2015-09-24 02:29:36 +02:00
|
|
|
/*
|
|
|
|
* ARM GICv3 support - common bits of emulated and KVM kernel model
|
|
|
|
*
|
|
|
|
* Copyright (c) 2012 Linaro Limited
|
|
|
|
* Copyright (c) 2015 Huawei.
|
2016-06-17 16:23:46 +02:00
|
|
|
* Copyright (c) 2015 Samsung Electronics Co., Ltd.
|
2015-09-24 02:29:36 +02:00
|
|
|
* Written by Peter Maydell
|
2016-06-17 16:23:46 +02:00
|
|
|
* Reworked for GICv3 by Shlomo Pongratz and Pavel Fedin
|
2015-09-24 02:29:36 +02:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License along
|
|
|
|
* with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
2016-01-26 19:17:05 +01:00
|
|
|
#include "qemu/osdep.h"
|
include/qemu/osdep.h: Don't include qapi/error.h
Commit 57cb38b included qapi/error.h into qemu/osdep.h to get the
Error typedef. Since then, we've moved to include qemu/osdep.h
everywhere. Its file comment explains: "To avoid getting into
possible circular include dependencies, this file should not include
any other QEMU headers, with the exceptions of config-host.h,
compiler.h, os-posix.h and os-win32.h, all of which are doing a
similar job to this file and are under similar constraints."
qapi/error.h doesn't do a similar job, and it doesn't adhere to
similar constraints: it includes qapi-types.h. That's in excess of
100KiB of crap most .c files don't actually need.
Add the typedef to qemu/typedefs.h, and include that instead of
qapi/error.h. Include qapi/error.h in .c files that need it and don't
get it now. Include qapi-types.h in qom/object.h for uint16List.
Update scripts/clean-includes accordingly. Update it further to match
reality: replace config.h by config-target.h, add sysemu/os-posix.h,
sysemu/os-win32.h. Update the list of includes in the qemu/osdep.h
comment quoted above similarly.
This reduces the number of objects depending on qapi/error.h from "all
of them" to less than a third. Unfortunately, the number depending on
qapi-types.h shrinks only a little. More work is needed for that one.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
[Fix compilation without the spice devel packages. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2016-03-14 09:01:28 +01:00
|
|
|
#include "qapi/error.h"
|
2019-05-23 16:35:07 +02:00
|
|
|
#include "qemu/module.h"
|
2023-04-05 13:48:26 +02:00
|
|
|
#include "qemu/error-report.h"
|
2019-07-09 17:20:52 +02:00
|
|
|
#include "hw/core/cpu.h"
|
2015-09-24 02:29:36 +02:00
|
|
|
#include "hw/intc/arm_gicv3_common.h"
|
2019-08-12 07:23:51 +02:00
|
|
|
#include "hw/qdev-properties.h"
|
2019-08-12 07:23:45 +02:00
|
|
|
#include "migration/vmstate.h"
|
2016-06-17 16:23:46 +02:00
|
|
|
#include "gicv3_internal.h"
|
|
|
|
#include "hw/arm/linux-boot-if.h"
|
2018-06-08 14:15:32 +02:00
|
|
|
#include "sysemu/kvm.h"
|
2015-09-24 02:29:36 +02:00
|
|
|
|
2018-08-06 14:34:45 +02:00
|
|
|
|
|
|
|
static void gicv3_gicd_no_migration_shift_bug_post_load(GICv3State *cs)
|
|
|
|
{
|
|
|
|
if (cs->gicd_no_migration_shift_bug) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Older versions of QEMU had a bug in the handling of state save/restore
|
|
|
|
* to the KVM GICv3: they got the offset in the bitmap arrays wrong,
|
|
|
|
* so that instead of the data for external interrupts 32 and up
|
|
|
|
* starting at bit position 32 in the bitmap, it started at bit
|
|
|
|
* position 64. If we're receiving data from a QEMU with that bug,
|
|
|
|
* we must move the data down into the right place.
|
|
|
|
*/
|
|
|
|
memmove(cs->group, (uint8_t *)cs->group + GIC_INTERNAL / 8,
|
|
|
|
sizeof(cs->group) - GIC_INTERNAL / 8);
|
|
|
|
memmove(cs->grpmod, (uint8_t *)cs->grpmod + GIC_INTERNAL / 8,
|
|
|
|
sizeof(cs->grpmod) - GIC_INTERNAL / 8);
|
|
|
|
memmove(cs->enabled, (uint8_t *)cs->enabled + GIC_INTERNAL / 8,
|
|
|
|
sizeof(cs->enabled) - GIC_INTERNAL / 8);
|
|
|
|
memmove(cs->pending, (uint8_t *)cs->pending + GIC_INTERNAL / 8,
|
|
|
|
sizeof(cs->pending) - GIC_INTERNAL / 8);
|
|
|
|
memmove(cs->active, (uint8_t *)cs->active + GIC_INTERNAL / 8,
|
|
|
|
sizeof(cs->active) - GIC_INTERNAL / 8);
|
|
|
|
memmove(cs->edge_trigger, (uint8_t *)cs->edge_trigger + GIC_INTERNAL / 8,
|
|
|
|
sizeof(cs->edge_trigger) - GIC_INTERNAL / 8);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* While this new version QEMU doesn't have this kind of bug as we fix it,
|
|
|
|
* so it needs to set the flag to true to indicate that and it's necessary
|
|
|
|
* for next migration to work from this new version QEMU.
