xref: /openbmc/linux/arch/powerpc/sysdev/xive/common.c (revision 2634682f)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  * Copyright 2016,2017 IBM Corporation.
4  */
5 
6 #define pr_fmt(fmt) "xive: " fmt
7 
8 #include <linux/types.h>
9 #include <linux/threads.h>
10 #include <linux/kernel.h>
11 #include <linux/irq.h>
12 #include <linux/debugfs.h>
13 #include <linux/smp.h>
14 #include <linux/interrupt.h>
15 #include <linux/seq_file.h>
16 #include <linux/init.h>
17 #include <linux/cpu.h>
18 #include <linux/of.h>
19 #include <linux/slab.h>
20 #include <linux/spinlock.h>
21 #include <linux/msi.h>
22 #include <linux/vmalloc.h>
23 
24 #include <asm/debugfs.h>
25 #include <asm/prom.h>
26 #include <asm/io.h>
27 #include <asm/smp.h>
28 #include <asm/machdep.h>
29 #include <asm/irq.h>
30 #include <asm/errno.h>
31 #include <asm/xive.h>
32 #include <asm/xive-regs.h>
33 #include <asm/xmon.h>
34 
35 #include "xive-internal.h"
36 
37 #undef DEBUG_FLUSH
38 #undef DEBUG_ALL
39 
40 #ifdef DEBUG_ALL
41 #define DBG_VERBOSE(fmt, ...)	pr_devel("cpu %d - " fmt, \
42 					 smp_processor_id(), ## __VA_ARGS__)
43 #else
44 #define DBG_VERBOSE(fmt...)	do { } while(0)
45 #endif
46 
47 bool __xive_enabled;
48 EXPORT_SYMBOL_GPL(__xive_enabled);
49 bool xive_cmdline_disabled;
50 
51 /* We use only one priority for now */
52 static u8 xive_irq_priority;
53 
54 /* TIMA exported to KVM */
55 void __iomem *xive_tima;
56 EXPORT_SYMBOL_GPL(xive_tima);
57 u32 xive_tima_offset;
58 
59 /* Backend ops */
60 static const struct xive_ops *xive_ops;
61 
62 /* Our global interrupt domain */
63 static struct irq_domain *xive_irq_domain;
64 
65 #ifdef CONFIG_SMP
66 /* The IPIs all use the same logical irq number */
67 static u32 xive_ipi_irq;
68 #endif
69 
70 /* Xive state for each CPU */
71 static DEFINE_PER_CPU(struct xive_cpu *, xive_cpu);
72 
73 /* An invalid CPU target */
74 #define XIVE_INVALID_TARGET	(-1)
75 
76 /*
77  * Read the next entry in a queue, return its content if it's valid
78  * or 0 if there is no new entry.
79  *
80  * The queue pointer is moved forward unless "just_peek" is set
81  */
82 static u32 xive_read_eq(struct xive_q *q, bool just_peek)
83 {
84 	u32 cur;
85 
86 	if (!q->qpage)
87 		return 0;
88 	cur = be32_to_cpup(q->qpage + q->idx);
89 
90 	/* Check valid bit (31) vs current toggle polarity */
91 	if ((cur >> 31) == q->toggle)
92 		return 0;
93 
94 	/* If consuming from the queue ... */
95 	if (!just_peek) {
96 		/* Next entry */
97 		q->idx = (q->idx + 1) & q->msk;
98 
99 		/* Wrap around: flip valid toggle */
100 		if (q->idx == 0)
101 			q->toggle ^= 1;
102 	}
103 	/* Mask out the valid bit (31) */
104 	return cur & 0x7fffffff;
105 }
106 
107 /*
108  * Scans all the queue that may have interrupts in them
109  * (based on "pending_prio") in priority order until an
110  * interrupt is found or all the queues are empty.
111  *
112  * Then updates the CPPR (Current Processor Priority
113  * Register) based on the most favored interrupt found
114  * (0xff if none) and return what was found (0 if none).
115  *
116  * If just_peek is set, return the most favored pending
117  * interrupt if any but don't update the queue pointers.
118  *
119  * Note: This function can operate generically on any number
120  * of queues (up to 8). The current implementation of the XIVE
121  * driver only uses a single queue however.
122  *
123  * Note2: This will also "flush" "the pending_count" of a queue
124  * into the "count" when that queue is observed to be empty.
125  * This is used to keep track of the amount of interrupts
126  * targetting a queue. When an interrupt is moved away from
127  * a queue, we only decrement that queue count once the queue
128  * has been observed empty to avoid races.
129  */
130 static u32 xive_scan_interrupts(struct xive_cpu *xc, bool just_peek)
131 {
132 	u32 irq = 0;
133 	u8 prio = 0;
134 
135 	/* Find highest pending priority */
136 	while (xc->pending_prio != 0) {
137 		struct xive_q *q;
138 
139 		prio = ffs(xc->pending_prio) - 1;
140 		DBG_VERBOSE("scan_irq: trying prio %d\n", prio);
141 
142 		/* Try to fetch */
143 		irq = xive_read_eq(&xc->queue[prio], just_peek);
144 
145 		/* Found something ? That's it */
146 		if (irq) {
147 			if (just_peek || irq_to_desc(irq))
148 				break;
149 			/*
150 			 * We should never get here; if we do then we must
151 			 * have failed to synchronize the interrupt properly
152 			 * when shutting it down.
153 			 */
154 			pr_crit("xive: got interrupt %d without descriptor, dropping\n",
155 				irq);
156 			WARN_ON(1);
157 			continue;
158 		}
159 
160 		/* Clear pending bits */
161 		xc->pending_prio &= ~(1 << prio);
162 
163 		/*
164 		 * Check if the queue count needs adjusting due to
165 		 * interrupts being moved away. See description of
166 		 * xive_dec_target_count()
167 		 */
168 		q = &xc->queue[prio];
169 		if (atomic_read(&q->pending_count)) {
170 			int p = atomic_xchg(&q->pending_count, 0);
171 			if (p) {
172 				WARN_ON(p > atomic_read(&q->count));
173 				atomic_sub(p, &q->count);
174 			}
175 		}
176 	}
177 
178 	/* If nothing was found, set CPPR to 0xff */
179 	if (irq == 0)
180 		prio = 0xff;
181 
182 	/* Update HW CPPR to match if necessary */
183 	if (prio != xc->cppr) {
184 		DBG_VERBOSE("scan_irq: adjusting CPPR to %d\n", prio);
185 		xc->cppr = prio;
186 		out_8(xive_tima + xive_tima_offset + TM_CPPR, prio);
187 	}
188 
189 	return irq;
190 }
191 
192 /*
193  * This is used to perform the magic loads from an ESB
194  * described in xive-regs.h
195  */
196 static notrace u8 xive_esb_read(struct xive_irq_data *xd, u32 offset)
197 {
198 	u64 val;
199 
200 	if (offset == XIVE_ESB_SET_PQ_10 && xd->flags & XIVE_IRQ_FLAG_STORE_EOI)
201 		offset |= XIVE_ESB_LD_ST_MO;
202 
203 	/* Handle HW errata */
204 	if (xd->flags & XIVE_IRQ_FLAG_SHIFT_BUG)
205 		offset |= offset << 4;
206 
207 	if ((xd->flags & XIVE_IRQ_FLAG_H_INT_ESB) && xive_ops->esb_rw)
208 		val = xive_ops->esb_rw(xd->hw_irq, offset, 0, 0);
209 	else
210 		val = in_be64(xd->eoi_mmio + offset);
211 
212 	return (u8)val;
213 }
214 
215 static void xive_esb_write(struct xive_irq_data *xd, u32 offset, u64 data)
216 {
217 	/* Handle HW errata */
218 	if (xd->flags & XIVE_IRQ_FLAG_SHIFT_BUG)
219 		offset |= offset << 4;
220 
221 	if ((xd->flags & XIVE_IRQ_FLAG_H_INT_ESB) && xive_ops->esb_rw)
222 		xive_ops->esb_rw(xd->hw_irq, offset, data, 1);
223 	else
224 		out_be64(xd->eoi_mmio + offset, data);
225 }
226 
227 #ifdef CONFIG_XMON
228 static notrace void xive_dump_eq(const char *name, struct xive_q *q)
229 {
230 	u32 i0, i1, idx;
231 
232 	if (!q->qpage)
