blob: 90fc8b5fefe80b1b4632a47eedc78953f6221052 [file] [log] [blame]
Ian Spray84687392014-01-02 16:57:12 +00001/*
Dan Handleyfb42b122014-06-20 09:43:15 +01002 * Copyright (c) 2014, ARM Limited and Contributors. All rights reserved.
Ian Spray84687392014-01-02 16:57:12 +00003 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 *
7 * Redistributions of source code must retain the above copyright notice, this
8 * list of conditions and the following disclaimer.
9 *
10 * Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 *
14 * Neither the name of ARM nor the names of its contributors may be used
15 * to endorse or promote products derived from this software without specific
16 * prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 */
30
Dan Handleyfb42b122014-06-20 09:43:15 +010031#include <arch.h>
Ian Spray84687392014-01-02 16:57:12 +000032#include <arch_helpers.h>
Dan Handleyfb42b122014-06-20 09:43:15 +010033#include <arm_gic.h>
Achin Gupta191e86e2014-05-09 10:03:15 +010034#include <assert.h>
35#include <bl_common.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010036#include <debug.h>
Dan Handley930ee2e2014-04-17 17:48:52 +010037#include <gic_v2.h>
38#include <gic_v3.h>
Achin Gupta191e86e2014-05-09 10:03:15 +010039#include <interrupt_mgmt.h>
Dan Handley2bd4ef22014-04-09 13:14:54 +010040#include <platform.h>
41#include <stdint.h>
Dan Handleyfb42b122014-06-20 09:43:15 +010042
Juan Castillo82312952014-10-20 12:27:28 +010043/* Value used to initialize Non-Secure IRQ priorities four at a time */
44#define GICD_IPRIORITYR_DEF_VAL \
45 (GIC_HIGHEST_NS_PRIORITY | \
46 (GIC_HIGHEST_NS_PRIORITY << 8) | \
47 (GIC_HIGHEST_NS_PRIORITY << 16) | \
48 (GIC_HIGHEST_NS_PRIORITY << 24))
Dan Handleyfb42b122014-06-20 09:43:15 +010049
Juan Castillo7f1f0622014-09-09 09:49:23 +010050static uintptr_t g_gicc_base;
51static uintptr_t g_gicd_base;
52static uintptr_t g_gicr_base;
Dan Handleyfb42b122014-06-20 09:43:15 +010053static const unsigned int *g_irq_sec_ptr;
54static unsigned int g_num_irqs;
55
Ian Spray84687392014-01-02 16:57:12 +000056
Ian Spray84687392014-01-02 16:57:12 +000057/*******************************************************************************
58 * This function does some minimal GICv3 configuration. The Firmware itself does
59 * not fully support GICv3 at this time and relies on GICv2 emulation as
60 * provided by GICv3. This function allows software (like Linux) in later stages
61 * to use full GICv3 features.
62 ******************************************************************************/
Dan Handleyfb42b122014-06-20 09:43:15 +010063static void gicv3_cpuif_setup(void)
Ian Spray84687392014-01-02 16:57:12 +000064{
Harry Liebeleaec5902013-12-12 13:00:29 +000065 unsigned int scr_val, val;
66 uintptr_t base;
Ian Spray84687392014-01-02 16:57:12 +000067
68 /*
69 * When CPUs come out of reset they have their GICR_WAKER.ProcessorSleep
70 * bit set. In order to allow interrupts to get routed to the CPU we
71 * need to clear this bit if set and wait for GICR_WAKER.ChildrenAsleep
72 * to clear (GICv3 Architecture specification 5.4.23).
73 * GICR_WAKER is NOT banked per CPU, compute the correct base address
74 * per CPU.
Ian Spray84687392014-01-02 16:57:12 +000075 */
Dan Handleyfb42b122014-06-20 09:43:15 +010076 assert(g_gicr_base);
77 base = gicv3_get_rdist(g_gicr_base, read_mpidr());
Harry Liebeleaec5902013-12-12 13:00:29 +000078 if (base == (uintptr_t)NULL) {
79 /* No re-distributor base address. This interface cannot be
80 * configured.
