From: Richard Henderson <richard.henderson@linaro.org>
To: "Alex Bennée" <alex.bennee@linaro.org>, qemu-devel@nongnu.org
Cc: Peter Maydell <peter.maydell@linaro.org>,
qemu-arm@nongnu.org, Claudio Fontana <cfontana@suse.de>
Subject: Re: [PATCH v16 51/99] target/arm: move exception code out of tcg/helper.c
Date: Fri, 4 Jun 2021 22:56:27 -0700 [thread overview]
Message-ID: <9c9d6785-9411-e901-d7d7-f1fc9cac8768@linaro.org> (raw)
In-Reply-To: <20210604155312.15902-52-alex.bennee@linaro.org>
On 6/4/21 8:52 AM, Alex Bennée wrote:
> From: Claudio Fontana <cfontana@suse.de>
>
> cpu-sysemu.c:
>
> we need this sysemu code for KVM too, so we move the code to
> cpu-sysemu.c so we can reach a builable state.
>
> There will be further split later on in dedicated
> exception modules for 32 and 64bit, after we make more
> necessary changes to be able to split TARGET_AARCH64-only code.
>
> tcg/sysemu/tcg-cpu.c:
>
> the TCG-specific code we put in tcg/sysemu/, in preparation
> for the addition of the tcg-cpu accel-cpu ARM subclass.
>
> Signed-off-by: Claudio Fontana <cfontana@suse.de>
> Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
> ---
> target/arm/tcg/tcg-cpu.h | 31 ++
> target/arm/cpu-sysemu.c | 670 +++++++++++++++++++++++++++
> target/arm/tcg/helper.c | 734 ------------------------------
> target/arm/tcg/sysemu/tcg-cpu.c | 73 +++
> target/arm/tcg/sysemu/meson.build | 1 +
> 5 files changed, 775 insertions(+), 734 deletions(-)
> create mode 100644 target/arm/tcg/tcg-cpu.h
> create mode 100644 target/arm/tcg/sysemu/tcg-cpu.c
>
> diff --git a/target/arm/tcg/tcg-cpu.h b/target/arm/tcg/tcg-cpu.h
> new file mode 100644
> index 0000000000..0ee8ba073b
> --- /dev/null
> +++ b/target/arm/tcg/tcg-cpu.h
> @@ -0,0 +1,31 @@
> +/*
> + * QEMU ARM CPU
> + *
> + * Copyright (c) 2012 SUSE LINUX Products GmbH
> + *
> + * This program is free software; you can redistribute it and/or
> + * modify it under the terms of the GNU General Public License
> + * as published by the Free Software Foundation; either version 2
> + * of the License, or (at your option) any later version.
> + *
> + * This program is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
> + * GNU General Public License for more details.
> + *
> + * You should have received a copy of the GNU General Public License
> + * along with this program; if not, see
> + * <http://www.gnu.org/licenses/gpl-2.0.html>
> + */
> +#ifndef ARM_TCG_CPU_H
> +#define ARM_TCG_CPU_H
> +
> +#include "cpu.h"
I presume there's something later that requires this include?
> +
> +#ifndef CONFIG_USER_ONLY
> +/* Do semihosting call and set the appropriate return value. */
> +void handle_semihosting(CPUState *cs);
... because at present this typedef is already present, via "qemu/typedefs.h"
via "qemu/osdep.h", which is always included first.
r`
> +
> +#endif /* !CONFIG_USER_ONLY */
> +
> +#endif /* ARM_TCG_CPU_H */
> diff --git a/target/arm/cpu-sysemu.c b/target/arm/cpu-sysemu.c
> index 0d80a0161c..0e872b2e55 100644
> --- a/target/arm/cpu-sysemu.c
> +++ b/target/arm/cpu-sysemu.c
> @@ -19,10 +19,14 @@
> */
>
> #include "qemu/osdep.h"
> +#include "qemu/log.h"
> +#include "qemu/main-loop.h"
> #include "cpu.h"
> #include "internals.h"
> #include "sysemu/hw_accel.h"
> #include "kvm_arm.h"
> +#include "sysemu/tcg.h"
> +#include "tcg/tcg-cpu.h"
>
> void arm_cpu_set_irq(void *opaque, int irq, int level)
> {
> @@ -508,3 +512,669 @@ int fp_exception_el(CPUARMState *env, int cur_el)
> }
> return 0;
> }
> +
> +static void take_aarch32_exception(CPUARMState *env, int new_mode,
> + uint32_t mask, uint32_t offset,
> + uint32_t newpc)
> +{
> + int new_el;
> +
> + /* Change the CPU state so as to actually take the exception. */
> + switch_mode(env, new_mode);
> +
> + /*
> + * For exceptions taken to AArch32 we must clear the SS bit in both
> + * PSTATE and in the old-state value we save to SPSR_<mode>, so zero it now.
> + */
> + env->pstate &= ~PSTATE_SS;
> + env->spsr = cpsr_read(env);
> + /* Clear IT bits. */
> + env->condexec_bits = 0;
> + /* Switch to the new mode, and to the correct instruction set. */
> + env->uncached_cpsr = (env->uncached_cpsr & ~CPSR_M) | new_mode;
> +
> + /* This must be after mode switching. */
> + new_el = arm_current_el(env);
> +
> + /* Set new mode endianness */
> + env->uncached_cpsr &= ~CPSR_E;
> + if (env->cp15.sctlr_el[new_el] & SCTLR_EE) {
> + env->uncached_cpsr |= CPSR_E;
> + }
> + /* J and IL must always be cleared for exception entry */
> + env->uncached_cpsr &= ~(CPSR_IL | CPSR_J);
> + env->daif |= mask;
> +
> + if (new_mode == ARM_CPU_MODE_HYP) {
> + env->thumb = (env->cp15.sctlr_el[2] & SCTLR_TE) != 0;
> + env->elr_el[2] = env->regs[15];
> + } else {
> + /* CPSR.PAN is normally preserved preserved unless... */
> + if (cpu_isar_feature(aa32_pan, env_archcpu(env))) {
> + switch (new_el) {
> + case 3:
> + if (!arm_is_secure_below_el3(env)) {
> + /* ... the target is EL3, from non-secure state. */
> + env->uncached_cpsr &= ~CPSR_PAN;
> + break;
> + }
> + /* ... the target is EL3, from secure state ... */
> + /* fall through */
> + case 1:
> + /* ... the target is EL1 and SCTLR.SPAN is 0. */
> + if (!(env->cp15.sctlr_el[new_el] & SCTLR_SPAN)) {
> + env->uncached_cpsr |= CPSR_PAN;
> + }
> + break;
> + }
> + }
> + /*
> + * this is a lie, as there was no c1_sys on V4T/V5, but who cares
> + * and we should just guard the thumb mode on V4
> + */
> + if (arm_feature(env, ARM_FEATURE_V4T)) {
> + env->thumb =
> + (A32_BANKED_CURRENT_REG_GET(env, sctlr) & SCTLR_TE) != 0;
> + }
> + env->regs[14] = env->regs[15] + offset;
> + }
> + env->regs[15] = newpc;
> + if (tcg_enabled()) {
> + arm_rebuild_hflags(env);
> + }
> +}
> +
> +static void arm_cpu_do_interrupt_aarch32_hyp(CPUState *cs)
> +{
> + /*
> + * Handle exception entry to Hyp mode; this is sufficiently
> + * different to entry to other AArch32 modes that we handle it
> + * separately here.
> + *
> + * The vector table entry used is always the 0x14 Hyp mode entry point,
> + * unless this is an UNDEF/HVC/abort taken from Hyp to Hyp.
> + * The offset applied to the preferred return address is always zero
> + * (see DDI0487C.a section G1.12.3).
> + * PSTATE A/I/F masks are set based only on the SCR.EA/IRQ/FIQ values.
> + */
> + uint32_t addr, mask;
> + ARMCPU *cpu = ARM_CPU(cs);
> + CPUARMState *env = &cpu->env;
> +
> + switch (cs->exception_index) {
> + case EXCP_UDEF:
> + addr = 0x04;
> + break;
> + case EXCP_SWI:
> + addr = 0x14;
> + break;
> + case EXCP_BKPT:
> + /* Fall through to prefetch abort. */
> + case EXCP_PREFETCH_ABORT:
> + env->cp15.ifar_s = env->exception.vaddress;
> + qemu_log_mask(CPU_LOG_INT, "...with HIFAR 0x%x\n",
> + (uint32_t)env->exception.vaddress);
> + addr = 0x0c;
> + break;
> + case EXCP_DATA_ABORT:
> + env->cp15.dfar_s = env->exception.vaddress;
> + qemu_log_mask(CPU_LOG_INT, "...with HDFAR 0x%x\n",
> + (uint32_t)env->exception.vaddress);
> + addr = 0x10;
> + break;
> + case EXCP_IRQ:
> + addr = 0x18;
> + break;
> + case EXCP_FIQ:
> + addr = 0x1c;
> + break;
> + case EXCP_HVC:
> + addr = 0x08;
> + break;
> + case EXCP_HYP_TRAP:
> + addr = 0x14;
> + break;
> + default:
> + cpu_abort(cs, "Unhandled exception 0x%x\n", cs->exception_index);
> + }
> +
> + if (cs->exception_index != EXCP_IRQ && cs->exception_index != EXCP_FIQ) {
> + if (!arm_feature(env, ARM_FEATURE_V8)) {
> + /*
> + * QEMU syndrome values are v8-style. v7 has the IL bit
> + * UNK/SBZP for "field not valid" cases, where v8 uses RES1.
> + * If this is a v7 CPU, squash the IL bit in those cases.
