xref: /qemu/hw/intc/pnv_xive.c (revision 06b40d250ecfa1633209c2e431a7a38acfd03a98)
1 /*
2  * QEMU PowerPC XIVE interrupt controller model
3  *
4  * Copyright (c) 2017-2024, IBM Corporation.
5  *
6  * SPDX-License-Identifier: GPL-2.0-or-later
7  */
8 
9 #include "qemu/osdep.h"
10 #include "qemu/log.h"
11 #include "qemu/module.h"
12 #include "qapi/error.h"
13 #include "target/ppc/cpu.h"
14 #include "system/cpus.h"
15 #include "system/dma.h"
16 #include "system/reset.h"
17 #include "hw/ppc/fdt.h"
18 #include "hw/ppc/pnv.h"
19 #include "hw/ppc/pnv_chip.h"
20 #include "hw/ppc/pnv_core.h"
21 #include "hw/ppc/pnv_xscom.h"
22 #include "hw/ppc/pnv_xive.h"
23 #include "hw/ppc/xive_regs.h"
24 #include "hw/qdev-properties.h"
25 #include "hw/ppc/ppc.h"
26 #include "trace.h"
27 
28 #include <libfdt.h>
29 
30 #include "pnv_xive_regs.h"
31 
32 #undef XIVE_DEBUG
33 
34 /*
35  * Virtual structures table (VST)
36  */
37 #define SBE_PER_BYTE   4
38 
39 typedef struct XiveVstInfo {
40     const char *name;
41     uint32_t    size;
42     uint32_t    max_blocks;
43 } XiveVstInfo;
44 
45 static const XiveVstInfo vst_infos[] = {
46     [VST_TSEL_IVT]  = { "EAT",  sizeof(XiveEAS), 16 },
47     [VST_TSEL_SBE]  = { "SBE",  1,               16 },
48     [VST_TSEL_EQDT] = { "ENDT", sizeof(XiveEND), 16 },
49     [VST_TSEL_VPDT] = { "VPDT", sizeof(XiveNVT), 32 },
50 
51     /*
52      *  Interrupt fifo backing store table (not modeled) :
53      *
54      * 0 - IPI,
55      * 1 - HWD,
56      * 2 - First escalate,
57      * 3 - Second escalate,
58      * 4 - Redistribution,
59      * 5 - IPI cascaded queue ?
60      */
61     [VST_TSEL_IRQ]  = { "IRQ",  1,               6  },
62 };
63 
64 #define xive_error(xive, fmt, ...)                                      \
65     qemu_log_mask(LOG_GUEST_ERROR, "XIVE[%x] - " fmt "\n",              \
66                   (xive)->chip->chip_id, ## __VA_ARGS__);
67 
68 /*
69  * When PC_TCTXT_CHIPID_OVERRIDE is configured, the PC_TCTXT_CHIPID
70  * field overrides the hardwired chip ID in the Powerbus operations
71  * and for CAM compares
72  */
pnv_xive_block_id(PnvXive * xive)73 static uint8_t pnv_xive_block_id(PnvXive *xive)
74 {
75     uint8_t blk = xive->chip->chip_id;
76     uint64_t cfg_val = xive->regs[PC_TCTXT_CFG >> 3];
77 
78     if (cfg_val & PC_TCTXT_CHIPID_OVERRIDE) {
79         blk = GETFIELD(PC_TCTXT_CHIPID, cfg_val);
80     }
81 
82     return blk;
83 }
84 
85 /*
86  * VST accessors for SBE, EAT, ENDT, NVT
87  *
88  * Indirect VST tables are arrays of VSDs pointing to a page (of same
89  * size). Each page is a direct VST table.
90  */
91 
92 #define XIVE_VSD_SIZE 8
93 
94 /* Indirect page size can be 4K, 64K, 2M, 16M. */
pnv_xive_vst_page_size_allowed(uint32_t page_shift)95 static uint64_t pnv_xive_vst_page_size_allowed(uint32_t page_shift)
96 {
97      return page_shift == 12 || page_shift == 16 ||
98          page_shift == 21 || page_shift == 24;
99 }
100 
pnv_xive_vst_addr_direct(PnvXive * xive,uint32_t type,uint64_t vsd,uint32_t idx)101 static uint64_t pnv_xive_vst_addr_direct(PnvXive *xive, uint32_t type,
102                                          uint64_t vsd, uint32_t idx)
103 {
104     const XiveVstInfo *info = &vst_infos[type];
105     uint64_t vst_addr = vsd & VSD_ADDRESS_MASK;
106     uint64_t vst_tsize = 1ull << (GETFIELD(VSD_TSIZE, vsd) + 12);
107     uint32_t idx_max;
108 
109     idx_max = vst_tsize / info->size - 1;
110     if (idx > idx_max) {
111 #ifdef XIVE_DEBUG
112         xive_error(xive, "VST: %s entry %x out of range [ 0 .. %x ] !?",
113                    info->name, idx, idx_max);
114 #endif
115         return 0;
116     }
117 
118     return vst_addr + idx * info->size;
119 }
120 
pnv_xive_vst_addr_indirect(PnvXive * xive,uint32_t type,uint64_t vsd,uint32_t idx)121 static uint64_t pnv_xive_vst_addr_indirect(PnvXive *xive, uint32_t type,
122                                            uint64_t vsd, uint32_t idx)
123 {
124     const XiveVstInfo *info = &vst_infos[type];
125     uint64_t vsd_addr;
126     uint32_t vsd_idx;
127     uint32_t page_shift;
128     uint32_t vst_per_page;
129 
130     /* Get the page size of the indirect table. */
131     vsd_addr = vsd & VSD_ADDRESS_MASK;
132     if (ldq_be_dma(&address_space_memory, vsd_addr, &vsd,
133                     MEMTXATTRS_UNSPECIFIED)) {
134         xive_error(xive, "VST: failed to access %s entry %x @0x%" PRIx64,
135                    info->name, idx, vsd_addr);
136         return 0;
137     }
138 
139     if (!(vsd & VSD_ADDRESS_MASK)) {
140 #ifdef XIVE_DEBUG
141         xive_error(xive, "VST: invalid %s entry %x !?", info->name, idx);
142 #endif
143         return 0;
144     }
145 
146     page_shift = GETFIELD(VSD_TSIZE, vsd) + 12;
147 
148     if (!pnv_xive_vst_page_size_allowed(page_shift)) {
149         xive_error(xive, "VST: invalid %s page shift %d", info->name,
150                    page_shift);
151         return 0;
152     }
153 
154     vst_per_page = (1ull << page_shift) / info->size;
155     vsd_idx = idx / vst_per_page;
156 
157     /* Load the VSD we are looking for, if not already done */
158     if (vsd_idx) {
159         vsd_addr = vsd_addr + vsd_idx * XIVE_VSD_SIZE;
160         if (ldq_be_dma(&address_space_memory, vsd_addr, &vsd,
161                        MEMTXATTRS_UNSPECIFIED)) {
162             xive_error(xive, "VST: failed to access %s entry %x @0x%"
163                        PRIx64, info->name, vsd_idx, vsd_addr);
164             return 0;
165         }
166 
167         if (!(vsd & VSD_ADDRESS_MASK)) {
168 #ifdef XIVE_DEBUG
169             xive_error(xive, "VST: invalid %s entry %x !?", info->name, idx);
170 #endif
171             return 0;
172         }
173 
174         /*
175          * Check that the pages have a consistent size across the
176          * indirect table
177          */
178         if (page_shift != GETFIELD(VSD_TSIZE, vsd) + 12) {
179             xive_error(xive, "VST: %s entry %x indirect page size differ !?",
180                        info->name, idx);
181             return 0;
182         }
183     }
184 
185     return pnv_xive_vst_addr_direct(xive, type, vsd, (idx % vst_per_page));
186 }
187 
188 /*
189  * This is a simplified model of operation forwarding on a remote IC.
190  *
191  * A PC MMIO address is built to identify the NVT structure. The load
192  * on the remote IC will return the address of the structure in RAM,
193  * which will then be used by pnv_xive_vst_write/read to perform the
194  * RAM operation.
195  */
pnv_xive_vst_addr_remote(PnvXive * xive,uint32_t type,uint64_t vsd,uint8_t blk,uint32_t idx)196 static uint64_t pnv_xive_vst_addr_remote(PnvXive *xive, uint32_t type,
197                                          uint64_t vsd, uint8_t blk,
198                                          uint32_t idx)
199 {
200     const XiveVstInfo *info = &vst_infos[type];
201     uint64_t remote_addr = vsd & VSD_ADDRESS_MASK;
202     uint64_t vst_addr;
203     MemTxResult result;
204 
205     if (type != VST_TSEL_VPDT) {
206         xive_error(xive, "VST: invalid access on remote VST %s %x/%x !?",
207                    info->name, blk, idx);
208         return 0;
209     }
210 
211     remote_addr |= ((uint64_t)idx) << xive->pc_shift;
212 
213     vst_addr = address_space_ldq_be(&address_space_memory, remote_addr,
214                                     MEMTXATTRS_UNSPECIFIED, &result);
215     if (result != MEMTX_OK) {
216         xive_error(xive, "VST: read failed at @0x%"  HWADDR_PRIx
217                    " for NVT %x/%x\n", remote_addr, blk, idx);
218         return 0;
219     }
220 
221     return vst_addr;
222 }
223 
pnv_xive_vst_addr(PnvXive * xive,uint32_t type,uint8_t blk,uint32_t idx)224 static uint64_t pnv_xive_vst_addr(PnvXive *xive, uint32_t type, uint8_t blk,
225                                   uint32_t idx)
226 {
227     const XiveVstInfo *info = &vst_infos[type];
228     uint64_t vsd;
229 
230     if (blk >= info->max_blocks) {
231         xive_error(xive, "VST: invalid block id %d for VST %s %d !?",
232                    blk, info->name, idx);
233         return 0;
234     }
235 
236     vsd = xive->vsds[type][blk];
237 
238     /* Remote VST access */
239     if (GETFIELD(VSD_MODE, vsd) == VSD_MODE_FORWARD) {
240         return pnv_xive_vst_addr_remote(xive, type, vsd, blk, idx);
241     }
242 
243     if (VSD_INDIRECT & vsd) {
244         return pnv_xive_vst_addr_indirect(xive, type, vsd, idx);
245     }
246 
247     return pnv_xive_vst_addr_direct(xive, type, vsd, idx);
248 }
249 
pnv_xive_vst_read(PnvXive * xive,uint32_t type,uint8_t blk,uint32_t idx,void * data)250 static int pnv_xive_vst_read(PnvXive *xive, uint32_t type, uint8_t blk,
251                              uint32_t idx, void *data)
252 {
253     const XiveVstInfo *info = &vst_infos[type];
254     uint64_t addr = pnv_xive_vst_addr(xive, type, blk, idx);
255     MemTxResult result;
256 
257     if (!addr) {
258         return -1;
259     }
260 
261     result = address_space_read(&address_space_memory, addr,
262                                 MEMTXATTRS_UNSPECIFIED, data,
263                                 info->size);
264     if (result != MEMTX_OK) {
265         xive_error(xive, "VST: read failed at @0x%" HWADDR_PRIx
266                    " for VST %s %x/%x\n", addr, info->name, blk, idx);
267         return -1;
268     }
269     return 0;
270 }
271 
272 #define XIVE_VST_WORD_ALL -1
273 