81 */
82 panic();
83 }
84
Ian Spray84687392014-01-02 16:57:12 +000085 val = gicr_read_waker(base);
86
87 val &= ~WAKER_PS;
88 gicr_write_waker(base, val);
89 dsb();
90
91 /* We need to wait for ChildrenAsleep to clear. */
92 val = gicr_read_waker(base);
Dan Handleyfb42b122014-06-20 09:43:15 +010093 while (val & WAKER_CA)
Ian Spray84687392014-01-02 16:57:12 +000094 val = gicr_read_waker(base);
Ian Spray84687392014-01-02 16:57:12 +000095
96 /*
97 * We need to set SCR_EL3.NS in order to see GICv3 non-secure state.
98 * Restore SCR_EL3.NS again before exit.
99 */
100 scr_val = read_scr();
101 write_scr(scr_val | SCR_NS_BIT);
Andrew Thoelke42e75a72014-04-28 12:28:39 +0100102 isb(); /* ensure NS=1 takes effect before accessing ICC_SRE_EL2 */
Ian Spray84687392014-01-02 16:57:12 +0000103
104 /*
105 * By default EL2 and NS-EL1 software should be able to enable GICv3
106 * System register access without any configuration at EL3. But it turns
107 * out that GICC PMR as set in GICv2 mode does not affect GICv3 mode. So
108 * we need to set it here again. In order to do that we need to enable
109 * register access. We leave it enabled as it should be fine and might
110 * prevent problems with later software trying to access GIC System
111 * Registers.
112 */
113 val = read_icc_sre_el3();
114 write_icc_sre_el3(val | ICC_SRE_EN | ICC_SRE_SRE);
115
116 val = read_icc_sre_el2();
117 write_icc_sre_el2(val | ICC_SRE_EN | ICC_SRE_SRE);
118
Jon Medhurstd0212c22014-02-11 14:48:56 +0000119 write_icc_pmr_el1(GIC_PRI_MASK);
Dan Handleyfb42b122014-06-20 09:43:15 +0100120 isb(); /* commit ICC_* changes before setting NS=0 */
Ian Spray84687392014-01-02 16:57:12 +0000121
122 /* Restore SCR_EL3 */
123 write_scr(scr_val);
Andrew Thoelke42e75a72014-04-28 12:28:39 +0100124 isb(); /* ensure NS=0 takes effect immediately */
Ian Spray84687392014-01-02 16:57:12 +0000125}
126
127/*******************************************************************************
128 * This function does some minimal GICv3 configuration when cores go
129 * down.
130 ******************************************************************************/
Dan Handleyfb42b122014-06-20 09:43:15 +0100131static void gicv3_cpuif_deactivate(void)
Ian Spray84687392014-01-02 16:57:12 +0000132{
Harry Liebeleaec5902013-12-12 13:00:29 +0000133 unsigned int val;
134 uintptr_t base;
Ian Spray84687392014-01-02 16:57:12 +0000135
136 /*
137 * When taking CPUs down we need to set GICR_WAKER.ProcessorSleep and
138 * wait for GICR_WAKER.ChildrenAsleep to get set.
139 * (GICv3 Architecture specification 5.4.23).
140 * GICR_WAKER is NOT banked per CPU, compute the correct base address
141 * per CPU.
Ian Spray84687392014-01-02 16:57:12 +0000142 */
Dan Handleyfb42b122014-06-20 09:43:15 +0100143 assert(g_gicr_base);
144 base = gicv3_get_rdist(g_gicr_base, read_mpidr());
Harry Liebeleaec5902013-12-12 13:00:29 +0000145 if (base == (uintptr_t)NULL) {
146 /* No re-distributor base address. This interface cannot be
147 * configured.
148 */
149 panic();
150 }
151
Ian Spray84687392014-01-02 16:57:12 +0000152 val = gicr_read_waker(base);
153 val |= WAKER_PS;
154 gicr_write_waker(base, val);
155 dsb();
156
157 /* We need to wait for ChildrenAsleep to set. */
158 val = gicr_read_waker(base);
Dan Handleyfb42b122014-06-20 09:43:15 +0100159 while ((val & WAKER_CA) == 0)
Ian Spray84687392014-01-02 16:57:12 +0000160 val = gicr_read_waker(base);
Ian Spray84687392014-01-02 16:57:12 +0000161}
162
163
164/*******************************************************************************
165 * Enable secure interrupts and use FIQs to route them. Disable legacy bypass
166 * and set the priority mask register to allow all interrupts to trickle in.
