1ff8f06eeSShlomo Pongratz /* 2ff8f06eeSShlomo Pongratz * ARM GICv3 support - common bits of emulated and KVM kernel model 3ff8f06eeSShlomo Pongratz * 4ff8f06eeSShlomo Pongratz * Copyright (c) 2012 Linaro Limited 5ff8f06eeSShlomo Pongratz * Copyright (c) 2015 Huawei. 607e2034dSPavel Fedin * Copyright (c) 2015 Samsung Electronics Co., Ltd. 7ff8f06eeSShlomo Pongratz * Written by Peter Maydell 807e2034dSPavel Fedin * Reworked for GICv3 by Shlomo Pongratz and Pavel Fedin 9ff8f06eeSShlomo Pongratz * 10ff8f06eeSShlomo Pongratz * This program is free software; you can redistribute it and/or modify 11ff8f06eeSShlomo Pongratz * it under the terms of the GNU General Public License as published by 12ff8f06eeSShlomo Pongratz * the Free Software Foundation, either version 2 of the License, or 13ff8f06eeSShlomo Pongratz * (at your option) any later version. 14ff8f06eeSShlomo Pongratz * 15ff8f06eeSShlomo Pongratz * This program is distributed in the hope that it will be useful, 16ff8f06eeSShlomo Pongratz * but WITHOUT ANY WARRANTY; without even the implied warranty of 17ff8f06eeSShlomo Pongratz * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 18ff8f06eeSShlomo Pongratz * GNU General Public License for more details. 19ff8f06eeSShlomo Pongratz * 20ff8f06eeSShlomo Pongratz * You should have received a copy of the GNU General Public License along 21ff8f06eeSShlomo Pongratz * with this program; if not, see <http://www.gnu.org/licenses/>. 22ff8f06eeSShlomo Pongratz */ 23ff8f06eeSShlomo Pongratz 248ef94f0bSPeter Maydell #include "qemu/osdep.h" 25da34e65cSMarkus Armbruster #include "qapi/error.h" 260b8fa32fSMarkus Armbruster #include "qemu/module.h" 2707e2034dSPavel Fedin #include "qom/cpu.h" 28ff8f06eeSShlomo Pongratz #include "hw/intc/arm_gicv3_common.h" 29*d6454270SMarkus Armbruster #include "migration/vmstate.h" 3007e2034dSPavel Fedin #include "gicv3_internal.h" 3107e2034dSPavel Fedin #include "hw/arm/linux-boot-if.h" 32910e2048SShannon Zhao #include "sysemu/kvm.h" 33ff8f06eeSShlomo Pongratz 34341823c1SPeter Maydell 35341823c1SPeter Maydell static void gicv3_gicd_no_migration_shift_bug_post_load(GICv3State *cs) 36341823c1SPeter Maydell { 37341823c1SPeter Maydell if (cs->gicd_no_migration_shift_bug) { 38341823c1SPeter Maydell return; 39341823c1SPeter Maydell } 40341823c1SPeter Maydell 41341823c1SPeter Maydell /* Older versions of QEMU had a bug in the handling of state save/restore 42341823c1SPeter Maydell * to the KVM GICv3: they got the offset in the bitmap arrays wrong, 43341823c1SPeter Maydell * so that instead of the data for external interrupts 32 and up 44341823c1SPeter Maydell * starting at bit position 32 in the bitmap, it started at bit 45341823c1SPeter Maydell * position 64. If we're receiving data from a QEMU with that bug, 46341823c1SPeter Maydell * we must move the data down into the right place. 47341823c1SPeter Maydell */ 48341823c1SPeter Maydell memmove(cs->group, (uint8_t *)cs->group + GIC_INTERNAL / 8, 49341823c1SPeter Maydell sizeof(cs->group) - GIC_INTERNAL / 8); 50341823c1SPeter Maydell memmove(cs->grpmod, (uint8_t *)cs->grpmod + GIC_INTERNAL / 8, 51341823c1SPeter Maydell sizeof(cs->grpmod) - GIC_INTERNAL / 8); 52341823c1SPeter Maydell memmove(cs->enabled, (uint8_t *)cs->enabled + GIC_INTERNAL / 8, 53341823c1SPeter Maydell sizeof(cs->enabled) - GIC_INTERNAL / 8); 54341823c1SPeter Maydell memmove(cs->pending, (uint8_t *)cs->pending + GIC_INTERNAL / 8, 55341823c1SPeter Maydell sizeof(cs->pending) - GIC_INTERNAL / 8); 56341823c1SPeter Maydell memmove(cs->active, (uint8_t *)cs->active + GIC_INTERNAL / 8, 57341823c1SPeter Maydell sizeof(cs->active) - GIC_INTERNAL / 8); 58341823c1SPeter Maydell memmove(cs->edge_trigger, (uint8_t *)cs->edge_trigger + GIC_INTERNAL / 8, 59341823c1SPeter Maydell sizeof(cs->edge_trigger) - GIC_INTERNAL / 8); 60341823c1SPeter Maydell 61341823c1SPeter Maydell /* 62341823c1SPeter Maydell * While this new version QEMU doesn't have this kind of bug as we fix it, 63341823c1SPeter Maydell * so it needs to set the flag to true to indicate that and it's necessary 64341823c1SPeter Maydell * for next migration to work from this new version QEMU. 65341823c1SPeter Maydell */ 66341823c1SPeter Maydell cs->gicd_no_migration_shift_bug = true; 67341823c1SPeter Maydell } 68341823c1SPeter Maydell 6944b1ff31SDr. David Alan Gilbert static int gicv3_pre_save(void *opaque) 70ff8f06eeSShlomo Pongratz { 71ff8f06eeSShlomo Pongratz GICv3State *s = (GICv3State *)opaque; 72ff8f06eeSShlomo Pongratz ARMGICv3CommonClass *c = ARM_GICV3_COMMON_GET_CLASS(s); 73ff8f06eeSShlomo Pongratz 74ff8f06eeSShlomo Pongratz if (c->pre_save) { 75ff8f06eeSShlomo Pongratz c->pre_save(s); 76ff8f06eeSShlomo Pongratz } 7744b1ff31SDr. David Alan Gilbert 7844b1ff31SDr. David Alan Gilbert return 0; 79ff8f06eeSShlomo Pongratz } 80ff8f06eeSShlomo Pongratz 81ff8f06eeSShlomo Pongratz static int gicv3_post_load(void *opaque, int version_id) 82ff8f06eeSShlomo Pongratz { 83ff8f06eeSShlomo Pongratz GICv3State *s = (GICv3State *)opaque; 84ff8f06eeSShlomo Pongratz ARMGICv3CommonClass *c = ARM_GICV3_COMMON_GET_CLASS(s); 85ff8f06eeSShlomo Pongratz 86341823c1SPeter Maydell gicv3_gicd_no_migration_shift_bug_post_load(s); 87341823c1SPeter Maydell 88ff8f06eeSShlomo Pongratz if (c->post_load) { 89ff8f06eeSShlomo Pongratz c->post_load(s); 90ff8f06eeSShlomo Pongratz } 91ff8f06eeSShlomo Pongratz return 0; 92ff8f06eeSShlomo Pongratz } 93ff8f06eeSShlomo Pongratz 944eb833b5SPeter Maydell static bool virt_state_needed(void *opaque) 954eb833b5SPeter Maydell { 964eb833b5SPeter Maydell GICv3CPUState *cs = opaque; 974eb833b5SPeter Maydell 984eb833b5SPeter Maydell return cs->num_list_regs != 0; 994eb833b5SPeter Maydell } 1004eb833b5SPeter Maydell 1014eb833b5SPeter Maydell static const VMStateDescription vmstate_gicv3_cpu_virt = { 1024eb833b5SPeter Maydell .name = "arm_gicv3_cpu/virt", 1034eb833b5SPeter Maydell .version_id = 1, 1044eb833b5SPeter Maydell .minimum_version_id = 1, 1054eb833b5SPeter Maydell .needed = virt_state_needed, 1064eb833b5SPeter Maydell .fields = (VMStateField[]) { 1074eb833b5SPeter Maydell VMSTATE_UINT64_2DARRAY(ich_apr, GICv3CPUState, 3, 4), 1084eb833b5SPeter Maydell VMSTATE_UINT64(ich_hcr_el2, GICv3CPUState), 1094eb833b5SPeter Maydell VMSTATE_UINT64_ARRAY(ich_lr_el2, GICv3CPUState, GICV3_LR_MAX), 1104eb833b5SPeter Maydell VMSTATE_UINT64(ich_vmcr_el2, GICv3CPUState), 1114eb833b5SPeter Maydell VMSTATE_END_OF_LIST() 1124eb833b5SPeter Maydell } 1134eb833b5SPeter Maydell }; 1144eb833b5SPeter Maydell 115326049ccSPeter Maydell static int vmstate_gicv3_cpu_pre_load(void *opaque) 1166692aac4SVijaya Kumar K { 1176692aac4SVijaya Kumar K GICv3CPUState *cs = opaque; 1186692aac4SVijaya Kumar K 1196692aac4SVijaya Kumar K /* 1206692aac4SVijaya Kumar K * If the sre_el1 subsection is not transferred this 1216692aac4SVijaya Kumar K * means SRE_EL1 is 0x7 (which might not be the same as 1226692aac4SVijaya Kumar K * our reset value). 