1ff8f06eeSShlomo Pongratz /*
2ff8f06eeSShlomo Pongratz * ARM GICv3 support - common bits of emulated and KVM kernel model
3ff8f06eeSShlomo Pongratz *
4ff8f06eeSShlomo Pongratz * Copyright (c) 2012 Linaro Limited
5ff8f06eeSShlomo Pongratz * Copyright (c) 2015 Huawei.
607e2034dSPavel Fedin * Copyright (c) 2015 Samsung Electronics Co., Ltd.
7ff8f06eeSShlomo Pongratz * Written by Peter Maydell
807e2034dSPavel Fedin * Reworked for GICv3 by Shlomo Pongratz and Pavel Fedin
9ff8f06eeSShlomo Pongratz *
10ff8f06eeSShlomo Pongratz * This program is free software; you can redistribute it and/or modify
11ff8f06eeSShlomo Pongratz * it under the terms of the GNU General Public License as published by
12ff8f06eeSShlomo Pongratz * the Free Software Foundation, either version 2 of the License, or
13ff8f06eeSShlomo Pongratz * (at your option) any later version.
14ff8f06eeSShlomo Pongratz *
15ff8f06eeSShlomo Pongratz * This program is distributed in the hope that it will be useful,
16ff8f06eeSShlomo Pongratz * but WITHOUT ANY WARRANTY; without even the implied warranty of
17ff8f06eeSShlomo Pongratz * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18ff8f06eeSShlomo Pongratz * GNU General Public License for more details.
19ff8f06eeSShlomo Pongratz *
20ff8f06eeSShlomo Pongratz * You should have received a copy of the GNU General Public License along
21ff8f06eeSShlomo Pongratz * with this program; if not, see <http://www.gnu.org/licenses/>.
22ff8f06eeSShlomo Pongratz */
23ff8f06eeSShlomo Pongratz
248ef94f0bSPeter Maydell #include "qemu/osdep.h"
25da34e65cSMarkus Armbruster #include "qapi/error.h"
260b8fa32fSMarkus Armbruster #include "qemu/module.h"
270c40daf0SPhilippe Mathieu-Daudé #include "qemu/error-report.h"
282e5b09fdSMarkus Armbruster #include "hw/core/cpu.h"
29ff8f06eeSShlomo Pongratz #include "hw/intc/arm_gicv3_common.h"
30a27bd6c7SMarkus Armbruster #include "hw/qdev-properties.h"
31d6454270SMarkus Armbruster #include "migration/vmstate.h"
3207e2034dSPavel Fedin #include "gicv3_internal.h"
3307e2034dSPavel Fedin #include "hw/arm/linux-boot-if.h"
34910e2048SShannon Zhao #include "sysemu/kvm.h"
35ff8f06eeSShlomo Pongratz
36341823c1SPeter Maydell
gicv3_gicd_no_migration_shift_bug_post_load(GICv3State * cs)37341823c1SPeter Maydell static void gicv3_gicd_no_migration_shift_bug_post_load(GICv3State *cs)
38341823c1SPeter Maydell {
39341823c1SPeter Maydell if (cs->gicd_no_migration_shift_bug) {
40341823c1SPeter Maydell return;
41341823c1SPeter Maydell }
42341823c1SPeter Maydell
43341823c1SPeter Maydell /* Older versions of QEMU had a bug in the handling of state save/restore
44341823c1SPeter Maydell * to the KVM GICv3: they got the offset in the bitmap arrays wrong,
45341823c1SPeter Maydell * so that instead of the data for external interrupts 32 and up
46341823c1SPeter Maydell * starting at bit position 32 in the bitmap, it started at bit
47341823c1SPeter Maydell * position 64. If we're receiving data from a QEMU with that bug,
48341823c1SPeter Maydell * we must move the data down into the right place.
49341823c1SPeter Maydell */
50341823c1SPeter Maydell memmove(cs->group, (uint8_t *)cs->group + GIC_INTERNAL / 8,
51341823c1SPeter Maydell sizeof(cs->group) - GIC_INTERNAL / 8);
52341823c1SPeter Maydell memmove(cs->grpmod, (uint8_t *)cs->grpmod + GIC_INTERNAL / 8,
53341823c1SPeter Maydell sizeof(cs->grpmod) - GIC_INTERNAL / 8);
54341823c1SPeter Maydell memmove(cs->enabled, (uint8_t *)cs->enabled + GIC_INTERNAL / 8,
55341823c1SPeter Maydell sizeof(cs->enabled) - GIC_INTERNAL / 8);
56341823c1SPeter Maydell memmove(cs->pending, (uint8_t *)cs->pending + GIC_INTERNAL / 8,
57341823c1SPeter Maydell sizeof(cs->pending) - GIC_INTERNAL / 8);
58341823c1SPeter Maydell memmove(cs->active, (uint8_t *)cs->active + GIC_INTERNAL / 8,
59341823c1SPeter Maydell sizeof(cs->active) - GIC_INTERNAL / 8);
60341823c1SPeter Maydell memmove(cs->edge_trigger, (uint8_t *)cs->edge_trigger + GIC_INTERNAL / 8,
61341823c1SPeter Maydell sizeof(cs->edge_trigger) - GIC_INTERNAL / 8);
62341823c1SPeter Maydell
63341823c1SPeter Maydell /*
64341823c1SPeter Maydell * While this new version QEMU doesn't have this kind of bug as we fix it,
65341823c1SPeter Maydell * so it needs to set the flag to true to indicate that and it's necessary
66341823c1SPeter Maydell * for next migration to work from this new version QEMU.
