1ff8f06eeSShlomo Pongratz /* 2ff8f06eeSShlomo Pongratz * ARM GICv3 support - common bits of emulated and KVM kernel model 3ff8f06eeSShlomo Pongratz * 4ff8f06eeSShlomo Pongratz * Copyright (c) 2012 Linaro Limited 5ff8f06eeSShlomo Pongratz * Copyright (c) 2015 Huawei. 607e2034dSPavel Fedin * Copyright (c) 2015 Samsung Electronics Co., Ltd. 7ff8f06eeSShlomo Pongratz * Written by Peter Maydell 807e2034dSPavel Fedin * Reworked for GICv3 by Shlomo Pongratz and Pavel Fedin 9ff8f06eeSShlomo Pongratz * 10ff8f06eeSShlomo Pongratz * This program is free software; you can redistribute it and/or modify 11ff8f06eeSShlomo Pongratz * it under the terms of the GNU General Public License as published by 12ff8f06eeSShlomo Pongratz * the Free Software Foundation, either version 2 of the License, or 13ff8f06eeSShlomo Pongratz * (at your option) any later version. 14ff8f06eeSShlomo Pongratz * 15ff8f06eeSShlomo Pongratz * This program is distributed in the hope that it will be useful, 16ff8f06eeSShlomo Pongratz * but WITHOUT ANY WARRANTY; without even the implied warranty of 17ff8f06eeSShlomo Pongratz * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 18ff8f06eeSShlomo Pongratz * GNU General Public License for more details. 19ff8f06eeSShlomo Pongratz * 20ff8f06eeSShlomo Pongratz * You should have received a copy of the GNU General Public License along 21ff8f06eeSShlomo Pongratz * with this program; if not, see <http://www.gnu.org/licenses/>. 22ff8f06eeSShlomo Pongratz */ 23ff8f06eeSShlomo Pongratz 248ef94f0bSPeter Maydell #include "qemu/osdep.h" 25da34e65cSMarkus Armbruster #include "qapi/error.h" 260b8fa32fSMarkus Armbruster #include "qemu/module.h" 27*2e5b09fdSMarkus Armbruster #include "hw/core/cpu.h" 28ff8f06eeSShlomo Pongratz #include "hw/intc/arm_gicv3_common.h" 29a27bd6c7SMarkus Armbruster #include "hw/qdev-properties.h" 30d6454270SMarkus Armbruster #include "migration/vmstate.h" 3107e2034dSPavel Fedin #include "gicv3_internal.h" 3207e2034dSPavel Fedin #include "hw/arm/linux-boot-if.h" 33910e2048SShannon Zhao #include "sysemu/kvm.h" 34ff8f06eeSShlomo Pongratz 35341823c1SPeter Maydell 36341823c1SPeter Maydell static void gicv3_gicd_no_migration_shift_bug_post_load(GICv3State *cs) 37341823c1SPeter Maydell { 38341823c1SPeter Maydell if (cs->gicd_no_migration_shift_bug) { 39341823c1SPeter Maydell return; 40341823c1SPeter Maydell } 41341823c1SPeter Maydell 42341823c1SPeter Maydell /* Older versions of QEMU had a bug in the handling of state save/restore 43341823c1SPeter Maydell * to the KVM GICv3: they got the offset in the bitmap arrays wrong, 44341823c1SPeter Maydell * so that instead of the data for external interrupts 32 and up 45341823c1SPeter Maydell * starting at bit position 32 in the bitmap, it started at bit 46341823c1SPeter Maydell * position 64. If we're receiving data from a QEMU with that bug, 47341823c1SPeter Maydell * we must move the data down into the right place. 48341823c1SPeter Maydell */ 49341823c1SPeter Maydell memmove(cs->group, (uint8_t *)cs->group + GIC_INTERNAL / 8, 50341823c1SPeter Maydell sizeof(cs->group) - GIC_INTERNAL / 8); 51341823c1SPeter Maydell memmove(cs->grpmod, (uint8_t *)cs->grpmod + GIC_INTERNAL / 8, 52341823c1SPeter Maydell sizeof(cs->grpmod) - GIC_INTERNAL / 8); 53341823c1SPeter Maydell memmove(cs->enabled, (uint8_t *)cs->enabled + GIC_INTERNAL / 8, 54341823c1SPeter Maydell sizeof(cs->enabled) - GIC_INTERNAL / 8); 55341823c1SPeter Maydell memmove(cs->pending, (uint8_t *)cs->pending + GIC_INTERNAL / 8, 56341823c1SPeter Maydell sizeof(cs->pending) - GIC_INTERNAL / 8); 57341823c1SPeter Maydell memmove(cs->active, (uint8_t *)cs->active + GIC_INTERNAL / 8, 58341823c1SPeter Maydell sizeof(cs->active) - GIC_INTERNAL / 8); 