target-arm queue:
* v7M: various code cleanups * v7M: set correct BFSR bits on bus fault * v7M: clear exclusive monitor on reset and exception entry/exit * v7M: don't apply priority mask to negative priorities * zcu102: support 'secure' and 'virtualization' machine properties * aarch64: fix ERET single stepping * gpex: implement PCI INTx routing * mps2-an511: fix UART overflow interrupt line wiring -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAABCAAGBQJZusF4AAoJEDwlJe0UNgze0TIP/RQQJiw1n9TavSjEm5QoNvMM h7IgoCkS1OYTaNqb1iTb4kYRKqWL5eKDXMIQL5pvEVVPrd7ETOV0EZaJUNs7UltR Huw3wEIGta+SCnBDYW7bKBqK469KVgizKlLRbrO4JjaFumhAZ99OrC8coGkLA3nH YGZC/mlbZTu3rrrNIGmyiAWz8xMjSsMCiat00SRnhqLXboH5qXmpX8RdeTLoeouo UwfN6jlbPq7pehiN2R+suRG6MNGwknglu0KoHK1qG3GW/6dIS0RXIa59zvXqoZBe 8IuXKyCky8Js9YrgVLZ02MZ4aRN2woS0l5Uykr710BZHXioQMjvEYHM2BPTkjxcA jrGKkvFbSYPEhAxcxm/hN65Quh7vTWpJP6s0Xqcq5hh39fO2ZxNzhJ14UvcquBua VBYOk83dsK1WMflhxoCAeKjso4FARsjPTaXNR7xZCM4SXDneaIy0kemgvtKd7ehV gaDd0tP6P2ZEIJD3THWDF5lGbSTi/0WcedNQ0NJz+CkuOsS6lcAZvezbY2g7nIoP Bv0rcJd9KoeAiGL2LhcCz0OfSgd0iEBSohbsF2JLseiodI58wdLNxQeOCRplZeUy 5hOm+oNVN8f6XRUGTexE4vmptrSIMRsOA4UlNfujx+uQlgpXsUEvjuGOfPCCY35k 0998S19KxutBDl5PMkF1 =iCz5 -----END PGP SIGNATURE----- Merge remote-tracking branch 'remotes/pmaydell/tags/pull-target-arm-20170914' into staging target-arm queue: * v7M: various code cleanups * v7M: set correct BFSR bits on bus fault * v7M: clear exclusive monitor on reset and exception entry/exit * v7M: don't apply priority mask to negative priorities * zcu102: support 'secure' and 'virtualization' machine properties * aarch64: fix ERET single stepping * gpex: implement PCI INTx routing * mps2-an511: fix UART overflow interrupt line wiring # gpg: Signature made Thu 14 Sep 2017 18:50:48 BST # gpg: using RSA key 0x3C2525ED14360CDE # gpg: Good signature from "Peter Maydell <peter.maydell@linaro.org>" # gpg: aka "Peter Maydell <pmaydell@gmail.com>" # gpg: aka "Peter Maydell <pmaydell@chiark.greenend.org.uk>" # Primary key fingerprint: E1A5 C593 CD41 9DE2 8E83 15CF 3C25 25ED 1436 0CDE * remotes/pmaydell/tags/pull-target-arm-20170914: mps2-an511: Fix wiring of UART overflow interrupt lines hw/pci-host/gpex: Implement PCI INTx routing hw/arm/virt: Set INTx/gsi mapping hw/pci-host/gpex: Set INTx index/gsi mapping target/arm: Avoid an extra temporary for store_exclusive AArch64: Fix single stepping of ERET instruction xlnx-zcu102: Mark the EP108 machine as deprecated xlnx-zcu102: Add a machine level virtualization property xlnx-zcu102: Add a machine level secure property xlnx-zcu102: Manually create the machines xlnx-ep108: Rename to ZCU102 target/arm: Rename 'type' to 'excret' in do_v7m_exception_exit() target/arm: Add and use defines for EXCRET constants target/arm: Remove unnecessary '| 0xf0000000' from do_v7m_exception_exit() nvic: Don't apply group priority mask to negative priorities target/arm: Get PRECISERR and IBUSERR the right way round target/arm: Clear exclusive monitor on v7M reset, exception entry/exit target/arm: Use M_REG_NUM_BANKS rather than hardcoding 2 Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
This commit is contained in:
commit
d28e29a925
@ -13,7 +13,7 @@ obj-y += omap1.o omap2.o strongarm.o
|
||||
obj-$(CONFIG_ALLWINNER_A10) += allwinner-a10.o cubieboard.o
|
||||
obj-$(CONFIG_RASPI) += bcm2835_peripherals.o bcm2836.o raspi.o
|
||||
obj-$(CONFIG_STM32F205_SOC) += stm32f205_soc.o
|
||||
obj-$(CONFIG_XLNX_ZYNQMP) += xlnx-zynqmp.o xlnx-ep108.o
|
||||
obj-$(CONFIG_XLNX_ZYNQMP) += xlnx-zynqmp.o xlnx-zcu102.o
|
||||
obj-$(CONFIG_FSL_IMX25) += fsl-imx25.o imx25_pdk.o
|
||||
obj-$(CONFIG_FSL_IMX31) += fsl-imx31.o kzm.o
|
||||
obj-$(CONFIG_FSL_IMX6) += fsl-imx6.o sabrelite.o
|
||||
|
@ -287,8 +287,8 @@ static void mps2_common_init(MachineState *machine)
|
||||
cmsdk_apb_uart_create(uartbase[i],
|
||||
qdev_get_gpio_in(txrx_orgate_dev, 0),
|
||||
qdev_get_gpio_in(txrx_orgate_dev, 1),
|
||||
qdev_get_gpio_in(orgate_dev, 0),
|
||||
qdev_get_gpio_in(orgate_dev, 1),
|
||||
qdev_get_gpio_in(orgate_dev, i * 2),
|
||||
qdev_get_gpio_in(orgate_dev, i * 2 + 1),
|
||||
NULL,
|
||||
uartchr, SYSCLK_FRQ);
|
||||
}
|
||||
|
@ -1057,6 +1057,7 @@ static void create_pcie(const VirtMachineState *vms, qemu_irq *pic)
|
||||
|
||||
for (i = 0; i < GPEX_NUM_IRQS; i++) {
|
||||
sysbus_connect_irq(SYS_BUS_DEVICE(dev), i, pic[irq + i]);
|
||||
gpex_set_irq_num(GPEX_HOST(dev), i, irq + i);
|
||||
}
|
||||
|
||||
pci = PCI_HOST_BRIDGE(dev);
|
||||
|
@ -1,139 +0,0 @@
|
||||
/*
|
||||
* Xilinx ZynqMP EP108 board
|
||||
*
|
||||
* Copyright (C) 2015 Xilinx Inc
|
||||
* Written by Peter Crosthwaite <peter.crosthwaite@xilinx.com>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License as published by the
|
||||
* Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* for more details.