> + */
> + if (cs->exception_index == EXCP_PREFETCH_ABORT ||
> + (cs->exception_index == EXCP_DATA_ABORT &&
> + !(env->exception.syndrome & ARM_EL_ISV)) ||
> + syn_get_ec(env->exception.syndrome) == EC_UNCATEGORIZED) {
> + env->exception.syndrome &= ~ARM_EL_IL;
> + }
> + }
> + env->cp15.esr_el[2] = env->exception.syndrome;
> + }
> +
> + if (arm_current_el(env) != 2 && addr < 0x14) {
> + addr = 0x14;
> + }
> +
> + mask = 0;
> + if (!(env->cp15.scr_el3 & SCR_EA)) {
> + mask |= CPSR_A;
> + }
> + if (!(env->cp15.scr_el3 & SCR_IRQ)) {
> + mask |= CPSR_I;
> + }
> + if (!(env->cp15.scr_el3 & SCR_FIQ)) {
> + mask |= CPSR_F;
> + }
> +
> + addr += env->cp15.hvbar;
> +
> + take_aarch32_exception(env, ARM_CPU_MODE_HYP, mask, 0, addr);
> +}
> +
> +static void arm_cpu_do_interrupt_aarch32(CPUState *cs)
> +{
> + ARMCPU *cpu = ARM_CPU(cs);
> + CPUARMState *env = &cpu->env;
> + uint32_t addr;
> + uint32_t mask;
> + int new_mode;
> + uint32_t offset;
> + uint32_t moe;
> +
> + /* If this is a debug exception we must update the DBGDSCR.MOE bits */
> + switch (syn_get_ec(env->exception.syndrome)) {
> + case EC_BREAKPOINT:
> + case EC_BREAKPOINT_SAME_EL:
> + moe = 1;
> + break;
> + case EC_WATCHPOINT:
> + case EC_WATCHPOINT_SAME_EL:
> + moe = 10;
> + break;
> + case EC_AA32_BKPT:
> + moe = 3;
> + break;
> + case EC_VECTORCATCH:
> + moe = 5;
> + break;
> + default:
> + moe = 0;
> + break;
> + }
> +
> + if (moe) {
> + env->cp15.mdscr_el1 = deposit64(env->cp15.mdscr_el1, 2, 4, moe);
> + }
> +
> + if (env->exception.target_el == 2) {
> + arm_cpu_do_interrupt_aarch32_hyp(cs);
> + return;
> + }
> +
> + switch (cs->exception_index) {
> + case EXCP_UDEF:
> + new_mode = ARM_CPU_MODE_UND;
> + addr = 0x04;
> + mask = CPSR_I;
> + if (env->thumb) {
> + offset = 2;
> + } else {
> + offset = 4;
> + }
> + break;
> + case EXCP_SWI:
> + new_mode = ARM_CPU_MODE_SVC;
> + addr = 0x08;
> + mask = CPSR_I;
> + /* The PC already points to the next instruction. */
> + offset = 0;
> + break;
> + case EXCP_BKPT:
> + /* Fall through to prefetch abort. */
> + case EXCP_PREFETCH_ABORT:
> + A32_BANKED_CURRENT_REG_SET(env, ifsr, env->exception.fsr);
> + A32_BANKED_CURRENT_REG_SET(env, ifar, env->exception.vaddress);
> + qemu_log_mask(CPU_LOG_INT, "...with IFSR 0x%x IFAR 0x%x\n",
> + env->exception.fsr, (uint32_t)env->exception.vaddress);
> + new_mode = ARM_CPU_MODE_ABT;
> + addr = 0x0c;
> + mask = CPSR_A | CPSR_I;
> + offset = 4;
> + break;
> + case EXCP_DATA_ABORT:
> + A32_BANKED_CURRENT_REG_SET(env, dfsr, env->exception.fsr);
> + A32_BANKED_CURRENT_REG_SET(env, dfar, env->exception.vaddress);
> + qemu_log_mask(CPU_LOG_INT, "...with DFSR 0x%x DFAR 0x%x\n",
> + env->exception.fsr,
> + (uint32_t)env->exception.vaddress);
> + new_mode = ARM_CPU_MODE_ABT;
> + addr = 0x10;
> + mask = CPSR_A | CPSR_I;
> + offset = 8;
> + break;
> + case EXCP_IRQ:
> + new_mode = ARM_CPU_MODE_IRQ;
> + addr = 0x18;
> + /* Disable IRQ and imprecise data aborts. */
> + mask = CPSR_A | CPSR_I;
> + offset = 4;
> + if (env->cp15.scr_el3 & SCR_IRQ) {
> + /* IRQ routed to monitor mode */
> + new_mode = ARM_CPU_MODE_MON;
> + mask |= CPSR_F;
> + }
> + break;
> + case EXCP_FIQ:
> + new_mode = ARM_CPU_MODE_FIQ;
> + addr = 0x1c;
> + /* Disable FIQ, IRQ and imprecise data aborts. */
> + mask = CPSR_A | CPSR_I | CPSR_F;
> + if (env->cp15.scr_el3 & SCR_FIQ) {
> + /* FIQ routed to monitor mode */
> + new_mode = ARM_CPU_MODE_MON;
> + }
> + offset = 4;
> + break;
> + case EXCP_VIRQ:
> + new_mode = ARM_CPU_MODE_IRQ;
> + addr = 0x18;
> + /* Disable IRQ and imprecise data aborts. */
> + mask = CPSR_A | CPSR_I;
> + offset = 4;
> + break;
> + case EXCP_VFIQ:
> + new_mode = ARM_CPU_MODE_FIQ;
> + addr = 0x1c;
> + /* Disable FIQ, IRQ and imprecise data aborts. */
> + mask = CPSR_A | CPSR_I | CPSR_F;
> + offset = 4;
> + break;
> + case EXCP_SMC:
> + new_mode = ARM_CPU_MODE_MON;
> + addr = 0x08;
> + mask = CPSR_A | CPSR_I | CPSR_F;
> + offset = 0;
> + break;
> + default:
> + cpu_abort(cs, "Unhandled exception 0x%x\n", cs->exception_index);
> + return; /* Never happens. Keep compiler happy. */
> + }
> +
> + if (new_mode == ARM_CPU_MODE_MON) {
> + addr += env->cp15.mvbar;
> + } else if (A32_BANKED_CURRENT_REG_GET(env, sctlr) & SCTLR_V) {
> + /* High vectors. When enabled, base address cannot be remapped. */
> + addr += 0xffff0000;
> + } else {
> + /*
> + * ARM v7 architectures provide a vector base address register to remap
> + * the interrupt vector table.
> + * This register is only followed in non-monitor mode, and is banked.
> + * Note: only bits 31:5 are valid.
> + */
> + addr += A32_BANKED_CURRENT_REG_GET(env, vbar);
> + }
> +
> + if ((env->uncached_cpsr & CPSR_M) == ARM_CPU_MODE_MON) {
> + env->cp15.scr_el3 &= ~SCR_NS;
> + }
> +
> + take_aarch32_exception(env, new_mode, mask, offset, addr);
> +}
> +
> +static int aarch64_regnum(CPUARMState *env, int aarch32_reg)
> +{
> + /*
> + * Return the register number of the AArch64 view of the AArch32
> + * register @aarch32_reg. The CPUARMState CPSR is assumed to still
> + * be that of the AArch32 mode the exception came from.
> + */
> + int mode = env->uncached_cpsr & CPSR_M;
> +
> + switch (aarch32_reg) {
> + case 0 ... 7:
> + return aarch32_reg;
> + case 8 ... 12:
> + return mode == ARM_CPU_MODE_FIQ ? aarch32_reg + 16 : aarch32_reg;
> + case 13:
> + switch (mode) {
> + case ARM_CPU_MODE_USR:
> + case ARM_CPU_MODE_SYS:
> + return 13;
> + case ARM_CPU_MODE_HYP:
> + return 15;
> + case ARM_CPU_MODE_IRQ:
> + return 17;
> + case ARM_CPU_MODE_SVC:
> + return 19;
> + case ARM_CPU_MODE_ABT:
> + return 21;
> + case ARM_CPU_MODE_UND:
> + return 23;
> + case ARM_CPU_MODE_FIQ:
> + return 29;
> + default:
> + g_assert_not_reached();
> + }
> + case 14:
> + switch (mode) {
> + case ARM_CPU_MODE_USR:
> + case ARM_CPU_MODE_SYS:
> + case ARM_CPU_MODE_HYP:
> + return 14;
> + case ARM_CPU_MODE_IRQ:
> + return 16;
> + case ARM_CPU_MODE_SVC:
> + return 18;
> + case ARM_CPU_MODE_ABT:
> + return 20;
> + case ARM_CPU_MODE_UND:
> + return 22;
> + case ARM_CPU_MODE_FIQ:
> + return 30;
> + default:
> + g_assert_not_reached();
> + }
> + case 15:
> + return 31;
> + default:
> + g_assert_not_reached();
> + }
> +}
> +
> +static uint32_t cpsr_read_for_spsr_elx(CPUARMState *env)
> +{
> + uint32_t ret = cpsr_read(env);
> +
> + /* Move DIT to the correct location for SPSR_ELx */
> + if (ret & CPSR_DIT) {
> + ret &= ~CPSR_DIT;
> + ret |= PSTATE_DIT;
> + }
> + /* Merge PSTATE.SS into SPSR_ELx */
> + ret |= env->pstate & PSTATE_SS;
> +
> + return ret;
> +}
> +
> +/* Handle exception entry to a target EL which is using AArch64 */
> +static void arm_cpu_do_interrupt_aarch64(CPUState *cs)
> +{
> + ARMCPU *cpu = ARM_CPU(cs);
> + CPUARMState *env = &cpu->env;
> + unsigned int new_el = env->exception.target_el;
> + target_ulong addr = env->cp15.vbar_el[new_el];
> + unsigned int new_mode = aarch64_pstate_mode(new_el, true);
> + unsigned int old_mode;
> + unsigned int cur_el = arm_current_el(env);
> + int rt;
> +
> + /*
> + * Note that new_el can never be 0. If cur_el is 0, then
> + * el0_a64 is is_a64(), else el0_a64 is ignored.