59341823c1SPeter Maydell memmove(cs->edge_trigger, (uint8_t *)cs->edge_trigger + GIC_INTERNAL / 8, 60341823c1SPeter Maydell sizeof(cs->edge_trigger) - GIC_INTERNAL / 8); 61341823c1SPeter Maydell 62341823c1SPeter Maydell /* 63341823c1SPeter Maydell * While this new version QEMU doesn't have this kind of bug as we fix it, 64341823c1SPeter Maydell * so it needs to set the flag to true to indicate that and it's necessary 65341823c1SPeter Maydell * for next migration to work from this new version QEMU. 66341823c1SPeter Maydell */ 67341823c1SPeter Maydell cs->gicd_no_migration_shift_bug = true; 68341823c1SPeter Maydell } 69341823c1SPeter Maydell 7044b1ff31SDr. David Alan Gilbert static int gicv3_pre_save(void *opaque) 71ff8f06eeSShlomo Pongratz { 72ff8f06eeSShlomo Pongratz GICv3State *s = (GICv3State *)opaque; 73ff8f06eeSShlomo Pongratz ARMGICv3CommonClass *c = ARM_GICV3_COMMON_GET_CLASS(s); 74ff8f06eeSShlomo Pongratz 75ff8f06eeSShlomo Pongratz if (c->pre_save) { 76ff8f06eeSShlomo Pongratz c->pre_save(s); 77ff8f06eeSShlomo Pongratz } 7844b1ff31SDr. David Alan Gilbert 7944b1ff31SDr. David Alan Gilbert return 0; 80ff8f06eeSShlomo Pongratz } 81ff8f06eeSShlomo Pongratz 82ff8f06eeSShlomo Pongratz static int gicv3_post_load(void *opaque, int version_id) 83ff8f06eeSShlomo Pongratz { 84ff8f06eeSShlomo Pongratz GICv3State *s = (GICv3State *)opaque; 85ff8f06eeSShlomo Pongratz ARMGICv3CommonClass *c = ARM_GICV3_COMMON_GET_CLASS(s); 86ff8f06eeSShlomo Pongratz 87341823c1SPeter Maydell gicv3_gicd_no_migration_shift_bug_post_load(s); 88341823c1SPeter Maydell 89ff8f06eeSShlomo Pongratz if (c->post_load) { 90ff8f06eeSShlomo Pongratz c->post_load(s); 91ff8f06eeSShlomo Pongratz } 92ff8f06eeSShlomo Pongratz return 0; 93ff8f06eeSShlomo Pongratz } 94ff8f06eeSShlomo Pongratz 954eb833b5SPeter Maydell static bool virt_state_needed(void *opaque) 964eb833b5SPeter Maydell { 974eb833b5SPeter Maydell GICv3CPUState *cs = opaque; 984eb833b5SPeter Maydell 994eb833b5SPeter Maydell return cs->num_list_regs != 0; 1004eb833b5SPeter Maydell } 1014eb833b5SPeter Maydell 1024eb833b5SPeter Maydell static const VMStateDescription vmstate_gicv3_cpu_virt = { 1034eb833b5SPeter Maydell .name = "arm_gicv3_cpu/virt", 1044eb833b5SPeter Maydell .version_id = 1, 1054eb833b5SPeter Maydell .minimum_version_id = 1, 1064eb833b5SPeter Maydell .needed = virt_state_needed, 1074eb833b5SPeter Maydell .fields = (VMStateField[]) { 1084eb833b5SPeter Maydell VMSTATE_UINT64_2DARRAY(ich_apr, GICv3CPUState, 3, 4), 1094eb833b5SPeter Maydell VMSTATE_UINT64(ich_hcr_el2, GICv3CPUState), 1104eb833b5SPeter Maydell VMSTATE_UINT64_ARRAY(ich_lr_el2, GICv3CPUState, GICV3_LR_MAX), 1114eb833b5SPeter Maydell VMSTATE_UINT64(ich_vmcr_el2, GICv3CPUState), 1124eb833b5SPeter Maydell VMSTATE_END_OF_LIST() 1134eb833b5SPeter Maydell } 1144eb833b5SPeter Maydell }; 1154eb833b5SPeter Maydell 116326049ccSPeter Maydell static int vmstate_gicv3_cpu_pre_load(void *opaque) 1176692aac4SVijaya Kumar K { 1186692aac4SVijaya Kumar K GICv3CPUState *cs = opaque; 1196692aac4SVijaya Kumar K 1206692aac4SVijaya Kumar K /* 1216692aac4SVijaya Kumar K * If the sre_el1 subsection is not transferred this 1226692aac4SVijaya Kumar K * means SRE_EL1 is 0x7 (which might not be the same as 1236692aac4SVijaya Kumar K * our reset value). 