++++++++++++++++++++++++++---- |
38 | 42 | 2 files changed, 92 insertions(+), 10 deletions(-) | |
39 | diff --git a/pc-bios/keymaps/meson.build b/pc-bios/keymaps/meson.build | 43 | |
44 | diff --git a/include/hw/misc/mps2-scc.h b/include/hw/misc/mps2-scc.h | ||
40 | index XXXXXXX..XXXXXXX 100644 | 45 | index XXXXXXX..XXXXXXX 100644 |
41 | --- a/pc-bios/keymaps/meson.build | 46 | --- a/include/hw/misc/mps2-scc.h |
42 | +++ b/pc-bios/keymaps/meson.build | 47 | +++ b/include/hw/misc/mps2-scc.h |
43 | @@ -XXX,XX +XXX,XX @@ | 48 | @@ -XXX,XX +XXX,XX @@ struct MPS2SCC { |
44 | keymaps = { | 49 | uint32_t cfg4; |
45 | - 'ar': '-l ar', | 50 | uint32_t cfg5; |
46 | + 'ar': '-l ara', | 51 | uint32_t cfg6; |
47 | 'bepo': '-l fr -v dvorak', | 52 | + uint32_t cfg7; |
48 | 'cz': '-l cz', | 53 | uint32_t cfgdata_rtn; |
49 | 'da': '-l dk', | 54 | uint32_t cfgdata_out; |
55 | uint32_t cfgctrl; | ||
56 | diff --git a/hw/misc/mps2-scc.c b/hw/misc/mps2-scc.c | ||
57 | index XXXXXXX..XXXXXXX 100644 | ||
58 | --- a/hw/misc/mps2-scc.c | ||
59 | +++ b/hw/misc/mps2-scc.c | ||
60 | @@ -XXX,XX +XXX,XX @@ REG32(CFG3, 0xc) | ||
61 | REG32(CFG4, 0x10) | ||
62 | REG32(CFG5, 0x14) | ||
63 | REG32(CFG6, 0x18) | ||
64 | +REG32(CFG7, 0x1c) | ||
65 | REG32(CFGDATA_RTN, 0xa0) | ||
66 | REG32(CFGDATA_OUT, 0xa4) | ||
67 | REG32(CFGCTRL, 0xa8) | ||
68 | @@ -XXX,XX +XXX,XX @@ static int scc_partno(MPS2SCC *s) | ||
69 | /* Is CFG_REG2 present? */ | ||
70 | static bool have_cfg2(MPS2SCC *s) | ||
71 | { | ||
72 | - return scc_partno(s) == 0x524 || scc_partno(s) == 0x547; | ||
73 | + return scc_partno(s) == 0x524 || scc_partno(s) == 0x547 || | ||
74 | + scc_partno(s) == 0x536; | ||
75 | } | ||
76 | |||
77 | /* Is CFG_REG3 present? */ | ||
78 | static bool have_cfg3(MPS2SCC *s) | ||
79 | { | ||
80 | - return scc_partno(s) != 0x524 && scc_partno(s) != 0x547; | ||
81 | + return scc_partno(s) != 0x524 && scc_partno(s) != 0x547 && | ||
82 | + scc_partno(s) != 0x536; | ||
83 | } | ||
84 | |||
85 | /* Is CFG_REG5 present? */ | ||
86 | static bool have_cfg5(MPS2SCC *s) | ||
87 | { | ||
88 | - return scc_partno(s) == 0x524 || scc_partno(s) == 0x547; | ||
89 | + return scc_partno(s) == 0x524 || scc_partno(s) == 0x547 || | ||
90 | + scc_partno(s) == 0x536; | ||
91 | } | ||
92 | |||
93 | /* Is CFG_REG6 present? */ | ||
94 | static bool have_cfg6(MPS2SCC *s) | ||
95 | { | ||
96 | - return scc_partno(s) == 0x524; | ||
97 | + return scc_partno(s) == 0x524 || scc_partno(s) == 0x536; | ||
98 | +} | ||
99 | + | ||
100 | +/* Is CFG_REG7 present? */ | ||
101 | +static bool have_cfg7(MPS2SCC *s) | ||
102 | +{ | ||
103 | + return scc_partno(s) == 0x536; | ||
104 | +} | ||
105 | + | ||
106 | +/* Does CFG_REG0 drive the 'remap' GPIO output? */ | ||
107 | +static bool cfg0_is_remap(MPS2SCC *s) | ||
108 | +{ | ||
109 | + return scc_partno(s) != 0x536; | ||
110 | +} | ||
111 | + | ||
112 | +/* Is CFG_REG1 driving a set of LEDs? */ | ||
113 | +static bool cfg1_is_leds(MPS2SCC *s) | ||
114 | +{ | ||
115 | + return scc_partno(s) != 0x536; | ||
116 | } | ||
117 | |||
118 | /* Handle a write via the SYS_CFG channel to the specified function/device. | ||
119 | @@ -XXX,XX +XXX,XX @@ static uint64_t mps2_scc_read(void *opaque, hwaddr offset, unsigned size) | ||
120 | if (!have_cfg3(s)) { | ||
121 | goto bad_offset; | ||
122 | } | ||
123 | - /* These are user-settable DIP switches on the board. We don't | ||
124 | + /* | ||
125 | + * These are user-settable DIP switches on the board. We don't | ||
126 | * model that, so just return zeroes. | ||
127 | + * | ||
128 | + * TODO: for AN536 this is MCC_MSB_ADDR "additional MCC addressing | ||
129 | + * bits". These change which part of the DDR4 the motherboard | ||
130 | + * configuration controller can see in its memory map (see the | ||
131 | + * appnote section 2.4). QEMU doesn't model the MCC at all, so these | ||
132 | + * bits are not interesting to us; read-as-zero is as good as anything | ||
133 | + * else. | ||
134 | */ | ||
135 | r = 0; | ||
136 | break; | ||
137 | @@ -XXX,XX +XXX,XX @@ static uint64_t mps2_scc_read(void *opaque, hwaddr offset, unsigned size) | ||
138 | } | ||
139 | r = s->cfg6; | ||
140 | break; | ||
141 | + case A_CFG7: | ||
142 | + if (!have_cfg7(s)) { | ||
143 | + goto bad_offset; | ||
144 | + } | ||
145 | + r = s->cfg7; | ||
146 | + break; | ||
147 | case A_CFGDATA_RTN: | ||
148 | r = s->cfgdata_rtn; | ||
149 | break; | ||
150 | @@ -XXX,XX +XXX,XX @@ static void mps2_scc_write(void *opaque, hwaddr offset, uint64_t value, | ||
151 | * we always reflect bit 0 in the 'remap' GPIO output line, | ||
152 | * and let the board wire it up or not as it chooses. | ||
153 | * TODO on some boards bit 1 is CPU_WAIT. | ||
154 | + * | ||
155 | + * TODO: on the AN536 this register controls reset and halt | ||
156 | + * for both CPUs. For the moment we don't implement this, so the | ||
157 | + * register just reads as written. | ||
158 | */ | ||
159 | s->cfg0 = value; | ||
160 | - qemu_set_irq(s->remap, s->cfg0 & 1); | ||
161 | + if (cfg0_is_remap(s)) { | ||
162 | + qemu_set_irq(s->remap, s->cfg0 & 1); | ||
163 | + } | ||
164 | break; | ||
165 | case A_CFG1: | ||
166 | s->cfg1 = value; | ||
167 | - for (size_t i = 0; i < ARRAY_SIZE(s->led); i++) { | ||
168 | - led_set_state(s->led[i], extract32(value, i, 1)); | ||
169 | + /* | ||
170 | + * On most boards this register drives LEDs. | ||
171 | + * | ||
172 | + * TODO: for AN536 this controls whether flash and ATCM are | ||
173 | + * enabled or disabled on reset. QEMU doesn't model this, and | ||
174 | + * always wires up RAM in the ATCM area and ROM in the flash area. | ||
175 | + */ | ||
176 | + if (cfg1_is_leds(s)) { | ||
177 | + for (size_t i = 0; i < ARRAY_SIZE(s->led); i++) { | ||
178 | + led_set_state(s->led[i], extract32(value, i, 1)); | ||
179 | + } | ||
180 | } | ||
181 | break; | ||
182 | case A_CFG2: | ||
183 | if (!have_cfg2(s)) { | ||
184 | goto bad_offset; | ||
185 | } | ||
186 | - /* AN524: QSPI Select signal */ | ||
187 | + /* AN524, AN536: QSPI Select signal */ | ||
188 | s->cfg2 = value; | ||
189 | break; | ||
190 | case A_CFG5: | ||
191 | if (!have_cfg5(s)) { | ||
192 | goto bad_offset; | ||
193 | } | ||
194 | - /* AN524: ACLK frequency in Hz */ | ||
195 | + /* AN524, AN536: ACLK frequency in Hz */ | ||
196 | s->cfg5 = value; | ||
197 | break; | ||
198 | case A_CFG6: | ||
199 | @@ -XXX,XX +XXX,XX @@ static void mps2_scc_write(void *opaque, hwaddr offset, uint64_t value, | ||
200 | goto bad_offset; | ||
201 | } | ||
202 | /* AN524: Clock divider for BRAM */ | ||
203 | + /* AN536: Core 0 vector table base address */ | ||
204 | + s->cfg6 = value; | ||
205 | + break; | ||
206 | + case A_CFG7: | ||
207 | + if (!have_cfg7(s)) { | ||
208 | + goto bad_offset; | ||
209 | + } | ||
210 | + /* AN536: Core 1 vector table base address */ | ||
211 | s->cfg6 = value; | ||
212 | break; | ||
213 | case A_CFGDATA_OUT: | ||
214 | @@ -XXX,XX +XXX,XX @@ static void mps2_scc_finalize(Object *obj) | ||
215 | g_free(s->oscclk_reset); | ||
216 | } | ||
217 | |||
218 | +static bool cfg7_needed(void *opaque) | ||
219 | +{ | ||
220 | + MPS2SCC *s = opaque; | ||
221 | + | ||
222 | + return have_cfg7(s); | ||
223 | +} | ||
224 | + | ||
225 | +static const VMStateDescription vmstate_cfg7 = { | ||
226 | + .name = "mps2-scc/cfg7", | ||
227 | + .version_id = 1, | ||
228 | + .minimum_version_id = 1, | ||
229 | + .needed = cfg7_needed, | ||
230 | + .fields = (const VMStateField[]) { | ||
231 | + VMSTATE_UINT32(cfg7, MPS2SCC), | ||
232 | + VMSTATE_END_OF_LIST() | ||
233 | + } | ||
234 | +}; | ||
235 | + | ||
236 | static const VMStateDescription mps2_scc_vmstate = { | ||
237 | .name = "mps2-scc", | ||
238 | .version_id = 3, | ||
239 | @@ -XXX,XX +XXX,XX @@ static const VMStateDescription mps2_scc_vmstate = { | ||
240 | VMSTATE_VARRAY_UINT32(oscclk, MPS2SCC, num_oscclk, | ||
241 | 0, vmstate_info_uint32, uint32_t), | ||
242 | VMSTATE_END_OF_LIST() | ||
243 | + }, | ||
244 | + .subsections = (const VMStateDescription * const []) { | ||
245 | + &vmstate_cfg7, | ||
246 | + NULL | ||
247 | } | ||
248 | }; | ||
249 | |||
50 | -- | 250 | -- |
51 | 2.34.1 | 251 | 2.34.1 |
52 | 252 | ||
53 | 253 | diff view generated by jsdifflib |
1 | We use __builtin_subcll() to do a 64-bit subtract with borrow-in and | 1 | The AN536 is another FPGA image for the MPS3 development board. Unlike |
---|---|---|---|
2 | borrow-out when the host compiler supports it. Unfortunately some | 2 | the existing FPGA images we already model, this board uses a Cortex-R |
3 | versions of Apple Clang have a bug in their implementation of this | 3 | family CPU, and it does not use any equivalent to the M-profile |
4 | intrinsic which means it returns the wrong value. The effect is that | 4 | "Subsystem for Embedded" SoC-equivalent that we model in hw/arm/armsse.c. |
5 | a QEMU built with the affected compiler will hang when emulating x86 | 5 | It's therefore more convenient for us to model it as a completely |
