xref: /qemu/hw/intc/arm_gicv3_common.c (revision 2e5b09fd0e766434962327db4678ce1cda0c7241)
1ff8f06eeSShlomo Pongratz /*
2ff8f06eeSShlomo Pongratz  * ARM GICv3 support - common bits of emulated and KVM kernel model
3ff8f06eeSShlomo Pongratz  *
4ff8f06eeSShlomo Pongratz  * Copyright (c) 2012 Linaro Limited
5ff8f06eeSShlomo Pongratz  * Copyright (c) 2015 Huawei.
607e2034dSPavel Fedin  * Copyright (c) 2015 Samsung Electronics Co., Ltd.
7ff8f06eeSShlomo Pongratz  * Written by Peter Maydell
807e2034dSPavel Fedin  * Reworked for GICv3 by Shlomo Pongratz and Pavel Fedin
9ff8f06eeSShlomo Pongratz  *
10ff8f06eeSShlomo Pongratz  * This program is free software; you can redistribute it and/or modify
11ff8f06eeSShlomo Pongratz  * it under the terms of the GNU General Public License as published by
12ff8f06eeSShlomo Pongratz  * the Free Software Foundation, either version 2 of the License, or
13ff8f06eeSShlomo Pongratz  * (at your option) any later version.
14ff8f06eeSShlomo Pongratz  *
15ff8f06eeSShlomo Pongratz  * This program is distributed in the hope that it will be useful,
16ff8f06eeSShlomo Pongratz  * but WITHOUT ANY WARRANTY; without even the implied warranty of
17ff8f06eeSShlomo Pongratz  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
18ff8f06eeSShlomo Pongratz  * GNU General Public License for more details.
19ff8f06eeSShlomo Pongratz  *
20ff8f06eeSShlomo Pongratz  * You should have received a copy of the GNU General Public License along
21ff8f06eeSShlomo Pongratz  * with this program; if not, see <http://www.gnu.org/licenses/>.
22ff8f06eeSShlomo Pongratz  */
23ff8f06eeSShlomo Pongratz 
248ef94f0bSPeter Maydell #include "qemu/osdep.h"
25da34e65cSMarkus Armbruster #include "qapi/error.h"
260b8fa32fSMarkus Armbruster #include "qemu/module.h"
27*2e5b09fdSMarkus Armbruster #include "hw/core/cpu.h"
28ff8f06eeSShlomo Pongratz #include "hw/intc/arm_gicv3_common.h"
29a27bd6c7SMarkus Armbruster #include "hw/qdev-properties.h"
30d6454270SMarkus Armbruster #include "migration/vmstate.h"
3107e2034dSPavel Fedin #include "gicv3_internal.h"
3207e2034dSPavel Fedin #include "hw/arm/linux-boot-if.h"
33910e2048SShannon Zhao #include "sysemu/kvm.h"
34ff8f06eeSShlomo Pongratz 
35341823c1SPeter Maydell 
36341823c1SPeter Maydell static void gicv3_gicd_no_migration_shift_bug_post_load(GICv3State *cs)
37341823c1SPeter Maydell {
38341823c1SPeter Maydell     if (cs->gicd_no_migration_shift_bug) {
39341823c1SPeter Maydell         return;
40341823c1SPeter Maydell     }
41341823c1SPeter Maydell 
42341823c1SPeter Maydell     /* Older versions of QEMU had a bug in the handling of state save/restore
43341823c1SPeter Maydell      * to the KVM GICv3: they got the offset in the bitmap arrays wrong,
44341823c1SPeter Maydell      * so that instead of the data for external interrupts 32 and up
45341823c1SPeter Maydell      * starting at bit position 32 in the bitmap, it started at bit
46341823c1SPeter Maydell      * position 64. If we're receiving data from a QEMU with that bug,
47341823c1SPeter Maydell      * we must move the data down into the right place.
48341823c1SPeter Maydell      */
49341823c1SPeter Maydell     memmove(cs->group, (uint8_t *)cs->group + GIC_INTERNAL / 8,
50341823c1SPeter Maydell             sizeof(cs->group) - GIC_INTERNAL / 8);
51341823c1SPeter Maydell     memmove(cs->grpmod, (uint8_t *)cs->grpmod + GIC_INTERNAL / 8,
52341823c1SPeter Maydell             sizeof(cs->grpmod) - GIC_INTERNAL / 8);
53341823c1SPeter Maydell     memmove(cs->enabled, (uint8_t *)cs->enabled + GIC_INTERNAL / 8,
54341823c1SPeter Maydell             sizeof(cs->enabled) - GIC_INTERNAL / 8);
55341823c1SPeter Maydell     memmove(cs->pending, (uint8_t *)cs->pending + GIC_INTERNAL / 8,
56341823c1SPeter Maydell             sizeof(cs->pending) - GIC_INTERNAL / 8);
57341823c1SPeter Maydell     memmove(cs->active, (uint8_t *)cs->active + GIC_INTERNAL / 8,
58341823c1SPeter Maydell             sizeof(cs->active) - GIC_INTERNAL / 8);
59341823c1SPeter Maydell     memmove(cs->edge_trigger, (uint8_t *)cs->edge_trigger + GIC_INTERNAL / 8,
60341823c1SPeter Maydell             sizeof(cs->edge_trigger) - GIC_INTERNAL / 8);
61341823c1SPeter Maydell 
62341823c1SPeter Maydell     /*
63341823c1SPeter Maydell      * While this new version QEMU doesn't have this kind of bug as we fix it,
64341823c1SPeter Maydell      * so it needs to set the flag to true to indicate that and it's necessary
65341823c1SPeter Maydell      * for next migration to work from this new version QEMU.