167 ******************************************************************************/
Dan Handleyfb42b122014-06-20 09:43:15 +0100168void arm_gic_cpuif_setup(void)
Ian Spray84687392014-01-02 16:57:12 +0000169{
170 unsigned int val;
171
Dan Handleyfb42b122014-06-20 09:43:15 +0100172 assert(g_gicc_base);
173 val = gicc_read_iidr(g_gicc_base);
Ian Spray84687392014-01-02 16:57:12 +0000174
175 /*
176 * If GICv3 we need to do a bit of additional setup. We want to
177 * allow default GICv2 behaviour but allow the next stage to
178 * enable full gicv3 features.
179 */
Dan Handleyfb42b122014-06-20 09:43:15 +0100180 if (((val >> GICC_IIDR_ARCH_SHIFT) & GICC_IIDR_ARCH_MASK) >= 3)
Ian Spray84687392014-01-02 16:57:12 +0000181 gicv3_cpuif_setup();
Ian Spray84687392014-01-02 16:57:12 +0000182
183 val = ENABLE_GRP0 | FIQ_EN | FIQ_BYP_DIS_GRP0;
184 val |= IRQ_BYP_DIS_GRP0 | FIQ_BYP_DIS_GRP1 | IRQ_BYP_DIS_GRP1;
185
Dan Handleyfb42b122014-06-20 09:43:15 +0100186 gicc_write_pmr(g_gicc_base, GIC_PRI_MASK);
187 gicc_write_ctlr(g_gicc_base, val);
Ian Spray84687392014-01-02 16:57:12 +0000188}
189
190/*******************************************************************************
191 * Place the cpu interface in a state where it can never make a cpu exit wfi as
192 * as result of an asserted interrupt. This is critical for powering down a cpu
193 ******************************************************************************/
Dan Handleyfb42b122014-06-20 09:43:15 +0100194void arm_gic_cpuif_deactivate(void)
Ian Spray84687392014-01-02 16:57:12 +0000195{
196 unsigned int val;
197
198 /* Disable secure, non-secure interrupts and disable their bypass */
Dan Handleyfb42b122014-06-20 09:43:15 +0100199 assert(g_gicc_base);
200 val = gicc_read_ctlr(g_gicc_base);
Ian Spray84687392014-01-02 16:57:12 +0000201 val &= ~(ENABLE_GRP0 | ENABLE_GRP1);
202 val |= FIQ_BYP_DIS_GRP1 | FIQ_BYP_DIS_GRP0;
203 val |= IRQ_BYP_DIS_GRP0 | IRQ_BYP_DIS_GRP1;
Dan Handleyfb42b122014-06-20 09:43:15 +0100204 gicc_write_ctlr(g_gicc_base, val);
Ian Spray84687392014-01-02 16:57:12 +0000205
Dan Handleyfb42b122014-06-20 09:43:15 +0100206 val = gicc_read_iidr(g_gicc_base);
Ian Spray84687392014-01-02 16:57:12 +0000207
208 /*
209 * If GICv3 we need to do a bit of additional setup. Make sure the
210 * RDIST is put to sleep.
211 */
Dan Handleyfb42b122014-06-20 09:43:15 +0100212 if (((val >> GICC_IIDR_ARCH_SHIFT) & GICC_IIDR_ARCH_MASK) >= 3)
Ian Spray84687392014-01-02 16:57:12 +0000213 gicv3_cpuif_deactivate();
Ian Spray84687392014-01-02 16:57:12 +0000214}
215
216/*******************************************************************************
217 * Per cpu gic distributor setup which will be done by all cpus after a cold
218 * boot/hotplug. This marks out the secure interrupts & enables them.