6 | or m68k float80 division. | 6 | separate C file. |
7 | 7 | ||
8 | The upstream LLVM issue is: | 8 | This commit adds the basic skeleton of the board model, and the |
9 | https://github.com/llvm/llvm-project/issues/55253 | 9 | code to create all the RAM and ROM. We assume that we're probably |
10 | 10 | going to want to add more images in future, so use the same | |
11 | The commit that introduced the bug apparently never made it into an | 11 | base class/subclass setup that mps2-tz.c uses, even though at |
12 | upstream LLVM release without the subsequent fix | 12 | the moment there's only a single subclass. |
13 | https://github.com/llvm/llvm-project/commit/fffb6e6afdbaba563189c1f715058ed401fbc88d | 13 | |
14 | but unfortunately it did make it into Apple Clang 14.0, as shipped | 14 | Following commits will add the CPUs and the peripherals. |
15 | in Xcode 14.3 (14.2 is reported to be OK). The Apple bug number is | 15 | |
16 | FB12210478. | ||
17 | |||
18 | Add ifdefs to avoid use of __builtin_subcll() on Apple Clang version | ||
19 | 14 or greater. There is not currently a version of Apple Clang which | ||
20 | has the bug fix -- when one appears we should be able to add an upper | ||
21 | bound to the ifdef condition so we can start using the builtin again. | ||
22 | We make the lower bound a conservative "any Apple clang with major | ||
23 | version 14 or greater" because the consequences of incorrectly | ||
24 | disabling the builtin when it would work are pretty small and the | ||
25 | consequences of not disabling it when we should are pretty bad. | ||
26 | |||
27 | Many thanks to those users who both reported this bug and also | ||
28 | did a lot of work in identifying the root cause; in particular | ||
29 | to Daniel Bertalan and osy. | ||
30 | |||
31 | Cc: qemu-stable@nongnu.org | ||
32 | Resolves: https://gitlab.com/qemu-project/qemu/-/issues/1631 | ||
33 | Resolves: https://gitlab.com/qemu-project/qemu/-/issues/1659 | ||
34 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | 16 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
35 | Reviewed-by: Richard Henderson <richard.henderson@linaro.org> | 17 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> |
36 | Reviewed-by: Daniel P. Berrangé <berrange@redhat.com> | 18 | Message-id: 20240206132931.38376-9-peter.maydell@linaro.org |
37 | Tested-by: Daniel Bertalan <dani@danielbertalan.dev> | ||
38 | Tested-by: Tested-By: Solra Bizna <solra@bizna.name> | ||
39 | Message-id: 20230622130823.1631719-1-peter.maydell@linaro.org | ||
40 | --- | 19 | --- |
41 | include/qemu/compiler.h | 13 +++++++++++++ | 20 | MAINTAINERS | 3 +- |
42 | include/qemu/host-utils.h | 2 +- | 21 | configs/devices/arm-softmmu/default.mak | 1 + |
43 | 2 files changed, 14 insertions(+), 1 deletion(-) | 22 | hw/arm/mps3r.c | 239 ++++++++++++++++++++++++ |
44 | 23 | hw/arm/Kconfig | 5 + | |
45 | diff --git a/include/qemu/compiler.h b/include/qemu/compiler.h | 24 | hw/arm/meson.build | 1 + |
25 | 5 files changed, 248 insertions(+), 1 deletion(-) | ||
26 | create mode 100644 hw/arm/mps3r.c | ||
27 | |||
28 | diff --git a/MAINTAINERS b/MAINTAINERS | ||
46 | index XXXXXXX..XXXXXXX 100644 | 29 | index XXXXXXX..XXXXXXX 100644 |
47 | --- a/include/qemu/compiler.h | 30 | --- a/MAINTAINERS |
48 | +++ b/include/qemu/compiler.h | 31 | +++ b/MAINTAINERS |
32 | @@ -XXX,XX +XXX,XX @@ F: include/hw/misc/imx7_*.h | ||
33 | F: hw/pci-host/designware.c | ||
34 | F: include/hw/pci-host/designware.h | ||
35 | |||
36 | -MPS2 | ||
37 | +MPS2 / MPS3 | ||
38 | M: Peter Maydell <peter.maydell@linaro.org> | ||
39 | L: qemu-arm@nongnu.org | ||
40 | S: Maintained | ||
41 | F: hw/arm/mps2.c | ||
42 | F: hw/arm/mps2-tz.c | ||
43 | +F: hw/arm/mps3r.c | ||
44 | F: hw/misc/mps2-*.c | ||
45 | F: include/hw/misc/mps2-*.h | ||
46 | F: hw/arm/armsse.c | ||
47 | diff --git a/configs/devices/arm-softmmu/default.mak b/configs/devices/arm-softmmu/default.mak | ||
48 | index XXXXXXX..XXXXXXX 100644 | ||
49 | --- a/configs/devices/arm-softmmu/default.mak | ||
50 | +++ b/configs/devices/arm-softmmu/default.mak | ||
51 | @@ -XXX,XX +XXX,XX @@ CONFIG_ARM_VIRT=y | ||
52 | # CONFIG_INTEGRATOR=n | ||
53 | # CONFIG_FSL_IMX31=n | ||
54 | # CONFIG_MUSICPAL=n | ||
55 | +# CONFIG_MPS3R=n | ||
56 | # CONFIG_MUSCA=n | ||
57 | # CONFIG_CHEETAH=n | ||
58 | # CONFIG_SX1=n | ||
59 | diff --git a/hw/arm/mps3r.c b/hw/arm/mps3r.c | ||
60 | new file mode 100644 | ||
61 | index XXXXXXX..XXXXXXX | ||
62 | --- /dev/null | ||
63 | +++ b/hw/arm/mps3r.c | ||
49 | @@ -XXX,XX +XXX,XX @@ | 64 | @@ -XXX,XX +XXX,XX @@ |
50 | #define QEMU_DISABLE_CFI | ||
51 | #endif | ||
52 | |||
53 | +/* | 65 | +/* |
54 | + * Apple clang version 14 has a bug in its __builtin_subcll(); define | 66 | + * Arm MPS3 board emulation for Cortex-R-based FPGA images. |
55 | + * BUILTIN_SUBCLL_BROKEN for the offending versions so we can avoid it. | 67 | + * (For M-profile images see mps2.c and mps2tz.c.) |
56 | + * When a version of Apple clang which has this bug fixed is released | 68 | + * |
57 | + * we can add an upper bound to this check. | 69 | + * Copyright (c) 2017 Linaro Limited |
58 | + * See https://gitlab.com/qemu-project/qemu/-/issues/1631 | 70 | + * Written by Peter Maydell |
59 | + * and https://gitlab.com/qemu-project/qemu/-/issues/1659 for details. | 71 | + * |
60 | + * The bug never made it into any upstream LLVM releases, only Apple ones. | 72 | + * This program is free software; you can redistribute it and/or modify |
73 | + * it under the terms of the GNU General Public License version 2 or | ||
74 | + * (at your option) any later version. | ||
61 | + */ | 75 | + */ |
62 | +#if defined(__apple_build_version__) && __clang_major__ >= 14 | 76 | + |
63 | +#define BUILTIN_SUBCLL_BROKEN | 77 | +/* |
78 | + * The MPS3 is an FPGA based dev board. This file handles FPGA images | ||
79 | + * which use the Cortex-R CPUs. We model these separately from the | ||
80 | + * M-profile images, because on M-profile the FPGA image is based on | ||
81 | + * a "Subsystem for Embedded" which is similar to an SoC, whereas | ||
82 | + * the R-profile FPGA images don't have that abstraction layer. | ||
83 | + * | ||
84 | + * We model the following FPGA images here: | ||
85 | + * "mps3-an536" -- dual Cortex-R52 as documented in Arm Application Note AN536 | ||
86 | + * | ||
87 | + * Application Note AN536: | ||
88 | + * https://developer.arm.com/documentation/dai0536/latest/ | ||
89 | + */ | ||
90 | + | ||
91 | +#include "qemu/osdep.h" | ||
92 | +#include "qemu/units.h" | ||
93 | +#include "qapi/error.h" | ||
94 | +#include "exec/address-spaces.h" | ||
95 | +#include "cpu.h" | ||
96 | +#include "hw/boards.h" | ||
97 | +#include "hw/arm/boot.h" | ||
98 | + | ||
99 | +/* Define the layout of RAM and ROM in a board */ | ||
100 | +typedef struct RAMInfo { | ||
101 | + const char *name; | ||
102 | + hwaddr base; | ||
103 | + hwaddr size; | ||
104 | + int mrindex; /* index into rams[]; -1 for the system RAM block */ | ||
105 | + int flags; | ||
106 | +} RAMInfo; | ||
107 | + | ||
108 | +/* | ||
109 | + * The MPS3 DDR is 3GiB, but on a 32-bit host QEMU doesn't permit | ||
110 | + * emulation of that much guest RAM, so artificially make it smaller. | ||
111 | + */ | ||
112 | +#if HOST_LONG_BITS == 32 | ||
113 | +#define MPS3_DDR_SIZE (1 * GiB) | ||
114 | +#else | ||
115 | +#define MPS3_DDR_SIZE (3 * GiB) | ||
64 | +#endif | 116 | +#endif |
65 | + | 117 | + |
66 | #endif /* COMPILER_H */ | 118 | +/* |
67 | diff --git a/include/qemu/host-utils.h b/include/qemu/host-utils.h | 119 | + * Flag values: |
120 | + * IS_MAIN: this is the main machine RAM | ||
121 | + * IS_ROM: this area is read-only | ||
122 | + */ | ||
123 | +#define IS_MAIN 1 | ||
124 | +#define IS_ROM 2 | ||
125 | + | ||
126 | +#define MPS3R_RAM_MAX 9 | ||
127 | + | ||
128 | +typedef enum MPS3RFPGAType { | ||
129 | + FPGA_AN536, | ||
130 | +} MPS3RFPGAType; | ||
131 | + | ||
132 | +struct MPS3RMachineClass { | ||
133 | + MachineClass parent; | ||
134 | + MPS3RFPGAType fpga_type; | ||
135 | + const RAMInfo *raminfo; | ||
136 | +}; | ||
137 | + | ||
138 | +struct MPS3RMachineState { | ||
139 | + MachineState parent; | ||
140 | + MemoryRegion ram[MPS3R_RAM_MAX]; | ||
141 | +}; | ||
142 | + | ||
143 | +#define TYPE_MPS3R_MACHINE "mps3r" | ||
144 | +#define TYPE_MPS3R_AN536_MACHINE MACHINE_TYPE_NAME("mps3-an536") | ||
145 | + | ||
146 | +OBJECT_DECLARE_TYPE(MPS3RMachineState, MPS3RMachineClass, MPS3R_MACHINE) | ||
147 | + | ||
148 | +static const RAMInfo an536_raminfo[] = { | ||
149 | + { | ||
150 | + .name = "ATCM", | ||
151 | + .base = 0x00000000, | ||
152 | + .size = 0x00008000, | ||
153 | + .mrindex = 0, | ||
154 | + }, { | ||
155 | + /* We model the QSPI flash as simple ROM for now */ | ||
156 | + .name = "QSPI", | ||
157 | + .base = 0x08000000, | ||
158 | + .size = 0x00800000, | ||