66341823c1SPeter Maydell      */
67341823c1SPeter Maydell     cs->gicd_no_migration_shift_bug = true;
68341823c1SPeter Maydell }
69341823c1SPeter Maydell 
7044b1ff31SDr. David Alan Gilbert static int gicv3_pre_save(void *opaque)
71ff8f06eeSShlomo Pongratz {
72ff8f06eeSShlomo Pongratz     GICv3State *s = (GICv3State *)opaque;
73ff8f06eeSShlomo Pongratz     ARMGICv3CommonClass *c = ARM_GICV3_COMMON_GET_CLASS(s);
74ff8f06eeSShlomo Pongratz 
75ff8f06eeSShlomo Pongratz     if (c->pre_save) {
76ff8f06eeSShlomo Pongratz         c->pre_save(s);
77ff8f06eeSShlomo Pongratz     }
7844b1ff31SDr. David Alan Gilbert 
7944b1ff31SDr. David Alan Gilbert     return 0;
80ff8f06eeSShlomo Pongratz }
81ff8f06eeSShlomo Pongratz 
82ff8f06eeSShlomo Pongratz static int gicv3_post_load(void *opaque, int version_id)
83ff8f06eeSShlomo Pongratz {
84ff8f06eeSShlomo Pongratz     GICv3State *s = (GICv3State *)opaque;
85ff8f06eeSShlomo Pongratz     ARMGICv3CommonClass *c = ARM_GICV3_COMMON_GET_CLASS(s);
86ff8f06eeSShlomo Pongratz 
87341823c1SPeter Maydell     gicv3_gicd_no_migration_shift_bug_post_load(s);
88341823c1SPeter Maydell 
89ff8f06eeSShlomo Pongratz     if (c->post_load) {
90ff8f06eeSShlomo Pongratz         c->post_load(s);
91ff8f06eeSShlomo Pongratz     }
92ff8f06eeSShlomo Pongratz     return 0;
93ff8f06eeSShlomo Pongratz }
94ff8f06eeSShlomo Pongratz 
954eb833b5SPeter Maydell static bool virt_state_needed(void *opaque)
964eb833b5SPeter Maydell {
974eb833b5SPeter Maydell     GICv3CPUState *cs = opaque;
984eb833b5SPeter Maydell 
994eb833b5SPeter Maydell     return cs->num_list_regs != 0;
1004eb833b5SPeter Maydell }
1014eb833b5SPeter Maydell 
1024eb833b5SPeter Maydell static const VMStateDescription vmstate_gicv3_cpu_virt = {
1034eb833b5SPeter Maydell     .name = "arm_gicv3_cpu/virt",
1044eb833b5SPeter Maydell     .version_id = 1,
1054eb833b5SPeter Maydell     .minimum_version_id = 1,
1064eb833b5SPeter Maydell     .needed = virt_state_needed,
1074eb833b5SPeter Maydell     .fields = (VMStateField[]) {
1084eb833b5SPeter Maydell         VMSTATE_UINT64_2DARRAY(ich_apr, GICv3CPUState, 3, 4),
1094eb833b5SPeter Maydell         VMSTATE_UINT64(ich_hcr_el2, GICv3CPUState),
1104eb833b5SPeter Maydell         VMSTATE_UINT64_ARRAY(ich_lr_el2, GICv3CPUState, GICV3_LR_MAX),
1114eb833b5SPeter Maydell         VMSTATE_UINT64(ich_vmcr_el2, GICv3CPUState),
1124eb833b5SPeter Maydell         VMSTATE_END_OF_LIST()
1134eb833b5SPeter Maydell     }
1144eb833b5SPeter Maydell };
1154eb833b5SPeter Maydell 
116326049ccSPeter Maydell static int vmstate_gicv3_cpu_pre_load(void *opaque)
1176692aac4SVijaya Kumar K {
1186692aac4SVijaya Kumar K     GICv3CPUState *cs = opaque;
1196692aac4SVijaya Kumar K 
1206692aac4SVijaya Kumar K    /*
1216692aac4SVijaya Kumar K     * If the sre_el1 subsection is not transferred this
1226692aac4SVijaya Kumar K     * means SRE_EL1 is 0x7 (which might not be the same as
1236692aac4SVijaya Kumar K     * our reset value).