219 ******************************************************************************/
Dan Handleyfb42b122014-06-20 09:43:15 +0100220void arm_gic_pcpu_distif_setup(void)
Ian Spray84687392014-01-02 16:57:12 +0000221{
Achin Gupta897333d2015-03-09 21:54:40 +0000222 unsigned int index, irq_num, sec_ppi_sgi_mask;
Ian Spray84687392014-01-02 16:57:12 +0000223
Dan Handleyfb42b122014-06-20 09:43:15 +0100224 assert(g_gicd_base);
Juan Castillo82312952014-10-20 12:27:28 +0100225
Juan Castillo82312952014-10-20 12:27:28 +0100226 /* Setup PPI priorities doing four at a time */
227 for (index = 0; index < 32; index += 4) {
228 gicd_write_ipriorityr(g_gicd_base, index,
229 GICD_IPRIORITYR_DEF_VAL);
230 }
231
Dan Handleyfb42b122014-06-20 09:43:15 +0100232 assert(g_irq_sec_ptr);
Achin Gupta897333d2015-03-09 21:54:40 +0000233 sec_ppi_sgi_mask = 0;
Dan Handleyfb42b122014-06-20 09:43:15 +0100234 for (index = 0; index < g_num_irqs; index++) {
235 irq_num = g_irq_sec_ptr[index];
236 if (irq_num < MIN_SPI_ID) {
Achin Gupta897333d2015-03-09 21:54:40 +0000237 /* We have an SGI or a PPI. They are Group0 at reset */
238 sec_ppi_sgi_mask |= 1U << irq_num;
Dan Handleyfb42b122014-06-20 09:43:15 +0100239 gicd_set_ipriorityr(g_gicd_base, irq_num,
240 GIC_HIGHEST_SEC_PRIORITY);
241 gicd_set_isenabler(g_gicd_base, irq_num);
242 }
243 }
Achin Gupta897333d2015-03-09 21:54:40 +0000244
245 /*
246 * Invert the bitmask to create a mask for non-secure PPIs and
247 * SGIs. Program the GICD_IGROUPR0 with this bit mask. This write will
248 * update the GICR_IGROUPR0 as well in case we are running on a GICv3
249 * system. This is critical if GICD_CTLR.ARE_NS=1.
250 */
251 gicd_write_igroupr(g_gicd_base, 0, ~sec_ppi_sgi_mask);
Ian Spray84687392014-01-02 16:57:12 +0000252}
253
254/*******************************************************************************
Juan Castillo82312952014-10-20 12:27:28 +0100255 * Get the current CPU bit mask from GICD_ITARGETSR0
256 ******************************************************************************/
257static unsigned int arm_gic_get_cpuif_id(void)
258{
259 unsigned int val;
260
261 val = gicd_read_itargetsr(g_gicd_base, 0);
262 return val & GIC_TARGET_CPU_MASK;
263}
264
265/*******************************************************************************
Ian Spray84687392014-01-02 16:57:12 +0000266 * Global gic distributor setup which will be done by the primary cpu after a
267 * cold boot. It marks out the secure SPIs, PPIs & SGIs and enables them. It
268 * then enables the secure GIC distributor interface.
269 ******************************************************************************/
Dan Handleyfb42b122014-06-20 09:43:15 +0100270static void arm_gic_distif_setup(void)
Ian Spray84687392014-01-02 16:57:12 +0000271{
Dan Handleyfb42b122014-06-20 09:43:15 +0100272 unsigned int num_ints, ctlr, index, irq_num;
Juan Castillo82312952014-10-20 12:27:28 +0100273 uint8_t target_cpu;
Ian Spray84687392014-01-02 16:57:12 +0000274
275 /* Disable the distributor before going further */
Dan Handleyfb42b122014-06-20 09:43:15 +0100276 assert(g_gicd_base);
277 ctlr = gicd_read_ctlr(g_gicd_base);
Ian Spray84687392014-01-02 16:57:12 +0000278 ctlr &= ~(ENABLE_GRP0 | ENABLE_GRP1);
Dan Handleyfb42b122014-06-20 09:43:15 +0100279 gicd_write_ctlr(g_gicd_base, ctlr);
Ian Spray84687392014-01-02 16:57:12 +0000280
281 /*
Juan Castillo82312952014-10-20 12:27:28 +0100282 * Mark out non-secure SPI interrupts. The number of interrupts is
283 * calculated as 32 * (IT_LINES + 1). We do 32 at a time.