159 | + .flags = IS_ROM, | ||
160 | + .mrindex = 1, | ||
161 | + }, { | ||
162 | + .name = "BRAM", | ||
163 | + .base = 0x10000000, | ||
164 | + .size = 0x00080000, | ||
165 | + .mrindex = 2, | ||
166 | + }, { | ||
167 | + .name = "DDR", | ||
168 | + .base = 0x20000000, | ||
169 | + .size = MPS3_DDR_SIZE, | ||
170 | + .mrindex = -1, | ||
171 | + }, { | ||
172 | + .name = "ATCM0", | ||
173 | + .base = 0xee000000, | ||
174 | + .size = 0x00008000, | ||
175 | + .mrindex = 3, | ||
176 | + }, { | ||
177 | + .name = "BTCM0", | ||
178 | + .base = 0xee100000, | ||
179 | + .size = 0x00008000, | ||
180 | + .mrindex = 4, | ||
181 | + }, { | ||
182 | + .name = "CTCM0", | ||
183 | + .base = 0xee200000, | ||
184 | + .size = 0x00008000, | ||
185 | + .mrindex = 5, | ||
186 | + }, { | ||
187 | + .name = "ATCM1", | ||
188 | + .base = 0xee400000, | ||
189 | + .size = 0x00008000, | ||
190 | + .mrindex = 6, | ||
191 | + }, { | ||
192 | + .name = "BTCM1", | ||
193 | + .base = 0xee500000, | ||
194 | + .size = 0x00008000, | ||
195 | + .mrindex = 7, | ||
196 | + }, { | ||
197 | + .name = "CTCM1", | ||
198 | + .base = 0xee600000, | ||
199 | + .size = 0x00008000, | ||
200 | + .mrindex = 8, | ||
201 | + }, { | ||
202 | + .name = NULL, | ||
203 | + } | ||
204 | +}; | ||
205 | + | ||
206 | +static MemoryRegion *mr_for_raminfo(MPS3RMachineState *mms, | ||
207 | + const RAMInfo *raminfo) | ||
208 | +{ | ||
209 | + /* Return an initialized MemoryRegion for the RAMInfo. */ | ||
210 | + MemoryRegion *ram; | ||
211 | + | ||
212 | + if (raminfo->mrindex < 0) { | ||
213 | + /* Means this RAMInfo is for QEMU's "system memory" */ | ||
214 | + MachineState *machine = MACHINE(mms); | ||
215 | + assert(!(raminfo->flags & IS_ROM)); | ||
216 | + return machine->ram; | ||
217 | + } | ||
218 | + | ||
219 | + assert(raminfo->mrindex < MPS3R_RAM_MAX); | ||
220 | + ram = &mms->ram[raminfo->mrindex]; | ||
221 | + | ||
222 | + memory_region_init_ram(ram, NULL, raminfo->name, | ||
223 | + raminfo->size, &error_fatal); | ||
224 | + if (raminfo->flags & IS_ROM) { | ||
225 | + memory_region_set_readonly(ram, true); | ||
226 | + } | ||
227 | + return ram; | ||
228 | +} | ||
229 | + | ||
230 | +static void mps3r_common_init(MachineState *machine) | ||
231 | +{ | ||
232 | + MPS3RMachineState *mms = MPS3R_MACHINE(machine); | ||
233 | + MPS3RMachineClass *mmc = MPS3R_MACHINE_GET_CLASS(mms); | ||
234 | + MemoryRegion *sysmem = get_system_memory(); | ||
235 | + | ||
236 | + for (const RAMInfo *ri = mmc->raminfo; ri->name; ri++) { | ||
237 | + MemoryRegion *mr = mr_for_raminfo(mms, ri); | ||
238 | + memory_region_add_subregion(sysmem, ri->base, mr); | ||
239 | + } | ||
240 | +} | ||
241 | + | ||
242 | +static void mps3r_set_default_ram_info(MPS3RMachineClass *mmc) | ||
243 | +{ | ||
244 | + /* | ||
245 | + * Set mc->default_ram_size and default_ram_id from the | ||
246 | + * information in mmc->raminfo. | ||
247 | + */ | ||
248 | + MachineClass *mc = MACHINE_CLASS(mmc); | ||
249 | + const RAMInfo *p; | ||
250 | + | ||
251 | + for (p = mmc->raminfo; p->name; p++) { | ||
252 | + if (p->mrindex < 0) { | ||
253 | + /* Found the entry for "system memory" */ | ||
254 | + mc->default_ram_size = p->size; | ||
255 | + mc->default_ram_id = p->name; | ||
256 | + return; | ||
257 | + } | ||
258 | + } | ||
259 | + g_assert_not_reached(); | ||
260 | +} | ||
261 | + | ||
262 | +static void mps3r_class_init(ObjectClass *oc, void *data) | ||
263 | +{ | ||
264 | + MachineClass *mc = MACHINE_CLASS(oc); | ||
265 | + | ||
266 | + mc->init = mps3r_common_init; | ||
267 | +} | ||
268 | + | ||
269 | +static void mps3r_an536_class_init(ObjectClass *oc, void *data) | ||
270 | +{ | ||
271 | + MachineClass *mc = MACHINE_CLASS(oc); | ||
272 | + MPS3RMachineClass *mmc = MPS3R_MACHINE_CLASS(oc); | ||
273 | + static const char * const valid_cpu_types[] = { | ||
274 | + ARM_CPU_TYPE_NAME("cortex-r52"), | ||
275 | + NULL | ||
276 | + }; | ||
277 | + | ||
278 | + mc->desc = "ARM MPS3 with AN536 FPGA image for Cortex-R52"; | ||
279 | + mc->default_cpus = 2; | ||
280 | + mc->min_cpus = mc->default_cpus; | ||
281 | + mc->max_cpus = mc->default_cpus; | ||
282 | + mc->default_cpu_type = ARM_CPU_TYPE_NAME("cortex-r52"); | ||
283 | + mc->valid_cpu_types = valid_cpu_types; | ||
284 | + mmc->raminfo = an536_raminfo; | ||
285 | + mps3r_set_default_ram_info(mmc); | ||
286 | +} | ||
287 | + | ||
288 | +static const TypeInfo mps3r_machine_types[] = { | ||
289 | + { | ||
290 | + .name = TYPE_MPS3R_MACHINE, | ||
291 | + .parent = TYPE_MACHINE, | ||
292 | + .abstract = true, | ||
293 | + .instance_size = sizeof(MPS3RMachineState), | ||
294 | + .class_size = sizeof(MPS3RMachineClass), | ||
295 | + .class_init = mps3r_class_init, | ||
296 | + }, { | ||
297 | + .name = TYPE_MPS3R_AN536_MACHINE, | ||
298 | + .parent = TYPE_MPS3R_MACHINE, | ||
299 | + .class_init = mps3r_an536_class_init, | ||
300 | + }, | ||
301 | +}; | ||
302 | + | ||
303 | +DEFINE_TYPES(mps3r_machine_types); | ||
304 | diff --git a/hw/arm/Kconfig b/hw/arm/Kconfig | ||
68 | index XXXXXXX..XXXXXXX 100644 | 305 | index XXXXXXX..XXXXXXX 100644 |
69 | --- a/include/qemu/host-utils.h | 306 | --- a/hw/arm/Kconfig |
70 | +++ b/include/qemu/host-utils.h | 307 | +++ b/hw/arm/Kconfig |
71 | @@ -XXX,XX +XXX,XX @@ static inline uint64_t uadd64_carry(uint64_t x, uint64_t y, bool *pcarry) | 308 | @@ -XXX,XX +XXX,XX @@ config MAINSTONE |
72 | */ | 309 | select PFLASH_CFI01 |
73 | static inline uint64_t usub64_borrow(uint64_t x, uint64_t y, bool *pborrow) | 310 | select SMC91C111 |
74 | { | 311 | |
75 | -#if __has_builtin(__builtin_subcll) | 312 | +config MPS3R |
76 | +#if __has_builtin(__builtin_subcll) && !defined(BUILTIN_SUBCLL_BROKEN) | 313 | + bool |
77 | unsigned long long b = *pborrow; | 314 | + default y |
78 | x = __builtin_subcll(x, y, b, &b); | 315 | + depends on TCG && ARM |
79 | *pborrow = b & 1; | 316 | + |
317 | config MUSCA | ||
318 | bool | ||
319 | default y | ||
320 | diff --git a/hw/arm/meson.build b/hw/arm/meson.build | ||
321 | index XXXXXXX..XXXXXXX 100644 | ||
322 | --- a/hw/arm/meson.build | ||
323 | +++ b/hw/arm/meson.build | ||
324 | @@ -XXX,XX +XXX,XX @@ arm_ss.add(when: 'CONFIG_HIGHBANK', if_true: files('highbank.c')) | ||
325 | arm_ss.add(when: 'CONFIG_INTEGRATOR', if_true: files('integratorcp.c')) | ||
326 | arm_ss.add(when: 'CONFIG_MAINSTONE', if_true: files('mainstone.c')) | ||
327 | arm_ss.add(when: 'CONFIG_MICROBIT', if_true: files('microbit.c')) | ||
328 | +arm_ss.add(when: 'CONFIG_MPS3R', if_true: files('mps3r.c')) | ||
329 | arm_ss.add(when: 'CONFIG_MUSICPAL', if_true: files('musicpal.c')) | ||
330 | arm_ss.add(when: 'CONFIG_NETDUINOPLUS2', if_true: files('netduinoplus2.c')) | ||
331 | arm_ss.add(when: 'CONFIG_OLIMEX_STM32_H405', if_true: files('olimex-stm32-h405.c')) | ||
80 | -- | 332 | -- |
81 | 2.34.1 | 333 | 2.34.1 |
82 | 334 | ||
83 | 335 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | Create the CPUs, the GIC, and the per-CPU RAM block for |
---|---|---|---|
2 | the mps3-an536 board. | ||
2 | 3 | ||
3 | Add an x-rme cpu property to enable FEAT_RME. | 4 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
4 | Add an x-l0gptsz property to set GPCCR_EL3.L0GPTSZ, | 5 | Message-id: 20240206132931.38376-10-peter.maydell@linaro.org |
5 | for testing various possible configurations. | 6 | --- |
7 | hw/arm/mps3r.c | 180 ++++++++++++++++++++++++++++++++++++++++++++++++- | ||
8 | 1 file changed, 177 insertions(+), 3 deletions(-) | ||
6 | 9 | ||
7 | We're not currently completely sure whether FEAT_RME will | 10 | diff --git a/hw/arm/mps3r.c b/hw/arm/mps3r.c |
8 | be OK to enable purely as a CPU-level property, or if it will | ||
9 | need board co-operation, so we're making these experimental | ||
10 | x- properties, so that the people developing the system | ||
11 | level software for RME can try to start using this and let | ||
12 | us know how it goes. The command line syntax for enabling | ||
13 | this will change in future, without backwards-compatibility. | ||
14 | |||
15 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
16 | Message-id: 20230620124418.805717-21-richard.henderson@linaro.org | ||
17 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | ||
18 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
19 | --- | ||
20 | target/arm/tcg/cpu64.c | 53 ++++++++++++++++++++++++++++++++++++++++++ | ||
21 | 1 file changed, 53 insertions(+) | ||
22 | |||
23 | diff --git a/target/arm/tcg/cpu64.c b/target/arm/tcg/cpu64.c | ||
24 | index XXXXXXX..XXXXXXX 100644 | 11 | index XXXXXXX..XXXXXXX 100644 |
25 | --- a/target/arm/tcg/cpu64.c | 12 | --- a/hw/arm/mps3r.c |
26 | +++ b/target/arm/tcg/cpu64.c | 13 | +++ b/hw/arm/mps3r.c |
27 | @@ -XXX,XX +XXX,XX @@ static void cpu_max_set_sve_max_vq(Object *obj, Visitor *v, const char *name, | 14 | @@ -XXX,XX +XXX,XX @@ |
28 | cpu->sve_max_vq = max_vq; | 15 | #include "qemu/osdep.h" |
16 | #include "qemu/units.h" | ||