1236692aac4SVijaya Kumar K */ 1246692aac4SVijaya Kumar K cs->icc_sre_el1 = 0x7; 1256692aac4SVijaya Kumar K return 0; 1266692aac4SVijaya Kumar K } 1276692aac4SVijaya Kumar K 1286692aac4SVijaya Kumar K static bool icc_sre_el1_reg_needed(void *opaque) 1296692aac4SVijaya Kumar K { 1306692aac4SVijaya Kumar K GICv3CPUState *cs = opaque; 1316692aac4SVijaya Kumar K 1326692aac4SVijaya Kumar K return cs->icc_sre_el1 != 7; 1336692aac4SVijaya Kumar K } 1346692aac4SVijaya Kumar K 1356692aac4SVijaya Kumar K const VMStateDescription vmstate_gicv3_cpu_sre_el1 = { 1366692aac4SVijaya Kumar K .name = "arm_gicv3_cpu/sre_el1", 1376692aac4SVijaya Kumar K .version_id = 1, 1386692aac4SVijaya Kumar K .minimum_version_id = 1, 1396692aac4SVijaya Kumar K .needed = icc_sre_el1_reg_needed, 1406692aac4SVijaya Kumar K .fields = (VMStateField[]) { 1416692aac4SVijaya Kumar K VMSTATE_UINT64(icc_sre_el1, GICv3CPUState), 1426692aac4SVijaya Kumar K VMSTATE_END_OF_LIST() 1436692aac4SVijaya Kumar K } 1446692aac4SVijaya Kumar K }; 1456692aac4SVijaya Kumar K 146757caeedSPavel Fedin static const VMStateDescription vmstate_gicv3_cpu = { 147757caeedSPavel Fedin .name = "arm_gicv3_cpu", 148757caeedSPavel Fedin .version_id = 1, 149757caeedSPavel Fedin .minimum_version_id = 1, 150326049ccSPeter Maydell .pre_load = vmstate_gicv3_cpu_pre_load, 151757caeedSPavel Fedin .fields = (VMStateField[]) { 152757caeedSPavel Fedin VMSTATE_UINT32(level, GICv3CPUState), 153757caeedSPavel Fedin VMSTATE_UINT32(gicr_ctlr, GICv3CPUState), 154757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(gicr_statusr, GICv3CPUState, 2), 155757caeedSPavel Fedin VMSTATE_UINT32(gicr_waker, GICv3CPUState), 156757caeedSPavel Fedin VMSTATE_UINT64(gicr_propbaser, GICv3CPUState), 157757caeedSPavel Fedin VMSTATE_UINT64(gicr_pendbaser, GICv3CPUState), 158757caeedSPavel Fedin VMSTATE_UINT32(gicr_igroupr0, GICv3CPUState), 159757caeedSPavel Fedin VMSTATE_UINT32(gicr_ienabler0, GICv3CPUState), 160757caeedSPavel Fedin VMSTATE_UINT32(gicr_ipendr0, GICv3CPUState), 161757caeedSPavel Fedin VMSTATE_UINT32(gicr_iactiver0, GICv3CPUState), 162757caeedSPavel Fedin VMSTATE_UINT32(edge_trigger, GICv3CPUState), 163757caeedSPavel Fedin VMSTATE_UINT32(gicr_igrpmodr0, GICv3CPUState), 164757caeedSPavel Fedin VMSTATE_UINT32(gicr_nsacr, GICv3CPUState), 165757caeedSPavel Fedin VMSTATE_UINT8_ARRAY(gicr_ipriorityr, GICv3CPUState, GIC_INTERNAL), 166757caeedSPavel Fedin VMSTATE_UINT64_ARRAY(icc_ctlr_el1, GICv3CPUState, 2), 167757caeedSPavel Fedin VMSTATE_UINT64(icc_pmr_el1, GICv3CPUState), 168757caeedSPavel Fedin VMSTATE_UINT64_ARRAY(icc_bpr, GICv3CPUState, 3), 169757caeedSPavel Fedin VMSTATE_UINT64_2DARRAY(icc_apr, GICv3CPUState, 3, 4), 170757caeedSPavel Fedin VMSTATE_UINT64_ARRAY(icc_igrpen, GICv3CPUState, 3), 171757caeedSPavel Fedin VMSTATE_UINT64(icc_ctlr_el3, GICv3CPUState), 172757caeedSPavel Fedin VMSTATE_END_OF_LIST() 1734eb833b5SPeter Maydell }, 1744eb833b5SPeter Maydell .subsections = (const VMStateDescription * []) { 1754eb833b5SPeter Maydell &vmstate_gicv3_cpu_virt, 1766692aac4SVijaya Kumar K &vmstate_gicv3_cpu_sre_el1, 1776692aac4SVijaya Kumar K NULL 178757caeedSPavel Fedin } 179757caeedSPavel Fedin }; 180757caeedSPavel Fedin 181326049ccSPeter Maydell static int gicv3_pre_load(void *opaque) 182910e2048SShannon Zhao { 183910e2048SShannon Zhao GICv3State *cs = opaque; 184910e2048SShannon Zhao 185910e2048SShannon Zhao /* 186910e2048SShannon Zhao * The gicd_no_migration_shift_bug flag is used for migration compatibility 187910e2048SShannon Zhao * for old version QEMU which may have the GICD bmp shift bug under KVM mode. 188910e2048SShannon Zhao * Strictly, what we want to know is whether the migration source is using 189910e2048SShannon Zhao * KVM. Since we don't have any way to determine that, we look at whether the 190910e2048SShannon Zhao * destination is using KVM; this is close enough because for the older QEMU 191910e2048SShannon Zhao * versions with this bug KVM -> TCG migration didn't work anyway. If the 192910e2048SShannon Zhao * source is a newer QEMU without this bug it will transmit the migration 193910e2048SShannon Zhao * subsection which sets the flag to true; otherwise it will remain set to 194910e2048SShannon Zhao * the