> + */
> + aarch64_sve_change_el(env, cur_el, new_el, is_a64(env));
> +
> + if (cur_el < new_el) {
> + /*
> + * Entry vector offset depends on whether the implemented EL
> + * immediately lower than the target level is using AArch32 or AArch64
> + */
> + bool is_aa64;
> + uint64_t hcr;
> +
> + switch (new_el) {
> + case 3:
> + is_aa64 = (env->cp15.scr_el3 & SCR_RW) != 0;
> + break;
> + case 2:
> + hcr = arm_hcr_el2_eff(env);
> + if ((hcr & (HCR_E2H | HCR_TGE)) != (HCR_E2H | HCR_TGE)) {
> + is_aa64 = (hcr & HCR_RW) != 0;
> + break;
> + }
> + /* fall through */
> + case 1:
> + is_aa64 = is_a64(env);
> + break;
> + default:
> + g_assert_not_reached();
> + }
> +
> + if (is_aa64) {
> + addr += 0x400;
> + } else {
> + addr += 0x600;
> + }
> + } else if (pstate_read(env) & PSTATE_SP) {
> + addr += 0x200;
> + }
> +
> + switch (cs->exception_index) {
> + case EXCP_PREFETCH_ABORT:
> + case EXCP_DATA_ABORT:
> + env->cp15.far_el[new_el] = env->exception.vaddress;
> + qemu_log_mask(CPU_LOG_INT, "...with FAR 0x%" PRIx64 "\n",
> + env->cp15.far_el[new_el]);
> + /* fall through */
> + case EXCP_BKPT:
> + case EXCP_UDEF:
> + case EXCP_SWI:
> + case EXCP_HVC:
> + case EXCP_HYP_TRAP:
> + case EXCP_SMC:
> + switch (syn_get_ec(env->exception.syndrome)) {
> + case EC_ADVSIMDFPACCESSTRAP:
> + /*
> + * QEMU internal FP/SIMD syndromes from AArch32 include the
> + * TA and coproc fields which are only exposed if the exception
> + * is taken to AArch32 Hyp mode. Mask them out to get a valid
> + * AArch64 format syndrome.
> + */
> + env->exception.syndrome &= ~MAKE_64BIT_MASK(0, 20);
> + break;
> + case EC_CP14RTTRAP:
> + case EC_CP15RTTRAP:
> + case EC_CP14DTTRAP:
> + /*
> + * For a trap on AArch32 MRC/MCR/LDC/STC the Rt field is currently
> + * the raw register field from the insn; when taking this to
> + * AArch64 we must convert it to the AArch64 view of the register
> + * number. Notice that we read a 4-bit AArch32 register number and
> + * write back a 5-bit AArch64 one.
> + */
> + rt = extract32(env->exception.syndrome, 5, 4);
> + rt = aarch64_regnum(env, rt);
> + env->exception.syndrome = deposit32(env->exception.syndrome,
> + 5, 5, rt);
> + break;
> + case EC_CP15RRTTRAP:
> + case EC_CP14RRTTRAP:
> + /* Similarly for MRRC/MCRR traps for Rt and Rt2 fields */
> + rt = extract32(env->exception.syndrome, 5, 4);
> + rt = aarch64_regnum(env, rt);
> + env->exception.syndrome = deposit32(env->exception.syndrome,
> + 5, 5, rt);
> + rt = extract32(env->exception.syndrome, 10, 4);
> + rt = aarch64_regnum(env, rt);
> + env->exception.syndrome = deposit32(env->exception.syndrome,
> + 10, 5, rt);
> + break;
> + }
> + env->cp15.esr_el[new_el] = env->exception.syndrome;
> + break;
> + case EXCP_IRQ:
> + case EXCP_VIRQ:
> + addr += 0x80;
> + break;
> + case EXCP_FIQ:
> + case EXCP_VFIQ:
> + addr += 0x100;
> + break;
> + default:
> + cpu_abort(cs, "Unhandled exception 0x%x\n", cs->exception_index);
> + }
> +
> + if (is_a64(env)) {
> + old_mode = pstate_read(env);
> + aarch64_save_sp(env, arm_current_el(env));
> + env->elr_el[new_el] = env->pc;
> + } else {
> + old_mode = cpsr_read_for_spsr_elx(env);
> + env->elr_el[new_el] = env->regs[15];
> +
> + aarch64_sync_32_to_64(env);
> +
> + env->condexec_bits = 0;
> + }
> + env->banked_spsr[aarch64_banked_spsr_index(new_el)] = old_mode;
> +
> + qemu_log_mask(CPU_LOG_INT, "...with ELR 0x%" PRIx64 "\n",
> + env->elr_el[new_el]);
> +
> + if (cpu_isar_feature(aa64_pan, cpu)) {
> + /* The value of PSTATE.PAN is normally preserved, except when ... */
> + new_mode |= old_mode & PSTATE_PAN;
> + switch (new_el) {
> + case 2:
> + /* ... the target is EL2 with HCR_EL2.{E2H,TGE} == '11' ... */
> + if ((arm_hcr_el2_eff(env) & (HCR_E2H | HCR_TGE))
> + != (HCR_E2H | HCR_TGE)) {
> + break;
> + }
> + /* fall through */
> + case 1:
> + /* ... the target is EL1 ... */
> + /* ... and SCTLR_ELx.SPAN == 0, then set to 1. */
> + if ((env->cp15.sctlr_el[new_el] & SCTLR_SPAN) == 0) {
> + new_mode |= PSTATE_PAN;
> + }
> + break;
> + }
> + }
> + if (cpu_isar_feature(aa64_mte, cpu)) {
> + new_mode |= PSTATE_TCO;
> + }
> +
> + pstate_write(env, PSTATE_DAIF | new_mode);
> + env->aarch64 = 1;
> + aarch64_restore_sp(env, new_el);
> +
> + if (tcg_enabled()) {
> + /* pstate already written, so we can use arm_rebuild_hflags here */
> + arm_rebuild_hflags(env);
> + }
> +
> + env->pc = addr;
> +
> + qemu_log_mask(CPU_LOG_INT, "...to EL%d PC 0x%" PRIx64 " PSTATE 0x%x\n",
> + new_el, env->pc, pstate_read(env));
> +}
> +
> +void arm_log_exception(int idx)
> +{
> + if (qemu_loglevel_mask(CPU_LOG_INT)) {
> + const char *exc = NULL;
> + static const char * const excnames[] = {
> + [EXCP_UDEF] = "Undefined Instruction",
> + [EXCP_SWI] = "SVC",
> + [EXCP_PREFETCH_ABORT] = "Prefetch Abort",
> + [EXCP_DATA_ABORT] = "Data Abort",
> + [EXCP_IRQ] = "IRQ",
> + [EXCP_FIQ] = "FIQ",
> + [EXCP_BKPT] = "Breakpoint",
> + [EXCP_EXCEPTION_EXIT] = "QEMU v7M exception exit",
> + [EXCP_KERNEL_TRAP] = "QEMU intercept of kernel commpage",
> + [EXCP_HVC] = "Hypervisor Call",
> + [EXCP_HYP_TRAP] = "Hypervisor Trap",
> + [EXCP_SMC] = "Secure Monitor Call",
> + [EXCP_VIRQ] = "Virtual IRQ",
> + [EXCP_VFIQ] = "Virtual FIQ",
> + [EXCP_SEMIHOST] = "Semihosting call",
> + [EXCP_NOCP] = "v7M NOCP UsageFault",
> + [EXCP_INVSTATE] = "v7M INVSTATE UsageFault",
> + [EXCP_STKOF] = "v8M STKOF UsageFault",
> + [EXCP_LAZYFP] = "v7M exception during lazy FP stacking",
> + [EXCP_LSERR] = "v8M LSERR UsageFault",
> + [EXCP_UNALIGNED] = "v7M UNALIGNED UsageFault",
> + };
> +
> + if (idx >= 0 && idx < ARRAY_SIZE(excnames)) {
> + exc = excnames[idx];
> + }
> + if (!exc) {
> + exc = "unknown";
> + }
> + qemu_log_mask(CPU_LOG_INT, "Taking exception %d [%s]\n", idx, exc);
> + }
> +}
> +
> +/*
> + * Handle a CPU exception for A and R profile CPUs.
> + * Do any appropriate logging, handle PSCI calls, and then hand off
> + * to the AArch64-entry or AArch32-entry function depending on the
> + * target exception level's register width.
> + *
> + * Note: this is used for both TCG (as the do_interrupt tcg op),
> + * and KVM to re-inject guest debug exceptions, and to
> + * inject a Synchronous-External-Abort.
> + */
> +void arm_cpu_do_interrupt(CPUState *cs)
> +{
> + ARMCPU *cpu = ARM_CPU(cs);
> + CPUARMState *env = &cpu->env;
> + unsigned int new_el = env->exception.target_el;
> +
> + assert(!arm_feature(env, ARM_FEATURE_M));
> +
> + arm_log_exception(cs->exception_index);
> + qemu_log_mask(CPU_LOG_INT, "...from EL%d to EL%d\n", arm_current_el(env),
> + new_el);
> + if (qemu_loglevel_mask(CPU_LOG_INT)
> + && !excp_is_internal(cs->exception_index)) {
> + qemu_log_mask(CPU_LOG_INT, "...with ESR 0x%x/0x%" PRIx32 "\n",
> + syn_get_ec(env->exception.syndrome),
> + env->exception.syndrome);
> + }
> +
> +#ifdef CONFIG_TCG
> + if (arm_is_psci_call(cpu, cs->exception_index)) {
> + arm_handle_psci_call(cpu);
> + qemu_log_mask(CPU_LOG_INT, "...handled as PSCI call\n");
> + return;
> + }
> + /*
> + * Semihosting semantics depend on the register width of the code
> + * that caused the exception, not the target exception level, so
> + * must be handled here.
> + */
> + if (cs->exception_index == EXCP_SEMIHOST) {
> + handle_semihosting(cs);
> + return;
> + }
> +#endif /* CONFIG_TCG */
> + /*
> + * Hooks may change global state so BQL should be held, also the
> + * BQL needs to be held for any modification of
> + * cs->interrupt_request.