17 | #include "qapi/error.h" | ||
18 | +#include "qapi/qmp/qlist.h" | ||
19 | #include "exec/address-spaces.h" | ||
20 | #include "cpu.h" | ||
21 | #include "hw/boards.h" | ||
22 | +#include "hw/qdev-properties.h" | ||
23 | #include "hw/arm/boot.h" | ||
24 | +#include "hw/arm/bsa.h" | ||
25 | +#include "hw/intc/arm_gicv3.h" | ||
26 | |||
27 | /* Define the layout of RAM and ROM in a board */ | ||
28 | typedef struct RAMInfo { | ||
29 | @@ -XXX,XX +XXX,XX @@ typedef struct RAMInfo { | ||
30 | #define IS_ROM 2 | ||
31 | |||
32 | #define MPS3R_RAM_MAX 9 | ||
33 | +#define MPS3R_CPU_MAX 2 | ||
34 | + | ||
35 | +#define PERIPHBASE 0xf0000000 | ||
36 | +#define NUM_SPIS 96 | ||
37 | |||
38 | typedef enum MPS3RFPGAType { | ||
39 | FPGA_AN536, | ||
40 | @@ -XXX,XX +XXX,XX @@ struct MPS3RMachineClass { | ||
41 | MachineClass parent; | ||
42 | MPS3RFPGAType fpga_type; | ||
43 | const RAMInfo *raminfo; | ||
44 | + hwaddr loader_start; | ||
45 | }; | ||
46 | |||
47 | struct MPS3RMachineState { | ||
48 | MachineState parent; | ||
49 | + struct arm_boot_info bootinfo; | ||
50 | MemoryRegion ram[MPS3R_RAM_MAX]; | ||
51 | + Object *cpu[MPS3R_CPU_MAX]; | ||
52 | + MemoryRegion cpu_sysmem[MPS3R_CPU_MAX]; | ||
53 | + MemoryRegion sysmem_alias[MPS3R_CPU_MAX]; | ||
54 | + MemoryRegion cpu_ram[MPS3R_CPU_MAX]; | ||
55 | + GICv3State gic; | ||
56 | }; | ||
57 | |||
58 | #define TYPE_MPS3R_MACHINE "mps3r" | ||
59 | @@ -XXX,XX +XXX,XX @@ static MemoryRegion *mr_for_raminfo(MPS3RMachineState *mms, | ||
60 | return ram; | ||
29 | } | 61 | } |
30 | 62 | ||
31 | +static bool cpu_arm_get_rme(Object *obj, Error **errp) | 63 | +/* |
64 | + * There is no defined secondary boot protocol for Linux for the AN536, | ||
65 | + * because real hardware has a restriction that atomic operations between | ||
66 | + * the two CPUs do not function correctly, and so true SMP is not | ||
67 | + * possible. Therefore for cases where the user is directly booting | ||
68 | + * a kernel, we treat the system as essentially uniprocessor, and | ||
69 | + * put the secondary CPU into power-off state (as if the user on the | ||
70 | + * real hardware had configured the secondary to be halted via the | ||
71 | + * SCC config registers). | ||
72 | + * | ||
73 | + * Note that the default secondary boot code would not work here anyway | ||
74 | + * as it assumes a GICv2, and we have a GICv3. | ||
75 | + */ | ||
76 | +static void mps3r_write_secondary_boot(ARMCPU *cpu, | ||
77 | + const struct arm_boot_info *info) | ||
32 | +{ | 78 | +{ |
33 | + ARMCPU *cpu = ARM_CPU(obj); | 79 | + /* |
34 | + return cpu_isar_feature(aa64_rme, cpu); | 80 | + * Power the secondary CPU off. This means we don't need to write any |
35 | +} | 81 | + * boot code into guest memory. Note that the 'cpu' argument to this |
36 | + | 82 | + * function is the primary CPU we passed to arm_load_kernel(), not |
37 | +static void cpu_arm_set_rme(Object *obj, bool value, Error **errp) | 83 | + * the secondary. Loop around all the other CPUs, as the boot.c |
38 | +{ | 84 | + * code does for the "disable secondaries if PSCI is enabled" case. |
39 | + ARMCPU *cpu = ARM_CPU(obj); | 85 | + */ |
40 | + uint64_t t; | 86 | + for (CPUState *cs = first_cpu; cs; cs = CPU_NEXT(cs)) { |
41 | + | 87 | + if (cs != first_cpu) { |
42 | + t = cpu->isar.id_aa64pfr0; | 88 | + object_property_set_bool(OBJECT(cs), "start-powered-off", true, |
43 | + t = FIELD_DP64(t, ID_AA64PFR0, RME, value); | 89 | + &error_abort); |
44 | + cpu->isar.id_aa64pfr0 = t; | 90 | + } |
45 | +} | ||
46 | + | ||
47 | +static void cpu_max_set_l0gptsz(Object *obj, Visitor *v, const char *name, | ||
48 | + void *opaque, Error **errp) | ||
49 | +{ | ||
50 | + ARMCPU *cpu = ARM_CPU(obj); | ||
51 | + uint32_t value; | ||
52 | + | ||
53 | + if (!visit_type_uint32(v, name, &value, errp)) { | ||
54 | + return; | ||
55 | + } | ||
56 | + | ||
57 | + /* Encode the value for the GPCCR_EL3 field. */ | ||
58 | + switch (value) { | ||
59 | + case 30: | ||
60 | + case 34: | ||
61 | + case 36: | ||
62 | + case 39: | ||
63 | + cpu->reset_l0gptsz = value - 30; | ||
64 | + break; | ||
65 | + default: | ||
66 | + error_setg(errp, "invalid value for l0gptsz"); | ||
67 | + error_append_hint(errp, "valid values are 30, 34, 36, 39\n"); | ||
68 | + break; | ||
69 | + } | 91 | + } |
70 | +} | 92 | +} |
71 | + | 93 | + |
72 | +static void cpu_max_get_l0gptsz(Object *obj, Visitor *v, const char *name, | 94 | +static void mps3r_secondary_cpu_reset(ARMCPU *cpu, |
73 | + void *opaque, Error **errp) | 95 | + const struct arm_boot_info *info) |
74 | +{ | 96 | +{ |
75 | + ARMCPU *cpu = ARM_CPU(obj); | 97 | + /* We don't need to do anything here because the CPU will be off */ |
76 | + uint32_t value = cpu->reset_l0gptsz + 30; | ||
77 | + | ||
78 | + visit_type_uint32(v, name, &value, errp); | ||
79 | +} | 98 | +} |
80 | + | 99 | + |
81 | static Property arm_cpu_lpa2_property = | 100 | +static void create_gic(MPS3RMachineState *mms, MemoryRegion *sysmem) |
82 | DEFINE_PROP_BOOL("lpa2", ARMCPU, prop_lpa2, true); | 101 | +{ |
83 | 102 | + MachineState *machine = MACHINE(mms); | |
84 | @@ -XXX,XX +XXX,XX @@ void aarch64_max_tcg_initfn(Object *obj) | 103 | + DeviceState *gicdev; |
85 | aarch64_add_sme_properties(obj); | 104 | + QList *redist_region_count; |
86 | object_property_add(obj, "sve-max-vq", "uint32", cpu_max_get_sve_max_vq, | 105 | + |
87 | cpu_max_set_sve_max_vq, NULL, NULL); | 106 | + object_initialize_child(OBJECT(mms), "gic", &mms->gic, TYPE_ARM_GICV3); |
88 | + object_property_add_bool(obj, "x-rme", cpu_arm_get_rme, cpu_arm_set_rme); | 107 | + gicdev = DEVICE(&mms->gic); |
89 | + object_property_add(obj, "x-l0gptsz", "uint32", cpu_max_get_l0gptsz, | 108 | + qdev_prop_set_uint32(gicdev, "num-cpu", machine->smp.cpus); |
90 | + cpu_max_set_l0gptsz, NULL, NULL); | 109 | + qdev_prop_set_uint32(gicdev, "num-irq", NUM_SPIS + GIC_INTERNAL); |
91 | qdev_property_add_static(DEVICE(obj), &arm_cpu_lpa2_property); | 110 | + redist_region_count = qlist_new(); |
111 | + qlist_append_int(redist_region_count, machine->smp.cpus); | ||
112 | + qdev_prop_set_array(gicdev, "redist-region-count", redist_region_count); | ||
113 | + object_property_set_link(OBJECT(&mms->gic), "sysmem", | ||
114 | + OBJECT(sysmem), &error_fatal); | ||
115 | + sysbus_realize(SYS_BUS_DEVICE(&mms->gic), &error_fatal); | ||
116 | + sysbus_mmio_map(SYS_BUS_DEVICE(&mms->gic), 0, PERIPHBASE); | ||
117 | + sysbus_mmio_map(SYS_BUS_DEVICE(&mms->gic), 1, PERIPHBASE + 0x100000); | ||
118 | + /* | ||
119 | + * Wire the outputs from each CPU's generic timer and the GICv3 | ||
120 | + * maintenance interrupt signal to the appropriate GIC PPI inputs, | ||
121 | + * and the GIC's IRQ/FIQ/VIRQ/VFIQ interrupt outputs to the CPU's inputs. | ||
122 | + */ | ||
123 | + for (int i = 0; i < machine->smp.cpus; i++) { | ||
124 | + DeviceState *cpudev = DEVICE(mms->cpu[i]); | ||
125 | + SysBusDevice *gicsbd = SYS_BUS_DEVICE(&mms->gic); | ||
126 | + int intidbase = NUM_SPIS + i * GIC_INTERNAL; | ||
127 | + int irq; | ||
128 | + /* | ||
129 | + * Mapping from the output timer irq lines from the CPU to the | ||
130 | + * GIC PPI inputs used for this board. This isn't a BSA board, | ||
131 | + * but it uses the standard convention for the PPI numbers. | ||
132 | + */ | ||
133 | + const int timer_irq[] = { | ||
134 | + [GTIMER_PHYS] = ARCH_TIMER_NS_EL1_IRQ, | ||
135 | + [GTIMER_VIRT] = ARCH_TIMER_VIRT_IRQ, | ||
136 | + [GTIMER_HYP] = ARCH_TIMER_NS_EL2_IRQ, | ||
137 | + }; | ||
138 | + | ||
139 | + for (irq = 0; irq < ARRAY_SIZE(timer_irq); irq++) { | ||
140 | + qdev_connect_gpio_out(cpudev, irq, | ||
141 | + qdev_get_gpio_in(gicdev, | ||
142 | + intidbase + timer_irq[irq])); | ||
143 | + } | ||
144 | + | ||
145 | + qdev_connect_gpio_out_named(cpudev, "gicv3-maintenance-interrupt", 0, | ||
146 | + qdev_get_gpio_in(gicdev, | ||
147 | + intidbase + ARCH_GIC_MAINT_IRQ)); | ||
148 | + | ||
149 | + qdev_connect_gpio_out_named(cpudev, "pmu-interrupt", 0, | ||
150 | + qdev_get_gpio_in(gicdev, | ||
151 | + intidbase + VIRTUAL_PMU_IRQ)); | ||
152 | + | ||
153 | + sysbus_connect_irq(gicsbd, i, | ||
154 | + qdev_get_gpio_in(cpudev, ARM_CPU_IRQ)); | ||
155 | + sysbus_connect_irq(gicsbd, i + machine->smp.cpus, | ||
156 | + qdev_get_gpio_in(cpudev, ARM_CPU_FIQ)); | ||
157 | + sysbus_connect_irq(gicsbd, i + 2 * machine->smp.cpus, | ||
158 | + qdev_get_gpio_in(cpudev, ARM_CPU_VIRQ)); | ||
159 | + sysbus_connect_irq(gicsbd, i + 3 * machine->smp.cpus, | ||
160 | + qdev_get_gpio_in(cpudev, ARM_CPU_VFIQ)); | ||
161 | + } | ||
162 | +} | ||
163 | + | ||
164 | static void mps3r_common_init(MachineState *machine) | ||
165 | { | ||
166 | MPS3RMachineState *mms = MPS3R_MACHINE(machine); | ||
167 | @@ -XXX,XX +XXX,XX @@ static void mps3r_common_init(MachineState *machine) | ||
168 | MemoryRegion *mr = mr_for_raminfo(mms, ri); | ||
169 | memory_region_add_subregion(sysmem, ri->base, mr); | ||