233 		return;
234 	idx = q->idx;
235 	i0 = be32_to_cpup(q->qpage + idx);
236 	idx = (idx + 1) & q->msk;
237 	i1 = be32_to_cpup(q->qpage + idx);
238 	xmon_printf("%s idx=%d T=%d %08x %08x ...", name,
239 		     q->idx, q->toggle, i0, i1);
240 }
241 
242 notrace void xmon_xive_do_dump(int cpu)
243 {
244 	struct xive_cpu *xc = per_cpu(xive_cpu, cpu);
245 
246 	xmon_printf("CPU %d:", cpu);
247 	if (xc) {
248 		xmon_printf("pp=%02x CPPR=%02x ", xc->pending_prio, xc->cppr);
249 
250 #ifdef CONFIG_SMP
251 		{
252 			u64 val = xive_esb_read(&xc->ipi_data, XIVE_ESB_GET);
253 
254 			xmon_printf("IPI=0x%08x PQ=%c%c ", xc->hw_ipi,
255 				    val & XIVE_ESB_VAL_P ? 'P' : '-',
256 				    val & XIVE_ESB_VAL_Q ? 'Q' : '-');
257 		}
258 #endif
259 		xive_dump_eq("EQ", &xc->queue[xive_irq_priority]);
260 	}
261 	xmon_printf("\n");
262 }
263 
264 int xmon_xive_get_irq_config(u32 hw_irq, struct irq_data *d)
265 {
266 	struct irq_chip *chip = irq_data_get_irq_chip(d);
267 	int rc;
268 	u32 target;
269 	u8 prio;
270 	u32 lirq;
271 
272 	if (!is_xive_irq(chip))
273 		return -EINVAL;
274 
275 	rc = xive_ops->get_irq_config(hw_irq, &target, &prio, &lirq);
276 	if (rc) {
277 		xmon_printf("IRQ 0x%08x : no config rc=%d\n", hw_irq, rc);
278 		return rc;
279 	}
280 
281 	xmon_printf("IRQ 0x%08x : target=0x%x prio=%02x lirq=0x%x ",
282 		    hw_irq, target, prio, lirq);
283 
284 	if (d) {
285 		struct xive_irq_data *xd = irq_data_get_irq_handler_data(d);
286 		u64 val = xive_esb_read(xd, XIVE_ESB_GET);
287 
288 		xmon_printf("flags=%c%c%c PQ=%c%c",
289 			    xd->flags & XIVE_IRQ_FLAG_STORE_EOI ? 'S' : ' ',
290 			    xd->flags & XIVE_IRQ_FLAG_LSI ? 'L' : ' ',
291 			    xd->flags & XIVE_IRQ_FLAG_H_INT_ESB ? 'H' : ' ',
292 			    val & XIVE_ESB_VAL_P ? 'P' : '-',
293 			    val & XIVE_ESB_VAL_Q ? 'Q' : '-');
294 	}
295 
296 	xmon_printf("\n");
297 	return 0;
298 }
299 
300 #endif /* CONFIG_XMON */
301 
302 static unsigned int xive_get_irq(void)
303 {
304 	struct xive_cpu *xc = __this_cpu_read(xive_cpu);
305 	u32 irq;
306 
307 	/*
308 	 * This can be called either as a result of a HW interrupt or
309 	 * as a "replay" because EOI decided there was still something
310 	 * in one of the queues.
311 	 *
312 	 * First we perform an ACK cycle in order to update our mask
313 	 * of pending priorities. This will also have the effect of
314 	 * updating the CPPR to the most favored pending interrupts.
315 	 *
316 	 * In the future, if we have a way to differentiate a first
317 	 * entry (on HW interrupt) from a replay triggered by EOI,
318 	 * we could skip this on replays unless we soft-mask tells us
319 	 * that a new HW interrupt occurred.
320 	 */
321 	xive_ops->update_pending(xc);
322 
323 	DBG_VERBOSE("get_irq: pending=%02x\n", xc->pending_prio);
324 
325 	/* Scan our queue(s) for interrupts */
326 	irq = xive_scan_interrupts(xc, false);
327 
328 	DBG_VERBOSE("get_irq: got irq 0x%x, new pending=0x%02x\n",
329 	    irq, xc->pending_prio);
330 
331 	/* Return pending interrupt if any */
332 	if (irq == XIVE_BAD_IRQ)
333 		return 0;
334 	return irq;
335 }
336 
337 /*
338  * After EOI'ing an interrupt, we need to re-check the queue
339  * to see if another interrupt is pending since multiple
340  * interrupts can coalesce into a single notification to the
341  * CPU.
342  *
343  * If we find that there is indeed more in there, we call
344  * force_external_irq_replay() to make Linux synthetize an
345  * external interrupt on the next call to local_irq_restore().
346  */
347 static void xive_do_queue_eoi(struct xive_cpu *xc)
348 {
349 	if (xive_scan_interrupts(xc, true) != 0) {
350 		DBG_VERBOSE("eoi: pending=0x%02x\n", xc->pending_prio);
351 		force_external_irq_replay();
352 	}
353 }
354 
355 /*
356  * EOI an interrupt at the source. There are several methods
357  * to do this depending on the HW version and source type
358  */
359 static void xive_do_source_eoi(u32 hw_irq, struct xive_irq_data *xd)
360 {
361 	xd->stale_p = false;
362 	/* If the XIVE supports the new "store EOI facility, use it */
363 	if (xd->flags & XIVE_IRQ_FLAG_STORE_EOI)
364 		xive_esb_write(xd, XIVE_ESB_STORE_EOI, 0);
365 	else if (hw_irq && xd->flags & XIVE_IRQ_FLAG_EOI_FW) {
366 		/*
367 		 * The FW told us to call it. This happens for some
368 		 * interrupt sources that need additional HW whacking
369 		 * beyond the ESB manipulation. For example LPC interrupts
370 		 * on P9 DD1.0 needed a latch to be clared in the LPC bridge
371 		 * itself. The Firmware will take care of it.
372 		 */
373 		if (WARN_ON_ONCE(!xive_ops->eoi))
374 			return;
375 		xive_ops->eoi(hw_irq);
376 	} else {
377 		u8 eoi_val;
378 
379 		/*
380 		 * Otherwise for EOI, we use the special MMIO that does
381 		 * a clear of both P and Q and returns the old Q,
382 		 * except for LSIs where we use the "EOI cycle" special
383 		 * load.
384 		 *
385 		 * This allows us to then do a re-trigger if Q was set
386 		 * rather than synthesizing an interrupt in software
387 		 *
388 		 * For LSIs the HW EOI cycle is used rather than PQ bits,
389 		 * as they are automatically re-triggred in HW when still
390 		 * pending.
391 		 */
392 		if (xd->flags & XIVE_IRQ_FLAG_LSI)
393 			xive_esb_read(xd, XIVE_ESB_LOAD_EOI);
394 		else {
395 			eoi_val = xive_esb_read(xd, XIVE_ESB_SET_PQ_00);
396 			DBG_VERBOSE("eoi_val=%x\n", eoi_val);
397 
398 			/* Re-trigger if needed */
399 			if ((eoi_val & XIVE_ESB_VAL_Q) && xd->trig_mmio)
400 				out_be64(xd->trig_mmio, 0);
401 		}
402 	}
403 }
404 
405 /* irq_chip eoi callback, called with irq descriptor lock held */
406 static void xive_irq_eoi(struct irq_data *d)
407 {
408 	struct xive_irq_data *xd = irq_data_get_irq_handler_data(d);
409 	struct xive_cpu *xc = __this_cpu_read(xive_cpu);
410 
411 	DBG_VERBOSE("eoi_irq: irq=%d [0x%lx] pending=%02x\n",
412 		    d->irq, irqd_to_hwirq(d), xc->pending_prio);
413 
414 	/*
415 	 * EOI the source if it hasn't been disabled and hasn't
416 	 * been passed-through to a KVM guest
417 	 */
418 	if (!irqd_irq_disabled(d) && !irqd_is_forwarded_to_vcpu(d) &&
419 	    !(xd->flags & XIVE_IRQ_NO_EOI))
420 		xive_do_source_eoi(irqd_to_hwirq(d), xd);
421 	else
422 		xd->stale_p = true;
423 
424 	/*
425 	 * Clear saved_p to indicate that it's no longer occupying
426 	 * a queue slot on the target queue
427 	 */
428 	xd->saved_p = false;
429 
430 	/* Check for more work in the queue */
431 	xive_do_queue_eoi(xc);
432 }
433 
434 /*
435  * Helper used to mask and unmask an interrupt source. This
436  * is only called for normal interrupts that do not require
437  * masking/unmasking via firmware.