|
||||
*/
|
||||
|
||||
#include "qemu/osdep.h"
|
||||
#include "qapi/error.h"
|
||||
#include "qemu-common.h"
|
||||
#include "cpu.h"
|
||||
#include "hw/arm/xlnx-zynqmp.h"
|
||||
#include "hw/boards.h"
|
||||
#include "qemu/error-report.h"
|
||||
#include "exec/address-spaces.h"
|
||||
#include "qemu/log.h"
|
||||
|
||||
typedef struct XlnxEP108 {
|
||||
XlnxZynqMPState soc;
|
||||
MemoryRegion ddr_ram;
|
||||
} XlnxEP108;
|
||||
|
||||
static struct arm_boot_info xlnx_ep108_binfo;
|
||||
|
||||
static void xlnx_ep108_init(MachineState *machine)
|
||||
{
|
||||
XlnxEP108 *s = g_new0(XlnxEP108, 1);
|
||||
int i;
|
||||
uint64_t ram_size = machine->ram_size;
|
||||
|
||||
/* Create the memory region to pass to the SoC */
|
||||
if (ram_size > XLNX_ZYNQMP_MAX_RAM_SIZE) {
|
||||
error_report("ERROR: RAM size 0x%" PRIx64 " above max supported of "
|
||||
"0x%llx", ram_size,
|
||||
XLNX_ZYNQMP_MAX_RAM_SIZE);
|
||||
exit(1);
|
||||
}
|
||||
|
||||
if (ram_size < 0x08000000) {
|
||||
qemu_log("WARNING: RAM size 0x%" PRIx64 " is small for EP108",
|
||||
ram_size);
|
||||
}
|
||||
|
||||
memory_region_allocate_system_memory(&s->ddr_ram, NULL, "ddr-ram",
|
||||
ram_size);
|
||||
|
||||
object_initialize(&s->soc, sizeof(s->soc), TYPE_XLNX_ZYNQMP);
|
||||
object_property_add_child(OBJECT(machine), "soc", OBJECT(&s->soc),
|
||||
&error_abort);
|
||||
|
||||
object_property_set_link(OBJECT(&s->soc), OBJECT(&s->ddr_ram),
|
||||
"ddr-ram", &error_abort);
|
||||
|
||||
object_property_set_bool(OBJECT(&s->soc), true, "realized", &error_fatal);
|
||||
|
||||
/* Create and plug in the SD cards */
|
||||
for (i = 0; i < XLNX_ZYNQMP_NUM_SDHCI; i++) {
|
||||
BusState *bus;
|
||||
DriveInfo *di = drive_get_next(IF_SD);
|
||||
BlockBackend *blk = di ? blk_by_legacy_dinfo(di) : NULL;
|
||||
DeviceState *carddev;
|
||||
char *bus_name;
|
||||
|
||||
bus_name = g_strdup_printf("sd-bus%d", i);
|
||||
bus = qdev_get_child_bus(DEVICE(&s->soc), bus_name);
|
||||
g_free(bus_name);
|
||||
if (!bus) {
|
||||
error_report("No SD bus found for SD card %d", i);
|
||||
exit(1);
|
||||
}
|
||||
carddev = qdev_create(bus, TYPE_SD_CARD);
|
||||
qdev_prop_set_drive(carddev, "drive", blk, &error_fatal);
|
||||
object_property_set_bool(OBJECT(carddev), true, "realized",
|
||||
&error_fatal);
|
||||
}
|
||||
|
||||
for (i = 0; i < XLNX_ZYNQMP_NUM_SPIS; i++) {
|
||||
SSIBus *spi_bus;
|
||||
DeviceState *flash_dev;
|
||||
qemu_irq cs_line;
|
||||
DriveInfo *dinfo = drive_get_next(IF_MTD);
|
||||
gchar *bus_name = g_strdup_printf("spi%d", i);
|
||||
|
||||
spi_bus = (SSIBus *)qdev_get_child_bus(DEVICE(&s->soc), bus_name);
|
||||
g_free(bus_name);
|
||||
|
||||
flash_dev = ssi_create_slave_no_init(spi_bus, "sst25wf080");
|
||||
if (dinfo) {
|
||||
qdev_prop_set_drive(flash_dev, "drive", blk_by_legacy_dinfo(dinfo),
|
||||
&error_fatal);
|
||||
}
|
||||
qdev_init_nofail(flash_dev);
|
||||
|
||||
cs_line = qdev_get_gpio_in_named(flash_dev, SSI_GPIO_CS, 0);
|
||||
|
||||
sysbus_connect_irq(SYS_BUS_DEVICE(&s->soc.spi[i]), 1, cs_line);
|
||||
}
|
||||
|
||||
/* TODO create and connect IDE devices for ide_drive_get() */
|
||||
|
||||
xlnx_ep108_binfo.ram_size = ram_size;
|
||||
xlnx_ep108_binfo.kernel_filename = machine->kernel_filename;
|
||||
xlnx_ep108_binfo.kernel_cmdline = machine->kernel_cmdline;
|
||||
xlnx_ep108_binfo.initrd_filename = machine->initrd_filename;
|
||||
xlnx_ep108_binfo.loader_start = 0;
|
||||
arm_load_kernel(s->soc.boot_cpu_ptr, &xlnx_ep108_binfo);
|
||||
}
|
||||
|
||||
static void xlnx_ep108_machine_init(MachineClass *mc)
|
||||
{
|
||||
mc->desc = "Xilinx ZynqMP EP108 board";
|
||||
mc->init = xlnx_ep108_init;
|
||||
mc->block_default_type = IF_IDE;
|
||||
mc->units_per_default_bus = 1;
|
||||
mc->ignore_memory_transaction_failures = true;
|
||||
}
|
||||
|
||||
DEFINE_MACHINE("xlnx-ep108", xlnx_ep108_machine_init)
|
||||
|
||||
static void xlnx_zcu102_machine_init(MachineClass *mc)
|
||||
{
|
||||
mc->desc = "Xilinx ZynqMP ZCU102 board";
|
||||
mc->init = xlnx_ep108_init;
|
||||
mc->block_default_type = IF_IDE;
|
||||
mc->units_per_default_bus = 1;
|
||||
mc->ignore_memory_transaction_failures = true;
|
||||
}
|
||||
|
||||
DEFINE_MACHINE("xlnx-zcu102", xlnx_zcu102_machine_init)
|
259
hw/arm/xlnx-zcu102.c
Normal file
259
hw/arm/xlnx-zcu102.c
Normal file
@ -0,0 +1,259 @@
|
||||
/*
|
||||
* Xilinx ZynqMP ZCU102 board
|
||||
*
|
||||
* Copyright (C) 2015 Xilinx Inc
|
||||
* Written by Peter Crosthwaite <peter.crosthwaite@xilinx.com>
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License as published by the
|
||||
* Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* for more details.