Ian Spray84687392014-01-02 16:57:12 +0000284 */
Dan Handleyfb42b122014-06-20 09:43:15 +0100285 num_ints = gicd_read_typer(g_gicd_base) & IT_LINES_NO_MASK;
Juan Castillo82312952014-10-20 12:27:28 +0100286 num_ints = (num_ints + 1) << 5;
287 for (index = MIN_SPI_ID; index < num_ints; index += 32)
288 gicd_write_igroupr(g_gicd_base, index, ~0);
289
290 /* Setup SPI priorities doing four at a time */
291 for (index = MIN_SPI_ID; index < num_ints; index += 4) {
292 gicd_write_ipriorityr(g_gicd_base, index,
293 GICD_IPRIORITYR_DEF_VAL);
294 }
Ian Spray84687392014-01-02 16:57:12 +0000295
Juan Castillo82312952014-10-20 12:27:28 +0100296 /* Read the target CPU mask */
297 target_cpu = arm_gic_get_cpuif_id();
298
299 /* Configure SPI secure interrupts now */
Dan Handleyfb42b122014-06-20 09:43:15 +0100300 assert(g_irq_sec_ptr);
301 for (index = 0; index < g_num_irqs; index++) {
302 irq_num = g_irq_sec_ptr[index];
303 if (irq_num >= MIN_SPI_ID) {
304 /* We have an SPI */
305 gicd_clr_igroupr(g_gicd_base, irq_num);
306 gicd_set_ipriorityr(g_gicd_base, irq_num,
307 GIC_HIGHEST_SEC_PRIORITY);
Juan Castillo82312952014-10-20 12:27:28 +0100308 gicd_set_itargetsr(g_gicd_base, irq_num, target_cpu);
Dan Handleyfb42b122014-06-20 09:43:15 +0100309 gicd_set_isenabler(g_gicd_base, irq_num);
310 }
311 }
Juan Castillo82312952014-10-20 12:27:28 +0100312
313 /*
314 * Configure the SGI and PPI. This is done in a separated function
315 * because each CPU is responsible for initializing its own private
316 * interrupts.
317 */
Dan Handleyfb42b122014-06-20 09:43:15 +0100318 arm_gic_pcpu_distif_setup();
319
320 gicd_write_ctlr(g_gicd_base, ctlr | ENABLE_GRP0);
321}
Ian Spray84687392014-01-02 16:57:12 +0000322
Dan Handleyfb42b122014-06-20 09:43:15 +0100323/*******************************************************************************
324 * Initialize the ARM GIC driver with the provided platform inputs
325******************************************************************************/
Juan Castillo7f1f0622014-09-09 09:49:23 +0100326void arm_gic_init(uintptr_t gicc_base,
327 uintptr_t gicd_base,
328 uintptr_t gicr_base,
329 const unsigned int *irq_sec_ptr,
330 unsigned int num_irqs)
Dan Handleyfb42b122014-06-20 09:43:15 +0100331{
Juan Castillo82312952014-10-20 12:27:28 +0100332 unsigned int val;
333
Dan Handleyfb42b122014-06-20 09:43:15 +0100334 assert(gicc_base);
335 assert(gicd_base);
Dan Handleyfb42b122014-06-20 09:43:15 +0100336 assert(irq_sec_ptr);
Juan Castillo82312952014-10-20 12:27:28 +0100337
Dan Handleyfb42b122014-06-20 09:43:15 +0100338 g_gicc_base = gicc_base;
339 g_gicd_base = gicd_base;
Juan Castillo82312952014-10-20 12:27:28 +0100340
341 val = gicc_read_iidr(g_gicc_base);
342
343 if (((val >> GICC_IIDR_ARCH_SHIFT) & GICC_IIDR_ARCH_MASK) >= 3) {
344 assert(gicr_base);
345 g_gicr_base = gicr_base;
346 }
347
Dan Handleyfb42b122014-06-20 09:43:15 +0100348 g_irq_sec_ptr = irq_sec_ptr;
349 g_num_irqs = num_irqs;
Ian Spray84687392014-01-02 16:57:12 +0000350}
351
Dan Handleyfb42b122014-06-20 09:43:15 +0100352/*******************************************************************************
353 * Setup the ARM GIC CPU and distributor interfaces.