438  */
439 static void xive_do_source_set_mask(struct xive_irq_data *xd,
440 				    bool mask)
441 {
442 	u64 val;
443 
444 	/*
445 	 * If the interrupt had P set, it may be in a queue.
446 	 *
447 	 * We need to make sure we don't re-enable it until it
448 	 * has been fetched from that queue and EOId. We keep
449 	 * a copy of that P state and use it to restore the
450 	 * ESB accordingly on unmask.
451 	 */
452 	if (mask) {
453 		val = xive_esb_read(xd, XIVE_ESB_SET_PQ_01);
454 		if (!xd->stale_p && !!(val & XIVE_ESB_VAL_P))
455 			xd->saved_p = true;
456 		xd->stale_p = false;
457 	} else if (xd->saved_p) {
458 		xive_esb_read(xd, XIVE_ESB_SET_PQ_10);
459 		xd->saved_p = false;
460 	} else {
461 		xive_esb_read(xd, XIVE_ESB_SET_PQ_00);
462 		xd->stale_p = false;
463 	}
464 }
465 
466 /*
467  * Try to chose "cpu" as a new interrupt target. Increments
468  * the queue accounting for that target if it's not already
469  * full.
470  */
471 static bool xive_try_pick_target(int cpu)
472 {
473 	struct xive_cpu *xc = per_cpu(xive_cpu, cpu);
474 	struct xive_q *q = &xc->queue[xive_irq_priority];
475 	int max;
476 
477 	/*
478 	 * Calculate max number of interrupts in that queue.
479 	 *
480 	 * We leave a gap of 1 just in case...
481 	 */
482 	max = (q->msk + 1) - 1;
483 	return !!atomic_add_unless(&q->count, 1, max);
484 }
485 
486 /*
487  * Un-account an interrupt for a target CPU. We don't directly
488  * decrement q->count since the interrupt might still be present
489  * in the queue.
490  *
491  * Instead increment a separate counter "pending_count" which
492  * will be substracted from "count" later when that CPU observes
493  * the queue to be empty.
494  */
495 static void xive_dec_target_count(int cpu)
496 {
497 	struct xive_cpu *xc = per_cpu(xive_cpu, cpu);
498 	struct xive_q *q = &xc->queue[xive_irq_priority];
499 
500 	if (WARN_ON(cpu < 0 || !xc)) {
501 		pr_err("%s: cpu=%d xc=%p\n", __func__, cpu, xc);
502 		return;
503 	}
504 
505 	/*
506 	 * We increment the "pending count" which will be used
507 	 * to decrement the target queue count whenever it's next
508 	 * processed and found empty. This ensure that we don't
509 	 * decrement while we still have the interrupt there
510 	 * occupying a slot.
511 	 */
512 	atomic_inc(&q->pending_count);
513 }
514 
515 /* Find a tentative CPU target in a CPU mask */
516 static int xive_find_target_in_mask(const struct cpumask *mask,
517 				    unsigned int fuzz)
518 {
519 	int cpu, first, num, i;
520 
521 	/* Pick up a starting point CPU in the mask based on  fuzz */
522 	num = min_t(int, cpumask_weight(mask), nr_cpu_ids);
523 	first = fuzz % num;
524 
525 	/* Locate it */
526 	cpu = cpumask_first(mask);
527 	for (i = 0; i < first && cpu < nr_cpu_ids; i++)
528 		cpu = cpumask_next(cpu, mask);
529 
530 	/* Sanity check */
531 	if (WARN_ON(cpu >= nr_cpu_ids))
532 		cpu = cpumask_first(cpu_online_mask);
533 
534 	/* Remember first one to handle wrap-around */
535 	first = cpu;
536 
537 	/*
538 	 * Now go through the entire mask until we find a valid
539 	 * target.
540 	 */
541 	do {
542 		/*
543 		 * We re-check online as the fallback case passes us
544 		 * an untested affinity mask
545 		 */
546 		if (cpu_online(cpu) && xive_try_pick_target(cpu))
547 			return cpu;
548 		cpu = cpumask_next(cpu, mask);
549 		/* Wrap around */
550 		if (cpu >= nr_cpu_ids)
551 			cpu = cpumask_first(mask);
552 	} while (cpu != first);
553 
554 	return -1;
555 }
556 
557 /*
558  * Pick a target CPU for an interrupt. This is done at
559  * startup or if the affinity is changed in a way that
560  * invalidates the current target.
561  */
562 static int xive_pick_irq_target(struct irq_data *d,
563 				const struct cpumask *affinity)
564 {
565 	static unsigned int fuzz;
566 	struct xive_irq_data *xd = irq_data_get_irq_handler_data(d);
567 	cpumask_var_t mask;
568 	int cpu = -1;
569 
570 	/*
571 	 * If we have chip IDs, first we try to build a mask of
572 	 * CPUs matching the CPU and find a target in there
573 	 */
574 	if (xd->src_chip != XIVE_INVALID_CHIP_ID &&
575 		zalloc_cpumask_var(&mask, GFP_ATOMIC)) {
576 		/* Build a mask of matching chip IDs */
577 		for_each_cpu_and(cpu, affinity, cpu_online_mask) {
578 			struct xive_cpu *xc = per_cpu(xive_cpu, cpu);
579 			if (xc->chip_id == xd->src_chip)
580 				cpumask_set_cpu(cpu, mask);
581 		}
582 		/* Try to find a target */
583 		if (cpumask_empty(mask))
584 			cpu = -1;
585 		else
586 			cpu = xive_find_target_in_mask(mask, fuzz++);
587 		free_cpumask_var(mask);
588 		if (cpu >= 0)
589 			return cpu;
590 		fuzz--;
591 	}
592 
593 	/* No chip IDs, fallback to using the affinity mask */
594 	return xive_find_target_in_mask(affinity, fuzz++);
595 }
596 
597 static unsigned int xive_irq_startup(struct irq_data *d)
598 {
599 	struct xive_irq_data *xd = irq_data_get_irq_handler_data(d);
600 	unsigned int hw_irq = (unsigned int)irqd_to_hwirq(d);
601 	int target, rc;
602 
603 	xd->saved_p = false;
604 	xd->stale_p = false;
605 	pr_devel("xive_irq_startup: irq %d [0x%x] data @%p\n",
606 		 d->irq, hw_irq, d);
607 
608 #ifdef CONFIG_PCI_MSI
609 	/*
610 	 * The generic MSI code returns with the interrupt disabled on the
611 	 * card, using the MSI mask bits. Firmware doesn't appear to unmask
612 	 * at that level, so we do it here by hand.