1246692aac4SVijaya Kumar K */ 1256692aac4SVijaya Kumar K cs->icc_sre_el1 = 0x7; 1266692aac4SVijaya Kumar K return 0; 1276692aac4SVijaya Kumar K } 1286692aac4SVijaya Kumar K 1296692aac4SVijaya Kumar K static bool icc_sre_el1_reg_needed(void *opaque) 1306692aac4SVijaya Kumar K { 1316692aac4SVijaya Kumar K GICv3CPUState *cs = opaque; 1326692aac4SVijaya Kumar K 1336692aac4SVijaya Kumar K return cs->icc_sre_el1 != 7; 1346692aac4SVijaya Kumar K } 1356692aac4SVijaya Kumar K 1366692aac4SVijaya Kumar K const VMStateDescription vmstate_gicv3_cpu_sre_el1 = { 1376692aac4SVijaya Kumar K .name = "arm_gicv3_cpu/sre_el1", 1386692aac4SVijaya Kumar K .version_id = 1, 1396692aac4SVijaya Kumar K .minimum_version_id = 1, 1406692aac4SVijaya Kumar K .needed = icc_sre_el1_reg_needed, 1416692aac4SVijaya Kumar K .fields = (VMStateField[]) { 1426692aac4SVijaya Kumar K VMSTATE_UINT64(icc_sre_el1, GICv3CPUState), 1436692aac4SVijaya Kumar K VMSTATE_END_OF_LIST() 1446692aac4SVijaya Kumar K } 1456692aac4SVijaya Kumar K }; 1466692aac4SVijaya Kumar K 147757caeedSPavel Fedin static const VMStateDescription vmstate_gicv3_cpu = { 148757caeedSPavel Fedin .name = "arm_gicv3_cpu", 149757caeedSPavel Fedin .version_id = 1, 150757caeedSPavel Fedin .minimum_version_id = 1, 151326049ccSPeter Maydell .pre_load = vmstate_gicv3_cpu_pre_load, 152757caeedSPavel Fedin .fields = (VMStateField[]) { 153757caeedSPavel Fedin VMSTATE_UINT32(level, GICv3CPUState), 154757caeedSPavel Fedin VMSTATE_UINT32(gicr_ctlr, GICv3CPUState), 155757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(gicr_statusr, GICv3CPUState, 2), 156757caeedSPavel Fedin VMSTATE_UINT32(gicr_waker, GICv3CPUState), 157757caeedSPavel Fedin VMSTATE_UINT64(gicr_propbaser, GICv3CPUState), 158757caeedSPavel Fedin VMSTATE_UINT64(gicr_pendbaser, GICv3CPUState), 159757caeedSPavel Fedin VMSTATE_UINT32(gicr_igroupr0, GICv3CPUState), 160757caeedSPavel Fedin VMSTATE_UINT32(gicr_ienabler0, GICv3CPUState), 161757caeedSPavel Fedin VMSTATE_UINT32(gicr_ipendr0, GICv3CPUState), 162757caeedSPavel Fedin VMSTATE_UINT32(gicr_iactiver0, GICv3CPUState), 163757caeedSPavel Fedin VMSTATE_UINT32(edge_trigger, GICv3CPUState), 164757caeedSPavel Fedin VMSTATE_UINT32(gicr_igrpmodr0, GICv3CPUState), 165757caeedSPavel Fedin VMSTATE_UINT32(gicr_nsacr, GICv3CPUState), 166757caeedSPavel Fedin VMSTATE_UINT8_ARRAY(gicr_ipriorityr, GICv3CPUState, GIC_INTERNAL), 167757caeedSPavel Fedin VMSTATE_UINT64_ARRAY(icc_ctlr_el1, GICv3CPUState, 2), 168757caeedSPavel Fedin VMSTATE_UINT64(icc_pmr_el1, GICv3CPUState), 169757caeedSPavel Fedin VMSTATE_UINT64_ARRAY(icc_bpr, GICv3CPUState, 3), 170757caeedSPavel Fedin VMSTATE_UINT64_2DARRAY(icc_apr, GICv3CPUState, 3, 4), 171757caeedSPavel Fedin VMSTATE_UINT64_ARRAY(icc_igrpen, GICv3CPUState, 3), 172757caeedSPavel Fedin VMSTATE_UINT64(icc_ctlr_el3, GICv3CPUState), 173757caeedSPavel Fedin VMSTATE_END_OF_LIST() 1744eb833b5SPeter Maydell }, 1754eb833b5SPeter Maydell .subsections = (const VMStateDescription * []) { 1764eb833b5SPeter Maydell &vmstate_gicv3_cpu_virt, 1776692aac4SVijaya Kumar K &vmstate_gicv3_cpu_sre_el1, 1786692aac4SVijaya Kumar K NULL 179757caeedSPavel Fedin } 180757caeedSPavel Fedin }; 181757caeedSPavel Fedin 182326049ccSPeter Maydell static int gicv3_pre_load(void *opaque) 183910e2048SShannon Zhao { 184910e2048SShannon Zhao GICv3State *cs = opaque; 185910e2048SShannon Zhao 186910e2048SShannon Zhao /* 187910e2048SShannon Zhao * The gicd_no_migration_shift_bug flag is used for migration compatibility 188910e2048SShannon Zhao * for old version QEMU which may have the GICD bmp shift bug under KVM mode. 189910e2048SShannon Zhao * Strictly, what we want to know is whether the migration source is using 190910e2048SShannon Zhao * KVM. Since we don't have any way to determine that, we look at whether the 191910e2048SShannon Zhao * destination is using KVM; this is close enough because for the older QEMU 192910e2048SShannon Zhao * versions with this bug KVM -> TCG migration didn't work anyway. If the 193910e2048SShannon Zhao * source is a newer QEMU without this bug it will transmit the migration 194910e2048SShannon Zhao * subsection which sets the flag to true; otherwise it will