67341823c1SPeter Maydell */
68341823c1SPeter Maydell cs->gicd_no_migration_shift_bug = true;
69341823c1SPeter Maydell }
70341823c1SPeter Maydell
gicv3_pre_save(void * opaque)7144b1ff31SDr. David Alan Gilbert static int gicv3_pre_save(void *opaque)
72ff8f06eeSShlomo Pongratz {
73ff8f06eeSShlomo Pongratz GICv3State *s = (GICv3State *)opaque;
74ff8f06eeSShlomo Pongratz ARMGICv3CommonClass *c = ARM_GICV3_COMMON_GET_CLASS(s);
75ff8f06eeSShlomo Pongratz
76ff8f06eeSShlomo Pongratz if (c->pre_save) {
77ff8f06eeSShlomo Pongratz c->pre_save(s);
78ff8f06eeSShlomo Pongratz }
7944b1ff31SDr. David Alan Gilbert
8044b1ff31SDr. David Alan Gilbert return 0;
81ff8f06eeSShlomo Pongratz }
82ff8f06eeSShlomo Pongratz
gicv3_post_load(void * opaque,int version_id)83ff8f06eeSShlomo Pongratz static int gicv3_post_load(void *opaque, int version_id)
84ff8f06eeSShlomo Pongratz {
85ff8f06eeSShlomo Pongratz GICv3State *s = (GICv3State *)opaque;
86ff8f06eeSShlomo Pongratz ARMGICv3CommonClass *c = ARM_GICV3_COMMON_GET_CLASS(s);
87ff8f06eeSShlomo Pongratz
88341823c1SPeter Maydell gicv3_gicd_no_migration_shift_bug_post_load(s);
89341823c1SPeter Maydell
90ff8f06eeSShlomo Pongratz if (c->post_load) {
91ff8f06eeSShlomo Pongratz c->post_load(s);
92ff8f06eeSShlomo Pongratz }
93ff8f06eeSShlomo Pongratz return 0;
94ff8f06eeSShlomo Pongratz }
95ff8f06eeSShlomo Pongratz
virt_state_needed(void * opaque)964eb833b5SPeter Maydell static bool virt_state_needed(void *opaque)
974eb833b5SPeter Maydell {
984eb833b5SPeter Maydell GICv3CPUState *cs = opaque;
994eb833b5SPeter Maydell
1004eb833b5SPeter Maydell return cs->num_list_regs != 0;
1014eb833b5SPeter Maydell }
1024eb833b5SPeter Maydell
1034eb833b5SPeter Maydell static const VMStateDescription vmstate_gicv3_cpu_virt = {
1044eb833b5SPeter Maydell .name = "arm_gicv3_cpu/virt",
1054eb833b5SPeter Maydell .version_id = 1,
1064eb833b5SPeter Maydell .minimum_version_id = 1,
1074eb833b5SPeter Maydell .needed = virt_state_needed,
10845b1f81dSRichard Henderson .fields = (const VMStateField[]) {
1094eb833b5SPeter Maydell VMSTATE_UINT64_2DARRAY(ich_apr, GICv3CPUState, 3, 4),
1104eb833b5SPeter Maydell VMSTATE_UINT64(ich_hcr_el2, GICv3CPUState),
1114eb833b5SPeter Maydell VMSTATE_UINT64_ARRAY(ich_lr_el2, GICv3CPUState, GICV3_LR_MAX),
1124eb833b5SPeter Maydell VMSTATE_UINT64(ich_vmcr_el2, GICv3CPUState),
1134eb833b5SPeter Maydell VMSTATE_END_OF_LIST()
1144eb833b5SPeter Maydell }
1154eb833b5SPeter Maydell };
1164eb833b5SPeter Maydell
vmstate_gicv3_cpu_pre_load(void * opaque)117326049ccSPeter Maydell static int vmstate_gicv3_cpu_pre_load(void *opaque)
1186692aac4SVijaya Kumar K {
1196692aac4SVijaya Kumar K GICv3CPUState *cs = opaque;
1206692aac4SVijaya Kumar K
1216692aac4SVijaya Kumar K /*
1226692aac4SVijaya Kumar K * If the sre_el1 subsection is not transferred this
1236692aac4SVijaya Kumar K * means SRE_EL1 is 0x7 (which might not be the same as
1246692aac4SVijaya Kumar K * our reset value).
1256692aac4SVijaya Kumar K */
1266692aac4SVijaya Kumar K cs->icc_sre_el1 = 0x7;
1276692aac4SVijaya Kumar K return 0;
1286692aac4SVijaya Kumar K }
1296692aac4SVijaya Kumar K
icc_sre_el1_reg_needed(void * opaque)1306692aac4SVijaya Kumar K static bool icc_sre_el1_reg_needed(void *opaque)
1316692aac4SVijaya Kumar K {
1326692aac4SVijaya Kumar K GICv3CPUState *cs = opaque;
1336692aac4SVijaya Kumar K
1346692aac4SVijaya Kumar K return cs->icc_sre_el1 != 7;
1356692aac4SVijaya Kumar K }
1366692aac4SVijaya Kumar K
1376692aac4SVijaya Kumar K const VMStateDescription vmstate_gicv3_cpu_sre_el1 = {
1386692aac4SVijaya Kumar K .name = "arm_gicv3_cpu/sre_el1",
1396692aac4SVijaya Kumar K .version_id = 1,
1406692aac4SVijaya Kumar K .minimum_version_id = 1,
1416692aac4SVijaya Kumar K .needed = icc_sre_el1_reg_needed,
14245b1f81dSRichard Henderson .fields = (const VMStateField[]) {
1436692aac4SVijaya Kumar K VMSTATE_UINT64(icc_sre_el1, GICv3CPUState),
1446692aac4SVijaya Kumar K VMSTATE_END_OF_LIST()
1456692aac4SVijaya Kumar K }
1466692aac4SVijaya Kumar K };
1476692aac4SVijaya Kumar K
gicv4_needed(void * opaque)148641be697SPeter Maydell static bool gicv4_needed(void *opaque)
149641be697SPeter Maydell {
150641be697SPeter Maydell GICv3CPUState *cs = opaque;
151641be697SPeter Maydell
152641be697SPeter Maydell return cs->gic->revision > 3;
153641be697SPeter Maydell }
154641be697SPeter Maydell
155641be697SPeter Maydell const VMStateDescription vmstate_gicv3_gicv4 = {
156641be697SPeter Maydell .name = "arm_gicv3_cpu/gicv4",
157641be697SPeter Maydell .version_id = 1,
158641be697SPeter Maydell .minimum_version_id = 1,