170 | } | ||
171 | + | ||
172 | + assert(machine->smp.cpus <= MPS3R_CPU_MAX); | ||
173 | + for (int i = 0; i < machine->smp.cpus; i++) { | ||
174 | + g_autofree char *sysmem_name = g_strdup_printf("cpu-%d-memory", i); | ||
175 | + g_autofree char *ramname = g_strdup_printf("cpu-%d-memory", i); | ||
176 | + g_autofree char *alias_name = g_strdup_printf("sysmem-alias-%d", i); | ||
177 | + | ||
178 | + /* | ||
179 | + * Each CPU has some private RAM/peripherals, so create the container | ||
180 | + * which will house those, with the whole-machine system memory being | ||
181 | + * used where there's no CPU-specific device. Note that we need the | ||
182 | + * sysmem_alias aliases because we can't put one MR (the original | ||
183 | + * 'sysmem') into more than one other MR. | ||
184 | + */ | ||
185 | + memory_region_init(&mms->cpu_sysmem[i], OBJECT(machine), | ||
186 | + sysmem_name, UINT64_MAX); | ||
187 | + memory_region_init_alias(&mms->sysmem_alias[i], OBJECT(machine), | ||
188 | + alias_name, sysmem, 0, UINT64_MAX); | ||
189 | + memory_region_add_subregion_overlap(&mms->cpu_sysmem[i], 0, | ||
190 | + &mms->sysmem_alias[i], -1); | ||
191 | + | ||
192 | + mms->cpu[i] = object_new(machine->cpu_type); | ||
193 | + object_property_set_link(mms->cpu[i], "memory", | ||
194 | + OBJECT(&mms->cpu_sysmem[i]), &error_abort); | ||
195 | + object_property_set_int(mms->cpu[i], "reset-cbar", | ||
196 | + PERIPHBASE, &error_abort); | ||
197 | + qdev_realize(DEVICE(mms->cpu[i]), NULL, &error_fatal); | ||
198 | + object_unref(mms->cpu[i]); | ||
199 | + | ||
200 | + /* Per-CPU RAM */ | ||
201 | + memory_region_init_ram(&mms->cpu_ram[i], NULL, ramname, | ||
202 | + 0x1000, &error_fatal); | ||
203 | + memory_region_add_subregion(&mms->cpu_sysmem[i], 0xe7c01000, | ||
204 | + &mms->cpu_ram[i]); | ||
205 | + } | ||
206 | + | ||
207 | + create_gic(mms, sysmem); | ||
208 | + | ||
209 | + mms->bootinfo.ram_size = machine->ram_size; | ||
210 | + mms->bootinfo.board_id = -1; | ||
211 | + mms->bootinfo.loader_start = mmc->loader_start; | ||
212 | + mms->bootinfo.write_secondary_boot = mps3r_write_secondary_boot; | ||
213 | + mms->bootinfo.secondary_cpu_reset_hook = mps3r_secondary_cpu_reset; | ||
214 | + arm_load_kernel(ARM_CPU(mms->cpu[0]), machine, &mms->bootinfo); | ||
92 | } | 215 | } |
93 | 216 | ||
217 | static void mps3r_set_default_ram_info(MPS3RMachineClass *mmc) | ||
218 | @@ -XXX,XX +XXX,XX @@ static void mps3r_set_default_ram_info(MPS3RMachineClass *mmc) | ||
219 | /* Found the entry for "system memory" */ | ||
220 | mc->default_ram_size = p->size; | ||
221 | mc->default_ram_id = p->name; | ||
222 | + mmc->loader_start = p->base; | ||
223 | return; | ||
224 | } | ||
225 | } | ||
226 | @@ -XXX,XX +XXX,XX @@ static void mps3r_an536_class_init(ObjectClass *oc, void *data) | ||
227 | }; | ||
228 | |||
229 | mc->desc = "ARM MPS3 with AN536 FPGA image for Cortex-R52"; | ||
230 | - mc->default_cpus = 2; | ||
231 | - mc->min_cpus = mc->default_cpus; | ||
232 | - mc->max_cpus = mc->default_cpus; | ||
233 | + /* | ||
234 | + * In the real FPGA image there are always two cores, but the standard | ||
235 | + * initial setting for the SCC SYSCON 0x000 register is 0x21, meaning | ||
236 | + * that the second core is held in reset and halted. Many images built for | ||
237 | + * the board do not expect the second core to run at startup (especially | ||
238 | + * since on the real FPGA image it is not possible to use LDREX/STREX | ||
239 | + * in RAM between the two cores, so a true SMP setup isn't supported). | ||
240 | + * | ||
241 | + * As QEMU's equivalent of this, we support both -smp 1 and -smp 2, | ||
242 | + * with the default being -smp 1. This seems a more intuitive UI for | ||
243 | + * QEMU users than, for instance, having a machine property to allow | ||
244 | + * the user to set the initial value of the SYSCON 0x000 register. | ||
245 | + */ | ||
246 | + mc->default_cpus = 1; | ||
247 | + mc->min_cpus = 1; | ||
248 | + mc->max_cpus = 2; | ||
249 | mc->default_cpu_type = ARM_CPU_TYPE_NAME("cortex-r52"); | ||
250 | mc->valid_cpu_types = valid_cpu_types; | ||
251 | mmc->raminfo = an536_raminfo; | ||
94 | -- | 252 | -- |
95 | 2.34.1 | 253 | 2.34.1 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | This board has a lot of UARTs: there is one UART per CPU in the |
---|---|---|---|
2 | per-CPU peripheral part of the address map, whose interrupts are | ||
3 | connected as per-CPU interrupt lines. Then there are 4 UARTs in the | ||
4 | normal part of the peripheral space, whose interrupts are shared | ||
5 | peripheral interrupts. | ||
2 | 6 | ||
3 | Add the missing field for ID_AA64PFR0, and the predicate. | 7 | Connect and wire them all up; this involves some OR gates where |
4 | Disable it if EL3 is forced off by the board or command-line. | 8 | multiple overflow interrupts are wired into one GIC input. |
5 | 9 | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
6 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> | 11 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> |
7 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 12 | Message-id: 20240206132931.38376-11-peter.maydell@linaro.org |
8 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20230620124418.805717-2-richard.henderson@linaro.org | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | 13 | --- |
12 | target/arm/cpu.h | 6 ++++++ | 14 | hw/arm/mps3r.c | 94 ++++++++++++++++++++++++++++++++++++++++++++++++++ |
13 | target/arm/cpu.c | 4 ++++ | 15 | 1 file changed, 94 insertions(+) |
14 | 2 files changed, 10 insertions(+) | ||
15 | 16 | ||
16 | diff --git a/target/arm/cpu.h b/target/arm/cpu.h | 17 | diff --git a/hw/arm/mps3r.c b/hw/arm/mps3r.c |
17 | index XXXXXXX..XXXXXXX 100644 | 18 | index XXXXXXX..XXXXXXX 100644 |
18 | --- a/target/arm/cpu.h | 19 | --- a/hw/arm/mps3r.c |
19 | +++ b/target/arm/cpu.h | 20 | +++ b/hw/arm/mps3r.c |
20 | @@ -XXX,XX +XXX,XX @@ FIELD(ID_AA64PFR0, SEL2, 36, 4) | 21 | @@ -XXX,XX +XXX,XX @@ |
21 | FIELD(ID_AA64PFR0, MPAM, 40, 4) | 22 | #include "qapi/qmp/qlist.h" |
22 | FIELD(ID_AA64PFR0, AMU, 44, 4) | 23 | #include "exec/address-spaces.h" |
23 | FIELD(ID_AA64PFR0, DIT, 48, 4) | 24 | #include "cpu.h" |
24 | +FIELD(ID_AA64PFR0, RME, 52, 4) | 25 | +#include "sysemu/sysemu.h" |
25 | FIELD(ID_AA64PFR0, CSV2, 56, 4) | 26 | #include "hw/boards.h" |
26 | FIELD(ID_AA64PFR0, CSV3, 60, 4) | 27 | +#include "hw/or-irq.h" |
27 | 28 | #include "hw/qdev-properties.h" | |
28 | @@ -XXX,XX +XXX,XX @@ static inline bool isar_feature_aa64_sel2(const ARMISARegisters *id) | 29 | #include "hw/arm/boot.h" |
29 | return FIELD_EX64(id->id_aa64pfr0, ID_AA64PFR0, SEL2) != 0; | 30 | #include "hw/arm/bsa.h" |
31 | +#include "hw/char/cmsdk-apb-uart.h" | ||
32 | #include "hw/intc/arm_gicv3.h" | ||
33 | |||
34 | /* Define the layout of RAM and ROM in a board */ | ||
35 | @@ -XXX,XX +XXX,XX @@ typedef struct RAMInfo { | ||
36 | |||
37 | #define MPS3R_RAM_MAX 9 | ||
38 | #define MPS3R_CPU_MAX 2 | ||
39 | +#define MPS3R_UART_MAX 4 /* shared UART count */ | ||
40 | |||
41 | #define PERIPHBASE 0xf0000000 | ||
42 | #define NUM_SPIS 96 | ||
43 | @@ -XXX,XX +XXX,XX @@ struct MPS3RMachineState { | ||
44 | MemoryRegion sysmem_alias[MPS3R_CPU_MAX]; | ||
45 | MemoryRegion cpu_ram[MPS3R_CPU_MAX]; | ||
46 | GICv3State gic; | ||
47 | + /* per-CPU UARTs followed by the shared UARTs */ | ||
48 | + CMSDKAPBUART uart[MPS3R_CPU_MAX + MPS3R_UART_MAX]; | ||
49 | + OrIRQState cpu_uart_oflow[MPS3R_CPU_MAX]; | ||
50 | + OrIRQState uart_oflow; | ||
51 | }; | ||
52 | |||
53 | #define TYPE_MPS3R_MACHINE "mps3r" | ||
54 | @@ -XXX,XX +XXX,XX @@ struct MPS3RMachineState { | ||
55 | |||
56 | OBJECT_DECLARE_TYPE(MPS3RMachineState, MPS3RMachineClass, MPS3R_MACHINE) | ||
57 | |||
58 | +/* | ||
59 | + * Main clock frequency CLK in Hz (50MHz). In the image there are also | ||
60 | + * ACLK, MCLK, GPUCLK and PERIPHCLK at the same frequency; for our | ||
61 | + * model we just roll them all into one. | ||
62 | + */ | ||
63 | +#define CLK_FRQ 50000000 | ||
64 | + | ||
65 | static const RAMInfo an536_raminfo[] = { | ||
66 | { | ||
67 | .name = "ATCM", | ||
68 | @@ -XXX,XX +XXX,XX @@ static void create_gic(MPS3RMachineState *mms, MemoryRegion *sysmem) | ||
69 | } | ||
30 | } | 70 | } |
31 | 71 | ||
32 | +static inline bool isar_feature_aa64_rme(const ARMISARegisters *id) | 72 | +/* |
73 | + * Create UART uartno, and map it into the MemoryRegion mem at address baseaddr. | ||
74 | + * The qemu_irq arguments are where we connect the various IRQs from the UART. | ||
75 | + */ | ||
76 | +static void create_uart(MPS3RMachineState *mms, int uartno, MemoryRegion *mem, | ||
77 | + hwaddr baseaddr, qemu_irq txirq, qemu_irq rxirq, | ||
78 | + qemu_irq txoverirq, qemu_irq rxoverirq, | ||
79 | + qemu_irq combirq) | ||
33 | +{ | 80 | +{ |
34 | + return FIELD_EX64(id->id_aa64pfr0, ID_AA64PFR0, RME) != 0; | 81 | + g_autofree char *s = g_strdup_printf("uart%d", uartno); |