|
||||
*/
|
||||
|
||||
#include "qemu/osdep.h"
|
||||
#include "qapi/error.h"
|
||||
#include "qemu-common.h"
|
||||
#include "cpu.h"
|
||||
#include "hw/arm/xlnx-zynqmp.h"
|
||||
#include "hw/boards.h"
|
||||
#include "qemu/error-report.h"
|
||||
#include "exec/address-spaces.h"
|
||||
#include "qemu/log.h"
|
||||
|
||||
typedef struct XlnxZCU102 {
|
||||
MachineState parent_obj;
|
||||
|
||||
XlnxZynqMPState soc;
|
||||
MemoryRegion ddr_ram;
|
||||
|
||||
bool secure;
|
||||
bool virt;
|
||||
} XlnxZCU102;
|
||||
|
||||
#define TYPE_ZCU102_MACHINE MACHINE_TYPE_NAME("xlnx-zcu102")
|
||||
#define ZCU102_MACHINE(obj) \
|
||||
OBJECT_CHECK(XlnxZCU102, (obj), TYPE_ZCU102_MACHINE)
|
||||
|
||||
#define TYPE_EP108_MACHINE MACHINE_TYPE_NAME("xlnx-ep108")
|
||||
#define EP108_MACHINE(obj) \
|
||||
OBJECT_CHECK(XlnxZCU102, (obj), TYPE_EP108_MACHINE)
|
||||
|
||||
static struct arm_boot_info xlnx_zcu102_binfo;
|
||||
|
||||
static bool zcu102_get_secure(Object *obj, Error **errp)
|
||||
{
|
||||
XlnxZCU102 *s = ZCU102_MACHINE(obj);
|
||||
|
||||
return s->secure;
|
||||
}
|
||||
|
||||
static void zcu102_set_secure(Object *obj, bool value, Error **errp)
|
||||
{
|
||||
XlnxZCU102 *s = ZCU102_MACHINE(obj);
|
||||
|
||||
s->secure = value;
|
||||
}
|
||||
|
||||
static bool zcu102_get_virt(Object *obj, Error **errp)
|
||||
{
|
||||
XlnxZCU102 *s = ZCU102_MACHINE(obj);
|
||||
|
||||
return s->virt;
|
||||
}
|
||||
|
||||
static void zcu102_set_virt(Object *obj, bool value, Error **errp)
|
||||
{
|
||||
XlnxZCU102 *s = ZCU102_MACHINE(obj);
|
||||
|
||||
s->virt = value;
|
||||
}
|
||||
|
||||
static void xlnx_zynqmp_init(XlnxZCU102 *s, MachineState *machine)
|
||||
{
|
||||
int i;
|
||||
uint64_t ram_size = machine->ram_size;
|
||||
|
||||
/* Create the memory region to pass to the SoC */
|
||||
if (ram_size > XLNX_ZYNQMP_MAX_RAM_SIZE) {
|
||||
error_report("ERROR: RAM size 0x%" PRIx64 " above max supported of "
|
||||
"0x%llx", ram_size,
|
||||
XLNX_ZYNQMP_MAX_RAM_SIZE);
|
||||
exit(1);
|
||||
}
|
||||
|
||||
if (ram_size < 0x08000000) {
|
||||
qemu_log("WARNING: RAM size 0x%" PRIx64 " is small for ZCU102",
|
||||
ram_size);
|
||||
}
|
||||
|
||||
memory_region_allocate_system_memory(&s->ddr_ram, NULL, "ddr-ram",
|
||||
ram_size);
|
||||
|
||||
object_initialize(&s->soc, sizeof(s->soc), TYPE_XLNX_ZYNQMP);
|
||||
object_property_add_child(OBJECT(machine), "soc", OBJECT(&s->soc),
|
||||
&error_abort);
|
||||
|
||||
object_property_set_link(OBJECT(&s->soc), OBJECT(&s->ddr_ram),
|
||||
"ddr-ram", &error_abort);
|
||||
object_property_set_bool(OBJECT(&s->soc), s->secure, "secure",
|
||||
&error_fatal);
|
||||
object_property_set_bool(OBJECT(&s->soc), s->virt, "virtualization",
|
||||
&error_fatal);
|
||||
|
||||
object_property_set_bool(OBJECT(&s->soc), true, "realized", &error_fatal);
|
||||
|
||||
/* Create and plug in the SD cards */
|
||||
for (i = 0; i < XLNX_ZYNQMP_NUM_SDHCI; i++) {
|
||||
BusState *bus;
|
||||
DriveInfo *di = drive_get_next(IF_SD);
|
||||
BlockBackend *blk = di ? blk_by_legacy_dinfo(di) : NULL;
|
||||
DeviceState *carddev;
|
||||
char *bus_name;
|
||||
|
||||
bus_name = g_strdup_printf("sd-bus%d", i);
|
||||
bus = qdev_get_child_bus(DEVICE(&s->soc), bus_name);
|
||||
g_free(bus_name);
|
||||
if (!bus) {
|
||||
error_report("No SD bus found for SD card %d", i);
|
||||
exit(1);
|
||||
}
|
||||
carddev = qdev_create(bus, TYPE_SD_CARD);
|
||||
qdev_prop_set_drive(carddev, "drive", blk, &error_fatal);
|
||||
object_property_set_bool(OBJECT(carddev), true, "realized",
|
||||
&error_fatal);
|
||||
}
|
||||
|
||||
for (i = 0; i < XLNX_ZYNQMP_NUM_SPIS; i++) {
|
||||
SSIBus *spi_bus;
|
||||
DeviceState *flash_dev;
|
||||
qemu_irq cs_line;
|
||||
DriveInfo *dinfo = drive_get_next(IF_MTD);
|
||||
gchar *bus_name = g_strdup_printf("spi%d", i);
|
||||
|
||||
spi_bus = (SSIBus *)qdev_get_child_bus(DEVICE(&s->soc), bus_name);
|
||||
g_free(bus_name);
|
||||
|
||||
flash_dev = ssi_create_slave_no_init(spi_bus, "sst25wf080");