159641be697SPeter Maydell .needed = gicv4_needed,
16045b1f81dSRichard Henderson .fields = (const VMStateField[]) {
161641be697SPeter Maydell VMSTATE_UINT64(gicr_vpropbaser, GICv3CPUState),
162641be697SPeter Maydell VMSTATE_UINT64(gicr_vpendbaser, GICv3CPUState),
163641be697SPeter Maydell VMSTATE_END_OF_LIST()
164641be697SPeter Maydell }
165641be697SPeter Maydell };
166641be697SPeter Maydell
gicv3_cpu_nmi_needed(void * opaque)1670e9f4e8eSJinjie Ruan static bool gicv3_cpu_nmi_needed(void *opaque)
1680e9f4e8eSJinjie Ruan {
1690e9f4e8eSJinjie Ruan GICv3CPUState *cs = opaque;
1700e9f4e8eSJinjie Ruan
1710e9f4e8eSJinjie Ruan return cs->gic->nmi_support;
1720e9f4e8eSJinjie Ruan }
1730e9f4e8eSJinjie Ruan
1740e9f4e8eSJinjie Ruan static const VMStateDescription vmstate_gicv3_cpu_nmi = {
1750e9f4e8eSJinjie Ruan .name = "arm_gicv3_cpu/nmi",
1760e9f4e8eSJinjie Ruan .version_id = 1,
1770e9f4e8eSJinjie Ruan .minimum_version_id = 1,
1780e9f4e8eSJinjie Ruan .needed = gicv3_cpu_nmi_needed,
1790e9f4e8eSJinjie Ruan .fields = (const VMStateField[]) {
1800e9f4e8eSJinjie Ruan VMSTATE_UINT32(gicr_inmir0, GICv3CPUState),
1810e9f4e8eSJinjie Ruan VMSTATE_END_OF_LIST()
1820e9f4e8eSJinjie Ruan }
1830e9f4e8eSJinjie Ruan };
1840e9f4e8eSJinjie Ruan
185757caeedSPavel Fedin static const VMStateDescription vmstate_gicv3_cpu = {
186757caeedSPavel Fedin .name = "arm_gicv3_cpu",
187757caeedSPavel Fedin .version_id = 1,
188757caeedSPavel Fedin .minimum_version_id = 1,
189326049ccSPeter Maydell .pre_load = vmstate_gicv3_cpu_pre_load,
19045b1f81dSRichard Henderson .fields = (const VMStateField[]) {
191757caeedSPavel Fedin VMSTATE_UINT32(level, GICv3CPUState),
192757caeedSPavel Fedin VMSTATE_UINT32(gicr_ctlr, GICv3CPUState),
193757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(gicr_statusr, GICv3CPUState, 2),
194757caeedSPavel Fedin VMSTATE_UINT32(gicr_waker, GICv3CPUState),
195757caeedSPavel Fedin VMSTATE_UINT64(gicr_propbaser, GICv3CPUState),
196757caeedSPavel Fedin VMSTATE_UINT64(gicr_pendbaser, GICv3CPUState),
197757caeedSPavel Fedin VMSTATE_UINT32(gicr_igroupr0, GICv3CPUState),
198757caeedSPavel Fedin VMSTATE_UINT32(gicr_ienabler0, GICv3CPUState),
199757caeedSPavel Fedin VMSTATE_UINT32(gicr_ipendr0, GICv3CPUState),
200757caeedSPavel Fedin VMSTATE_UINT32(gicr_iactiver0, GICv3CPUState),
201757caeedSPavel Fedin VMSTATE_UINT32(edge_trigger, GICv3CPUState),
202757caeedSPavel Fedin VMSTATE_UINT32(gicr_igrpmodr0, GICv3CPUState),
203757caeedSPavel Fedin VMSTATE_UINT32(gicr_nsacr, GICv3CPUState),
204757caeedSPavel Fedin VMSTATE_UINT8_ARRAY(gicr_ipriorityr, GICv3CPUState, GIC_INTERNAL),
205757caeedSPavel Fedin VMSTATE_UINT64_ARRAY(icc_ctlr_el1, GICv3CPUState, 2),
206757caeedSPavel Fedin VMSTATE_UINT64(icc_pmr_el1, GICv3CPUState),
207757caeedSPavel Fedin VMSTATE_UINT64_ARRAY(icc_bpr, GICv3CPUState, 3),
208757caeedSPavel Fedin VMSTATE_UINT64_2DARRAY(icc_apr, GICv3CPUState, 3, 4),
209757caeedSPavel Fedin VMSTATE_UINT64_ARRAY(icc_igrpen, GICv3CPUState, 3),
210757caeedSPavel Fedin VMSTATE_UINT64(icc_ctlr_el3, GICv3CPUState),
211757caeedSPavel Fedin VMSTATE_END_OF_LIST()
2124eb833b5SPeter Maydell },
21345b1f81dSRichard Henderson .subsections = (const VMStateDescription * const []) {
2144eb833b5SPeter Maydell &vmstate_gicv3_cpu_virt,
2156692aac4SVijaya Kumar K &vmstate_gicv3_cpu_sre_el1,
216641be697SPeter Maydell &vmstate_gicv3_gicv4,
2170e9f4e8eSJinjie Ruan &vmstate_gicv3_cpu_nmi,
2186692aac4SVijaya Kumar K NULL
219757caeedSPavel Fedin }
220757caeedSPavel Fedin };
221757caeedSPavel Fedin
gicv3_pre_load(void * opaque)222326049ccSPeter Maydell static int gicv3_pre_load(void *opaque)
223910e2048SShannon Zhao {
224910e2048SShannon Zhao GICv3State *cs = opaque;
225910e2048SShannon Zhao
226910e2048SShannon Zhao /*
227910e2048SShannon Zhao * The gicd_no_migration_shift_bug flag is used for migration compatibility
228910e2048SShannon Zhao * for old version QEMU which may have the GICD bmp shift bug under KVM mode.
229910e2048SShannon Zhao * Strictly, what we want to know is whether the migration source is using
230910e2048SShannon Zhao * KVM. Since we don't have any way to determine that, we look at whether the
231910e2048SShannon Zhao * destination is using KVM; this is close enough because for the older QEMU
232910e2048SShannon Zhao * versions with this bug KVM -> TCG migration didn't work anyway. If the
233910e2048SShannon Zhao * source is a newer QEMU without this bug it will transmit the migration
234910e2048SShannon Zhao * subsection which sets the flag to true; otherwise it will remain set to
235910e2048SShannon Zhao * the value we select here.