pnv_xive_vst_write(PnvXive * xive,uint32_t type,uint8_t blk,uint32_t idx,void * data,uint32_t word_number)274 static int pnv_xive_vst_write(PnvXive *xive, uint32_t type, uint8_t blk,
275                               uint32_t idx, void *data, uint32_t word_number)
276 {
277     const XiveVstInfo *info = &vst_infos[type];
278     uint64_t addr = pnv_xive_vst_addr(xive, type, blk, idx);
279     MemTxResult result;
280 
281     if (!addr) {
282         return -1;
283     }
284 
285     if (word_number == XIVE_VST_WORD_ALL) {
286         result = address_space_write(&address_space_memory, addr,
287                                      MEMTXATTRS_UNSPECIFIED, data,
288                                      info->size);
289     } else {
290         result = address_space_write(&address_space_memory,
291                                      addr + word_number * 4,
292                                      MEMTXATTRS_UNSPECIFIED,
293                                      data + word_number * 4, 4);
294     }
295 
296     if (result != MEMTX_OK) {
297         xive_error(xive, "VST: write failed at @0x%" HWADDR_PRIx
298                     "for VST %s %x/%x\n", addr, info->name, blk, idx);
299         return -1;
300     }
301     return 0;
302 }
303 
pnv_xive_get_end(XiveRouter * xrtr,uint8_t blk,uint32_t idx,XiveEND * end)304 static int pnv_xive_get_end(XiveRouter *xrtr, uint8_t blk, uint32_t idx,
305                             XiveEND *end)
306 {
307     PnvXive *xive = PNV_XIVE(xrtr);
308 
309     if (pnv_xive_block_id(xive) != blk) {
310         xive_error(xive, "VST: END %x/%x is remote !?", blk, idx);
311         return -1;
312     }
313 
314     return pnv_xive_vst_read(PNV_XIVE(xrtr), VST_TSEL_EQDT, blk, idx, end);
315 }
316 
pnv_xive_write_end(XiveRouter * xrtr,uint8_t blk,uint32_t idx,XiveEND * end,uint8_t word_number)317 static int pnv_xive_write_end(XiveRouter *xrtr, uint8_t blk, uint32_t idx,
318                               XiveEND *end, uint8_t word_number)
319 {
320     PnvXive *xive = PNV_XIVE(xrtr);
321 
322     if (pnv_xive_block_id(xive) != blk) {
323         xive_error(xive, "VST: END %x/%x is remote !?", blk, idx);
324         return -1;
325     }
326 
327     return pnv_xive_vst_write(PNV_XIVE(xrtr), VST_TSEL_EQDT, blk, idx, end,
328                               word_number);
329 }
330 
pnv_xive_end_update(PnvXive * xive)331 static int pnv_xive_end_update(PnvXive *xive)
332 {
333     uint8_t  blk = GETFIELD(VC_EQC_CWATCH_BLOCKID,
334                            xive->regs[(VC_EQC_CWATCH_SPEC >> 3)]);
335     uint32_t idx = GETFIELD(VC_EQC_CWATCH_OFFSET,
336                            xive->regs[(VC_EQC_CWATCH_SPEC >> 3)]);
337     int i;
338     uint64_t eqc_watch[4];
339 
340     for (i = 0; i < ARRAY_SIZE(eqc_watch); i++) {
341         eqc_watch[i] = cpu_to_be64(xive->regs[(VC_EQC_CWATCH_DAT0 >> 3) + i]);
342     }
343 
344     return pnv_xive_vst_write(xive, VST_TSEL_EQDT, blk, idx, eqc_watch,
345                               XIVE_VST_WORD_ALL);
346 }
347 
pnv_xive_end_cache_load(PnvXive * xive)348 static void pnv_xive_end_cache_load(PnvXive *xive)
349 {
350     uint8_t  blk = GETFIELD(VC_EQC_CWATCH_BLOCKID,
351                            xive->regs[(VC_EQC_CWATCH_SPEC >> 3)]);
352     uint32_t idx = GETFIELD(VC_EQC_CWATCH_OFFSET,
353                            xive->regs[(VC_EQC_CWATCH_SPEC >> 3)]);
354     uint64_t eqc_watch[4] = { 0 };
355     int i;
356 
357     if (pnv_xive_vst_read(xive, VST_TSEL_EQDT, blk, idx, eqc_watch)) {
358         xive_error(xive, "VST: no END entry %x/%x !?", blk, idx);
359     }
360 
361     for (i = 0; i < ARRAY_SIZE(eqc_watch); i++) {
362         xive->regs[(VC_EQC_CWATCH_DAT0 >> 3) + i] = be64_to_cpu(eqc_watch[i]);
363     }
364 }
365 
pnv_xive_get_nvt(XiveRouter * xrtr,uint8_t blk,uint32_t idx,XiveNVT * nvt)366 static int pnv_xive_get_nvt(XiveRouter *xrtr, uint8_t blk, uint32_t idx,
367                             XiveNVT *nvt)
368 {
369     return pnv_xive_vst_read(PNV_XIVE(xrtr), VST_TSEL_VPDT, blk, idx, nvt);
370 }
371 
pnv_xive_write_nvt(XiveRouter * xrtr,uint8_t blk,uint32_t idx,XiveNVT * nvt,uint8_t word_number)372 static int pnv_xive_write_nvt(XiveRouter *xrtr, uint8_t blk, uint32_t idx,
373                               XiveNVT *nvt, uint8_t word_number)
374 {
375     return pnv_xive_vst_write(PNV_XIVE(xrtr), VST_TSEL_VPDT, blk, idx, nvt,
376                               word_number);
377 }
378 
pnv_xive_nvt_update(PnvXive * xive)379 static int pnv_xive_nvt_update(PnvXive *xive)
380 {
381     uint8_t  blk = GETFIELD(PC_VPC_CWATCH_BLOCKID,
382                            xive->regs[(PC_VPC_CWATCH_SPEC >> 3)]);
383     uint32_t idx = GETFIELD(PC_VPC_CWATCH_OFFSET,
384                            xive->regs[(PC_VPC_CWATCH_SPEC >> 3)]);
385     int i;
386     uint64_t vpc_watch[8];
387 
388     for (i = 0; i < ARRAY_SIZE(vpc_watch); i++) {
389         vpc_watch[i] = cpu_to_be64(xive->regs[(PC_VPC_CWATCH_DAT0 >> 3) + i]);
390     }
391 
392     return pnv_xive_vst_write(xive, VST_TSEL_VPDT, blk, idx, vpc_watch,
393                               XIVE_VST_WORD_ALL);
394 }
395 
pnv_xive_nvt_cache_load(PnvXive * xive)396 static void pnv_xive_nvt_cache_load(PnvXive *xive)
397 {
398     uint8_t  blk = GETFIELD(PC_VPC_CWATCH_BLOCKID,
399                            xive->regs[(PC_VPC_CWATCH_SPEC >> 3)]);
400     uint32_t idx = GETFIELD(PC_VPC_CWATCH_OFFSET,
401                            xive->regs[(PC_VPC_CWATCH_SPEC >> 3)]);
402     uint64_t vpc_watch[8] = { 0 };
403     int i;
404 
405     if (pnv_xive_vst_read(xive, VST_TSEL_VPDT, blk, idx, vpc_watch)) {
406         xive_error(xive, "VST: no NVT entry %x/%x !?", blk, idx);
407     }
408 
409     for (i = 0; i < ARRAY_SIZE(vpc_watch); i++) {
410         xive->regs[(PC_VPC_CWATCH_DAT0 >> 3) + i] = be64_to_cpu(vpc_watch[i]);
411     }
412 }
413 
pnv_xive_get_eas(XiveRouter * xrtr,uint8_t blk,uint32_t idx,XiveEAS * eas)414 static int pnv_xive_get_eas(XiveRouter *xrtr, uint8_t blk, uint32_t idx,
415                             XiveEAS *eas)
416 {
417     PnvXive *xive = PNV_XIVE(xrtr);
418 
419     /*
420      * EAT lookups should be local to the IC
421      */
422     if (pnv_xive_block_id(xive) != blk) {
423         xive_error(xive, "VST: EAS %x is remote !?", XIVE_EAS(blk, idx));
424         return -1;
425     }
426 
427     return pnv_xive_vst_read(xive, VST_TSEL_IVT, blk, idx, eas);
428 }
429 
pnv_xive_get_pq(XiveRouter * xrtr,uint8_t blk,uint32_t idx,uint8_t * pq)430 static int pnv_xive_get_pq(XiveRouter *xrtr, uint8_t blk, uint32_t idx,
431                            uint8_t *pq)
432 {
433     PnvXive *xive = PNV_XIVE(xrtr);
434 
435     if (pnv_xive_block_id(xive) != blk) {
436         xive_error(xive, "VST: EAS %x is remote !?", XIVE_EAS(blk, idx));
437         return -1;
438     }
439 
440     *pq = xive_source_esb_get(&xive->ipi_source, idx);
441     return 0;
442 }
443 
pnv_xive_set_pq(XiveRouter * xrtr,uint8_t blk,uint32_t idx,uint8_t * pq)444 static int pnv_xive_set_pq(XiveRouter *xrtr, uint8_t blk, uint32_t idx,
445                            uint8_t *pq)
446 {
447     PnvXive *xive = PNV_XIVE(xrtr);
448 
449     if (pnv_xive_block_id(xive) != blk) {
450         xive_error(xive, "VST: EAS %x is remote !?", XIVE_EAS(blk, idx));
451         return -1;
452     }
453 
454     *pq = xive_source_esb_set(&xive->ipi_source, idx, *pq);
455     return 0;
456 }
457 
458 /*
459  * One bit per thread id. The first register PC_THREAD_EN_REG0 covers
460  * the first cores 0-15 (normal) of the chip or 0-7 (fused). The
461  * second register covers cores 16-23 (normal) or 8-11 (fused).
462  */
pnv_xive_is_cpu_enabled(PnvXive * xive,PowerPCCPU * cpu)463 static bool pnv_xive_is_cpu_enabled(PnvXive *xive, PowerPCCPU *cpu)
464 {
465     int pir = ppc_cpu_pir(cpu);
466     uint32_t fc = PNV9_PIR2FUSEDCORE(pir);
467     uint64_t reg = fc < 8 ? PC_THREAD_EN_REG0 : PC_THREAD_EN_REG1;
468     uint32_t bit = pir & 0x3f;
469 
470     return xive->regs[reg >> 3] & PPC_BIT(bit);
471 }
472 
pnv_xive_match_nvt(XivePresenter * xptr,uint8_t format,uint8_t nvt_blk,uint32_t nvt_idx,bool crowd,bool cam_ignore,uint8_t priority,uint32_t logic_serv,XiveTCTXMatch * match)473 static int pnv_xive_match_nvt(XivePresenter *xptr, uint8_t format,
474                               uint8_t nvt_blk, uint32_t nvt_idx,
475                               bool crowd, bool cam_ignore, uint8_t priority,
476                               uint32_t logic_serv, XiveTCTXMatch *match)
477 {
478     PnvXive *xive = PNV_XIVE(xptr);
479     PnvChip *chip = xive->chip;
480     int count = 0;
481     int i, j;
482 
483     for (i = 0; i < chip->nr_cores; i++) {
484         PnvCore *pc = chip->cores[i];
485         CPUCore *cc = CPU_CORE(pc);
486 
487         for (j = 0; j < cc->nr_threads; j++) {
488             PowerPCCPU *cpu = pc->threads[j];
489             XiveTCTX *tctx;
490             int ring;
491 
492             if (!pnv_xive_is_cpu_enabled(xive, cpu)) {
493                 continue;
494             }
495 
496             tctx = XIVE_TCTX(pnv_cpu_state(cpu)->intc);
497 
498             /*
499              * Check the thread context CAM lines and record matches.
500              */
501             ring = xive_presenter_tctx_match(xptr, tctx, format, nvt_blk,
502                                              nvt_idx, cam_ignore,
503                                              logic_serv);
504             /*
505              * Save the context and follow on to catch duplicates, that we
506              * don't support yet.