> + */
> + g_assert(qemu_mutex_iothread_locked());
> + arm_call_pre_el_change_hook(cpu);
> +
> + assert(!excp_is_internal(cs->exception_index));
> + if (arm_el_is_aa64(env, new_el)) {
> + arm_cpu_do_interrupt_aarch64(cs);
> + } else {
> + arm_cpu_do_interrupt_aarch32(cs);
> + }
> +
> + arm_call_el_change_hook(cpu);
> +
> + if (tcg_enabled()) {
> + cs->interrupt_request |= CPU_INTERRUPT_EXITTB;
> + }
> +}
> diff --git a/target/arm/tcg/helper.c b/target/arm/tcg/helper.c
> index 5b32329895..a8b1efdb36 100644
> --- a/target/arm/tcg/helper.c
> +++ b/target/arm/tcg/helper.c
> @@ -7,34 +7,13 @@
> */
>
> #include "qemu/osdep.h"
> -#include "qemu/units.h"
> -#include "target/arm/idau.h"
> -#include "trace.h"
> #include "cpu.h"
> #include "internals.h"
> #include "exec/gdbstub.h"
> #include "exec/helper-proto.h"
> -#include "qemu/host-utils.h"
> -#include "qemu/main-loop.h"
> -#include "qemu/bitops.h"
> #include "qemu/crc32c.h"
> -#include "qemu/qemu-print.h"
> -#include "exec/exec-all.h"
> #include <zlib.h> /* For crc32 */
> -#include "hw/irq.h"
> -#include "semihosting/semihost.h"
> -#include "sysemu/cpus.h"
> -#include "sysemu/cpu-timers.h"
> -#include "sysemu/kvm.h"
> -#include "sysemu/tcg.h"
> -#include "qemu/range.h"
> -#include "qapi/error.h"
> -#include "qemu/guest-random.h"
> -#ifdef CONFIG_TCG
> #include "arm_ldst.h"
> -#include "exec/cpu_ldst.h"
> -#include "semihosting/common-semi.h"
> -#endif
> #include "cpu-mmu.h"
> #include "cpregs.h"
>
> @@ -643,719 +622,6 @@ uint32_t arm_phys_excp_target_el(CPUState *cs, uint32_t excp_idx,
> return target_el;
> }
>
> -void arm_log_exception(int idx)
> -{
> - if (qemu_loglevel_mask(CPU_LOG_INT)) {
> - const char *exc = NULL;
> - static const char * const excnames[] = {
> - [EXCP_UDEF] = "Undefined Instruction",
> - [EXCP_SWI] = "SVC",
> - [EXCP_PREFETCH_ABORT] = "Prefetch Abort",
> - [EXCP_DATA_ABORT] = "Data Abort",
> - [EXCP_IRQ] = "IRQ",
> - [EXCP_FIQ] = "FIQ",
> - [EXCP_BKPT] = "Breakpoint",
> - [EXCP_EXCEPTION_EXIT] = "QEMU v7M exception exit",
> - [EXCP_KERNEL_TRAP] = "QEMU intercept of kernel commpage",
> - [EXCP_HVC] = "Hypervisor Call",
> - [EXCP_HYP_TRAP] = "Hypervisor Trap",
> - [EXCP_SMC] = "Secure Monitor Call",
> - [EXCP_VIRQ] = "Virtual IRQ",
> - [EXCP_VFIQ] = "Virtual FIQ",
> - [EXCP_SEMIHOST] = "Semihosting call",
> - [EXCP_NOCP] = "v7M NOCP UsageFault",
> - [EXCP_INVSTATE] = "v7M INVSTATE UsageFault",
> - [EXCP_STKOF] = "v8M STKOF UsageFault",
> - [EXCP_LAZYFP] = "v7M exception during lazy FP stacking",
> - [EXCP_LSERR] = "v8M LSERR UsageFault",
> - [EXCP_UNALIGNED] = "v7M UNALIGNED UsageFault",
> - };
> -
> - if (idx >= 0 && idx < ARRAY_SIZE(excnames)) {
> - exc = excnames[idx];
> - }
> - if (!exc) {
> - exc = "unknown";
> - }
> - qemu_log_mask(CPU_LOG_INT, "Taking exception %d [%s]\n", idx, exc);
> - }
> -}
> -
> -static void take_aarch32_exception(CPUARMState *env, int new_mode,
> - uint32_t mask, uint32_t offset,
> - uint32_t newpc)
> -{
> - int new_el;
> -
> - /* Change the CPU state so as to actually take the exception. */
> - switch_mode(env, new_mode);
> -
> - /*
> - * For exceptions taken to AArch32 we must clear the SS bit in both
> - * PSTATE and in the old-state value we save to SPSR_<mode>, so zero it now.
> - */
> - env->pstate &= ~PSTATE_SS;
> - env->spsr = cpsr_read(env);
> - /* Clear IT bits. */
> - env->condexec_bits = 0;
> - /* Switch to the new mode, and to the correct instruction set. */
> - env->uncached_cpsr = (env->uncached_cpsr & ~CPSR_M) | new_mode;
> -
> - /* This must be after mode switching. */
> - new_el = arm_current_el(env);
> -
> - /* Set new mode endianness */
> - env->uncached_cpsr &= ~CPSR_E;
> - if (env->cp15.sctlr_el[new_el] & SCTLR_EE) {
> - env->uncached_cpsr |= CPSR_E;
> - }
> - /* J and IL must always be cleared for exception entry */
> - env->uncached_cpsr &= ~(CPSR_IL | CPSR_J);
> - env->daif |= mask;
> -
> - if (cpu_isar_feature(aa32_ssbs, env_archcpu(env))) {
> - if (env->cp15.sctlr_el[new_el] & SCTLR_DSSBS_32) {
> - env->uncached_cpsr |= CPSR_SSBS;
> - } else {
> - env->uncached_cpsr &= ~CPSR_SSBS;
> - }
> - }
> -
> - if (new_mode == ARM_CPU_MODE_HYP) {
> - env->thumb = (env->cp15.sctlr_el[2] & SCTLR_TE) != 0;
> - env->elr_el[2] = env->regs[15];
> - } else {
> - /* CPSR.PAN is normally preserved preserved unless... */
> - if (cpu_isar_feature(aa32_pan, env_archcpu(env))) {
> - switch (new_el) {
> - case 3:
> - if (!arm_is_secure_below_el3(env)) {
> - /* ... the target is EL3, from non-secure state. */
> - env->uncached_cpsr &= ~CPSR_PAN;
> - break;
> - }
> - /* ... the target is EL3, from secure state ... */
> - /* fall through */
> - case 1:
> - /* ... the target is EL1 and SCTLR.SPAN is 0. */
> - if (!(env->cp15.sctlr_el[new_el] & SCTLR_SPAN)) {
> - env->uncached_cpsr |= CPSR_PAN;
> - }
> - break;
> - }
> - }
> - /*
> - * this is a lie, as there was no c1_sys on V4T/V5, but who cares
> - * and we should just guard the thumb mode on V4
> - */
> - if (arm_feature(env, ARM_FEATURE_V4T)) {
> - env->thumb =
> - (A32_BANKED_CURRENT_REG_GET(env, sctlr) & SCTLR_TE) != 0;
> - }
> - env->regs[14] = env->regs[15] + offset;
> - }
> - env->regs[15] = newpc;
> - if (tcg_enabled()) {
> - arm_rebuild_hflags(env);
> - }
> -}
> -
> -static void arm_cpu_do_interrupt_aarch32_hyp(CPUState *cs)
> -{
> - /*
> - * Handle exception entry to Hyp mode; this is sufficiently
> - * different to entry to other AArch32 modes that we handle it
> - * separately here.
> - *
> - * The vector table entry used is always the 0x14 Hyp mode entry point,
> - * unless this is an UNDEF/HVC/abort taken from Hyp to Hyp.
> - * The offset applied to the preferred return address is always zero
> - * (see DDI0487C.a section G1.12.3).
> - * PSTATE A/I/F masks are set based only on the SCR.EA/IRQ/FIQ values.
> - */
> - uint32_t addr, mask;
> - ARMCPU *cpu = ARM_CPU(cs);
> - CPUARMState *env = &cpu->env;
> -
> - switch (cs->exception_index) {
> - case EXCP_UDEF:
> - addr = 0x04;
> - break;
> - case EXCP_SWI:
> - addr = 0x14;
> - break;
> - case EXCP_BKPT:
> - /* Fall through to prefetch abort. */
> - case EXCP_PREFETCH_ABORT:
> - env->cp15.ifar_s = env->exception.vaddress;
> - qemu_log_mask(CPU_LOG_INT, "...with HIFAR 0x%x\n",
> - (uint32_t)env->exception.vaddress);
> - addr = 0x0c;
> - break;
> - case EXCP_DATA_ABORT:
> - env->cp15.dfar_s = env->exception.vaddress;
> - qemu_log_mask(CPU_LOG_INT, "...with HDFAR 0x%x\n",
> - (uint32_t)env->exception.vaddress);
> - addr = 0x10;
> - break;
> - case EXCP_IRQ:
> - addr = 0x18;
> - break;
> - case EXCP_FIQ:
> - addr = 0x1c;
> - break;
> - case EXCP_HVC:
> - addr = 0x08;
> - break;
> - case EXCP_HYP_TRAP:
> - addr = 0x14;
> - break;
> - default:
> - cpu_abort(cs, "Unhandled exception 0x%x\n", cs->exception_index);
> - }
> -
> - if (cs->exception_index != EXCP_IRQ && cs->exception_index != EXCP_FIQ) {
> - if (!arm_feature(env, ARM_FEATURE_V8)) {
> - /*
> - * QEMU syndrome values are v8-style. v7 has the IL bit
> - * UNK/SBZP for "field not valid" cases, where v8 uses RES1.
> - * If this is a v7 CPU, squash the IL bit in those cases.
