[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[RFC v8 23/44] target/arm: move sve_exception_el out of TCG helpers
From: |
Claudio Fontana |
Subject: |
[RFC v8 23/44] target/arm: move sve_exception_el out of TCG helpers |
Date: |
Tue, 16 Mar 2021 19:36:41 +0100 |
we need this for KVM too.
Signed-off-by: Claudio Fontana <cfontana@suse.de>
---
target/arm/cpu-sysemu.c | 60 ++++++++++++++++++++++++++++++++++++++++
target/arm/cpu-user.c | 5 ++++
target/arm/tcg/helper.c | 61 -----------------------------------------
3 files changed, 65 insertions(+), 61 deletions(-)
diff --git a/target/arm/cpu-sysemu.c b/target/arm/cpu-sysemu.c
index d510382742..5265de1c87 100644
--- a/target/arm/cpu-sysemu.c
+++ b/target/arm/cpu-sysemu.c
@@ -350,3 +350,63 @@ void aarch64_sync_64_to_32(CPUARMState *env)
env->regs[15] = env->pc;
}
+
+/*
+ * Return the exception level to which exceptions should be taken
+ * via SVEAccessTrap. If an exception should be routed through
+ * AArch64.AdvSIMDFPAccessTrap, return 0; fp_exception_el should
+ * take care of raising that exception.
+ * C.f. the ARM pseudocode function CheckSVEEnabled.
+ */
+int sve_exception_el(CPUARMState *env, int el)
+{
+ uint64_t hcr_el2 = arm_hcr_el2_eff(env);
+
+ if (el <= 1 && (hcr_el2 & (HCR_E2H | HCR_TGE)) != (HCR_E2H | HCR_TGE)) {
+ bool disabled = false;
+
+ /* The CPACR.ZEN controls traps to EL1:
+ * 0, 2 : trap EL0 and EL1 accesses
+ * 1 : trap only EL0 accesses
+ * 3 : trap no accesses
+ */
+ if (!extract32(env->cp15.cpacr_el1, 16, 1)) {
+ disabled = true;
+ } else if (!extract32(env->cp15.cpacr_el1, 17, 1)) {
+ disabled = el == 0;
+ }
+ if (disabled) {
+ /* route_to_el2 */
+ return hcr_el2 & HCR_TGE ? 2 : 1;
+ }
+
+ /* Check CPACR.FPEN. */
+ if (!extract32(env->cp15.cpacr_el1, 20, 1)) {
+ disabled = true;
+ } else if (!extract32(env->cp15.cpacr_el1, 21, 1)) {
+ disabled = el == 0;
+ }
+ if (disabled) {
+ return 0;
+ }
+ }
+
+ /* CPTR_EL2. Since TZ and TFP are positive,
+ * they will be zero when EL2 is not present.
+ */
+ if (el <= 2 && arm_is_el2_enabled(env)) {
+ if (env->cp15.cptr_el[2] & CPTR_TZ) {
+ return 2;
+ }
+ if (env->cp15.cptr_el[2] & CPTR_TFP) {
+ return 0;
+ }
+ }
+
+ /* CPTR_EL3. Since EZ is negative we must check for EL3. */
+ if (arm_feature(env, ARM_FEATURE_EL3)
+ && !(env->cp15.cptr_el[3] & CPTR_EZ)) {
+ return 3;
+ }
+ return 0;
+}
diff --git a/target/arm/cpu-user.c b/target/arm/cpu-user.c
index 0225089e46..39093ade76 100644
--- a/target/arm/cpu-user.c
+++ b/target/arm/cpu-user.c
@@ -33,3 +33,8 @@ uint32_t arm_phys_excp_target_el(CPUState *cs, uint32_t
excp_idx,
{
return 1;
}
+
+int sve_exception_el(CPUARMState *env, int el)
+{
+ return 0;
+}
diff --git a/target/arm/tcg/helper.c b/target/arm/tcg/helper.c
index 03dee5b447..988ee1c49c 100644
--- a/target/arm/tcg/helper.c
+++ b/target/arm/tcg/helper.c
@@ -329,67 +329,6 @@ uint64_t arm_hcr_el2_eff(CPUARMState *env)
return ret;
}
-/* Return the exception level to which exceptions should be taken
- * via SVEAccessTrap. If an exception should be routed through
- * AArch64.AdvSIMDFPAccessTrap, return 0; fp_exception_el should
- * take care of raising that exception.
- * C.f. the ARM pseudocode function CheckSVEEnabled.