507              */
508             if (ring != -1) {
509                 if (match->tctx) {
510                     qemu_log_mask(LOG_GUEST_ERROR, "XIVE: already found a "
511                                   "thread context NVT %x/%x\n",
512                                   nvt_blk, nvt_idx);
513                     return -1;
514                 }
515 
516                 match->ring = ring;
517                 match->tctx = tctx;
518                 count++;
519             }
520         }
521     }
522 
523     return count;
524 }
525 
pnv_xive_presenter_get_config(XivePresenter * xptr)526 static uint32_t pnv_xive_presenter_get_config(XivePresenter *xptr)
527 {
528     uint32_t cfg = 0;
529 
530     /* TIMA GEN1 is all P9 knows */
531     cfg |= XIVE_PRESENTER_GEN1_TIMA_OS;
532 
533     return cfg;
534 }
535 
pnv_xive_get_block_id(XiveRouter * xrtr)536 static uint8_t pnv_xive_get_block_id(XiveRouter *xrtr)
537 {
538     return pnv_xive_block_id(PNV_XIVE(xrtr));
539 }
540 
541 /*
542  * The TIMA MMIO space is shared among the chips and to identify the
543  * chip from which the access is being done, we extract the chip id
544  * from the PIR.
545  */
pnv_xive_tm_get_xive(PowerPCCPU * cpu)546 static PnvXive *pnv_xive_tm_get_xive(PowerPCCPU *cpu)
547 {
548     int pir = ppc_cpu_pir(cpu);
549     XivePresenter *xptr = XIVE_TCTX(pnv_cpu_state(cpu)->intc)->xptr;
550     PnvXive *xive = PNV_XIVE(xptr);
551 
552     if (!pnv_xive_is_cpu_enabled(xive, cpu)) {
553         xive_error(xive, "IC: CPU %x is not enabled", pir);
554     }
555     return xive;
556 }
557 
558 /*
559  * The internal sources (IPIs) of the interrupt controller have no
560  * knowledge of the XIVE chip on which they reside. Encode the block
561  * id in the source interrupt number before forwarding the source
562  * event notification to the Router. This is required on a multichip
563  * system.
564  */
pnv_xive_notify(XiveNotifier * xn,uint32_t srcno,bool pq_checked)565 static void pnv_xive_notify(XiveNotifier *xn, uint32_t srcno, bool pq_checked)
566 {
567     PnvXive *xive = PNV_XIVE(xn);
568     uint8_t blk = pnv_xive_block_id(xive);
569 
570     xive_router_notify(xn, XIVE_EAS(blk, srcno), pq_checked);
571 }
572 
573 /*
574  * XIVE helpers
575  */
576 
pnv_xive_vc_size(PnvXive * xive)577 static uint64_t pnv_xive_vc_size(PnvXive *xive)
578 {
579     return (~xive->regs[CQ_VC_BARM >> 3] + 1) & CQ_VC_BARM_MASK;
580 }
581 
pnv_xive_edt_shift(PnvXive * xive)582 static uint64_t pnv_xive_edt_shift(PnvXive *xive)
583 {
584     return ctz64(pnv_xive_vc_size(xive) / XIVE_TABLE_EDT_MAX);
585 }
586 
pnv_xive_pc_size(PnvXive * xive)587 static uint64_t pnv_xive_pc_size(PnvXive *xive)
588 {
589     return (~xive->regs[CQ_PC_BARM >> 3] + 1) & CQ_PC_BARM_MASK;
590 }
591 
pnv_xive_nr_ipis(PnvXive * xive,uint8_t blk)592 static uint32_t pnv_xive_nr_ipis(PnvXive *xive, uint8_t blk)
593 {
594     uint64_t vsd = xive->vsds[VST_TSEL_SBE][blk];
595     uint64_t vst_tsize = 1ull << (GETFIELD(VSD_TSIZE, vsd) + 12);
596 
597     return VSD_INDIRECT & vsd ? 0 : vst_tsize * SBE_PER_BYTE;
598 }
599 
600 /*
601  * Compute the number of entries per indirect subpage.
602  */
pnv_xive_vst_per_subpage(PnvXive * xive,uint32_t type)603 static uint64_t pnv_xive_vst_per_subpage(PnvXive *xive, uint32_t type)
604 {
605     uint8_t blk = pnv_xive_block_id(xive);
606     uint64_t vsd = xive->vsds[type][blk];
607     const XiveVstInfo *info = &vst_infos[type];
608     uint64_t vsd_addr;
609     uint32_t page_shift;
610 
611     /* For direct tables, fake a valid value */
612     if (!(VSD_INDIRECT & vsd)) {
613         return 1;
614     }
615 
616     /* Get the page size of the indirect table. */
617     vsd_addr = vsd & VSD_ADDRESS_MASK;
618     if (ldq_be_dma(&address_space_memory, vsd_addr, &vsd,
619                    MEMTXATTRS_UNSPECIFIED)) {
620         xive_error(xive, "VST: failed to access %s entry @0x%" PRIx64,
621                    info->name, vsd_addr);
622         return 0;
623     }
624 
625     if (!(vsd & VSD_ADDRESS_MASK)) {
626 #ifdef XIVE_DEBUG
627         xive_error(xive, "VST: invalid %s entry %x !?", info->name, idx);
628 #endif
629         return 0;
630     }
631 
632     page_shift = GETFIELD(VSD_TSIZE, vsd) + 12;
633 
634     if (!pnv_xive_vst_page_size_allowed(page_shift)) {
635         xive_error(xive, "VST: invalid %s page shift %d", info->name,
636                    page_shift);
637         return 0;
638     }
639 
640     return (1ull << page_shift) / info->size;
641 }
642 
643 /*
644  * EDT Table
645  *
646  * The Virtualization Controller MMIO region containing the IPI ESB
647  * pages and END ESB pages is sub-divided into "sets" which map
648  * portions of the VC region to the different ESB pages. It is
649  * configured at runtime through the EDT "Domain Table" to let the
650  * firmware decide how to split the VC address space between IPI ESB
651  * pages and END ESB pages.
652  */
653 
654 /*
655  * Computes the overall size of the IPI or the END ESB pages
656  */
pnv_xive_edt_size(PnvXive * xive,uint64_t type)657 static uint64_t pnv_xive_edt_size(PnvXive *xive, uint64_t type)
658 {
659     uint64_t edt_size = 1ull << pnv_xive_edt_shift(xive);
660     uint64_t size = 0;
661     int i;
662 
663     for (i = 0; i < XIVE_TABLE_EDT_MAX; i++) {
664         uint64_t edt_type = GETFIELD(CQ_TDR_EDT_TYPE, xive->edt[i]);
665 
666         if (edt_type == type) {
667             size += edt_size;
668         }
669     }
670 
671     return size;
672 }
673 
674 /*
675  * Maps an offset of the VC region in the IPI or END region using the
676  * layout defined by the EDT "Domaine Table"
677  */
pnv_xive_edt_offset(PnvXive * xive,uint64_t vc_offset,uint64_t type)678 static uint64_t pnv_xive_edt_offset(PnvXive *xive, uint64_t vc_offset,
679                                               uint64_t type)
680 {
681     int i;
682     uint64_t edt_size = 1ull << pnv_xive_edt_shift(xive);
683     uint64_t edt_offset = vc_offset;
684 
685     for (i = 0; i < XIVE_TABLE_EDT_MAX && (i * edt_size) < vc_offset; i++) {
686         uint64_t edt_type = GETFIELD(CQ_TDR_EDT_TYPE, xive->edt[i]);
687 
688         if (edt_type != type) {
689             edt_offset -= edt_size;
690         }
691     }
692 
693     return edt_offset;
694 }
695 
pnv_xive_edt_resize(PnvXive * xive)696 static void pnv_xive_edt_resize(PnvXive *xive)
697 {
698     uint64_t ipi_edt_size = pnv_xive_edt_size(xive, CQ_TDR_EDT_IPI);
699     uint64_t end_edt_size = pnv_xive_edt_size(xive, CQ_TDR_EDT_EQ);
700 
701     memory_region_set_size(&xive->ipi_edt_mmio, ipi_edt_size);
702     memory_region_add_subregion(&xive->ipi_mmio, 0, &xive->ipi_edt_mmio);
703 
704     memory_region_set_size(&xive->end_edt_mmio, end_edt_size);
705     memory_region_add_subregion(&xive->end_mmio, 0, &xive->end_edt_mmio);
706 }
707 
708 /*
709  * XIVE Table configuration. Only EDT is supported.
710  */
pnv_xive_table_set_data(PnvXive * xive,uint64_t val)711 static int pnv_xive_table_set_data(PnvXive *xive, uint64_t val)
712 {
713     uint64_t tsel = xive->regs[CQ_TAR >> 3] & CQ_TAR_TSEL;
714     uint8_t tsel_index = GETFIELD(CQ_TAR_TSEL_INDEX, xive->regs[CQ_TAR >> 3]);
715     uint64_t *xive_table;
716     uint8_t max_index;
717 
718     switch (tsel) {
719     case CQ_TAR_TSEL_BLK:
720         max_index = ARRAY_SIZE(xive->blk);
721         xive_table = xive->blk;
722         break;
723     case CQ_TAR_TSEL_MIG:
724         max_index = ARRAY_SIZE(xive->mig);
725         xive_table = xive->mig;
726         break;
727     case CQ_TAR_TSEL_EDT:
728         max_index = ARRAY_SIZE(xive->edt);
729         xive_table = xive->edt;
730         break;
731     case CQ_TAR_TSEL_VDT:
732         max_index = ARRAY_SIZE(xive->vdt);
733         xive_table = xive->vdt;
734         break;
735     default:
736         xive_error(xive, "IC: invalid table %d", (int) tsel);
737         return -1;
738     }
739 
740     if (tsel_index >= max_index) {
741         xive_error(xive, "IC: invalid index %d", (int) tsel_index);
742         return -1;
743     }
744 
745     xive_table[tsel_index] = val;
746 
747     if (xive->regs[CQ_TAR >> 3] & CQ_TAR_TBL_AUTOINC) {
748         xive->regs[CQ_TAR >> 3] =
749             SETFIELD(CQ_TAR_TSEL_INDEX, xive->regs[CQ_TAR >> 3], ++tsel_index);
750     }
751 
752     /*
753      * EDT configuration is complete. Resize the MMIO windows exposing
754      * the IPI and the END ESBs in the VC region.
755      */
756     if (tsel == CQ_TAR_TSEL_EDT && tsel_index == ARRAY_SIZE(xive->edt)) {
757         pnv_xive_edt_resize(xive);
758     }
759 
760     return 0;
761 }
762 
763 /*
764  * Virtual Structure Tables (VST) configuration
765  */
pnv_xive_vst_set_exclusive(PnvXive * xive,uint8_t type,uint8_t blk,uint64_t vsd)766 static void pnv_xive_vst_set_exclusive(PnvXive *xive, uint8_t type,
767                                        uint8_t blk, uint64_t vsd)
768 {
769     XiveENDSource *end_xsrc = &xive->end_source;
770     XiveSource *xsrc = &xive->ipi_source;
771     const XiveVstInfo *info = &vst_infos[type];
772     uint32_t page_shift = GETFIELD(VSD_TSIZE, vsd) + 12;
773     uint64_t vst_tsize = 1ull << page_shift;
774     uint64_t vst_addr = vsd & VSD_ADDRESS_MASK;
775 
776     /* Basic checks */
777 
778     if (VSD_INDIRECT & vsd) {
779         if (!(xive->regs[VC_GLOBAL_CONFIG >> 3] & VC_GCONF_INDIRECT)) {
780             xive_error(xive, "VST: %s indirect tables are not enabled",
781                        info->name);
782             return;
783         }
784 
785         if (!pnv_xive_vst_page_size_allowed(page_shift)) {
786             xive_error(xive, "VST: invalid %s page shift %d", info->name,
787                        page_shift);
788             return;
789         }
790     }
791 
792     if (!QEMU_IS_ALIGNED(vst_addr, 1ull << page_shift)) {
793         xive_error(xive, "VST: %s table address 0x%"PRIx64" is not aligned with"
794                    " page shift %d", info->name, vst_addr, page_shift);
795         return;
796     }
797 
798     /* Record the table configuration (in SRAM on HW) */
799     xive->vsds[type][blk] = vsd;
800 
801     /* Now tune the models with the configuration provided by the FW */
802 
803     switch (type) {
804     case VST_TSEL_IVT:  /* Nothing to be done */
805         break;
806 
807     case VST_TSEL_EQDT:
808         /*
809          * Backing store pages for the END.