613 	 */
614 	if (irq_data_get_msi_desc(d))
615 		pci_msi_unmask_irq(d);
616 #endif
617 
618 	/* Pick a target */
619 	target = xive_pick_irq_target(d, irq_data_get_affinity_mask(d));
620 	if (target == XIVE_INVALID_TARGET) {
621 		/* Try again breaking affinity */
622 		target = xive_pick_irq_target(d, cpu_online_mask);
623 		if (target == XIVE_INVALID_TARGET)
624 			return -ENXIO;
625 		pr_warn("irq %d started with broken affinity\n", d->irq);
626 	}
627 
628 	/* Sanity check */
629 	if (WARN_ON(target == XIVE_INVALID_TARGET ||
630 		    target >= nr_cpu_ids))
631 		target = smp_processor_id();
632 
633 	xd->target = target;
634 
635 	/*
636 	 * Configure the logical number to be the Linux IRQ number
637 	 * and set the target queue
638 	 */
639 	rc = xive_ops->configure_irq(hw_irq,
640 				     get_hard_smp_processor_id(target),
641 				     xive_irq_priority, d->irq);
642 	if (rc)
643 		return rc;
644 
645 	/* Unmask the ESB */
646 	xive_do_source_set_mask(xd, false);
647 
648 	return 0;
649 }
650 
651 /* called with irq descriptor lock held */
652 static void xive_irq_shutdown(struct irq_data *d)
653 {
654 	struct xive_irq_data *xd = irq_data_get_irq_handler_data(d);
655 	unsigned int hw_irq = (unsigned int)irqd_to_hwirq(d);
656 
657 	pr_devel("xive_irq_shutdown: irq %d [0x%x] data @%p\n",
658 		 d->irq, hw_irq, d);
659 
660 	if (WARN_ON(xd->target == XIVE_INVALID_TARGET))
661 		return;
662 
663 	/* Mask the interrupt at the source */
664 	xive_do_source_set_mask(xd, true);
665 
666 	/*
667 	 * Mask the interrupt in HW in the IVT/EAS and set the number
668 	 * to be the "bad" IRQ number
669 	 */
670 	xive_ops->configure_irq(hw_irq,
671 				get_hard_smp_processor_id(xd->target),
672 				0xff, XIVE_BAD_IRQ);
673 
674 	xive_dec_target_count(xd->target);
675 	xd->target = XIVE_INVALID_TARGET;
676 }
677 
678 static void xive_irq_unmask(struct irq_data *d)
679 {
680 	struct xive_irq_data *xd = irq_data_get_irq_handler_data(d);
681 
682 	pr_devel("xive_irq_unmask: irq %d data @%p\n", d->irq, xd);
683 
684 	/*
685 	 * This is a workaround for PCI LSI problems on P9, for
686 	 * these, we call FW to set the mask. The problems might
687 	 * be fixed by P9 DD2.0, if that is the case, firmware
688 	 * will no longer set that flag.
689 	 */
690 	if (xd->flags & XIVE_IRQ_FLAG_MASK_FW) {
691 		unsigned int hw_irq = (unsigned int)irqd_to_hwirq(d);
692 		xive_ops->configure_irq(hw_irq,
693 					get_hard_smp_processor_id(xd->target),
694 					xive_irq_priority, d->irq);
695 		return;
696 	}
697 
698 	xive_do_source_set_mask(xd, false);
699 }
700 
701 static void xive_irq_mask(struct irq_data *d)
702 {
703 	struct xive_irq_data *xd = irq_data_get_irq_handler_data(d);
704 
705 	pr_devel("xive_irq_mask: irq %d data @%p\n", d->irq, xd);
706 
707 	/*
708 	 * This is a workaround for PCI LSI problems on P9, for
709 	 * these, we call OPAL to set the mask. The problems might
710 	 * be fixed by P9 DD2.0, if that is the case, firmware
711 	 * will no longer set that flag.
712 	 */
713 	if (xd->flags & XIVE_IRQ_FLAG_MASK_FW) {
714 		unsigned int hw_irq = (unsigned int)irqd_to_hwirq(d);
715 		xive_ops->configure_irq(hw_irq,
716 					get_hard_smp_processor_id(xd->target),
717 					0xff, d->irq);
718 		return;
719 	}
720 
721 	xive_do_source_set_mask(xd, true);
722 }
723 
724 static int xive_irq_set_affinity(struct irq_data *d,
725 				 const struct cpumask *cpumask,
726 				 bool force)
727 {
728 	struct xive_irq_data *xd = irq_data_get_irq_handler_data(d);
729 	unsigned int hw_irq = (unsigned int)irqd_to_hwirq(d);
730 	u32 target, old_target;
731 	int rc = 0;
732 
733 	pr_devel("xive_irq_set_affinity: irq %d\n", d->irq);
734 
735 	/* Is this valid ? */
736 	if (cpumask_any_and(cpumask, cpu_online_mask) >= nr_cpu_ids)
737 		return -EINVAL;
738 
739 	/* Don't do anything if the interrupt isn't started */
740 	if (!irqd_is_started(d))
741 		return IRQ_SET_MASK_OK;
742 
743 	/*
744 	 * If existing target is already in the new mask, and is
745 	 * online then do nothing.
746 	 */
747 	if (xd->target != XIVE_INVALID_TARGET &&
748 	    cpu_online(xd->target) &&
749 	    cpumask_test_cpu(xd->target, cpumask))
750 		return IRQ_SET_MASK_OK;
751 
752 	/* Pick a new target */
753 	target = xive_pick_irq_target(d, cpumask);
754 
755 	/* No target found */
756 	if (target == XIVE_INVALID_TARGET)
757 		return -ENXIO;
758 
759 	/* Sanity check */
760 	if (WARN_ON(target >= nr_cpu_ids))
761 		target = smp_processor_id();
762 
763 	old_target = xd->target;
764 
765 	/*
766 	 * Only configure the irq if it's not currently passed-through to
767 	 * a KVM guest
768 	 */
769 	if (!irqd_is_forwarded_to_vcpu(d))
770 		rc = xive_ops->configure_irq(hw_irq,
771 					     get_hard_smp_processor_id(target),
772 					     xive_irq_priority, d->irq);
773 	if (rc < 0) {
774 		pr_err("Error %d reconfiguring irq %d\n", rc, d->irq);
775 		return rc;
776 	}
777 
778 	pr_devel("  target: 0x%x\n", target);
779 	xd->target = target;
780 
781 	/* Give up previous target */
782 	if (old_target != XIVE_INVALID_TARGET)
783 	    xive_dec_target_count(old_target);
784 
785 	return IRQ_SET_MASK_OK;
786 }
787 
788 static int xive_irq_set_type(struct irq_data *d, unsigned int flow_type)
789 {
790 	struct xive_irq_data *xd = irq_data_get_irq_handler_data(d);
791 
792 	/*
793 	 * We only support these. This has really no effect other than setting
794 	 * the corresponding descriptor bits mind you but those will in turn
795 	 * affect the resend function when re-enabling an edge interrupt.
796 	 *
797 	 * Set set the default to edge as explained in map().
798 	 */
799 	if (flow_type == IRQ_TYPE_DEFAULT || flow_type == IRQ_TYPE_NONE)
800 		flow_type = IRQ_TYPE_EDGE_RISING;
801 
802 	if (flow_type != IRQ_TYPE_EDGE_RISING &&
803 	    flow_type != IRQ_TYPE_LEVEL_LOW)
804 		return -EINVAL;
805 
806 	irqd_set_trigger_type(d, flow_type);
807 
808 	/*
809 	 * Double check it matches what the FW thinks
810 	 *
811 	 * NOTE: We don't know yet if the PAPR interface will provide
812 	 * the LSI vs MSI information apart from the device-tree so
813 	 * this check might have to move into an optional backend call
814 	 * that is specific to the native backend
815 	 */
816 	if ((flow_type == IRQ_TYPE_LEVEL_LOW) !=
817 	    !!(xd->flags & XIVE_IRQ_FLAG_LSI)) {
818 		pr_warn("Interrupt %d (HW 0x%x) type mismatch, Linux says %s, FW says %s\n",
819 			d->irq, (u32)irqd_to_hwirq(d),
820 			(flow_type == IRQ_TYPE_LEVEL_LOW) ? "Level" : "Edge",
821 			(xd->flags & XIVE_IRQ_FLAG_LSI) ? "Level" : "Edge");
822 	}
823 
824 	return IRQ_SET_MASK_OK_NOCOPY;
825 }
826 
827 static int xive_irq_retrigger(struct irq_data *d)
828 {
829 	struct xive_irq_data *xd = irq_data_get_irq_handler_data(d);
830 
831 	/* This should be only for MSIs */
832 	if (WARN_ON(xd->flags & XIVE_IRQ_FLAG_LSI))
833 		return 0;
834 
835 	/*
836 	 * To perform a retrigger, we first set the PQ bits to
837 	 * 11, then perform an EOI.
838 	 */
839 	xive_esb_read(xd, XIVE_ESB_SET_PQ_11);
840 
841 	/*
842 	 * Note: We pass "0" to the hw_irq argument in order to
843 	 * avoid calling into the backend EOI code which we don't
844 	 * want to do in the case of a re-trigger. Backends typically
845 	 * only do EOI for LSIs anyway.
