summaryrefslogtreecommitdiffstats
path: root/sys/contrib/octeon-sdk/cvmx-sso-defs.h
diff options
context:
space:
mode:
Diffstat (limited to 'sys/contrib/octeon-sdk/cvmx-sso-defs.h')
-rw-r--r--sys/contrib/octeon-sdk/cvmx-sso-defs.h2194
1 files changed, 2194 insertions, 0 deletions
diff --git a/sys/contrib/octeon-sdk/cvmx-sso-defs.h b/sys/contrib/octeon-sdk/cvmx-sso-defs.h
new file mode 100644
index 0000000..611df6e
--- /dev/null
+++ b/sys/contrib/octeon-sdk/cvmx-sso-defs.h
@@ -0,0 +1,2194 @@
+/***********************license start***************
+ * Copyright (c) 2003-2012 Cavium Inc. (support@cavium.com). All rights
+ * reserved.
+ *
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions are
+ * met:
+ *
+ * * Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ *
+ * * Redistributions in binary form must reproduce the above
+ * copyright notice, this list of conditions and the following
+ * disclaimer in the documentation and/or other materials provided
+ * with the distribution.
+
+ * * Neither the name of Cavium Inc. nor the names of
+ * its contributors may be used to endorse or promote products
+ * derived from this software without specific prior written
+ * permission.
+
+ * This Software, including technical data, may be subject to U.S. export control
+ * laws, including the U.S. Export Administration Act and its associated
+ * regulations, and may be subject to export or import regulations in other
+ * countries.
+
+ * TO THE MAXIMUM EXTENT PERMITTED BY LAW, THE SOFTWARE IS PROVIDED "AS IS"
+ * AND WITH ALL FAULTS AND CAVIUM INC. MAKES NO PROMISES, REPRESENTATIONS OR
+ * WARRANTIES, EITHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE, WITH RESPECT TO
+ * THE SOFTWARE, INCLUDING ITS CONDITION, ITS CONFORMITY TO ANY REPRESENTATION OR
+ * DESCRIPTION, OR THE EXISTENCE OF ANY LATENT OR PATENT DEFECTS, AND CAVIUM
+ * SPECIFICALLY DISCLAIMS ALL IMPLIED (IF ANY) WARRANTIES OF TITLE,
+ * MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR A PARTICULAR PURPOSE, LACK OF
+ * VIRUSES, ACCURACY OR COMPLETENESS, QUIET ENJOYMENT, QUIET POSSESSION OR
+ * CORRESPONDENCE TO DESCRIPTION. THE ENTIRE RISK ARISING OUT OF USE OR
+ * PERFORMANCE OF THE SOFTWARE LIES WITH YOU.
+ ***********************license end**************************************/
+
+
+/**
+ * cvmx-sso-defs.h
+ *
+ * Configuration and status register (CSR) type definitions for
+ * Octeon sso.
+ *
+ * This file is auto generated. Do not edit.
+ *
+ * <hr>$Revision$<hr>
+ *
+ */
+#ifndef __CVMX_SSO_DEFS_H__
+#define __CVMX_SSO_DEFS_H__
+
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_ACTIVE_CYCLES CVMX_SSO_ACTIVE_CYCLES_FUNC()
+static inline uint64_t CVMX_SSO_ACTIVE_CYCLES_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_ACTIVE_CYCLES not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x00016700000010E8ull);
+}
+#else
+#define CVMX_SSO_ACTIVE_CYCLES (CVMX_ADD_IO_SEG(0x00016700000010E8ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_BIST_STAT CVMX_SSO_BIST_STAT_FUNC()
+static inline uint64_t CVMX_SSO_BIST_STAT_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_BIST_STAT not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x0001670000001078ull);
+}
+#else
+#define CVMX_SSO_BIST_STAT (CVMX_ADD_IO_SEG(0x0001670000001078ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_CFG CVMX_SSO_CFG_FUNC()
+static inline uint64_t CVMX_SSO_CFG_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_CFG not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x0001670000001088ull);
+}
+#else
+#define CVMX_SSO_CFG (CVMX_ADD_IO_SEG(0x0001670000001088ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_DS_PC CVMX_SSO_DS_PC_FUNC()