236910e2048SShannon Zhao */
237910e2048SShannon Zhao if (kvm_enabled()) {
238910e2048SShannon Zhao cs->gicd_no_migration_shift_bug = false;
239910e2048SShannon Zhao }
240910e2048SShannon Zhao
241910e2048SShannon Zhao return 0;
242910e2048SShannon Zhao }
243910e2048SShannon Zhao
needed_always(void * opaque)24478e9ddd7SPeter Maydell static bool needed_always(void *opaque)
24578e9ddd7SPeter Maydell {
24678e9ddd7SPeter Maydell return true;
24778e9ddd7SPeter Maydell }
24878e9ddd7SPeter Maydell
249910e2048SShannon Zhao const VMStateDescription vmstate_gicv3_gicd_no_migration_shift_bug = {
250910e2048SShannon Zhao .name = "arm_gicv3/gicd_no_migration_shift_bug",
251910e2048SShannon Zhao .version_id = 1,
252910e2048SShannon Zhao .minimum_version_id = 1,
25378e9ddd7SPeter Maydell .needed = needed_always,
25445b1f81dSRichard Henderson .fields = (const VMStateField[]) {
255910e2048SShannon Zhao VMSTATE_BOOL(gicd_no_migration_shift_bug, GICv3State),
256910e2048SShannon Zhao VMSTATE_END_OF_LIST()
257910e2048SShannon Zhao }
258910e2048SShannon Zhao };
259910e2048SShannon Zhao
gicv3_nmi_needed(void * opaque)2600e9f4e8eSJinjie Ruan static bool gicv3_nmi_needed(void *opaque)
2610e9f4e8eSJinjie Ruan {
2620e9f4e8eSJinjie Ruan GICv3State *cs = opaque;
2630e9f4e8eSJinjie Ruan
2640e9f4e8eSJinjie Ruan return cs->nmi_support;
2650e9f4e8eSJinjie Ruan }
2660e9f4e8eSJinjie Ruan
2670e9f4e8eSJinjie Ruan const VMStateDescription vmstate_gicv3_gicd_nmi = {
2680e9f4e8eSJinjie Ruan .name = "arm_gicv3/gicd_nmi",
2690e9f4e8eSJinjie Ruan .version_id = 1,
2700e9f4e8eSJinjie Ruan .minimum_version_id = 1,
2710e9f4e8eSJinjie Ruan .needed = gicv3_nmi_needed,
2720e9f4e8eSJinjie Ruan .fields = (const VMStateField[]) {
2730e9f4e8eSJinjie Ruan VMSTATE_UINT32_ARRAY(nmi, GICv3State, GICV3_BMP_SIZE),
2740e9f4e8eSJinjie Ruan VMSTATE_END_OF_LIST()
2750e9f4e8eSJinjie Ruan }
2760e9f4e8eSJinjie Ruan };
2770e9f4e8eSJinjie Ruan
278ff8f06eeSShlomo Pongratz static const VMStateDescription vmstate_gicv3 = {
279ff8f06eeSShlomo Pongratz .name = "arm_gicv3",
280757caeedSPavel Fedin .version_id = 1,
281757caeedSPavel Fedin .minimum_version_id = 1,
282326049ccSPeter Maydell .pre_load = gicv3_pre_load,
283ff8f06eeSShlomo Pongratz .pre_save = gicv3_pre_save,
284ff8f06eeSShlomo Pongratz .post_load = gicv3_post_load,
285252a7a6aSEric Auger .priority = MIG_PRI_GICV3,
28645b1f81dSRichard Henderson .fields = (const VMStateField[]) {
287757caeedSPavel Fedin VMSTATE_UINT32(gicd_ctlr, GICv3State),
288757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(gicd_statusr, GICv3State, 2),
289757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(group, GICv3State, GICV3_BMP_SIZE),
290757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(grpmod, GICv3State, GICV3_BMP_SIZE),
291757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(enabled, GICv3State, GICV3_BMP_SIZE),
292757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(pending, GICv3State, GICV3_BMP_SIZE),
293757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(active, GICv3State, GICV3_BMP_SIZE),
294757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(level, GICv3State, GICV3_BMP_SIZE),
295757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(edge_trigger, GICv3State, GICV3_BMP_SIZE),
296757caeedSPavel Fedin VMSTATE_UINT8_ARRAY(gicd_ipriority, GICv3State, GICV3_MAXIRQ),
297757caeedSPavel Fedin VMSTATE_UINT64_ARRAY(gicd_irouter, GICv3State, GICV3_MAXIRQ),
298757caeedSPavel Fedin VMSTATE_UINT32_ARRAY(gicd_nsacr, GICv3State,
299757caeedSPavel Fedin DIV_ROUND_UP(GICV3_MAXIRQ, 16)),
300757caeedSPavel Fedin VMSTATE_STRUCT_VARRAY_POINTER_UINT32(cpu, GICv3State, num_cpu,
301757caeedSPavel Fedin vmstate_gicv3_cpu, GICv3CPUState),
302757caeedSPavel Fedin VMSTATE_END_OF_LIST()
303910e2048SShannon Zhao },
30445b1f81dSRichard Henderson .subsections = (const VMStateDescription * const []) {
305910e2048SShannon Zhao &vmstate_gicv3_gicd_no_migration_shift_bug,
3060e9f4e8eSJinjie Ruan &vmstate_gicv3_gicd_nmi,
307910e2048SShannon Zhao NULL
308757caeedSPavel Fedin }
309ff8f06eeSShlomo Pongratz };
310ff8f06eeSShlomo Pongratz
gicv3_init_irqs_and_mmio(GICv3State * s,qemu_irq_handler handler,const MemoryRegionOps * ops)311ff8f06eeSShlomo Pongratz void gicv3_init_irqs_and_mmio(GICv3State *s, qemu_irq_handler handler,
31201b5ab8cSPeter Maydell const MemoryRegionOps *ops)
313ff8f06eeSShlomo Pongratz {
314ff8f06eeSShlomo Pongratz SysBusDevice *sbd = SYS_BUS_DEVICE(s);
315ff8f06eeSShlomo Pongratz int i;
316e5cba10eSPeter Maydell int cpuidx;
317ff8f06eeSShlomo Pongratz
318ff8f06eeSShlomo Pongratz /* For the GIC, also expose incoming GPIO lines for PPIs for each CPU.
319ff8f06eeSShlomo Pongratz * GPIO array layout is thus:
320ff8f06eeSShlomo Pongratz * [0..N-1] spi
321ff8f06eeSShlomo Pongratz * [N..N+31] PPIs for CPU 0
322ff8f06eeSShlomo Pongratz * [N+32..N+63] PPIs for CPU 1
323ff8f06eeSShlomo Pongratz * ...