|
|
|
|
*/
|
|
|
|
cs->gicd_no_migration_shift_bug = true;
|
|
|
|
}
|
|
|
|
|
2017-09-25 13:29:12 +02:00
|
|
|
static int gicv3_pre_save(void *opaque)
|
2015-09-24 02:29:36 +02:00
|
|
|
{
|
|
|
|
GICv3State *s = (GICv3State *)opaque;
|
|
|
|
ARMGICv3CommonClass *c = ARM_GICV3_COMMON_GET_CLASS(s);
|
|
|
|
|
|
|
|
if (c->pre_save) {
|
|
|
|
c->pre_save(s);
|
|
|
|
}
|
2017-09-25 13:29:12 +02:00
|
|
|
|
|
|
|
return 0;
|
2015-09-24 02:29:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static int gicv3_post_load(void *opaque, int version_id)
|
|
|
|
{
|
|
|
|
GICv3State *s = (GICv3State *)opaque;
|
|
|
|
ARMGICv3CommonClass *c = ARM_GICV3_COMMON_GET_CLASS(s);
|
|
|
|
|
2018-08-06 14:34:45 +02:00
|
|
|
gicv3_gicd_no_migration_shift_bug_post_load(s);
|
|
|
|
|
2015-09-24 02:29:36 +02:00
|
|
|
if (c->post_load) {
|
|
|
|
c->post_load(s);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-01-20 12:15:09 +01:00
|
|
|
static bool virt_state_needed(void *opaque)
|
|
|
|
{
|
|
|
|
GICv3CPUState *cs = opaque;
|
|
|
|
|
|
|
|
return cs->num_list_regs != 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const VMStateDescription vmstate_gicv3_cpu_virt = {
|
|
|
|
.name = "arm_gicv3_cpu/virt",
|
|
|
|
.version_id = 1,
|
|
|
|
.minimum_version_id = 1,
|
|
|
|
.needed = virt_state_needed,
|
2023-12-21 04:16:15 +01:00
|
|
|
.fields = (const VMStateField[]) {
|
2017-01-20 12:15:09 +01:00
|
|
|
VMSTATE_UINT64_2DARRAY(ich_apr, GICv3CPUState, 3, 4),
|
|
|
|
VMSTATE_UINT64(ich_hcr_el2, GICv3CPUState),
|
|
|
|
VMSTATE_UINT64_ARRAY(ich_lr_el2, GICv3CPUState, GICV3_LR_MAX),
|
|
|
|
VMSTATE_UINT64(ich_vmcr_el2, GICv3CPUState),
|
|
|
|
VMSTATE_END_OF_LIST()
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2018-08-06 14:34:44 +02:00
|
|
|
static int vmstate_gicv3_cpu_pre_load(void *opaque)
|
2017-02-23 12:51:10 +01:00
|
|
|
{
|
|
|
|
GICv3CPUState *cs = opaque;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the sre_el1 subsection is not transferred this
|
|
|
|
* means SRE_EL1 is 0x7 (which might not be the same as
|
|
|
|
* our reset value).
|
|
|
|
*/
|
|
|
|
cs->icc_sre_el1 = 0x7;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool icc_sre_el1_reg_needed(void *opaque)
|
|
|
|
{
|
|
|
|
GICv3CPUState *cs = opaque;
|
|
|
|
|
|
|
|
return cs->icc_sre_el1 != 7;
|
|
|
|
}
|
|
|
|
|
|
|
|
const VMStateDescription vmstate_gicv3_cpu_sre_el1 = {
|
|
|
|
.name = "arm_gicv3_cpu/sre_el1",
|
|
|
|
.version_id = 1,
|
|
|
|
.minimum_version_id = 1,
|
|
|
|
.needed = icc_sre_el1_reg_needed,
|
2023-12-21 04:16:15 +01:00
|
|
|
.fields = (const VMStateField[]) {
|
2017-02-23 12:51:10 +01:00
|
|
|
VMSTATE_UINT64(icc_sre_el1, GICv3CPUState),
|
|
|
|
VMSTATE_END_OF_LIST()
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2022-04-08 16:15:32 +02:00
|
|
|
static bool gicv4_needed(void *opaque)
|
|
|
|
{
|
|
|
|
GICv3CPUState *cs = opaque;
|
|
|
|
|
|
|
|
return cs->gic->revision > 3;
|
|
|
|
}
|
|
|
|
|
|
|
|
const VMStateDescription vmstate_gicv3_gicv4 = {
|
|
|
|
.name = "arm_gicv3_cpu/gicv4",
|
|
|
|
.version_id = 1,
|
|
|
|
.minimum_version_id = 1,
|
|
|
|
.needed = gicv4_needed,