+static inline uint64_t CVMX_SSO_DS_PC_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_DS_PC not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x0001670000001070ull);
+}
+#else
+#define CVMX_SSO_DS_PC (CVMX_ADD_IO_SEG(0x0001670000001070ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_ERR CVMX_SSO_ERR_FUNC()
+static inline uint64_t CVMX_SSO_ERR_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_ERR not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x0001670000001038ull);
+}
+#else
+#define CVMX_SSO_ERR (CVMX_ADD_IO_SEG(0x0001670000001038ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_ERR_ENB CVMX_SSO_ERR_ENB_FUNC()
+static inline uint64_t CVMX_SSO_ERR_ENB_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_ERR_ENB not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x0001670000001030ull);
+}
+#else
+#define CVMX_SSO_ERR_ENB (CVMX_ADD_IO_SEG(0x0001670000001030ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_FIDX_ECC_CTL CVMX_SSO_FIDX_ECC_CTL_FUNC()
+static inline uint64_t CVMX_SSO_FIDX_ECC_CTL_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_FIDX_ECC_CTL not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x00016700000010D0ull);
+}
+#else
+#define CVMX_SSO_FIDX_ECC_CTL (CVMX_ADD_IO_SEG(0x00016700000010D0ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_FIDX_ECC_ST CVMX_SSO_FIDX_ECC_ST_FUNC()
+static inline uint64_t CVMX_SSO_FIDX_ECC_ST_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_FIDX_ECC_ST not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x00016700000010D8ull);
+}
+#else
+#define CVMX_SSO_FIDX_ECC_ST (CVMX_ADD_IO_SEG(0x00016700000010D8ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_FPAGE_CNT CVMX_SSO_FPAGE_CNT_FUNC()
+static inline uint64_t CVMX_SSO_FPAGE_CNT_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_FPAGE_CNT not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x0001670000001090ull);
+}
+#else
+#define CVMX_SSO_FPAGE_CNT (CVMX_ADD_IO_SEG(0x0001670000001090ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_GWE_CFG CVMX_SSO_GWE_CFG_FUNC()
+static inline uint64_t CVMX_SSO_GWE_CFG_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_GWE_CFG not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x0001670000001098ull);
+}
+#else
+#define CVMX_SSO_GWE_CFG (CVMX_ADD_IO_SEG(0x0001670000001098ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_IDX_ECC_CTL CVMX_SSO_IDX_ECC_CTL_FUNC()
+static inline uint64_t CVMX_SSO_IDX_ECC_CTL_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_IDX_ECC_CTL not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x00016700000010C0ull);
+}
+#else
+#define CVMX_SSO_IDX_ECC_CTL (CVMX_ADD_IO_SEG(0x00016700000010C0ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_IDX_ECC_ST CVMX_SSO_IDX_ECC_ST_FUNC()
+static inline uint64_t CVMX_SSO_IDX_ECC_ST_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_IDX_ECC_ST not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x00016700000010C8ull);
+}
+#else
+#define CVMX_SSO_IDX_ECC_ST (CVMX_ADD_IO_SEG(0x00016700000010C8ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+static inline uint64_t CVMX_SSO_IQ_CNTX(unsigned long offset)
+{
+ if (!(
+ (OCTEON_IS_MODEL(OCTEON_CN68XX) && ((offset <= 7)))))
+ cvmx_warn("CVMX_SSO_IQ_CNTX(%lu) is invalid on this chip\n", offset);
+ return CVMX_ADD_IO_SEG(0x0001670000009000ull) + ((offset) & 7) * 8;
+}
+#else
+#define CVMX_SSO_IQ_CNTX(offset) (CVMX_ADD_IO_SEG(0x0001670000009000ull) + ((offset) & 7) * 8)
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_IQ_COM_CNT CVMX_SSO_IQ_COM_CNT_FUNC()
+static inline uint64_t CVMX_SSO_IQ_COM_CNT_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_IQ_COM_CNT not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x0001670000001058ull);
+}
+#else
+#define CVMX_SSO_IQ_COM_CNT (CVMX_ADD_IO_SEG(0x0001670000001058ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_IQ_INT CVMX_SSO_IQ_INT_FUNC()