324ff8f06eeSShlomo Pongratz */
325ff8f06eeSShlomo Pongratz i = s->num_irq - GIC_INTERNAL + GIC_INTERNAL * s->num_cpu;
326ff8f06eeSShlomo Pongratz qdev_init_gpio_in(DEVICE(s), handler, i);
327ff8f06eeSShlomo Pongratz
328ff8f06eeSShlomo Pongratz for (i = 0; i < s->num_cpu; i++) {
3293faf2b0cSPeter Maydell sysbus_init_irq(sbd, &s->cpu[i].parent_irq);
330ff8f06eeSShlomo Pongratz }
331ff8f06eeSShlomo Pongratz for (i = 0; i < s->num_cpu; i++) {
3323faf2b0cSPeter Maydell sysbus_init_irq(sbd, &s->cpu[i].parent_fiq);
333ff8f06eeSShlomo Pongratz }
334b53db42bSPeter Maydell for (i = 0; i < s->num_cpu; i++) {
335b53db42bSPeter Maydell sysbus_init_irq(sbd, &s->cpu[i].parent_virq);
336b53db42bSPeter Maydell }
337b53db42bSPeter Maydell for (i = 0; i < s->num_cpu; i++) {
338b53db42bSPeter Maydell sysbus_init_irq(sbd, &s->cpu[i].parent_vfiq);
339b53db42bSPeter Maydell }
34083f32075SJinjie Ruan for (i = 0; i < s->num_cpu; i++) {
34183f32075SJinjie Ruan sysbus_init_irq(sbd, &s->cpu[i].parent_nmi);
34283f32075SJinjie Ruan }
34383f32075SJinjie Ruan for (i = 0; i < s->num_cpu; i++) {
34483f32075SJinjie Ruan sysbus_init_irq(sbd, &s->cpu[i].parent_vnmi);
34583f32075SJinjie Ruan }
346ff8f06eeSShlomo Pongratz
347ff8f06eeSShlomo Pongratz memory_region_init_io(&s->iomem_dist, OBJECT(s), ops, s,
348ff8f06eeSShlomo Pongratz "gicv3_dist", 0x10000);
349ff8f06eeSShlomo Pongratz sysbus_init_mmio(sbd, &s->iomem_dist);
3501e575b66SEric Auger
351e5cba10eSPeter Maydell s->redist_regions = g_new0(GICv3RedistRegion, s->nb_redist_regions);
352e5cba10eSPeter Maydell cpuidx = 0;
3531e575b66SEric Auger for (i = 0; i < s->nb_redist_regions; i++) {
3541e575b66SEric Auger char *name = g_strdup_printf("gicv3_redist_region[%d]", i);
355e5cba10eSPeter Maydell GICv3RedistRegion *region = &s->redist_regions[i];
3561e575b66SEric Auger
357e5cba10eSPeter Maydell region->gic = s;
358e5cba10eSPeter Maydell region->cpuidx = cpuidx;
359e5cba10eSPeter Maydell cpuidx += s->redist_region_count[i];
360e5cba10eSPeter Maydell
361e5cba10eSPeter Maydell memory_region_init_io(®ion->iomem, OBJECT(s),
362e5cba10eSPeter Maydell ops ? &ops[1] : NULL, region, name,
363ae3b3ba1SPeter Maydell s->redist_region_count[i] * gicv3_redist_size(s));
364e5cba10eSPeter Maydell sysbus_init_mmio(sbd, ®ion->iomem);
3651e575b66SEric Auger g_free(name);
3661e575b66SEric Auger }
367ff8f06eeSShlomo Pongratz }
368ff8f06eeSShlomo Pongratz
arm_gicv3_common_realize(DeviceState * dev,Error ** errp)369ff8f06eeSShlomo Pongratz static void arm_gicv3_common_realize(DeviceState *dev, Error **errp)
370ff8f06eeSShlomo Pongratz {
371ff8f06eeSShlomo Pongratz GICv3State *s = ARM_GICV3_COMMON(dev);
37204616415SPeter Maydell int i, rdist_capacity, cpuidx;
373ff8f06eeSShlomo Pongratz
374445d5825SPeter Maydell /*
375445d5825SPeter Maydell * This GIC device supports only revisions 3 and 4. The GICv1/v2
376445d5825SPeter Maydell * is a separate device.
377445d5825SPeter Maydell * Note that subclasses of this device may impose further restrictions
378445d5825SPeter Maydell * on the GIC revision: notably, the in-kernel KVM GIC doesn't
379445d5825SPeter Maydell * support GICv4.
380ff8f06eeSShlomo Pongratz */
381445d5825SPeter Maydell if (s->revision != 3 && s->revision != 4) {
382ff8f06eeSShlomo Pongratz error_setg(errp, "unsupported GIC revision %d", s->revision);
383ff8f06eeSShlomo Pongratz return;
384ff8f06eeSShlomo Pongratz }
38507e2034dSPavel Fedin
38607e2034dSPavel Fedin if (s->num_irq > GICV3_MAXIRQ) {
38707e2034dSPavel Fedin error_setg(errp,
38807e2034dSPavel Fedin "requested %u interrupt lines exceeds GIC maximum %d",
38907e2034dSPavel Fedin s->num_irq, GICV3_MAXIRQ);
39007e2034dSPavel Fedin return;
39107e2034dSPavel Fedin }
39207e2034dSPavel Fedin if (s->num_irq < GIC_INTERNAL) {
39307e2034dSPavel Fedin error_setg(errp,
39407e2034dSPavel Fedin "requested %u interrupt lines is below GIC minimum %d",
39507e2034dSPavel Fedin s->num_irq, GIC_INTERNAL);
39607e2034dSPavel Fedin return;
39707e2034dSPavel Fedin }
39889ac9d0cSPeter Maydell if (s->num_cpu == 0) {
39989ac9d0cSPeter Maydell error_setg(errp, "num-cpu must be at least 1");
40089ac9d0cSPeter Maydell return;
40189ac9d0cSPeter Maydell }
40207e2034dSPavel Fedin
40307e2034dSPavel Fedin /* ITLinesNumber is represented as (N / 32) - 1, so this is an
40407e2034dSPavel Fedin * implementation imposed restriction, not an architectural one,
40507e2034dSPavel Fedin * so we don't have to deal with bitfields where only some of the
40607e2034dSPavel Fedin * bits in a 32-bit word should be valid.