|
||||
if (dinfo) {
|
||||
qdev_prop_set_drive(flash_dev, "drive", blk_by_legacy_dinfo(dinfo),
|
||||
&error_fatal);
|
||||
}
|
||||
qdev_init_nofail(flash_dev);
|
||||
|
||||
cs_line = qdev_get_gpio_in_named(flash_dev, SSI_GPIO_CS, 0);
|
||||
|
||||
sysbus_connect_irq(SYS_BUS_DEVICE(&s->soc.spi[i]), 1, cs_line);
|
||||
}
|
||||
|
||||
/* TODO create and connect IDE devices for ide_drive_get() */
|
||||
|
||||
xlnx_zcu102_binfo.ram_size = ram_size;
|
||||
xlnx_zcu102_binfo.kernel_filename = machine->kernel_filename;
|
||||
xlnx_zcu102_binfo.kernel_cmdline = machine->kernel_cmdline;
|
||||
xlnx_zcu102_binfo.initrd_filename = machine->initrd_filename;
|
||||
xlnx_zcu102_binfo.loader_start = 0;
|
||||
arm_load_kernel(s->soc.boot_cpu_ptr, &xlnx_zcu102_binfo);
|
||||
}
|
||||
|
||||
static void xlnx_ep108_init(MachineState *machine)
|
||||
{
|
||||
XlnxZCU102 *s = EP108_MACHINE(machine);
|
||||
|
||||
xlnx_zynqmp_init(s, machine);
|
||||
}
|
||||
|
||||
static void xlnx_ep108_machine_instance_init(Object *obj)
|
||||
{
|
||||
XlnxZCU102 *s = EP108_MACHINE(obj);
|
||||
|
||||
/* EP108, we don't support setting secure or virt */
|
||||
s->secure = false;
|
||||
s->virt = false;
|
||||
}
|
||||
|
||||
static void xlnx_ep108_machine_class_init(ObjectClass *oc, void *data)
|
||||
{
|
||||
MachineClass *mc = MACHINE_CLASS(oc);
|
||||
|
||||
mc->desc = "Xilinx ZynqMP EP108 board (Deprecated, please use xlnx-zcu102)";
|
||||
mc->init = xlnx_ep108_init;
|
||||
mc->block_default_type = IF_IDE;
|
||||
mc->units_per_default_bus = 1;
|
||||
mc->ignore_memory_transaction_failures = true;
|
||||
}
|
||||
|
||||
static const TypeInfo xlnx_ep108_machine_init_typeinfo = {
|
||||
.name = MACHINE_TYPE_NAME("xlnx-ep108"),
|
||||
.parent = TYPE_MACHINE,
|
||||
.class_init = xlnx_ep108_machine_class_init,
|
||||
.instance_init = xlnx_ep108_machine_instance_init,
|
||||
.instance_size = sizeof(XlnxZCU102),
|
||||
};
|
||||
|
||||
static void xlnx_ep108_machine_init_register_types(void)
|
||||
{
|
||||
type_register_static(&xlnx_ep108_machine_init_typeinfo);
|
||||
}
|
||||
|
||||
static void xlnx_zcu102_init(MachineState *machine)
|
||||
{
|
||||
XlnxZCU102 *s = ZCU102_MACHINE(machine);
|
||||
|
||||
xlnx_zynqmp_init(s, machine);
|
||||
}
|
||||
|
||||
static void xlnx_zcu102_machine_instance_init(Object *obj)
|
||||
{
|
||||
XlnxZCU102 *s = ZCU102_MACHINE(obj);
|
||||
|
||||
/* Default to secure mode being disabled */
|
||||
s->secure = false;
|
||||
object_property_add_bool(obj, "secure", zcu102_get_secure,
|
||||
zcu102_set_secure, NULL);
|
||||
object_property_set_description(obj, "secure",
|
||||
"Set on/off to enable/disable the ARM "
|
||||
"Security Extensions (TrustZone)",
|
||||
NULL);
|
||||
|
||||
/* Default to virt (EL2) being disabled */
|
||||
s->virt = false;
|
||||
object_property_add_bool(obj, "virtualization", zcu102_get_virt,
|
||||
zcu102_set_virt, NULL);
|
||||
object_property_set_description(obj, "virtualization",
|
||||
"Set on/off to enable/disable emulating a "
|
||||
"guest CPU which implements the ARM "
|
||||
"Virtualization Extensions",
|
||||
NULL);
|
||||
}
|
||||
|
||||
static void xlnx_zcu102_machine_class_init(ObjectClass *oc, void *data)
|
||||
{
|
||||
MachineClass *mc = MACHINE_CLASS(oc);
|
||||
|
||||
mc->desc = "Xilinx ZynqMP ZCU102 board";
|
||||
mc->init = xlnx_zcu102_init;
|
||||
mc->block_default_type = IF_IDE;
|
||||
mc->units_per_default_bus = 1;
|
||||
mc->ignore_memory_transaction_failures = true;
|
||||
}
|
||||
|
||||
static const TypeInfo xlnx_zcu102_machine_init_typeinfo = {
|
||||
.name = MACHINE_TYPE_NAME("xlnx-zcu102"),
|
||||
.parent = TYPE_MACHINE,
|
||||
.class_init = xlnx_zcu102_machine_class_init,
|
||||
.instance_init = xlnx_zcu102_machine_instance_init,
|
||||
.instance_size = sizeof(XlnxZCU102),
|
||||
};
|
||||
|
||||
static void xlnx_zcu102_machine_init_register_types(void)
|
||||
{
|
||||
type_register_static(&xlnx_zcu102_machine_init_typeinfo);
