2007-11-17 14:50:55 +03:00
|
|
|
/*
|
|
|
|
* CFI parallel flash with Intel command set emulation
|
|
|
|
*
|
|
|
|
* Copyright (c) 2006 Thorsten Zitterell
|
|
|
|
* Copyright (c) 2005 Jocelyn Mayer
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
2020-10-23 15:30:34 +03:00
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
2007-11-17 14:50:55 +03:00
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
2009-07-17 00:47:01 +04:00
|
|
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
2007-11-17 14:50:55 +03:00
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* For now, this code can emulate flashes of 1, 2 or 4 bytes width.
|
|
|
|
* Supported commands/modes are:
|
|
|
|
* - flash read
|
|
|
|
* - flash write
|
|
|
|
* - flash ID read
|
|
|
|
* - sector erase
|
|
|
|
* - CFI queries
|
|
|
|
*
|
|
|
|
* It does not support timings
|
|
|
|
* It does not support flash interleaving
|
|
|
|
* It does not implement software data protection as found in many real chips
|
|
|
|
* It does not implement erase suspend/resume commands
|
|
|
|
* It does not implement multiple sectors erase
|
|
|
|
*
|
|
|
|
* It does not implement much more ...
|
|
|
|
*/
|
|
|
|
|
2016-01-18 21:01:42 +03:00
|
|
|
#include "qemu/osdep.h"
|
pflash: Require backend size to match device, improve errors
We reject undersized backends with a rather enigmatic "failed to read
the initial flash content" error. For instance:
$ qemu-system-ppc64 -S -display none -M sam460ex -drive if=pflash,format=raw,file=eins.img
qemu-system-ppc64: Initialization of device cfi.pflash02 failed: failed to read the initial flash content
We happily accept oversized images, ignoring their tail. Throwing
away parts of firmware that way is pretty much certain to end in an
even more enigmatic failure to boot.
Require the backend's size to match the device's size exactly. Report
mismatch like this:
qemu-system-ppc64: Initialization of device cfi.pflash01 failed: device requires 1048576 bytes, block backend provides 512 bytes
Improve the error for actual read failures to "can't read block
backend".
To avoid duplicating even more code between the two pflash device
models, do all that in new helper blk_check_size_and_read_all().
The error reporting can still be confusing. For instance:
qemu-system-ppc64 -S -display none -M taihu -drive if=pflash,format=raw,file=eins.img -drive if=pflash,unit=1,format=raw,file=zwei.img
qemu-system-ppc64: Initialization of device cfi.pflash02 failed: device requires 2097152 bytes, block backend provides 512 bytes
Leaves the user guessing which of the two -drive is wrong. Mention
the issue in a TODO comment.
Suggested-by: Alex Bennée <alex.bennee@linaro.org>
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Message-Id: <20190319163551.32499-2-armbru@redhat.com>
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Alex Bennée <alex.bennee@linaro.org>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
2019-03-19 19:35:50 +03:00
|
|
|
#include "hw/block/block.h"
|
2013-02-05 20:06:20 +04:00
|
|
|
#include "hw/block/flash.h"
|
2019-08-12 08:23:51 +03:00
|
|
|
#include "hw/qdev-properties.h"
|
2020-12-12 01:05:12 +03:00
|
|
|
#include "hw/qdev-properties-system.h"
|
2014-10-07 15:59:18 +04:00
|
|
|
#include "sysemu/block-backend.h"
|
include/qemu/osdep.h: Don't include qapi/error.h
Commit 57cb38b included qapi/error.h into qemu/osdep.h to get the
Error typedef. Since then, we've moved to include qemu/osdep.h
everywhere. Its file comment explains: "To avoid getting into
possible circular include dependencies, this file should not include
any other QEMU headers, with the exceptions of config-host.h,
compiler.h, os-posix.h and os-win32.h, all of which are doing a
similar job to this file and are under similar constraints."
qapi/error.h doesn't do a similar job, and it doesn't adhere to
similar constraints: it includes qapi-types.h. That's in excess of
100KiB of crap most .c files don't actually need.
Add the typedef to qemu/typedefs.h, and include that instead of
qapi/error.h. Include qapi/error.h in .c files that need it and don't
get it now. Include qapi-types.h in qom/object.h for uint16List.
Update scripts/clean-includes accordingly. Update it further to match
reality: replace config.h by config-target.h, add sysemu/os-posix.h,
sysemu/os-win32.h. Update the list of includes in the qemu/osdep.h
comment quoted above similarly.
This reduces the number of objects depending on qapi/error.h from "all
of them" to less than a third. Unfortunately, the number depending on
qapi-types.h shrinks only a little. More work is needed for that one.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
[Fix compilation without the spice devel packages. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2016-03-14 11:01:28 +03:00
|
|
|
#include "qapi/error.h"
|
2020-04-08 03:35:52 +03:00
|
|
|
#include "qemu/error-report.h"
|
2013-12-17 23:42:26 +04:00
|
|
|
#include "qemu/bitops.h"
|
2012-12-17 21:20:00 +04:00
|
|
|
#include "qemu/host-utils.h"
|
2015-12-15 15:16:16 +03:00
|
|
|
#include "qemu/log.h"
|
2019-05-23 17:35:07 +03:00
|
|
|
#include "qemu/module.h"
|
2019-05-07 14:55:02 +03:00
|
|
|
#include "qemu/option.h"
|
2013-02-04 18:40:22 +04:00
|
|
|
#include "hw/sysbus.h"
|
2019-08-12 08:23:45 +03:00
|
|
|
#include "migration/vmstate.h"
|
2019-05-07 14:55:02 +03:00
|
|
|
#include "sysemu/blockdev.h"
|
2019-08-12 08:23:59 +03:00
|
|
|
#include "sysemu/runstate.h"
|
2018-06-21 20:12:57 +03:00
|
|
|
#include "trace.h"
|
2007-11-17 14:50:55 +03:00
|
|
|
|
2015-04-08 14:53:29 +03:00
|
|
|
#define PFLASH_BE 0
|
2015-04-08 15:09:43 +03:00
|
|
|
#define PFLASH_SECURE 1
|
2015-04-08 14:53:29 +03:00
|
|
|
|
2019-03-08 12:45:56 +03:00
|
|
|
struct PFlashCFI01 {
|
2013-07-01 14:18:26 +04:00
|
|
|
/*< private >*/
|
|
|
|
SysBusDevice parent_obj;
|
|
|
|
/*< public >*/
|
|
|
|
|
2014-10-07 15:59:18 +04:00
|
|
|
BlockBackend *blk;
|
2012-10-30 11:45:11 +04:00
|
|
|
uint32_t nb_blocs;
|
|
|
|
uint64_t sector_len;
|
2013-12-17 23:42:26 +04:00
|
|
|
uint8_t bank_width;
|
2013-12-17 23:42:26 +04:00
|
|
|
uint8_t device_width; /* If 0, device width not specified. */
|
2013-12-17 23:42:27 +04:00
|
|
|
uint8_t max_device_width; /* max device width in bytes */
|
2015-04-08 14:53:29 +03:00
|
|
|
uint32_t features;
|
2013-04-05 19:18:00 +04:00
|
|
|
uint8_t wcycle; /* if 0, the flash is read normally */
|
2021-02-16 17:27:19 +03:00
|
|
|
bool ro;
|
2007-11-17 14:50:55 +03:00
|
|
|
uint8_t cmd;
|
|
|
|
uint8_t status;
|
2012-10-30 11:45:11 +04:00
|
|
|
uint16_t ident0;
|
|
|
|
uint16_t ident1;
|
|
|
|
uint16_t ident2;
|
|
|
|
uint16_t ident3;
|
2007-11-17 14:50:55 +03:00
|
|
|
uint8_t cfi_table[0x52];
|
2013-04-05 19:18:00 +04:00
|
|
|
uint64_t counter;
|
2024-01-08 19:08:59 +03:00
|
|
|
uint32_t writeblock_size;
|
2011-08-04 16:55:30 +04:00
|
|
|
MemoryRegion mem;
|
2012-10-30 11:45:11 +04:00
|
|
|
char *name;
|
2007-11-17 14:50:55 +03:00
|
|
|
void *storage;
|
2016-04-15 14:41:30 +03:00
|
|
|
VMChangeStateEntry *vmstate;
|
2017-01-27 18:20:22 +03:00
|
|
|
bool old_multiple_chip_handling;
|
2024-01-08 19:08:59 +03:00
|
|
|
|
|
|
|
/* block update buffer */
|
|
|
|
unsigned char *blk_bytes;
|
|
|
|
uint32_t blk_offset;
|
2007-11-17 14:50:55 +03:00
|
|
|
};
|
|
|
|
|
pflash_cfi01: write flash contents to bdrv on incoming migration
A drive that backs a pflash device is special:
- it is very small,
- its entire contents are kept in a RAMBlock at all times, covering the
guest-phys address range that provides the guest's view of the emulated
flash chip.
The pflash device model keeps the drive (the host-side file) and the
guest-visible flash contents in sync. When migrating the guest, the
guest-visible flash contents (the RAMBlock) is migrated by default, but on
the target host, the drive (the host-side file) remains in full sync with
the RAMBlock only if:
- the source and target hosts share the storage underlying the pflash
drive,
- or the migration requests full or incremental block migration too, which
then covers all drives.
Due to the special nature of pflash drives, the following scenario makes
sense as well:
- no full nor incremental block migration, covering all drives, alongside
the base migration (justified eg. by shared storage for "normal" (big)
drives),
- non-shared storage for pflash drives.
In this case, currently only those portions of the flash drive are updated
on the target disk that the guest reprograms while running on the target
host.
In order to restore accord, dump the entire flash contents to the bdrv in
a post_load() callback.
- The read-only check follows the other call-sites of pflash_update();
- both "pfl->ro" and pflash_update() reflect / consider the case when
"pfl->bs" is NULL;
- the total size of the flash device is calculated as in
pflash_cfi01_realize().
When using shared storage, or requesting full or incremental block
migration along with the normal migration, the patch should incur a
harmless rewrite from the target side.
It is assumed that, on the target host, RAM is loaded ahead of the call to
pflash_post_load().
Suggested-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
2014-08-23 14:19:07 +04:00
|
|
|
static int pflash_post_load(void *opaque, int version_id);
|
|
|
|
|
2024-01-08 19:08:59 +03:00
|
|
|
static bool pflash_blk_write_state_needed(void *opaque)
|
|
|
|
{
|
|
|
|
PFlashCFI01 *pfl = opaque;
|
|
|
|
|
|
|
|
return (pfl->blk_offset != -1);
|
|
|
|
}
|
|
|
|
|
|
|
|
static const VMStateDescription vmstate_pflash_blk_write = {
|
|
|
|
.name = "pflash_cfi01_blk_write",
|
|
|
|
.version_id = 1,
|
|
|
|
.minimum_version_id = 1,
|
|
|
|
.needed = pflash_blk_write_state_needed,
|
|
|
|
.fields = (const VMStateField[]) {
|
|
|
|
VMSTATE_VBUFFER_UINT32(blk_bytes, PFlashCFI01, 0, NULL, writeblock_size),
|
|
|
|
VMSTATE_UINT32(blk_offset, PFlashCFI01),
|
|
|
|
VMSTATE_END_OF_LIST()
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2013-04-05 19:18:00 +04:00
|
|
|
static const VMStateDescription vmstate_pflash = {
|
|
|
|
.name = "pflash_cfi01",
|
|
|
|
.version_id = 1,
|
|
|
|
.minimum_version_id = 1,
|
pflash_cfi01: write flash contents to bdrv on incoming migration
A drive that backs a pflash device is special:
- it is very small,
- its entire contents are kept in a RAMBlock at all times, covering the
guest-phys address range that provides the guest's view of the emulated
flash chip.