remain set to 195910e2048SShannon Zhao * the value we select here. 196910e2048SShannon Zhao */ 197910e2048SShannon Zhao if (kvm_enabled()) { 198910e2048SShannon Zhao cs->gicd_no_migration_shift_bug = false; 199910e2048SShannon Zhao } 200910e2048SShannon Zhao 201910e2048SShannon Zhao return 0; 202910e2048SShannon Zhao } 203910e2048SShannon Zhao 20478e9ddd7SPeter Maydell static bool needed_always(void *opaque) 20578e9ddd7SPeter Maydell { 20678e9ddd7SPeter Maydell return true; 20778e9ddd7SPeter Maydell } 20878e9ddd7SPeter Maydell 209910e2048SShannon Zhao const VMStateDescription vmstate_gicv3_gicd_no_migration_shift_bug = { 210910e2048SShannon Zhao .name = "arm_gicv3/gicd_no_migration_shift_bug", 211910e2048SShannon Zhao .version_id = 1, 212910e2048SShannon Zhao .minimum_version_id = 1, 21378e9ddd7SPeter Maydell .needed = needed_always, 214910e2048SShannon Zhao .fields = (VMStateField[]) { 215910e2048SShannon Zhao VMSTATE_BOOL(gicd_no_migration_shift_bug, GICv3State), 216910e2048SShannon Zhao VMSTATE_END_OF_LIST() 217910e2048SShannon Zhao } 218910e2048SShannon Zhao }; 219910e2048SShannon Zhao 220ff8f06eeSShlomo Pongratz static const VMStateDescription vmstate_gicv3 = { 221ff8f06eeSShlomo Pongratz .name = "arm_gicv3", 222757caeedSPavel Fedin .version_id = 1, 223757caeedSPavel Fedin .minimum_version_id = 1, 224326049ccSPeter Maydell .pre_load = gicv3_pre_load, 225ff8f06eeSShlomo Pongratz .pre_save = gicv3_pre_save, 226ff8f06eeSShlomo Pongratz .post_load = gicv3_post_load, 227252a7a6aSEric Auger .priority = MIG_PRI_GICV3, 228757caeedSPavel Fedin .fields = (VMStateField[]) { 229757caeedSPavel Fedin VMSTATE_UINT32(gicd_ctlr, GICv3State), 230757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(gicd_statusr, GICv3State, 2), 231757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(group, GICv3State, GICV3_BMP_SIZE), 232757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(grpmod, GICv3State, GICV3_BMP_SIZE), 233757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(enabled, GICv3State, GICV3_BMP_SIZE), 234757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(pending, GICv3State, GICV3_BMP_SIZE), 235757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(active, GICv3State, GICV3_BMP_SIZE), 236757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(level, GICv3State, GICV3_BMP_SIZE), 237757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(edge_trigger, GICv3State, GICV3_BMP_SIZE), 238757caeedSPavel Fedin VMSTATE_UINT8_ARRAY(gicd_ipriority, GICv3State, GICV3_MAXIRQ), 239757caeedSPavel Fedin VMSTATE_UINT64_ARRAY(gicd_irouter, GICv3State, GICV3_MAXIRQ), 240757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(gicd_nsacr, GICv3State, 241757caeedSPavel Fedin DIV_ROUND_UP(GICV3_MAXIRQ, 16)), 242757caeedSPavel Fedin VMSTATE_STRUCT_VARRAY_POINTER_UINT32(cpu, GICv3State, num_cpu, 243757caeedSPavel Fedin vmstate_gicv3_cpu, GICv3CPUState), 244757caeedSPavel Fedin VMSTATE_END_OF_LIST() 245910e2048SShannon Zhao }, 246910e2048SShannon Zhao .subsections = (const VMStateDescription * []) { 247910e2048SShannon Zhao &vmstate_gicv3_gicd_no_migration_shift_bug, 248910e2048SShannon Zhao NULL 249757caeedSPavel Fedin } 250ff8f06eeSShlomo Pongratz }; 251ff8f06eeSShlomo Pongratz 252ff8f06eeSShlomo Pongratz void gicv3_init_irqs_and_mmio(GICv3State *s, qemu_irq_handler handler, 2531e575b66SEric Auger const MemoryRegionOps *ops, Error **errp) 254ff8f06eeSShlomo Pongratz { 255ff8f06eeSShlomo Pongratz SysBusDevice *sbd = SYS_BUS_DEVICE(s); 2561e575b66SEric Auger int rdist_capacity = 0; 257ff8f06eeSShlomo Pongratz int i; 258ff8f06eeSShlomo Pongratz 2591e575b66SEric Auger for (i = 0; i < s->nb_redist_regions; i++) { 2601e575b66SEric Auger rdist_capacity += s->redist_region_count[i]; 