- */
-int sve_exception_el(CPUARMState *env, int el)
-{
-#ifndef CONFIG_USER_ONLY
- uint64_t hcr_el2 = arm_hcr_el2_eff(env);
-
- if (el <= 1 && (hcr_el2 & (HCR_E2H | HCR_TGE)) != (HCR_E2H | HCR_TGE)) {
- bool disabled = false;
-
- /* The CPACR.ZEN controls traps to EL1:
- * 0, 2 : trap EL0 and EL1 accesses
- * 1 : trap only EL0 accesses
- * 3 : trap no accesses
- */
- if (!extract32(env->cp15.cpacr_el1, 16, 1)) {
- disabled = true;
- } else if (!extract32(env->cp15.cpacr_el1, 17, 1)) {
- disabled = el == 0;
- }
- if (disabled) {
- /* route_to_el2 */
- return hcr_el2 & HCR_TGE ? 2 : 1;
- }
-
- /* Check CPACR.FPEN. */
- if (!extract32(env->cp15.cpacr_el1, 20, 1)) {
- disabled = true;
- } else if (!extract32(env->cp15.cpacr_el1, 21, 1)) {
- disabled = el == 0;
- }
- if (disabled) {
- return 0;
- }
- }
-
- /* CPTR_EL2. Since TZ and TFP are positive,
- * they will be zero when EL2 is not present.
- */
- if (el <= 2 && arm_is_el2_enabled(env)) {
- if (env->cp15.cptr_el[2] & CPTR_TZ) {
- return 2;
- }
- if (env->cp15.cptr_el[2] & CPTR_TFP) {
- return 0;
- }
- }
-
- /* CPTR_EL3. Since EZ is negative we must check for EL3. */
- if (arm_feature(env, ARM_FEATURE_EL3)
- && !(env->cp15.cptr_el[3] & CPTR_EZ)) {
- return 3;
- }
-#endif
- return 0;
-}
-
void hw_watchpoint_update(ARMCPU *cpu, int n)
{
CPUARMState *env = &cpu->env;
--
2.26.2
- [RFC v8 16/44] target/arm: split vfp state setting from tcg helpers, (continued)
- [RFC v8 16/44] target/arm: split vfp state setting from tcg helpers, Claudio Fontana, 2021/03/16
- [RFC v8 24/44] target/arm: refactor exception and cpu code, Claudio Fontana, 2021/03/16
- [RFC v8 20/44] target/arm: move arm_cpu_list to common_cpu, Claudio Fontana, 2021/03/16
- [RFC v8 25/44] target/arm: cpu: fix style, Claudio Fontana, 2021/03/16
- [RFC v8 18/44] target/arm: move sve_zcr_len_for_el to common_cpu, Claudio Fontana, 2021/03/16
- [RFC v8 09/44] target/arm: split cpregs from tcg/helper.c, Claudio Fontana, 2021/03/16
- [RFC v8 28/44] target/arm: move kvm-const.h, kvm.c, kvm64.c, kvm_arm.h to kvm/, Claudio Fontana, 2021/03/16
- [RFC v8 31/44] tests/qtest: skip bios-tables-test test_acpi_oem_fields_virt for KVM, Claudio Fontana, 2021/03/16
- [RFC v8 22/44] target/arm: split a15 cpu model and 32bit class functions to cpu32.c, Claudio Fontana, 2021/03/16
- [RFC v8 21/44] target/arm: move aarch64_sync_32_to_64 (and vv) to cpu code, Claudio Fontana, 2021/03/16
- [RFC v8 23/44] target/arm: move sve_exception_el out of TCG helpers,
Claudio Fontana <=
- [RFC v8 32/44] tests: restrict TCG-only arm-cpu-features tests to TCG builds, Claudio Fontana, 2021/03/16
- [RFC v8 26/44] target/arm: wrap call to aarch64_sve_change_el in tcg_enabled(), Claudio Fontana, 2021/03/16
- [RFC v8 29/44] target/arm: cleanup cpu includes, Claudio Fontana, 2021/03/16
- [RFC v8 33/44] tests: do not run test-hmp on all machines for ARM KVM-only, Claudio Fontana, 2021/03/16
- [RFC v8 34/44] tests: device-introspect-test: cope with ARM TCG-only devices, Claudio Fontana, 2021/03/16
- [RFC v8 37/44] target/arm: create kvm cpu accel class, Claudio Fontana, 2021/03/16
- [RFC v8 44/44] target/arm: cpu-sve: split TCG and KVM functionality, Claudio Fontana, 2021/03/16
- [RFC v8 27/44] target/arm: remove kvm include file for PSCI and arm-powerctl, Claudio Fontana, 2021/03/16
- [RFC v8 40/44] accel: add double dispatch mechanism for class initialization, Claudio Fontana, 2021/03/16
- [RFC v8 43/44] target/arm: cpu-sve: new module, Claudio Fontana, 2021/03/16