+static inline uint64_t CVMX_SSO_IQ_INT_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_IQ_INT not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x0001670000001048ull);
+}
+#else
+#define CVMX_SSO_IQ_INT (CVMX_ADD_IO_SEG(0x0001670000001048ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_IQ_INT_EN CVMX_SSO_IQ_INT_EN_FUNC()
+static inline uint64_t CVMX_SSO_IQ_INT_EN_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_IQ_INT_EN not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x0001670000001050ull);
+}
+#else
+#define CVMX_SSO_IQ_INT_EN (CVMX_ADD_IO_SEG(0x0001670000001050ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+static inline uint64_t CVMX_SSO_IQ_THRX(unsigned long offset)
+{
+ if (!(
+ (OCTEON_IS_MODEL(OCTEON_CN68XX) && ((offset <= 7)))))
+ cvmx_warn("CVMX_SSO_IQ_THRX(%lu) is invalid on this chip\n", offset);
+ return CVMX_ADD_IO_SEG(0x000167000000A000ull) + ((offset) & 7) * 8;
+}
+#else
+#define CVMX_SSO_IQ_THRX(offset) (CVMX_ADD_IO_SEG(0x000167000000A000ull) + ((offset) & 7) * 8)
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_NOS_CNT CVMX_SSO_NOS_CNT_FUNC()
+static inline uint64_t CVMX_SSO_NOS_CNT_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_NOS_CNT not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x0001670000001040ull);
+}
+#else
+#define CVMX_SSO_NOS_CNT (CVMX_ADD_IO_SEG(0x0001670000001040ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_NW_TIM CVMX_SSO_NW_TIM_FUNC()
+static inline uint64_t CVMX_SSO_NW_TIM_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_NW_TIM not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x0001670000001028ull);
+}
+#else
+#define CVMX_SSO_NW_TIM (CVMX_ADD_IO_SEG(0x0001670000001028ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_OTH_ECC_CTL CVMX_SSO_OTH_ECC_CTL_FUNC()
+static inline uint64_t CVMX_SSO_OTH_ECC_CTL_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_OTH_ECC_CTL not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x00016700000010B0ull);
+}
+#else
+#define CVMX_SSO_OTH_ECC_CTL (CVMX_ADD_IO_SEG(0x00016700000010B0ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_OTH_ECC_ST CVMX_SSO_OTH_ECC_ST_FUNC()
+static inline uint64_t CVMX_SSO_OTH_ECC_ST_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_OTH_ECC_ST not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x00016700000010B8ull);
+}
+#else
+#define CVMX_SSO_OTH_ECC_ST (CVMX_ADD_IO_SEG(0x00016700000010B8ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_PND_ECC_CTL CVMX_SSO_PND_ECC_CTL_FUNC()
+static inline uint64_t CVMX_SSO_PND_ECC_CTL_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_PND_ECC_CTL not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x00016700000010A0ull);
+}
+#else
+#define CVMX_SSO_PND_ECC_CTL (CVMX_ADD_IO_SEG(0x00016700000010A0ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_PND_ECC_ST CVMX_SSO_PND_ECC_ST_FUNC()
+static inline uint64_t CVMX_SSO_PND_ECC_ST_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_PND_ECC_ST not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x00016700000010A8ull);
+}
+#else
+#define CVMX_SSO_PND_ECC_ST (CVMX_ADD_IO_SEG(0x00016700000010A8ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+static inline uint64_t CVMX_SSO_PPX_GRP_MSK(unsigned long offset)
+{
+ if (!(
+ (OCTEON_IS_MODEL(OCTEON_CN68XX) && ((offset <= 31)))))
+ cvmx_warn("CVMX_SSO_PPX_GRP_MSK(%lu) is invalid on this chip\n", offset);
+ return CVMX_ADD_IO_SEG(0x0001670000006000ull) + ((offset) & 31) * 8;
+}
+#else
+#define CVMX_SSO_PPX_GRP_MSK(offset) (CVMX_ADD_IO_SEG(0x0001670000006000ull) + ((offset) & 31) * 8)
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+static inline uint64_t CVMX_SSO_PPX_QOS_PRI(unsigned long offset)
+{