|
2023-12-21 04:16:15 +01:00
|
|
|
.fields = (const VMStateField[]) {
|
2022-04-08 16:15:32 +02:00
|
|
|
VMSTATE_UINT64(gicr_vpropbaser, GICv3CPUState),
|
|
|
|
VMSTATE_UINT64(gicr_vpendbaser, GICv3CPUState),
|
|
|
|
VMSTATE_END_OF_LIST()
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2016-06-17 16:23:46 +02:00
|
|
|
static const VMStateDescription vmstate_gicv3_cpu = {
|
|
|
|
.name = "arm_gicv3_cpu",
|
|
|
|
.version_id = 1,
|
|
|
|
.minimum_version_id = 1,
|
2018-08-06 14:34:44 +02:00
|
|
|
.pre_load = vmstate_gicv3_cpu_pre_load,
|
2023-12-21 04:16:15 +01:00
|
|
|
.fields = (const VMStateField[]) {
|
2016-06-17 16:23:46 +02:00
|
|
|
VMSTATE_UINT32(level, GICv3CPUState),
|
|
|
|
VMSTATE_UINT32(gicr_ctlr, GICv3CPUState),
|
|
|
|
VMSTATE_UINT32_ARRAY(gicr_statusr, GICv3CPUState, 2),
|
|
|
|
VMSTATE_UINT32(gicr_waker, GICv3CPUState),
|
|
|
|
VMSTATE_UINT64(gicr_propbaser, GICv3CPUState),
|
|
|
|
VMSTATE_UINT64(gicr_pendbaser, GICv3CPUState),
|
|
|
|
VMSTATE_UINT32(gicr_igroupr0, GICv3CPUState),
|
|
|
|
VMSTATE_UINT32(gicr_ienabler0, GICv3CPUState),
|
|
|
|
VMSTATE_UINT32(gicr_ipendr0, GICv3CPUState),
|
|
|
|
VMSTATE_UINT32(gicr_iactiver0, GICv3CPUState),
|
|
|
|
VMSTATE_UINT32(edge_trigger, GICv3CPUState),
|
|
|
|
VMSTATE_UINT32(gicr_igrpmodr0, GICv3CPUState),
|
|
|
|
VMSTATE_UINT32(gicr_nsacr, GICv3CPUState),
|
|
|
|
VMSTATE_UINT8_ARRAY(gicr_ipriorityr, GICv3CPUState, GIC_INTERNAL),
|
|
|
|
VMSTATE_UINT64_ARRAY(icc_ctlr_el1, GICv3CPUState, 2),
|
|
|
|
VMSTATE_UINT64(icc_pmr_el1, GICv3CPUState),
|
|
|
|
VMSTATE_UINT64_ARRAY(icc_bpr, GICv3CPUState, 3),
|
|
|
|
VMSTATE_UINT64_2DARRAY(icc_apr, GICv3CPUState, 3, 4),
|
|
|
|
VMSTATE_UINT64_ARRAY(icc_igrpen, GICv3CPUState, 3),
|
|
|
|
VMSTATE_UINT64(icc_ctlr_el3, GICv3CPUState),
|
|
|
|
VMSTATE_END_OF_LIST()
|
2017-01-20 12:15:09 +01:00
|
|
|
},
|
2023-12-21 04:16:15 +01:00
|
|
|
.subsections = (const VMStateDescription * const []) {
|
2017-01-20 12:15:09 +01:00
|
|
|
&vmstate_gicv3_cpu_virt,
|
2017-02-23 12:51:10 +01:00
|
|
|
&vmstate_gicv3_cpu_sre_el1,
|
2022-04-08 16:15:32 +02:00
|
|
|
&vmstate_gicv3_gicv4,
|
2017-02-23 12:51:10 +01:00
|
|
|
NULL
|
2016-06-17 16:23:46 +02:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2018-08-06 14:34:44 +02:00
|
|
|
static int gicv3_pre_load(void *opaque)
|
2018-06-08 14:15:32 +02:00
|
|
|
{
|
|
|
|
GICv3State *cs = opaque;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The gicd_no_migration_shift_bug flag is used for migration compatibility
|
|
|
|
* for old version QEMU which may have the GICD bmp shift bug under KVM mode.
|
|
|
|
* Strictly, what we want to know is whether the migration source is using
|
|
|
|
* KVM. Since we don't have any way to determine that, we look at whether the
|
|
|
|
* destination is using KVM; this is close enough because for the older QEMU
|
|
|
|
* versions with this bug KVM -> TCG migration didn't work anyway. If the
|
|
|
|
* source is a newer QEMU without this bug it will transmit the migration
|
|
|
|
* subsection which sets the flag to true; otherwise it will remain set to
|
|
|
|
* the value we select here.