810          *
811          * If the table is direct, we can compute the number of PQ
812          * entries provisioned by FW (such as skiboot) and resize the
813          * END ESB window accordingly.
814          */
815         if (!(VSD_INDIRECT & vsd)) {
816             memory_region_set_size(&end_xsrc->esb_mmio, (vst_tsize / info->size)
817                                    * (1ull << xsrc->esb_shift));
818         }
819         memory_region_add_subregion(&xive->end_edt_mmio, 0,
820                                     &end_xsrc->esb_mmio);
821         break;
822 
823     case VST_TSEL_SBE:
824         /*
825          * Backing store pages for the source PQ bits. The model does
826          * not use these PQ bits backed in RAM because the XiveSource
827          * model has its own.
828          *
829          * If the table is direct, we can compute the number of PQ
830          * entries provisioned by FW (such as skiboot) and resize the
831          * ESB window accordingly.
832          */
833         if (!(VSD_INDIRECT & vsd)) {
834             memory_region_set_size(&xsrc->esb_mmio, vst_tsize * SBE_PER_BYTE
835                                    * (1ull << xsrc->esb_shift));
836         }
837         memory_region_add_subregion(&xive->ipi_edt_mmio, 0, &xsrc->esb_mmio);
838         break;
839 
840     case VST_TSEL_VPDT: /* Not modeled */
841     case VST_TSEL_IRQ:  /* Not modeled */
842         /*
843          * These tables contains the backing store pages for the
844          * interrupt fifos of the VC sub-engine in case of overflow.
845          */
846         break;
847 
848     default:
849         g_assert_not_reached();
850     }
851 }
852 
853 /*
854  * Both PC and VC sub-engines are configured as each use the Virtual
855  * Structure Tables : SBE, EAS, END and NVT.
856  */
pnv_xive_vst_set_data(PnvXive * xive,uint64_t vsd,bool pc_engine)857 static void pnv_xive_vst_set_data(PnvXive *xive, uint64_t vsd, bool pc_engine)
858 {
859     uint8_t mode = GETFIELD(VSD_MODE, vsd);
860     uint8_t type = GETFIELD(VST_TABLE_SELECT,
861                             xive->regs[VC_VSD_TABLE_ADDR >> 3]);
862     uint8_t blk = GETFIELD(VST_TABLE_BLOCK,
863                            xive->regs[VC_VSD_TABLE_ADDR >> 3]);
864     uint64_t vst_addr = vsd & VSD_ADDRESS_MASK;
865 
866     if (type > VST_TSEL_IRQ) {
867         xive_error(xive, "VST: invalid table type %d", type);
868         return;
869     }
870 
871     if (blk >= vst_infos[type].max_blocks) {
872         xive_error(xive, "VST: invalid block id %d for"
873                       " %s table", blk, vst_infos[type].name);
874         return;
875     }
876 
877     /*
878      * Only take the VC sub-engine configuration into account because
879      * the XiveRouter model combines both VC and PC sub-engines
880      */
881     if (pc_engine) {
882         return;
883     }
884 
885     if (!vst_addr) {
886         xive_error(xive, "VST: invalid %s table address", vst_infos[type].name);
887         return;
888     }
889 
890     switch (mode) {
891     case VSD_MODE_FORWARD:
892         xive->vsds[type][blk] = vsd;
893         break;
894 
895     case VSD_MODE_EXCLUSIVE:
896         pnv_xive_vst_set_exclusive(xive, type, blk, vsd);
897         break;
898 
899     default:
900         xive_error(xive, "VST: unsupported table mode %d", mode);
901         return;
902     }
903 }
904 
905 /*
906  * Interrupt controller MMIO region. The layout is compatible between
907  * 4K and 64K pages :
908  *
909  * Page 0           sub-engine BARs
910  *  0x000 - 0x3FF   IC registers
911  *  0x400 - 0x7FF   PC registers
912  *  0x800 - 0xFFF   VC registers
913  *
914  * Page 1           Notify page (writes only)
915  *  0x000 - 0x7FF   HW interrupt triggers (PSI, PHB)
916  *  0x800 - 0xFFF   forwards and syncs
917  *
918  * Page 2           LSI Trigger page (writes only) (not modeled)
919  * Page 3           LSI SB EOI page (reads only) (not modeled)
920  *
921  * Page 4-7         indirect TIMA
922  */
923 
924 /*
925  * IC - registers MMIO
926  */
pnv_xive_ic_reg_write(void * opaque,hwaddr offset,uint64_t val,unsigned size)927 static void pnv_xive_ic_reg_write(void *opaque, hwaddr offset,
928                                   uint64_t val, unsigned size)
929 {
930     PnvXive *xive = PNV_XIVE(opaque);
931     MemoryRegion *sysmem = get_system_memory();
932     uint32_t reg = offset >> 3;
933     bool is_chip0 = xive->chip->chip_id == 0;
934 
935     switch (offset) {
936 
937     /*
938      * XIVE CQ (PowerBus bridge) settings
939      */
940     case CQ_MSGSND:     /* msgsnd for doorbells */
941     case CQ_FIRMASK_OR: /* FIR error reporting */
942         break;
943     case CQ_PBI_CTL:
944         if (val & CQ_PBI_PC_64K) {
945             xive->pc_shift = 16;
946         }
947         if (val & CQ_PBI_VC_64K) {
948             xive->vc_shift = 16;
949         }
950         break;
951     case CQ_CFG_PB_GEN: /* PowerBus General Configuration */
952         /*
953          * TODO: CQ_INT_ADDR_OPT for 1-block-per-chip mode
954          */
955         break;
956 
957     /*
958      * XIVE Virtualization Controller settings
959      */
960     case VC_GLOBAL_CONFIG:
961         break;
962 
963     /*
964      * XIVE Presenter Controller settings
965      */
966     case PC_GLOBAL_CONFIG:
967         /*
968          * PC_GCONF_CHIPID_OVR
969          *   Overrides Int command Chip ID with the Chip ID field (DEBUG)
970          */
971         break;
972     case PC_TCTXT_CFG:
973         /*
974          * TODO: block group support
975          */
976         break;
977     case PC_TCTXT_TRACK:
978         /*
979          * PC_TCTXT_TRACK_EN:
980          *   enable block tracking and exchange of block ownership
981          *   information between Interrupt controllers
982          */
983         break;
984 
985     /*
986      * Misc settings
987      */
988     case VC_SBC_CONFIG: /* Store EOI configuration */
989         /*
990          * Configure store EOI if required by firmware (skiboot has removed
991          * support recently though)
992          */
993         if (val & (VC_SBC_CONF_CPLX_CIST | VC_SBC_CONF_CIST_BOTH)) {
994             xive->ipi_source.esb_flags |= XIVE_SRC_STORE_EOI;
995         }
996         break;
997 
998     case VC_EQC_CONFIG: /* TODO: silent escalation */
999     case VC_AIB_TX_ORDER_TAG2: /* relax ordering */
1000         break;
1001 
1002     /*
1003      * XIVE BAR settings (XSCOM only)
1004      */
1005     case CQ_RST_CTL:
1006         /* bit4: resets all BAR registers */
1007         break;
1008 
1009     case CQ_IC_BAR: /* IC BAR. 8 pages */
1010         xive->ic_shift = val & CQ_IC_BAR_64K ? 16 : 12;
1011         if (!(val & CQ_IC_BAR_VALID)) {
1012             xive->ic_base = 0;
1013             if (xive->regs[reg] & CQ_IC_BAR_VALID) {
1014                 memory_region_del_subregion(&xive->ic_mmio,
1015                                             &xive->ic_reg_mmio);
1016                 memory_region_del_subregion(&xive->ic_mmio,
1017                                             &xive->ic_notify_mmio);
1018                 memory_region_del_subregion(&xive->ic_mmio,
1019                                             &xive->ic_lsi_mmio);
1020                 memory_region_del_subregion(&xive->ic_mmio,
1021                                             &xive->tm_indirect_mmio);
1022 
1023                 memory_region_del_subregion(sysmem, &xive->ic_mmio);
1024             }
1025         } else {
1026             xive->ic_base = val & ~(CQ_IC_BAR_VALID | CQ_IC_BAR_64K);
1027             if (!(xive->regs[reg] & CQ_IC_BAR_VALID)) {
1028                 memory_region_add_subregion(sysmem, xive->ic_base,
1029                                             &xive->ic_mmio);
1030 
1031                 memory_region_add_subregion(&xive->ic_mmio,  0,
1032                                             &xive->ic_reg_mmio);
1033                 memory_region_add_subregion(&xive->ic_mmio,
1034                                             1ul << xive->ic_shift,
1035                                             &xive->ic_notify_mmio);
1036                 memory_region_add_subregion(&xive->ic_mmio,
1037                                             2ul << xive->ic_shift,
1038                                             &xive->ic_lsi_mmio);
1039                 memory_region_add_subregion(&xive->ic_mmio,
1040                                             4ull << xive->ic_shift,
1041                                             &xive->tm_indirect_mmio);
1042             }
1043         }
1044         break;
1045 
1046     case CQ_TM1_BAR: /* TM BAR. 4 pages. Map only once */
1047     case CQ_TM2_BAR: /* second TM BAR. for hotplug. Not modeled */
1048         xive->tm_shift = val & CQ_TM_BAR_64K ? 16 : 12;
1049         if (!(val & CQ_TM_BAR_VALID)) {
1050             xive->tm_base = 0;
1051             if (xive->regs[reg] & CQ_TM_BAR_VALID && is_chip0) {
1052                 memory_region_del_subregion(sysmem, &xive->tm_mmio);
1053             }
1054         } else {
1055             xive->tm_base = val & ~(CQ_TM_BAR_VALID | CQ_TM_BAR_64K);
1056             if (!(xive->regs[reg] & CQ_TM_BAR_VALID) && is_chip0) {
1057                 memory_region_add_subregion(sysmem, xive->tm_base,
1058                                             &xive->tm_mmio);
1059             }
1060         }
1061         break;
1062 
1063     case CQ_PC_BARM:
1064         xive->regs[reg] = val;
1065         memory_region_set_size(&xive->pc_mmio, pnv_xive_pc_size(xive));
1066         break;
1067     case CQ_PC_BAR: /* From 32M to 512G */
1068         if (!(val & CQ_PC_BAR_VALID)) {
1069             xive->pc_base = 0;
1070             if (xive->regs[reg] & CQ_PC_BAR_VALID) {
1071                 memory_region_del_subregion(sysmem, &xive->pc_mmio);
1072             }
1073         } else {
1074             xive->pc_base = val & ~(CQ_PC_BAR_VALID);
1075             if (!(xive->regs[reg] & CQ_PC_BAR_VALID)) {
1076                 memory_region_add_subregion(sysmem, xive->pc_base,
1077                                             &xive->pc_mmio);
1078             }
1079         }
1080         break;
1081 
1082     case CQ_VC_BARM:
1083         xive->regs[reg] = val;
1084         memory_region_set_size(&xive->vc_mmio, pnv_xive_vc_size(xive));
1085         break;
1086     case CQ_VC_BAR: /* From 64M to 4TB */
1087         if (!(val & CQ_VC_BAR_VALID)) {
1088             xive->vc_base = 0;
1089             if (xive->regs[reg] & CQ_VC_BAR_VALID) {
1090                 memory_region_del_subregion(sysmem, &xive->vc_mmio);
1091             }
1092         } else {
1093             xive->vc_base = val & ~(CQ_VC_BAR_VALID);
1094             if (!(xive->regs[reg] & CQ_VC_BAR_VALID)) {
1095                 memory_region_add_subregion(sysmem, xive->vc_base,
1096                                             &xive->vc_mmio);
1097             }
1098         }
1099         break;
1100 
1101     /*
1102      * XIVE Table settings.