+ if (!(
+ (OCTEON_IS_MODEL(OCTEON_CN68XX) && ((offset <= 31)))))
+ cvmx_warn("CVMX_SSO_PPX_QOS_PRI(%lu) is invalid on this chip\n", offset);
+ return CVMX_ADD_IO_SEG(0x0001670000003000ull) + ((offset) & 31) * 8;
+}
+#else
+#define CVMX_SSO_PPX_QOS_PRI(offset) (CVMX_ADD_IO_SEG(0x0001670000003000ull) + ((offset) & 31) * 8)
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_PP_STRICT CVMX_SSO_PP_STRICT_FUNC()
+static inline uint64_t CVMX_SSO_PP_STRICT_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_PP_STRICT not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x00016700000010E0ull);
+}
+#else
+#define CVMX_SSO_PP_STRICT (CVMX_ADD_IO_SEG(0x00016700000010E0ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+static inline uint64_t CVMX_SSO_QOSX_RND(unsigned long offset)
+{
+ if (!(
+ (OCTEON_IS_MODEL(OCTEON_CN68XX) && ((offset <= 7)))))
+ cvmx_warn("CVMX_SSO_QOSX_RND(%lu) is invalid on this chip\n", offset);
+ return CVMX_ADD_IO_SEG(0x0001670000002000ull) + ((offset) & 7) * 8;
+}
+#else
+#define CVMX_SSO_QOSX_RND(offset) (CVMX_ADD_IO_SEG(0x0001670000002000ull) + ((offset) & 7) * 8)
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+static inline uint64_t CVMX_SSO_QOS_THRX(unsigned long offset)
+{
+ if (!(
+ (OCTEON_IS_MODEL(OCTEON_CN68XX) && ((offset <= 7)))))
+ cvmx_warn("CVMX_SSO_QOS_THRX(%lu) is invalid on this chip\n", offset);
+ return CVMX_ADD_IO_SEG(0x000167000000B000ull) + ((offset) & 7) * 8;
+}
+#else
+#define CVMX_SSO_QOS_THRX(offset) (CVMX_ADD_IO_SEG(0x000167000000B000ull) + ((offset) & 7) * 8)
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_QOS_WE CVMX_SSO_QOS_WE_FUNC()
+static inline uint64_t CVMX_SSO_QOS_WE_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_QOS_WE not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x0001670000001080ull);
+}
+#else
+#define CVMX_SSO_QOS_WE (CVMX_ADD_IO_SEG(0x0001670000001080ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_RESET CVMX_SSO_RESET_FUNC()
+static inline uint64_t CVMX_SSO_RESET_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_RESET not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x00016700000010F0ull);
+}
+#else
+#define CVMX_SSO_RESET (CVMX_ADD_IO_SEG(0x00016700000010F0ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+static inline uint64_t CVMX_SSO_RWQ_HEAD_PTRX(unsigned long offset)
+{
+ if (!(
+ (OCTEON_IS_MODEL(OCTEON_CN68XX) && ((offset <= 7)))))
+ cvmx_warn("CVMX_SSO_RWQ_HEAD_PTRX(%lu) is invalid on this chip\n", offset);
+ return CVMX_ADD_IO_SEG(0x000167000000C000ull) + ((offset) & 7) * 8;
+}
+#else
+#define CVMX_SSO_RWQ_HEAD_PTRX(offset) (CVMX_ADD_IO_SEG(0x000167000000C000ull) + ((offset) & 7) * 8)
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_RWQ_POP_FPTR CVMX_SSO_RWQ_POP_FPTR_FUNC()
+static inline uint64_t CVMX_SSO_RWQ_POP_FPTR_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_RWQ_POP_FPTR not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x000167000000C408ull);
+}
+#else
+#define CVMX_SSO_RWQ_POP_FPTR (CVMX_ADD_IO_SEG(0x000167000000C408ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_RWQ_PSH_FPTR CVMX_SSO_RWQ_PSH_FPTR_FUNC()
+static inline uint64_t CVMX_SSO_RWQ_PSH_FPTR_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_RWQ_PSH_FPTR not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x000167000000C400ull);
+}
+#else
+#define CVMX_SSO_RWQ_PSH_FPTR (CVMX_ADD_IO_SEG(0x000167000000C400ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+static inline uint64_t CVMX_SSO_RWQ_TAIL_PTRX(unsigned long offset)
+{
+ if (!(
+ (OCTEON_IS_MODEL(OCTEON_CN68XX) && ((offset <= 7)))))
+ cvmx_warn("CVMX_SSO_RWQ_TAIL_PTRX(%lu) is invalid on this chip\n", offset);
+ return CVMX_ADD_IO_SEG(0x000167000000C200ull) + ((offset) & 7) * 8;
+}
+#else