1246692aac4SVijaya Kumar K     */
1256692aac4SVijaya Kumar K     cs->icc_sre_el1 = 0x7;
1266692aac4SVijaya Kumar K     return 0;
1276692aac4SVijaya Kumar K }
1286692aac4SVijaya Kumar K 
1296692aac4SVijaya Kumar K static bool icc_sre_el1_reg_needed(void *opaque)
1306692aac4SVijaya Kumar K {
1316692aac4SVijaya Kumar K     GICv3CPUState *cs = opaque;
1326692aac4SVijaya Kumar K 
1336692aac4SVijaya Kumar K     return cs->icc_sre_el1 != 7;
1346692aac4SVijaya Kumar K }
1356692aac4SVijaya Kumar K 
1366692aac4SVijaya Kumar K const VMStateDescription vmstate_gicv3_cpu_sre_el1 = {
1376692aac4SVijaya Kumar K     .name = "arm_gicv3_cpu/sre_el1",
1386692aac4SVijaya Kumar K     .version_id = 1,
1396692aac4SVijaya Kumar K     .minimum_version_id = 1,
1406692aac4SVijaya Kumar K     .needed = icc_sre_el1_reg_needed,
1416692aac4SVijaya Kumar K     .fields = (VMStateField[]) {
1426692aac4SVijaya Kumar K         VMSTATE_UINT64(icc_sre_el1, GICv3CPUState),
1436692aac4SVijaya Kumar K         VMSTATE_END_OF_LIST()
1446692aac4SVijaya Kumar K     }
1456692aac4SVijaya Kumar K };
1466692aac4SVijaya Kumar K 
147757caeedSPavel Fedin static const VMStateDescription vmstate_gicv3_cpu = {
148757caeedSPavel Fedin     .name = "arm_gicv3_cpu",
149757caeedSPavel Fedin     .version_id = 1,
150757caeedSPavel Fedin     .minimum_version_id = 1,
151326049ccSPeter Maydell     .pre_load = vmstate_gicv3_cpu_pre_load,
152757caeedSPavel Fedin     .fields = (VMStateField[]) {
153757caeedSPavel Fedin         VMSTATE_UINT32(level, GICv3CPUState),
154757caeedSPavel Fedin         VMSTATE_UINT32(gicr_ctlr, GICv3CPUState),
155757caeedSPavel Fedin         VMSTATE_UINT32_ARRAY(gicr_statusr, GICv3CPUState, 2),
156757caeedSPavel Fedin         VMSTATE_UINT32(gicr_waker, GICv3CPUState),
157757caeedSPavel Fedin         VMSTATE_UINT64(gicr_propbaser, GICv3CPUState),
158757caeedSPavel Fedin         VMSTATE_UINT64(gicr_pendbaser, GICv3CPUState),
159757caeedSPavel Fedin         VMSTATE_UINT32(gicr_igroupr0, GICv3CPUState),
160757caeedSPavel Fedin         VMSTATE_UINT32(gicr_ienabler0, GICv3CPUState),
161757caeedSPavel Fedin         VMSTATE_UINT32(gicr_ipendr0, GICv3CPUState),
162757caeedSPavel Fedin         VMSTATE_UINT32(gicr_iactiver0, GICv3CPUState),
163757caeedSPavel Fedin         VMSTATE_UINT32(edge_trigger, GICv3CPUState),
164757caeedSPavel Fedin         VMSTATE_UINT32(gicr_igrpmodr0, GICv3CPUState),
165757caeedSPavel Fedin         VMSTATE_UINT32(gicr_nsacr, GICv3CPUState),
166757caeedSPavel Fedin         VMSTATE_UINT8_ARRAY(gicr_ipriorityr, GICv3CPUState, GIC_INTERNAL),
167757caeedSPavel Fedin         VMSTATE_UINT64_ARRAY(icc_ctlr_el1, GICv3CPUState, 2),
168757caeedSPavel Fedin         VMSTATE_UINT64(icc_pmr_el1, GICv3CPUState),
169757caeedSPavel Fedin         VMSTATE_UINT64_ARRAY(icc_bpr, GICv3CPUState, 3),
170757caeedSPavel Fedin         VMSTATE_UINT64_2DARRAY(icc_apr, GICv3CPUState, 3, 4),
171757caeedSPavel Fedin         VMSTATE_UINT64_ARRAY(icc_igrpen, GICv3CPUState, 3),
172757caeedSPavel Fedin         VMSTATE_UINT64(icc_ctlr_el3, GICv3CPUState),
173757caeedSPavel Fedin         VMSTATE_END_OF_LIST()
1744eb833b5SPeter Maydell     },
1754eb833b5SPeter Maydell     .subsections = (const VMStateDescription * []) {
1764eb833b5SPeter Maydell         &vmstate_gicv3_cpu_virt,
1776692aac4SVijaya Kumar K         &vmstate_gicv3_cpu_sre_el1,
1786692aac4SVijaya Kumar K         NULL
179757caeedSPavel Fedin     }
180757caeedSPavel Fedin };
181757caeedSPavel Fedin 
182326049ccSPeter Maydell static int gicv3_pre_load(void *opaque)
183910e2048SShannon Zhao {
184910e2048SShannon Zhao     GICv3State *cs = opaque;
185910e2048SShannon Zhao 
186910e2048SShannon Zhao    /*
187910e2048SShannon Zhao     * The gicd_no_migration_shift_bug flag is used for migration compatibility
188910e2048SShannon Zhao     * for old version QEMU which may have the GICD bmp shift bug under KVM mode.
189910e2048SShannon Zhao     * Strictly, what we want to know is whether the migration source is using
190910e2048SShannon Zhao     * KVM. Since we don't have any way to determine that, we look at whether the
191910e2048SShannon Zhao     * destination is using KVM; this is close enough because for the older QEMU
192910e2048SShannon Zhao     * versions with this bug KVM -> TCG migration didn't work anyway. If the
193910e2048SShannon Zhao     * source is a newer QEMU without this bug it will transmit the migration
194910e2048SShannon Zhao     * subsection which sets the flag to true; otherwise it will remain set to
195910e2048SShannon Zhao     * the value we select here.