The pflash device model keeps the drive (the host-side file) and the
guest-visible flash contents in sync. When migrating the guest, the
guest-visible flash contents (the RAMBlock) is migrated by default, but on
the target host, the drive (the host-side file) remains in full sync with
the RAMBlock only if:
- the source and target hosts share the storage underlying the pflash
drive,
- or the migration requests full or incremental block migration too, which
then covers all drives.
Due to the special nature of pflash drives, the following scenario makes
sense as well:
- no full nor incremental block migration, covering all drives, alongside
the base migration (justified eg. by shared storage for "normal" (big)
drives),
- non-shared storage for pflash drives.
In this case, currently only those portions of the flash drive are updated
on the target disk that the guest reprograms while running on the target
host.
In order to restore accord, dump the entire flash contents to the bdrv in
a post_load() callback.
- The read-only check follows the other call-sites of pflash_update();
- both "pfl->ro" and pflash_update() reflect / consider the case when
"pfl->bs" is NULL;
- the total size of the flash device is calculated as in
pflash_cfi01_realize().
When using shared storage, or requesting full or incremental block
migration along with the normal migration, the patch should incur a
harmless rewrite from the target side.
It is assumed that, on the target host, RAM is loaded ahead of the call to
pflash_post_load().
Suggested-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
2014-08-23 14:19:07 +04:00
|
|
|
.post_load = pflash_post_load,
|
2023-12-21 06:16:05 +03:00
|
|
|
.fields = (const VMStateField[]) {
|
2019-03-08 12:45:56 +03:00
|
|
|
VMSTATE_UINT8(wcycle, PFlashCFI01),
|
|
|
|
VMSTATE_UINT8(cmd, PFlashCFI01),
|
|
|
|
VMSTATE_UINT8(status, PFlashCFI01),
|
|
|
|
VMSTATE_UINT64(counter, PFlashCFI01),
|
2013-04-05 19:18:00 +04:00
|
|
|
VMSTATE_END_OF_LIST()
|
2024-01-08 19:08:59 +03:00
|
|
|
},
|
|
|
|
.subsections = (const VMStateDescription * const []) {
|
|
|
|
&vmstate_pflash_blk_write,
|
|
|
|
NULL
|
2013-04-05 19:18:00 +04:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2021-03-09 18:24:50 +03:00
|
|
|
/*
|
|
|
|
* Perform a CFI query based on the bank width of the flash.
|
2013-12-17 23:42:27 +04:00
|
|
|
* If this code is called we know we have a device_width set for
|
|
|
|
* this flash.
|
|
|
|
*/
|
2019-03-08 12:45:56 +03:00
|
|
|
static uint32_t pflash_cfi_query(PFlashCFI01 *pfl, hwaddr offset)
|
2013-12-17 23:42:27 +04:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
uint32_t resp = 0;
|
|
|
|
hwaddr boff;
|
|
|
|
|
2021-03-09 18:24:50 +03:00
|
|
|
/*
|
|
|
|
* Adjust incoming offset to match expected device-width
|
2013-12-17 23:42:27 +04:00
|
|
|
* addressing. CFI query addresses are always specified in terms of
|
|
|
|
* the maximum supported width of the device. This means that x8
|
|
|
|
* devices and x8/x16 devices in x8 mode behave differently. For
|
|
|
|
* devices that are not used at their max width, we will be
|
|
|
|
* provided with addresses that use higher address bits than
|
|
|
|
* expected (based on the max width), so we will shift them lower
|
|
|
|
* so that they will match the addresses used when
|
|
|
|
* device_width==max_device_width.
|
|
|
|
*/
|
|
|
|
boff = offset >> (ctz32(pfl->bank_width) +
|
|
|
|
ctz32(pfl->max_device_width) - ctz32(pfl->device_width));
|
|
|
|
|
2018-04-05 02:32:38 +03:00
|
|
|
if (boff >= sizeof(pfl->cfi_table)) {
|
2013-12-17 23:42:27 +04:00
|
|
|
return 0;
|
|
|
|
}
|
2021-03-09 18:24:50 +03:00
|
|
|
/*
|
|
|
|
* Now we will construct the CFI response generated by a single
|
2013-12-17 23:42:27 +04:00
|
|
|
* device, then replicate that for all devices that make up the
|
|
|
|
* bus. For wide parts used in x8 mode, CFI query responses
|
|
|
|
* are different than native byte-wide parts.
|
|
|
|
*/
|
|
|
|
resp = pfl->cfi_table[boff];
|
|
|
|
if (pfl->device_width != pfl->max_device_width) {
|
|
|
|
/* The only case currently supported is x8 mode for a
|
|
|
|
* wider part.
|
|
|
|
*/
|
|
|
|
if (pfl->device_width != 1 || pfl->bank_width > 4) {
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_unsupported_device_configuration(pfl->name,
|
|
|
|
pfl->device_width, pfl->max_device_width);
|
2013-12-17 23:42:27 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* CFI query data is repeated, rather than zero padded for
|
|
|
|
* wide devices used in x8 mode.
|
|
|
|
*/
|
|
|
|
for (i = 1; i < pfl->max_device_width; i++) {
|
|
|
|
resp = deposit32(resp, 8 * i, 8, pfl->cfi_table[boff]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Replicate responses for each device in bank. */
|
|
|
|
if (pfl->device_width < pfl->bank_width) {
|
|
|
|
for (i = pfl->device_width;
|
|
|
|
i < pfl->bank_width; i += pfl->device_width) {
|
|
|
|
resp = deposit32(resp, 8 * i, 8 * pfl->device_width, resp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return resp;
|
|
|
|
}
|
|
|
|
|
2013-12-17 23:42:27 +04:00
|
|
|
|
|
|
|
|
|
|
|
/* Perform a device id query based on the bank width of the flash. */
|
2019-03-08 12:45:56 +03:00
|
|
|
static uint32_t pflash_devid_query(PFlashCFI01 *pfl, hwaddr offset)
|
2013-12-17 23:42:27 +04:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
uint32_t resp;
|
|
|
|
hwaddr boff;
|
|
|
|
|
2021-03-09 18:24:50 +03:00
|
|
|
/*
|
|
|
|
* Adjust incoming offset to match expected device-width
|
2013-12-17 23:42:27 +04:00
|
|
|
* addressing. Device ID read addresses are always specified in
|
|
|
|
* terms of the maximum supported width of the device. This means
|
|
|
|
* that x8 devices and x8/x16 devices in x8 mode behave
|
|
|
|
* differently. For devices that are not used at their max width,
|
|
|
|
* we will be provided with addresses that use higher address bits
|
|
|
|
* than expected (based on the max width), so we will shift them
|
|
|
|
* lower so that they will match the addresses used when
|
|
|
|
* device_width==max_device_width.
|
|
|
|
*/
|
|
|
|
boff = offset >> (ctz32(pfl->bank_width) +
|
|
|
|
ctz32(pfl->max_device_width) - ctz32(pfl->device_width));
|
|
|
|
|
2021-03-09 18:24:50 +03:00
|
|
|
/*
|
|
|
|
* Mask off upper bits which may be used in to query block
|
2013-12-17 23:42:27 +04:00
|
|
|
* or sector lock status at other addresses.
|
|
|
|
* Offsets 2/3 are block lock status, is not emulated.
|
|
|
|
*/
|
|
|
|
switch (boff & 0xFF) {
|
|
|
|
case 0:
|
|
|
|
resp = pfl->ident0;
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_manufacturer_id(pfl->name, resp);
|
2013-12-17 23:42:27 +04:00
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
resp = pfl->ident1;
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_device_id(pfl->name, resp);
|
2013-12-17 23:42:27 +04:00
|
|
|
break;
|
|
|
|
default:
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_device_info(pfl->name, offset);
|
2013-12-17 23:42:27 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* Replicate responses for each device in bank. */
|
|
|
|
if (pfl->device_width < pfl->bank_width) {
|
|
|
|
for (i = pfl->device_width;
|
|
|
|
i < pfl->bank_width; i += pfl->device_width) {
|
|
|
|
resp = deposit32(resp, 8 * i, 8 * pfl->device_width, resp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return resp;
|
|
|
|
}
|
|
|
|
|
2019-03-08 12:45:56 +03:00
|
|
|
static uint32_t pflash_data_read(PFlashCFI01 *pfl, hwaddr offset,
|
2015-04-08 15:09:43 +03:00
|
|
|
int width, int be)
|
|
|
|
{
|
|
|
|
uint8_t *p;
|
|
|
|
uint32_t ret;
|
|
|
|
|
|
|
|
p = pfl->storage;
|
2024-01-08 19:08:58 +03:00
|
|
|
if (be) {
|
|
|
|
ret = ldn_be_p(p + offset, width);
|
|
|
|
} else {
|
|
|
|
ret = ldn_le_p(p + offset, width);
|
2015-04-08 15:09:43 +03:00
|
|
|
}
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_data_read(pfl->name, offset, width, ret);
|
2015-04-08 15:09:43 +03:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2019-03-08 12:45:56 +03:00
|
|
|
static uint32_t pflash_read(PFlashCFI01 *pfl, hwaddr offset,
|
|
|
|
int width, int be)
|
2007-11-17 14:50:55 +03:00
|
|
|
{
|
2012-10-23 14:30:10 +04:00
|
|
|
hwaddr boff;
|
2007-11-17 14:50:55 +03:00
|
|
|
uint32_t ret;
|
|
|
|
|
|
|
|
ret = -1;
|
|
|
|
switch (pfl->cmd) {
|
2013-02-28 22:23:12 +04:00
|
|
|
default:
|
|
|
|
/* This should never happen : reset state & treat it as a read */
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_read_unknown_state(pfl->name, pfl->cmd);
|
2013-02-28 22:23:12 +04:00
|
|
|
pfl->wcycle = 0;
|
2019-07-16 20:06:56 +03:00
|
|
|
/*
|
|
|
|
* The command 0x00 is not assigned by the CFI open standard,
|
|
|
|
* but QEMU historically uses it for the READ_ARRAY command (0xff).