|
|
|
|
*/
|
|
|
|
if (kvm_enabled()) {
|
|
|
|
cs->gicd_no_migration_shift_bug = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-08-06 14:34:41 +02:00
|
|
|
static bool needed_always(void *opaque)
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-06-08 14:15:32 +02:00
|
|
|
const VMStateDescription vmstate_gicv3_gicd_no_migration_shift_bug = {
|
|
|
|
.name = "arm_gicv3/gicd_no_migration_shift_bug",
|
|
|
|
.version_id = 1,
|
|
|
|
.minimum_version_id = 1,
|
2018-08-06 14:34:41 +02:00
|
|
|
.needed = needed_always,
|
2023-12-21 04:16:15 +01:00
|
|
|
.fields = (const VMStateField[]) {
|
2018-06-08 14:15:32 +02:00
|
|
|
VMSTATE_BOOL(gicd_no_migration_shift_bug, GICv3State),
|
|
|
|
VMSTATE_END_OF_LIST()
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2015-09-24 02:29:36 +02:00
|
|
|
static const VMStateDescription vmstate_gicv3 = {
|
|
|
|
.name = "arm_gicv3",
|
2016-06-17 16:23:46 +02:00
|
|
|
.version_id = 1,
|
|
|
|
.minimum_version_id = 1,
|
2018-08-06 14:34:44 +02:00
|
|
|
.pre_load = gicv3_pre_load,
|
2015-09-24 02:29:36 +02:00
|
|
|
.pre_save = gicv3_pre_save,
|
|
|
|
.post_load = gicv3_post_load,
|
2017-06-13 15:57:01 +02:00
|
|
|
.priority = MIG_PRI_GICV3,
|
2023-12-21 04:16:15 +01:00
|
|
|
.fields = (const VMStateField[]) {
|
2016-06-17 16:23:46 +02:00
|
|
|
VMSTATE_UINT32(gicd_ctlr, GICv3State),
|
|
|
|
VMSTATE_UINT32_ARRAY(gicd_statusr, GICv3State, 2),
|
|
|
|
VMSTATE_UINT32_ARRAY(group, GICv3State, GICV3_BMP_SIZE),
|
|
|
|
VMSTATE_UINT32_ARRAY(grpmod, GICv3State, GICV3_BMP_SIZE),
|
|
|
|
VMSTATE_UINT32_ARRAY(enabled, GICv3State, GICV3_BMP_SIZE),
|
|
|
|
VMSTATE_UINT32_ARRAY(pending, GICv3State, GICV3_BMP_SIZE),
|
|
|
|
VMSTATE_UINT32_ARRAY(active, GICv3State, GICV3_BMP_SIZE),
|
|
|
|
VMSTATE_UINT32_ARRAY(level, GICv3State, GICV3_BMP_SIZE),
|
|
|
|
VMSTATE_UINT32_ARRAY(edge_trigger, GICv3State, GICV3_BMP_SIZE),
|
|
|
|
VMSTATE_UINT8_ARRAY(gicd_ipriority, GICv3State, GICV3_MAXIRQ),
|
|
|
|
VMSTATE_UINT64_ARRAY(gicd_irouter, GICv3State, GICV3_MAXIRQ),
|
|
|
|
VMSTATE_UINT32_ARRAY(gicd_nsacr, GICv3State,
|
|
|
|
DIV_ROUND_UP(GICV3_MAXIRQ, 16)),
|
|
|
|
VMSTATE_STRUCT_VARRAY_POINTER_UINT32(cpu, GICv3State, num_cpu,
|
|
|
|
vmstate_gicv3_cpu, GICv3CPUState),
|
|
|
|
VMSTATE_END_OF_LIST()
|
2018-06-08 14:15:32 +02:00
|
|
|
},
|
2023-12-21 04:16:15 +01:00
|
|
|
.subsections = (const VMStateDescription * const []) {
|
2018-06-08 14:15:32 +02:00
|
|
|
&vmstate_gicv3_gicd_no_migration_shift_bug,
|
|
|
|
NULL
|
2016-06-17 16:23:46 +02:00
|
|
|
}
|
2015-09-24 02:29:36 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
void gicv3_init_irqs_and_mmio(GICv3State *s, qemu_irq_handler handler,
|
2021-09-30 17:08:40 +02:00
|
|
|
const MemoryRegionOps *ops)
|
2015-09-24 02:29:36 +02:00
|
|
|
{
|
|
|
|
SysBusDevice *sbd = SYS_BUS_DEVICE(s);
|
|
|
|
int i;
|
2021-09-30 17:08:42 +02:00
|
|
|
int cpuidx;
|
2015-09-24 02:29:36 +02:00
|
|
|
|
|
|
|
/* For the GIC, also expose incoming GPIO lines for PPIs for each CPU.
|
|
|
|
* GPIO array layout is thus:
|
|
|
|
* [0..N-1] spi
|
|
|
|
* [N..N+31] PPIs for CPU 0
|
|
|
|
* [N+32..N+63] PPIs for CPU 1
|
|
|
|
* ...