846 	 */
847 	xive_do_source_eoi(0, xd);
848 
849 	return 1;
850 }
851 
852 /*
853  * Caller holds the irq descriptor lock, so this won't be called
854  * concurrently with xive_get_irqchip_state on the same interrupt.
855  */
856 static int xive_irq_set_vcpu_affinity(struct irq_data *d, void *state)
857 {
858 	struct xive_irq_data *xd = irq_data_get_irq_handler_data(d);
859 	unsigned int hw_irq = (unsigned int)irqd_to_hwirq(d);
860 	int rc;
861 	u8 pq;
862 
863 	/*
864 	 * We only support this on interrupts that do not require
865 	 * firmware calls for masking and unmasking
866 	 */
867 	if (xd->flags & XIVE_IRQ_FLAG_MASK_FW)
868 		return -EIO;
869 
870 	/*
871 	 * This is called by KVM with state non-NULL for enabling
872 	 * pass-through or NULL for disabling it
873 	 */
874 	if (state) {
875 		irqd_set_forwarded_to_vcpu(d);
876 
877 		/* Set it to PQ=10 state to prevent further sends */
878 		pq = xive_esb_read(xd, XIVE_ESB_SET_PQ_10);
879 		if (!xd->stale_p) {
880 			xd->saved_p = !!(pq & XIVE_ESB_VAL_P);
881 			xd->stale_p = !xd->saved_p;
882 		}
883 
884 		/* No target ? nothing to do */
885 		if (xd->target == XIVE_INVALID_TARGET) {
886 			/*
887 			 * An untargetted interrupt should have been
888 			 * also masked at the source
889 			 */
890 			WARN_ON(xd->saved_p);
891 
892 			return 0;
893 		}
894 
895 		/*
896 		 * If P was set, adjust state to PQ=11 to indicate
897 		 * that a resend is needed for the interrupt to reach
898 		 * the guest. Also remember the value of P.
899 		 *
900 		 * This also tells us that it's in flight to a host queue
901 		 * or has already been fetched but hasn't been EOIed yet
902 		 * by the host. This it's potentially using up a host
903 		 * queue slot. This is important to know because as long
904 		 * as this is the case, we must not hard-unmask it when
905 		 * "returning" that interrupt to the host.
906 		 *
907 		 * This saved_p is cleared by the host EOI, when we know
908 		 * for sure the queue slot is no longer in use.
909 		 */
910 		if (xd->saved_p) {
911 			xive_esb_read(xd, XIVE_ESB_SET_PQ_11);
912 
913 			/*
914 			 * Sync the XIVE source HW to ensure the interrupt
915 			 * has gone through the EAS before we change its
916 			 * target to the guest. That should guarantee us
917 			 * that we *will* eventually get an EOI for it on
918 			 * the host. Otherwise there would be a small window
919 			 * for P to be seen here but the interrupt going
920 			 * to the guest queue.
921 			 */
922 			if (xive_ops->sync_source)
923 				xive_ops->sync_source(hw_irq);
924 		}
925 	} else {
926 		irqd_clr_forwarded_to_vcpu(d);
927 
928 		/* No host target ? hard mask and return */
929 		if (xd->target == XIVE_INVALID_TARGET) {
930 			xive_do_source_set_mask(xd, true);
931 			return 0;
932 		}
933 
934 		/*
935 		 * Sync the XIVE source HW to ensure the interrupt
936 		 * has gone through the EAS before we change its
937 		 * target to the host.
938 		 */
939 		if (xive_ops->sync_source)
940 			xive_ops->sync_source(hw_irq);
941 
942 		/*
943 		 * By convention we are called with the interrupt in
944 		 * a PQ=10 or PQ=11 state, ie, it won't fire and will
945 		 * have latched in Q whether there's a pending HW
946 		 * interrupt or not.
947 		 *
948 		 * First reconfigure the target.
949 		 */
950 		rc = xive_ops->configure_irq(hw_irq,
951 					     get_hard_smp_processor_id(xd->target),
952 					     xive_irq_priority, d->irq);
953 		if (rc)
954 			return rc;
955 
956 		/*
957 		 * Then if saved_p is not set, effectively re-enable the
958 		 * interrupt with an EOI. If it is set, we know there is
959 		 * still a message in a host queue somewhere that will be
960 		 * EOId eventually.
961 		 *
962 		 * Note: We don't check irqd_irq_disabled(). Effectively,
963 		 * we *will* let the irq get through even if masked if the
964 		 * HW is still firing it in order to deal with the whole
965 		 * saved_p business properly. If the interrupt triggers
966 		 * while masked, the generic code will re-mask it anyway.
967 		 */
968 		if (!xd->saved_p)
969 			xive_do_source_eoi(hw_irq, xd);
970 
971 	}
972 	return 0;
973 }
974 
975 /* Called with irq descriptor lock held. */
976 static int xive_get_irqchip_state(struct irq_data *data,
977 				  enum irqchip_irq_state which, bool *state)
978 {
979 	struct xive_irq_data *xd = irq_data_get_irq_handler_data(data);
980 	u8 pq;
981 
982 	switch (which) {
983 	case IRQCHIP_STATE_ACTIVE:
984 		pq = xive_esb_read(xd, XIVE_ESB_GET);
985 
986 		/*
987 		 * The esb value being all 1's means we couldn't get
988 		 * the PQ state of the interrupt through mmio. It may
989 		 * happen, for example when querying a PHB interrupt
990 		 * while the PHB is in an error state. We consider the
991 		 * interrupt to be inactive in that case.
992 		 */
993 		*state = (pq != XIVE_ESB_INVALID) && !xd->stale_p &&
994 			(xd->saved_p || !!(pq & XIVE_ESB_VAL_P));
995 		return 0;
996 	default:
997 		return -EINVAL;
998 	}
999 }
1000 
1001 static struct irq_chip xive_irq_chip = {
1002 	.name = "XIVE-IRQ",
1003 	.irq_startup = xive_irq_startup,
1004 	.irq_shutdown = xive_irq_shutdown,
1005 	.irq_eoi = xive_irq_eoi,
1006 	.irq_mask = xive_irq_mask,
1007 	.irq_unmask = xive_irq_unmask,
1008 	.irq_set_affinity = xive_irq_set_affinity,
1009 	.irq_set_type = xive_irq_set_type,
1010 	.irq_retrigger = xive_irq_retrigger,
1011 	.irq_set_vcpu_affinity = xive_irq_set_vcpu_affinity,
1012 	.irq_get_irqchip_state = xive_get_irqchip_state,
1013 };
1014 
1015 bool is_xive_irq(struct irq_chip *chip)
1016 {
1017 	return chip == &xive_irq_chip;
1018 }
1019 EXPORT_SYMBOL_GPL(is_xive_irq);
1020 
1021 void xive_cleanup_irq_data(struct xive_irq_data *xd)
1022 {
1023 	if (xd->eoi_mmio) {
1024 		unmap_kernel_range((unsigned long)xd->eoi_mmio,
1025 				   1u << xd->esb_shift);
1026 		iounmap(xd->eoi_mmio);
1027 		if (xd->eoi_mmio == xd->trig_mmio)
1028 			xd->trig_mmio = NULL;
1029 		xd->eoi_mmio = NULL;
1030 	}
1031 	if (xd->trig_mmio) {
1032 		unmap_kernel_range((unsigned long)xd->trig_mmio,
1033 				   1u << xd->esb_shift);
1034 		iounmap(xd->trig_mmio);
1035 		xd->trig_mmio = NULL;
1036 	}
1037 }
1038 EXPORT_SYMBOL_GPL(xive_cleanup_irq_data);
1039 
1040 static int xive_irq_alloc_data(unsigned int virq, irq_hw_number_t hw)
1041 {
1042 	struct xive_irq_data *xd;
1043 	int rc;
1044 
1045 	xd = kzalloc(sizeof(struct xive_irq_data), GFP_KERNEL);
1046 	if (!xd)
1047 		return -ENOMEM;
1048 	rc = xive_ops->populate_irq_data(hw, xd);
1049 	if (rc) {
1050 		kfree(xd);
1051 		return rc;
1052 	}
1053 	xd->target = XIVE_INVALID_TARGET;
1054 	irq_set_handler_data(virq, xd);
1055 
1056 	/*
1057 	 * Turn OFF by default the interrupt being mapped. A side
1058 	 * effect of this check is the mapping the ESB page of the
1059 	 * interrupt in the Linux address space. This prevents page
1060 	 * fault issues in the crash handler which masks all
1061 	 * interrupts.