|
||||
}
|
||||
|
||||
type_init(xlnx_zcu102_machine_init_register_types)
|
||||
type_init(xlnx_ep108_machine_init_register_types)
|
@ -255,7 +255,7 @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp)
|
||||
object_property_set_bool(OBJECT(&s->apu_cpu[i]),
|
||||
s->secure, "has_el3", NULL);
|
||||
object_property_set_bool(OBJECT(&s->apu_cpu[i]),
|
||||
false, "has_el2", NULL);
|
||||
s->virt, "has_el2", NULL);
|
||||
object_property_set_int(OBJECT(&s->apu_cpu[i]), GIC_BASE_ADDR,
|
||||
"reset-cbar", &error_abort);
|
||||
object_property_set_bool(OBJECT(&s->apu_cpu[i]), true, "realized",
|
||||
@ -427,6 +427,7 @@ static void xlnx_zynqmp_realize(DeviceState *dev, Error **errp)
|
||||
static Property xlnx_zynqmp_props[] = {
|
||||
DEFINE_PROP_STRING("boot-cpu", XlnxZynqMPState, boot_cpu),
|
||||
DEFINE_PROP_BOOL("secure", XlnxZynqMPState, secure, false),
|
||||
DEFINE_PROP_BOOL("virtualization", XlnxZynqMPState, virt, false),
|
||||
DEFINE_PROP_BOOL("has_rpu", XlnxZynqMPState, has_rpu, false),
|
||||
DEFINE_PROP_LINK("ddr-ram", XlnxZynqMPState, ddr_ram, TYPE_MEMORY_REGION,
|
||||
MemoryRegion *),
|
||||
|
@ -152,8 +152,12 @@ static void nvic_recompute_state(NVICState *s)
|
||||
}
|
||||
}
|
||||
|
||||
if (active_prio > 0) {
|
||||
active_prio &= nvic_gprio_mask(s);
|
||||
}
|
||||
|
||||
s->vectpending = pend_irq;
|
||||
s->exception_prio = active_prio & nvic_gprio_mask(s);
|
||||
s->exception_prio = active_prio;
|
||||
|
||||
trace_nvic_recompute_state(s->vectpending, s->exception_prio);
|
||||
}
|
||||
@ -329,7 +333,10 @@ void armv7m_nvic_acknowledge_irq(void *opaque)
|
||||
assert(vec->enabled);
|
||||
assert(vec->pending);
|
||||
|
||||
pendgroupprio = vec->prio & nvic_gprio_mask(s);
|
||||
pendgroupprio = vec->prio;
|
||||
if (pendgroupprio > 0) {
|
||||
pendgroupprio &= nvic_gprio_mask(s);
|
||||
}
|
||||
assert(pendgroupprio < running);
|
||||
|
||||
trace_nvic_acknowledge_irq(pending, vec->prio);
|
||||
|
@ -43,6 +43,27 @@ static void gpex_set_irq(void *opaque, int irq_num, int level)
|
||||
qemu_set_irq(s->irq[irq_num], level);
|
||||
}
|
||||
|
||||
int gpex_set_irq_num(GPEXHost *s, int index, int gsi)
|
||||
{
|
||||
if (index >= GPEX_NUM_IRQS) {
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
s->irq_num[index] = gsi;
|
||||
return 0;
|
||||
}
|
||||
|
||||
static PCIINTxRoute gpex_route_intx_pin_to_irq(void *opaque, int pin)
|
||||
{
|
||||
PCIINTxRoute route;
|
||||
GPEXHost *s = opaque;
|
||||
|
||||
route.mode = PCI_INTX_ENABLED;
|
||||
route.irq = s->irq_num[pin];
|
||||
|
||||
return route;
|
||||
}
|
||||
|
||||
static void gpex_host_realize(DeviceState *dev, Error **errp)
|
||||
{
|
||||
PCIHostState *pci = PCI_HOST_BRIDGE(dev);
|
||||
@ -67,6 +88,7 @@ static void gpex_host_realize(DeviceState *dev, Error **errp)
|
||||
&s->io_ioport, 0, 4, TYPE_PCIE_BUS);
|
||||
|
||||
qdev_set_parent_bus(DEVICE(&s->gpex_root), BUS(pci->bus));
|
||||
pci_bus_set_route_irq_fn(pci->bus, gpex_route_intx_pin_to_irq);
|
||||
qdev_init_nofail(DEVICE(&s->gpex_root));
|
||||
}
|
||||
|
||||
|
@ -91,6 +91,8 @@ typedef struct XlnxZynqMPState {
|
||||
|
||||
/* Has the ARM Security extensions? */
|
||||
bool secure;
|
||||
/* Has the ARM Virtualization extensions? */
|
||||
bool virt;
|
||||
/* Has the RPU subsystem? */
|
||||
bool has_rpu;
|
||||
} XlnxZynqMPState;
|
||||
|
@ -51,6 +51,9 @@ typedef struct GPEXHost {
|
||||
MemoryRegion io_ioport;
|
||||
MemoryRegion io_mmio;
|
||||
qemu_irq irq[GPEX_NUM_IRQS];
|
||||
int irq_num[GPEX_NUM_IRQS];
|
||||
} GPEXHost;
|
||||
|
||||
int gpex_set_irq_num(GPEXHost *s, int index, int gsi);
|
||||
|
||||
#endif /* HW_GPEX_H */
|
||||
|
@ -235,6 +235,12 @@ static void arm_cpu_reset(CPUState *s)
|
||||
env->regs[15] = 0xFFFF0000;
|
||||
}
|
||||
|
||||
/* M profile requires that reset clears the exclusive monitor;
|
||||
* A profile does not, but clearing it makes more sense than having it
|
||||
* set with an exclusive access on address zero.