|
|
|
|
*/
|
|
|
|
i = s->num_irq - GIC_INTERNAL + GIC_INTERNAL * s->num_cpu;
|
|
|
|
qdev_init_gpio_in(DEVICE(s), handler, i);
|
|
|
|
|
|
|
|
for (i = 0; i < s->num_cpu; i++) {
|
2016-06-17 16:23:46 +02:00
|
|
|
sysbus_init_irq(sbd, &s->cpu[i].parent_irq);
|
2015-09-24 02:29:36 +02:00
|
|
|
}
|
|
|
|
for (i = 0; i < s->num_cpu; i++) {
|
2016-06-17 16:23:46 +02:00
|
|
|
sysbus_init_irq(sbd, &s->cpu[i].parent_fiq);
|
2015-09-24 02:29:36 +02:00
|
|
|
}
|
2017-01-20 12:15:08 +01:00
|
|
|
for (i = 0; i < s->num_cpu; i++) {
|
|
|
|
sysbus_init_irq(sbd, &s->cpu[i].parent_virq);
|
|
|
|
}
|
|
|
|
for (i = 0; i < s->num_cpu; i++) {
|
|
|
|
sysbus_init_irq(sbd, &s->cpu[i].parent_vfiq);
|
|
|
|
}
|
2015-09-24 02:29:36 +02:00
|
|
|
|
|
|
|
memory_region_init_io(&s->iomem_dist, OBJECT(s), ops, s,
|
|
|
|
"gicv3_dist", 0x10000);
|
|
|
|
sysbus_init_mmio(sbd, &s->iomem_dist);
|
2018-06-22 14:28:36 +02:00
|
|
|
|
2021-09-30 17:08:42 +02:00
|
|
|
s->redist_regions = g_new0(GICv3RedistRegion, s->nb_redist_regions);
|
|
|
|
cpuidx = 0;
|
2018-06-22 14:28:36 +02:00
|
|
|
for (i = 0; i < s->nb_redist_regions; i++) {
|
|
|
|
char *name = g_strdup_printf("gicv3_redist_region[%d]", i);
|
2021-09-30 17:08:42 +02:00
|
|
|
GICv3RedistRegion *region = &s->redist_regions[i];
|
2018-06-22 14:28:36 +02:00
|
|
|
|
2021-09-30 17:08:42 +02:00
|
|
|
region->gic = s;
|
|
|
|
region->cpuidx = cpuidx;
|
|
|
|
cpuidx += s->redist_region_count[i];
|
|
|
|
|
|
|
|
memory_region_init_io(®ion->iomem, OBJECT(s),
|
|
|
|
ops ? &ops[1] : NULL, region, name,
|
2022-04-08 16:15:31 +02:00
|
|
|
s->redist_region_count[i] * gicv3_redist_size(s));
|
2021-09-30 17:08:42 +02:00
|
|
|
sysbus_init_mmio(sbd, ®ion->iomem);
|
2018-06-22 14:28:36 +02:00
|
|
|
g_free(name);
|
|
|
|
}
|
2015-09-24 02:29:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void arm_gicv3_common_realize(DeviceState *dev, Error **errp)
|
|
|
|
{
|
|
|
|
GICv3State *s = ARM_GICV3_COMMON(dev);
|
2021-09-30 17:08:41 +02:00
|
|
|
int i, rdist_capacity, cpuidx;
|
2015-09-24 02:29:36 +02:00
|
|
|
|
2022-04-08 16:15:47 +02:00
|
|
|
/*
|
|
|
|
* This GIC device supports only revisions 3 and 4. The GICv1/v2
|
|
|
|
* is a separate device.
|
|
|
|
* Note that subclasses of this device may impose further restrictions
|
|
|
|
* on the GIC revision: notably, the in-kernel KVM GIC doesn't
|
|
|
|
* support GICv4.
|
2015-09-24 02:29:36 +02:00
|
|
|
*/
|
2022-04-08 16:15:47 +02:00
|
|
|
if (s->revision != 3 && s->revision != 4) {
|
2015-09-24 02:29:36 +02:00
|
|
|
error_setg(errp, "unsupported GIC revision %d", s->revision);
|
|
|
|
return;
|
|
|
|
}
|
2016-06-17 16:23:46 +02:00
|
|
|
|
|
|
|
if (s->num_irq > GICV3_MAXIRQ) {
|
|
|
|
error_setg(errp,
|
|
|
|
"requested %u interrupt lines exceeds GIC maximum %d",
|
|
|
|
s->num_irq, GICV3_MAXIRQ);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (s->num_irq < GIC_INTERNAL) {
|
|
|
|
error_setg(errp,
|
|
|
|
"requested %u interrupt lines is below GIC minimum %d",
|
|
|
|
s->num_irq, GIC_INTERNAL);
|
|
|
|
return;
|
|
|
|
}
|
2022-04-08 16:15:11 +02:00
|
|
|
if (s->num_cpu == 0) {
|
|
|
|
error_setg(errp, "num-cpu must be at least 1");
|
|
|
|
return;
|
|
|
|
}
|
2016-06-17 16:23:46 +02:00
|
|
|
|
|
|
|
/* ITLinesNumber is represented as (N / 32) - 1, so this is an
|
|
|
|
* implementation imposed restriction, not an architectural one,
|
|
|
|
* so we don't have to deal with bitfields where only some of the
|
|
|
|
* bits in a 32-bit word should be valid.