+#define CVMX_SSO_RWQ_TAIL_PTRX(offset) (CVMX_ADD_IO_SEG(0x000167000000C200ull) + ((offset) & 7) * 8)
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_TS_PC CVMX_SSO_TS_PC_FUNC()
+static inline uint64_t CVMX_SSO_TS_PC_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_TS_PC not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x0001670000001068ull);
+}
+#else
+#define CVMX_SSO_TS_PC (CVMX_ADD_IO_SEG(0x0001670000001068ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_WA_COM_PC CVMX_SSO_WA_COM_PC_FUNC()
+static inline uint64_t CVMX_SSO_WA_COM_PC_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_WA_COM_PC not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x0001670000001060ull);
+}
+#else
+#define CVMX_SSO_WA_COM_PC (CVMX_ADD_IO_SEG(0x0001670000001060ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+static inline uint64_t CVMX_SSO_WA_PCX(unsigned long offset)
+{
+ if (!(
+ (OCTEON_IS_MODEL(OCTEON_CN68XX) && ((offset <= 7)))))
+ cvmx_warn("CVMX_SSO_WA_PCX(%lu) is invalid on this chip\n", offset);
+ return CVMX_ADD_IO_SEG(0x0001670000005000ull) + ((offset) & 7) * 8;
+}
+#else
+#define CVMX_SSO_WA_PCX(offset) (CVMX_ADD_IO_SEG(0x0001670000005000ull) + ((offset) & 7) * 8)
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_WQ_INT CVMX_SSO_WQ_INT_FUNC()
+static inline uint64_t CVMX_SSO_WQ_INT_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_WQ_INT not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x0001670000001000ull);
+}
+#else
+#define CVMX_SSO_WQ_INT (CVMX_ADD_IO_SEG(0x0001670000001000ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+static inline uint64_t CVMX_SSO_WQ_INT_CNTX(unsigned long offset)
+{
+ if (!(
+ (OCTEON_IS_MODEL(OCTEON_CN68XX) && ((offset <= 63)))))
+ cvmx_warn("CVMX_SSO_WQ_INT_CNTX(%lu) is invalid on this chip\n", offset);
+ return CVMX_ADD_IO_SEG(0x0001670000008000ull) + ((offset) & 63) * 8;
+}
+#else
+#define CVMX_SSO_WQ_INT_CNTX(offset) (CVMX_ADD_IO_SEG(0x0001670000008000ull) + ((offset) & 63) * 8)
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_WQ_INT_PC CVMX_SSO_WQ_INT_PC_FUNC()
+static inline uint64_t CVMX_SSO_WQ_INT_PC_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_WQ_INT_PC not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x0001670000001020ull);
+}
+#else
+#define CVMX_SSO_WQ_INT_PC (CVMX_ADD_IO_SEG(0x0001670000001020ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+static inline uint64_t CVMX_SSO_WQ_INT_THRX(unsigned long offset)
+{
+ if (!(
+ (OCTEON_IS_MODEL(OCTEON_CN68XX) && ((offset <= 63)))))
+ cvmx_warn("CVMX_SSO_WQ_INT_THRX(%lu) is invalid on this chip\n", offset);
+ return CVMX_ADD_IO_SEG(0x0001670000007000ull) + ((offset) & 63) * 8;
+}
+#else
+#define CVMX_SSO_WQ_INT_THRX(offset) (CVMX_ADD_IO_SEG(0x0001670000007000ull) + ((offset) & 63) * 8)
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+#define CVMX_SSO_WQ_IQ_DIS CVMX_SSO_WQ_IQ_DIS_FUNC()
+static inline uint64_t CVMX_SSO_WQ_IQ_DIS_FUNC(void)
+{
+ if (!(OCTEON_IS_MODEL(OCTEON_CN68XX)))
+ cvmx_warn("CVMX_SSO_WQ_IQ_DIS not supported on this chip\n");
+ return CVMX_ADD_IO_SEG(0x0001670000001010ull);
+}
+#else
+#define CVMX_SSO_WQ_IQ_DIS (CVMX_ADD_IO_SEG(0x0001670000001010ull))
+#endif
+#if CVMX_ENABLE_CSR_ADDRESS_CHECKING
+static inline uint64_t CVMX_SSO_WS_PCX(unsigned long offset)
+{
+ if (!(
+ (OCTEON_IS_MODEL(OCTEON_CN68XX) && ((offset <= 63)))))
+ cvmx_warn("CVMX_SSO_WS_PCX(%lu) is invalid on this chip\n", offset);
+ return CVMX_ADD_IO_SEG(0x0001670000004000ull) + ((offset) & 63) * 8;
+}
+#else
+#define CVMX_SSO_WS_PCX(offset) (CVMX_ADD_IO_SEG(0x0001670000004000ull) + ((offset) & 63) * 8)
+#endif
+
+/**
+ * cvmx_sso_active_cycles
+ *
+ * SSO_ACTIVE_CYCLES = SSO cycles SSO active
+ *
+ * This register counts every sclk cycle that the SSO clocks are active.