2611e575b66SEric Auger } 2621e575b66SEric Auger if (rdist_capacity < s->num_cpu) { 2631e575b66SEric Auger error_setg(errp, "Capacity of the redist regions(%d) " 2641e575b66SEric Auger "is less than number of vcpus(%d)", 2651e575b66SEric Auger rdist_capacity, s->num_cpu); 2661e575b66SEric Auger return; 2671e575b66SEric Auger } 2681e575b66SEric Auger 269ff8f06eeSShlomo Pongratz /* For the GIC, also expose incoming GPIO lines for PPIs for each CPU. 270ff8f06eeSShlomo Pongratz * GPIO array layout is thus: 271ff8f06eeSShlomo Pongratz * [0..N-1] spi 272ff8f06eeSShlomo Pongratz * [N..N+31] PPIs for CPU 0 273ff8f06eeSShlomo Pongratz * [N+32..N+63] PPIs for CPU 1 274ff8f06eeSShlomo Pongratz * ... 275ff8f06eeSShlomo Pongratz */ 276ff8f06eeSShlomo Pongratz i = s->num_irq - GIC_INTERNAL + GIC_INTERNAL * s->num_cpu; 277ff8f06eeSShlomo Pongratz qdev_init_gpio_in(DEVICE(s), handler, i); 278ff8f06eeSShlomo Pongratz 279ff8f06eeSShlomo Pongratz for (i = 0; i < s->num_cpu; i++) { 2803faf2b0cSPeter Maydell sysbus_init_irq(sbd, &s->cpu[i].parent_irq); 281ff8f06eeSShlomo Pongratz } 282ff8f06eeSShlomo Pongratz for (i = 0; i < s->num_cpu; i++) { 2833faf2b0cSPeter Maydell sysbus_init_irq(sbd, &s->cpu[i].parent_fiq); 284ff8f06eeSShlomo Pongratz } 285b53db42bSPeter Maydell for (i = 0; i < s->num_cpu; i++) { 286b53db42bSPeter Maydell sysbus_init_irq(sbd, &s->cpu[i].parent_virq); 287b53db42bSPeter Maydell } 288b53db42bSPeter Maydell for (i = 0; i < s->num_cpu; i++) { 289b53db42bSPeter Maydell sysbus_init_irq(sbd, &s->cpu[i].parent_vfiq); 290b53db42bSPeter Maydell } 291ff8f06eeSShlomo Pongratz 292ff8f06eeSShlomo Pongratz memory_region_init_io(&s->iomem_dist, OBJECT(s), ops, s, 293ff8f06eeSShlomo Pongratz "gicv3_dist", 0x10000); 294ff8f06eeSShlomo Pongratz sysbus_init_mmio(sbd, &s->iomem_dist); 2951e575b66SEric Auger 2961e575b66SEric Auger s->iomem_redist = g_new0(MemoryRegion, s->nb_redist_regions); 2971e575b66SEric Auger for (i = 0; i < s->nb_redist_regions; i++) { 2981e575b66SEric Auger char *name = g_strdup_printf("gicv3_redist_region[%d]", i); 2991e575b66SEric Auger 3001e575b66SEric Auger memory_region_init_io(&s->iomem_redist[i], OBJECT(s), 3011e575b66SEric Auger ops ? &ops[1] : NULL, s, name, 3021e575b66SEric Auger s->redist_region_count[i] * GICV3_REDIST_SIZE); 3031e575b66SEric Auger sysbus_init_mmio(sbd, &s->iomem_redist[i]); 3041e575b66SEric Auger g_free(name); 3051e575b66SEric Auger } 306ff8f06eeSShlomo Pongratz } 307ff8f06eeSShlomo Pongratz 308ff8f06eeSShlomo Pongratz static void arm_gicv3_common_realize(DeviceState *dev, Error **errp) 309ff8f06eeSShlomo Pongratz { 310ff8f06eeSShlomo Pongratz GICv3State *s = ARM_GICV3_COMMON(dev); 31107e2034dSPavel Fedin int i; 312ff8f06eeSShlomo Pongratz 313ff8f06eeSShlomo Pongratz /* revision property is actually reserved and currently used only in order 314ff8f06eeSShlomo Pongratz * to keep the interface compatible with GICv2 code, avoiding extra 315ff8f06eeSShlomo Pongratz * conditions. However, in future it could be used, for example, if we 316ff8f06eeSShlomo Pongratz * implement GICv4. 317ff8f06eeSShlomo Pongratz */ 318ff8f06eeSShlomo Pongratz if (s->revision != 3) { 319ff8f06eeSShlomo Pongratz error_setg(errp, "unsupported GIC revision %d", s->revision); 320ff8f06eeSShlomo Pongratz return; 321ff8f06eeSShlomo Pongratz } 32207e2034dSPavel Fedin 32307e2034dSPavel Fedin if (s->num_irq > GICV3_MAXIRQ) { 32407e2034dSPavel Fedin error_setg(errp, 32507e2034dSPavel Fedin "requested %u interrupt lines exceeds GIC maximum %d", 32607e2034dSPavel Fedin s->num_irq, GICV3_MAXIRQ); 32707e2034dSPavel Fedin return; 32807e2034dSPavel Fedin } 32907e2034dSPavel Fedin if (s->num_irq < GIC_INTERNAL) { 33007e2034dSPavel Fedin error_setg(errp, 33107e2034dSPavel Fedin "requested %u interrupt lines is below GIC minimum %d", 33207e2034dSPavel Fedin s->num_irq, GIC_INTERNAL); 33307e2034dSPavel Fedin return; 33407e2034dSPavel Fedin } 33507e2034dSPavel Fedin 33607e2034dSPavel Fedin /* ITLinesNumber is represented as (N / 32) - 1, so this is an 33707e2034dSPavel Fedin * implementation imposed restriction, not an architectural one, 33807e2034dSPavel Fedin * so we don't have to deal with bitfields where only some of the 33907e2034dSPavel Fedin * bits in a 32-bit word should be valid. 