40707e2034dSPavel Fedin */
40807e2034dSPavel Fedin if (s->num_irq % 32) {
40907e2034dSPavel Fedin error_setg(errp,
41007e2034dSPavel Fedin "%d interrupt lines unsupported: not divisible by 32",
41107e2034dSPavel Fedin s->num_irq);
41207e2034dSPavel Fedin return;
41307e2034dSPavel Fedin }
41407e2034dSPavel Fedin
415ac30dec3SShashi Mallela if (s->lpi_enable && !s->dma) {
416ac30dec3SShashi Mallela error_setg(errp, "Redist-ITS: Guest 'sysmem' reference link not set");
417ac30dec3SShashi Mallela return;
418ac30dec3SShashi Mallela }
419ac30dec3SShashi Mallela
42001b5ab8cSPeter Maydell rdist_capacity = 0;
42101b5ab8cSPeter Maydell for (i = 0; i < s->nb_redist_regions; i++) {
42201b5ab8cSPeter Maydell rdist_capacity += s->redist_region_count[i];
42301b5ab8cSPeter Maydell }
424671927a1SPeter Maydell if (rdist_capacity != s->num_cpu) {
42501b5ab8cSPeter Maydell error_setg(errp, "Capacity of the redist regions(%d) "
426671927a1SPeter Maydell "does not match the number of vcpus(%d)",
42701b5ab8cSPeter Maydell rdist_capacity, s->num_cpu);
42801b5ab8cSPeter Maydell return;
42901b5ab8cSPeter Maydell }
43001b5ab8cSPeter Maydell
431e5ff041fSPeter Maydell if (s->lpi_enable) {
432e5ff041fSPeter Maydell address_space_init(&s->dma_as, s->dma,
433e5ff041fSPeter Maydell "gicv3-its-sysmem");
434e5ff041fSPeter Maydell }
435e5ff041fSPeter Maydell
43607e2034dSPavel Fedin s->cpu = g_new0(GICv3CPUState, s->num_cpu);
43707e2034dSPavel Fedin
43807e2034dSPavel Fedin for (i = 0; i < s->num_cpu; i++) {
43907e2034dSPavel Fedin CPUState *cpu = qemu_get_cpu(i);
44007e2034dSPavel Fedin uint64_t cpu_affid;
44107e2034dSPavel Fedin
44207e2034dSPavel Fedin s->cpu[i].cpu = cpu;
44307e2034dSPavel Fedin s->cpu[i].gic = s;
444d3a3e529SVijaya Kumar K /* Store GICv3CPUState in CPUARMState gicv3state pointer */
445d3a3e529SVijaya Kumar K gicv3_set_gicv3state(cpu, &s->cpu[i]);
44607e2034dSPavel Fedin
44707e2034dSPavel Fedin /* Pre-construct the GICR_TYPER:
44807e2034dSPavel Fedin * For our implementation:
44907e2034dSPavel Fedin * Top 32 bits are the affinity value of the associated CPU
45007e2034dSPavel Fedin * CommonLPIAff == 01 (redistributors with same Aff3 share LPI table)
45107e2034dSPavel Fedin * Processor_Number == CPU index starting from 0
45207e2034dSPavel Fedin * DPGS == 0 (GICR_CTLR.DPG* not supported)
45307e2034dSPavel Fedin * Last == 1 if this is the last redistributor in a series of
45407e2034dSPavel Fedin * contiguous redistributor pages
45507e2034dSPavel Fedin * DirectLPI == 0 (direct injection of LPIs not supported)
456e2d5e189SPeter Maydell * VLPIS == 1 if vLPIs supported (GICv4 and up)
457e2d5e189SPeter Maydell * PLPIS == 1 if LPIs supported
45807e2034dSPavel Fedin */
45977a7a367SMarc-André Lureau cpu_affid = object_property_get_uint(OBJECT(cpu), "mp-affinity", NULL);
46007e2034dSPavel Fedin
46107e2034dSPavel Fedin /* The CPU mp-affinity property is in MPIDR register format; squash
46207e2034dSPavel Fedin * the affinity bytes into 32 bits as the GICR_TYPER has them.
46307e2034dSPavel Fedin */
46492204403SAndrew Jones cpu_affid = ((cpu_affid & 0xFF00000000ULL) >> 8) |
46592204403SAndrew Jones (cpu_affid & 0xFFFFFF);
46607e2034dSPavel Fedin s->cpu[i].gicr_typer = (cpu_affid << 32) |
46707e2034dSPavel Fedin (1 << 24) |
46804616415SPeter Maydell (i << 8);
469ac30dec3SShashi Mallela
470ac30dec3SShashi Mallela if (s->lpi_enable) {
471ac30dec3SShashi Mallela s->cpu[i].gicr_typer |= GICR_TYPER_PLPIS;
472e2d5e189SPeter Maydell if (s->revision > 3) {
473e2d5e189SPeter Maydell s->cpu[i].gicr_typer |= GICR_TYPER_VLPIS;
474e2d5e189SPeter Maydell }
475ac30dec3SShashi Mallela }
47607e2034dSPavel Fedin }
47704616415SPeter Maydell
47804616415SPeter Maydell /*
47904616415SPeter Maydell * Now go through and set GICR_TYPER.Last for the final
48004616415SPeter Maydell * redistributor in each region.
48104616415SPeter Maydell */
48204616415SPeter Maydell cpuidx = 0;
48304616415SPeter Maydell for (i = 0; i < s->nb_redist_regions; i++) {
48404616415SPeter Maydell cpuidx += s->redist_region_count[i];
48504616415SPeter Maydell s->cpu[cpuidx - 1].gicr_typer |= GICR_TYPER_LAST;
48604616415SPeter Maydell }
4877c087bd3SPeter Maydell
4887c087bd3SPeter Maydell s->itslist = g_ptr_array_new();
489ff8f06eeSShlomo Pongratz }
490ff8f06eeSShlomo Pongratz
arm_gicv3_finalize(Object * obj)4911e575b66SEric Auger static void arm_gicv3_finalize(Object *obj)
4921e575b66SEric Auger {
4931e575b66SEric Auger GICv3State *s = ARM_GICV3_COMMON(obj);
4941e575b66SEric Auger
4951e575b66SEric Auger g_free(s->redist_region_count);
4961e575b66SEric Auger }
4971e575b66SEric Auger
arm_gicv3_common_reset_hold(Object * obj,ResetType type)498*ad80e367SPeter Maydell static void arm_gicv3_common_reset_hold(Object *obj, ResetType type)
499ff8f06eeSShlomo Pongratz {
500183cac31SPeter Maydell GICv3State *s = ARM_GICV3_COMMON(obj);
50107e2034dSPavel Fedin int i;
50207e2034dSPavel Fedin
50307e2034dSPavel Fedin for (i = 0; i < s->num_cpu; i++) {
50407e2034dSPavel Fedin GICv3CPUState *cs = &s->cpu[i];
50507e2034dSPavel Fedin
50607e2034dSPavel Fedin cs->level = 0;
50707e2034dSPavel Fedin cs->gicr_ctlr = 0;
5081611956bSPeter Maydell if (s->lpi_enable) {
5091611956bSPeter Maydell /* Our implementation supports clearing GICR_CTLR.EnableLPIs */
5101611956bSPeter Maydell cs->gicr_ctlr |= GICR_CTLR_CES;
5111611956bSPeter Maydell }
51207e2034dSPavel Fedin cs->gicr_statusr[GICV3_S] = 0;
51307e2034dSPavel Fedin cs->gicr_statusr[GICV3_NS] = 0;
51407e2034dSPavel Fedin cs->gicr_waker = GICR_WAKER_ProcessorSleep | GICR_WAKER_ChildrenAsleep;
51507e2034dSPavel Fedin cs->gicr_propbaser = 0;
51607e2034dSPavel Fedin cs->gicr_pendbaser = 0;
517641be697SPeter Maydell cs->gicr_vpropbaser = 0;
518641be697SPeter Maydell cs->gicr_vpendbaser = 0;
51907e2034dSPavel Fedin /* If we're resetting a TZ-aware GIC as if secure firmware
52007e2034dSPavel Fedin * had set it up ready to start a kernel in non-secure, we
52107e2034dSPavel Fedin * need to set interrupts to group 1 so the kernel can use them.