354******************************************************************************/
355void arm_gic_setup(void)
Ian Spray84687392014-01-02 16:57:12 +0000356{
Dan Handleyfb42b122014-06-20 09:43:15 +0100357 arm_gic_cpuif_setup();
358 arm_gic_distif_setup();
Ian Spray84687392014-01-02 16:57:12 +0000359}
Achin Gupta191e86e2014-05-09 10:03:15 +0100360
361/*******************************************************************************
362 * An ARM processor signals interrupt exceptions through the IRQ and FIQ pins.
363 * The interrupt controller knows which pin/line it uses to signal a type of
Dan Handleyfb42b122014-06-20 09:43:15 +0100364 * interrupt. This function provides a common implementation of
365 * plat_interrupt_type_to_line() in an ARM GIC environment for optional re-use
366 * across platforms. It lets the interrupt management framework determine
367 * for a type of interrupt and security state, which line should be used in the
368 * SCR_EL3 to control its routing to EL3. The interrupt line is represented as
369 * the bit position of the IRQ or FIQ bit in the SCR_EL3.
Achin Gupta191e86e2014-05-09 10:03:15 +0100370 ******************************************************************************/
Dan Handleyfb42b122014-06-20 09:43:15 +0100371uint32_t arm_gic_interrupt_type_to_line(uint32_t type,
372 uint32_t security_state)
Achin Gupta191e86e2014-05-09 10:03:15 +0100373{
Achin Gupta191e86e2014-05-09 10:03:15 +0100374 assert(type == INTR_TYPE_S_EL1 ||
375 type == INTR_TYPE_EL3 ||
376 type == INTR_TYPE_NS);
377
Juan Castillof558cac2014-06-05 09:45:36 +0100378 assert(sec_state_is_valid(security_state));
Achin Gupta191e86e2014-05-09 10:03:15 +0100379
380 /*
381 * We ignore the security state parameter under the assumption that
382 * both normal and secure worlds are using ARM GICv2. This parameter
383 * will be used when the secure world starts using GICv3.
384 */
Dan Handleyfb42b122014-06-20 09:43:15 +0100385#if ARM_GIC_ARCH == 2
386 return gicv2_interrupt_type_to_line(g_gicc_base, type);
Achin Gupta191e86e2014-05-09 10:03:15 +0100387#else
Dan Handleyfb42b122014-06-20 09:43:15 +0100388#error "Invalid ARM GIC architecture version specified for platform port"
389#endif /* ARM_GIC_ARCH */
Achin Gupta191e86e2014-05-09 10:03:15 +0100390}
391
Dan Handleyfb42b122014-06-20 09:43:15 +0100392#if ARM_GIC_ARCH == 2
Achin Gupta02d36282014-05-04 19:02:52 +0100393/*******************************************************************************
394 * This function returns the type of the highest priority pending interrupt at
395 * the GIC cpu interface. INTR_TYPE_INVAL is returned when there is no
396 * interrupt pending.
397 ******************************************************************************/
Dan Handleyfb42b122014-06-20 09:43:15 +0100398uint32_t arm_gic_get_pending_interrupt_type(void)
Achin Gupta02d36282014-05-04 19:02:52 +0100399{
Dan Handley1c54d972014-06-20 12:02:01 +0100400 uint32_t id;
Achin Gupta02d36282014-05-04 19:02:52 +0100401
Dan Handleyfb42b122014-06-20 09:43:15 +0100402 assert(g_gicc_base);
Achin Gupta966b9522015-05-18 10:56:47 +0100403 id = gicc_read_hppir(g_gicc_base) & INT_ID_MASK;
Achin Gupta02d36282014-05-04 19:02:52 +0100404
405 /* Assume that all secure interrupts are S-EL1 interrupts */
406 if (id < 1022)
407 return INTR_TYPE_S_EL1;
408
409 if (id == GIC_SPURIOUS_INTERRUPT)
410 return INTR_TYPE_INVAL;
411
412 return INTR_TYPE_NS;
413}
414
415/*******************************************************************************
416 * This function returns the id of the highest priority pending interrupt at
417 * the GIC cpu interface. INTR_ID_UNAVAILABLE is returned when there is no
418 * interrupt pending.