|
|
|
|
*/
|
|
|
|
pfl->cmd = 0x00;
|
2013-02-28 22:23:12 +04:00
|
|
|
/* fall through to read code */
|
2019-07-16 20:06:56 +03:00
|
|
|
case 0x00: /* This model reset value for READ_ARRAY (not CFI compliant) */
|
2007-11-17 14:50:55 +03:00
|
|
|
/* Flash area read */
|
2015-04-08 15:09:43 +03:00
|
|
|
ret = pflash_data_read(pfl, offset, width, be);
|
2007-11-17 14:50:55 +03:00
|
|
|
break;
|
2013-02-28 22:23:12 +04:00
|
|
|
case 0x10: /* Single byte program */
|
2007-11-17 14:50:55 +03:00
|
|
|
case 0x20: /* Block erase */
|
2013-02-28 22:23:12 +04:00
|
|
|
case 0x28: /* Block erase */
|
|
|
|
case 0x40: /* single byte program */
|
2007-11-17 14:50:55 +03:00
|
|
|
case 0x50: /* Clear status register */
|
|
|
|
case 0x60: /* Block /un)lock */
|
|
|
|
case 0x70: /* Status Register */
|
|
|
|
case 0xe8: /* Write block */
|
2021-03-09 18:24:50 +03:00
|
|
|
/*
|
|
|
|
* Status register read. Return status from each device in
|
2013-12-17 23:42:26 +04:00
|
|
|
* bank.
|
|
|
|
*/
|
2007-11-17 14:50:55 +03:00
|
|
|
ret = pfl->status;
|
2013-12-17 23:42:26 +04:00
|
|
|
if (pfl->device_width && width > pfl->device_width) {
|
|
|
|
int shift = pfl->device_width * 8;
|
|
|
|
while (shift + pfl->device_width * 8 <= width * 8) {
|
|
|
|
ret |= pfl->status << shift;
|
|
|
|
shift += pfl->device_width * 8;
|
|
|
|
}
|
|
|
|
} else if (!pfl->device_width && width > 2) {
|
2021-03-09 18:24:50 +03:00
|
|
|
/*
|
|
|
|
* Handle 32 bit flash cases where device width is not
|
2013-12-17 23:42:26 +04:00
|
|
|
* set. (Existing behavior before device width added.)
|
|
|
|
*/
|
2013-06-14 11:30:48 +04:00
|
|
|
ret |= pfl->status << 16;
|
|
|
|
}
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_read_status(pfl->name, ret);
|
2007-11-17 14:50:55 +03:00
|
|
|
break;
|
2010-05-01 21:34:06 +04:00
|
|
|
case 0x90:
|
2013-12-17 23:42:27 +04:00
|
|
|
if (!pfl->device_width) {
|
|
|
|
/* Preserve old behavior if device width not specified */
|
|
|
|
boff = offset & 0xFF;
|
|
|
|
if (pfl->bank_width == 2) {
|
|
|
|
boff = boff >> 1;
|
|
|
|
} else if (pfl->bank_width == 4) {
|
|
|
|
boff = boff >> 2;
|
|
|
|
}
|
2013-12-17 23:42:27 +04:00
|
|
|
|
2013-12-17 23:42:27 +04:00
|
|
|
switch (boff) {
|
|
|
|
case 0:
|
|
|
|
ret = pfl->ident0 << 8 | pfl->ident1;
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_manufacturer_id(pfl->name, ret);
|
2013-12-17 23:42:27 +04:00
|
|
|
break;
|
|
|
|
case 1:
|
|
|
|
ret = pfl->ident2 << 8 | pfl->ident3;
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_device_id(pfl->name, ret);
|
2013-12-17 23:42:27 +04:00
|
|
|
break;
|
|
|
|
default:
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_device_info(pfl->name, boff);
|
2013-12-17 23:42:27 +04:00
|
|
|
ret = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else {
|
2021-03-09 18:24:50 +03:00
|
|
|
/*
|
|
|
|
* If we have a read larger than the bank_width, combine multiple
|
2013-12-17 23:42:27 +04:00
|
|
|
* manufacturer/device ID queries into a single response.
|
|
|
|
*/
|
|
|
|
int i;
|
|
|
|
for (i = 0; i < width; i += pfl->bank_width) {
|
|
|
|
ret = deposit32(ret, i * 8, pfl->bank_width * 8,
|
|
|
|
pflash_devid_query(pfl,
|
|
|
|
offset + i * pfl->bank_width));
|
|
|
|
}
|
2010-05-01 21:34:06 +04:00
|
|
|
}
|
|
|
|
break;
|
2007-11-17 14:50:55 +03:00
|
|
|
case 0x98: /* Query mode */
|
2013-12-17 23:42:27 +04:00
|
|
|
if (!pfl->device_width) {
|
|
|
|
/* Preserve old behavior if device width not specified */
|
|
|
|
boff = offset & 0xFF;
|
|
|
|
if (pfl->bank_width == 2) {
|
|
|
|
boff = boff >> 1;
|
|
|
|
} else if (pfl->bank_width == 4) {
|
|
|
|
boff = boff >> 2;
|
|
|
|
}
|
|
|
|
|
2018-04-05 02:32:38 +03:00
|
|
|
if (boff < sizeof(pfl->cfi_table)) {
|
2013-12-17 23:42:27 +04:00
|
|
|
ret = pfl->cfi_table[boff];
|
2018-04-05 02:32:38 +03:00
|
|
|
} else {
|
|
|
|
ret = 0;
|
2013-12-17 23:42:27 +04:00
|
|
|
}
|
|
|
|
} else {
|
2021-03-09 18:24:50 +03:00
|
|
|
/*
|
|
|
|
* If we have a read larger than the bank_width, combine multiple
|
2013-12-17 23:42:27 +04:00
|
|
|
* CFI queries into a single response.
|
|
|
|
*/
|
|
|
|
int i;
|
|
|
|
for (i = 0; i < width; i += pfl->bank_width) {
|
|
|
|
ret = deposit32(ret, i * 8, pfl->bank_width * 8,
|
|
|
|
pflash_cfi_query(pfl,
|
|
|
|
offset + i * pfl->bank_width));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-11-17 14:50:55 +03:00
|
|
|
break;
|
|
|
|
}
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_io_read(pfl->name, offset, width, ret, pfl->cmd, pfl->wcycle);
|
2019-06-26 19:39:10 +03:00
|
|
|
|
2007-11-17 14:50:55 +03:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* update flash content on disk */
|
2019-03-08 12:45:56 +03:00
|
|
|
static void pflash_update(PFlashCFI01 *pfl, int offset,
|
2007-11-17 14:50:55 +03:00
|
|
|
int size)
|
|
|
|
{
|
|
|
|
int offset_end;
|
2020-04-08 03:35:52 +03:00
|
|
|
int ret;
|
2014-10-07 15:59:18 +04:00
|
|
|
if (pfl->blk) {
|
2007-11-17 14:50:55 +03:00
|
|
|
offset_end = offset + size;
|
2016-05-06 19:26:38 +03:00
|
|
|
/* widen to sector boundaries */
|
|
|
|
offset = QEMU_ALIGN_DOWN(offset, BDRV_SECTOR_SIZE);
|
|
|
|
offset_end = QEMU_ALIGN_UP(offset_end, BDRV_SECTOR_SIZE);
|
block: Change blk_{pread,pwrite}() param order
Swap 'buf' and 'bytes' around for consistency with
blk_co_{pread,pwrite}(), and in preparation to implement these functions
using generated_co_wrapper.
Callers were updated using this Coccinelle script:
@@ expression blk, offset, buf, bytes, flags; @@
- blk_pread(blk, offset, buf, bytes, flags)
+ blk_pread(blk, offset, bytes, buf, flags)
@@ expression blk, offset, buf, bytes, flags; @@
- blk_pwrite(blk, offset, buf, bytes, flags)
+ blk_pwrite(blk, offset, bytes, buf, flags)
It had no effect on hw/block/nand.c, presumably due to the #if, so that
file was updated manually.
Overly-long lines were then fixed by hand.