82 | + SysBusDevice *sbd; | ||
83 | + | ||
84 | + assert(uartno < ARRAY_SIZE(mms->uart)); | ||
85 | + object_initialize_child(OBJECT(mms), s, &mms->uart[uartno], | ||
86 | + TYPE_CMSDK_APB_UART); | ||
87 | + qdev_prop_set_uint32(DEVICE(&mms->uart[uartno]), "pclk-frq", CLK_FRQ); | ||
88 | + qdev_prop_set_chr(DEVICE(&mms->uart[uartno]), "chardev", serial_hd(uartno)); | ||
89 | + sbd = SYS_BUS_DEVICE(&mms->uart[uartno]); | ||
90 | + sysbus_realize(sbd, &error_fatal); | ||
91 | + memory_region_add_subregion(mem, baseaddr, | ||
92 | + sysbus_mmio_get_region(sbd, 0)); | ||
93 | + sysbus_connect_irq(sbd, 0, txirq); | ||
94 | + sysbus_connect_irq(sbd, 1, rxirq); | ||
95 | + sysbus_connect_irq(sbd, 2, txoverirq); | ||
96 | + sysbus_connect_irq(sbd, 3, rxoverirq); | ||
97 | + sysbus_connect_irq(sbd, 4, combirq); | ||
35 | +} | 98 | +} |
36 | + | 99 | + |
37 | static inline bool isar_feature_aa64_vh(const ARMISARegisters *id) | 100 | static void mps3r_common_init(MachineState *machine) |
38 | { | 101 | { |
39 | return FIELD_EX64(id->id_aa64mmfr1, ID_AA64MMFR1, VH) != 0; | 102 | MPS3RMachineState *mms = MPS3R_MACHINE(machine); |
40 | diff --git a/target/arm/cpu.c b/target/arm/cpu.c | 103 | MPS3RMachineClass *mmc = MPS3R_MACHINE_GET_CLASS(mms); |
41 | index XXXXXXX..XXXXXXX 100644 | 104 | MemoryRegion *sysmem = get_system_memory(); |
42 | --- a/target/arm/cpu.c | 105 | + DeviceState *gicdev; |
43 | +++ b/target/arm/cpu.c | 106 | |
44 | @@ -XXX,XX +XXX,XX @@ static void arm_cpu_realizefn(DeviceState *dev, Error **errp) | 107 | for (const RAMInfo *ri = mmc->raminfo; ri->name; ri++) { |
45 | cpu->isar.id_dfr0 = FIELD_DP32(cpu->isar.id_dfr0, ID_DFR0, COPSDBG, 0); | 108 | MemoryRegion *mr = mr_for_raminfo(mms, ri); |
46 | cpu->isar.id_aa64pfr0 = FIELD_DP64(cpu->isar.id_aa64pfr0, | 109 | @@ -XXX,XX +XXX,XX @@ static void mps3r_common_init(MachineState *machine) |
47 | ID_AA64PFR0, EL3, 0); | 110 | } |
111 | |||
112 | create_gic(mms, sysmem); | ||
113 | + gicdev = DEVICE(&mms->gic); | ||
48 | + | 114 | + |
49 | + /* Disable the realm management extension, which requires EL3. */ | 115 | + /* |
50 | + cpu->isar.id_aa64pfr0 = FIELD_DP64(cpu->isar.id_aa64pfr0, | 116 | + * UARTs 0 and 1 are per-CPU; their interrupts are wired to |
51 | + ID_AA64PFR0, RME, 0); | 117 | + * the relevant CPU's PPI 0..3, aka INTID 16..19 |
52 | } | 118 | + */ |
53 | 119 | + for (int i = 0; i < machine->smp.cpus; i++) { | |
54 | if (!cpu->has_el2) { | 120 | + int intidbase = NUM_SPIS + i * GIC_INTERNAL; |
121 | + g_autofree char *s = g_strdup_printf("cpu-uart-oflow-orgate%d", i); | ||
122 | + DeviceState *orgate; | ||
123 | + | ||
124 | + /* The two overflow IRQs from the UART are ORed together into PPI 3 */ | ||
125 | + object_initialize_child(OBJECT(mms), s, &mms->cpu_uart_oflow[i], | ||
126 | + TYPE_OR_IRQ); | ||
127 | + orgate = DEVICE(&mms->cpu_uart_oflow[i]); | ||
128 | + qdev_prop_set_uint32(orgate, "num-lines", 2); | ||
129 | + qdev_realize(orgate, NULL, &error_fatal); | ||
130 | + qdev_connect_gpio_out(orgate, 0, | ||
131 | + qdev_get_gpio_in(gicdev, intidbase + 19)); | ||
132 | + | ||
133 | + create_uart(mms, i, &mms->cpu_sysmem[i], 0xe7c00000, | ||
134 | + qdev_get_gpio_in(gicdev, intidbase + 17), /* tx */ | ||
135 | + qdev_get_gpio_in(gicdev, intidbase + 16), /* rx */ | ||
136 | + qdev_get_gpio_in(orgate, 0), /* txover */ | ||
137 | + qdev_get_gpio_in(orgate, 1), /* rxover */ | ||
138 | + qdev_get_gpio_in(gicdev, intidbase + 18) /* combined */); | ||
139 | + } | ||
140 | + /* | ||
141 | + * UARTs 2 to 5 are whole-system; all overflow IRQs are ORed | ||
142 | + * together into IRQ 17 | ||
143 | + */ | ||
144 | + object_initialize_child(OBJECT(mms), "uart-oflow-orgate", | ||
145 | + &mms->uart_oflow, TYPE_OR_IRQ); | ||
146 | + qdev_prop_set_uint32(DEVICE(&mms->uart_oflow), "num-lines", | ||
147 | + MPS3R_UART_MAX * 2); | ||
148 | + qdev_realize(DEVICE(&mms->uart_oflow), NULL, &error_fatal); | ||
149 | + qdev_connect_gpio_out(DEVICE(&mms->uart_oflow), 0, | ||
150 | + qdev_get_gpio_in(gicdev, 17)); | ||
151 | + | ||
152 | + for (int i = 0; i < MPS3R_UART_MAX; i++) { | ||
153 | + hwaddr baseaddr = 0xe0205000 + i * 0x1000; | ||
154 | + int rxirq = 5 + i * 2, txirq = 6 + i * 2, combirq = 13 + i; | ||
155 | + | ||
156 | + create_uart(mms, i + MPS3R_CPU_MAX, sysmem, baseaddr, | ||
157 | + qdev_get_gpio_in(gicdev, txirq), | ||
158 | + qdev_get_gpio_in(gicdev, rxirq), | ||
159 | + qdev_get_gpio_in(DEVICE(&mms->uart_oflow), i * 2), | ||
160 | + qdev_get_gpio_in(DEVICE(&mms->uart_oflow), i * 2 + 1), | ||
161 | + qdev_get_gpio_in(gicdev, combirq)); | ||
162 | + } | ||
163 | |||
164 | mms->bootinfo.ram_size = machine->ram_size; | ||
165 | mms->bootinfo.board_id = -1; | ||
55 | -- | 166 | -- |
56 | 2.34.1 | 167 | 2.34.1 |
57 | 168 | ||
58 | 169 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | Add the GPIO, watchdog, dual-timer and I2C devices to the mps3-an536 |
---|---|---|---|
2 | board. These are all simple devices that just need to be created and | ||
3 | wired up. | ||
2 | 4 | ||
3 | This fixes a bug in which we failed to initialize | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
4 | the result attributes properly after the memset. | 6 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> |
7 | Message-id: 20240206132931.38376-12-peter.maydell@linaro.org | ||
8 | --- | ||
9 | hw/arm/mps3r.c | 59 ++++++++++++++++++++++++++++++++++++++++++++++++++ | ||
10 | 1 file changed, 59 insertions(+) | ||
5 | 11 | ||
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 12 | diff --git a/hw/arm/mps3r.c b/hw/arm/mps3r.c |
7 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> | ||
8 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
9 | Message-id: 20230620124418.805717-17-richard.henderson@linaro.org | ||
10 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
11 | --- | ||
12 | target/arm/ptw.c | 11 +---------- | ||
13 | 1 file changed, 1 insertion(+), 10 deletions(-) | ||
14 | |||
15 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c | ||
16 | index XXXXXXX..XXXXXXX 100644 | 13 | index XXXXXXX..XXXXXXX 100644 |
17 | --- a/target/arm/ptw.c | 14 | --- a/hw/arm/mps3r.c |
18 | +++ b/target/arm/ptw.c | 15 | +++ b/hw/arm/mps3r.c |
19 | @@ -XXX,XX +XXX,XX @@ typedef struct S1Translate { | 16 | @@ -XXX,XX +XXX,XX @@ |
20 | void *out_host; | 17 | #include "sysemu/sysemu.h" |
21 | } S1Translate; | 18 | #include "hw/boards.h" |
22 | 19 | #include "hw/or-irq.h" | |
23 | -static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw, | 20 | +#include "hw/qdev-clock.h" |
24 | - uint64_t address, MMUAccessType access_type, | 21 | #include "hw/qdev-properties.h" |
25 | - GetPhysAddrResult *result, ARMMMUFaultInfo *fi); | 22 | #include "hw/arm/boot.h" |
26 | - | 23 | #include "hw/arm/bsa.h" |
27 | static bool get_phys_addr_with_struct(CPUARMState *env, S1Translate *ptw, | 24 | #include "hw/char/cmsdk-apb-uart.h" |
28 | target_ulong address, | 25 | +#include "hw/i2c/arm_sbcon_i2c.h" |
29 | MMUAccessType access_type, | 26 | #include "hw/intc/arm_gicv3.h" |
30 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_twostage(CPUARMState *env, S1Translate *ptw, | 27 | +#include "hw/misc/unimp.h" |
31 | cacheattrs1 = result->cacheattrs; | 28 | +#include "hw/timer/cmsdk-apb-dualtimer.h" |
32 | memset(result, 0, sizeof(*result)); | 29 | +#include "hw/watchdog/cmsdk-apb-watchdog.h" |
33 | 30 | ||
34 | - if (arm_feature(env, ARM_FEATURE_PMSA)) { | 31 | /* Define the layout of RAM and ROM in a board */ |
35 | - ret = get_phys_addr_pmsav8(env, ipa, access_type, | 32 | typedef struct RAMInfo { |
36 | - ptw->in_mmu_idx, is_secure, result, fi); | 33 | @@ -XXX,XX +XXX,XX @@ struct MPS3RMachineState { |
37 | - } else { | 34 | CMSDKAPBUART uart[MPS3R_CPU_MAX + MPS3R_UART_MAX]; |
38 | - ret = get_phys_addr_lpae(env, ptw, ipa, access_type, result, fi); | 35 | OrIRQState cpu_uart_oflow[MPS3R_CPU_MAX]; |
39 | - } | 36 | OrIRQState uart_oflow; |
40 | + ret = get_phys_addr_with_struct(env, ptw, ipa, access_type, result, fi); | 37 | + CMSDKAPBWatchdog watchdog; |
41 | fi->s2addr = ipa; | 38 | + CMSDKAPBDualTimer dualtimer; |
42 | 39 | + ArmSbconI2CState i2c[5]; | |
43 | /* Combine the S1 and S2 perms. */ | 40 | + Clock *clk; |
41 | }; | ||
42 | |||
43 | #define TYPE_MPS3R_MACHINE "mps3r" | ||
44 | @@ -XXX,XX +XXX,XX @@ static void mps3r_common_init(MachineState *machine) | ||
45 | MemoryRegion *sysmem = get_system_memory(); | ||
46 | DeviceState *gicdev; | ||
47 | |||
48 | + mms->clk = clock_new(OBJECT(machine), "CLK"); | ||
49 | + clock_set_hz(mms->clk, CLK_FRQ); | ||
50 | + | ||
51 | for (const RAMInfo *ri = mmc->raminfo; ri->name; ri++) { | ||
52 | MemoryRegion *mr = mr_for_raminfo(mms, ri); | ||
53 | memory_region_add_subregion(sysmem, ri->base, mr); | ||
54 | @@ -XXX,XX +XXX,XX @@ static void mps3r_common_init(MachineState *machine) | ||
55 | qdev_get_gpio_in(gicdev, combirq)); | ||