1062 	 */
1063 	xive_esb_read(xd, XIVE_ESB_SET_PQ_01);
1064 
1065 	return 0;
1066 }
1067 
1068 static void xive_irq_free_data(unsigned int virq)
1069 {
1070 	struct xive_irq_data *xd = irq_get_handler_data(virq);
1071 
1072 	if (!xd)
1073 		return;
1074 	irq_set_handler_data(virq, NULL);
1075 	xive_cleanup_irq_data(xd);
1076 	kfree(xd);
1077 }
1078 
1079 #ifdef CONFIG_SMP
1080 
1081 static void xive_cause_ipi(int cpu)
1082 {
1083 	struct xive_cpu *xc;
1084 	struct xive_irq_data *xd;
1085 
1086 	xc = per_cpu(xive_cpu, cpu);
1087 
1088 	DBG_VERBOSE("IPI CPU %d -> %d (HW IRQ 0x%x)\n",
1089 		    smp_processor_id(), cpu, xc->hw_ipi);
1090 
1091 	xd = &xc->ipi_data;
1092 	if (WARN_ON(!xd->trig_mmio))
1093 		return;
1094 	out_be64(xd->trig_mmio, 0);
1095 }
1096 
1097 static irqreturn_t xive_muxed_ipi_action(int irq, void *dev_id)
1098 {
1099 	return smp_ipi_demux();
1100 }
1101 
1102 static void xive_ipi_eoi(struct irq_data *d)
1103 {
1104 	struct xive_cpu *xc = __this_cpu_read(xive_cpu);
1105 
1106 	/* Handle possible race with unplug and drop stale IPIs */
1107 	if (!xc)
1108 		return;
1109 
1110 	DBG_VERBOSE("IPI eoi: irq=%d [0x%lx] (HW IRQ 0x%x) pending=%02x\n",
1111 		    d->irq, irqd_to_hwirq(d), xc->hw_ipi, xc->pending_prio);
1112 
1113 	xive_do_source_eoi(xc->hw_ipi, &xc->ipi_data);
1114 	xive_do_queue_eoi(xc);
1115 }
1116 
1117 static void xive_ipi_do_nothing(struct irq_data *d)
1118 {
1119 	/*
1120 	 * Nothing to do, we never mask/unmask IPIs, but the callback
1121 	 * has to exist for the struct irq_chip.
1122 	 */
1123 }
1124 
1125 static struct irq_chip xive_ipi_chip = {
1126 	.name = "XIVE-IPI",
1127 	.irq_eoi = xive_ipi_eoi,
1128 	.irq_mask = xive_ipi_do_nothing,
1129 	.irq_unmask = xive_ipi_do_nothing,
1130 };
1131 
1132 static void __init xive_request_ipi(void)
1133 {
1134 	unsigned int virq;
1135 
1136 	/*
1137 	 * Initialization failed, move on, we might manage to
1138 	 * reach the point where we display our errors before
1139 	 * the system falls appart
1140 	 */
1141 	if (!xive_irq_domain)
1142 		return;
1143 
1144 	/* Initialize it */
1145 	virq = irq_create_mapping(xive_irq_domain, 0);
1146 	xive_ipi_irq = virq;
1147 
1148 	WARN_ON(request_irq(virq, xive_muxed_ipi_action,
1149 			    IRQF_PERCPU | IRQF_NO_THREAD, "IPI", NULL));
1150 }
1151 
1152 static int xive_setup_cpu_ipi(unsigned int cpu)
1153 {
1154 	struct xive_cpu *xc;
1155 	int rc;
1156 
1157 	pr_debug("Setting up IPI for CPU %d\n", cpu);
1158 
1159 	xc = per_cpu(xive_cpu, cpu);
1160 
1161 	/* Check if we are already setup */
1162 	if (xc->hw_ipi != XIVE_BAD_IRQ)
1163 		return 0;
1164 
1165 	/* Grab an IPI from the backend, this will populate xc->hw_ipi */
1166 	if (xive_ops->get_ipi(cpu, xc))
1167 		return -EIO;
1168 
1169 	/*
1170 	 * Populate the IRQ data in the xive_cpu structure and
1171 	 * configure the HW / enable the IPIs.
1172 	 */
1173 	rc = xive_ops->populate_irq_data(xc->hw_ipi, &xc->ipi_data);
1174 	if (rc) {
1175 		pr_err("Failed to populate IPI data on CPU %d\n", cpu);
1176 		return -EIO;
1177 	}
1178 	rc = xive_ops->configure_irq(xc->hw_ipi,
1179 				     get_hard_smp_processor_id(cpu),
1180 				     xive_irq_priority, xive_ipi_irq);
1181 	if (rc) {
1182 		pr_err("Failed to map IPI CPU %d\n", cpu);
1183 		return -EIO;
1184 	}
1185 	pr_devel("CPU %d HW IPI %x, virq %d, trig_mmio=%p\n", cpu,
1186 	    xc->hw_ipi, xive_ipi_irq, xc->ipi_data.trig_mmio);
1187 
1188 	/* Unmask it */
1189 	xive_do_source_set_mask(&xc->ipi_data, false);
1190 
1191 	return 0;
1192 }
1193 
1194 static void xive_cleanup_cpu_ipi(unsigned int cpu, struct xive_cpu *xc)
1195 {
1196 	/* Disable the IPI and free the IRQ data */
1197 
1198 	/* Already cleaned up ? */
1199 	if (xc->hw_ipi == XIVE_BAD_IRQ)
1200 		return;
1201 
1202 	/* Mask the IPI */
1203 	xive_do_source_set_mask(&xc->ipi_data, true);
1204 
1205 	/*
1206 	 * Note: We don't call xive_cleanup_irq_data() to free
1207 	 * the mappings as this is called from an IPI on kexec
1208 	 * which is not a safe environment to call iounmap()
1209 	 */
1210 
1211 	/* Deconfigure/mask in the backend */
1212 	xive_ops->configure_irq(xc->hw_ipi, hard_smp_processor_id(),
1213 				0xff, xive_ipi_irq);
1214 
1215 	/* Free the IPIs in the backend */
1216 	xive_ops->put_ipi(cpu, xc);
1217 }
1218 
1219 void __init xive_smp_probe(void)
1220 {
1221 	smp_ops->cause_ipi = xive_cause_ipi;
1222 
1223 	/* Register the IPI */
1224 	xive_request_ipi();
1225 
1226 	/* Allocate and setup IPI for the boot CPU */
1227 	xive_setup_cpu_ipi(smp_processor_id());
1228 }
1229 
1230 #endif /* CONFIG_SMP */
1231 
1232 static int xive_irq_domain_map(struct irq_domain *h, unsigned int virq,
1233 			       irq_hw_number_t hw)
1234 {
1235 	int rc;
1236 
1237 	/*
1238 	 * Mark interrupts as edge sensitive by default so that resend
1239 	 * actually works. Will fix that up below if needed.