1103      */
1104     case CQ_TAR: /* Table Address */
1105         break;
1106     case CQ_TDR: /* Table Data */
1107         pnv_xive_table_set_data(xive, val);
1108         break;
1109 
1110     /*
1111      * XIVE VC & PC Virtual Structure Table settings
1112      */
1113     case VC_VSD_TABLE_ADDR:
1114     case PC_VSD_TABLE_ADDR: /* Virtual table selector */
1115         break;
1116     case VC_VSD_TABLE_DATA: /* Virtual table setting */
1117     case PC_VSD_TABLE_DATA:
1118         pnv_xive_vst_set_data(xive, val, offset == PC_VSD_TABLE_DATA);
1119         break;
1120 
1121     /*
1122      * Interrupt fifo overflow in memory backing store (Not modeled)
1123      */
1124     case VC_IRQ_CONFIG_IPI:
1125     case VC_IRQ_CONFIG_HW:
1126     case VC_IRQ_CONFIG_CASCADE1:
1127     case VC_IRQ_CONFIG_CASCADE2:
1128     case VC_IRQ_CONFIG_REDIST:
1129     case VC_IRQ_CONFIG_IPI_CASC:
1130         break;
1131 
1132     /*
1133      * XIVE hardware thread enablement
1134      */
1135     case PC_THREAD_EN_REG0: /* Physical Thread Enable */
1136     case PC_THREAD_EN_REG1: /* Physical Thread Enable (fused core) */
1137         break;
1138 
1139     case PC_THREAD_EN_REG0_SET:
1140         xive->regs[PC_THREAD_EN_REG0 >> 3] |= val;
1141         break;
1142     case PC_THREAD_EN_REG1_SET:
1143         xive->regs[PC_THREAD_EN_REG1 >> 3] |= val;
1144         break;
1145     case PC_THREAD_EN_REG0_CLR:
1146         xive->regs[PC_THREAD_EN_REG0 >> 3] &= ~val;
1147         break;
1148     case PC_THREAD_EN_REG1_CLR:
1149         xive->regs[PC_THREAD_EN_REG1 >> 3] &= ~val;
1150         break;
1151 
1152     /*
1153      * Indirect TIMA access set up. Defines the PIR of the HW thread
1154      * to use.
1155      */
1156     case PC_TCTXT_INDIR0 ... PC_TCTXT_INDIR3:
1157         break;
1158 
1159     /*
1160      * XIVE PC & VC cache updates for EAS, NVT and END
1161      */
1162     case VC_IVC_SCRUB_MASK:
1163     case VC_IVC_SCRUB_TRIG:
1164         break;
1165 
1166     case VC_EQC_CWATCH_SPEC:
1167         val &= ~VC_EQC_CWATCH_CONFLICT; /* HW resets this bit */
1168         break;
1169     case VC_EQC_CWATCH_DAT1 ... VC_EQC_CWATCH_DAT3:
1170         break;
1171     case VC_EQC_CWATCH_DAT0:
1172         /* writing to DATA0 triggers the cache write */
1173         xive->regs[reg] = val;
1174         pnv_xive_end_update(xive);
1175         break;
1176     case VC_EQC_SCRUB_MASK:
1177     case VC_EQC_SCRUB_TRIG:
1178         /*
1179          * The scrubbing registers flush the cache in RAM and can also
1180          * invalidate.
1181          */
1182         break;
1183 
1184     case PC_VPC_CWATCH_SPEC:
1185         val &= ~PC_VPC_CWATCH_CONFLICT; /* HW resets this bit */
1186         break;
1187     case PC_VPC_CWATCH_DAT1 ... PC_VPC_CWATCH_DAT7:
1188         break;
1189     case PC_VPC_CWATCH_DAT0:
1190         /* writing to DATA0 triggers the cache write */
1191         xive->regs[reg] = val;
1192         pnv_xive_nvt_update(xive);
1193         break;
1194     case PC_VPC_SCRUB_MASK:
1195     case PC_VPC_SCRUB_TRIG:
1196         /*
1197          * The scrubbing registers flush the cache in RAM and can also
1198          * invalidate.
1199          */
1200         break;
1201 
1202 
1203     /*
1204      * XIVE PC & VC cache invalidation
1205      */
1206     case PC_AT_KILL:
1207         break;
1208     case VC_AT_MACRO_KILL:
1209         break;
1210     case PC_AT_KILL_MASK:
1211     case VC_AT_MACRO_KILL_MASK:
1212         break;
1213 
1214     default:
1215         xive_error(xive, "IC: invalid write to reg=0x%"HWADDR_PRIx, offset);
1216         return;
1217     }
1218 
1219     xive->regs[reg] = val;
1220 }
1221 
pnv_xive_ic_reg_read(void * opaque,hwaddr offset,unsigned size)1222 static uint64_t pnv_xive_ic_reg_read(void *opaque, hwaddr offset, unsigned size)
1223 {
1224     PnvXive *xive = PNV_XIVE(opaque);
1225     uint64_t val = 0;
1226     uint32_t reg = offset >> 3;
1227 
1228     switch (offset) {
1229     case CQ_CFG_PB_GEN:
1230     case CQ_IC_BAR:
1231     case CQ_TM1_BAR:
1232     case CQ_TM2_BAR:
1233     case CQ_PC_BAR:
1234     case CQ_PC_BARM:
1235     case CQ_VC_BAR:
1236     case CQ_VC_BARM:
1237     case CQ_TAR:
1238     case CQ_TDR:
1239     case CQ_PBI_CTL:
1240 
1241     case PC_TCTXT_CFG:
1242     case PC_TCTXT_TRACK:
1243     case PC_TCTXT_INDIR0:
1244     case PC_TCTXT_INDIR1:
1245     case PC_TCTXT_INDIR2:
1246     case PC_TCTXT_INDIR3:
1247     case PC_GLOBAL_CONFIG:
1248 
1249     case PC_VPC_SCRUB_MASK:
1250 
1251     case VC_GLOBAL_CONFIG:
1252     case VC_AIB_TX_ORDER_TAG2:
1253 
1254     case VC_IRQ_CONFIG_IPI:
1255     case VC_IRQ_CONFIG_HW:
1256     case VC_IRQ_CONFIG_CASCADE1:
1257     case VC_IRQ_CONFIG_CASCADE2:
1258     case VC_IRQ_CONFIG_REDIST:
1259     case VC_IRQ_CONFIG_IPI_CASC:
1260 
1261     case VC_EQC_SCRUB_MASK:
1262     case VC_IVC_SCRUB_MASK:
1263     case VC_SBC_CONFIG:
1264     case VC_AT_MACRO_KILL_MASK:
1265     case VC_VSD_TABLE_ADDR:
1266     case PC_VSD_TABLE_ADDR:
1267     case VC_VSD_TABLE_DATA:
1268     case PC_VSD_TABLE_DATA:
1269     case PC_THREAD_EN_REG0:
1270     case PC_THREAD_EN_REG1:
1271         val = xive->regs[reg];
1272         break;
1273 
1274     /*
1275      * XIVE hardware thread enablement
1276      */
1277     case PC_THREAD_EN_REG0_SET:
1278     case PC_THREAD_EN_REG0_CLR:
1279         val = xive->regs[PC_THREAD_EN_REG0 >> 3];
1280         break;
1281     case PC_THREAD_EN_REG1_SET:
1282     case PC_THREAD_EN_REG1_CLR:
1283         val = xive->regs[PC_THREAD_EN_REG1 >> 3];
1284         break;
1285 
1286     case CQ_MSGSND: /* Identifies which cores have msgsnd enabled. */
1287         val = 0xffffff0000000000;
1288         break;
1289 
1290     /*
1291      * XIVE PC & VC cache updates for EAS, NVT and END
1292      */
1293     case VC_EQC_CWATCH_SPEC:
1294         xive->regs[reg] = ~(VC_EQC_CWATCH_FULL | VC_EQC_CWATCH_CONFLICT);
1295         val = xive->regs[reg];
1296         break;
1297     case VC_EQC_CWATCH_DAT0:
1298         /*
1299          * Load DATA registers from cache with data requested by the
1300          * SPEC register
1301          */
1302         pnv_xive_end_cache_load(xive);
1303         val = xive->regs[reg];
1304         break;
1305     case VC_EQC_CWATCH_DAT1 ... VC_EQC_CWATCH_DAT3:
1306         val = xive->regs[reg];
1307         break;
1308 
1309     case PC_VPC_CWATCH_SPEC:
1310         xive->regs[reg] = ~(PC_VPC_CWATCH_FULL | PC_VPC_CWATCH_CONFLICT);
1311         val = xive->regs[reg];
1312         break;
1313     case PC_VPC_CWATCH_DAT0:
1314         /*
1315          * Load DATA registers from cache with data requested by the
1316          * SPEC register
1317          */
1318         pnv_xive_nvt_cache_load(xive);
1319         val = xive->regs[reg];
1320         break;
1321     case PC_VPC_CWATCH_DAT1 ... PC_VPC_CWATCH_DAT7:
1322         val = xive->regs[reg];
1323         break;
1324 
1325     case PC_VPC_SCRUB_TRIG:
1326     case VC_IVC_SCRUB_TRIG:
1327     case VC_EQC_SCRUB_TRIG:
1328         xive->regs[reg] &= ~VC_SCRUB_VALID;
1329         val = xive->regs[reg];
1330         break;
1331 
1332     /*
1333      * XIVE PC & VC cache invalidation
1334      */
1335     case PC_AT_KILL:
1336         xive->regs[reg] &= ~PC_AT_KILL_VALID;
1337         val = xive->regs[reg];
1338         break;
1339     case VC_AT_MACRO_KILL:
1340         xive->regs[reg] &= ~VC_KILL_VALID;
1341         val = xive->regs[reg];
1342         break;
1343 
1344     /*
1345      * XIVE synchronisation
1346      */
1347     case VC_EQC_CONFIG:
1348         val = VC_EQC_SYNC_MASK;
1349         break;
1350 
1351     default:
1352         xive_error(xive, "IC: invalid read reg=0x%"HWADDR_PRIx, offset);
1353     }
1354 
1355     return val;
1356 }
1357 
1358 static const MemoryRegionOps pnv_xive_ic_reg_ops = {
1359     .read = pnv_xive_ic_reg_read,
1360     .write = pnv_xive_ic_reg_write,
1361     .endianness = DEVICE_BIG_ENDIAN,
1362     .valid = {
1363         .min_access_size = 8,
1364         .max_access_size = 8,
1365     },
1366     .impl = {
1367         .min_access_size = 8,
1368         .max_access_size = 8,
1369     },
1370 };
1371 
1372 /*
1373  * IC - Notify MMIO port page (write only)
1374  */
1375 #define PNV_XIVE_FORWARD_IPI        0x800 /* Forward IPI */
1376 #define PNV_XIVE_FORWARD_HW         0x880 /* Forward HW */
1377 #define PNV_XIVE_FORWARD_OS_ESC     0x900 /* Forward OS escalation */
1378 #define PNV_XIVE_FORWARD_HW_ESC     0x980 /* Forward Hyp escalation */
1379 #define PNV_XIVE_FORWARD_REDIS      0xa00 /* Forward Redistribution */
1380 #define PNV_XIVE_RESERVED5          0xa80 /* Cache line 5 PowerBUS operation */
1381 #define PNV_XIVE_RESERVED6          0xb00 /* Cache line 6 PowerBUS operation */
1382 #define PNV_XIVE_RESERVED7          0xb80 /* Cache line 7 PowerBUS operation */
1383 
1384 /* VC synchronisation */
1385 #define PNV_XIVE_SYNC_IPI           0xc00 /* Sync IPI */
1386 #define PNV_XIVE_SYNC_HW            0xc80 /* Sync HW */
1387 #define PNV_XIVE_SYNC_OS_ESC        0xd00 /* Sync OS escalation */
1388 #define PNV_XIVE_SYNC_HW_ESC        0xd80 /* Sync Hyp escalation */
1389 #define PNV_XIVE_SYNC_REDIS         0xe00 /* Sync Redistribution */
1390 
1391 /* PC synchronisation */
1392 #define PNV_XIVE_SYNC_PULL          0xe80 /* Sync pull context */
1393 #define PNV_XIVE_SYNC_PUSH          0xf00 /* Sync push context */
1394 #define PNV_XIVE_SYNC_VPC           0xf80 /* Sync remove VPC store */
1395 
pnv_xive_end_notify(XiveRouter * xrtr,XiveEAS * eas)1396 static void pnv_xive_end_notify(XiveRouter *xrtr, XiveEAS *eas)
1397 {
1398     PnvXive *xive = PNV_XIVE(xrtr);
1399     uint8_t end_blk = xive_get_field64(EAS_END_BLOCK, eas->w);
1400     uint32_t end_idx = xive_get_field64(EAS_END_INDEX, eas->w);
1401     uint32_t end_data = xive_get_field64(EAS_END_DATA, eas->w);
1402     uint64_t end_vsd = xive->vsds[VST_TSEL_EQDT][end_blk];
1403 
1404     switch (GETFIELD(VSD_MODE, end_vsd)) {
1405     case VSD_MODE_EXCLUSIVE:
1406         /* Perform the END notification on the local IC. */
1407         xive_router_end_notify(xrtr, eas);
1408         break;
1409 
1410     case VSD_MODE_FORWARD: {
1411         MemTxResult result;
1412         uint64_t notif_port = end_vsd & VSD_ADDRESS_MASK;
1413         uint64_t data = XIVE_TRIGGER_END | XIVE_TRIGGER_PQ |
1414             be64_to_cpu(eas->w);
1415 
1416         /* Forward the store on the remote IC notify page. */
1417         address_space_stq_be(&address_space_memory, notif_port, data,
1418                              MEMTXATTRS_UNSPECIFIED, &result);
1419         if (result != MEMTX_OK) {
1420             xive_error(xive, "IC: Forward notif END %x/%x [%x] failed @%"
1421                        HWADDR_PRIx, end_blk, end_idx, end_data, notif_port);
1422             return;
1423         }
1424         break;
1425     }
1426 
1427     case VSD_MODE_INVALID:
1428     default:
1429         /* Set FIR */
1430         xive_error(xive, "IC: Invalid END VSD for block %x", end_blk);
1431         return;
1432     }
1433 }
1434 
1435 /*
1436  * The notify page can either be used to receive trigger events from
1437  * the HW controllers (PHB, PSI) or to reroute interrupts between
1438  * Interrupt controllers.