56 | } | ||
57 | |||
58 | + for (int i = 0; i < 4; i++) { | ||
59 | + /* CMSDK GPIO controllers */ | ||
60 | + g_autofree char *s = g_strdup_printf("gpio%d", i); | ||
61 | + create_unimplemented_device(s, 0xe0000000 + i * 0x1000, 0x1000); | ||
62 | + } | ||
63 | + | ||
64 | + object_initialize_child(OBJECT(mms), "watchdog", &mms->watchdog, | ||
65 | + TYPE_CMSDK_APB_WATCHDOG); | ||
66 | + qdev_connect_clock_in(DEVICE(&mms->watchdog), "WDOGCLK", mms->clk); | ||
67 | + sysbus_realize(SYS_BUS_DEVICE(&mms->watchdog), &error_fatal); | ||
68 | + sysbus_connect_irq(SYS_BUS_DEVICE(&mms->watchdog), 0, | ||
69 | + qdev_get_gpio_in(gicdev, 0)); | ||
70 | + sysbus_mmio_map(SYS_BUS_DEVICE(&mms->watchdog), 0, 0xe0100000); | ||
71 | + | ||
72 | + object_initialize_child(OBJECT(mms), "dualtimer", &mms->dualtimer, | ||
73 | + TYPE_CMSDK_APB_DUALTIMER); | ||
74 | + qdev_connect_clock_in(DEVICE(&mms->dualtimer), "TIMCLK", mms->clk); | ||
75 | + sysbus_realize(SYS_BUS_DEVICE(&mms->dualtimer), &error_fatal); | ||
76 | + sysbus_connect_irq(SYS_BUS_DEVICE(&mms->dualtimer), 0, | ||
77 | + qdev_get_gpio_in(gicdev, 3)); | ||
78 | + sysbus_connect_irq(SYS_BUS_DEVICE(&mms->dualtimer), 1, | ||
79 | + qdev_get_gpio_in(gicdev, 1)); | ||
80 | + sysbus_connect_irq(SYS_BUS_DEVICE(&mms->dualtimer), 2, | ||
81 | + qdev_get_gpio_in(gicdev, 2)); | ||
82 | + sysbus_mmio_map(SYS_BUS_DEVICE(&mms->dualtimer), 0, 0xe0101000); | ||
83 | + | ||
84 | + for (int i = 0; i < ARRAY_SIZE(mms->i2c); i++) { | ||
85 | + static const hwaddr i2cbase[] = {0xe0102000, /* Touch */ | ||
86 | + 0xe0103000, /* Audio */ | ||
87 | + 0xe0107000, /* Shield0 */ | ||
88 | + 0xe0108000, /* Shield1 */ | ||
89 | + 0xe0109000}; /* DDR4 EEPROM */ | ||
90 | + g_autofree char *s = g_strdup_printf("i2c%d", i); | ||
91 | + | ||
92 | + object_initialize_child(OBJECT(mms), s, &mms->i2c[i], | ||
93 | + TYPE_ARM_SBCON_I2C); | ||
94 | + sysbus_realize(SYS_BUS_DEVICE(&mms->i2c[i]), &error_fatal); | ||
95 | + sysbus_mmio_map(SYS_BUS_DEVICE(&mms->i2c[i]), 0, i2cbase[i]); | ||
96 | + if (i != 2 && i != 3) { | ||
97 | + /* | ||
98 | + * internal-only bus: mark it full to avoid user-created | ||
99 | + * i2c devices being plugged into it. | ||
100 | + */ | ||
101 | + qbus_mark_full(qdev_get_child_bus(DEVICE(&mms->i2c[i]), "i2c")); | ||
102 | + } | ||
103 | + } | ||
104 | + | ||
105 | mms->bootinfo.ram_size = machine->ram_size; | ||
106 | mms->bootinfo.board_id = -1; | ||
107 | mms->bootinfo.loader_start = mmc->loader_start; | ||
44 | -- | 108 | -- |
45 | 2.34.1 | 109 | 2.34.1 |
46 | 110 | ||
47 | 111 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | Add the remaining devices (or unimplemented-device stubs) for |
---|---|---|---|
2 | this board: SPI controllers, SCC, FPGAIO, I2S, RTC, the | ||
3 | QSPI write-config block, and ethernet. | ||
2 | 4 | ||
3 | Test in_space instead of in_secure so that we don't | 5 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
4 | switch out of Root space. | 6 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> |
7 | Message-id: 20240206132931.38376-13-peter.maydell@linaro.org | ||
8 | --- | ||
9 | hw/arm/mps3r.c | 74 ++++++++++++++++++++++++++++++++++++++++++++++++++ | ||
10 | 1 file changed, 74 insertions(+) | ||
5 | 11 | ||
6 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 12 | diff --git a/hw/arm/mps3r.c b/hw/arm/mps3r.c |
7 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
8 | Message-id: 20230620124418.805717-12-richard.henderson@linaro.org | ||
9 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
10 | --- | ||
11 | target/arm/ptw.c | 28 ++++++++++++++-------------- | ||
12 | 1 file changed, 14 insertions(+), 14 deletions(-) | ||
13 | |||
14 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c | ||
15 | index XXXXXXX..XXXXXXX 100644 | 13 | index XXXXXXX..XXXXXXX 100644 |
16 | --- a/target/arm/ptw.c | 14 | --- a/hw/arm/mps3r.c |
17 | +++ b/target/arm/ptw.c | 15 | +++ b/hw/arm/mps3r.c |
18 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw, | 16 | @@ -XXX,XX +XXX,XX @@ |
17 | #include "hw/char/cmsdk-apb-uart.h" | ||
18 | #include "hw/i2c/arm_sbcon_i2c.h" | ||
19 | #include "hw/intc/arm_gicv3.h" | ||
20 | +#include "hw/misc/mps2-scc.h" | ||
21 | +#include "hw/misc/mps2-fpgaio.h" | ||
22 | #include "hw/misc/unimp.h" | ||
23 | +#include "hw/net/lan9118.h" | ||
24 | +#include "hw/rtc/pl031.h" | ||
25 | +#include "hw/ssi/pl022.h" | ||
26 | #include "hw/timer/cmsdk-apb-dualtimer.h" | ||
27 | #include "hw/watchdog/cmsdk-apb-watchdog.h" | ||
28 | |||
29 | @@ -XXX,XX +XXX,XX @@ struct MPS3RMachineState { | ||
30 | CMSDKAPBWatchdog watchdog; | ||
31 | CMSDKAPBDualTimer dualtimer; | ||
32 | ArmSbconI2CState i2c[5]; | ||
33 | + PL022State spi[3]; | ||
34 | + MPS2SCC scc; | ||
35 | + MPS2FPGAIO fpgaio; | ||
36 | + UnimplementedDeviceState i2s_audio; | ||
37 | + PL031State rtc; | ||
38 | Clock *clk; | ||
39 | }; | ||
40 | |||
41 | @@ -XXX,XX +XXX,XX @@ static const RAMInfo an536_raminfo[] = { | ||
42 | } | ||
43 | }; | ||
44 | |||
45 | +static const int an536_oscclk[] = { | ||
46 | + 24000000, /* 24MHz reference for RTC and timers */ | ||
47 | + 50000000, /* 50MHz ACLK */ | ||
48 | + 50000000, /* 50MHz MCLK */ | ||
49 | + 50000000, /* 50MHz GPUCLK */ | ||
50 | + 24576000, /* 24.576MHz AUDCLK */ | ||
51 | + 23750000, /* 23.75MHz HDLCDCLK */ | ||
52 | + 100000000, /* 100MHz DDR4_REF_CLK */ | ||
53 | +}; | ||
54 | + | ||
55 | static MemoryRegion *mr_for_raminfo(MPS3RMachineState *mms, | ||
56 | const RAMInfo *raminfo) | ||
19 | { | 57 | { |
20 | ARMCPU *cpu = env_archcpu(env); | 58 | @@ -XXX,XX +XXX,XX @@ static void mps3r_common_init(MachineState *machine) |
21 | ARMMMUIdx mmu_idx = ptw->in_mmu_idx; | 59 | MPS3RMachineClass *mmc = MPS3R_MACHINE_GET_CLASS(mms); |
22 | - bool is_secure = ptw->in_secure; | 60 | MemoryRegion *sysmem = get_system_memory(); |
23 | int32_t level; | 61 | DeviceState *gicdev; |
24 | ARMVAParameters param; | 62 | + QList *oscclk; |
25 | uint64_t ttbr; | 63 | |
26 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw, | 64 | mms->clk = clock_new(OBJECT(machine), "CLK"); |
27 | uint64_t descaddrmask; | 65 | clock_set_hz(mms->clk, CLK_FRQ); |
28 | bool aarch64 = arm_el_is_aa64(env, el); | 66 | @@ -XXX,XX +XXX,XX @@ static void mps3r_common_init(MachineState *machine) |
29 | uint64_t descriptor, new_descriptor; | 67 | } |
30 | - bool nstable; | ||
31 | |||
32 | /* TODO: This code does not support shareability levels. */ | ||
33 | if (aarch64) { | ||
34 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw, | ||
35 | descaddrmask = MAKE_64BIT_MASK(0, 40); | ||
36 | } | 68 | } |
37 | descaddrmask &= ~indexmask_grainsize; | 69 | |
38 | - | 70 | + for (int i = 0; i < ARRAY_SIZE(mms->spi); i++) { |
39 | - /* | 71 | + g_autofree char *s = g_strdup_printf("spi%d", i); |
40 | - * Secure stage 1 accesses start with the page table in secure memory and | 72 | + hwaddr baseaddr = 0xe0104000 + i * 0x1000; |
41 | - * can be downgraded to non-secure at any step. Non-secure accesses | 73 | + |
42 | - * remain non-secure. We implement this by just ORing in the NSTable/NS | 74 | + object_initialize_child(OBJECT(mms), s, &mms->spi[i], TYPE_PL022); |
43 | - * bits at each step. | 75 | + sysbus_realize(SYS_BUS_DEVICE(&mms->spi[i]), &error_fatal); |
44 | - * Stage 2 never gets this kind of downgrade. | 76 | + sysbus_mmio_map(SYS_BUS_DEVICE(&mms->spi[i]), 0, baseaddr); |
45 | - */ | 77 | + sysbus_connect_irq(SYS_BUS_DEVICE(&mms->spi[i]), 0, |
46 | - tableattrs = is_secure ? 0 : (1 << 4); | 78 | + qdev_get_gpio_in(gicdev, 22 + i)); |
47 | + tableattrs = 0; | 79 | + } |
48 | 80 | + | |
49 | next_level: | 81 | + object_initialize_child(OBJECT(mms), "scc", &mms->scc, TYPE_MPS2_SCC); |
50 | descaddr |= (address >> (stride * (4 - level))) & indexmask; | 82 | + qdev_prop_set_uint32(DEVICE(&mms->scc), "scc-cfg0", 0); |
51 | descaddr &= ~7ULL; | 83 | + qdev_prop_set_uint32(DEVICE(&mms->scc), "scc-cfg4", 0x2); |
52 | - nstable = !regime_is_stage2(mmu_idx) && extract32(tableattrs, 4, 1); | 84 | + qdev_prop_set_uint32(DEVICE(&mms->scc), "scc-aid", 0x00200008); |
53 | - if (nstable && ptw->in_secure) { | 85 | + qdev_prop_set_uint32(DEVICE(&mms->scc), "scc-id", 0x41055360); |
86 | + oscclk = qlist_new(); | ||
87 | + for (int i = 0; i < ARRAY_SIZE(an536_oscclk); i++) { | ||
88 | + qlist_append_int(oscclk, an536_oscclk[i]); | ||
89 | + } | ||
90 | + qdev_prop_set_array(DEVICE(&mms->scc), "oscclk", oscclk); | ||
91 | + sysbus_realize(SYS_BUS_DEVICE(&mms->scc), &error_fatal); | ||
92 | + sysbus_mmio_map(SYS_BUS_DEVICE(&mms->scc), 0, 0xe0200000); | ||
93 | + | ||
94 | + create_unimplemented_device("i2s-audio", 0xe0201000, 0x1000); | ||
95 | + | ||
96 | + object_initialize_child(OBJECT(mms), "fpgaio", &mms->fpgaio, | ||
97 | + TYPE_MPS2_FPGAIO); | ||
98 | + qdev_prop_set_uint32(DEVICE(&mms->fpgaio), "prescale-clk", an536_oscclk[1]); | ||