value we select here. 195910e2048SShannon Zhao */ 196910e2048SShannon Zhao if (kvm_enabled()) { 197910e2048SShannon Zhao cs->gicd_no_migration_shift_bug = false; 198910e2048SShannon Zhao } 199910e2048SShannon Zhao 200910e2048SShannon Zhao return 0; 201910e2048SShannon Zhao } 202910e2048SShannon Zhao 20378e9ddd7SPeter Maydell static bool needed_always(void *opaque) 20478e9ddd7SPeter Maydell { 20578e9ddd7SPeter Maydell return true; 20678e9ddd7SPeter Maydell } 20778e9ddd7SPeter Maydell 208910e2048SShannon Zhao const VMStateDescription vmstate_gicv3_gicd_no_migration_shift_bug = { 209910e2048SShannon Zhao .name = "arm_gicv3/gicd_no_migration_shift_bug", 210910e2048SShannon Zhao .version_id = 1, 211910e2048SShannon Zhao .minimum_version_id = 1, 21278e9ddd7SPeter Maydell .needed = needed_always, 213910e2048SShannon Zhao .fields = (VMStateField[]) { 214910e2048SShannon Zhao VMSTATE_BOOL(gicd_no_migration_shift_bug, GICv3State), 215910e2048SShannon Zhao VMSTATE_END_OF_LIST() 216910e2048SShannon Zhao } 217910e2048SShannon Zhao }; 218910e2048SShannon Zhao 219ff8f06eeSShlomo Pongratz static const VMStateDescription vmstate_gicv3 = { 220ff8f06eeSShlomo Pongratz .name = "arm_gicv3", 221757caeedSPavel Fedin .version_id = 1, 222757caeedSPavel Fedin .minimum_version_id = 1, 223326049ccSPeter Maydell .pre_load = gicv3_pre_load, 224ff8f06eeSShlomo Pongratz .pre_save = gicv3_pre_save, 225ff8f06eeSShlomo Pongratz .post_load = gicv3_post_load, 226252a7a6aSEric Auger .priority = MIG_PRI_GICV3, 227757caeedSPavel Fedin .fields = (VMStateField[]) { 228757caeedSPavel Fedin VMSTATE_UINT32(gicd_ctlr, GICv3State), 229757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(gicd_statusr, GICv3State, 2), 230757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(group, GICv3State, GICV3_BMP_SIZE), 231757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(grpmod, GICv3State, GICV3_BMP_SIZE), 232757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(enabled, GICv3State, GICV3_BMP_SIZE), 233757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(pending, GICv3State, GICV3_BMP_SIZE), 234757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(active, GICv3State, GICV3_BMP_SIZE), 235757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(level, GICv3State, GICV3_BMP_SIZE), 236757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(edge_trigger, GICv3State, GICV3_BMP_SIZE), 237757caeedSPavel Fedin VMSTATE_UINT8_ARRAY(gicd_ipriority, GICv3State, GICV3_MAXIRQ), 238757caeedSPavel Fedin VMSTATE_UINT64_ARRAY(gicd_irouter, GICv3State, GICV3_MAXIRQ), 239757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(gicd_nsacr, GICv3State, 240757caeedSPavel Fedin DIV_ROUND_UP(GICV3_MAXIRQ, 16)), 241757caeedSPavel Fedin VMSTATE_STRUCT_VARRAY_POINTER_UINT32(cpu, GICv3State, num_cpu, 242757caeedSPavel Fedin vmstate_gicv3_cpu, GICv3CPUState), 243757caeedSPavel Fedin VMSTATE_END_OF_LIST() 244910e2048SShannon Zhao }, 245910e2048SShannon Zhao .subsections = (const VMStateDescription * []) { 246910e2048SShannon Zhao &vmstate_gicv3_gicd_no_migration_shift_bug, 247910e2048SShannon Zhao NULL 248757caeedSPavel Fedin } 249ff8f06eeSShlomo Pongratz }; 250ff8f06eeSShlomo Pongratz 251ff8f06eeSShlomo Pongratz void gicv3_init_irqs_and_mmio(GICv3State *s, qemu_irq_handler handler, 2521e575b66SEric Auger const MemoryRegionOps *ops, Error **errp) 253ff8f06eeSShlomo Pongratz { 254ff8f06eeSShlomo Pongratz SysBusDevice *sbd = SYS_BUS_DEVICE(s); 2551e575b66SEric Auger int rdist_capacity = 0; 256ff8f06eeSShlomo Pongratz int i; 257ff8f06eeSShlomo Pongratz 2581e575b66SEric Auger for (i = 0; i < s->nb_redist_regions; i++) { 2591e575b66SEric Auger rdist_capacity += s->redist_region_count[i]; 2601e575b66SEric Auger } 2611e575b66SEric Auger if (rdist_capacity < s->num_cpu) { 2621e575b66SEric Auger error_setg(errp, "Capacity of the redist regions(%d) " 2631e575b66SEric Auger "is less than number of vcpus(%d)", 2641e575b66SEric Auger rdist_capacity, s->num_cpu); 2651e575b66SEric Auger return; 2661e575b66SEric Auger } 2671e575b66SEric Auger 268ff8f06eeSShlomo Pongratz /* For the GIC, also expose incoming GPIO lines for PPIs for each CPU. 269ff8f06eeSShlomo Pongratz * GPIO array layout is thus: 270ff8f06eeSShlomo Pongratz * [0..N-1] spi 271ff8f06eeSShlomo Pongratz * [N..N+31] PPIs for CPU 0 272ff8f06eeSShlomo Pongratz * [N+32..N+63] PPIs for CPU 1 273ff8f06eeSShlomo Pongratz * ... 274ff8f06eeSShlomo Pongratz */ 275ff8f06eeSShlomo Pongratz i = s->num_irq - GIC_INTERNAL + GIC_INTERNAL * s->num_cpu; 276ff8f06eeSShlomo Pongratz qdev_init_gpio_in(DEVICE(s), handler, i); 277ff8f06eeSShlomo Pongratz 278ff8f06eeSShlomo Pongratz for (i = 0; i < s->num_cpu; i++) { 2793faf2b0cSPeter Maydell sysbus_init_irq(sbd, &s->cpu[i].parent_irq); 280ff8f06eeSShlomo Pongratz } 281ff8f06eeSShlomo Pongratz for (i = 0; i < s->num_cpu; i++) { 2823faf2b0cSPeter Maydell sysbus_init_irq(sbd, &s->cpu[i].parent_fiq); 283ff8f06eeSShlomo Pongratz } 284b53db42bSPeter Maydell for (i = 0; i < s->num_cpu; i++) { 285b53db42bSPeter Maydell sysbus_init_irq(sbd, &s->cpu[i].parent_virq); 286b53db42bSPeter Maydell } 287b53db42bSPeter Maydell for (i = 0; i < s->num_cpu; i++) { 288b53db42bSPeter Maydell sysbus_init_irq(sbd, &s->cpu[i].parent_vfiq); 289b53db42bSPeter Maydell } 290ff8f06eeSShlomo Pongratz 291ff8f06eeSShlomo Pongratz memory_region_init_io(&s->iomem_dist, OBJECT(s), ops, s, 292ff8f06eeSShlomo Pongratz "gicv3_dist", 0x10000); 293ff8f06eeSShlomo Pongratz sysbus_init_mmio(sbd, &s->iomem_dist); 2941e575b66SEric Auger 2951e575b66SEric Auger s->iomem_redist = g_new0(MemoryRegion, s->nb_redist_regions); 2961e575b66SEric Auger for (i = 0; i < s->nb_redist_regions; i++) { 2971e575b66SEric Auger char *name = g_strdup_printf("gicv3_redist_region[%d]", i); 2981e575b66SEric Auger 2991e575b66SEric Auger memory_region_init_io(&s->iomem_redist[i], OBJECT(s), 3001e575b66SEric Auger ops ? &ops[1] : NULL, s, name, 3011e575b66SEric Auger s->redist_region_count[i] * GICV3_REDIST_SIZE); 3021e575b66SEric Auger sysbus_init_mmio(sbd, &s->iomem_redist[i]); 3031e575b66SEric Auger g_free(name); 3041e575b66SEric Auger } 305ff8f06eeSShlomo Pongratz } 306ff8f06eeSShlomo Pongratz 307ff8f06eeSShlomo Pongratz static void arm_gicv3_common_realize(DeviceState *dev, Error **errp) 308ff8f06eeSShlomo Pongratz { 309ff8f06eeSShlomo Pongratz GICv3State *s = ARM_GICV3_COMMON(dev); 31007e2034dSPavel Fedin int i; 311ff8f06eeSShlomo Pongratz 312ff8f06eeSShlomo Pongratz /* revision property is actually reserved and currently used only in order 313ff8f06eeSShlomo Pongratz * to keep the interface compatible with GICv2 code, avoiding extra 314ff8f06eeSShlomo Pongratz * conditions. However, in future it could be used, for example, if we 315ff8f06eeSShlomo Pongratz * implement GICv4. 316ff8f06eeSShlomo Pongratz */ 317ff8f06eeSShlomo Pongratz if (s->revision != 3) { 318ff8f06eeSShlomo Pongratz error_setg(errp, "unsupported GIC revision %d", s->revision); 319ff8f06eeSShlomo Pongratz return; 320ff8f06eeSShlomo Pongratz } 32107e2034dSPavel Fedin 32207e2034dSPavel Fedin if (s->num_irq > GICV3_MAXIRQ) { 32307e2034dSPavel Fedin error_setg(errp, 32407e2034dSPavel Fedin "requested %u interrupt lines exceeds GIC maximum %d", 32507e2034dSPavel Fedin s->num_irq, GICV3_MAXIRQ); 32607e2034dSPavel Fedin return; 32707e2034dSPavel Fedin } 32807e2034dSPavel Fedin if (s->num_irq < GIC_INTERNAL) { 32907e2034dSPavel Fedin error_setg(errp, 33007e2034dSPavel Fedin "requested %u interrupt lines is below GIC minimum %d", 33107e2034dSPavel Fedin s->num_irq, GIC_INTERNAL); 33207e2034dSPavel Fedin return; 33307e2034dSPavel Fedin } 33407e2034dSPavel Fedin 33507e2034dSPavel Fedin /* ITLinesNumber is represented as (N / 32) - 1, so this is an 33607e2034dSPavel Fedin * implementation imposed restriction, not an architectural one, 33707e2034dSPavel Fedin * so we don't have to deal with bitfields where only some of the 33807e2034dSPavel Fedin * bits in a 32-bit word should be valid. 