1240 	 */
1241 	irq_clear_status_flags(virq, IRQ_LEVEL);
1242 
1243 #ifdef CONFIG_SMP
1244 	/* IPIs are special and come up with HW number 0 */
1245 	if (hw == 0) {
1246 		/*
1247 		 * IPIs are marked per-cpu. We use separate HW interrupts under
1248 		 * the hood but associated with the same "linux" interrupt
1249 		 */
1250 		irq_set_chip_and_handler(virq, &xive_ipi_chip,
1251 					 handle_percpu_irq);
1252 		return 0;
1253 	}
1254 #endif
1255 
1256 	rc = xive_irq_alloc_data(virq, hw);
1257 	if (rc)
1258 		return rc;
1259 
1260 	irq_set_chip_and_handler(virq, &xive_irq_chip, handle_fasteoi_irq);
1261 
1262 	return 0;
1263 }
1264 
1265 static void xive_irq_domain_unmap(struct irq_domain *d, unsigned int virq)
1266 {
1267 	struct irq_data *data = irq_get_irq_data(virq);
1268 	unsigned int hw_irq;
1269 
1270 	/* XXX Assign BAD number */
1271 	if (!data)
1272 		return;
1273 	hw_irq = (unsigned int)irqd_to_hwirq(data);
1274 	if (hw_irq)
1275 		xive_irq_free_data(virq);
1276 }
1277 
1278 static int xive_irq_domain_xlate(struct irq_domain *h, struct device_node *ct,
1279 				 const u32 *intspec, unsigned int intsize,
1280 				 irq_hw_number_t *out_hwirq, unsigned int *out_flags)
1281 
1282 {
1283 	*out_hwirq = intspec[0];
1284 
1285 	/*
1286 	 * If intsize is at least 2, we look for the type in the second cell,
1287 	 * we assume the LSB indicates a level interrupt.
1288 	 */
1289 	if (intsize > 1) {
1290 		if (intspec[1] & 1)
1291 			*out_flags = IRQ_TYPE_LEVEL_LOW;
1292 		else
1293 			*out_flags = IRQ_TYPE_EDGE_RISING;
1294 	} else
1295 		*out_flags = IRQ_TYPE_LEVEL_LOW;
1296 
1297 	return 0;
1298 }
1299 
1300 static int xive_irq_domain_match(struct irq_domain *h, struct device_node *node,
1301 				 enum irq_domain_bus_token bus_token)
1302 {
1303 	return xive_ops->match(node);
1304 }
1305 
1306 static const struct irq_domain_ops xive_irq_domain_ops = {
1307 	.match = xive_irq_domain_match,
1308 	.map = xive_irq_domain_map,
1309 	.unmap = xive_irq_domain_unmap,
1310 	.xlate = xive_irq_domain_xlate,
1311 };
1312 
1313 static void __init xive_init_host(void)
1314 {
1315 	xive_irq_domain = irq_domain_add_nomap(NULL, XIVE_MAX_IRQ,
1316 					       &xive_irq_domain_ops, NULL);
1317 	if (WARN_ON(xive_irq_domain == NULL))
1318 		return;
1319 	irq_set_default_host(xive_irq_domain);
1320 }
1321 
1322 static void xive_cleanup_cpu_queues(unsigned int cpu, struct xive_cpu *xc)
1323 {
1324 	if (xc->queue[xive_irq_priority].qpage)
1325 		xive_ops->cleanup_queue(cpu, xc, xive_irq_priority);
1326 }
1327 
1328 static int xive_setup_cpu_queues(unsigned int cpu, struct xive_cpu *xc)
1329 {
1330 	int rc = 0;
1331 
1332 	/* We setup 1 queues for now with a 64k page */
1333 	if (!xc->queue[xive_irq_priority].qpage)
1334 		rc = xive_ops->setup_queue(cpu, xc, xive_irq_priority);
1335 
1336 	return rc;
1337 }
1338 
1339 static int xive_prepare_cpu(unsigned int cpu)
1340 {
1341 	struct xive_cpu *xc;
1342 
1343 	xc = per_cpu(xive_cpu, cpu);
1344 	if (!xc) {
1345 		struct device_node *np;
1346 
1347 		xc = kzalloc_node(sizeof(struct xive_cpu),
1348 				  GFP_KERNEL, cpu_to_node(cpu));
1349 		if (!xc)
1350 			return -ENOMEM;
1351 		np = of_get_cpu_node(cpu, NULL);
1352 		if (np)
1353 			xc->chip_id = of_get_ibm_chip_id(np);
1354 		of_node_put(np);
1355 		xc->hw_ipi = XIVE_BAD_IRQ;
1356 
1357 		per_cpu(xive_cpu, cpu) = xc;
1358 	}
1359 
1360 	/* Setup EQs if not already */
1361 	return xive_setup_cpu_queues(cpu, xc);
1362 }
1363 
1364 static void xive_setup_cpu(void)
1365 {
1366 	struct xive_cpu *xc = __this_cpu_read(xive_cpu);
1367 
1368 	/* The backend might have additional things to do */
1369 	if (xive_ops->setup_cpu)
1370 		xive_ops->setup_cpu(smp_processor_id(), xc);
1371 
1372 	/* Set CPPR to 0xff to enable flow of interrupts */
1373 	xc->cppr = 0xff;
1374 	out_8(xive_tima + xive_tima_offset + TM_CPPR, 0xff);
1375 }
1376 
1377 #ifdef CONFIG_SMP
1378 void xive_smp_setup_cpu(void)
1379 {
1380 	pr_devel("SMP setup CPU %d\n", smp_processor_id());
1381 
1382 	/* This will have already been done on the boot CPU */
1383 	if (smp_processor_id() != boot_cpuid)
1384 		xive_setup_cpu();
1385 
1386 }
1387 
1388 int xive_smp_prepare_cpu(unsigned int cpu)
1389 {
1390 	int rc;
1391 
1392 	/* Allocate per-CPU data and queues */
1393 	rc = xive_prepare_cpu(cpu);
1394 	if (rc)
1395 		return rc;
1396 
1397 	/* Allocate and setup IPI for the new CPU */
1398 	return xive_setup_cpu_ipi(cpu);
1399 }
1400 
1401 #ifdef CONFIG_HOTPLUG_CPU
1402 static void xive_flush_cpu_queue(unsigned int cpu, struct xive_cpu *xc)
1403 {
1404 	u32 irq;
1405 
1406 	/* We assume local irqs are disabled */
1407 	WARN_ON(!irqs_disabled());
1408 
1409 	/* Check what's already in the CPU queue */
1410 	while ((irq = xive_scan_interrupts(xc, false)) != 0) {
1411 		/*
1412 		 * We need to re-route that interrupt to its new destination.
1413 		 * First get and lock the descriptor
1414 		 */
1415 		struct irq_desc *desc = irq_to_desc(irq);
1416 		struct irq_data *d = irq_desc_get_irq_data(desc);
1417 		struct xive_irq_data *xd;
1418 		unsigned int hw_irq = (unsigned int)irqd_to_hwirq(d);
1419 
1420 		/*
1421 		 * Ignore anything that isn't a XIVE irq and ignore
1422 		 * IPIs, so can just be dropped.
1423 		 */
1424 		if (d->domain != xive_irq_domain || hw_irq == 0)
1425 			continue;
1426 
1427 		/*
1428 		 * The IRQ should have already been re-routed, it's just a
1429 		 * stale in the old queue, so re-trigger it in order to make
1430 		 * it reach is new destination.
1431 		 */
1432 #ifdef DEBUG_FLUSH
1433 		pr_info("CPU %d: Got irq %d while offline, re-sending...\n",
1434 			cpu, irq);
1435 #endif
1436 		raw_spin_lock(&desc->lock);
1437 		xd = irq_desc_get_handler_data(desc);
1438 
1439 		/*
1440 		 * Clear saved_p to indicate that it's no longer pending
1441 		 */
1442 		xd->saved_p = false;
1443 
1444 		/*
1445 		 * For LSIs, we EOI, this will cause a resend if it's
1446 		 * still asserted. Otherwise do an MSI retrigger.