99 | + qdev_prop_set_uint32(DEVICE(&mms->fpgaio), "num-leds", 10); | ||
100 | + qdev_prop_set_bit(DEVICE(&mms->fpgaio), "has-switches", true); | ||
101 | + qdev_prop_set_bit(DEVICE(&mms->fpgaio), "has-dbgctrl", false); | ||
102 | + sysbus_realize(SYS_BUS_DEVICE(&mms->fpgaio), &error_fatal); | ||
103 | + sysbus_mmio_map(SYS_BUS_DEVICE(&mms->fpgaio), 0, 0xe0202000); | ||
104 | + | ||
105 | + create_unimplemented_device("clcd", 0xe0209000, 0x1000); | ||
106 | + | ||
107 | + object_initialize_child(OBJECT(mms), "rtc", &mms->rtc, TYPE_PL031); | ||
108 | + sysbus_realize(SYS_BUS_DEVICE(&mms->rtc), &error_fatal); | ||
109 | + sysbus_mmio_map(SYS_BUS_DEVICE(&mms->rtc), 0, 0xe020a000); | ||
110 | + sysbus_connect_irq(SYS_BUS_DEVICE(&mms->rtc), 0, | ||
111 | + qdev_get_gpio_in(gicdev, 4)); | ||
54 | + | 112 | + |
55 | + /* | 113 | + /* |
56 | + * Process the NSTable bit from the previous level. This changes | 114 | + * In hardware this is a LAN9220; the LAN9118 is software compatible |
57 | + * the table address space and the output space from Secure to | 115 | + * except that it doesn't support the checksum-offload feature. |
58 | + * NonSecure. With RME, the EL3 translation regime does not change | ||
59 | + * from Root to NonSecure. | ||
60 | + */ | 116 | + */ |
61 | + if (ptw->in_space == ARMSS_Secure | 117 | + lan9118_init(0xe0300000, |
62 | + && !regime_is_stage2(mmu_idx) | 118 | + qdev_get_gpio_in(gicdev, 18)); |
63 | + && extract32(tableattrs, 4, 1)) { | ||
64 | /* | ||
65 | * Stage2_S -> Stage2 or Phys_S -> Phys_NS | ||
66 | * Assert the relative order of the secure/non-secure indexes. | ||
67 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw, | ||
68 | QEMU_BUILD_BUG_ON(ARMMMUIdx_Stage2_S + 1 != ARMMMUIdx_Stage2); | ||
69 | ptw->in_ptw_idx += 1; | ||
70 | ptw->in_secure = false; | ||
71 | + ptw->in_space = ARMSS_NonSecure; | ||
72 | } | ||
73 | + | 119 | + |
74 | if (!S1_ptw_translate(env, ptw, descaddr, fi)) { | 120 | + create_unimplemented_device("usb", 0xe0301000, 0x1000); |
75 | goto do_fault; | 121 | + create_unimplemented_device("qspi-write-config", 0xe0600000, 0x1000); |
76 | } | 122 | + |
77 | @@ -XXX,XX +XXX,XX @@ static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw, | 123 | mms->bootinfo.ram_size = machine->ram_size; |
78 | */ | 124 | mms->bootinfo.board_id = -1; |
79 | attrs = new_descriptor & (MAKE_64BIT_MASK(2, 10) | MAKE_64BIT_MASK(50, 14)); | 125 | mms->bootinfo.loader_start = mmc->loader_start; |
80 | if (!regime_is_stage2(mmu_idx)) { | ||
81 | - attrs |= nstable << 5; /* NS */ | ||
82 | + attrs |= !ptw->in_secure << 5; /* NS */ | ||
83 | if (!param.hpd) { | ||
84 | attrs |= extract64(tableattrs, 0, 2) << 53; /* XN, PXN */ | ||
85 | /* | ||
86 | -- | 126 | -- |
87 | 2.34.1 | 127 | 2.34.1 |
128 | |||
129 | diff view generated by jsdifflib |
1 | From: Richard Henderson <richard.henderson@linaro.org> | 1 | Add documentation for the mps3-an536 board type. |
---|---|---|---|
2 | 2 | ||
3 | This was added in 7e98e21c098 as part of a reorg in which | 3 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> |
4 | one of the argument had been legally NULL, and this caught | 4 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> |
5 | actual instances. Now that the reorg is complete, this | 5 | Message-id: 20240206132931.38376-14-peter.maydell@linaro.org |
6 | serves little purpose. | 6 | --- |
7 | docs/system/arm/mps2.rst | 37 ++++++++++++++++++++++++++++++++++--- | ||
8 | 1 file changed, 34 insertions(+), 3 deletions(-) | ||
7 | 9 | ||
8 | Reviewed-by: Peter Maydell <peter.maydell@linaro.org> | 10 | diff --git a/docs/system/arm/mps2.rst b/docs/system/arm/mps2.rst |
9 | Reviewed-by: Philippe Mathieu-Daudé <philmd@linaro.org> | ||
10 | Signed-off-by: Richard Henderson <richard.henderson@linaro.org> | ||
11 | Message-id: 20230620124418.805717-10-richard.henderson@linaro.org | ||
12 | Signed-off-by: Peter Maydell <peter.maydell@linaro.org> | ||
13 | --- | ||
14 | target/arm/ptw.c | 6 ++---- | ||
15 | 1 file changed, 2 insertions(+), 4 deletions(-) | ||
16 | |||
17 | diff --git a/target/arm/ptw.c b/target/arm/ptw.c | ||
18 | index XXXXXXX..XXXXXXX 100644 | 11 | index XXXXXXX..XXXXXXX 100644 |
19 | --- a/target/arm/ptw.c | 12 | --- a/docs/system/arm/mps2.rst |
20 | +++ b/target/arm/ptw.c | 13 | +++ b/docs/system/arm/mps2.rst |
21 | @@ -XXX,XX +XXX,XX @@ typedef struct S1Translate { | 14 | @@ -XXX,XX +XXX,XX @@ |
22 | static bool get_phys_addr_lpae(CPUARMState *env, S1Translate *ptw, | 15 | -Arm MPS2 and MPS3 boards (``mps2-an385``, ``mps2-an386``, ``mps2-an500``, ``mps2-an505``, ``mps2-an511``, ``mps2-an521``, ``mps3-an524``, ``mps3-an547``) |
23 | uint64_t address, | 16 | -========================================================================================================================================================= |
24 | MMUAccessType access_type, bool s1_is_el0, | 17 | +Arm MPS2 and MPS3 boards (``mps2-an385``, ``mps2-an386``, ``mps2-an500``, ``mps2-an505``, ``mps2-an511``, ``mps2-an521``, ``mps3-an524``, ``mps3-an536``, ``mps3-an547``) |
25 | - GetPhysAddrResult *result, ARMMMUFaultInfo *fi) | 18 | +========================================================================================================================================================================= |
26 | - __attribute__((nonnull)); | 19 | |
27 | + GetPhysAddrResult *result, ARMMMUFaultInfo *fi); | 20 | -These board models all use Arm M-profile CPUs. |
28 | 21 | +These board models use Arm M-profile or R-profile CPUs. | |
29 | static bool get_phys_addr_with_struct(CPUARMState *env, S1Translate *ptw, | 22 | |
30 | target_ulong address, | 23 | The Arm MPS2, MPS2+ and MPS3 dev boards are FPGA based (the 2+ has a |
31 | MMUAccessType access_type, | 24 | bigger FPGA but is otherwise the same as the 2; the 3 has a bigger |
32 | GetPhysAddrResult *result, | 25 | @@ -XXX,XX +XXX,XX @@ FPGA image. |
33 | - ARMMMUFaultInfo *fi) | 26 | |
34 | - __attribute__((nonnull)); | 27 | QEMU models the following FPGA images: |
35 | + ARMMMUFaultInfo *fi); | 28 | |
36 | 29 | +FPGA images using M-profile CPUs: | |
37 | /* This mapping is common between ID_AA64MMFR0.PARANGE and TCR_ELx.{I}PS. */ | 30 | + |
38 | static const uint8_t pamax_map[] = { | 31 | ``mps2-an385`` |
32 | Cortex-M3 as documented in Arm Application Note AN385 | ||
33 | ``mps2-an386`` | ||
34 | @@ -XXX,XX +XXX,XX @@ QEMU models the following FPGA images: | ||
35 | ``mps3-an547`` | ||
36 | Cortex-M55 on an MPS3, as documented in Arm Application Note AN547 | ||
37 | |||
38 | +FPGA images using R-profile CPUs: | ||
39 | + | ||
40 | +``mps3-an536`` | ||
41 | + Dual Cortex-R52 on an MPS3, as documented in Arm Application Note AN536 | ||
42 | + | ||
43 | Differences between QEMU and real hardware: | ||
44 | |||
45 | - AN385/AN386 remapping of low 16K of memory to either ZBT SSRAM1 or to | ||
46 | @@ -XXX,XX +XXX,XX @@ Differences between QEMU and real hardware: | ||
47 | flash, but only as simple ROM, so attempting to rewrite the flash | ||
48 | from the guest will fail | ||
49 | - QEMU does not model the USB controller in MPS3 boards | ||
50 | +- AN536 does not support runtime control of CPU reset and halt via | ||
51 | + the SCC CFG_REG0 register. | ||
52 | +- AN536 does not support enabling or disabling the flash and ATCM | ||
53 | + interfaces via the SCC CFG_REG1 register. | ||
54 | +- AN536 does not support setting of the initial vector table | ||
55 | + base address via the SCC CFG_REG6 and CFG_REG7 register config, | ||
56 | + and does not provide a mechanism for specifying these values at | ||
57 | + startup, so all guest images must be built to start from TCM | ||
58 | + (i.e. to expect the interrupt vector base at 0 from reset). | ||
59 | +- AN536 defaults to only creating a single CPU; this is the equivalent | ||
60 | + of the way the real FPGA image usually runs with the second Cortex-R52 | ||
61 | + held in halt via the initial SCC CFG_REG0 register setting. You can | ||
62 | + create the second CPU with ``-smp 2``; both CPUs will then start | ||
63 | + execution immediately on startup. | ||
64 | + | ||
65 | +Note that for the AN536 the first UART is accessible only by | ||
66 | +CPU0, and the second UART is accessible only by CPU1. The | ||
67 | +first UART accessible shared between both CPUs is the third | ||
68 | +UART. Guest software might therefore be built to use either | ||
69 | +the first UART or the third UART; if you don't see any output | ||
70 | +from the UART you are looking at, try one of the others. | ||
71 | +(Even if the AN536 machine is started with a single CPU and so | ||
72 | +no "CPU1-only UART", the UART numbering remains the same, | ||
73 | +with the third UART being the first of the shared ones.) | ||
74 | |||
75 | Machine-specific options | ||
76 | """""""""""""""""""""""" | ||
39 | -- | 77 | -- |
40 | 2.34.1 | 78 | 2.34.1 |
41 | 79 | ||
42 | 80 | diff view generated by jsdifflib |