Signed-off-by: Alberto Faria <afaria@redhat.com>
Reviewed-by: Eric Blake <eblake@redhat.com>
Reviewed-by: Hanna Reitz <hreitz@redhat.com>
Message-Id: <20220705161527.1054072-4-afaria@redhat.com>
Signed-off-by: Hanna Reitz <hreitz@redhat.com>
2022-07-05 19:15:11 +03:00
|
|
|
ret = blk_pwrite(pfl->blk, offset, offset_end - offset,
|
|
|
|
pfl->storage + offset, 0);
|
2020-04-08 03:35:52 +03:00
|
|
|
if (ret < 0) {
|
|
|
|
/* TODO set error bit in status */
|
|
|
|
error_report("Could not update PFLASH: %s", strerror(-ret));
|
|
|
|
}
|
2007-11-17 14:50:55 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-01-08 19:08:59 +03:00
|
|
|
/* copy current flash content to block update buffer */
|
|
|
|
static void pflash_blk_write_start(PFlashCFI01 *pfl, hwaddr offset)
|
|
|
|
{
|
|
|
|
hwaddr mask = ~(pfl->writeblock_size - 1);
|
|
|
|
|
|
|
|
trace_pflash_write_block_start(pfl->name, pfl->counter);
|
|
|
|
pfl->blk_offset = offset & mask;
|
|
|
|
memcpy(pfl->blk_bytes, pfl->storage + pfl->blk_offset,
|
|
|
|
pfl->writeblock_size);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* commit block update buffer changes */
|
|
|
|
static void pflash_blk_write_flush(PFlashCFI01 *pfl)
|
|
|
|
{
|
|
|
|
g_assert(pfl->blk_offset != -1);
|
|
|
|
trace_pflash_write_block_flush(pfl->name);
|
|
|
|
memcpy(pfl->storage + pfl->blk_offset, pfl->blk_bytes,
|
|
|
|
pfl->writeblock_size);
|
|
|
|
pflash_update(pfl, pfl->blk_offset, pfl->writeblock_size);
|
|
|
|
pfl->blk_offset = -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* discard block update buffer changes */
|
|
|
|
static void pflash_blk_write_abort(PFlashCFI01 *pfl)
|
|
|
|
{
|
|
|
|
trace_pflash_write_block_abort(pfl->name);
|
|
|
|
pfl->blk_offset = -1;
|
|
|
|
}
|
|
|
|
|
2019-03-08 12:45:56 +03:00
|
|
|
static inline void pflash_data_write(PFlashCFI01 *pfl, hwaddr offset,
|
2010-03-29 23:23:56 +04:00
|
|
|
uint32_t value, int width, int be)
|
2008-12-07 15:36:28 +03:00
|
|
|
{
|
2024-01-08 19:08:57 +03:00
|
|
|
uint8_t *p;
|
2008-12-07 15:36:28 +03:00
|
|
|
|
2024-01-08 19:08:59 +03:00
|
|
|
if (pfl->blk_offset != -1) {
|
|
|
|
/* block write: redirect writes to block update buffer */
|
|
|
|
if ((offset < pfl->blk_offset) ||
|
|
|
|
(offset + width > pfl->blk_offset + pfl->writeblock_size)) {
|
|
|
|
pfl->status |= 0x10; /* Programming error */
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
trace_pflash_data_write_block(pfl->name, offset, width, value,
|
|
|
|
pfl->counter);
|
|
|
|
p = pfl->blk_bytes + (offset - pfl->blk_offset);
|
|
|
|
} else {
|
|
|
|
/* write directly to storage */
|
|
|
|
trace_pflash_data_write(pfl->name, offset, width, value);
|
|
|
|
p = pfl->storage + offset;
|
|
|
|
}
|
2024-01-08 19:08:57 +03:00
|
|
|
|
2024-01-08 19:08:58 +03:00
|
|
|
if (be) {
|
|
|
|
stn_be_p(p, width, value);
|
|
|
|
} else {
|
|
|
|
stn_le_p(p, width, value);
|
2008-12-07 15:36:28 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-08 12:45:56 +03:00
|
|
|
static void pflash_write(PFlashCFI01 *pfl, hwaddr offset,
|
2010-03-29 23:23:56 +04:00
|
|
|
uint32_t value, int width, int be)
|
2007-11-17 14:50:55 +03:00
|
|
|
{
|
|
|
|
uint8_t *p;
|
|
|
|
uint8_t cmd;
|
|
|
|
|
|
|
|
cmd = value;
|
|
|
|
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_io_write(pfl->name, offset, width, value, pfl->wcycle);
|
2010-01-24 21:28:55 +03:00
|
|
|
if (!pfl->wcycle) {
|
|
|
|
/* Set the device in I/O access mode */
|
2013-05-07 21:04:25 +04:00
|
|
|
memory_region_rom_device_set_romd(&pfl->mem, false);
|
2010-01-24 21:28:55 +03:00
|
|
|
}
|
2007-11-17 14:50:55 +03:00
|
|
|
|
|
|
|
switch (pfl->wcycle) {
|
|
|
|
case 0:
|
|
|
|
/* read mode */
|
|
|
|
switch (cmd) {
|
2019-07-16 20:06:56 +03:00
|
|
|
case 0x00: /* This model reset value for READ_ARRAY (not CFI) */
|
2019-07-16 20:11:57 +03:00
|
|
|
goto mode_read_array;
|
2008-12-07 15:36:28 +03:00
|
|
|
case 0x10: /* Single Byte Program */
|
|
|
|
case 0x40: /* Single Byte Program */
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_write(pfl->name, "single byte program (0)");
|
2008-12-07 15:36:28 +03:00
|
|
|
break;
|
2007-11-17 14:50:55 +03:00
|
|
|
case 0x20: /* Block erase */
|
|
|
|
p = pfl->storage;
|
|
|
|
offset &= ~(pfl->sector_len - 1);
|
|
|
|
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_write_block_erase(pfl->name, offset, pfl->sector_len);
|
2007-11-17 14:50:55 +03:00
|
|
|
|
2012-02-22 11:18:49 +04:00
|
|
|
if (!pfl->ro) {
|
|
|
|
memset(p + offset, 0xff, pfl->sector_len);
|
|
|
|
pflash_update(pfl, offset, pfl->sector_len);
|
|
|
|
} else {
|
|
|
|
pfl->status |= 0x20; /* Block erase error */
|
|
|
|
}
|
2007-11-17 14:50:55 +03:00
|
|
|
pfl->status |= 0x80; /* Ready! */
|
|
|
|
break;
|
|
|
|
case 0x50: /* Clear status bits */
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_write(pfl->name, "clear status bits");
|
2007-11-17 14:50:55 +03:00
|
|
|
pfl->status = 0x0;
|
2019-07-16 20:11:57 +03:00
|
|
|
goto mode_read_array;
|
2007-11-17 14:50:55 +03:00
|
|
|
case 0x60: /* Block (un)lock */
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_write(pfl->name, "block unlock");
|
2007-11-17 14:50:55 +03:00
|
|
|
break;
|
|
|
|
case 0x70: /* Status Register */
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_write(pfl->name, "read status register");
|
2007-11-17 14:50:55 +03:00
|
|
|
pfl->cmd = cmd;
|
|
|
|
return;
|
2010-05-01 21:34:06 +04:00
|
|
|
case 0x90: /* Read Device ID */
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_write(pfl->name, "read device information");
|
2010-05-01 21:34:06 +04:00
|
|
|
pfl->cmd = cmd;
|
|
|
|
return;
|
2007-11-17 14:50:55 +03:00
|
|
|
case 0x98: /* CFI query */
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_write(pfl->name, "CFI query");
|
2007-11-17 14:50:55 +03:00
|
|
|
break;
|
|
|
|
case 0xe8: /* Write to buffer */
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_write(pfl->name, "write to buffer");
|
2019-03-08 12:45:58 +03:00
|
|
|
/* FIXME should save @offset, @width for case 1+ */
|
|
|
|
qemu_log_mask(LOG_UNIMP,
|
|
|
|
"%s: Write to buffer emulation is flawed\n",
|
|
|
|
__func__);
|
2007-11-17 14:50:55 +03:00
|
|
|
pfl->status |= 0x80; /* Ready! */
|
|
|
|
break;
|
2012-11-25 02:03:13 +04:00
|
|
|
case 0xf0: /* Probe for AMD flash */
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_write(pfl->name, "probe for AMD flash");
|
2019-07-16 20:11:57 +03:00
|
|
|
goto mode_read_array;
|
|
|
|
case 0xff: /* Read Array */
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_write(pfl->name, "read array mode");
|
2019-07-16 20:11:57 +03:00
|
|
|
goto mode_read_array;
|
2007-11-17 14:50:55 +03:00
|
|
|
default:
|
|
|
|
goto error_flash;
|
|
|
|
}
|
|
|
|
pfl->wcycle++;
|
|
|
|
pfl->cmd = cmd;
|
2012-09-01 15:00:48 +04:00
|
|
|
break;
|
2007-11-17 14:50:55 +03:00
|
|
|
case 1:
|
|
|
|
switch (pfl->cmd) {
|
2008-12-07 15:36:28 +03:00
|
|
|
case 0x10: /* Single Byte Program */
|
|
|
|
case 0x40: /* Single Byte Program */
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_write(pfl->name, "single byte program (1)");
|
2012-02-22 11:18:49 +04:00
|
|
|
if (!pfl->ro) {
|
|
|
|
pflash_data_write(pfl, offset, value, width, be);
|
|
|
|
pflash_update(pfl, offset, width);
|
|
|
|
} else {
|
|
|
|
pfl->status |= 0x10; /* Programming error */
|
|
|
|
}
|
2008-12-07 15:36:28 +03:00
|
|
|
pfl->status |= 0x80; /* Ready! */
|
|
|
|
pfl->wcycle = 0;
|
|
|
|
break;
|
2007-11-17 14:50:55 +03:00
|
|
|
case 0x20: /* Block erase */
|
|
|
|
case 0x28:
|
|
|
|
if (cmd == 0xd0) { /* confirm */
|
2008-10-04 03:00:09 +04:00
|
|
|
pfl->wcycle = 0;
|
2007-11-17 14:50:55 +03:00
|
|
|
pfl->status |= 0x80;
|
2019-07-16 20:11:57 +03:00
|
|
|
} else if (cmd == 0xff) { /* Read Array */
|
|
|
|
goto mode_read_array;
|
2007-11-17 14:50:55 +03:00
|
|
|
} else
|
|
|
|
goto error_flash;
|
|
|
|
|
|
|
|
break;
|
|
|
|
case 0xe8:
|
2021-03-09 18:24:50 +03:00