33907e2034dSPavel Fedin */ 34007e2034dSPavel Fedin if (s->num_irq % 32) { 34107e2034dSPavel Fedin error_setg(errp, 34207e2034dSPavel Fedin "%d interrupt lines unsupported: not divisible by 32", 34307e2034dSPavel Fedin s->num_irq); 34407e2034dSPavel Fedin return; 34507e2034dSPavel Fedin } 34607e2034dSPavel Fedin 34707e2034dSPavel Fedin s->cpu = g_new0(GICv3CPUState, s->num_cpu); 34807e2034dSPavel Fedin 34907e2034dSPavel Fedin for (i = 0; i < s->num_cpu; i++) { 35007e2034dSPavel Fedin CPUState *cpu = qemu_get_cpu(i); 35107e2034dSPavel Fedin uint64_t cpu_affid; 35207e2034dSPavel Fedin int last; 35307e2034dSPavel Fedin 35407e2034dSPavel Fedin s->cpu[i].cpu = cpu; 35507e2034dSPavel Fedin s->cpu[i].gic = s; 356d3a3e529SVijaya Kumar K /* Store GICv3CPUState in CPUARMState gicv3state pointer */ 357d3a3e529SVijaya Kumar K gicv3_set_gicv3state(cpu, &s->cpu[i]); 35807e2034dSPavel Fedin 35907e2034dSPavel Fedin /* Pre-construct the GICR_TYPER: 36007e2034dSPavel Fedin * For our implementation: 36107e2034dSPavel Fedin * Top 32 bits are the affinity value of the associated CPU 36207e2034dSPavel Fedin * CommonLPIAff == 01 (redistributors with same Aff3 share LPI table) 36307e2034dSPavel Fedin * Processor_Number == CPU index starting from 0 36407e2034dSPavel Fedin * DPGS == 0 (GICR_CTLR.DPG* not supported) 36507e2034dSPavel Fedin * Last == 1 if this is the last redistributor in a series of 36607e2034dSPavel Fedin * contiguous redistributor pages 36707e2034dSPavel Fedin * DirectLPI == 0 (direct injection of LPIs not supported) 36807e2034dSPavel Fedin * VLPIS == 0 (virtual LPIs not supported) 36907e2034dSPavel Fedin * PLPIS == 0 (physical LPIs not supported) 37007e2034dSPavel Fedin */ 37177a7a367SMarc-André Lureau cpu_affid = object_property_get_uint(OBJECT(cpu), "mp-affinity", NULL); 37207e2034dSPavel Fedin last = (i == s->num_cpu - 1); 37307e2034dSPavel Fedin 37407e2034dSPavel Fedin /* The CPU mp-affinity property is in MPIDR register format; squash 37507e2034dSPavel Fedin * the affinity bytes into 32 bits as the GICR_TYPER has them. 37607e2034dSPavel Fedin */ 37792204403SAndrew Jones cpu_affid = ((cpu_affid & 0xFF00000000ULL) >> 8) | 37892204403SAndrew Jones (cpu_affid & 0xFFFFFF); 37907e2034dSPavel Fedin s->cpu[i].gicr_typer = (cpu_affid << 32) | 38007e2034dSPavel Fedin (1 << 24) | 38107e2034dSPavel Fedin (i << 8) | 38207e2034dSPavel Fedin (last << 4); 38307e2034dSPavel Fedin } 384ff8f06eeSShlomo Pongratz } 385ff8f06eeSShlomo Pongratz 3861e575b66SEric Auger static void arm_gicv3_finalize(Object *obj) 3871e575b66SEric Auger { 3881e575b66SEric Auger GICv3State *s = ARM_GICV3_COMMON(obj); 3891e575b66SEric Auger 3901e575b66SEric Auger g_free(s->redist_region_count); 3911e575b66SEric Auger } 3921e575b66SEric Auger 393ff8f06eeSShlomo Pongratz static void arm_gicv3_common_reset(DeviceState *dev) 394ff8f06eeSShlomo Pongratz { 39507e2034dSPavel Fedin GICv3State *s = ARM_GICV3_COMMON(dev); 39607e2034dSPavel Fedin int i; 39707e2034dSPavel Fedin 39807e2034dSPavel Fedin for (i = 0; i < s->num_cpu; i++) { 39907e2034dSPavel Fedin GICv3CPUState *cs = &s->cpu[i]; 40007e2034dSPavel Fedin 40107e2034dSPavel Fedin cs->level = 0; 40207e2034dSPavel Fedin cs->gicr_ctlr = 0; 40307e2034dSPavel Fedin cs->gicr_statusr[GICV3_S] = 0; 40407e2034dSPavel Fedin cs->gicr_statusr[GICV3_NS] = 0; 40507e2034dSPavel Fedin cs->gicr_waker = GICR_WAKER_ProcessorSleep | GICR_WAKER_ChildrenAsleep; 40607e2034dSPavel Fedin cs->gicr_propbaser = 0; 40707e2034dSPavel Fedin cs->gicr_pendbaser = 0; 40807e2034dSPavel Fedin /* If we're resetting a TZ-aware GIC as if secure firmware 40907e2034dSPavel Fedin * had set it up ready to start a kernel in non-secure, we 41007e2034dSPavel Fedin * need to set interrupts to group 1 so the kernel can use them. 41107e2034dSPavel Fedin * Otherwise they reset to group 0 like the hardware. 41207e2034dSPavel Fedin */ 41307e2034dSPavel Fedin if (s->irq_reset_nonsecure) { 41407e2034dSPavel Fedin cs->gicr_igroupr0 = 0xffffffff; 41507e2034dSPavel Fedin } else { 41607e2034dSPavel Fedin cs->gicr_igroupr0 = 0; 41707e2034dSPavel Fedin } 41807e2034dSPavel Fedin 41907e2034dSPavel Fedin cs->gicr_ienabler0 = 0; 42007e2034dSPavel Fedin cs->gicr_ipendr0 = 0; 42107e2034dSPavel Fedin cs->gicr_iactiver0 = 0; 42207e2034dSPavel Fedin cs->edge_trigger = 0xffff; 42307e2034dSPavel Fedin cs->gicr_igrpmodr0 = 0; 42407e2034dSPavel Fedin cs->gicr_nsacr = 0; 42507e2034dSPavel Fedin memset(cs->gicr_ipriorityr, 0, sizeof(cs->gicr_ipriorityr)); 42607e2034dSPavel Fedin 427ce187c3cSPeter Maydell cs->hppi.prio = 0xff; 428ce187c3cSPeter Maydell 42907e2034dSPavel Fedin /* State in the CPU interface must *not* be reset here, because it 43007e2034dSPavel Fedin * is part of the CPU's reset domain, not the GIC device's. 43107e2034dSPavel Fedin */ 43207e2034dSPavel Fedin } 43307e2034dSPavel Fedin 43407e2034dSPavel Fedin /* For our implementation affinity routing is always enabled */ 43507e2034dSPavel Fedin if (s->security_extn) { 43607e2034dSPavel Fedin s->gicd_ctlr = GICD_CTLR_ARE_S | GICD_CTLR_ARE_NS; 43707e2034dSPavel Fedin } else { 43807e2034dSPavel Fedin s->gicd_ctlr = GICD_CTLR_DS | GICD_CTLR_ARE; 43907e2034dSPavel Fedin } 44007e2034dSPavel Fedin 44107e2034dSPavel Fedin s->gicd_statusr[GICV3_S] = 0; 44207e2034dSPavel Fedin s->gicd_statusr[GICV3_NS] = 0; 44307e2034dSPavel Fedin 44407e2034dSPavel Fedin memset(s->group, 0, sizeof(s->group)); 44507e2034dSPavel Fedin memset(s->grpmod, 0, sizeof(s->grpmod)); 44607e2034dSPavel Fedin memset(s->enabled, 0, sizeof(s->enabled)); 44707e2034dSPavel Fedin memset(s->pending, 0, sizeof(s->pending)); 44807e2034dSPavel Fedin memset(s->active, 0, sizeof(s->active)); 44907e2034dSPavel Fedin memset(s->level, 0, sizeof(s->level)); 45007e2034dSPavel Fedin memset(s->edge_trigger, 0, sizeof(s->edge_trigger)); 45107e2034dSPavel Fedin memset(s->gicd_ipriority, 0, sizeof(s->gicd_ipriority)); 45207e2034dSPavel Fedin memset(s->gicd_irouter, 0, sizeof(s->gicd_irouter)); 45307e2034dSPavel Fedin memset(s->gicd_nsacr, 0, sizeof(s->gicd_nsacr)); 454ce187c3cSPeter Maydell /* GICD_IROUTER are UNKNOWN at reset so in theory the guest must 455ce187c3cSPeter Maydell * write these to get sane behaviour and we need not populate the 456ce187c3cSPeter Maydell * pointer cache here; however having the cache be different for 457ce187c3cSPeter Maydell * "happened to be 0 from reset" and "guest wrote 0" would be 458ce187c3cSPeter Maydell * too confusing. 459ce187c3cSPeter Maydell */ 460ce187c3cSPeter Maydell gicv3_cache_all_target_cpustates(s); 46107e2034dSPavel Fedin 46207e2034dSPavel Fedin if (s->irq_reset_nonsecure) { 46307e2034dSPavel Fedin /* If we're resetting a TZ-aware GIC as if secure firmware 46407e2034dSPavel Fedin * had set it up ready to start a kernel in non-secure, we 46507e2034dSPavel Fedin * need to set interrupts to group 1 so the kernel can use them. 46607e2034dSPavel Fedin * Otherwise they reset to group 0 like the hardware. 