196910e2048SShannon Zhao     */
197910e2048SShannon Zhao     if (kvm_enabled()) {
198910e2048SShannon Zhao         cs->gicd_no_migration_shift_bug = false;
199910e2048SShannon Zhao     }
200910e2048SShannon Zhao 
201910e2048SShannon Zhao     return 0;
202910e2048SShannon Zhao }
203910e2048SShannon Zhao 
20478e9ddd7SPeter Maydell static bool needed_always(void *opaque)
20578e9ddd7SPeter Maydell {
20678e9ddd7SPeter Maydell     return true;
20778e9ddd7SPeter Maydell }
20878e9ddd7SPeter Maydell 
209910e2048SShannon Zhao const VMStateDescription vmstate_gicv3_gicd_no_migration_shift_bug = {
210910e2048SShannon Zhao     .name = "arm_gicv3/gicd_no_migration_shift_bug",
211910e2048SShannon Zhao     .version_id = 1,
212910e2048SShannon Zhao     .minimum_version_id = 1,
21378e9ddd7SPeter Maydell     .needed = needed_always,
214910e2048SShannon Zhao     .fields = (VMStateField[]) {
215910e2048SShannon Zhao         VMSTATE_BOOL(gicd_no_migration_shift_bug, GICv3State),
216910e2048SShannon Zhao         VMSTATE_END_OF_LIST()
217910e2048SShannon Zhao     }
218910e2048SShannon Zhao };
219910e2048SShannon Zhao 
220ff8f06eeSShlomo Pongratz static const VMStateDescription vmstate_gicv3 = {
221ff8f06eeSShlomo Pongratz     .name = "arm_gicv3",
222757caeedSPavel Fedin     .version_id = 1,
223757caeedSPavel Fedin     .minimum_version_id = 1,
224326049ccSPeter Maydell     .pre_load = gicv3_pre_load,
225ff8f06eeSShlomo Pongratz     .pre_save = gicv3_pre_save,
226ff8f06eeSShlomo Pongratz     .post_load = gicv3_post_load,
227252a7a6aSEric Auger     .priority = MIG_PRI_GICV3,
228757caeedSPavel Fedin     .fields = (VMStateField[]) {
229757caeedSPavel Fedin         VMSTATE_UINT32(gicd_ctlr, GICv3State),
230757caeedSPavel Fedin         VMSTATE_UINT32_ARRAY(gicd_statusr, GICv3State, 2),
231757caeedSPavel Fedin         VMSTATE_UINT32_ARRAY(group, GICv3State, GICV3_BMP_SIZE),
232757caeedSPavel Fedin         VMSTATE_UINT32_ARRAY(grpmod, GICv3State, GICV3_BMP_SIZE),
233757caeedSPavel Fedin         VMSTATE_UINT32_ARRAY(enabled, GICv3State, GICV3_BMP_SIZE),
234757caeedSPavel Fedin         VMSTATE_UINT32_ARRAY(pending, GICv3State, GICV3_BMP_SIZE),
235757caeedSPavel Fedin         VMSTATE_UINT32_ARRAY(active, GICv3State, GICV3_BMP_SIZE),
236757caeedSPavel Fedin         VMSTATE_UINT32_ARRAY(level, GICv3State, GICV3_BMP_SIZE),
237757caeedSPavel Fedin         VMSTATE_UINT32_ARRAY(edge_trigger, GICv3State, GICV3_BMP_SIZE),
238757caeedSPavel Fedin         VMSTATE_UINT8_ARRAY(gicd_ipriority, GICv3State, GICV3_MAXIRQ),
239757caeedSPavel Fedin         VMSTATE_UINT64_ARRAY(gicd_irouter, GICv3State, GICV3_MAXIRQ),
240757caeedSPavel Fedin         VMSTATE_UINT32_ARRAY(gicd_nsacr, GICv3State,
241757caeedSPavel Fedin                              DIV_ROUND_UP(GICV3_MAXIRQ, 16)),
242757caeedSPavel Fedin         VMSTATE_STRUCT_VARRAY_POINTER_UINT32(cpu, GICv3State, num_cpu,
243757caeedSPavel Fedin                                              vmstate_gicv3_cpu, GICv3CPUState),
244757caeedSPavel Fedin         VMSTATE_END_OF_LIST()
245910e2048SShannon Zhao     },
246910e2048SShannon Zhao     .subsections = (const VMStateDescription * []) {
247910e2048SShannon Zhao         &vmstate_gicv3_gicd_no_migration_shift_bug,
248910e2048SShannon Zhao         NULL
249757caeedSPavel Fedin     }
250ff8f06eeSShlomo Pongratz };
251ff8f06eeSShlomo Pongratz 
252ff8f06eeSShlomo Pongratz void gicv3_init_irqs_and_mmio(GICv3State *s, qemu_irq_handler handler,
2531e575b66SEric Auger                               const MemoryRegionOps *ops, Error **errp)
254ff8f06eeSShlomo Pongratz {
255ff8f06eeSShlomo Pongratz     SysBusDevice *sbd = SYS_BUS_DEVICE(s);
2561e575b66SEric Auger     int rdist_capacity = 0;
257ff8f06eeSShlomo Pongratz     int i;
258ff8f06eeSShlomo Pongratz 
2591e575b66SEric Auger     for (i = 0; i < s->nb_redist_regions; i++) {
2601e575b66SEric Auger         rdist_capacity += s->redist_region_count[i];
2611e575b66SEric Auger     }
2621e575b66SEric Auger     if (rdist_capacity < s->num_cpu) {
2631e575b66SEric Auger         error_setg(errp, "Capacity of the redist regions(%d) "
2641e575b66SEric Auger                    "is less than number of vcpus(%d)",
2651e575b66SEric Auger                    rdist_capacity, s->num_cpu);
2661e575b66SEric Auger         return;
2671e575b66SEric Auger     }
2681e575b66SEric Auger 
269ff8f06eeSShlomo Pongratz     /* For the GIC, also expose incoming GPIO lines for PPIs for each CPU.