1439  */
pnv_xive_ic_hw_trigger(PnvXive * xive,hwaddr addr,uint64_t val)1440 static void pnv_xive_ic_hw_trigger(PnvXive *xive, hwaddr addr, uint64_t val)
1441 {
1442     uint8_t blk;
1443     uint32_t idx;
1444 
1445     trace_pnv_xive_ic_hw_trigger(addr, val);
1446 
1447     if (val & XIVE_TRIGGER_END) {
1448         val = cpu_to_be64(val);
1449         pnv_xive_end_notify(XIVE_ROUTER(xive), (XiveEAS *) &val);
1450         return;
1451     }
1452 
1453     /*
1454      * Forward the source event notification directly to the Router.
1455      * The source interrupt number should already be correctly encoded
1456      * with the chip block id by the sending device (PHB, PSI).
1457      */
1458     blk = XIVE_EAS_BLOCK(val);
1459     idx = XIVE_EAS_INDEX(val);
1460 
1461     xive_router_notify(XIVE_NOTIFIER(xive), XIVE_EAS(blk, idx),
1462                        !!(val & XIVE_TRIGGER_PQ));
1463 }
1464 
pnv_xive_ic_notify_write(void * opaque,hwaddr addr,uint64_t val,unsigned size)1465 static void pnv_xive_ic_notify_write(void *opaque, hwaddr addr, uint64_t val,
1466                                      unsigned size)
1467 {
1468     PnvXive *xive = PNV_XIVE(opaque);
1469 
1470     /* VC: HW triggers */
1471     switch (addr) {
1472     case 0x000 ... 0x7FF:
1473         pnv_xive_ic_hw_trigger(opaque, addr, val);
1474         break;
1475 
1476     /* VC: Forwarded IRQs */
1477     case PNV_XIVE_FORWARD_IPI:
1478     case PNV_XIVE_FORWARD_HW:
1479     case PNV_XIVE_FORWARD_OS_ESC:
1480     case PNV_XIVE_FORWARD_HW_ESC:
1481     case PNV_XIVE_FORWARD_REDIS:
1482         /* TODO: forwarded IRQs. Should be like HW triggers */
1483         xive_error(xive, "IC: forwarded at @0x%"HWADDR_PRIx" IRQ 0x%"PRIx64,
1484                    addr, val);
1485         break;
1486 
1487     /* VC syncs */
1488     case PNV_XIVE_SYNC_IPI:
1489     case PNV_XIVE_SYNC_HW:
1490     case PNV_XIVE_SYNC_OS_ESC:
1491     case PNV_XIVE_SYNC_HW_ESC:
1492     case PNV_XIVE_SYNC_REDIS:
1493         break;
1494 
1495     /* PC syncs */
1496     case PNV_XIVE_SYNC_PULL:
1497     case PNV_XIVE_SYNC_PUSH:
1498     case PNV_XIVE_SYNC_VPC:
1499         break;
1500 
1501     default:
1502         xive_error(xive, "IC: invalid notify write @%"HWADDR_PRIx, addr);
1503     }
1504 }
1505 
pnv_xive_ic_notify_read(void * opaque,hwaddr addr,unsigned size)1506 static uint64_t pnv_xive_ic_notify_read(void *opaque, hwaddr addr,
1507                                         unsigned size)
1508 {
1509     PnvXive *xive = PNV_XIVE(opaque);
1510 
1511     /* loads are invalid */
1512     xive_error(xive, "IC: invalid notify read @%"HWADDR_PRIx, addr);
1513     return -1;
1514 }
1515 
1516 static const MemoryRegionOps pnv_xive_ic_notify_ops = {
1517     .read = pnv_xive_ic_notify_read,
1518     .write = pnv_xive_ic_notify_write,
1519     .endianness = DEVICE_BIG_ENDIAN,
1520     .valid = {
1521         .min_access_size = 8,
1522         .max_access_size = 8,
1523     },
1524     .impl = {
1525         .min_access_size = 8,
1526         .max_access_size = 8,
1527     },
1528 };
1529 
1530 /*
1531  * IC - LSI MMIO handlers (not modeled)
1532  */
1533 
pnv_xive_ic_lsi_write(void * opaque,hwaddr addr,uint64_t val,unsigned size)1534 static void pnv_xive_ic_lsi_write(void *opaque, hwaddr addr,
1535                               uint64_t val, unsigned size)
1536 {
1537     PnvXive *xive = PNV_XIVE(opaque);
1538 
1539     xive_error(xive, "IC: LSI invalid write @%"HWADDR_PRIx, addr);
1540 }
1541 
pnv_xive_ic_lsi_read(void * opaque,hwaddr addr,unsigned size)1542 static uint64_t pnv_xive_ic_lsi_read(void *opaque, hwaddr addr, unsigned size)
1543 {
1544     PnvXive *xive = PNV_XIVE(opaque);
1545 
1546     xive_error(xive, "IC: LSI invalid read @%"HWADDR_PRIx, addr);
1547     return -1;
1548 }
1549 
1550 static const MemoryRegionOps pnv_xive_ic_lsi_ops = {
1551     .read = pnv_xive_ic_lsi_read,
1552     .write = pnv_xive_ic_lsi_write,
1553     .endianness = DEVICE_BIG_ENDIAN,
1554     .valid = {
1555         .min_access_size = 8,
1556         .max_access_size = 8,
1557     },
1558     .impl = {
1559         .min_access_size = 8,
1560         .max_access_size = 8,
1561     },
1562 };
1563 
1564 /*
1565  * IC - Indirect TIMA MMIO handlers
1566  */
1567 
1568 /*
1569  * When the TIMA is accessed from the indirect page, the thread id of
1570  * the target CPU is configured in the PC_TCTXT_INDIR0 register before
1571  * use. This is used for resets and for debug purpose also.
1572  */
pnv_xive_get_indirect_tctx(PnvXive * xive)1573 static XiveTCTX *pnv_xive_get_indirect_tctx(PnvXive *xive)
1574 {
1575     PnvChip *chip = xive->chip;
1576     uint64_t tctxt_indir = xive->regs[PC_TCTXT_INDIR0 >> 3];
1577     PowerPCCPU *cpu = NULL;
1578     int pir;
1579 
1580     if (!(tctxt_indir & PC_TCTXT_INDIR_VALID)) {
1581         xive_error(xive, "IC: no indirect TIMA access in progress");
1582         return NULL;
1583     }
1584 
1585     pir = (chip->chip_id << 8) | GETFIELD(PC_TCTXT_INDIR_THRDID, tctxt_indir);
1586     cpu = pnv_chip_find_cpu(chip, pir);
1587     if (!cpu) {
1588         xive_error(xive, "IC: invalid PIR %x for indirect access", pir);
1589         return NULL;
1590     }
1591 
1592     /* Check that HW thread is XIVE enabled */
1593     if (!pnv_xive_is_cpu_enabled(xive, cpu)) {
1594         xive_error(xive, "IC: CPU %x is not enabled", pir);
1595     }
1596 
1597     return XIVE_TCTX(pnv_cpu_state(cpu)->intc);
1598 }
1599 
xive_tm_indirect_write(void * opaque,hwaddr offset,uint64_t value,unsigned size)1600 static void xive_tm_indirect_write(void *opaque, hwaddr offset,
1601                                    uint64_t value, unsigned size)
1602 {
1603     XiveTCTX *tctx = pnv_xive_get_indirect_tctx(PNV_XIVE(opaque));
1604 
1605     xive_tctx_tm_write(XIVE_PRESENTER(opaque), tctx, offset, value, size);
1606 }
1607 
xive_tm_indirect_read(void * opaque,hwaddr offset,unsigned size)1608 static uint64_t xive_tm_indirect_read(void *opaque, hwaddr offset,
1609                                       unsigned size)
1610 {
1611     XiveTCTX *tctx = pnv_xive_get_indirect_tctx(PNV_XIVE(opaque));
1612 
1613     return xive_tctx_tm_read(XIVE_PRESENTER(opaque), tctx, offset, size);
1614 }
1615 
1616 static const MemoryRegionOps xive_tm_indirect_ops = {
1617     .read = xive_tm_indirect_read,
1618     .write = xive_tm_indirect_write,
1619     .endianness = DEVICE_BIG_ENDIAN,
1620     .valid = {
1621         .min_access_size = 1,
1622         .max_access_size = 8,
1623     },
1624     .impl = {
1625         .min_access_size = 1,
1626         .max_access_size = 8,
1627     },
1628 };
1629 
pnv_xive_tm_write(void * opaque,hwaddr offset,uint64_t value,unsigned size)1630 static void pnv_xive_tm_write(void *opaque, hwaddr offset,
1631                               uint64_t value, unsigned size)
1632 {
1633     PowerPCCPU *cpu = POWERPC_CPU(current_cpu);
1634     PnvXive *xive = pnv_xive_tm_get_xive(cpu);
1635     XiveTCTX *tctx = XIVE_TCTX(pnv_cpu_state(cpu)->intc);
1636 
1637     xive_tctx_tm_write(XIVE_PRESENTER(xive), tctx, offset, value, size);
1638 }
1639 
pnv_xive_tm_read(void * opaque,hwaddr offset,unsigned size)1640 static uint64_t pnv_xive_tm_read(void *opaque, hwaddr offset, unsigned size)
1641 {
1642     PowerPCCPU *cpu = POWERPC_CPU(current_cpu);
1643     PnvXive *xive = pnv_xive_tm_get_xive(cpu);
1644     XiveTCTX *tctx = XIVE_TCTX(pnv_cpu_state(cpu)->intc);
1645 
1646     return xive_tctx_tm_read(XIVE_PRESENTER(xive), tctx, offset, size);
1647 }
1648 
1649 const MemoryRegionOps pnv_xive_tm_ops = {
1650     .read = pnv_xive_tm_read,
1651     .write = pnv_xive_tm_write,
1652     .endianness = DEVICE_BIG_ENDIAN,
1653     .valid = {
1654         .min_access_size = 1,
1655         .max_access_size = 8,
1656     },
1657     .impl = {
1658         .min_access_size = 1,
1659         .max_access_size = 8,
1660     },
1661 };
1662 
1663 /*
1664  * Interrupt controller XSCOM region.