|
|
|
/*
|
|
|
|
* Mask writeblock size based on device width, or bank width if
|
2013-12-17 23:42:26 +04:00
|
|
|
* device width not specified.
|
|
|
|
*/
|
2019-03-08 12:45:58 +03:00
|
|
|
/* FIXME check @offset, @width */
|
2013-12-17 23:42:26 +04:00
|
|
|
if (pfl->device_width) {
|
|
|
|
value = extract32(value, 0, pfl->device_width * 8);
|
|
|
|
} else {
|
|
|
|
value = extract32(value, 0, pfl->bank_width * 8);
|
|
|
|
}
|
2008-10-11 13:19:57 +04:00
|
|
|
pfl->counter = value;
|
2007-11-17 14:50:55 +03:00
|
|
|
pfl->wcycle++;
|
2024-01-08 19:08:59 +03:00
|
|
|
pflash_blk_write_start(pfl, offset);
|
2007-11-17 14:50:55 +03:00
|
|
|
break;
|
|
|
|
case 0x60:
|
|
|
|
if (cmd == 0xd0) {
|
|
|
|
pfl->wcycle = 0;
|
|
|
|
pfl->status |= 0x80;
|
|
|
|
} else if (cmd == 0x01) {
|
|
|
|
pfl->wcycle = 0;
|
|
|
|
pfl->status |= 0x80;
|
2019-07-16 20:11:57 +03:00
|
|
|
} else if (cmd == 0xff) { /* Read Array */
|
|
|
|
goto mode_read_array;
|
2007-11-17 14:50:55 +03:00
|
|
|
} else {
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_write(pfl->name, "unknown (un)locking command");
|
2019-07-16 20:11:57 +03:00
|
|
|
goto mode_read_array;
|
2007-11-17 14:50:55 +03:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 0x98:
|
2019-07-16 20:11:57 +03:00
|
|
|
if (cmd == 0xff) { /* Read Array */
|
|
|
|
goto mode_read_array;
|
2007-11-17 14:50:55 +03:00
|
|
|
} else {
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_write(pfl->name, "leaving query mode");
|
2007-11-17 14:50:55 +03:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
goto error_flash;
|
|
|
|
}
|
2012-09-01 15:00:48 +04:00
|
|
|
break;
|
2007-11-17 14:50:55 +03:00
|
|
|
case 2:
|
|
|
|
switch (pfl->cmd) {
|
|
|
|
case 0xe8: /* Block write */
|
2019-03-08 12:45:58 +03:00
|
|
|
/* FIXME check @offset, @width */
|
2024-01-08 19:08:59 +03:00
|
|
|
if (!pfl->ro && (pfl->blk_offset != -1)) {
|
2012-02-22 11:18:49 +04:00
|
|
|
pflash_data_write(pfl, offset, value, width, be);
|
|
|
|
} else {
|
|
|
|
pfl->status |= 0x10; /* Programming error */
|
|
|
|
}
|
2007-11-17 14:50:55 +03:00
|
|
|
|
|
|
|
pfl->status |= 0x80;
|
|
|
|
|
|
|
|
if (!pfl->counter) {
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_write(pfl->name, "block write finished");
|
2007-11-17 14:50:55 +03:00
|
|
|
pfl->wcycle++;
|
|
|
|
}
|
|
|
|
|
|
|
|
pfl->counter--;
|
|
|
|
break;
|
2007-11-18 05:09:36 +03:00
|
|
|
default:
|
|
|
|
goto error_flash;
|
2007-11-17 14:50:55 +03:00
|
|
|
}
|
2012-09-01 15:00:48 +04:00
|
|
|
break;
|
2007-11-17 14:50:55 +03:00
|
|
|
case 3: /* Confirm mode */
|
|
|
|
switch (pfl->cmd) {
|
|
|
|
case 0xe8: /* Block write */
|
2024-01-08 19:08:59 +03:00
|
|
|
if ((cmd == 0xd0) && !(pfl->status & 0x10)) {
|
|
|
|
pflash_blk_write_flush(pfl);
|
2007-11-17 14:50:55 +03:00
|
|
|
pfl->wcycle = 0;
|
|
|
|
pfl->status |= 0x80;
|
|
|
|
} else {
|
2024-01-08 19:08:59 +03:00
|
|
|
pflash_blk_write_abort(pfl);
|
2019-07-16 20:11:57 +03:00
|
|
|
goto mode_read_array;
|
2007-11-17 14:50:55 +03:00
|
|
|
}
|
2007-11-18 05:09:36 +03:00
|
|
|
break;
|
|
|
|
default:
|
2024-01-08 19:08:59 +03:00
|
|
|
pflash_blk_write_abort(pfl);
|
2007-11-18 05:09:36 +03:00
|
|
|
goto error_flash;
|
2007-11-17 14:50:55 +03:00
|
|
|
}
|
2012-09-01 15:00:48 +04:00
|
|
|
break;
|
2007-11-17 14:50:55 +03:00
|
|
|
default:
|
|
|
|
/* Should never happen */
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_write(pfl->name, "invalid write state");
|
2019-07-16 20:11:57 +03:00
|
|
|
goto mode_read_array;
|
2007-11-17 14:50:55 +03:00
|
|
|
}
|
|
|
|
return;
|
|
|
|
|
|
|
|
error_flash:
|
2012-12-04 10:04:33 +04:00
|
|
|
qemu_log_mask(LOG_UNIMP, "%s: Unimplemented flash cmd sequence "
|
2023-01-11 00:29:47 +03:00
|
|
|
"(offset " HWADDR_FMT_plx ", wcycle 0x%x cmd 0x%x value 0x%x)"
|
2012-12-04 10:04:33 +04:00
|
|
|
"\n", __func__, offset, pfl->wcycle, pfl->cmd, value);
|
2007-11-17 14:50:55 +03:00
|
|
|
|
2019-07-16 20:11:57 +03:00
|
|
|
mode_read_array:
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_mode_read_array(pfl->name);
|
2013-05-07 21:04:25 +04:00
|
|
|
memory_region_rom_device_set_romd(&pfl->mem, true);
|
2007-11-17 14:50:55 +03:00
|
|
|
pfl->wcycle = 0;
|
2019-07-16 20:06:56 +03:00
|
|
|
pfl->cmd = 0x00; /* This model reset value for READ_ARRAY (not CFI) */
|
2007-11-17 14:50:55 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-04-08 15:09:43 +03:00
|
|
|
static MemTxResult pflash_mem_read_with_attrs(void *opaque, hwaddr addr, uint64_t *value,
|
|
|
|
unsigned len, MemTxAttrs attrs)
|
2010-03-29 23:23:56 +04:00
|
|
|
{
|
2019-03-08 12:45:56 +03:00
|
|
|
PFlashCFI01 *pfl = opaque;
|
2015-04-08 15:00:53 +03:00
|
|
|
bool be = !!(pfl->features & (1 << PFLASH_BE));
|
2010-03-29 23:23:56 +04:00
|
|
|
|
2015-04-08 15:09:43 +03:00
|
|
|
if ((pfl->features & (1 << PFLASH_SECURE)) && !attrs.secure) {
|
|
|
|
*value = pflash_data_read(opaque, addr, len, be);
|
|
|
|
} else {
|
|
|
|
*value = pflash_read(opaque, addr, len, be);
|
|
|
|
}
|
|
|
|
return MEMTX_OK;
|
2010-03-29 23:23:56 +04:00
|
|
|
}
|
|
|
|
|
2015-04-08 15:09:43 +03:00
|
|
|
static MemTxResult pflash_mem_write_with_attrs(void *opaque, hwaddr addr, uint64_t value,
|
|
|
|
unsigned len, MemTxAttrs attrs)
|
2007-11-17 14:50:55 +03:00
|
|
|
{
|
2019-03-08 12:45:56 +03:00
|
|
|
PFlashCFI01 *pfl = opaque;
|
2015-04-08 15:00:53 +03:00
|
|
|
bool be = !!(pfl->features & (1 << PFLASH_BE));
|
2010-03-29 23:23:56 +04:00
|
|
|
|
2015-04-08 15:09:43 +03:00
|
|
|
if ((pfl->features & (1 << PFLASH_SECURE)) && !attrs.secure) {
|
|
|
|
return MEMTX_ERROR;
|
|
|
|
} else {
|
|
|
|
pflash_write(opaque, addr, value, len, be);
|
|
|
|
return MEMTX_OK;
|
|
|
|
}
|
2007-11-17 14:50:55 +03:00
|
|
|
}
|
|
|
|
|
2015-04-08 15:00:53 +03:00
|
|
|
static const MemoryRegionOps pflash_cfi01_ops = {
|
2015-04-08 15:09:43 +03:00
|
|
|
.read_with_attrs = pflash_mem_read_with_attrs,
|
|
|
|
.write_with_attrs = pflash_mem_write_with_attrs,
|
2011-08-04 16:55:30 +04:00
|
|
|
.endianness = DEVICE_NATIVE_ENDIAN,
|
2007-11-17 14:50:55 +03:00
|
|
|
};
|
|
|
|
|
Revert "hw/block/pflash_cfi: Error out if dev length isn't power of 2"
Commit 334c388f25 ("pflash_cfi: Error out if device length
isn't a power of two") aimed to finish the effort started by
commit 06f1521795 ("pflash: Require backend size to match device,
improve errors"), but unfortunately we are not quite there since
various machines are still ready to accept incomplete / oversized
pflash backend images, and now fail, i.e. on Debian bullseye:
$ qemu-system-x86_64 \
-drive \
if=pflash,format=raw,unit=0,readonly=on,file=/usr/share/OVMF/OVMF_CODE.fd
qemu-system-x86_64: Device size must be a power of two.
where OVMF_CODE.fd comes from the ovmf package, which doesn't
pad the firmware images to the flash size:
$ ls -lh /usr/share/OVMF/
-rw-r--r-- 1 root root 3.5M Aug 19 2021 OVMF_CODE_4M.fd
-rw-r--r-- 1 root root 1.9M Aug 19 2021 OVMF_CODE.fd
-rw-r--r-- 1 root root 128K Aug 19 2021 OVMF_VARS.fd
Since we entered the freeze period to prepare the v7.2.0 release,
the safest is to revert commit 334c388f25707a234c4a0dea05b9df08d.
Resolves: https://gitlab.com/qemu-project/qemu/-/issues/1294
Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org>
Message-Id: <20221108175755.95141-1-philmd@linaro.org>
Signed-off-by: Daniel Henrique Barboza <danielhb413@gmail.com>
Message-Id: <20221108172633.860700-1-danielhb413@gmail.com>
2022-11-08 17:00:32 +03:00
|
|
|
static void pflash_cfi01_fill_cfi_table(PFlashCFI01 *pfl)
|
2007-11-17 14:50:55 +03:00
|
|
|
{
|
2017-01-27 18:20:22 +03:00
|
|
|
uint64_t blocks_per_device, sector_len_per_device, device_len;
|
2014-06-19 21:06:25 +04:00
|
|
|
int num_devices;
|
2007-11-17 14:50:55 +03:00
|
|
|
|
2021-03-09 18:24:50 +03:00
|
|
|
/*
|
|
|
|
* These are only used to expose the parameters of each device
|
2014-06-19 21:06:25 +04:00
|
|
|
* in the cfi_table[].