270ff8f06eeSShlomo Pongratz      * GPIO array layout is thus:
271ff8f06eeSShlomo Pongratz      *  [0..N-1] spi
272ff8f06eeSShlomo Pongratz      *  [N..N+31] PPIs for CPU 0
273ff8f06eeSShlomo Pongratz      *  [N+32..N+63] PPIs for CPU 1
274ff8f06eeSShlomo Pongratz      *   ...
275ff8f06eeSShlomo Pongratz      */
276ff8f06eeSShlomo Pongratz     i = s->num_irq - GIC_INTERNAL + GIC_INTERNAL * s->num_cpu;
277ff8f06eeSShlomo Pongratz     qdev_init_gpio_in(DEVICE(s), handler, i);
278ff8f06eeSShlomo Pongratz 
279ff8f06eeSShlomo Pongratz     for (i = 0; i < s->num_cpu; i++) {
2803faf2b0cSPeter Maydell         sysbus_init_irq(sbd, &s->cpu[i].parent_irq);
281ff8f06eeSShlomo Pongratz     }
282ff8f06eeSShlomo Pongratz     for (i = 0; i < s->num_cpu; i++) {
2833faf2b0cSPeter Maydell         sysbus_init_irq(sbd, &s->cpu[i].parent_fiq);
284ff8f06eeSShlomo Pongratz     }
285b53db42bSPeter Maydell     for (i = 0; i < s->num_cpu; i++) {
286b53db42bSPeter Maydell         sysbus_init_irq(sbd, &s->cpu[i].parent_virq);
287b53db42bSPeter Maydell     }
288b53db42bSPeter Maydell     for (i = 0; i < s->num_cpu; i++) {
289b53db42bSPeter Maydell         sysbus_init_irq(sbd, &s->cpu[i].parent_vfiq);
290b53db42bSPeter Maydell     }
291ff8f06eeSShlomo Pongratz 
292ff8f06eeSShlomo Pongratz     memory_region_init_io(&s->iomem_dist, OBJECT(s), ops, s,
293ff8f06eeSShlomo Pongratz                           "gicv3_dist", 0x10000);
294ff8f06eeSShlomo Pongratz     sysbus_init_mmio(sbd, &s->iomem_dist);
2951e575b66SEric Auger 
2961e575b66SEric Auger     s->iomem_redist = g_new0(MemoryRegion, s->nb_redist_regions);
2971e575b66SEric Auger     for (i = 0; i < s->nb_redist_regions; i++) {
2981e575b66SEric Auger         char *name = g_strdup_printf("gicv3_redist_region[%d]", i);
2991e575b66SEric Auger 
3001e575b66SEric Auger         memory_region_init_io(&s->iomem_redist[i], OBJECT(s),
3011e575b66SEric Auger                               ops ? &ops[1] : NULL, s, name,
3021e575b66SEric Auger                               s->redist_region_count[i] * GICV3_REDIST_SIZE);
3031e575b66SEric Auger         sysbus_init_mmio(sbd, &s->iomem_redist[i]);
3041e575b66SEric Auger         g_free(name);
3051e575b66SEric Auger     }
306ff8f06eeSShlomo Pongratz }
307ff8f06eeSShlomo Pongratz 
308ff8f06eeSShlomo Pongratz static void arm_gicv3_common_realize(DeviceState *dev, Error **errp)
309ff8f06eeSShlomo Pongratz {
310ff8f06eeSShlomo Pongratz     GICv3State *s = ARM_GICV3_COMMON(dev);
31107e2034dSPavel Fedin     int i;
312ff8f06eeSShlomo Pongratz 
313ff8f06eeSShlomo Pongratz     /* revision property is actually reserved and currently used only in order
314ff8f06eeSShlomo Pongratz      * to keep the interface compatible with GICv2 code, avoiding extra
315ff8f06eeSShlomo Pongratz      * conditions. However, in future it could be used, for example, if we
316ff8f06eeSShlomo Pongratz      * implement GICv4.
317ff8f06eeSShlomo Pongratz      */
318ff8f06eeSShlomo Pongratz     if (s->revision != 3) {
319ff8f06eeSShlomo Pongratz         error_setg(errp, "unsupported GIC revision %d", s->revision);
320ff8f06eeSShlomo Pongratz         return;
321ff8f06eeSShlomo Pongratz     }
32207e2034dSPavel Fedin 
32307e2034dSPavel Fedin     if (s->num_irq > GICV3_MAXIRQ) {
32407e2034dSPavel Fedin         error_setg(errp,
32507e2034dSPavel Fedin                    "requested %u interrupt lines exceeds GIC maximum %d",
32607e2034dSPavel Fedin                    s->num_irq, GICV3_MAXIRQ);
32707e2034dSPavel Fedin         return;
32807e2034dSPavel Fedin     }
32907e2034dSPavel Fedin     if (s->num_irq < GIC_INTERNAL) {
33007e2034dSPavel Fedin         error_setg(errp,
33107e2034dSPavel Fedin                    "requested %u interrupt lines is below GIC minimum %d",
33207e2034dSPavel Fedin                    s->num_irq, GIC_INTERNAL);
33307e2034dSPavel Fedin         return;
33407e2034dSPavel Fedin     }
33507e2034dSPavel Fedin 
33607e2034dSPavel Fedin     /* ITLinesNumber is represented as (N / 32) - 1, so this is an
33707e2034dSPavel Fedin      * implementation imposed restriction, not an architectural one,
33807e2034dSPavel Fedin      * so we don't have to deal with bitfields where only some of the
33907e2034dSPavel Fedin      * bits in a 32-bit word should be valid.