34007e2034dSPavel Fedin */ 34107e2034dSPavel Fedin if (s->num_irq % 32) { 34207e2034dSPavel Fedin error_setg(errp, 34307e2034dSPavel Fedin "%d interrupt lines unsupported: not divisible by 32", 34407e2034dSPavel Fedin s->num_irq); 34507e2034dSPavel Fedin return; 34607e2034dSPavel Fedin } 34707e2034dSPavel Fedin 34807e2034dSPavel Fedin s->cpu = g_new0(GICv3CPUState, s->num_cpu); 34907e2034dSPavel Fedin 35007e2034dSPavel Fedin for (i = 0; i < s->num_cpu; i++) { 35107e2034dSPavel Fedin CPUState *cpu = qemu_get_cpu(i); 35207e2034dSPavel Fedin uint64_t cpu_affid; 35307e2034dSPavel Fedin int last; 35407e2034dSPavel Fedin 35507e2034dSPavel Fedin s->cpu[i].cpu = cpu; 35607e2034dSPavel Fedin s->cpu[i].gic = s; 357d3a3e529SVijaya Kumar K /* Store GICv3CPUState in CPUARMState gicv3state pointer */ 358d3a3e529SVijaya Kumar K gicv3_set_gicv3state(cpu, &s->cpu[i]); 35907e2034dSPavel Fedin 36007e2034dSPavel Fedin /* Pre-construct the GICR_TYPER: 36107e2034dSPavel Fedin * For our implementation: 36207e2034dSPavel Fedin * Top 32 bits are the affinity value of the associated CPU 36307e2034dSPavel Fedin * CommonLPIAff == 01 (redistributors with same Aff3 share LPI table) 36407e2034dSPavel Fedin * Processor_Number == CPU index starting from 0 36507e2034dSPavel Fedin * DPGS == 0 (GICR_CTLR.DPG* not supported) 36607e2034dSPavel Fedin * Last == 1 if this is the last redistributor in a series of 36707e2034dSPavel Fedin * contiguous redistributor pages 36807e2034dSPavel Fedin * DirectLPI == 0 (direct injection of LPIs not supported) 36907e2034dSPavel Fedin * VLPIS == 0 (virtual LPIs not supported) 37007e2034dSPavel Fedin * PLPIS == 0 (physical LPIs not supported) 37107e2034dSPavel Fedin */ 37277a7a367SMarc-André Lureau cpu_affid = object_property_get_uint(OBJECT(cpu), "mp-affinity", NULL); 37307e2034dSPavel Fedin last = (i == s->num_cpu - 1); 37407e2034dSPavel Fedin 37507e2034dSPavel Fedin /* The CPU mp-affinity property is in MPIDR register format; squash 37607e2034dSPavel Fedin * the affinity bytes into 32 bits as the GICR_TYPER has them. 37707e2034dSPavel Fedin */ 37892204403SAndrew Jones cpu_affid = ((cpu_affid & 0xFF00000000ULL) >> 8) | 37992204403SAndrew Jones (cpu_affid & 0xFFFFFF); 38007e2034dSPavel Fedin s->cpu[i].gicr_typer = (cpu_affid << 32) | 38107e2034dSPavel Fedin (1 << 24) | 38207e2034dSPavel Fedin (i << 8) | 38307e2034dSPavel Fedin (last << 4); 38407e2034dSPavel Fedin } 385ff8f06eeSShlomo Pongratz } 386ff8f06eeSShlomo Pongratz 3871e575b66SEric Auger static void arm_gicv3_finalize(Object *obj) 3881e575b66SEric Auger { 3891e575b66SEric Auger GICv3State *s = ARM_GICV3_COMMON(obj); 3901e575b66SEric Auger 3911e575b66SEric Auger g_free(s->redist_region_count); 3921e575b66SEric Auger } 3931e575b66SEric Auger 394ff8f06eeSShlomo Pongratz static void arm_gicv3_common_reset(DeviceState *dev) 395ff8f06eeSShlomo Pongratz { 39607e2034dSPavel Fedin GICv3State *s = ARM_GICV3_COMMON(dev); 39707e2034dSPavel Fedin int i; 39807e2034dSPavel Fedin 39907e2034dSPavel Fedin for (i = 0; i < s->num_cpu; i++) { 40007e2034dSPavel Fedin GICv3CPUState *cs = &s->cpu[i]; 40107e2034dSPavel Fedin 40207e2034dSPavel Fedin cs->level = 0; 40307e2034dSPavel