1447 		 */
1448 		if (xd->flags & XIVE_IRQ_FLAG_LSI)
1449 			xive_do_source_eoi(irqd_to_hwirq(d), xd);
1450 		else
1451 			xive_irq_retrigger(d);
1452 
1453 		raw_spin_unlock(&desc->lock);
1454 	}
1455 }
1456 
1457 void xive_smp_disable_cpu(void)
1458 {
1459 	struct xive_cpu *xc = __this_cpu_read(xive_cpu);
1460 	unsigned int cpu = smp_processor_id();
1461 
1462 	/* Migrate interrupts away from the CPU */
1463 	irq_migrate_all_off_this_cpu();
1464 
1465 	/* Set CPPR to 0 to disable flow of interrupts */
1466 	xc->cppr = 0;
1467 	out_8(xive_tima + xive_tima_offset + TM_CPPR, 0);
1468 
1469 	/* Flush everything still in the queue */
1470 	xive_flush_cpu_queue(cpu, xc);
1471 
1472 	/* Re-enable CPPR  */
1473 	xc->cppr = 0xff;
1474 	out_8(xive_tima + xive_tima_offset + TM_CPPR, 0xff);
1475 }
1476 
1477 void xive_flush_interrupt(void)
1478 {
1479 	struct xive_cpu *xc = __this_cpu_read(xive_cpu);
1480 	unsigned int cpu = smp_processor_id();
1481 
1482 	/* Called if an interrupt occurs while the CPU is hot unplugged */
1483 	xive_flush_cpu_queue(cpu, xc);
1484 }
1485 
1486 #endif /* CONFIG_HOTPLUG_CPU */
1487 
1488 #endif /* CONFIG_SMP */
1489 
1490 void xive_teardown_cpu(void)
1491 {
1492 	struct xive_cpu *xc = __this_cpu_read(xive_cpu);
1493 	unsigned int cpu = smp_processor_id();
1494 
1495 	/* Set CPPR to 0 to disable flow of interrupts */
1496 	xc->cppr = 0;
1497 	out_8(xive_tima + xive_tima_offset + TM_CPPR, 0);
1498 
1499 	if (xive_ops->teardown_cpu)
1500 		xive_ops->teardown_cpu(cpu, xc);
1501 
1502 #ifdef CONFIG_SMP
1503 	/* Get rid of IPI */
1504 	xive_cleanup_cpu_ipi(cpu, xc);
1505 #endif
1506 
1507 	/* Disable and free the queues */
1508 	xive_cleanup_cpu_queues(cpu, xc);
1509 }
1510 
1511 void xive_shutdown(void)
1512 {
1513 	xive_ops->shutdown();
1514 }
1515 
1516 bool __init xive_core_init(const struct xive_ops *ops, void __iomem *area, u32 offset,
1517 			   u8 max_prio)
1518 {
1519 	xive_tima = area;
1520 	xive_tima_offset = offset;
1521 	xive_ops = ops;
1522 	xive_irq_priority = max_prio;
1523 
1524 	ppc_md.get_irq = xive_get_irq;
1525 	__xive_enabled = true;
1526 
1527 	pr_devel("Initializing host..\n");
1528 	xive_init_host();
1529 
1530 	pr_devel("Initializing boot CPU..\n");
1531 
1532 	/* Allocate per-CPU data and queues */
1533 	xive_prepare_cpu(smp_processor_id());
1534 
1535 	/* Get ready for interrupts */
1536 	xive_setup_cpu();
1537 
1538 	pr_info("Interrupt handling initialized with %s backend\n",
1539 		xive_ops->name);
1540 	pr_info("Using priority %d for all interrupts\n", max_prio);
1541 
1542 	return true;
1543 }
1544 
1545 __be32 *xive_queue_page_alloc(unsigned int cpu, u32 queue_shift)
1546 {
1547 	unsigned int alloc_order;
1548 	struct page *pages;
1549 	__be32 *qpage;
1550 
1551 	alloc_order = xive_alloc_order(queue_shift);
1552 	pages = alloc_pages_node(cpu_to_node(cpu), GFP_KERNEL, alloc_order);
1553 	if (!pages)
1554 		return ERR_PTR(-ENOMEM);
1555 	qpage = (__be32 *)page_address(pages);
1556 	memset(qpage, 0, 1 << queue_shift);
1557 
1558 	return qpage;
1559 }
1560 
1561 static int __init xive_off(char *arg)
1562 {
1563 	xive_cmdline_disabled = true;
1564 	return 0;
1565 }
1566 __setup("xive=off", xive_off);
1567 
1568 void xive_debug_show_cpu(struct seq_file *m, int cpu)
1569 {
1570 	struct xive_cpu *xc = per_cpu(xive_cpu, cpu);
1571 
1572 	seq_printf(m, "CPU %d:", cpu);
1573 	if (xc) {
1574 		seq_printf(m, "pp=%02x CPPR=%02x ", xc->pending_prio, xc->cppr);
1575 
1576 #ifdef CONFIG_SMP
1577 		{
1578 			u64 val = xive_esb_read(&xc->ipi_data, XIVE_ESB_GET);
1579 
1580 			seq_printf(m, "IPI=0x%08x PQ=%c%c ", xc->hw_ipi,
1581 				   val & XIVE_ESB_VAL_P ? 'P' : '-',
1582 				   val & XIVE_ESB_VAL_Q ? 'Q' : '-');
1583 		}
1584 #endif
1585 		{
1586 			struct xive_q *q = &xc->queue[xive_irq_priority];
1587 			u32 i0, i1, idx;
1588 
1589 			if (q->qpage) {
1590 				idx = q->idx;
1591 				i0 = be32_to_cpup(q->qpage + idx);
1592 				idx = (idx + 1) & q->msk;
1593 				i1 = be32_to_cpup(q->qpage + idx);
1594 				seq_printf(m, "EQ idx=%d T=%d %08x %08x ...",
1595 					   q->idx, q->toggle, i0, i1);
1596 			}
1597 		}
1598 	}
1599 	seq_puts(m, "\n");
1600 }
1601 
1602 void xive_debug_show_irq(struct seq_file *m, u32 hw_irq, struct irq_data *d)
1603 {
1604 	struct irq_chip *chip = irq_data_get_irq_chip(d);
1605 	int rc;
1606 	u32 target;
1607 	u8 prio;
1608 	u32 lirq;
1609 
1610 	if (!is_xive_irq(chip))
1611 		return;
1612 
1613 	rc = xive_ops->get_irq_config(hw_irq, &target, &prio, &lirq);
1614 	if (rc) {
1615 		seq_printf(m, "IRQ 0x%08x : no config rc=%d\n", hw_irq, rc);
1616 		return;
1617 	}
1618 
1619 	seq_printf(m, "IRQ 0x%08x : target=0x%x prio=%02x lirq=0x%x ",
1620 		   hw_irq, target, prio, lirq);
1621 
1622 	if (d) {
1623 		struct xive_irq_data *xd = irq_data_get_irq_handler_data(d);
1624 		u64 val = xive_esb_read(xd, XIVE_ESB_GET);
1625 
1626 		seq_printf(m, "flags=%c%c%c PQ=%c%c",
1627 			   xd->flags & XIVE_IRQ_FLAG_STORE_EOI ? 'S' : ' ',
1628 			   xd->flags & XIVE_IRQ_FLAG_LSI ? 'L' : ' ',
1629 			   xd->flags & XIVE_IRQ_FLAG_H_INT_ESB ? 'H' : ' ',
1630 			   val & XIVE_ESB_VAL_P ? 'P' : '-',
1631 			   val & XIVE_ESB_VAL_Q ? 'Q' : '-');
1632 	}
1633 	seq_puts(m, "\n");
1634 }
1635 
1636 static int xive_core_debug_show(struct seq_file *m, void *private)
1637 {
1638 	unsigned int i;
1639 	struct irq_desc *desc;
1640 	int cpu;
1641 
1642 	if (xive_ops->debug_show)
1643 		xive_ops->debug_show(m, private);
1644 
1645 	for_each_possible_cpu(cpu)
1646 		xive_debug_show_cpu(m, cpu);
1647 
1648 	for_each_irq_desc(i, desc) {
1649 		struct irq_data *d = irq_desc_get_irq_data(desc);
1650 		unsigned int hw_irq;
1651 
1652 		if (!d)
1653 			continue;
1654 
1655 		hw_irq = (unsigned int)irqd_to_hwirq(d);
1656 
1657 		/* IPIs are special (HW number 0) */
1658 		if (hw_irq)
1659 			xive_debug_show_irq(m, hw_irq, d);
1660 	}
1661 	return 0;
1662 }
1663 DEFINE_SHOW_ATTRIBUTE(xive_core_debug);
1664 
1665 int xive_core_debug_init(void)
1666 {
1667 	if (xive_enabled())
1668 		debugfs_create_file("xive", 0400, powerpc_debugfs_root,
1669 				    NULL, &xive_core_debug_fops);
1670 	return 0;
1671 }
1672