> - */
> - if (cs->exception_index == EXCP_PREFETCH_ABORT ||
> - (cs->exception_index == EXCP_DATA_ABORT &&
> - !(env->exception.syndrome & ARM_EL_ISV)) ||
> - syn_get_ec(env->exception.syndrome) == EC_UNCATEGORIZED) {
> - env->exception.syndrome &= ~ARM_EL_IL;
> - }
> - }
> - env->cp15.esr_el[2] = env->exception.syndrome;
> - }
> -
> - if (arm_current_el(env) != 2 && addr < 0x14) {
> - addr = 0x14;
> - }
> -
> - mask = 0;
> - if (!(env->cp15.scr_el3 & SCR_EA)) {
> - mask |= CPSR_A;
> - }
> - if (!(env->cp15.scr_el3 & SCR_IRQ)) {
> - mask |= CPSR_I;
> - }
> - if (!(env->cp15.scr_el3 & SCR_FIQ)) {
> - mask |= CPSR_F;
> - }
> -
> - addr += env->cp15.hvbar;
> -
> - take_aarch32_exception(env, ARM_CPU_MODE_HYP, mask, 0, addr);
> -}
> -
> -static void arm_cpu_do_interrupt_aarch32(CPUState *cs)
> -{
> - ARMCPU *cpu = ARM_CPU(cs);
> - CPUARMState *env = &cpu->env;
> - uint32_t addr;
> - uint32_t mask;
> - int new_mode;
> - uint32_t offset;
> - uint32_t moe;
> -
> - /* If this is a debug exception we must update the DBGDSCR.MOE bits */
> - switch (syn_get_ec(env->exception.syndrome)) {
> - case EC_BREAKPOINT:
> - case EC_BREAKPOINT_SAME_EL:
> - moe = 1;
> - break;
> - case EC_WATCHPOINT:
> - case EC_WATCHPOINT_SAME_EL:
> - moe = 10;
> - break;
> - case EC_AA32_BKPT:
> - moe = 3;
> - break;
> - case EC_VECTORCATCH:
> - moe = 5;
> - break;
> - default:
> - moe = 0;
> - break;
> - }
> -
> - if (moe) {
> - env->cp15.mdscr_el1 = deposit64(env->cp15.mdscr_el1, 2, 4, moe);
> - }
> -
> - if (env->exception.target_el == 2) {
> - arm_cpu_do_interrupt_aarch32_hyp(cs);
> - return;
> - }
> -
> - switch (cs->exception_index) {
> - case EXCP_UDEF:
> - new_mode = ARM_CPU_MODE_UND;
> - addr = 0x04;
> - mask = CPSR_I;
> - if (env->thumb) {
> - offset = 2;
> - } else {
> - offset = 4;
> - }
> - break;
> - case EXCP_SWI:
> - new_mode = ARM_CPU_MODE_SVC;
> - addr = 0x08;
> - mask = CPSR_I;
> - /* The PC already points to the next instruction. */
> - offset = 0;
> - break;
> - case EXCP_BKPT:
> - /* Fall through to prefetch abort. */
> - case EXCP_PREFETCH_ABORT:
> - A32_BANKED_CURRENT_REG_SET(env, ifsr, env->exception.fsr);
> - A32_BANKED_CURRENT_REG_SET(env, ifar, env->exception.vaddress);
> - qemu_log_mask(CPU_LOG_INT, "...with IFSR 0x%x IFAR 0x%x\n",
> - env->exception.fsr, (uint32_t)env->exception.vaddress);
> - new_mode = ARM_CPU_MODE_ABT;
> - addr = 0x0c;
> - mask = CPSR_A | CPSR_I;
> - offset = 4;
> - break;
> - case EXCP_DATA_ABORT:
> - A32_BANKED_CURRENT_REG_SET(env, dfsr, env->exception.fsr);
> - A32_BANKED_CURRENT_REG_SET(env, dfar, env->exception.vaddress);
> - qemu_log_mask(CPU_LOG_INT, "...with DFSR 0x%x DFAR 0x%x\n",
> - env->exception.fsr,
> - (uint32_t)env->exception.vaddress);
> - new_mode = ARM_CPU_MODE_ABT;
> - addr = 0x10;
> - mask = CPSR_A | CPSR_I;
> - offset = 8;
> - break;
> - case EXCP_IRQ:
> - new_mode = ARM_CPU_MODE_IRQ;
> - addr = 0x18;
> - /* Disable IRQ and imprecise data aborts. */
> - mask = CPSR_A | CPSR_I;
> - offset = 4;
> - if (env->cp15.scr_el3 & SCR_IRQ) {
> - /* IRQ routed to monitor mode */
> - new_mode = ARM_CPU_MODE_MON;
> - mask |= CPSR_F;
> - }
> - break;
> - case EXCP_FIQ:
> - new_mode = ARM_CPU_MODE_FIQ;
> - addr = 0x1c;
> - /* Disable FIQ, IRQ and imprecise data aborts. */
> - mask = CPSR_A | CPSR_I | CPSR_F;
> - if (env->cp15.scr_el3 & SCR_FIQ) {
> - /* FIQ routed to monitor mode */
> - new_mode = ARM_CPU_MODE_MON;
> - }
> - offset = 4;
> - break;
> - case EXCP_VIRQ:
> - new_mode = ARM_CPU_MODE_IRQ;
> - addr = 0x18;
> - /* Disable IRQ and imprecise data aborts. */
> - mask = CPSR_A | CPSR_I;
> - offset = 4;
> - break;
> - case EXCP_VFIQ:
> - new_mode = ARM_CPU_MODE_FIQ;
> - addr = 0x1c;
> - /* Disable FIQ, IRQ and imprecise data aborts. */
> - mask = CPSR_A | CPSR_I | CPSR_F;
> - offset = 4;
> - break;
> - case EXCP_SMC:
> - new_mode = ARM_CPU_MODE_MON;
> - addr = 0x08;
> - mask = CPSR_A | CPSR_I | CPSR_F;
> - offset = 0;
> - break;
> - default:
> - cpu_abort(cs, "Unhandled exception 0x%x\n", cs->exception_index);
> - return; /* Never happens. Keep compiler happy. */
> - }
> -
> - if (new_mode == ARM_CPU_MODE_MON) {
> - addr += env->cp15.mvbar;
> - } else if (A32_BANKED_CURRENT_REG_GET(env, sctlr) & SCTLR_V) {
> - /* High vectors. When enabled, base address cannot be remapped. */
> - addr += 0xffff0000;
> - } else {
> - /*
> - * ARM v7 architectures provide a vector base address register to remap
> - * the interrupt vector table.
> - * This register is only followed in non-monitor mode, and is banked.
> - * Note: only bits 31:5 are valid.
> - */
> - addr += A32_BANKED_CURRENT_REG_GET(env, vbar);
> - }
> -
> - if ((env->uncached_cpsr & CPSR_M) == ARM_CPU_MODE_MON) {
> - env->cp15.scr_el3 &= ~SCR_NS;
> - }
> -
> - take_aarch32_exception(env, new_mode, mask, offset, addr);
> -}
> -
> -static int aarch64_regnum(CPUARMState *env, int aarch32_reg)
> -{
> - /*
> - * Return the register number of the AArch64 view of the AArch32
> - * register @aarch32_reg. The CPUARMState CPSR is assumed to still
> - * be that of the AArch32 mode the exception came from.
> - */
> - int mode = env->uncached_cpsr & CPSR_M;
> -
> - switch (aarch32_reg) {
> - case 0 ... 7:
> - return aarch32_reg;
> - case 8 ... 12:
> - return mode == ARM_CPU_MODE_FIQ ? aarch32_reg + 16 : aarch32_reg;
> - case 13:
> - switch (mode) {
> - case ARM_CPU_MODE_USR:
> - case ARM_CPU_MODE_SYS:
> - return 13;
> - case ARM_CPU_MODE_HYP:
> - return 15;
> - case ARM_CPU_MODE_IRQ:
> - return 17;
> - case ARM_CPU_MODE_SVC:
> - return 19;
> - case ARM_CPU_MODE_ABT:
> - return 21;
> - case ARM_CPU_MODE_UND:
> - return 23;
> - case ARM_CPU_MODE_FIQ:
> - return 29;
> - default:
> - g_assert_not_reached();
> - }
> - case 14:
> - switch (mode) {
> - case ARM_CPU_MODE_USR:
> - case ARM_CPU_MODE_SYS:
> - case ARM_CPU_MODE_HYP:
> - return 14;
> - case ARM_CPU_MODE_IRQ:
> - return 16;
> - case ARM_CPU_MODE_SVC:
> - return 18;
> - case ARM_CPU_MODE_ABT:
> - return 20;
> - case ARM_CPU_MODE_UND:
> - return 22;
> - case ARM_CPU_MODE_FIQ:
> - return 30;
> - default:
> - g_assert_not_reached();
> - }
> - case 15:
> - return 31;
> - default:
> - g_assert_not_reached();
> - }
> -}
> -
> -static uint32_t cpsr_read_for_spsr_elx(CPUARMState *env)
> -{
> - uint32_t ret = cpsr_read(env);
> -
> - /* Move DIT to the correct location for SPSR_ELx */
> - if (ret & CPSR_DIT) {
> - ret &= ~CPSR_DIT;
> - ret |= PSTATE_DIT;
> - }
> - /* Merge PSTATE.SS into SPSR_ELx */
> - ret |= env->pstate & PSTATE_SS;
> -
> - return ret;
> -}
> -
> -/* Handle exception entry to a target EL which is using AArch64 */
> -static void arm_cpu_do_interrupt_aarch64(CPUState *cs)
> -{
> - ARMCPU *cpu = ARM_CPU(cs);
> - CPUARMState *env = &cpu->env;
> - unsigned int new_el = env->exception.target_el;
> - target_ulong addr = env->cp15.vbar_el[new_el];
> - unsigned int new_mode = aarch64_pstate_mode(new_el, true);
> - unsigned int old_mode;
> - unsigned int cur_el = arm_current_el(env);
> - int rt;
> -
> - /*
> - * Note that new_el can never be 0. If cur_el is 0, then
> - * el0_a64 is is_a64(), else el0_a64 is ignored.
> - */
> - aarch64_sve_change_el(env, cur_el, new_el, is_a64(env));
> -
> - if (cur_el < new_el) {
> - /*
> - * Entry vector offset depends on whether the implemented EL
> - * immediately lower than the target level is using AArch32 or AArch64
> - */
> - bool is_aa64;
> - uint64_t hcr;
> -
> - switch (new_el) {
> - case 3:
> - is_aa64 = (env->cp15.scr_el3 & SCR_RW) != 0;
> - break;
> - case 2:
> - hcr = arm_hcr_el2_eff(env);
> - if ((hcr & (HCR_E2H | HCR_TGE)) != (HCR_E2H | HCR_TGE)) {
> - is_aa64 = (hcr & HCR_RW) != 0;
> - break;
> - }
> - /* fall through */
> - case 1:
> - is_aa64 = is_a64(env);
> - break;
> - default:
> - g_assert_not_reached();
> - }
> -
> - if (is_aa64) {
> - addr += 0x400;
> - } else {
> - addr += 0x600;
> - }
> - } else if (pstate_read(env) & PSTATE_SP) {
> - addr += 0x200;
> - }
> -
> - switch (cs->exception_index) {
> - case EXCP_PREFETCH_ABORT:
> - case EXCP_DATA_ABORT:
> - env->cp15.far_el[new_el] = env->exception.vaddress;
> - qemu_log_mask(CPU_LOG_INT, "...with FAR 0x%" PRIx64 "\n",
> - env->cp15.far_el[new_el]);
> - /* fall through */
> - case EXCP_BKPT:
> - case EXCP_UDEF:
> - case EXCP_SWI:
> - case EXCP_HVC:
> - case EXCP_HYP_TRAP:
> - case EXCP_SMC:
> - switch (syn_get_ec(env->exception.syndrome)) {
> - case EC_ADVSIMDFPACCESSTRAP:
> - /*
> - * QEMU internal FP/SIMD syndromes from AArch32 include the
> - * TA and coproc fields which are only exposed if the exception
> - * is taken to AArch32 Hyp mode. Mask them out to get a valid
> - * AArch64 format syndrome.