|
|
|
|
*/
|
|
|
|
num_devices = pfl->device_width ? (pfl->bank_width / pfl->device_width) : 1;
|
2017-01-27 18:20:22 +03:00
|
|
|
if (pfl->old_multiple_chip_handling) {
|
|
|
|
blocks_per_device = pfl->nb_blocs / num_devices;
|
|
|
|
sector_len_per_device = pfl->sector_len;
|
|
|
|
} else {
|
|
|
|
blocks_per_device = pfl->nb_blocs;
|
|
|
|
sector_len_per_device = pfl->sector_len / num_devices;
|
|
|
|
}
|
|
|
|
device_len = sector_len_per_device * blocks_per_device;
|
2014-06-19 21:06:25 +04:00
|
|
|
|
2007-11-17 14:50:55 +03:00
|
|
|
/* Hardcoded CFI table */
|
|
|
|
/* Standard "QRY" string */
|
|
|
|
pfl->cfi_table[0x10] = 'Q';
|
|
|
|
pfl->cfi_table[0x11] = 'R';
|
|
|
|
pfl->cfi_table[0x12] = 'Y';
|
|
|
|
/* Command set (Intel) */
|
|
|
|
pfl->cfi_table[0x13] = 0x01;
|
|
|
|
pfl->cfi_table[0x14] = 0x00;
|
|
|
|
/* Primary extended table address (none) */
|
|
|
|
pfl->cfi_table[0x15] = 0x31;
|
|
|
|
pfl->cfi_table[0x16] = 0x00;
|
|
|
|
/* Alternate command set (none) */
|
|
|
|
pfl->cfi_table[0x17] = 0x00;
|
|
|
|
pfl->cfi_table[0x18] = 0x00;
|
|
|
|
/* Alternate extended table (none) */
|
|
|
|
pfl->cfi_table[0x19] = 0x00;
|
|
|
|
pfl->cfi_table[0x1A] = 0x00;
|
|
|
|
/* Vcc min */
|
|
|
|
pfl->cfi_table[0x1B] = 0x45;
|
|
|
|
/* Vcc max */
|
|
|
|
pfl->cfi_table[0x1C] = 0x55;
|
|
|
|
/* Vpp min (no Vpp pin) */
|
|
|
|
pfl->cfi_table[0x1D] = 0x00;
|
|
|
|
/* Vpp max (no Vpp pin) */
|
|
|
|
pfl->cfi_table[0x1E] = 0x00;
|
|
|
|
/* Reserved */
|
|
|
|
pfl->cfi_table[0x1F] = 0x07;
|
|
|
|
/* Timeout for min size buffer write */
|
|
|
|
pfl->cfi_table[0x20] = 0x07;
|
|
|
|
/* Typical timeout for block erase */
|
|
|
|
pfl->cfi_table[0x21] = 0x0a;
|
|
|
|
/* Typical timeout for full chip erase (4096 ms) */
|
|
|
|
pfl->cfi_table[0x22] = 0x00;
|
|
|
|
/* Reserved */
|
|
|
|
pfl->cfi_table[0x23] = 0x04;
|
|
|
|
/* Max timeout for buffer write */
|
|
|
|
pfl->cfi_table[0x24] = 0x04;
|
|
|
|
/* Max timeout for block erase */
|
|
|
|
pfl->cfi_table[0x25] = 0x04;
|
|
|
|
/* Max timeout for chip erase */
|
|
|
|
pfl->cfi_table[0x26] = 0x00;
|
|
|
|
/* Device size */
|
2014-06-19 21:06:25 +04:00
|
|
|
pfl->cfi_table[0x27] = ctz32(device_len); /* + 1; */
|
2007-11-17 14:50:55 +03:00
|
|
|
/* Flash device interface (8 & 16 bits) */
|
|
|
|
pfl->cfi_table[0x28] = 0x02;
|
|
|
|
pfl->cfi_table[0x29] = 0x00;
|
|
|
|
/* Max number of bytes in multi-bytes write */
|
2013-12-17 23:42:26 +04:00
|
|
|
if (pfl->bank_width == 1) {
|
2010-01-24 20:39:51 +03:00
|
|
|
pfl->cfi_table[0x2A] = 0x08;
|
|
|
|
} else {
|
|
|
|
pfl->cfi_table[0x2A] = 0x0B;
|
|
|
|
}
|
2010-01-24 22:38:29 +03:00
|
|
|
pfl->writeblock_size = 1 << pfl->cfi_table[0x2A];
|
2017-01-27 18:20:22 +03:00
|
|
|
if (!pfl->old_multiple_chip_handling && num_devices > 1) {
|
|
|
|
pfl->writeblock_size *= num_devices;
|
|
|
|
}
|
2010-01-24 22:38:29 +03:00
|
|
|
|
2007-11-17 14:50:55 +03:00
|
|
|
pfl->cfi_table[0x2B] = 0x00;
|
|
|
|
/* Number of erase block regions (uniform) */
|
|
|
|
pfl->cfi_table[0x2C] = 0x01;
|
|
|
|
/* Erase block region 1 */
|
2014-06-19 21:06:25 +04:00
|
|
|
pfl->cfi_table[0x2D] = blocks_per_device - 1;
|
|
|
|
pfl->cfi_table[0x2E] = (blocks_per_device - 1) >> 8;
|
2017-01-27 18:20:22 +03:00
|
|
|
pfl->cfi_table[0x2F] = sector_len_per_device >> 8;
|
|
|
|
pfl->cfi_table[0x30] = sector_len_per_device >> 16;
|
2007-11-17 14:50:55 +03:00
|
|
|
|
|
|
|
/* Extended */
|
|
|
|
pfl->cfi_table[0x31] = 'P';
|
|
|
|
pfl->cfi_table[0x32] = 'R';
|
|
|
|
pfl->cfi_table[0x33] = 'I';
|
|
|
|
|
|
|
|
pfl->cfi_table[0x34] = '1';
|
2012-09-04 00:47:03 +04:00
|
|
|
pfl->cfi_table[0x35] = '0';
|
2007-11-17 14:50:55 +03:00
|
|
|
|
|
|
|
pfl->cfi_table[0x36] = 0x00;
|
|
|
|
pfl->cfi_table[0x37] = 0x00;
|
|
|
|
pfl->cfi_table[0x38] = 0x00;
|
|
|
|
pfl->cfi_table[0x39] = 0x00;
|
|
|
|
|
|
|
|
pfl->cfi_table[0x3a] = 0x00;
|
|
|
|
|
|
|
|
pfl->cfi_table[0x3b] = 0x00;
|
|
|
|
pfl->cfi_table[0x3c] = 0x00;
|
|
|
|
|
2012-09-04 00:47:03 +04:00
|
|
|
pfl->cfi_table[0x3f] = 0x01; /* Number of protection fields */
|
2012-10-30 11:45:11 +04:00
|
|
|
}
|
|
|
|
|
2021-03-10 02:15:15 +03:00
|
|
|
static void pflash_cfi01_realize(DeviceState *dev, Error **errp)
|
|
|
|
{
|
|
|
|
ERRP_GUARD();
|
|
|
|
PFlashCFI01 *pfl = PFLASH_CFI01(dev);
|
|
|
|
uint64_t total_len;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (pfl->sector_len == 0) {
|
|
|
|
error_setg(errp, "attribute \"sector-length\" not specified or zero.");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (pfl->nb_blocs == 0) {
|
|
|
|
error_setg(errp, "attribute \"num-blocks\" not specified or zero.");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (pfl->name == NULL) {
|
|
|
|
error_setg(errp, "attribute \"name\" not specified.");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
total_len = pfl->sector_len * pfl->nb_blocs;
|
|
|
|
|
|
|
|
memory_region_init_rom_device(
|
|
|
|
&pfl->mem, OBJECT(dev),
|
|
|
|
&pflash_cfi01_ops,
|
|
|
|
pfl,
|
|
|
|
pfl->name, total_len, errp);
|
|
|
|
if (*errp) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
pfl->storage = memory_region_get_ram_ptr(&pfl->mem);
|
|
|
|
sysbus_init_mmio(SYS_BUS_DEVICE(dev), &pfl->mem);
|
|
|
|
|
|
|
|
if (pfl->blk) {
|
|
|
|
uint64_t perm;
|
|
|
|
pfl->ro = !blk_supports_write_perm(pfl->blk);
|
|
|
|
perm = BLK_PERM_CONSISTENT_READ | (pfl->ro ? 0 : BLK_PERM_WRITE);
|
|
|
|
ret = blk_set_perm(pfl->blk, perm, BLK_PERM_ALL, errp);
|
|
|
|
if (ret < 0) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
} else {
|
2021-02-16 17:27:19 +03:00
|
|
|
pfl->ro = false;
|
2021-03-10 02:15:15 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (pfl->blk) {
|
2024-01-30 10:30:32 +03:00
|
|
|
if (!blk_check_size_and_read_all(pfl->blk, dev, pfl->storage,
|
|
|
|
total_len, errp)) {
|
2021-03-10 02:15:15 +03:00
|
|
|
vmstate_unregister_ram(&pfl->mem, DEVICE(pfl));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Default to devices being used at their maximum device width. This was
|
|
|
|
* assumed before the device_width support was added.
|
|
|
|
*/
|
|
|
|
if (!pfl->max_device_width) {
|
|
|
|
pfl->max_device_width = pfl->device_width;
|
|
|
|
}
|
|
|
|
|
|
|
|
pfl->wcycle = 0;
|
|
|
|
/*
|
|
|
|
* The command 0x00 is not assigned by the CFI open standard,
|
|
|
|
* but QEMU historically uses it for the READ_ARRAY command (0xff).
|
|
|
|
*/
|
|
|
|
pfl->cmd = 0x00;
|
|
|
|
pfl->status = 0x80; /* WSM ready */
|
Revert "hw/block/pflash_cfi: Error out if dev length isn't power of 2"
Commit 334c388f25 ("pflash_cfi: Error out if device length
isn't a power of two") aimed to finish the effort started by
commit 06f1521795 ("pflash: Require backend size to match device,
improve errors"), but unfortunately we are not quite there since
various machines are still ready to accept incomplete / oversized
pflash backend images, and now fail, i.e. on Debian bullseye:
$ qemu-system-x86_64 \
-drive \
if=pflash,format=raw,unit=0,readonly=on,file=/usr/share/OVMF/OVMF_CODE.fd
qemu-system-x86_64: Device size must be a power of two.
where OVMF_CODE.fd comes from the ovmf package, which doesn't
pad the firmware images to the flash size:
$ ls -lh /usr/share/OVMF/
-rw-r--r-- 1 root root 3.5M Aug 19 2021 OVMF_CODE_4M.fd
-rw-r--r-- 1 root root 1.9M Aug 19 2021 OVMF_CODE.fd
-rw-r--r-- 1 root root 128K Aug 19 2021 OVMF_VARS.fd
Since we entered the freeze period to prepare the v7.2.0 release,
the safest is to revert commit 334c388f25707a234c4a0dea05b9df08d.
Resolves: https://gitlab.com/qemu-project/qemu/-/issues/1294
Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org>
Message-Id: <20221108175755.95141-1-philmd@linaro.org>
Signed-off-by: Daniel Henrique Barboza <danielhb413@gmail.com>
Message-Id: <20221108172633.860700-1-danielhb413@gmail.com>
2022-11-08 17:00:32 +03:00
|
|
|
pflash_cfi01_fill_cfi_table(pfl);
|
2024-01-08 19:08:59 +03:00
|
|
|
|
|
|
|
pfl->blk_bytes = g_malloc(pfl->writeblock_size);
|
|
|
|
pfl->blk_offset = -1;
|
2021-03-10 02:15:15 +03:00
|
|
|
}
|
|
|
|
|
2019-07-02 01:38:38 +03:00
|
|
|
static void pflash_cfi01_system_reset(DeviceState *dev)
|
|
|
|
{
|
|
|
|
PFlashCFI01 *pfl = PFLASH_CFI01(dev);
|
|
|
|
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_reset(pfl->name);
|
2019-07-02 01:38:38 +03:00
|
|
|
/*
|
|
|
|
* The command 0x00 is not assigned by the CFI open standard,
|
|
|
|
* but QEMU historically uses it for the READ_ARRAY command (0xff).
|
|
|
|
*/
|
|
|
|
pfl->cmd = 0x00;
|
|
|
|
pfl->wcycle = 0;
|
|
|
|
memory_region_rom_device_set_romd(&pfl->mem, true);
|
|
|
|
/*
|
|
|
|
* The WSM ready timer occurs at most 150ns after system reset.
|
|
|
|
* This model deliberately ignores this delay.
|
|
|
|
*/
|
|
|
|
pfl->status = 0x80;
|
2024-01-08 19:08:59 +03:00
|
|
|
|
|
|
|
pfl->blk_offset = -1;
|
2019-07-02 01:38:38 +03:00
|
|
|
}
|
|
|
|
|
2012-10-30 11:45:11 +04:00
|
|
|
static Property pflash_cfi01_properties[] = {
|
2019-03-08 12:45:56 +03:00
|
|
|
DEFINE_PROP_DRIVE("drive", PFlashCFI01, blk),
|
2014-06-19 21:06:25 +04:00
|
|
|
/* num-blocks is the number of blocks actually visible to the guest,
|
|
|
|
* ie the total size of the device divided by the sector length.
|
|
|
|
* If we're emulating flash devices wired in parallel the actual
|
2023-07-14 14:32:24 +03:00
|
|
|
* number of blocks per individual device will differ.
|
2014-06-19 21:06:25 +04:00
|
|
|
*/
|
2019-03-08 12:45:56 +03:00
|
|
|
DEFINE_PROP_UINT32("num-blocks", PFlashCFI01, nb_blocs, 0),
|
|
|
|
DEFINE_PROP_UINT64("sector-length", PFlashCFI01, sector_len, 0),
|
2013-12-17 23:42:27 +04:00
|
|
|
/* width here is the overall width of this QEMU device in bytes.
|
|
|
|
* The QEMU device may be emulating a number of flash devices
|
|
|
|
* wired up in parallel; the width of each individual flash
|
|
|
|
* device should be specified via device-width. If the individual
|
|
|
|
* devices have a maximum width which is greater than the width
|
|
|
|
* they are being used for, this maximum width should be set via
|
|
|
|
* max-device-width (which otherwise defaults to device-width).