34007e2034dSPavel Fedin      */
34107e2034dSPavel Fedin     if (s->num_irq % 32) {
34207e2034dSPavel Fedin         error_setg(errp,
34307e2034dSPavel Fedin                    "%d interrupt lines unsupported: not divisible by 32",
34407e2034dSPavel Fedin                    s->num_irq);
34507e2034dSPavel Fedin         return;
34607e2034dSPavel Fedin     }
34707e2034dSPavel Fedin 
34807e2034dSPavel Fedin     s->cpu = g_new0(GICv3CPUState, s->num_cpu);
34907e2034dSPavel Fedin 
35007e2034dSPavel Fedin     for (i = 0; i < s->num_cpu; i++) {
35107e2034dSPavel Fedin         CPUState *cpu = qemu_get_cpu(i);
35207e2034dSPavel Fedin         uint64_t cpu_affid;
35307e2034dSPavel Fedin         int last;
35407e2034dSPavel Fedin 
35507e2034dSPavel Fedin         s->cpu[i].cpu = cpu;
35607e2034dSPavel Fedin         s->cpu[i].gic = s;
357d3a3e529SVijaya Kumar K         /* Store GICv3CPUState in CPUARMState gicv3state pointer */
358d3a3e529SVijaya Kumar K         gicv3_set_gicv3state(cpu, &s->cpu[i]);
35907e2034dSPavel Fedin 
36007e2034dSPavel Fedin         /* Pre-construct the GICR_TYPER:
36107e2034dSPavel Fedin          * For our implementation:
36207e2034dSPavel Fedin          *  Top 32 bits are the affinity value of the associated CPU
36307e2034dSPavel Fedin          *  CommonLPIAff == 01 (redistributors with same Aff3 share LPI table)
36407e2034dSPavel Fedin          *  Processor_Number == CPU index starting from 0
36507e2034dSPavel Fedin          *  DPGS == 0 (GICR_CTLR.DPG* not supported)
36607e2034dSPavel Fedin          *  Last == 1 if this is the last redistributor in a series of
36707e2034dSPavel Fedin          *            contiguous redistributor pages
36807e2034dSPavel Fedin          *  DirectLPI == 0 (direct injection of LPIs not supported)
36907e2034dSPavel Fedin          *  VLPIS == 0 (virtual LPIs not supported)
37007e2034dSPavel Fedin          *  PLPIS == 0 (physical LPIs not supported)
37107e2034dSPavel Fedin          */
37277a7a367SMarc-André Lureau         cpu_affid = object_property_get_uint(OBJECT(cpu), "mp-affinity", NULL);
37307e2034dSPavel Fedin         last = (i == s->num_cpu - 1);
37407e2034dSPavel Fedin 
37507e2034dSPavel Fedin         /* The CPU mp-affinity property is in MPIDR register format; squash
37607e2034dSPavel Fedin          * the affinity bytes into 32 bits as the GICR_TYPER has them.
37707e2034dSPavel Fedin          */
37892204403SAndrew Jones         cpu_affid = ((cpu_affid & 0xFF00000000ULL) >> 8) |
37992204403SAndrew Jones                      (cpu_affid & 0xFFFFFF);
38007e2034dSPavel Fedin         s->cpu[i].gicr_typer = (cpu_affid << 32) |
38107e2034dSPavel Fedin             (1 << 24) |
38207e2034dSPavel Fedin             (i << 8) |
38307e2034dSPavel Fedin             (last << 4);
38407e2034dSPavel Fedin     }
385ff8f06eeSShlomo Pongratz }
386ff8f06eeSShlomo Pongratz 
3871e575b66SEric Auger static void arm_gicv3_finalize(Object *obj)
3881e575b66SEric Auger {
3891e575b66SEric Auger     GICv3State *s = ARM_GICV3_COMMON(obj);
3901e575b66SEric Auger 
3911e575b66SEric Auger     g_free(s->redist_region_count);
3921e575b66SEric Auger }
3931e575b66SEric Auger 
394ff8f06eeSShlomo Pongratz static void arm_gicv3_common_reset(DeviceState *dev)
395ff8f06eeSShlomo Pongratz {
39607e2034dSPavel Fedin     GICv3State *s = ARM_GICV3_COMMON(dev);
39707e2034dSPavel Fedin     int i;
39807e2034dSPavel Fedin 
39907e2034dSPavel Fedin     for (i = 0; i < s->num_cpu; i++) {
40007e2034dSPavel Fedin         GICv3CPUState *cs = &s->cpu[i];
40107e2034dSPavel Fedin 
40207e2034dSPavel Fedin         cs->level = 0;
40307e2034dSPavel Fedin         cs->gicr_ctlr = 0;
40407e2034dSPavel Fedin         cs->gicr_statusr[GICV3_S] = 0;
40507e2034dSPavel Fedin         cs->gicr_statusr[GICV3_NS] = 0;
40607e2034dSPavel Fedin         cs->gicr_waker = GICR_WAKER_ProcessorSleep | GICR_WAKER_ChildrenAsleep;
40707e2034dSPavel Fedin         cs->gicr_propbaser = 0;
40807e2034dSPavel Fedin         cs->gicr_pendbaser = 0;
40907e2034dSPavel Fedin         /* If we're resetting a TZ-aware GIC as if secure firmware
41007e2034dSPavel Fedin          * had set it up ready to start a kernel in non-secure, we
41107e2034dSPavel Fedin          * need to set interrupts to group 1 so the kernel can use them.