|
|
|
|
*/
|
|
|
|
if (s->num_irq % 32) {
|
|
|
|
error_setg(errp,
|
|
|
|
"%d interrupt lines unsupported: not divisible by 32",
|
|
|
|
s->num_irq);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-09-13 17:07:23 +02:00
|
|
|
if (s->lpi_enable && !s->dma) {
|
|
|
|
error_setg(errp, "Redist-ITS: Guest 'sysmem' reference link not set");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-09-30 17:08:40 +02:00
|
|
|
rdist_capacity = 0;
|
|
|
|
for (i = 0; i < s->nb_redist_regions; i++) {
|
|
|
|
rdist_capacity += s->redist_region_count[i];
|
|
|
|
}
|
2022-04-08 16:15:12 +02:00
|
|
|
if (rdist_capacity != s->num_cpu) {
|
2021-09-30 17:08:40 +02:00
|
|
|
error_setg(errp, "Capacity of the redist regions(%d) "
|
2022-04-08 16:15:12 +02:00
|
|
|
"does not match the number of vcpus(%d)",
|
2021-09-30 17:08:40 +02:00
|
|
|
rdist_capacity, s->num_cpu);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2022-01-22 19:24:33 +01:00
|
|
|
if (s->lpi_enable) {
|
|
|
|
address_space_init(&s->dma_as, s->dma,
|
|
|
|
"gicv3-its-sysmem");
|
|
|
|
}
|
|
|
|
|
2016-06-17 16:23:46 +02:00
|
|
|
s->cpu = g_new0(GICv3CPUState, s->num_cpu);
|
|
|
|
|
|
|
|
for (i = 0; i < s->num_cpu; i++) {
|
|
|
|
CPUState *cpu = qemu_get_cpu(i);
|
|
|
|
uint64_t cpu_affid;
|
|
|
|
|
|
|
|
s->cpu[i].cpu = cpu;
|
|
|
|
s->cpu[i].gic = s;
|
2017-02-23 12:51:12 +01:00
|
|
|
/* Store GICv3CPUState in CPUARMState gicv3state pointer */
|
|
|
|
gicv3_set_gicv3state(cpu, &s->cpu[i]);
|
2016-06-17 16:23:46 +02:00
|
|
|
|
|
|
|
/* Pre-construct the GICR_TYPER:
|
|
|
|
* For our implementation:
|
|
|
|
* Top 32 bits are the affinity value of the associated CPU
|
|
|
|
* CommonLPIAff == 01 (redistributors with same Aff3 share LPI table)
|
|
|
|
* Processor_Number == CPU index starting from 0
|
|
|
|
* DPGS == 0 (GICR_CTLR.DPG* not supported)
|
|
|
|
* Last == 1 if this is the last redistributor in a series of
|
|
|
|
* contiguous redistributor pages
|
|
|
|
* DirectLPI == 0 (direct injection of LPIs not supported)
|
2022-04-08 16:15:46 +02:00
|
|
|
* VLPIS == 1 if vLPIs supported (GICv4 and up)
|
|
|
|
* PLPIS == 1 if LPIs supported
|
2016-06-17 16:23:46 +02:00
|
|
|
*/
|
2017-06-07 18:36:26 +02:00
|
|
|
cpu_affid = object_property_get_uint(OBJECT(cpu), "mp-affinity", NULL);
|
2016-06-17 16:23:46 +02:00
|
|
|
|
|
|
|
/* The CPU mp-affinity property is in MPIDR register format; squash
|
|
|
|
* the affinity bytes into 32 bits as the GICR_TYPER has them.
|
|
|
|
*/
|
2016-12-27 15:59:24 +01:00
|
|
|
cpu_affid = ((cpu_affid & 0xFF00000000ULL) >> 8) |
|
|
|
|
(cpu_affid & 0xFFFFFF);
|
2016-06-17 16:23:46 +02:00
|
|
|
s->cpu[i].gicr_typer = (cpu_affid << 32) |
|
|
|
|
(1 << 24) |
|
2021-09-30 17:08:41 +02:00
|
|
|
(i << 8);
|
2021-09-13 17:07:23 +02:00
|
|
|
|
|
|
|
if (s->lpi_enable) {
|
|
|
|
s->cpu[i].gicr_typer |= GICR_TYPER_PLPIS;
|
2022-04-08 16:15:46 +02:00
|
|
|
if (s->revision > 3) {
|
|
|
|
s->cpu[i].gicr_typer |= GICR_TYPER_VLPIS;
|
|
|
|
}
|
2021-09-13 17:07:23 +02:00
|
|
|
}
|
2016-06-17 16:23:46 +02:00
|
|
|
}
|
2021-09-30 17:08:41 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Now go through and set GICR_TYPER.Last for the final
|
|
|
|
* redistributor in each region.
|
|
|
|
*/
|
|
|
|
cpuidx = 0;
|
|
|
|
for (i = 0; i < s->nb_redist_regions; i++) {
|
|
|
|
cpuidx += s->redist_region_count[i];
|
|
|
|
s->cpu[cpuidx - 1].gicr_typer |= GICR_TYPER_LAST;
|
|
|
|
}
|
2022-04-08 16:15:24 +02:00
|
|
|
|
|
|
|
s->itslist = g_ptr_array_new();
|
2015-09-24 02:29:36 +02:00
|
|
|
}
|
|
|
|
|
2018-06-22 14:28:36 +02:00
|
|
|
static void arm_gicv3_finalize(Object *obj)
|
|
|
|
{
|
|
|
|
GICv3State *s = ARM_GICV3_COMMON(obj);
|
|
|
|
|
|
|
|
g_free(s->redist_region_count);
|
|
|
|
}
|
|
|
|
|
2022-12-14 15:27:11 +01:00
|
|
|
static void arm_gicv3_common_reset_hold(Object *obj)
|
2015-09-24 02:29:36 +02:00
|
|
|
{
|
2022-12-14 15:27:11 +01:00
|
|
|
GICv3State *s = ARM_GICV3_COMMON(obj);
|
2016-06-17 16:23:46 +02:00
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < s->num_cpu; i++) {
|
|
|
|
GICv3CPUState *cs = &s->cpu[i];
|
|
|
|
|
|
|
|
cs->level = 0;
|
|
|
|
cs->gicr_ctlr = 0;
|
2022-01-22 19:24:39 +01:00
|
|
|
if (s->lpi_enable) {
|
|
|
|
/* Our implementation supports clearing GICR_CTLR.EnableLPIs */
|
|
|
|
cs->gicr_ctlr |= GICR_CTLR_CES;
|
|
|
|
}
|
2016-06-17 16:23:46 +02:00
|
|
|
cs->gicr_statusr[GICV3_S] = 0;
|
|
|
|
cs->gicr_statusr[GICV3_NS] = 0;
|
|
|
|
cs->gicr_waker = GICR_WAKER_ProcessorSleep | GICR_WAKER_ChildrenAsleep;
|
|
|
|
cs->gicr_propbaser = 0;
|
|
|
|
cs->gicr_pendbaser = 0;
|
2022-04-08 16:15:32 +02:00
|
|
|
cs->gicr_vpropbaser = 0;
|
|
|
|
cs->gicr_vpendbaser = 0;
|
2016-06-17 16:23:46 +02:00
|
|
|
/* If we're resetting a TZ-aware GIC as if secure firmware
|
|
|
|
* had set it up ready to start a kernel in non-secure, we
|
|
|
|
* need to set interrupts to group 1 so the kernel can use them.