|
|
|
|
* So for instance a 32-bit wide QEMU flash device made from four
|
|
|
|
* 16-bit flash devices used in 8-bit wide mode would be configured
|
|
|
|
* with width = 4, device-width = 1, max-device-width = 2.
|
|
|
|
*
|
|
|
|
* If device-width is not specified we default to backwards
|
|
|
|
* compatible behaviour which is a bad emulation of two
|
|
|
|
* 16 bit devices making up a 32 bit wide QEMU device. This
|
|
|
|
* is deprecated for new uses of this device.
|
|
|
|
*/
|
2019-03-08 12:45:56 +03:00
|
|
|
DEFINE_PROP_UINT8("width", PFlashCFI01, bank_width, 0),
|
|
|
|
DEFINE_PROP_UINT8("device-width", PFlashCFI01, device_width, 0),
|
|
|
|
DEFINE_PROP_UINT8("max-device-width", PFlashCFI01, max_device_width, 0),
|
|
|
|
DEFINE_PROP_BIT("big-endian", PFlashCFI01, features, PFLASH_BE, 0),
|
|
|
|
DEFINE_PROP_BIT("secure", PFlashCFI01, features, PFLASH_SECURE, 0),
|
|
|
|
DEFINE_PROP_UINT16("id0", PFlashCFI01, ident0, 0),
|
|
|
|
DEFINE_PROP_UINT16("id1", PFlashCFI01, ident1, 0),
|
|
|
|
DEFINE_PROP_UINT16("id2", PFlashCFI01, ident2, 0),
|
|
|
|
DEFINE_PROP_UINT16("id3", PFlashCFI01, ident3, 0),
|
|
|
|
DEFINE_PROP_STRING("name", PFlashCFI01, name),
|
|
|
|
DEFINE_PROP_BOOL("old-multiple-chip-handling", PFlashCFI01,
|
2017-01-27 18:20:22 +03:00
|
|
|
old_multiple_chip_handling, false),
|
2012-10-30 11:45:11 +04:00
|
|
|
DEFINE_PROP_END_OF_LIST(),
|
|
|
|
};
|
|
|
|
|
|
|
|
static void pflash_cfi01_class_init(ObjectClass *klass, void *data)
|
|
|
|
{
|
|
|
|
DeviceClass *dc = DEVICE_CLASS(klass);
|
|
|
|
|
2019-07-02 01:38:38 +03:00
|
|
|
dc->reset = pflash_cfi01_system_reset;
|
2013-07-01 14:18:27 +04:00
|
|
|
dc->realize = pflash_cfi01_realize;
|
2020-01-10 18:30:32 +03:00
|
|
|
device_class_set_props(dc, pflash_cfi01_properties);
|
2013-04-05 19:18:00 +04:00
|
|
|
dc->vmsd = &vmstate_pflash;
|
2013-07-29 18:17:45 +04:00
|
|
|
set_bit(DEVICE_CATEGORY_STORAGE, dc->categories);
|
2012-10-30 11:45:11 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static const TypeInfo pflash_cfi01_info = {
|
2019-03-08 12:45:59 +03:00
|
|
|
.name = TYPE_PFLASH_CFI01,
|
2012-10-30 11:45:11 +04:00
|
|
|
.parent = TYPE_SYS_BUS_DEVICE,
|
2019-03-08 12:45:56 +03:00
|
|
|
.instance_size = sizeof(PFlashCFI01),
|
2012-10-30 11:45:11 +04:00
|
|
|
.class_init = pflash_cfi01_class_init,
|
|
|
|
};
|
|
|
|
|
|
|
|
static void pflash_cfi01_register_types(void)
|
|
|
|
{
|
|
|
|
type_register_static(&pflash_cfi01_info);
|
|
|
|
}
|
|
|
|
|
|
|
|
type_init(pflash_cfi01_register_types)
|
|
|
|
|
2019-03-08 12:45:56 +03:00
|
|
|
PFlashCFI01 *pflash_cfi01_register(hwaddr base,
|
2019-03-08 12:46:09 +03:00
|
|
|
const char *name,
|
2019-03-08 12:45:56 +03:00
|
|
|
hwaddr size,
|
|
|
|
BlockBackend *blk,
|
2019-03-08 12:46:10 +03:00
|
|
|
uint32_t sector_len,
|
2019-03-08 12:45:56 +03:00
|
|
|
int bank_width,
|
|
|
|
uint16_t id0, uint16_t id1,
|
|
|
|
uint16_t id2, uint16_t id3,
|
|
|
|
int be)
|
2012-10-30 11:45:11 +04:00
|
|
|
{
|
qdev: Convert uses of qdev_create() with Coccinelle
This is the transformation explained in the commit before previous.
Takes care of just one pattern that needs conversion. More to come in
this series.
Coccinelle script:
@ depends on !(file in "hw/arm/highbank.c")@
expression bus, type_name, dev, expr;
@@
- dev = qdev_create(bus, type_name);
+ dev = qdev_new(type_name);
... when != dev = expr
- qdev_init_nofail(dev);
+ qdev_realize_and_unref(dev, bus, &error_fatal);
@@
expression bus, type_name, dev, expr;
identifier DOWN;
@@
- dev = DOWN(qdev_create(bus, type_name));
+ dev = DOWN(qdev_new(type_name));
... when != dev = expr
- qdev_init_nofail(DEVICE(dev));
+ qdev_realize_and_unref(DEVICE(dev), bus, &error_fatal);
@@
expression bus, type_name, expr;
identifier dev;
@@
- DeviceState *dev = qdev_create(bus, type_name);
+ DeviceState *dev = qdev_new(type_name);
... when != dev = expr
- qdev_init_nofail(dev);
+ qdev_realize_and_unref(dev, bus, &error_fatal);
@@
expression bus, type_name, dev, expr, errp;
symbol true;
@@
- dev = qdev_create(bus, type_name);
+ dev = qdev_new(type_name);
... when != dev = expr
- object_property_set_bool(OBJECT(dev), true, "realized", errp);
+ qdev_realize_and_unref(dev, bus, errp);
@@
expression bus, type_name, expr, errp;
identifier dev;
symbol true;
@@
- DeviceState *dev = qdev_create(bus, type_name);
+ DeviceState *dev = qdev_new(type_name);
... when != dev = expr
- object_property_set_bool(OBJECT(dev), true, "realized", errp);
+ qdev_realize_and_unref(dev, bus, errp);
The first rule exempts hw/arm/highbank.c, because it matches along two
control flow paths there, with different @type_name. Covered by the
next commit's manual conversions.
Missing #include "qapi/error.h" added manually.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
Message-Id: <20200610053247.1583243-10-armbru@redhat.com>
[Conflicts in hw/misc/empty_slot.c and hw/sparc/leon3.c resolved]
2020-06-10 08:31:58 +03:00
|
|
|
DeviceState *dev = qdev_new(TYPE_PFLASH_CFI01);
|
2012-10-30 11:45:11 +04:00
|
|
|
|
2015-03-09 21:17:26 +03:00
|
|
|
if (blk) {
|
qdev: Make qdev_prop_set_drive() match the other helpers
qdev_prop_set_drive() can fail. None of the other qdev_prop_set_FOO()
can; they abort on error.
To clean up this inconsistency, rename qdev_prop_set_drive() to
qdev_prop_set_drive_err(), and create a qdev_prop_set_drive() that
aborts on error.
Coccinelle script to update callers:
@ depends on !(file in "hw/core/qdev-properties-system.c")@
expression dev, name, value;
symbol error_abort;
@@
- qdev_prop_set_drive(dev, name, value, &error_abort);
+ qdev_prop_set_drive(dev, name, value);
@@
expression dev, name, value, errp;
@@
- qdev_prop_set_drive(dev, name, value, errp);
+ qdev_prop_set_drive_err(dev, name, value, errp);
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Message-Id: <20200622094227.1271650-14-armbru@redhat.com>
2020-06-22 12:42:24 +03:00
|
|
|
qdev_prop_set_drive(dev, "drive", blk);
|
2012-10-30 11:45:11 +04:00
|
|
|
}
|
2020-05-11 23:52:46 +03:00
|
|
|
assert(QEMU_IS_ALIGNED(size, sector_len));
|
2019-03-08 12:46:10 +03:00
|
|
|
qdev_prop_set_uint32(dev, "num-blocks", size / sector_len);
|
2012-10-30 11:45:11 +04:00
|
|
|
qdev_prop_set_uint64(dev, "sector-length", sector_len);
|
2013-12-17 23:42:26 +04:00
|
|
|
qdev_prop_set_uint8(dev, "width", bank_width);
|
2015-04-08 14:53:29 +03:00
|
|
|
qdev_prop_set_bit(dev, "big-endian", !!be);
|
2012-10-30 11:45:11 +04:00
|
|
|
qdev_prop_set_uint16(dev, "id0", id0);
|
|
|
|
qdev_prop_set_uint16(dev, "id1", id1);
|
|
|
|
qdev_prop_set_uint16(dev, "id2", id2);
|
|
|
|
qdev_prop_set_uint16(dev, "id3", id3);
|
|
|
|
qdev_prop_set_string(dev, "name", name);
|
sysbus: Convert to sysbus_realize() etc. with Coccinelle
Convert from qdev_realize(), qdev_realize_and_unref() with null @bus
argument to sysbus_realize(), sysbus_realize_and_unref().
Coccinelle script:
@@
expression dev, errp;
@@
- qdev_realize(DEVICE(dev), NULL, errp);
+ sysbus_realize(SYS_BUS_DEVICE(dev), errp);
@@
expression sysbus_dev, dev, errp;
@@
+ sysbus_dev = SYS_BUS_DEVICE(dev);
- qdev_realize_and_unref(dev, NULL, errp);
+ sysbus_realize_and_unref(sysbus_dev, errp);
- sysbus_dev = SYS_BUS_DEVICE(dev);
@@
expression sysbus_dev, dev, errp;
expression expr;
@@
sysbus_dev = SYS_BUS_DEVICE(dev);
... when != dev = expr;
- qdev_realize_and_unref(dev, NULL, errp);
+ sysbus_realize_and_unref(sysbus_dev, errp);
@@
expression dev, errp;
@@
- qdev_realize_and_unref(DEVICE(dev), NULL, errp);
+ sysbus_realize_and_unref(SYS_BUS_DEVICE(dev), errp);
@@
expression dev, errp;
@@
- qdev_realize_and_unref(dev, NULL, errp);
+ sysbus_realize_and_unref(SYS_BUS_DEVICE(dev), errp);
Whitespace changes minimized manually.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Acked-by: Alistair Francis <alistair.francis@wdc.com>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Reviewed-by: Paolo Bonzini <pbonzini@redhat.com>
Message-Id: <20200610053247.1583243-46-armbru@redhat.com>
[Conflicts in hw/misc/empty_slot.c and hw/sparc/leon3.c resolved]
2020-06-10 08:32:34 +03:00
|
|
|
sysbus_realize_and_unref(SYS_BUS_DEVICE(dev), &error_fatal);
|
2012-10-30 11:45:11 +04:00
|
|
|
|
2013-07-01 14:18:26 +04:00
|
|
|
sysbus_mmio_map(SYS_BUS_DEVICE(dev), 0, base);
|
2019-03-08 12:45:59 +03:00
|
|
|
return PFLASH_CFI01(dev);
|
2007-11-17 14:50:55 +03:00
|
|
|
}
|
2011-08-04 16:55:30 +04:00
|
|
|
|
2019-03-08 16:14:41 +03:00
|
|
|
BlockBackend *pflash_cfi01_get_blk(PFlashCFI01 *fl)
|
|
|
|
{
|
|
|
|
return fl->blk;
|
|
|
|
}
|
|
|
|
|
2019-03-08 12:45:56 +03:00
|
|
|
MemoryRegion *pflash_cfi01_get_memory(PFlashCFI01 *fl)
|
2011-08-04 16:55:30 +04:00
|
|
|
{
|
|
|
|
return &fl->mem;
|
|
|
|
}
|
pflash_cfi01: write flash contents to bdrv on incoming migration
A drive that backs a pflash device is special:
- it is very small,
- its entire contents are kept in a RAMBlock at all times, covering the
guest-phys address range that provides the guest's view of the emulated
flash chip.