41207e2034dSPavel Fedin          * Otherwise they reset to group 0 like the hardware.
41307e2034dSPavel Fedin          */
41407e2034dSPavel Fedin         if (s->irq_reset_nonsecure) {
41507e2034dSPavel Fedin             cs->gicr_igroupr0 = 0xffffffff;
41607e2034dSPavel Fedin         } else {
41707e2034dSPavel Fedin             cs->gicr_igroupr0 = 0;
41807e2034dSPavel Fedin         }
41907e2034dSPavel Fedin 
42007e2034dSPavel Fedin         cs->gicr_ienabler0 = 0;
42107e2034dSPavel Fedin         cs->gicr_ipendr0 = 0;
42207e2034dSPavel Fedin         cs->gicr_iactiver0 = 0;
42307e2034dSPavel Fedin         cs->edge_trigger = 0xffff;
42407e2034dSPavel Fedin         cs->gicr_igrpmodr0 = 0;
42507e2034dSPavel Fedin         cs->gicr_nsacr = 0;
42607e2034dSPavel Fedin         memset(cs->gicr_ipriorityr, 0, sizeof(cs->gicr_ipriorityr));
42707e2034dSPavel Fedin 
428ce187c3cSPeter Maydell         cs->hppi.prio = 0xff;
429ce187c3cSPeter Maydell 
43007e2034dSPavel Fedin         /* State in the CPU interface must *not* be reset here, because it
43107e2034dSPavel Fedin          * is part of the CPU's reset domain, not the GIC device's.
43207e2034dSPavel Fedin          */
43307e2034dSPavel Fedin     }
43407e2034dSPavel Fedin 
43507e2034dSPavel Fedin     /* For our implementation affinity routing is always enabled */
43607e2034dSPavel Fedin     if (s->security_extn) {
43707e2034dSPavel Fedin         s->gicd_ctlr = GICD_CTLR_ARE_S | GICD_CTLR_ARE_NS;
43807e2034dSPavel Fedin     } else {
43907e2034dSPavel Fedin         s->gicd_ctlr = GICD_CTLR_DS | GICD_CTLR_ARE;
44007e2034dSPavel Fedin     }
44107e2034dSPavel Fedin 
44207e2034dSPavel Fedin     s->gicd_statusr[GICV3_S] = 0;
44307e2034dSPavel Fedin     s->gicd_statusr[GICV3_NS] = 0;
44407e2034dSPavel Fedin 
44507e2034dSPavel Fedin     memset(s->group, 0, sizeof(s->group));
44607e2034dSPavel Fedin     memset(s->grpmod, 0, sizeof(s->grpmod));
44707e2034dSPavel Fedin     memset(s->enabled, 0, sizeof(s->enabled));
44807e2034dSPavel Fedin     memset(s->pending, 0, sizeof(s->pending));
44907e2034dSPavel Fedin     memset(s->active, 0, sizeof(s->active));
45007e2034dSPavel Fedin     memset(s->level, 0, sizeof(s->level));
45107e2034dSPavel Fedin     memset(s->edge_trigger, 0, sizeof(s->edge_trigger));
45207e2034dSPavel Fedin     memset(s->gicd_ipriority, 0, sizeof(s->gicd_ipriority));
45307e2034dSPavel Fedin     memset(s->gicd_irouter, 0, sizeof(s->gicd_irouter));
45407e2034dSPavel Fedin     memset(s->gicd_nsacr, 0, sizeof(s->gicd_nsacr));
455ce187c3cSPeter Maydell     /* GICD_IROUTER are UNKNOWN at reset so in theory the guest must
456ce187c3cSPeter Maydell      * write these to get sane behaviour and we need not populate the
457ce187c3cSPeter Maydell      * pointer cache here; however having the cache be different for
458ce187c3cSPeter Maydell      * "happened to be 0 from reset" and "guest wrote 0" would be
459ce187c3cSPeter Maydell      * too confusing.
460ce187c3cSPeter Maydell      */
461ce187c3cSPeter Maydell     gicv3_cache_all_target_cpustates(s);
46207e2034dSPavel Fedin 
46307e2034dSPavel Fedin     if (s->irq_reset_nonsecure) {
46407e2034dSPavel Fedin         /* If we're resetting a TZ-aware GIC as if secure firmware
46507e2034dSPavel Fedin          * had set it up ready to start a kernel in non-secure, we
46607e2034dSPavel Fedin          * need to set interrupts to group 1 so the kernel can use them.
46707e2034dSPavel Fedin          * Otherwise they reset to group 0 like the hardware.