> - */
> - env->exception.syndrome &= ~MAKE_64BIT_MASK(0, 20);
> - break;
> - case EC_CP14RTTRAP:
> - case EC_CP15RTTRAP:
> - case EC_CP14DTTRAP:
> - /*
> - * For a trap on AArch32 MRC/MCR/LDC/STC the Rt field is currently
> - * the raw register field from the insn; when taking this to
> - * AArch64 we must convert it to the AArch64 view of the register
> - * number. Notice that we read a 4-bit AArch32 register number and
> - * write back a 5-bit AArch64 one.
> - */
> - rt = extract32(env->exception.syndrome, 5, 4);
> - rt = aarch64_regnum(env, rt);
> - env->exception.syndrome = deposit32(env->exception.syndrome,
> - 5, 5, rt);
> - break;
> - case EC_CP15RRTTRAP:
> - case EC_CP14RRTTRAP:
> - /* Similarly for MRRC/MCRR traps for Rt and Rt2 fields */
> - rt = extract32(env->exception.syndrome, 5, 4);
> - rt = aarch64_regnum(env, rt);
> - env->exception.syndrome = deposit32(env->exception.syndrome,
> - 5, 5, rt);
> - rt = extract32(env->exception.syndrome, 10, 4);
> - rt = aarch64_regnum(env, rt);
> - env->exception.syndrome = deposit32(env->exception.syndrome,
> - 10, 5, rt);
> - break;
> - }
> - env->cp15.esr_el[new_el] = env->exception.syndrome;
> - break;
> - case EXCP_IRQ:
> - case EXCP_VIRQ:
> - addr += 0x80;
> - break;
> - case EXCP_FIQ:
> - case EXCP_VFIQ:
> - addr += 0x100;
> - break;
> - default:
> - cpu_abort(cs, "Unhandled exception 0x%x\n", cs->exception_index);
> - }
> -
> - if (is_a64(env)) {
> - old_mode = pstate_read(env);
> - aarch64_save_sp(env, arm_current_el(env));
> - env->elr_el[new_el] = env->pc;
> - } else {
> - old_mode = cpsr_read_for_spsr_elx(env);
> - env->elr_el[new_el] = env->regs[15];
> -
> - aarch64_sync_32_to_64(env);
> -
> - env->condexec_bits = 0;
> - }
> - env->banked_spsr[aarch64_banked_spsr_index(new_el)] = old_mode;
> -
> - qemu_log_mask(CPU_LOG_INT, "...with ELR 0x%" PRIx64 "\n",
> - env->elr_el[new_el]);
> -
> - if (cpu_isar_feature(aa64_pan, cpu)) {
> - /* The value of PSTATE.PAN is normally preserved, except when ... */
> - new_mode |= old_mode & PSTATE_PAN;
> - switch (new_el) {
> - case 2:
> - /* ... the target is EL2 with HCR_EL2.{E2H,TGE} == '11' ... */
> - if ((arm_hcr_el2_eff(env) & (HCR_E2H | HCR_TGE))
> - != (HCR_E2H | HCR_TGE)) {
> - break;
> - }
> - /* fall through */
> - case 1:
> - /* ... the target is EL1 ... */
> - /* ... and SCTLR_ELx.SPAN == 0, then set to 1. */
> - if ((env->cp15.sctlr_el[new_el] & SCTLR_SPAN) == 0) {
> - new_mode |= PSTATE_PAN;
> - }
> - break;
> - }
> - }
> - if (cpu_isar_feature(aa64_mte, cpu)) {
> - new_mode |= PSTATE_TCO;
> - }
> -
> - if (cpu_isar_feature(aa64_ssbs, cpu)) {
> - if (env->cp15.sctlr_el[new_el] & SCTLR_DSSBS_64) {
> - new_mode |= PSTATE_SSBS;
> - } else {
> - new_mode &= ~PSTATE_SSBS;
> - }
> - }
> -
> - pstate_write(env, PSTATE_DAIF | new_mode);
> - env->aarch64 = 1;
> - aarch64_restore_sp(env, new_el);
> -
> - if (tcg_enabled()) {
> - /* pstate already written, so we can use arm_rebuild_hflags here */
> - arm_rebuild_hflags(env);
> - }
> -
> - env->pc = addr;
> -
> - qemu_log_mask(CPU_LOG_INT, "...to EL%d PC 0x%" PRIx64 " PSTATE 0x%x\n",
> - new_el, env->pc, pstate_read(env));
> -}
> -
> -/*
> - * Do semihosting call and set the appropriate return value. All the
> - * permission and validity checks have been done at translate time.
> - *
> - * We only see semihosting exceptions in TCG only as they are not
> - * trapped to the hypervisor in KVM.
> - */
> -#ifdef CONFIG_TCG
> -static void handle_semihosting(CPUState *cs)
> -{
> - ARMCPU *cpu = ARM_CPU(cs);
> - CPUARMState *env = &cpu->env;
> -
> - if (is_a64(env)) {
> - qemu_log_mask(CPU_LOG_INT,
> - "...handling as semihosting call 0x%" PRIx64 "\n",
> - env->xregs[0]);
> - env->xregs[0] = do_common_semihosting(cs);
> - env->pc += 4;
> - } else {
> - qemu_log_mask(CPU_LOG_INT,
> - "...handling as semihosting call 0x%x\n",
> - env->regs[0]);
> - env->regs[0] = do_common_semihosting(cs);
> - env->regs[15] += env->thumb ? 2 : 4;
> - }
> -}
> -#endif
> -
> -/*
> - * Handle a CPU exception for A and R profile CPUs.
> - * Do any appropriate logging, handle PSCI calls, and then hand off
> - * to the AArch64-entry or AArch32-entry function depending on the
> - * target exception level's register width.
> - *
> - * Note: this is used for both TCG (as the do_interrupt tcg op),
> - * and KVM to re-inject guest debug exceptions, and to
> - * inject a Synchronous-External-Abort.
> - */
> -void arm_cpu_do_interrupt(CPUState *cs)
> -{
> - ARMCPU *cpu = ARM_CPU(cs);
> - CPUARMState *env = &cpu->env;
> - unsigned int new_el = env->exception.target_el;
> -
> - assert(!arm_feature(env, ARM_FEATURE_M));
> -
> - arm_log_exception(cs->exception_index);
> - qemu_log_mask(CPU_LOG_INT, "...from EL%d to EL%d\n", arm_current_el(env),
> - new_el);
> - if (qemu_loglevel_mask(CPU_LOG_INT)
> - && !excp_is_internal(cs->exception_index)) {
> - qemu_log_mask(CPU_LOG_INT, "...with ESR 0x%x/0x%" PRIx32 "\n",
> - syn_get_ec(env->exception.syndrome),
> - env->exception.syndrome);
> - }
> -
> -#ifdef CONFIG_TCG
> - if (arm_is_psci_call(cpu, cs->exception_index)) {
> - arm_handle_psci_call(cpu);
> - qemu_log_mask(CPU_LOG_INT, "...handled as PSCI call\n");
> - return;
> - }
> -
> - /*
> - * Semihosting semantics depend on the register width of the code
> - * that caused the exception, not the target exception level, so
> - * must be handled here.
> - */
> - if (cs->exception_index == EXCP_SEMIHOST) {
> - handle_semihosting(cs);
> - return;
> - }
> -#endif
> -
> - /*
> - * Hooks may change global state so BQL should be held, also the
> - * BQL needs to be held for any modification of
> - * cs->interrupt_request.
> - */
> - g_assert(qemu_mutex_iothread_locked());
> -
> - arm_call_pre_el_change_hook(cpu);
> -
> - assert(!excp_is_internal(cs->exception_index));
> - if (arm_el_is_aa64(env, new_el)) {
> - arm_cpu_do_interrupt_aarch64(cs);
> - } else {
> - arm_cpu_do_interrupt_aarch32(cs);
> - }
> -
> - arm_call_el_change_hook(cpu);
> -
> - if (!kvm_enabled()) {
> - cs->interrupt_request |= CPU_INTERRUPT_EXITTB;
> - }
> -}
> #endif /* !CONFIG_USER_ONLY */
>
> /* Returns true if the stage 1 translation regime is using LPAE format page
> diff --git a/target/arm/tcg/sysemu/tcg-cpu.c b/target/arm/tcg/sysemu/tcg-cpu.c
> new file mode 100644
> index 0000000000..af9d3905d7
> --- /dev/null
> +++ b/target/arm/tcg/sysemu/tcg-cpu.c
> @@ -0,0 +1,73 @@
> +/*
> + * QEMU ARM TCG CPU (sysemu code)
> + *
> + * Copyright (c) 2012 SUSE LINUX Products GmbH
> + *
> + * This program is free software; you can redistribute it and/or
> + * modify it under the terms of the GNU General Public License
> + * as published by the Free Software Foundation; either version 2
> + * of the License, or (at your option) any later version.
> + *
> + * This program is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
> + * GNU General Public License for more details.