The pflash device model keeps the drive (the host-side file) and the
guest-visible flash contents in sync. When migrating the guest, the
guest-visible flash contents (the RAMBlock) is migrated by default, but on
the target host, the drive (the host-side file) remains in full sync with
the RAMBlock only if:
- the source and target hosts share the storage underlying the pflash
drive,
- or the migration requests full or incremental block migration too, which
then covers all drives.
Due to the special nature of pflash drives, the following scenario makes
sense as well:
- no full nor incremental block migration, covering all drives, alongside
the base migration (justified eg. by shared storage for "normal" (big)
drives),
- non-shared storage for pflash drives.
In this case, currently only those portions of the flash drive are updated
on the target disk that the guest reprograms while running on the target
host.
In order to restore accord, dump the entire flash contents to the bdrv in
a post_load() callback.
- The read-only check follows the other call-sites of pflash_update();
- both "pfl->ro" and pflash_update() reflect / consider the case when
"pfl->bs" is NULL;
- the total size of the flash device is calculated as in
pflash_cfi01_realize().
When using shared storage, or requesting full or incremental block
migration along with the normal migration, the patch should incur a
harmless rewrite from the target side.
It is assumed that, on the target host, RAM is loaded ahead of the call to
pflash_post_load().
Suggested-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
2014-08-23 14:19:07 +04:00
|
|
|
|
2019-05-07 14:55:02 +03:00
|
|
|
/*
|
|
|
|
* Handle -drive if=pflash for machines that use properties.
|
|
|
|
* If @dinfo is null, do nothing.
|
|
|
|
* Else if @fl's property "drive" is already set, fatal error.
|
|
|
|
* Else set it to the BlockBackend with @dinfo.
|
|
|
|
*/
|
|
|
|
void pflash_cfi01_legacy_drive(PFlashCFI01 *fl, DriveInfo *dinfo)
|
|
|
|
{
|
|
|
|
Location loc;
|
|
|
|
|
|
|
|
if (!dinfo) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
loc_push_none(&loc);
|
|
|
|
qemu_opts_loc_restore(dinfo->opts);
|
|
|
|
if (fl->blk) {
|
|
|
|
error_report("clashes with -machine");
|
|
|
|
exit(1);
|
|
|
|
}
|
qdev: Make qdev_prop_set_drive() match the other helpers
qdev_prop_set_drive() can fail. None of the other qdev_prop_set_FOO()
can; they abort on error.
To clean up this inconsistency, rename qdev_prop_set_drive() to
qdev_prop_set_drive_err(), and create a qdev_prop_set_drive() that
aborts on error.
Coccinelle script to update callers:
@ depends on !(file in "hw/core/qdev-properties-system.c")@
expression dev, name, value;
symbol error_abort;
@@
- qdev_prop_set_drive(dev, name, value, &error_abort);
+ qdev_prop_set_drive(dev, name, value);
@@
expression dev, name, value, errp;
@@
- qdev_prop_set_drive(dev, name, value, errp);
+ qdev_prop_set_drive_err(dev, name, value, errp);
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Reviewed-by: Philippe Mathieu-Daudé <philmd@redhat.com>
Message-Id: <20200622094227.1271650-14-armbru@redhat.com>
2020-06-22 12:42:24 +03:00
|
|
|
qdev_prop_set_drive_err(DEVICE(fl), "drive", blk_by_legacy_dinfo(dinfo),
|
|
|
|
&error_fatal);
|
2019-05-07 14:55:02 +03:00
|
|
|
loc_pop(&loc);
|
|
|
|
}
|
|
|
|
|
2021-01-11 18:20:20 +03:00
|
|
|
static void postload_update_cb(void *opaque, bool running, RunState state)
|
2016-04-15 14:41:30 +03:00
|
|
|
{
|
2019-03-08 12:45:56 +03:00
|
|
|
PFlashCFI01 *pfl = opaque;
|
2016-04-15 14:41:30 +03:00
|
|
|
|
2022-02-09 13:54:51 +03:00
|
|
|
/* This is called after bdrv_activate_all. */
|
2016-04-15 14:41:30 +03:00
|
|
|
qemu_del_vm_change_state_handler(pfl->vmstate);
|
|
|
|
pfl->vmstate = NULL;
|
|
|
|
|
2021-02-16 17:27:18 +03:00
|
|
|
trace_pflash_postload_cb(pfl->name);
|
2016-04-15 14:41:30 +03:00
|
|
|
pflash_update(pfl, 0, pfl->sector_len * pfl->nb_blocs);
|
|
|
|
}
|
|
|
|
|
pflash_cfi01: write flash contents to bdrv on incoming migration
A drive that backs a pflash device is special:
- it is very small,
- its entire contents are kept in a RAMBlock at all times, covering the
guest-phys address range that provides the guest's view of the emulated
flash chip.
The pflash device model keeps the drive (the host-side file) and the
guest-visible flash contents in sync. When migrating the guest, the
guest-visible flash contents (the RAMBlock) is migrated by default, but on
the target host, the drive (the host-side file) remains in full sync with
the RAMBlock only if:
- the source and target hosts share the storage underlying the pflash
drive,
- or the migration requests full or incremental block migration too, which
then covers all drives.
Due to the special nature of pflash drives, the following scenario makes
sense as well:
- no full nor incremental block migration, covering all drives, alongside
the base migration (justified eg. by shared storage for "normal" (big)
drives),
- non-shared storage for pflash drives.
In this case, currently only those portions of the flash drive are updated
on the target disk that the guest reprograms while running on the target
host.
In order to restore accord, dump the entire flash contents to the bdrv in
a post_load() callback.
- The read-only check follows the other call-sites of pflash_update();
- both "pfl->ro" and pflash_update() reflect / consider the case when
"pfl->bs" is NULL;
- the total size of the flash device is calculated as in
pflash_cfi01_realize().
When using shared storage, or requesting full or incremental block
migration along with the normal migration, the patch should incur a
harmless rewrite from the target side.
It is assumed that, on the target host, RAM is loaded ahead of the call to
pflash_post_load().
Suggested-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
2014-08-23 14:19:07 +04:00
|
|
|
static int pflash_post_load(void *opaque, int version_id)
|
|
|
|
{
|
2019-03-08 12:45:56 +03:00
|
|
|
PFlashCFI01 *pfl = opaque;
|
pflash_cfi01: write flash contents to bdrv on incoming migration
A drive that backs a pflash device is special:
- it is very small,
- its entire contents are kept in a RAMBlock at all times, covering the
guest-phys address range that provides the guest's view of the emulated
flash chip.
The pflash device model keeps the drive (the host-side file) and the
guest-visible flash contents in sync. When migrating the guest, the
guest-visible flash contents (the RAMBlock) is migrated by default, but on
the target host, the drive (the host-side file) remains in full sync with
the RAMBlock only if:
- the source and target hosts share the storage underlying the pflash
drive,
- or the migration requests full or incremental block migration too, which
then covers all drives.
Due to the special nature of pflash drives, the following scenario makes
sense as well:
- no full nor incremental block migration, covering all drives, alongside
the base migration (justified eg. by shared storage for "normal" (big)
drives),
- non-shared storage for pflash drives.
In this case, currently only those portions of the flash drive are updated
on the target disk that the guest reprograms while running on the target
host.
In order to restore accord, dump the entire flash contents to the bdrv in
a post_load() callback.
- The read-only check follows the other call-sites of pflash_update();
- both "pfl->ro" and pflash_update() reflect / consider the case when
"pfl->bs" is NULL;
- the total size of the flash device is calculated as in
pflash_cfi01_realize().
When using shared storage, or requesting full or incremental block
migration along with the normal migration, the patch should incur a
harmless rewrite from the target side.
It is assumed that, on the target host, RAM is loaded ahead of the call to
pflash_post_load().
Suggested-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
2014-08-23 14:19:07 +04:00
|
|
|
|
|
|
|
if (!pfl->ro) {
|
2016-04-15 14:41:30 +03:00
|
|
|
pfl->vmstate = qemu_add_vm_change_state_handler(postload_update_cb,
|
|
|
|
pfl);
|
pflash_cfi01: write flash contents to bdrv on incoming migration
A drive that backs a pflash device is special:
- it is very small,
- its entire contents are kept in a RAMBlock at all times, covering the
guest-phys address range that provides the guest's view of the emulated
flash chip.
The pflash device model keeps the drive (the host-side file) and the
guest-visible flash contents in sync. When migrating the guest, the
guest-visible flash contents (the RAMBlock) is migrated by default, but on
the target host, the drive (the host-side file) remains in full sync with
the RAMBlock only if:
- the source and target hosts share the storage underlying the pflash
drive,
- or the migration requests full or incremental block migration too, which
then covers all drives.
Due to the special nature of pflash drives, the following scenario makes
sense as well:
- no full nor incremental block migration, covering all drives, alongside
the base migration (justified eg. by shared storage for "normal" (big)
drives),
- non-shared storage for pflash drives.
In this case, currently only those portions of the flash drive are updated
on the target disk that the guest reprograms while running on the target
host.
In order to restore accord, dump the entire flash contents to the bdrv in
a post_load() callback.
- The read-only check follows the other call-sites of pflash_update();
- both "pfl->ro" and pflash_update() reflect / consider the case when
"pfl->bs" is NULL;
- the total size of the flash device is calculated as in
pflash_cfi01_realize().
When using shared storage, or requesting full or incremental block
migration along with the normal migration, the patch should incur a
harmless rewrite from the target side.
It is assumed that, on the target host, RAM is loaded ahead of the call to
pflash_post_load().
Suggested-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
2014-08-23 14:19:07 +04:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|