419 ******************************************************************************/
Dan Handleyfb42b122014-06-20 09:43:15 +0100420uint32_t arm_gic_get_pending_interrupt_id(void)
Achin Gupta02d36282014-05-04 19:02:52 +0100421{
Dan Handleyfb42b122014-06-20 09:43:15 +0100422 uint32_t id;
Achin Gupta02d36282014-05-04 19:02:52 +0100423
Dan Handleyfb42b122014-06-20 09:43:15 +0100424 assert(g_gicc_base);
Achin Gupta966b9522015-05-18 10:56:47 +0100425 id = gicc_read_hppir(g_gicc_base) & INT_ID_MASK;
Achin Gupta02d36282014-05-04 19:02:52 +0100426
427 if (id < 1022)
428 return id;
429
430 if (id == 1023)
431 return INTR_ID_UNAVAILABLE;
432
433 /*
434 * Find out which non-secure interrupt it is under the assumption that
435 * the GICC_CTLR.AckCtl bit is 0.
436 */
Achin Gupta966b9522015-05-18 10:56:47 +0100437 return gicc_read_ahppir(g_gicc_base) & INT_ID_MASK;
Achin Gupta02d36282014-05-04 19:02:52 +0100438}
439
440/*******************************************************************************
441 * This functions reads the GIC cpu interface Interrupt Acknowledge register
442 * to start handling the pending interrupt. It returns the contents of the IAR.
443 ******************************************************************************/
Dan Handleyfb42b122014-06-20 09:43:15 +0100444uint32_t arm_gic_acknowledge_interrupt(void)
Achin Gupta02d36282014-05-04 19:02:52 +0100445{
Dan Handleyfb42b122014-06-20 09:43:15 +0100446 assert(g_gicc_base);
447 return gicc_read_IAR(g_gicc_base);
Achin Gupta02d36282014-05-04 19:02:52 +0100448}
449
450/*******************************************************************************
451 * This functions writes the GIC cpu interface End Of Interrupt register with
452 * the passed value to finish handling the active interrupt
453 ******************************************************************************/
Dan Handleyfb42b122014-06-20 09:43:15 +0100454void arm_gic_end_of_interrupt(uint32_t id)
Achin Gupta02d36282014-05-04 19:02:52 +0100455{
Dan Handleyfb42b122014-06-20 09:43:15 +0100456 assert(g_gicc_base);
457 gicc_write_EOIR(g_gicc_base, id);
Achin Gupta02d36282014-05-04 19:02:52 +0100458}
459
460/*******************************************************************************
461 * This function returns the type of the interrupt id depending upon the group
462 * this interrupt has been configured under by the interrupt controller i.e.
463 * group0 or group1.
464 ******************************************************************************/
Dan Handleyfb42b122014-06-20 09:43:15 +0100465uint32_t arm_gic_get_interrupt_type(uint32_t id)
Achin Gupta02d36282014-05-04 19:02:52 +0100466{
467 uint32_t group;
468
Dan Handleyfb42b122014-06-20 09:43:15 +0100469 assert(g_gicd_base);
470 group = gicd_get_igroupr(g_gicd_base, id);
Achin Gupta02d36282014-05-04 19:02:52 +0100471
472 /* Assume that all secure interrupts are S-EL1 interrupts */
473 if (group == GRP0)
474 return INTR_TYPE_S_EL1;
475 else
476 return INTR_TYPE_NS;
477}
478
479#else
Dan Handleyfb42b122014-06-20 09:43:15 +0100480#error "Invalid ARM GIC architecture version specified for platform port"
481#endif /* ARM_GIC_ARCH */