> + *
> + * You should have received a copy of the GNU General Public License
> + * along with this program; if not, see
> + * <http://www.gnu.org/licenses/gpl-2.0.html>
> + */
> +
> +#include "qemu/osdep.h"
> +#include "qemu/qemu-print.h"
> +#include "qemu-common.h"
> +#include "target/arm/idau.h"
> +#include "qemu/module.h"
> +#include "qapi/error.h"
> +#include "qapi/visitor.h"
> +#include "cpu.h"
> +#include "hw/core/tcg-cpu-ops.h"
> +#include "semihosting/common-semi.h"
> +#include "cpregs.h"
> +#include "internals.h"
> +#include "exec/exec-all.h"
> +#include "hw/qdev-properties.h"
> +#if !defined(CONFIG_USER_ONLY)
> +#include "hw/loader.h"
> +#include "hw/boards.h"
> +#endif
> +#include "sysemu/sysemu.h"
> +#include "sysemu/tcg.h"
> +#include "sysemu/hw_accel.h"
> +#include "kvm_arm.h"
> +#include "disas/capstone.h"
> +#include "fpu/softfloat.h"
> +#include "cpu-mmu.h"
> +#include "tcg/tcg-cpu.h"
> +
> +/*
> + * Do semihosting call and set the appropriate return value. All the
> + * permission and validity checks have been done at translate time.
> + *
> + * We only see semihosting exceptions in TCG only as they are not
> + * trapped to the hypervisor in KVM.
> + */
> +void handle_semihosting(CPUState *cs)
> +{
> + ARMCPU *cpu = ARM_CPU(cs);
> + CPUARMState *env = &cpu->env;
> +
> + if (is_a64(env)) {
> + qemu_log_mask(CPU_LOG_INT,
> + "...handling as semihosting call 0x%" PRIx64 "\n",
> + env->xregs[0]);
> + env->xregs[0] = do_common_semihosting(cs);
> + env->pc += 4;
> + } else {
> + qemu_log_mask(CPU_LOG_INT,
> + "...handling as semihosting call 0x%x\n",
> + env->regs[0]);
> + env->regs[0] = do_common_semihosting(cs);
> + env->regs[15] += env->thumb ? 2 : 4;
> + }
> +}
> diff --git a/target/arm/tcg/sysemu/meson.build b/target/arm/tcg/sysemu/meson.build
> index 26014851bd..56e4b5ccea 100644
> --- a/target/arm/tcg/sysemu/meson.build
> +++ b/target/arm/tcg/sysemu/meson.build
> @@ -2,5 +2,6 @@ arm_softmmu_ss.add(when: 'CONFIG_TCG', if_true: files(
> 'debug_helper.c',
> 'm_helper.c',
> 'mte_helper.c',
> + 'tcg-cpu.c',
> 'tlb_helper.c',
> ))
>
next prev parent reply other threads:[~2021-06-05 5:57 UTC|newest]
Thread overview: 204+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-06-04 15:51 [PATCH v16 00/99] arm tcg/kvm refactor and split with kvm only support Alex Bennée
2021-06-04 15:51 ` [PATCH v16 01/99] MAINTAINERS: Add qtest/arm-cpu-features.c to ARM TCG CPUs section Alex Bennée
2021-06-04 18:26 ` Richard Henderson
2021-06-04 15:51 ` [PATCH v16 02/99] accel: Introduce 'query-accels' QMP command Alex Bennée
2021-06-07 13:07 ` Thomas Huth
2021-06-08 9:07 ` Philippe Mathieu-Daudé
2021-06-08 15:41 ` Markus Armbruster
2021-06-08 15:43 ` Philippe Mathieu-Daudé
2021-06-04 15:51 ` [PATCH v16 03/99] qtest: Add qtest_has_accel() method Alex Bennée
2021-06-07 13:16 ` Thomas Huth
2021-06-08 9:48 ` Philippe Mathieu-Daudé
2021-06-04 15:51 ` [PATCH v16 04/99] qtest/arm-cpu-features: Use generic qtest_has_accel() to check for KVM Alex Bennée
2021-06-04 21:01 ` Richard Henderson
2021-06-07 13:22 ` Thomas Huth
2021-06-08 8:22 ` Philippe Mathieu-Daudé
2021-06-08 10:49 ` Philippe Mathieu-Daudé
2021-06-08 12:39 ` Philippe Mathieu-Daudé
2021-06-08 14:28 ` Eric Blake
2021-06-08 17:20 ` Claudio Fontana
2021-06-04 15:51 ` [PATCH v16 05/99] qtest/arm-cpu-features: Restrict sve_tests_sve_off_kvm test to KVM Alex Bennée
2021-06-04 21:02 ` Richard Henderson
2021-06-04 15:51 ` [PATCH v16 06/99] qtest/arm-cpu-features: Remove TCG fallback to KVM specific tests Alex Bennée
2021-06-04 21:03 ` Richard Henderson
2021-06-07 13:28 ` Thomas Huth
2021-06-08 8:23 ` Philippe Mathieu-Daudé
2021-06-04 15:51 ` [PATCH v16 07/99] qtest/arm-cpu-features: Use generic qtest_has_accel() to check for TCG Alex Bennée
2021-06-04 21:04 ` Richard Henderson
2021-06-07 13:32 ` Thomas Huth
2021-06-04 15:51 ` [PATCH v16 08/99] qtest/migration-test: Skip tests if KVM not builtin on s390x/ppc64 Alex Bennée
2021-06-04 21:11 ` Richard Henderson
2021-06-08 8:26 ` Philippe Mathieu-Daudé
2021-06-07 13:33 ` Thomas Huth
2021-06-04 15:51 ` [PATCH v16 09/99] qtest/bios-tables-test: Rename tests not TCG specific Alex Bennée
2021-06-07 13:39 ` Thomas Huth
2021-06-08 8:33 ` Philippe Mathieu-Daudé
2021-06-04 15:51 ` [PATCH v16 10/99] qtest/bios-tables-test: Rename TCG specific tests Alex Bennée
2021-06-07 13:44 ` Thomas Huth
2021-06-04 15:51 ` [PATCH v16 11/99] qtest/bios-tables-test: Make test build-independent from accelerator Alex Bennée
2021-06-04 21:14 ` Richard Henderson
2021-06-07 13:47 ` Thomas Huth
2021-06-04 15:51 ` [PATCH v16 12/99] qtest: Do not restrict bios-tables-test to Aarch64 hosts anymore Alex Bennée
2021-06-04 21:15 ` Richard Henderson
2021-06-07 13:48 ` Thomas Huth
2021-06-04 15:51 ` [PATCH v16 13/99] meson: add target_user_arch Alex Bennée
2021-06-04 18:01 ` Philippe Mathieu-Daudé
2021-06-04 15:51 ` [PATCH v16 14/99] accel: add cpu_reset Alex Bennée
2021-06-04 21:23 ` Richard Henderson
2021-06-04 15:51 ` [PATCH v16 15/99] target/arm: move translate modules to tcg/ Alex Bennée
2021-06-04 15:51 ` [PATCH v16 16/99] target/arm: move helpers " Alex Bennée
2021-06-04 15:51 ` [PATCH v16 17/99] arm: tcg: only build under CONFIG_TCG Alex Bennée
2021-06-04 15:51 ` [PATCH v16 18/99] target/arm: tcg: add sysemu and user subdirs Alex Bennée
2021-06-04 15:51 ` [PATCH v16 19/99] target/arm: tcg: split mte_helper user-only and sysemu code Alex Bennée
2021-06-04 15:51 ` [PATCH v16 20/99] target/arm: tcg: move sysemu-only parts of debug_helper Alex Bennée
2021-06-04 15:51 ` [PATCH v16 21/99] target/arm: tcg: split tlb_helper user-only and sysemu-only parts Alex Bennée
2021-06-04 15:51 ` [PATCH v16 22/99] target/arm: tcg: split m_helper " Alex Bennée
2021-06-04 15:51 ` [PATCH v16 23/99] target/arm: only build psci for TCG Alex Bennée
2021-06-04 15:51 ` [PATCH v16 24/99] target/arm: split off cpu-sysemu.c Alex Bennée
2021-06-04 15:51 ` [PATCH v16 25/99] target/arm: tcg: fix comment style before move to cpu-mmu Alex Bennée
2021-06-04 15:51 ` [PATCH v16 26/99] target/arm: move physical address translation " Alex Bennée
2021-06-04 15:52 ` [PATCH v16 27/99] target/arm: fix style in preparation of new cpregs module Alex Bennée
2021-06-04 15:52 ` [PATCH v16 28/99] target/arm: split cpregs from tcg/helper.c Alex Bennée
2021-06-04 15:52 ` [PATCH v16 29/99] target/arm: move cpu definitions to common cpu module Alex Bennée
2021-06-04 15:52 ` [PATCH v16 30/99] target/arm: only perform TCG cpu and machine inits if TCG enabled Alex Bennée
2021-06-04 15:52 ` [PATCH v16 31/99] target/arm: tcg: add stubs for some helpers for non-tcg builds Alex Bennée
2021-06-04 15:52 ` [PATCH v16 32/99] target/arm: move cpsr_read, cpsr_write to cpu_common Alex Bennée
2021-06-04 15:52 ` [PATCH v16 33/99] target/arm: add temporary stub for arm_rebuild_hflags Alex Bennée
2021-06-04 15:52 ` [PATCH v16 34/99] target/arm: move arm_hcr_el2_eff from tcg/ to common_cpu Alex Bennée
2021-06-04 15:52 ` [PATCH v16 35/99] target/arm: split vfp state setting from tcg helpers Alex Bennée
2021-06-04 15:52 ` [PATCH v16 36/99] target/arm: move arm_mmu_idx* to cpu-mmu Alex Bennée
2021-06-04 15:52 ` [PATCH v16 37/99] target/arm: move sve_zcr_len_for_el to common_cpu Alex Bennée
2021-06-04 22:22 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 38/99] target/arm: move arm_sctlr away from tcg helpers Alex Bennée
2021-06-04 22:27 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 39/99] target/arm: move arm_cpu_list to common_cpu Alex Bennée
2021-06-04 15:52 ` [PATCH v16 40/99] target/arm: move aarch64_sync_32_to_64 (and vv) to cpu code Alex Bennée
2021-06-04 15:52 ` [PATCH v16 41/99] target/arm: new cpu32 ARM 32 bit CPU Class Alex Bennée
2021-06-04 22:53 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 42/99] target/arm: split 32bit and 64bit arm dump state Alex Bennée
2021-06-04 22:59 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 43/99] target/arm: move a15 cpu model away from the TCG-only models Alex Bennée
2021-06-05 0:27 ` Richard Henderson
2021-06-17 18:01 ` Alex Bennée
2021-06-17 20:35 ` Claudio Fontana
2021-06-04 15:52 ` [PATCH v16 44/99] target/arm: fixup sve_exception_el code style before move Alex Bennée
2021-06-04 15:52 ` [PATCH v16 45/99] target/arm: move sve_exception_el out of TCG helpers Alex Bennée
2021-06-04 15:52 ` [PATCH v16 46/99] target/arm: fix comments style of fp_exception_el before moving it Alex Bennée