|
||||
*/
|
||||
arm_clear_exclusive(env);
|
||||
|
||||
env->vfp.xregs[ARM_VFP_FPEXC] = 0;
|
||||
#endif
|
||||
|
||||
|
@ -81,8 +81,11 @@
|
||||
* accessed via env->registerfield[env->v7m.secure] (whether the security
|
||||
* extension is implemented or not).
|
||||
*/
|
||||
#define M_REG_NS 0
|
||||
#define M_REG_S 1
|
||||
enum {
|
||||
M_REG_NS = 0,
|
||||
M_REG_S = 1,
|
||||
M_REG_NUM_BANKS = 2,
|
||||
};
|
||||
|
||||
/* ARM-specific interrupt pending bits. */
|
||||
#define CPU_INTERRUPT_FIQ CPU_INTERRUPT_TGT_EXT_1
|
||||
@ -433,19 +436,19 @@ typedef struct CPUARMState {
|
||||
uint32_t other_sp;
|
||||
uint32_t other_ss_msp;
|
||||
uint32_t other_ss_psp;
|
||||
uint32_t vecbase[2];
|
||||
uint32_t basepri[2];
|
||||
uint32_t control[2];
|
||||
uint32_t ccr[2]; /* Configuration and Control */
|
||||
uint32_t cfsr[2]; /* Configurable Fault Status */
|
||||
uint32_t vecbase[M_REG_NUM_BANKS];
|
||||
uint32_t basepri[M_REG_NUM_BANKS];
|
||||
uint32_t control[M_REG_NUM_BANKS];
|
||||
uint32_t ccr[M_REG_NUM_BANKS]; /* Configuration and Control */
|
||||
uint32_t cfsr[M_REG_NUM_BANKS]; /* Configurable Fault Status */
|
||||
uint32_t hfsr; /* HardFault Status */
|
||||
uint32_t dfsr; /* Debug Fault Status Register */
|
||||
uint32_t mmfar[2]; /* MemManage Fault Address */
|
||||
uint32_t mmfar[M_REG_NUM_BANKS]; /* MemManage Fault Address */
|
||||
uint32_t bfar; /* BusFault Address */
|
||||
unsigned mpu_ctrl[2]; /* MPU_CTRL */
|
||||
unsigned mpu_ctrl[M_REG_NUM_BANKS]; /* MPU_CTRL */
|
||||
int exception;
|
||||
uint32_t primask[2];
|
||||
uint32_t faultmask[2];
|
||||
uint32_t primask[M_REG_NUM_BANKS];
|
||||
uint32_t faultmask[M_REG_NUM_BANKS];
|
||||
uint32_t secure; /* Is CPU in Secure state? (not guest visible) */
|
||||
} v7m;
|
||||
|
||||
@ -546,7 +549,7 @@ typedef struct CPUARMState {
|
||||
uint32_t *drbar;
|
||||
uint32_t *drsr;
|
||||
uint32_t *dracr;
|
||||
uint32_t rnr[2];
|
||||
uint32_t rnr[M_REG_NUM_BANKS];
|
||||
} pmsav7;
|
||||
|
||||
/* PMSAv8 MPU */
|
||||
@ -556,10 +559,10 @@ typedef struct CPUARMState {
|
||||
* pmsav7.rnr (region number register)
|
||||
* pmsav7_dregion (number of configured regions)
|
||||
*/
|
||||
uint32_t *rbar[2];
|
||||
uint32_t *rlar[2];
|
||||
uint32_t mair0[2];
|
||||
uint32_t mair1[2];
|
||||
uint32_t *rbar[M_REG_NUM_BANKS];
|
||||
uint32_t *rlar[M_REG_NUM_BANKS];
|
||||
uint32_t mair0[M_REG_NUM_BANKS];
|
||||
uint32_t mair1[M_REG_NUM_BANKS];
|
||||
} pmsav8;
|
||||
|
||||
void *nvic;
|
||||
|
@ -6175,6 +6175,7 @@ static void v7m_exception_taken(ARMCPU *cpu, uint32_t lr)
|
||||
|
||||
armv7m_nvic_acknowledge_irq(env->nvic);
|
||||
switch_v7m_sp(env, 0);
|
||||
arm_clear_exclusive(env);
|
||||
/* Clear IT bits */
|
||||
env->condexec_bits = 0;
|
||||
env->regs[14] = lr;
|
||||
@ -6211,7 +6212,7 @@ static void v7m_push_stack(ARMCPU *cpu)
|
||||
static void do_v7m_exception_exit(ARMCPU *cpu)
|
||||
{
|
||||
CPUARMState *env = &cpu->env;
|
||||
uint32_t type;
|
||||
uint32_t excret;
|
||||
uint32_t xpsr;
|
||||
bool ufault = false;
|
||||
bool return_to_sp_process = false;
|
||||
@ -6232,18 +6233,19 @@ static void do_v7m_exception_exit(ARMCPU *cpu)
|
||||
* the target value up between env->regs[15] and env->thumb in
|
||||
* gen_bx(). Reconstitute it.
|
||||
*/
|
||||
type = env->regs[15];
|
||||
excret = env->regs[15];
|
||||
if (env->thumb) {
|
||||
type |= 1;
|
||||
excret |= 1;
|
||||
}
|
||||
|
||||
qemu_log_mask(CPU_LOG_INT, "Exception return: magic PC %" PRIx32
|
||||
" previous exception %d\n",
|
||||
type, env->v7m.exception);
|
||||
excret, env->v7m.exception);
|
||||
|
||||
if (extract32(type, 5, 23) != extract32(-1, 5, 23)) {
|
||||
if ((excret & R_V7M_EXCRET_RES1_MASK) != R_V7M_EXCRET_RES1_MASK) {
|
||||
qemu_log_mask(LOG_GUEST_ERROR, "M profile: zero high bits in exception "
|
||||
"exit PC value 0x%" PRIx32 " are UNPREDICTABLE\n", type);
|
||||
"exit PC value 0x%" PRIx32 " are UNPREDICTABLE\n",
|
||||
excret);
|
||||
}
|
||||
|
||||
if (env->v7m.exception != ARMV7M_EXCP_NMI) {
|
||||
@ -6254,7 +6256,7 @@ static void do_v7m_exception_exit(ARMCPU *cpu)
|
||||
* which security state's faultmask to clear. (v8M ARM ARM R_KBNF.)