Fedin cs->gicr_ctlr = 0; 40407e2034dSPavel Fedin cs->gicr_statusr[GICV3_S] = 0; 40507e2034dSPavel Fedin cs->gicr_statusr[GICV3_NS] = 0; 40607e2034dSPavel Fedin cs->gicr_waker = GICR_WAKER_ProcessorSleep | GICR_WAKER_ChildrenAsleep; 40707e2034dSPavel Fedin cs->gicr_propbaser = 0; 40807e2034dSPavel Fedin cs->gicr_pendbaser = 0; 40907e2034dSPavel Fedin /* If we're resetting a TZ-aware GIC as if secure firmware 41007e2034dSPavel Fedin * had set it up ready to start a kernel in non-secure, we 41107e2034dSPavel Fedin * need to set interrupts to group 1 so the kernel can use them. 41207e2034dSPavel Fedin * Otherwise they reset to group 0 like the hardware. 41307e2034dSPavel Fedin */ 41407e2034dSPavel Fedin if (s->irq_reset_nonsecure) { 41507e2034dSPavel Fedin cs->gicr_igroupr0 = 0xffffffff; 41607e2034dSPavel Fedin } else { 41707e2034dSPavel Fedin cs->gicr_igroupr0 = 0; 41807e2034dSPavel Fedin } 41907e2034dSPavel Fedin 42007e2034dSPavel Fedin cs->gicr_ienabler0 = 0; 42107e2034dSPavel Fedin cs->gicr_ipendr0 = 0; 42207e2034dSPavel Fedin cs->gicr_iactiver0 = 0; 42307e2034dSPavel Fedin cs->edge_trigger = 0xffff; 42407e2034dSPavel Fedin cs->gicr_igrpmodr0 = 0; 42507e2034dSPavel Fedin cs->gicr_nsacr = 0; 42607e2034dSPavel Fedin memset(cs->gicr_ipriorityr, 0, sizeof(cs->gicr_ipriorityr)); 42707e2034dSPavel Fedin 428ce187c3cSPeter Maydell cs->hppi.prio = 0xff; 429ce187c3cSPeter Maydell 43007e2034dSPavel Fedin /* State in the CPU interface must *not* be reset here, because it 43107e2034dSPavel Fedin * is part of the CPU's reset domain, not the GIC device's. 43207e2034dSPavel Fedin */ 43307e2034dSPavel Fedin } 43407e2034dSPavel Fedin 43507e2034dSPavel Fedin /* For our implementation affinity routing is always enabled */ 43607e2034dSPavel Fedin if (s->security_extn) { 43707e2034dSPavel Fedin s->gicd_ctlr = GICD_CTLR_ARE_S | GICD_CTLR_ARE_NS; 43807e2034dSPavel Fedin } else { 43907e2034dSPavel Fedin s->gicd_ctlr = GICD_CTLR_DS | GICD_CTLR_ARE; 44007e2034dSPavel Fedin } 44107e2034dSPavel Fedin 44207e2034dSPavel Fedin s->gicd_statusr[GICV3_S] = 0; 44307e2034dSPavel Fedin s->gicd_statusr[GICV3_NS] = 0; 44407e2034dSPavel Fedin 44507e2034dSPavel Fedin memset(s->group, 0, sizeof(s->group)); 44607e2034dSPavel Fedin memset(s->grpmod, 0, sizeof(s->grpmod)); 44707e2034dSPavel Fedin memset(s->enabled, 0, sizeof(s->enabled)); 44807e2034dSPavel Fedin memset(s->pending, 0, sizeof(s->pending)); 44907e2034dSPavel Fedin memset(s->active, 0, sizeof(s->active)); 45007e2034dSPavel Fedin memset(s->level, 0, sizeof(s->level)); 45107e2034dSPavel Fedin memset(s->edge_trigger, 0, sizeof(s->edge_trigger)); 45207e2034dSPavel Fedin memset(s->gicd_ipriority, 0, sizeof(s->gicd_ipriority)); 45307e2034dSPavel Fedin memset(s->gicd_irouter, 0, sizeof(s->gicd_irouter)); 45407e2034dSPavel Fedin memset(s->gicd_nsacr, 0, sizeof(s->gicd_nsacr)); 455ce187c3cSPeter Maydell /* GICD_IROUTER are UNKNOWN at reset so in theory the guest must 456ce187c3cSPeter Maydell * write these to get sane behaviour and we need not populate the 457ce187c3cSPeter Maydell * pointer cache here; however having the cache be different for 458ce187c3cSPeter Maydell * "happened to be 0 from reset" and "guest wrote 0" would be 459ce187c3cSPeter Maydell * too confusing. 460ce187c3cSPeter Maydell */ 461ce187c3cSPeter Maydell gicv3_cache_all_target_cpustates(s); 46207e2034dSPavel Fedin 46307e2034dSPavel Fedin if (s->irq_reset_nonsecure) { 46407e2034dSPavel Fedin /* If we're resetting a TZ-aware GIC as if secure firmware 46507e2034dSPavel Fedin * had set it up ready to start a kernel in non-secure, we 46607e2034dSPavel Fedin * need to set interrupts to group 1 so the kernel can use them. 46707e2034dSPavel Fedin * Otherwise they reset to group 0 like the hardware. 