1665  */
pnv_xive_xscom_read(void * opaque,hwaddr addr,unsigned size)1666 static uint64_t pnv_xive_xscom_read(void *opaque, hwaddr addr, unsigned size)
1667 {
1668     switch (addr >> 3) {
1669     case X_VC_EQC_CONFIG:
1670         /* FIXME (skiboot): This is the only XSCOM load. Bizarre. */
1671         return VC_EQC_SYNC_MASK;
1672     default:
1673         return pnv_xive_ic_reg_read(opaque, addr, size);
1674     }
1675 }
1676 
pnv_xive_xscom_write(void * opaque,hwaddr addr,uint64_t val,unsigned size)1677 static void pnv_xive_xscom_write(void *opaque, hwaddr addr,
1678                                 uint64_t val, unsigned size)
1679 {
1680     pnv_xive_ic_reg_write(opaque, addr, val, size);
1681 }
1682 
1683 static const MemoryRegionOps pnv_xive_xscom_ops = {
1684     .read = pnv_xive_xscom_read,
1685     .write = pnv_xive_xscom_write,
1686     .endianness = DEVICE_BIG_ENDIAN,
1687     .valid = {
1688         .min_access_size = 8,
1689         .max_access_size = 8,
1690     },
1691     .impl = {
1692         .min_access_size = 8,
1693         .max_access_size = 8,
1694     }
1695 };
1696 
1697 /*
1698  * Virtualization Controller MMIO region containing the IPI and END ESB pages
1699  */
pnv_xive_vc_read(void * opaque,hwaddr offset,unsigned size)1700 static uint64_t pnv_xive_vc_read(void *opaque, hwaddr offset,
1701                                  unsigned size)
1702 {
1703     PnvXive *xive = PNV_XIVE(opaque);
1704     uint64_t edt_index = offset >> pnv_xive_edt_shift(xive);
1705     uint64_t edt_type = 0;
1706     uint64_t edt_offset;
1707     MemTxResult result;
1708     AddressSpace *edt_as = NULL;
1709     uint64_t ret = -1;
1710 
1711     if (edt_index < XIVE_TABLE_EDT_MAX) {
1712         edt_type = GETFIELD(CQ_TDR_EDT_TYPE, xive->edt[edt_index]);
1713     }
1714 
1715     switch (edt_type) {
1716     case CQ_TDR_EDT_IPI:
1717         edt_as = &xive->ipi_as;
1718         break;
1719     case CQ_TDR_EDT_EQ:
1720         edt_as = &xive->end_as;
1721         break;
1722     default:
1723         xive_error(xive, "VC: invalid EDT type for read @%"HWADDR_PRIx, offset);
1724         return -1;
1725     }
1726 
1727     /* Remap the offset for the targeted address space */
1728     edt_offset = pnv_xive_edt_offset(xive, offset, edt_type);
1729 
1730     ret = address_space_ldq(edt_as, edt_offset, MEMTXATTRS_UNSPECIFIED,
1731                             &result);
1732 
1733     if (result != MEMTX_OK) {
1734         xive_error(xive, "VC: %s read failed at @0x%"HWADDR_PRIx " -> @0x%"
1735                    HWADDR_PRIx, edt_type == CQ_TDR_EDT_IPI ? "IPI" : "END",
1736                    offset, edt_offset);
1737         return -1;
1738     }
1739 
1740     return ret;
1741 }
1742 
pnv_xive_vc_write(void * opaque,hwaddr offset,uint64_t val,unsigned size)1743 static void pnv_xive_vc_write(void *opaque, hwaddr offset,
1744                               uint64_t val, unsigned size)
1745 {
1746     PnvXive *xive = PNV_XIVE(opaque);
1747     uint64_t edt_index = offset >> pnv_xive_edt_shift(xive);
1748     uint64_t edt_type = 0;
1749     uint64_t edt_offset;
1750     MemTxResult result;
1751     AddressSpace *edt_as = NULL;
1752 
1753     if (edt_index < XIVE_TABLE_EDT_MAX) {
1754         edt_type = GETFIELD(CQ_TDR_EDT_TYPE, xive->edt[edt_index]);
1755     }
1756 
1757     switch (edt_type) {
1758     case CQ_TDR_EDT_IPI:
1759         edt_as = &xive->ipi_as;
1760         break;
1761     case CQ_TDR_EDT_EQ:
1762         edt_as = &xive->end_as;
1763         break;
1764     default:
1765         xive_error(xive, "VC: invalid EDT type for write @%"HWADDR_PRIx,
1766                    offset);
1767         return;
1768     }
1769 
1770     /* Remap the offset for the targeted address space */
1771     edt_offset = pnv_xive_edt_offset(xive, offset, edt_type);
1772 
1773     address_space_stq(edt_as, edt_offset, val, MEMTXATTRS_UNSPECIFIED, &result);
1774     if (result != MEMTX_OK) {
1775         xive_error(xive, "VC: write failed at @0x%"HWADDR_PRIx, edt_offset);
1776     }
1777 }
1778 
1779 static const MemoryRegionOps pnv_xive_vc_ops = {
1780     .read = pnv_xive_vc_read,
1781     .write = pnv_xive_vc_write,
1782     .endianness = DEVICE_BIG_ENDIAN,
1783     .valid = {
1784         .min_access_size = 8,
1785         .max_access_size = 8,
1786     },
1787     .impl = {
1788         .min_access_size = 8,
1789         .max_access_size = 8,
1790     },
1791 };
1792 
1793 /*
1794  * Presenter Controller MMIO region. Points to the NVT sets.
1795  *
1796  * HW implements all possible mem ops to the underlying NVT structure
1797  * but QEMU does not need to be so precise. The model implementation
1798  * simply returns the RAM address of the NVT structure which is then
1799  * used by pnv_xive_vst_write/read to perform the RAM operation.
1800  */
pnv_xive_pc_read(void * opaque,hwaddr offset,unsigned size)1801 static uint64_t pnv_xive_pc_read(void *opaque, hwaddr offset, unsigned size)
1802 {
1803     PnvXive *xive = PNV_XIVE(opaque);
1804     uint32_t nvt_idx = offset >> xive->pc_shift;
1805     uint8_t blk = pnv_xive_block_id(xive); /* TODO: VDT -> block xlate */
1806 
1807     return pnv_xive_vst_addr(xive, VST_TSEL_VPDT, blk, nvt_idx);
1808 }
1809 
pnv_xive_pc_write(void * opaque,hwaddr addr,uint64_t value,unsigned size)1810 static void pnv_xive_pc_write(void *opaque, hwaddr addr,
1811                               uint64_t value, unsigned size)
1812 {
1813     PnvXive *xive = PNV_XIVE(opaque);
1814 
1815     xive_error(xive, "PC: invalid write to VC @%"HWADDR_PRIx, addr);
1816 }
1817 
1818 static const MemoryRegionOps pnv_xive_pc_ops = {
1819     .read = pnv_xive_pc_read,
1820     .write = pnv_xive_pc_write,
1821     .endianness = DEVICE_BIG_ENDIAN,
1822     .valid = {
1823         .min_access_size = 8,
1824         .max_access_size = 8,
1825     },
1826     .impl = {
1827         .min_access_size = 8,
1828         .max_access_size = 8,
1829     },
1830 };
1831 
xive_nvt_pic_print_info(XiveNVT * nvt,uint32_t nvt_idx,GString * buf)1832 static void xive_nvt_pic_print_info(XiveNVT *nvt, uint32_t nvt_idx,
1833                                     GString *buf)
1834 {
1835     uint8_t  eq_blk = xive_get_field32(NVT_W1_EQ_BLOCK, nvt->w1);
1836     uint32_t eq_idx = xive_get_field32(NVT_W1_EQ_INDEX, nvt->w1);
1837 
1838     if (!xive_nvt_is_valid(nvt)) {
1839         return;
1840     }
1841 
1842     g_string_append_printf(buf, "  %08x end:%02x/%04x IPB:%02x\n",
1843                            nvt_idx, eq_blk, eq_idx,
1844                            xive_get_field32(NVT_W4_IPB, nvt->w4));
1845 }
1846 
pnv_xive_pic_print_info(PnvXive * xive,GString * buf)1847 void pnv_xive_pic_print_info(PnvXive *xive, GString *buf)
1848 {
1849     XiveRouter *xrtr = XIVE_ROUTER(xive);
1850     uint8_t blk = pnv_xive_block_id(xive);
1851     uint8_t chip_id = xive->chip->chip_id;
1852     uint32_t srcno0 = XIVE_EAS(blk, 0);
1853     uint32_t nr_ipis = pnv_xive_nr_ipis(xive, blk);
1854     XiveEAS eas;
1855     XiveEND end;
1856     XiveNVT nvt;
1857     int i;
1858     uint64_t xive_nvt_per_subpage;
1859 
1860     g_string_append_printf(buf, "XIVE[%x] #%d Source %08x .. %08x\n",
1861                            chip_id, blk, srcno0, srcno0 + nr_ipis - 1);
1862     xive_source_pic_print_info(&xive->ipi_source, srcno0, buf);
1863 
1864     g_string_append_printf(buf, "XIVE[%x] #%d EAT %08x .. %08x\n",
1865                            chip_id, blk, srcno0, srcno0 + nr_ipis - 1);
1866     for (i = 0; i < nr_ipis; i++) {
1867         if (xive_router_get_eas(xrtr, blk, i, &eas)) {
1868             break;
1869         }
1870         if (!xive_eas_is_masked(&eas)) {
1871             xive_eas_pic_print_info(&eas, i, buf);
1872         }
1873     }
1874 
1875     g_string_append_printf(buf, "XIVE[%x] #%d ENDT\n", chip_id, blk);
1876     i = 0;
1877     while (!xive_router_get_end(xrtr, blk, i, &end)) {
1878         xive_end_pic_print_info(&end, i++, buf);
1879     }
1880 
1881     g_string_append_printf(buf, "XIVE[%x] #%d END Escalation EAT\n",
1882                            chip_id, blk);
1883     i = 0;
1884     while (!xive_router_get_end(xrtr, blk, i, &end)) {
1885         xive_end_eas_pic_print_info(&end, i++, buf);
1886     }
1887 
1888     g_string_append_printf(buf, "XIVE[%x] #%d NVTT %08x .. %08x\n",
1889                            chip_id, blk, 0, XIVE_NVT_COUNT - 1);
1890     xive_nvt_per_subpage = pnv_xive_vst_per_subpage(xive, VST_TSEL_VPDT);
1891     for (i = 0; i < XIVE_NVT_COUNT; i += xive_nvt_per_subpage) {
1892         while (!xive_router_get_nvt(xrtr, blk, i, &nvt)) {
1893             xive_nvt_pic_print_info(&nvt, i++, buf);
1894         }
1895     }
1896 }
1897 
pnv_xive_reset(void * dev)1898 static void pnv_xive_reset(void *dev)
1899 {
1900     PnvXive *xive = PNV_XIVE(dev);
1901     XiveSource *xsrc = &xive->ipi_source;
1902     XiveENDSource *end_xsrc = &xive->end_source;
1903 
1904     /* Default page size (Should be changed at runtime to 64k) */
1905     xive->ic_shift = xive->vc_shift = xive->pc_shift = 12;
1906 
1907     /* Clear subregions */
1908     if (memory_region_is_mapped(&xsrc->esb_mmio)) {
1909         memory_region_del_subregion(&xive->ipi_edt_mmio, &xsrc->esb_mmio);
1910     }
1911 
1912     if (memory_region_is_mapped(&xive->ipi_edt_mmio)) {
1913         memory_region_del_subregion(&xive->ipi_mmio, &xive->ipi_edt_mmio);
1914     }
1915 
1916     if (memory_region_is_mapped(&end_xsrc->esb_mmio)) {
1917         memory_region_del_subregion(&xive->end_edt_mmio, &end_xsrc->esb_mmio);
1918     }
1919 
1920     if (memory_region_is_mapped(&xive->end_edt_mmio)) {
1921         memory_region_del_subregion(&xive->end_mmio, &xive->end_edt_mmio);
1922     }
1923 }
1924 
pnv_xive_init(Object * obj)1925 static void pnv_xive_init(Object *obj)
1926 {
1927     PnvXive *xive = PNV_XIVE(obj);
1928 
1929     object_initialize_child(obj, "ipi_source", &xive->ipi_source,
1930                             TYPE_XIVE_SOURCE);
1931     object_initialize_child(obj, "end_source", &xive->end_source,
1932                             TYPE_XIVE_END_SOURCE);
1933 }
1934 
1935 /*
1936  *  Maximum number of IRQs and ENDs supported by HW
1937  */
1938 #define PNV_XIVE_NR_IRQS (PNV9_XIVE_VC_SIZE / (1ull << XIVE_ESB_64K_2PAGE))
1939 #define PNV_XIVE_NR_ENDS (PNV9_XIVE_VC_SIZE / (1ull << XIVE_ESB_64K_2PAGE))
1940 
pnv_xive_realize(DeviceState * dev,Error ** errp)1941 static void pnv_xive_realize(DeviceState *dev, Error **errp)
1942 {
1943     PnvXive *xive = PNV_XIVE(dev);
1944     PnvXiveClass *pxc = PNV_XIVE_GET_CLASS(dev);
1945     XiveSource *xsrc = &xive->ipi_source;
1946     XiveENDSource *end_xsrc = &xive->end_source;
1947     Error *local_err = NULL;
1948 
1949     pxc->parent_realize(dev, &local_err);
1950     if (local_err) {
1951         error_propagate(errp, local_err);
1952         return;
1953     }
1954 
1955     assert(xive->chip);
1956 
1957     /*
1958      * The XiveSource and XiveENDSource objects are realized with the
1959      * maximum allowed HW configuration. The ESB MMIO regions will be
1960      * resized dynamically when the controller is configured by the FW
1961      * to limit accesses to resources not provisioned.