52207e2034dSPavel Fedin * Otherwise they reset to group 0 like the hardware.
52307e2034dSPavel Fedin */
52407e2034dSPavel Fedin if (s->irq_reset_nonsecure) {
52507e2034dSPavel Fedin cs->gicr_igroupr0 = 0xffffffff;
52607e2034dSPavel Fedin } else {
52707e2034dSPavel Fedin cs->gicr_igroupr0 = 0;
52807e2034dSPavel Fedin }
52907e2034dSPavel Fedin
53007e2034dSPavel Fedin cs->gicr_ienabler0 = 0;
53107e2034dSPavel Fedin cs->gicr_ipendr0 = 0;
53207e2034dSPavel Fedin cs->gicr_iactiver0 = 0;
53307e2034dSPavel Fedin cs->edge_trigger = 0xffff;
53407e2034dSPavel Fedin cs->gicr_igrpmodr0 = 0;
53507e2034dSPavel Fedin cs->gicr_nsacr = 0;
53607e2034dSPavel Fedin memset(cs->gicr_ipriorityr, 0, sizeof(cs->gicr_ipriorityr));
53707e2034dSPavel Fedin
538ce187c3cSPeter Maydell cs->hppi.prio = 0xff;
539d89daa89SJinjie Ruan cs->hppi.nmi = false;
54017fb5e36SShashi Mallela cs->hpplpi.prio = 0xff;
541d89daa89SJinjie Ruan cs->hpplpi.nmi = false;
542c3f21b06SPeter Maydell cs->hppvlpi.prio = 0xff;
543d89daa89SJinjie Ruan cs->hppvlpi.nmi = false;
544ce187c3cSPeter Maydell
54507e2034dSPavel Fedin /* State in the CPU interface must *not* be reset here, because it
54607e2034dSPavel Fedin * is part of the CPU's reset domain, not the GIC device's.
54707e2034dSPavel Fedin */
54807e2034dSPavel Fedin }
54907e2034dSPavel Fedin
55007e2034dSPavel Fedin /* For our implementation affinity routing is always enabled */
55107e2034dSPavel Fedin if (s->security_extn) {
55207e2034dSPavel Fedin s->gicd_ctlr = GICD_CTLR_ARE_S | GICD_CTLR_ARE_NS;
55307e2034dSPavel Fedin } else {
55407e2034dSPavel Fedin s->gicd_ctlr = GICD_CTLR_DS | GICD_CTLR_ARE;
55507e2034dSPavel Fedin }
55607e2034dSPavel Fedin
55707e2034dSPavel Fedin s->gicd_statusr[GICV3_S] = 0;
55807e2034dSPavel Fedin s->gicd_statusr[GICV3_NS] = 0;
55907e2034dSPavel Fedin
56007e2034dSPavel Fedin memset(s->group, 0, sizeof(s->group));
56107e2034dSPavel Fedin memset(s->grpmod, 0, sizeof(s->grpmod));
56207e2034dSPavel Fedin memset(s->enabled, 0, sizeof(s->enabled));
56307e2034dSPavel Fedin memset(s->pending, 0, sizeof(s->pending));
56407e2034dSPavel Fedin memset(s->active, 0, sizeof(s->active));
56507e2034dSPavel Fedin memset(s->level, 0, sizeof(s->level));
56607e2034dSPavel Fedin memset(s->edge_trigger, 0, sizeof(s->edge_trigger));
56707e2034dSPavel Fedin memset(s->gicd_ipriority, 0, sizeof(s->gicd_ipriority));
56807e2034dSPavel Fedin memset(s->gicd_irouter, 0, sizeof(s->gicd_irouter));
56907e2034dSPavel Fedin memset(s->gicd_nsacr, 0, sizeof(s->gicd_nsacr));
570ce187c3cSPeter Maydell /* GICD_IROUTER are UNKNOWN at reset so in theory the guest must
571ce187c3cSPeter Maydell * write these to get sane behaviour and we need not populate the
572ce187c3cSPeter Maydell * pointer cache here; however having the cache be different for
573ce187c3cSPeter Maydell * "happened to be 0 from reset" and "guest wrote 0" would be
574ce187c3cSPeter Maydell * too confusing.
575ce187c3cSPeter Maydell */
576ce187c3cSPeter Maydell gicv3_cache_all_target_cpustates(s);
57707e2034dSPavel Fedin
57807e2034dSPavel Fedin if (s->irq_reset_nonsecure) {
57907e2034dSPavel Fedin /* If we're resetting a TZ-aware GIC as if secure firmware
58007e2034dSPavel Fedin * had set it up ready to start a kernel in non-secure, we
58107e2034dSPavel Fedin * need to set interrupts to group 1 so the kernel can use them.
58207e2034dSPavel Fedin * Otherwise they reset to group 0 like the hardware.
58307e2034dSPavel Fedin */
58407e2034dSPavel Fedin for (i = GIC_INTERNAL; i < s->num_irq; i++) {
58507e2034dSPavel Fedin gicv3_gicd_group_set(s, i);
58607e2034dSPavel Fedin }
58707e2034dSPavel Fedin }
588910e2048SShannon Zhao s->gicd_no_migration_shift_bug = true;
58907e2034dSPavel Fedin }
59007e2034dSPavel Fedin
arm_gic_common_linux_init(ARMLinuxBootIf * obj,bool secure_boot)59107e2034dSPavel Fedin static void arm_gic_common_linux_init(ARMLinuxBootIf *obj,
59207e2034dSPavel Fedin bool secure_boot)
59307e2034dSPavel Fedin {
59407e2034dSPavel Fedin GICv3State *s = ARM_GICV3_COMMON(obj);
59507e2034dSPavel Fedin
59607e2034dSPavel Fedin if (s->security_extn && !secure_boot) {
59707e2034dSPavel Fedin /* We're directly booting a kernel into NonSecure. If this GIC
59807e2034dSPavel Fedin * implements the security extensions then we must configure it
59907e2034dSPavel Fedin * to have all the interrupts be NonSecure (this is a job that
60007e2034dSPavel Fedin * is done by the Secure boot firmware in real hardware, and in
60107e2034dSPavel Fedin * this mode QEMU is acting as a minimalist firmware-and-bootloader
60207e2034dSPavel Fedin * equivalent).