46807e2034dSPavel Fedin */ 46907e2034dSPavel Fedin for (i = GIC_INTERNAL; i < s->num_irq; i++) { 47007e2034dSPavel Fedin gicv3_gicd_group_set(s, i); 47107e2034dSPavel Fedin } 47207e2034dSPavel Fedin } 473910e2048SShannon Zhao s->gicd_no_migration_shift_bug = true; 47407e2034dSPavel Fedin } 47507e2034dSPavel Fedin 47607e2034dSPavel Fedin static void arm_gic_common_linux_init(ARMLinuxBootIf *obj, 47707e2034dSPavel Fedin bool secure_boot) 47807e2034dSPavel Fedin { 47907e2034dSPavel Fedin GICv3State *s = ARM_GICV3_COMMON(obj); 48007e2034dSPavel Fedin 48107e2034dSPavel Fedin if (s->security_extn && !secure_boot) { 48207e2034dSPavel Fedin /* We're directly booting a kernel into NonSecure. If this GIC 48307e2034dSPavel Fedin * implements the security extensions then we must configure it 48407e2034dSPavel Fedin * to have all the interrupts be NonSecure (this is a job that 48507e2034dSPavel Fedin * is done by the Secure boot firmware in real hardware, and in 48607e2034dSPavel Fedin * this mode QEMU is acting as a minimalist firmware-and-bootloader 48707e2034dSPavel Fedin * equivalent). 48807e2034dSPavel Fedin */ 48907e2034dSPavel Fedin s->irq_reset_nonsecure = true; 49007e2034dSPavel Fedin } 491ff8f06eeSShlomo Pongratz } 492ff8f06eeSShlomo Pongratz 493ff8f06eeSShlomo Pongratz static Property arm_gicv3_common_properties[] = { 494ff8f06eeSShlomo Pongratz DEFINE_PROP_UINT32("num-cpu", GICv3State, num_cpu, 1), 495ff8f06eeSShlomo Pongratz DEFINE_PROP_UINT32("num-irq", GICv3State, num_irq, 32), 496ff8f06eeSShlomo Pongratz DEFINE_PROP_UINT32("revision", GICv3State, revision, 3), 497ff8f06eeSShlomo Pongratz DEFINE_PROP_BOOL("has-security-extensions", GICv3State, security_extn, 0), 4981e575b66SEric Auger DEFINE_PROP_ARRAY("redist-region-count", GICv3State, nb_redist_regions, 4991e575b66SEric Auger redist_region_count, qdev_prop_uint32, uint32_t), 500ff8f06eeSShlomo Pongratz DEFINE_PROP_END_OF_LIST(), 501ff8f06eeSShlomo Pongratz }; 502ff8f06eeSShlomo Pongratz 503ff8f06eeSShlomo Pongratz static void arm_gicv3_common_class_init(ObjectClass *klass, void *data) 504ff8f06eeSShlomo Pongratz { 505ff8f06eeSShlomo Pongratz DeviceClass *dc = DEVICE_CLASS(klass); 50607e2034dSPavel Fedin ARMLinuxBootIfClass *albifc = ARM_LINUX_BOOT_IF_CLASS(klass); 507ff8f06eeSShlomo Pongratz 508ff8f06eeSShlomo Pongratz dc->reset = arm_gicv3_common_reset; 509ff8f06eeSShlomo Pongratz dc->realize = arm_gicv3_common_realize; 510ff8f06eeSShlomo Pongratz dc->props = arm_gicv3_common_properties; 511ff8f06eeSShlomo Pongratz dc->vmsd = &vmstate_gicv3; 51207e2034dSPavel Fedin albifc->arm_linux_init = arm_gic_common_linux_init; 513ff8f06eeSShlomo Pongratz } 514ff8f06eeSShlomo Pongratz 515ff8f06eeSShlomo Pongratz static const TypeInfo arm_gicv3_common_type = { 516ff8f06eeSShlomo Pongratz .name = TYPE_ARM_GICV3_COMMON, 517ff8f06eeSShlomo Pongratz .parent = TYPE_SYS_BUS_DEVICE, 518ff8f06eeSShlomo Pongratz .instance_size = sizeof(GICv3State), 519ff8f06eeSShlomo Pongratz .class_size = sizeof(ARMGICv3CommonClass), 520ff8f06eeSShlomo Pongratz .class_init = arm_gicv3_common_class_init, 5211e575b66SEric Auger .instance_finalize = arm_gicv3_finalize, 522ff8f06eeSShlomo Pongratz .abstract = true, 52307e2034dSPavel Fedin .interfaces = (InterfaceInfo []) { 52407e2034dSPavel Fedin { TYPE_ARM_LINUX_BOOT_IF }, 52507e2034dSPavel Fedin { }, 52607e2034dSPavel Fedin }, 527ff8f06eeSShlomo Pongratz }; 528ff8f06eeSShlomo Pongratz 529ff8f06eeSShlomo Pongratz static void register_types(void) 530ff8f06eeSShlomo Pongratz { 531ff8f06eeSShlomo Pongratz type_register_static(&arm_gicv3_common_type); 532ff8f06eeSShlomo Pongratz } 533ff8f06eeSShlomo Pongratz 534ff8f06eeSShlomo Pongratz type_init(register_types) 535