|
||||
*/
|
||||
if (arm_feature(env, ARM_FEATURE_M_SECURITY)) {
|
||||
int es = type & 1;
|
||||
int es = excret & R_V7M_EXCRET_ES_MASK;
|
||||
if (armv7m_nvic_raw_execution_priority(env->nvic) >= 0) {
|
||||
env->v7m.faultmask[es] = 0;
|
||||
}
|
||||
@ -6282,7 +6284,7 @@ static void do_v7m_exception_exit(ARMCPU *cpu)
|
||||
g_assert_not_reached();
|
||||
}
|
||||
|
||||
switch (type & 0xf) {
|
||||
switch (excret & 0xf) {
|
||||
case 1: /* Return to Handler */
|
||||
return_to_handler = true;
|
||||
break;
|
||||
@ -6305,7 +6307,7 @@ static void do_v7m_exception_exit(ARMCPU *cpu)
|
||||
*/
|
||||
env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_INVPC_MASK;
|
||||
armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE);
|
||||
v7m_exception_taken(cpu, type | 0xf0000000);
|
||||
v7m_exception_taken(cpu, excret);
|
||||
qemu_log_mask(CPU_LOG_INT, "...taking UsageFault on existing "
|
||||
"stackframe: failed exception return integrity check\n");
|
||||
return;
|
||||
@ -6340,20 +6342,21 @@ static void do_v7m_exception_exit(ARMCPU *cpu)
|
||||
|
||||
/* The restored xPSR exception field will be zero if we're
|
||||
* resuming in Thread mode. If that doesn't match what the
|
||||
* exception return type specified then this is a UsageFault.
|
||||
* exception return excret specified then this is a UsageFault.
|
||||
*/
|
||||
if (return_to_handler != arm_v7m_is_handler_mode(env)) {
|
||||
/* Take an INVPC UsageFault by pushing the stack again. */
|
||||
armv7m_nvic_set_pending(env->nvic, ARMV7M_EXCP_USAGE);
|
||||
env->v7m.cfsr[env->v7m.secure] |= R_V7M_CFSR_INVPC_MASK;
|
||||
v7m_push_stack(cpu);
|
||||
v7m_exception_taken(cpu, type | 0xf0000000);
|
||||
v7m_exception_taken(cpu, excret);
|
||||
qemu_log_mask(CPU_LOG_INT, "...taking UsageFault on new stackframe: "
|
||||
"failed exception return integrity check\n");
|
||||
return;
|
||||
}
|
||||
|
||||
/* Otherwise, we have a successful exception exit. */
|
||||
arm_clear_exclusive(env);
|
||||
qemu_log_mask(CPU_LOG_INT, "...successful exception return\n");
|
||||
}
|
||||
|
||||
@ -6428,15 +6431,15 @@ void arm_v7m_cpu_do_interrupt(CPUState *cs)
|
||||
case 0x8: /* External Abort */
|
||||
switch (cs->exception_index) {
|
||||
case EXCP_PREFETCH_ABORT:
|
||||
env->v7m.cfsr[M_REG_NS] |= R_V7M_CFSR_PRECISERR_MASK;
|
||||
qemu_log_mask(CPU_LOG_INT, "...with CFSR.PRECISERR\n");
|
||||
env->v7m.cfsr[M_REG_NS] |= R_V7M_CFSR_IBUSERR_MASK;
|
||||
qemu_log_mask(CPU_LOG_INT, "...with CFSR.IBUSERR\n");
|
||||
break;
|
||||
case EXCP_DATA_ABORT:
|
||||
env->v7m.cfsr[M_REG_NS] |=
|
||||
(R_V7M_CFSR_IBUSERR_MASK | R_V7M_CFSR_BFARVALID_MASK);
|
||||
(R_V7M_CFSR_PRECISERR_MASK | R_V7M_CFSR_BFARVALID_MASK);
|
||||
env->v7m.bfar = env->exception.vaddress;
|
||||
qemu_log_mask(CPU_LOG_INT,
|
||||
"...with CFSR.IBUSERR and BFAR 0x%x\n",
|
||||
"...with CFSR.PRECISERR and BFAR 0x%x\n",
|
||||
env->v7m.bfar);
|
||||
break;
|
||||
}
|
||||
@ -6489,12 +6492,16 @@ void arm_v7m_cpu_do_interrupt(CPUState *cs)
|
||||
return; /* Never happens. Keep compiler happy. */
|
||||
}
|
||||
|
||||
lr = 0xfffffff1;
|
||||
lr = R_V7M_EXCRET_RES1_MASK |
|
||||
R_V7M_EXCRET_S_MASK |
|
||||
R_V7M_EXCRET_DCRS_MASK |
|
||||
R_V7M_EXCRET_FTYPE_MASK |
|
||||
R_V7M_EXCRET_ES_MASK;
|
||||
if (env->v7m.control[env->v7m.secure] & R_V7M_CONTROL_SPSEL_MASK) {
|
||||
lr |= 4;
|
||||
lr |= R_V7M_EXCRET_SPSEL_MASK;
|
||||
}
|
||||
if (!arm_v7m_is_handler_mode(env)) {
|
||||
lr |= 8;
|
||||
lr |= R_V7M_EXCRET_MODE_MASK;
|
||||
}
|
||||
|
||||
v7m_push_stack(cpu);
|
||||
|
@ -61,6 +61,16 @@ FIELD(V7M_CONTROL, NPRIV, 0, 1)
|
||||
FIELD(V7M_CONTROL, SPSEL, 1, 1)
|
||||
FIELD(V7M_CONTROL, FPCA, 2, 1)
|
||||
|
||||
/* Bit definitions for v7M exception return payload */
|
||||
FIELD(V7M_EXCRET, ES, 0, 1)
|
||||
FIELD(V7M_EXCRET, RES0, 1, 1)
|
||||
FIELD(V7M_EXCRET, SPSEL, 2, 1)
|
||||
FIELD(V7M_EXCRET, MODE, 3, 1)
|
||||
FIELD(V7M_EXCRET, FTYPE, 4, 1)
|
||||
FIELD(V7M_EXCRET, DCRS, 5, 1)
|
||||
FIELD(V7M_EXCRET, S, 6, 1)
|
||||
FIELD(V7M_EXCRET, RES1, 7, 25) /* including the must-be-1 prefix */
|
||||
|
||||
/*
|
||||
* For AArch64, map a given EL to an index in the banked_spsr array.