1962      */
1963     object_property_set_int(OBJECT(xsrc), "nr-irqs", PNV_XIVE_NR_IRQS,
1964                             &error_fatal);
1965     object_property_set_link(OBJECT(xsrc), "xive", OBJECT(xive), &error_abort);
1966     if (!qdev_realize(DEVICE(xsrc), NULL, errp)) {
1967         return;
1968     }
1969 
1970     object_property_set_int(OBJECT(end_xsrc), "nr-ends", PNV_XIVE_NR_ENDS,
1971                             &error_fatal);
1972     object_property_set_link(OBJECT(end_xsrc), "xive", OBJECT(xive),
1973                              &error_abort);
1974     if (!qdev_realize(DEVICE(end_xsrc), NULL, errp)) {
1975         return;
1976     }
1977 
1978     /* Default page size. Generally changed at runtime to 64k */
1979     xive->ic_shift = xive->vc_shift = xive->pc_shift = 12;
1980 
1981     /* XSCOM region, used for initial configuration of the BARs */
1982     memory_region_init_io(&xive->xscom_regs, OBJECT(dev), &pnv_xive_xscom_ops,
1983                           xive, "xscom-xive", PNV9_XSCOM_XIVE_SIZE << 3);
1984 
1985     /* Interrupt controller MMIO regions */
1986     memory_region_init(&xive->ic_mmio, OBJECT(dev), "xive-ic",
1987                        PNV9_XIVE_IC_SIZE);
1988 
1989     memory_region_init_io(&xive->ic_reg_mmio, OBJECT(dev), &pnv_xive_ic_reg_ops,
1990                           xive, "xive-ic-reg", 1 << xive->ic_shift);
1991     memory_region_init_io(&xive->ic_notify_mmio, OBJECT(dev),
1992                           &pnv_xive_ic_notify_ops,
1993                           xive, "xive-ic-notify", 1 << xive->ic_shift);
1994     xive->ic_notify_mmio.disable_reentrancy_guard = true;
1995 
1996     /* The Pervasive LSI trigger and EOI pages (not modeled) */
1997     memory_region_init_io(&xive->ic_lsi_mmio, OBJECT(dev), &pnv_xive_ic_lsi_ops,
1998                           xive, "xive-ic-lsi", 2 << xive->ic_shift);
1999 
2000     /* Thread Interrupt Management Area (Indirect) */
2001     memory_region_init_io(&xive->tm_indirect_mmio, OBJECT(dev),
2002                           &xive_tm_indirect_ops,
2003                           xive, "xive-tima-indirect", PNV9_XIVE_TM_SIZE);
2004     /*
2005      * Overall Virtualization Controller MMIO region containing the
2006      * IPI ESB pages and END ESB pages. The layout is defined by the
2007      * EDT "Domain table" and the accesses are dispatched using
2008      * address spaces for each.
2009      */
2010     memory_region_init_io(&xive->vc_mmio, OBJECT(xive), &pnv_xive_vc_ops, xive,
2011                           "xive-vc", PNV9_XIVE_VC_SIZE);
2012 
2013     memory_region_init(&xive->ipi_mmio, OBJECT(xive), "xive-vc-ipi",
2014                        PNV9_XIVE_VC_SIZE);
2015     address_space_init(&xive->ipi_as, &xive->ipi_mmio, "xive-vc-ipi");
2016     memory_region_init(&xive->end_mmio, OBJECT(xive), "xive-vc-end",
2017                        PNV9_XIVE_VC_SIZE);
2018     address_space_init(&xive->end_as, &xive->end_mmio, "xive-vc-end");
2019 
2020     /*
2021      * The MMIO windows exposing the IPI ESBs and the END ESBs in the
2022      * VC region. Their size is configured by the FW in the EDT table.
2023      */
2024     memory_region_init(&xive->ipi_edt_mmio, OBJECT(xive), "xive-vc-ipi-edt", 0);
2025     memory_region_init(&xive->end_edt_mmio, OBJECT(xive), "xive-vc-end-edt", 0);
2026 
2027     /* Presenter Controller MMIO region (not modeled) */
2028     memory_region_init_io(&xive->pc_mmio, OBJECT(xive), &pnv_xive_pc_ops, xive,
2029                           "xive-pc", PNV9_XIVE_PC_SIZE);
2030     xive->pc_mmio.disable_reentrancy_guard = true;
2031 
2032     /* Thread Interrupt Management Area (Direct) */
2033     memory_region_init_io(&xive->tm_mmio, OBJECT(xive), &pnv_xive_tm_ops,
2034                           xive, "xive-tima", PNV9_XIVE_TM_SIZE);
2035 
2036     qemu_register_reset(pnv_xive_reset, dev);
2037 }
2038 
pnv_xive_dt_xscom(PnvXScomInterface * dev,void * fdt,int xscom_offset)2039 static int pnv_xive_dt_xscom(PnvXScomInterface *dev, void *fdt,
2040                              int xscom_offset)
2041 {
2042     const char compat[] = "ibm,power9-xive-x";
2043     char *name;
2044     int offset;
2045     uint32_t lpc_pcba = PNV9_XSCOM_XIVE_BASE;
2046     uint32_t reg[] = {
2047         cpu_to_be32(lpc_pcba),
2048         cpu_to_be32(PNV9_XSCOM_XIVE_SIZE)
2049     };
2050 
2051     name = g_strdup_printf("xive@%x", lpc_pcba);
2052     offset = fdt_add_subnode(fdt, xscom_offset, name);
2053     _FDT(offset);
2054     g_free(name);
2055 
2056     _FDT((fdt_setprop(fdt, offset, "reg", reg, sizeof(reg))));
2057     _FDT((fdt_setprop(fdt, offset, "compatible", compat,
2058                       sizeof(compat))));
2059     return 0;
2060 }
2061 
2062 static const Property pnv_xive_properties[] = {
2063     DEFINE_PROP_UINT64("ic-bar", PnvXive, ic_base, 0),
2064     DEFINE_PROP_UINT64("vc-bar", PnvXive, vc_base, 0),
2065     DEFINE_PROP_UINT64("pc-bar", PnvXive, pc_base, 0),
2066     DEFINE_PROP_UINT64("tm-bar", PnvXive, tm_base, 0),
2067     /* The PnvChip id identifies the XIVE interrupt controller. */
2068     DEFINE_PROP_LINK("chip", PnvXive, chip, TYPE_PNV_CHIP, PnvChip *),
2069 };
2070 
pnv_xive_class_init(ObjectClass * klass,const void * data)2071 static void pnv_xive_class_init(ObjectClass *klass, const void *data)
2072 {
2073     DeviceClass *dc = DEVICE_CLASS(klass);
2074     PnvXScomInterfaceClass *xdc = PNV_XSCOM_INTERFACE_CLASS(klass);
2075     XiveRouterClass *xrc = XIVE_ROUTER_CLASS(klass);
2076     XiveNotifierClass *xnc = XIVE_NOTIFIER_CLASS(klass);
2077     XivePresenterClass *xpc = XIVE_PRESENTER_CLASS(klass);
2078     PnvXiveClass *pxc = PNV_XIVE_CLASS(klass);
2079 
2080     xdc->dt_xscom = pnv_xive_dt_xscom;
2081 
2082     dc->desc = "PowerNV XIVE Interrupt Controller";
2083     device_class_set_parent_realize(dc, pnv_xive_realize, &pxc->parent_realize);
2084     dc->realize = pnv_xive_realize;
2085     device_class_set_props(dc, pnv_xive_properties);
2086 
2087     xrc->get_eas = pnv_xive_get_eas;
2088     xrc->get_pq = pnv_xive_get_pq;
2089     xrc->set_pq = pnv_xive_set_pq;
2090     xrc->get_end = pnv_xive_get_end;
2091     xrc->write_end = pnv_xive_write_end;
2092     xrc->get_nvt = pnv_xive_get_nvt;
2093     xrc->write_nvt = pnv_xive_write_nvt;
2094     xrc->get_block_id = pnv_xive_get_block_id;
2095     xrc->end_notify = pnv_xive_end_notify;
2096 
2097     xnc->notify = pnv_xive_notify;
2098     xpc->match_nvt  = pnv_xive_match_nvt;
2099     xpc->get_config = pnv_xive_presenter_get_config;
2100 };
2101 
2102 static const TypeInfo pnv_xive_info = {
2103     .name          = TYPE_PNV_XIVE,
2104     .parent        = TYPE_XIVE_ROUTER,
2105     .instance_init = pnv_xive_init,
2106     .instance_size = sizeof(PnvXive),
2107     .class_init    = pnv_xive_class_init,
2108     .class_size    = sizeof(PnvXiveClass),
2109     .interfaces    = (const InterfaceInfo[]) {
2110         { TYPE_PNV_XSCOM_INTERFACE },
2111         { }
2112     }
2113 };
2114 
pnv_xive_register_types(void)2115 static void pnv_xive_register_types(void)
2116 {
2117     type_register_static(&pnv_xive_info);
2118 }
2119 
2120 type_init(pnv_xive_register_types)
2121