|
|
|
|
* Otherwise they reset to group 0 like the hardware.
|
|
|
|
*/
|
|
|
|
if (s->irq_reset_nonsecure) {
|
|
|
|
cs->gicr_igroupr0 = 0xffffffff;
|
|
|
|
} else {
|
|
|
|
cs->gicr_igroupr0 = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
cs->gicr_ienabler0 = 0;
|
|
|
|
cs->gicr_ipendr0 = 0;
|
|
|
|
cs->gicr_iactiver0 = 0;
|
|
|
|
cs->edge_trigger = 0xffff;
|
|
|
|
cs->gicr_igrpmodr0 = 0;
|
|
|
|
cs->gicr_nsacr = 0;
|
|
|
|
memset(cs->gicr_ipriorityr, 0, sizeof(cs->gicr_ipriorityr));
|
|
|
|
|
2016-06-17 16:23:46 +02:00
|
|
|
cs->hppi.prio = 0xff;
|
2021-09-13 17:07:24 +02:00
|
|
|
cs->hpplpi.prio = 0xff;
|
2022-04-08 16:15:34 +02:00
|
|
|
cs->hppvlpi.prio = 0xff;
|
2016-06-17 16:23:46 +02:00
|
|
|
|
2016-06-17 16:23:46 +02:00
|
|
|
/* State in the CPU interface must *not* be reset here, because it
|
|
|
|
* is part of the CPU's reset domain, not the GIC device's.
|
|
|
|
*/
|
|
|
|
}
|
|
|
|
|
|
|
|
/* For our implementation affinity routing is always enabled */
|
|
|
|
if (s->security_extn) {
|
|
|
|
s->gicd_ctlr = GICD_CTLR_ARE_S | GICD_CTLR_ARE_NS;
|
|
|
|
} else {
|
|
|
|
s->gicd_ctlr = GICD_CTLR_DS | GICD_CTLR_ARE;
|
|
|
|
}
|
|
|
|
|
|
|
|
s->gicd_statusr[GICV3_S] = 0;
|
|
|
|
s->gicd_statusr[GICV3_NS] = 0;
|
|
|
|
|
|
|
|
memset(s->group, 0, sizeof(s->group));
|
|
|
|
memset(s->grpmod, 0, sizeof(s->grpmod));
|
|
|
|
memset(s->enabled, 0, sizeof(s->enabled));
|
|
|
|
memset(s->pending, 0, sizeof(s->pending));
|
|
|
|
memset(s->active, 0, sizeof(s->active));
|
|
|
|
memset(s->level, 0, sizeof(s->level));
|
|
|
|
memset(s->edge_trigger, 0, sizeof(s->edge_trigger));
|
|
|
|
memset(s->gicd_ipriority, 0, sizeof(s->gicd_ipriority));
|
|
|
|
memset(s->gicd_irouter, 0, sizeof(s->gicd_irouter));
|
|
|
|
memset(s->gicd_nsacr, 0, sizeof(s->gicd_nsacr));
|
2016-06-17 16:23:46 +02:00
|
|
|
/* GICD_IROUTER are UNKNOWN at reset so in theory the guest must
|
|
|
|
* write these to get sane behaviour and we need not populate the
|
|
|
|
* pointer cache here; however having the cache be different for
|
|
|
|
* "happened to be 0 from reset" and "guest wrote 0" would be
|
|
|
|
* too confusing.
|
|
|
|
*/
|
|
|
|
gicv3_cache_all_target_cpustates(s);
|
2016-06-17 16:23:46 +02:00
|
|
|
|
|
|
|
if (s->irq_reset_nonsecure) {
|
|
|
|
/* If we're resetting a TZ-aware GIC as if secure firmware
|
|
|
|
* had set it up ready to start a kernel in non-secure, we
|
|
|
|
* need to set interrupts to group 1 so the kernel can use them.
|
|
|
|
* Otherwise they reset to group 0 like the hardware.