60307e2034dSPavel Fedin */
60407e2034dSPavel Fedin s->irq_reset_nonsecure = true;
60507e2034dSPavel Fedin }
606ff8f06eeSShlomo Pongratz }
607ff8f06eeSShlomo Pongratz
608ff8f06eeSShlomo Pongratz static Property arm_gicv3_common_properties[] = {
609ff8f06eeSShlomo Pongratz DEFINE_PROP_UINT32("num-cpu", GICv3State, num_cpu, 1),
610ff8f06eeSShlomo Pongratz DEFINE_PROP_UINT32("num-irq", GICv3State, num_irq, 32),
611ff8f06eeSShlomo Pongratz DEFINE_PROP_UINT32("revision", GICv3State, revision, 3),
612ac30dec3SShashi Mallela DEFINE_PROP_BOOL("has-lpi", GICv3State, lpi_enable, 0),
613c9e86cbdSJinjie Ruan DEFINE_PROP_BOOL("has-nmi", GICv3State, nmi_support, 0),
614ff8f06eeSShlomo Pongratz DEFINE_PROP_BOOL("has-security-extensions", GICv3State, security_extn, 0),
61539f29e59SPeter Maydell /*
61639f29e59SPeter Maydell * Compatibility property: force 8 bits of physical priority, even
61739f29e59SPeter Maydell * if the CPU being emulated should have fewer.
61839f29e59SPeter Maydell */
61939f29e59SPeter Maydell DEFINE_PROP_BOOL("force-8-bit-prio", GICv3State, force_8bit_prio, 0),
6201e575b66SEric Auger DEFINE_PROP_ARRAY("redist-region-count", GICv3State, nb_redist_regions,
6211e575b66SEric Auger redist_region_count, qdev_prop_uint32, uint32_t),
622ac30dec3SShashi Mallela DEFINE_PROP_LINK("sysmem", GICv3State, dma, TYPE_MEMORY_REGION,
623ac30dec3SShashi Mallela MemoryRegion *),
624ff8f06eeSShlomo Pongratz DEFINE_PROP_END_OF_LIST(),
625ff8f06eeSShlomo Pongratz };
626ff8f06eeSShlomo Pongratz
arm_gicv3_common_class_init(ObjectClass * klass,void * data)627ff8f06eeSShlomo Pongratz static void arm_gicv3_common_class_init(ObjectClass *klass, void *data)
628ff8f06eeSShlomo Pongratz {
629ff8f06eeSShlomo Pongratz DeviceClass *dc = DEVICE_CLASS(klass);
630183cac31SPeter Maydell ResettableClass *rc = RESETTABLE_CLASS(klass);
63107e2034dSPavel Fedin ARMLinuxBootIfClass *albifc = ARM_LINUX_BOOT_IF_CLASS(klass);
632ff8f06eeSShlomo Pongratz
633183cac31SPeter Maydell rc->phases.hold = arm_gicv3_common_reset_hold;
634ff8f06eeSShlomo Pongratz dc->realize = arm_gicv3_common_realize;
6354f67d30bSMarc-André Lureau device_class_set_props(dc, arm_gicv3_common_properties);
636ff8f06eeSShlomo Pongratz dc->vmsd = &vmstate_gicv3;
63707e2034dSPavel Fedin albifc->arm_linux_init = arm_gic_common_linux_init;
638ff8f06eeSShlomo Pongratz }
639ff8f06eeSShlomo Pongratz
640ff8f06eeSShlomo Pongratz static const TypeInfo arm_gicv3_common_type = {
641ff8f06eeSShlomo Pongratz .name = TYPE_ARM_GICV3_COMMON,
642ff8f06eeSShlomo Pongratz .parent = TYPE_SYS_BUS_DEVICE,
643ff8f06eeSShlomo Pongratz .instance_size = sizeof(GICv3State),
644ff8f06eeSShlomo Pongratz .class_size = sizeof(ARMGICv3CommonClass),
645ff8f06eeSShlomo Pongratz .class_init = arm_gicv3_common_class_init,
6461e575b66SEric Auger .instance_finalize = arm_gicv3_finalize,
647ff8f06eeSShlomo Pongratz .abstract = true,
64807e2034dSPavel Fedin .interfaces = (InterfaceInfo []) {
64907e2034dSPavel Fedin { TYPE_ARM_LINUX_BOOT_IF },
65007e2034dSPavel Fedin { },
65107e2034dSPavel Fedin },
652ff8f06eeSShlomo Pongratz };
653ff8f06eeSShlomo Pongratz
register_types(void)654ff8f06eeSShlomo Pongratz static void register_types(void)
655ff8f06eeSShlomo Pongratz {
656ff8f06eeSShlomo Pongratz type_register_static(&arm_gicv3_common_type);
657ff8f06eeSShlomo Pongratz }
658ff8f06eeSShlomo Pongratz
type_init(register_types)659ff8f06eeSShlomo Pongratz type_init(register_types)
6600c40daf0SPhilippe Mathieu-Daudé
6610c40daf0SPhilippe Mathieu-Daudé const char *gicv3_class_name(void)
6620c40daf0SPhilippe Mathieu-Daudé {
6630c40daf0SPhilippe Mathieu-Daudé if (kvm_irqchip_in_kernel()) {
6640c40daf0SPhilippe Mathieu-Daudé return "kvm-arm-gicv3";
6650c40daf0SPhilippe Mathieu-Daudé } else {
6660c40daf0SPhilippe Mathieu-Daudé if (kvm_enabled()) {
6670c40daf0SPhilippe Mathieu-Daudé error_report("Userspace GICv3 is not supported with KVM");
6680c40daf0SPhilippe Mathieu-Daudé exit(1);
6690c40daf0SPhilippe Mathieu-Daudé }
6700c40daf0SPhilippe Mathieu-Daudé return "arm-gicv3";
6710c40daf0SPhilippe Mathieu-Daudé }
6720c40daf0SPhilippe Mathieu-Daudé }
673