2021-06-05 0:32 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 47/99] target/arm: move fp_exception_el out of TCG helpers Alex Bennée
2021-06-05 0:35 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 48/99] target/arm: remove now useless ifndef from fp_exception_el Alex Bennée
2021-06-05 0:35 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 49/99] target/arm: make further preparation for the exception code to move Alex Bennée
2021-06-05 1:34 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 50/99] target/arm: fix style of arm_cpu_do_interrupt functions before move Alex Bennée
2021-06-04 15:52 ` [PATCH v16 51/99] target/arm: move exception code out of tcg/helper.c Alex Bennée
2021-06-05 2:19 ` Richard Henderson
2021-06-05 5:56 ` Richard Henderson [this message]
2021-06-04 15:52 ` [PATCH v16 52/99] target/arm: rename handle_semihosting to tcg_handle_semihosting Alex Bennée
2021-06-05 2:22 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 53/99] target/arm: replace CONFIG_TCG with tcg_enabled Alex Bennée
2021-06-05 2:24 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 54/99] target/arm: move TCGCPUOps to tcg/tcg-cpu.c Alex Bennée
2021-06-05 3:39 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 55/99] target/arm: move cpu_tcg to tcg/tcg-cpu-models.c Alex Bennée
2021-06-04 15:52 ` [PATCH v16 56/99] target/arm: wrap call to aarch64_sve_change_el in tcg_enabled() Alex Bennée
2021-06-04 15:52 ` [PATCH v16 57/99] target/arm: remove kvm include file for PSCI and arm-powerctl Alex Bennée
2021-06-04 15:52 ` [PATCH v16 58/99] target/arm: move kvm-const.h, kvm.c, kvm64.c, kvm_arm.h to kvm/ Alex Bennée
2021-06-04 15:52 ` [PATCH v16 59/99] MAINTAINERS: update arm kvm maintained files to all in target/arm/kvm/ Alex Bennée
2021-06-05 3:52 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 60/99] target/arm: cleanup cpu includes Alex Bennée
2021-06-04 15:52 ` [PATCH v16 61/99] target/arm: remove broad "else" statements when checking accels Alex Bennée
2021-06-05 16:13 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 62/99] target/arm: remove kvm-stub.c Alex Bennée
2021-06-04 15:52 ` [PATCH v16 63/99] tests/qtest: skip bios-tables-test test_acpi_oem_fields_virt for KVM Alex Bennée
2021-06-05 16:24 ` Richard Henderson
2021-06-18 15:25 ` Alex Bennée
2021-06-04 15:52 ` [PATCH v16 64/99] tests: do not run test-hmp on all machines for ARM KVM-only Alex Bennée
2021-06-05 16:28 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 65/99] tests: device-introspect-test: cope with ARM TCG-only devices Alex Bennée
2021-06-05 16:31 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 66/99] tests: do not run qom-test on all machines for ARM KVM-only Alex Bennée
2021-06-05 16:32 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 67/99] target/arm: create kvm cpu accel class Alex Bennée
2021-06-04 15:52 ` [PATCH v16 68/99] target/arm: move kvm post init initialization to kvm cpu accel Alex Bennée
2021-06-04 15:52 ` [PATCH v16 69/99] target/arm: add tcg cpu accel class Alex Bennée
2021-06-05 16:54 ` Richard Henderson
2021-06-24 10:52 ` Alex Bennée
2021-06-04 15:52 ` [PATCH v16 70/99] target/arm: move TCG gt timer creation code in tcg/ Alex Bennée
2021-06-04 15:52 ` [PATCH v16 71/99] target/arm: cpu-sve: new module Alex Bennée
2021-06-05 18:13 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 72/99] target/arm: cpu-sve: rename functions according to module prefix Alex Bennée
2021-06-05 18:39 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 73/99] target/arm: cpu-sve: split TCG and KVM functionality Alex Bennée
2021-06-05 19:31 ` Richard Henderson
2021-06-05 19:52 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 74/99] target/arm: cpu-sve: make cpu_sve_finalize_features return bool Alex Bennée
2021-06-05 18:57 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 75/99] target/arm: make is_aa64 and arm_el_is_aa64 a macro for !TARGET_AARCH64 Alex Bennée
2021-06-05 20:00 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 76/99] target/arm: restrict rebuild_hflags_a64 to TARGET_AARCH64 Alex Bennée
2021-06-05 20:06 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 77/99] target/arm: arch_dump: restrict ELFCLASS64 to AArch64 Alex Bennée
2021-06-05 20:30 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 78/99] target/arm: cpu-exceptions, cpu-exceptions-aa64: new modules Alex Bennée
2021-06-05 20:50 ` Richard Henderson
2021-06-10 8:45 ` Claudio Fontana
2021-06-10 9:01 ` Peter Maydell
2021-06-10 9:24 ` Claudio Fontana
2021-06-05 20:57 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 79/99] target/arm: tcg: restrict ZCR cpregs to TARGET_AARCH64 Alex Bennée
2021-06-05 20:59 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 80/99] target/arm: tcg-sve: import narrow_vq and change_el functions Alex Bennée
2021-06-05 21:10 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 81/99] target/arm: tcg-sve: rename the " Alex Bennée
2021-06-04 15:52 ` [PATCH v16 82/99] target/arm: move sve_zcr_len_for_el to TARGET_AARCH64-only cpu-sve Alex Bennée
2021-06-05 21:37 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 83/99] cpu-sve: rename sve_zcr_len_for_el to cpu_sve_get_zcr_len_for_el Alex Bennée
2021-06-04 15:52 ` [PATCH v16 84/99] target/arm: cpu-common: wrap a64-only check with is_a64 Alex Bennée
2021-06-05 21:55 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 85/99] target/arm: cpu-pauth: new module for ARMv8.3 Pointer Authentication Alex Bennée
2021-06-05 22:06 ` Richard Henderson
2021-06-04 15:52 ` [PATCH v16 86/99] target/arm: cpu-pauth: change arm_cpu_pauth_finalize name and sig Alex Bennée
2021-06-05 22:09 ` Richard Henderson
2021-06-04 15:53 ` [PATCH v16 87/99] target/arm: move arm_cpu_finalize_features into cpu64 Alex Bennée
2021-06-05 22:14 ` Richard Henderson
2021-06-04 15:53 ` [PATCH v16 88/99] target/arm: cpu64: rename arm_cpu_finalize_features Alex Bennée
2021-06-05 22:14 ` Richard Henderson
2021-06-04 15:53 ` [PATCH v16 89/99] target/arm: cpu64: some final cleanup on aarch64_cpu_finalize_features Alex Bennée
2021-06-05 22:20 ` Richard Henderson
2021-06-04 15:53 ` [PATCH v16 90/99] XXX target/arm: experiment refactoring cpu "max" Alex Bennée
2021-06-04 15:53 ` [PATCH v16 91/99] target/arm: tcg: remove superfluous CONFIG_TCG check Alex Bennée
2021-06-04 15:53 ` [PATCH v16 92/99] target/arm: remove v7m stub function for !CONFIG_TCG Alex Bennée
2021-06-05 22:26 ` Richard Henderson
2021-06-04 15:53 ` [PATCH v16 93/99] meson: Introduce target-specific Kconfig Alex Bennée
2021-06-05 22:33 ` Richard Henderson
2021-06-18 16:31 ` Alex Bennée
2021-06-04 15:53 ` [PATCH v16 94/99] target/arm: move CONFIG_V7M out of default-devices Alex Bennée
2021-06-05 22:41 ` Richard Henderson
2021-06-04 15:53 ` [PATCH v16 95/99] hw/arm: add dependency on OR_IRQ for XLNX_VERSAL Alex Bennée
2021-06-05 22:43 ` Richard Henderson
2021-06-04 15:53 ` [PATCH v16 96/99] tests/qtest: split the cdrom-test into arm/aarch64 Alex Bennée
2021-06-05 22:47 ` Richard Henderson
2021-06-08 14:27 ` Alex Bennée
2021-06-08 14:42 ` Thomas Huth
2021-06-08 14:57 ` Richard Henderson
2021-06-08 15:01 ` Thomas Huth
2021-06-08 15:35 ` Alex Bennée
2021-06-08 17:23 ` Thomas Huth
2021-06-08 15:36 ` John Snow
2021-06-08 13:42 ` John Snow
2021-06-08 14:36 ` Thomas Huth
2021-06-08 14:41 ` Alex Bennée
2021-06-08 14:45 ` Thomas Huth
2021-06-04 15:53 ` [PATCH v16 97/99] tests/qtest: make xlnx-can-test conditional on being configured Alex Bennée
2021-06-05 22:48 ` Richard Henderson
2021-06-04 15:53 ` [PATCH v16 98/99] configure: allow the overriding of default-config in the build Alex Bennée
2021-06-05 23:01 ` Richard Henderson
2021-06-08 13:03 ` Philippe Mathieu-Daudé
2021-06-04 15:53 ` [PATCH v16 99/99] gitlab: defend the new stripped down arm64 configs Alex Bennée
2021-06-05 23:03 ` Richard Henderson
2021-06-08 8:44 ` [PATCH v16 00/99] arm tcg/kvm refactor and split with kvm only support Philippe Mathieu-Daudé
2021-06-08 8:50 ` Philippe Mathieu-Daudé
2021-09-20 16:24 ` Liang Yan
2021-09-20 16:27 ` Alex Bennée
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=9c9d6785-9411-e901-d7d7-f1fc9cac8768@linaro.org \
--to=richard.henderson@linaro.org \
--cc=alex.bennee@linaro.org \
--cc=cfontana@suse.de \
--cc=peter.maydell@linaro.org \
--cc=qemu-arm@nongnu.org \
--cc=qemu-devel@nongnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).