|
|
|
|
*/
|
|
|
|
for (i = GIC_INTERNAL; i < s->num_irq; i++) {
|
|
|
|
gicv3_gicd_group_set(s, i);
|
|
|
|
}
|
|
|
|
}
|
2018-06-08 14:15:32 +02:00
|
|
|
s->gicd_no_migration_shift_bug = true;
|
2016-06-17 16:23:46 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void arm_gic_common_linux_init(ARMLinuxBootIf *obj,
|
|
|
|
bool secure_boot)
|
|
|
|
{
|
|
|
|
GICv3State *s = ARM_GICV3_COMMON(obj);
|
|
|
|
|
|
|
|
if (s->security_extn && !secure_boot) {
|
|
|
|
/* We're directly booting a kernel into NonSecure. If this GIC
|
|
|
|
* implements the security extensions then we must configure it
|
|
|
|
* to have all the interrupts be NonSecure (this is a job that
|
|
|
|
* is done by the Secure boot firmware in real hardware, and in
|
|
|
|
* this mode QEMU is acting as a minimalist firmware-and-bootloader
|
|
|
|
* equivalent).
|
|
|
|
*/
|
|
|
|
s->irq_reset_nonsecure = true;
|
|
|
|
}
|
2015-09-24 02:29:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static Property arm_gicv3_common_properties[] = {
|
|
|
|
DEFINE_PROP_UINT32("num-cpu", GICv3State, num_cpu, 1),
|
|
|
|
DEFINE_PROP_UINT32("num-irq", GICv3State, num_irq, 32),
|
|
|
|
DEFINE_PROP_UINT32("revision", GICv3State, revision, 3),
|
2021-09-13 17:07:23 +02:00
|
|
|
DEFINE_PROP_BOOL("has-lpi", GICv3State, lpi_enable, 0),
|
2015-09-24 02:29:36 +02:00
|
|
|
DEFINE_PROP_BOOL("has-security-extensions", GICv3State, security_extn, 0),
|
2022-05-12 17:14:56 +02:00
|
|
|
/*
|
|
|
|
* Compatibility property: force 8 bits of physical priority, even
|
|
|
|
* if the CPU being emulated should have fewer.
|
|
|
|
*/
|
|
|
|
DEFINE_PROP_BOOL("force-8-bit-prio", GICv3State, force_8bit_prio, 0),
|
2018-06-22 14:28:36 +02:00
|
|
|
DEFINE_PROP_ARRAY("redist-region-count", GICv3State, nb_redist_regions,
|
|
|
|
redist_region_count, qdev_prop_uint32, uint32_t),
|
2021-09-13 17:07:23 +02:00
|
|
|
DEFINE_PROP_LINK("sysmem", GICv3State, dma, TYPE_MEMORY_REGION,
|
|
|
|
MemoryRegion *),
|
2015-09-24 02:29:36 +02:00
|
|
|
DEFINE_PROP_END_OF_LIST(),
|
|
|
|
};
|
|
|
|
|
|
|
|
static void arm_gicv3_common_class_init(ObjectClass *klass, void *data)
|
|
|
|
{
|
|
|
|
DeviceClass *dc = DEVICE_CLASS(klass);
|
2022-12-14 15:27:11 +01:00
|
|
|
ResettableClass *rc = RESETTABLE_CLASS(klass);
|
2016-06-17 16:23:46 +02:00
|
|
|
ARMLinuxBootIfClass *albifc = ARM_LINUX_BOOT_IF_CLASS(klass);
|
2015-09-24 02:29:36 +02:00
|
|
|
|
2022-12-14 15:27:11 +01:00
|
|
|
rc->phases.hold = arm_gicv3_common_reset_hold;
|
2015-09-24 02:29:36 +02:00
|
|
|
dc->realize = arm_gicv3_common_realize;
|
2020-01-10 16:30:32 +01:00
|
|
|
device_class_set_props(dc, arm_gicv3_common_properties);
|
2015-09-24 02:29:36 +02:00
|
|
|
dc->vmsd = &vmstate_gicv3;
|
2016-06-17 16:23:46 +02:00
|
|
|
albifc->arm_linux_init = arm_gic_common_linux_init;
|
2015-09-24 02:29:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static const TypeInfo arm_gicv3_common_type = {
|
|
|
|
.name = TYPE_ARM_GICV3_COMMON,
|
|
|
|
.parent = TYPE_SYS_BUS_DEVICE,
|
|
|
|
.instance_size = sizeof(GICv3State),
|
|
|
|
.class_size = sizeof(ARMGICv3CommonClass),
|
|
|
|
.class_init = arm_gicv3_common_class_init,
|
2018-06-22 14:28:36 +02:00
|
|
|
.instance_finalize = arm_gicv3_finalize,
|
2015-09-24 02:29:36 +02:00
|
|
|
.abstract = true,
|
2016-06-17 16:23:46 +02:00
|
|
|
.interfaces = (InterfaceInfo []) {
|
|
|
|
{ TYPE_ARM_LINUX_BOOT_IF },
|
|
|
|
{ },
|
|
|
|
},
|
2015-09-24 02:29:36 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
static void register_types(void)
|
|
|
|
{
|
|
|
|
type_register_static(&arm_gicv3_common_type);
|
|
|
|
}
|
|
|
|
|
|
|
|
type_init(register_types)
|
2023-04-05 13:48:26 +02:00
|
|
|
|
|
|
|
const char *gicv3_class_name(void)
|
|
|
|
{
|
|
|
|
if (kvm_irqchip_in_kernel()) {
|
|
|
|
return "kvm-arm-gicv3";
|
|
|
|
} else {
|
|
|
|
if (kvm_enabled()) {
|
|
|
|
error_report("Userspace GICv3 is not supported with KVM");
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
return "arm-gicv3";
|
|
|
|
}
|
|
|
|
}
|