46807e2034dSPavel Fedin          */
46907e2034dSPavel Fedin         for (i = GIC_INTERNAL; i < s->num_irq; i++) {
47007e2034dSPavel Fedin             gicv3_gicd_group_set(s, i);
47107e2034dSPavel Fedin         }
47207e2034dSPavel Fedin     }
473910e2048SShannon Zhao     s->gicd_no_migration_shift_bug = true;
47407e2034dSPavel Fedin }
47507e2034dSPavel Fedin 
47607e2034dSPavel Fedin static void arm_gic_common_linux_init(ARMLinuxBootIf *obj,
47707e2034dSPavel Fedin                                       bool secure_boot)
47807e2034dSPavel Fedin {
47907e2034dSPavel Fedin     GICv3State *s = ARM_GICV3_COMMON(obj);
48007e2034dSPavel Fedin 
48107e2034dSPavel Fedin     if (s->security_extn && !secure_boot) {
48207e2034dSPavel Fedin         /* We're directly booting a kernel into NonSecure. If this GIC
48307e2034dSPavel Fedin          * implements the security extensions then we must configure it
48407e2034dSPavel Fedin          * to have all the interrupts be NonSecure (this is a job that
48507e2034dSPavel Fedin          * is done by the Secure boot firmware in real hardware, and in
48607e2034dSPavel Fedin          * this mode QEMU is acting as a minimalist firmware-and-bootloader
48707e2034dSPavel Fedin          * equivalent).
48807e2034dSPavel Fedin          */
48907e2034dSPavel Fedin         s->irq_reset_nonsecure = true;
49007e2034dSPavel Fedin     }
491ff8f06eeSShlomo Pongratz }
492ff8f06eeSShlomo Pongratz 
493ff8f06eeSShlomo Pongratz static Property arm_gicv3_common_properties[] = {
494ff8f06eeSShlomo Pongratz     DEFINE_PROP_UINT32("num-cpu", GICv3State, num_cpu, 1),
495ff8f06eeSShlomo Pongratz     DEFINE_PROP_UINT32("num-irq", GICv3State, num_irq, 32),
496ff8f06eeSShlomo Pongratz     DEFINE_PROP_UINT32("revision", GICv3State, revision, 3),
497ff8f06eeSShlomo Pongratz     DEFINE_PROP_BOOL("has-security-extensions", GICv3State, security_extn, 0),
4981e575b66SEric Auger     DEFINE_PROP_ARRAY("redist-region-count", GICv3State, nb_redist_regions,
4991e575b66SEric Auger                       redist_region_count, qdev_prop_uint32, uint32_t),
500ff8f06eeSShlomo Pongratz     DEFINE_PROP_END_OF_LIST(),
501ff8f06eeSShlomo Pongratz };
502ff8f06eeSShlomo Pongratz 
503ff8f06eeSShlomo Pongratz static void arm_gicv3_common_class_init(ObjectClass *klass, void *data)
504ff8f06eeSShlomo Pongratz {
505ff8f06eeSShlomo Pongratz     DeviceClass *dc = DEVICE_CLASS(klass);
50607e2034dSPavel Fedin     ARMLinuxBootIfClass *albifc = ARM_LINUX_BOOT_IF_CLASS(klass);
507ff8f06eeSShlomo Pongratz 
508ff8f06eeSShlomo Pongratz     dc->reset = arm_gicv3_common_reset;
509ff8f06eeSShlomo Pongratz     dc->realize = arm_gicv3_common_realize;
510ff8f06eeSShlomo Pongratz     dc->props = arm_gicv3_common_properties;
511ff8f06eeSShlomo Pongratz     dc->vmsd = &vmstate_gicv3;
51207e2034dSPavel Fedin     albifc->arm_linux_init = arm_gic_common_linux_init;
513ff8f06eeSShlomo Pongratz }
514ff8f06eeSShlomo Pongratz 
515ff8f06eeSShlomo Pongratz static const TypeInfo arm_gicv3_common_type = {
516ff8f06eeSShlomo Pongratz     .name = TYPE_ARM_GICV3_COMMON,
517ff8f06eeSShlomo Pongratz     .parent = TYPE_SYS_BUS_DEVICE,
518ff8f06eeSShlomo Pongratz     .instance_size = sizeof(GICv3State),
519ff8f06eeSShlomo Pongratz     .class_size = sizeof(ARMGICv3CommonClass),
520ff8f06eeSShlomo Pongratz     .class_init = arm_gicv3_common_class_init,
5211e575b66SEric Auger     .instance_finalize = arm_gicv3_finalize,
522ff8f06eeSShlomo Pongratz     .abstract = true,
52307e2034dSPavel Fedin     .interfaces = (InterfaceInfo []) {
52407e2034dSPavel Fedin         { TYPE_ARM_LINUX_BOOT_IF },
52507e2034dSPavel Fedin         { },
52607e2034dSPavel Fedin     },
527ff8f06eeSShlomo Pongratz };
528ff8f06eeSShlomo Pongratz 
529ff8f06eeSShlomo Pongratz static void register_types(void)
530ff8f06eeSShlomo Pongratz {
531ff8f06eeSShlomo Pongratz     type_register_static(&arm_gicv3_common_type);
532ff8f06eeSShlomo Pongratz }
533ff8f06eeSShlomo Pongratz 
534ff8f06eeSShlomo Pongratz type_init(register_types)
535