|
||||
* Note that this mapping and the AArch32 mapping defined in bank_number()
|
||||
@ -443,6 +453,16 @@ bool arm_is_psci_call(ARMCPU *cpu, int excp_type);
|
||||
void arm_handle_psci_call(ARMCPU *cpu);
|
||||
#endif
|
||||
|
||||
/**
|
||||
* arm_clear_exclusive: clear the exclusive monitor
|
||||
* @env: CPU env
|
||||
* Clear the CPU's exclusive monitor, like the guest CLREX instruction.
|
||||
*/
|
||||
static inline void arm_clear_exclusive(CPUARMState *env)
|
||||
{
|
||||
env->exclusive_addr = -1;
|
||||
}
|
||||
|
||||
/**
|
||||
* ARMMMUFaultInfo: Information describing an ARM MMU Fault
|
||||
* @s2addr: Address that caused a fault at stage 2
|
||||
|
@ -1022,7 +1022,7 @@ void HELPER(exception_return)(CPUARMState *env)
|
||||
|
||||
aarch64_save_sp(env, cur_el);
|
||||
|
||||
env->exclusive_addr = -1;
|
||||
arm_clear_exclusive(env);
|
||||
|
||||
/* We must squash the PSTATE.SS bit to zero unless both of the
|
||||
* following hold:
|
||||
|
@ -1894,7 +1894,7 @@ static void gen_load_exclusive(DisasContext *s, int rt, int rt2,
|
||||
}
|
||||
|
||||
static void gen_store_exclusive(DisasContext *s, int rd, int rt, int rt2,
|
||||
TCGv_i64 inaddr, int size, int is_pair)
|
||||
TCGv_i64 addr, int size, int is_pair)
|
||||
{
|
||||
/* if (env->exclusive_addr == addr && env->exclusive_val == [addr]
|
||||
* && (!is_pair || env->exclusive_high == [addr + datasize])) {
|
||||
@ -1910,13 +1910,8 @@ static void gen_store_exclusive(DisasContext *s, int rd, int rt, int rt2,
|
||||
*/
|
||||
TCGLabel *fail_label = gen_new_label();
|
||||
TCGLabel *done_label = gen_new_label();
|
||||
TCGv_i64 addr = tcg_temp_local_new_i64();
|
||||
TCGv_i64 tmp;
|
||||
|
||||
/* Copy input into a local temp so it is not trashed when the
|
||||
* basic block ends at the branch insn.
|
||||
*/
|
||||
tcg_gen_mov_i64(addr, inaddr);
|
||||
tcg_gen_brcond_i64(TCG_COND_NE, addr, cpu_exclusive_addr, fail_label);
|
||||
|
||||
tmp = tcg_temp_new_i64();
|
||||
@ -1927,27 +1922,24 @@ static void gen_store_exclusive(DisasContext *s, int rd, int rt, int rt2,
|
||||
} else {
|
||||
tcg_gen_concat32_i64(tmp, cpu_reg(s, rt2), cpu_reg(s, rt));
|
||||
}
|
||||
tcg_gen_atomic_cmpxchg_i64(tmp, addr, cpu_exclusive_val, tmp,
|
||||
tcg_gen_atomic_cmpxchg_i64(tmp, cpu_exclusive_addr,
|
||||
cpu_exclusive_val, tmp,
|
||||
get_mem_index(s),
|
||||
MO_64 | MO_ALIGN | s->be_data);
|
||||
tcg_gen_setcond_i64(TCG_COND_NE, tmp, tmp, cpu_exclusive_val);
|
||||
} else if (s->be_data == MO_LE) {
|
||||
gen_helper_paired_cmpxchg64_le(tmp, cpu_env, addr, cpu_reg(s, rt),
|
||||
cpu_reg(s, rt2));
|
||||
gen_helper_paired_cmpxchg64_le(tmp, cpu_env, cpu_exclusive_addr,
|
||||
cpu_reg(s, rt), cpu_reg(s, rt2));
|
||||
} else {
|
||||
gen_helper_paired_cmpxchg64_be(tmp, cpu_env, addr, cpu_reg(s, rt),
|
||||
cpu_reg(s, rt2));
|
||||
gen_helper_paired_cmpxchg64_be(tmp, cpu_env, cpu_exclusive_addr,
|
||||
cpu_reg(s, rt), cpu_reg(s, rt2));
|
||||
}
|
||||
} else {
|
||||
TCGv_i64 val = cpu_reg(s, rt);
|
||||
tcg_gen_atomic_cmpxchg_i64(tmp, addr, cpu_exclusive_val, val,
|
||||
get_mem_index(s),
|
||||
tcg_gen_atomic_cmpxchg_i64(tmp, cpu_exclusive_addr, cpu_exclusive_val,
|
||||
cpu_reg(s, rt), get_mem_index(s),
|
||||
size | MO_ALIGN | s->be_data);
|
||||
tcg_gen_setcond_i64(TCG_COND_NE, tmp, tmp, cpu_exclusive_val);
|
||||
}
|
||||
|
||||
tcg_temp_free_i64(addr);
|
||||
|
||||
tcg_gen_mov_i64(cpu_reg(s, rd), tmp);
|
||||
tcg_temp_free_i64(tmp);
|
||||
tcg_gen_br(done_label);
|
||||
@ -11348,6 +11340,7 @@ static void aarch64_tr_tb_stop(DisasContextBase *dcbase, CPUState *cpu)
|
||||
default:
|
||||
gen_a64_set_pc_im(dc->pc);
|
||||
/* fall through */
|
||||
case DISAS_EXIT:
|
||||
case DISAS_JUMP:
|
||||
if (dc->base.singlestep_enabled) {
|
||||
gen_exception_internal(EXCP_DEBUG);
|
||||
|
Loading…
Reference in New Issue
Block a user