46707e2034dSPavel Fedin */ 46807e2034dSPavel Fedin for (i = GIC_INTERNAL; i < s->num_irq; i++) { 46907e2034dSPavel Fedin gicv3_gicd_group_set(s, i); 47007e2034dSPavel Fedin } 47107e2034dSPavel Fedin } 472910e2048SShannon Zhao s->gicd_no_migration_shift_bug = true; 47307e2034dSPavel Fedin } 47407e2034dSPavel Fedin 47507e2034dSPavel Fedin static void arm_gic_common_linux_init(ARMLinuxBootIf *obj, 47607e2034dSPavel Fedin bool secure_boot) 47707e2034dSPavel Fedin { 47807e2034dSPavel Fedin GICv3State *s = ARM_GICV3_COMMON(obj); 47907e2034dSPavel Fedin 48007e2034dSPavel Fedin if (s->security_extn && !secure_boot) { 48107e2034dSPavel Fedin /* We're directly booting a kernel into NonSecure. If this GIC 48207e2034dSPavel Fedin * implements the security extensions then we must configure it 48307e2034dSPavel Fedin * to have all the interrupts be NonSecure (this is a job that 48407e2034dSPavel Fedin * is done by the Secure boot firmware in real hardware, and in 48507e2034dSPavel Fedin * this mode QEMU is acting as a minimalist firmware-and-bootloader 48607e2034dSPavel Fedin * equivalent). 48707e2034dSPavel Fedin */ 48807e2034dSPavel Fedin s->irq_reset_nonsecure = true; 48907e2034dSPavel Fedin } 490ff8f06eeSShlomo Pongratz } 491ff8f06eeSShlomo Pongratz 492ff8f06eeSShlomo Pongratz static Property arm_gicv3_common_properties[] = { 493ff8f06eeSShlomo Pongratz DEFINE_PROP_UINT32("num-cpu", GICv3State, num_cpu, 1), 494ff8f06eeSShlomo Pongratz DEFINE_PROP_UINT32("num-irq", GICv3State, num_irq, 32), 495ff8f06eeSShlomo Pongratz DEFINE_PROP_UINT32("revision", GICv3State, revision, 3), 496ff8f06eeSShlomo Pongratz DEFINE_PROP_BOOL("has-security-extensions", GICv3State, security_extn, 0), 4971e575b66SEric Auger DEFINE_PROP_ARRAY("redist-region-count", GICv3State, nb_redist_regions, 4981e575b66SEric Auger redist_region_count, qdev_prop_uint32, uint32_t), 499ff8f06eeSShlomo Pongratz DEFINE_PROP_END_OF_LIST(), 500ff8f06eeSShlomo Pongratz }; 501ff8f06eeSShlomo Pongratz 502ff8f06eeSShlomo Pongratz static void arm_gicv3_common_class_init(ObjectClass *klass, void *data) 503ff8f06eeSShlomo Pongratz { 504ff8f06eeSShlomo Pongratz DeviceClass *dc = DEVICE_CLASS(klass); 50507e2034dSPavel Fedin ARMLinuxBootIfClass *albifc = ARM_LINUX_BOOT_IF_CLASS(klass); 506ff8f06eeSShlomo Pongratz 507ff8f06eeSShlomo Pongratz dc->reset = arm_gicv3_common_reset; 508ff8f06eeSShlomo Pongratz dc->realize = arm_gicv3_common_realize; 509ff8f06eeSShlomo Pongratz dc->props = arm_gicv3_common_properties; 510ff8f06eeSShlomo Pongratz dc->vmsd = &vmstate_gicv3; 51107e2034dSPavel Fedin albifc->arm_linux_init = arm_gic_common_linux_init; 512ff8f06eeSShlomo Pongratz } 513ff8f06eeSShlomo Pongratz 514ff8f06eeSShlomo Pongratz static const TypeInfo arm_gicv3_common_type = { 515ff8f06eeSShlomo Pongratz .name = TYPE_ARM_GICV3_COMMON, 516ff8f06eeSShlomo Pongratz .parent = TYPE_SYS_BUS_DEVICE, 517ff8f06eeSShlomo Pongratz .instance_size = sizeof(GICv3State), 518ff8f06eeSShlomo Pongratz .class_size = sizeof(ARMGICv3CommonClass), 519ff8f06eeSShlomo Pongratz .class_init = arm_gicv3_common_class_init, 5201e575b66SEric Auger .instance_finalize = arm_gicv3_finalize, 521ff8f06eeSShlomo Pongratz .abstract = true, 52207e2034dSPavel Fedin .interfaces = (InterfaceInfo []) { 52307e2034dSPavel Fedin { TYPE_ARM_LINUX_BOOT_IF }, 52407e2034dSPavel Fedin { }, 52507e2034dSPavel Fedin }, 526ff8f06eeSShlomo Pongratz }; 527ff8f06eeSShlomo Pongratz 528ff8f06eeSShlomo Pongratz static void register_types(void) 529ff8f06eeSShlomo Pongratz { 530ff8f06eeSShlomo Pongratz type_register_static(&arm_gicv3_common_type); 531ff8f06eeSShlomo Pongratz } 532ff8f06eeSShlomo Pongratz 533ff8f06eeSShlomo Pongratz type_init(register_types) 534