+ * **NOTE: Added in pass 2.0
+ */
+union cvmx_sso_active_cycles {
+ uint64_t u64;
+ struct cvmx_sso_active_cycles_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t act_cyc : 64; /**< Counts number of active cycles. */
+#else
+ uint64_t act_cyc : 64;
+#endif
+ } s;
+ struct cvmx_sso_active_cycles_s cn68xx;
+};
+typedef union cvmx_sso_active_cycles cvmx_sso_active_cycles_t;
+
+/**
+ * cvmx_sso_bist_stat
+ *
+ * SSO_BIST_STAT = SSO BIST Status Register
+ *
+ * Contains the BIST status for the SSO memories ('0' = pass, '1' = fail).
+ * Note that PP BIST status is not reported here as it was in previous designs.
+ *
+ * There may be more for DDR interface buffers.
+ * It's possible that a RAM will be used for SSO_PP_QOS_RND.
+ */
+union cvmx_sso_bist_stat {
+ uint64_t u64;
+ struct cvmx_sso_bist_stat_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_62_63 : 2;
+ uint64_t odu_pref : 2; /**< ODU Prefetch memory BIST status */
+ uint64_t reserved_54_59 : 6;
+ uint64_t fptr : 2; /**< FPTR memory BIST status */
+ uint64_t reserved_45_51 : 7;
+ uint64_t rwo_dat : 1; /**< RWO_DAT memory BIST status */
+ uint64_t rwo : 2; /**< RWO memory BIST status */
+ uint64_t reserved_35_41 : 7;
+ uint64_t rwi_dat : 1; /**< RWI_DAT memory BIST status */
+ uint64_t reserved_32_33 : 2;
+ uint64_t soc : 1; /**< SSO CAM BIST status */
+ uint64_t reserved_28_30 : 3;
+ uint64_t ncbo : 4; /**< NCBO transmitter memory BIST status */
+ uint64_t reserved_21_23 : 3;
+ uint64_t index : 1; /**< Index memory BIST status */
+ uint64_t reserved_17_19 : 3;
+ uint64_t fidx : 1; /**< Forward index memory BIST status */
+ uint64_t reserved_10_15 : 6;
+ uint64_t pend : 2; /**< Pending switch memory BIST status */
+ uint64_t reserved_2_7 : 6;
+ uint64_t oth : 2; /**< WQP, GRP memory BIST status */
+#else
+ uint64_t oth : 2;
+ uint64_t reserved_2_7 : 6;
+ uint64_t pend : 2;
+ uint64_t reserved_10_15 : 6;
+ uint64_t fidx : 1;
+ uint64_t reserved_17_19 : 3;
+ uint64_t index : 1;
+ uint64_t reserved_21_23 : 3;
+ uint64_t ncbo : 4;
+ uint64_t reserved_28_30 : 3;
+ uint64_t soc : 1;
+ uint64_t reserved_32_33 : 2;
+ uint64_t rwi_dat : 1;
+ uint64_t reserved_35_41 : 7;
+ uint64_t rwo : 2;
+ uint64_t rwo_dat : 1;
+ uint64_t reserved_45_51 : 7;
+ uint64_t fptr : 2;
+ uint64_t reserved_54_59 : 6;
+ uint64_t odu_pref : 2;
+ uint64_t reserved_62_63 : 2;
+#endif
+ } s;
+ struct cvmx_sso_bist_stat_s cn68xx;
+ struct cvmx_sso_bist_stat_cn68xxp1 {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_54_63 : 10;
+ uint64_t fptr : 2; /**< FPTR memory BIST status */
+ uint64_t reserved_45_51 : 7;
+ uint64_t rwo_dat : 1; /**< RWO_DAT memory BIST status */
+ uint64_t rwo : 2; /**< RWO memory BIST status */
+ uint64_t reserved_35_41 : 7;
+ uint64_t rwi_dat : 1; /**< RWI_DAT memory BIST status */
+ uint64_t reserved_32_33 : 2;
+ uint64_t soc : 1; /**< SSO CAM BIST status */
+ uint64_t reserved_28_30 : 3;
+ uint64_t ncbo : 4; /**< NCBO transmitter memory BIST status */
+ uint64_t reserved_21_23 : 3;
+ uint64_t index : 1; /**< Index memory BIST status */
+ uint64_t reserved_17_19 : 3;
+ uint64_t fidx : 1; /**< Forward index memory BIST status */
+ uint64_t reserved_10_15 : 6;
+ uint64_t pend : 2; /**< Pending switch memory BIST status */
+ uint64_t reserved_2_7 : 6;
+ uint64_t oth : 2; /**< WQP, GRP memory BIST status */
+#else
+ uint64_t oth : 2;
+ uint64_t reserved_2_7 : 6;
+ uint64_t pend : 2;
+ uint64_t reserved_10_15 : 6;
+ uint64_t fidx : 1;
+ uint64_t reserved_17_19 : 3;
+ uint64_t index : 1;
+ uint64_t reserved_21_23 : 3;
+ uint64_t ncbo : 4;
+ uint64_t reserved_28_30 : 3;
+ uint64_t soc : 1;
+ uint64_t reserved_32_33 : 2;
+ uint64_t rwi_dat : 1;
+ uint64_t reserved_35_41 : 7;
+ uint64_t rwo : 2;
+ uint64_t rwo_dat : 1;
+ uint64_t reserved_45_51 : 7;
+ uint64_t fptr : 2;
+ uint64_t reserved_54_63 : 10;
+#endif
+ } cn68xxp1;
+};
+typedef union cvmx_sso_bist_stat cvmx_sso_bist_stat_t;
+
+/**
+ * cvmx_sso_cfg
+ *
+ * SSO_CFG = SSO Config
+ *
+ * This register is an assortment of various SSO configuration bits.
+ */
+union cvmx_sso_cfg {
+ uint64_t u64;
+ struct cvmx_sso_cfg_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_16_63 : 48;
+ uint64_t qck_gw_rsp_adj : 3; /**< Fast GET_WORK response fine adjustment
+ Allowed values are 0, 1, and 2 (0 is quickest) */
+ uint64_t qck_gw_rsp_dis : 1; /**< Disable faster response to GET_WORK */
+ uint64_t qck_sw_dis : 1; /**< Disable faster switch to UNSCHEDULED on GET_WORK */
+ uint64_t rwq_alloc_dis : 1; /**< Disable FPA Alloc Requests when SSO_FPAGE_CNT < 16 */
+ uint64_t soc_ccam_dis : 1; /**< Disable power saving SOC conditional CAM
+ (**NOTE: Added in pass 2.0) */
+ uint64_t sso_cclk_dis : 1; /**< Disable power saving SSO conditional clocking
+ (**NOTE: Added in pass 2.0) */
+ uint64_t rwo_flush : 1; /**< Flush RWO engine
+ Allows outbound NCB entries to go immediately rather
+ than waiting for a complete fill packet. This register
+ is one-shot and clears itself each time it is set. */
+ uint64_t wfe_thr : 1; /**< Use 1 Work-fetch engine (instead of 4) */
+ uint64_t rwio_byp_dis : 1; /**< Disable Bypass path in RWI/RWO Engines */
+ uint64_t rwq_byp_dis : 1; /**< Disable Bypass path in RWQ Engine */
+ uint64_t stt : 1; /**< STT Setting for RW Stores */
+ uint64_t ldt : 1; /**< LDT Setting for RW Loads */
+ uint64_t dwb : 1; /**< DWB Setting for Return Page Requests
+ 1 = 2 128B cache pages to issue DWB for
+ 0 = 0 128B cache pages ro issue DWB for */
+ uint64_t rwen : 1; /**< Enable RWI/RWO operations
+ This bit should be set after SSO_RWQ_HEAD_PTRX and
+ SSO_RWQ_TAIL_PTRX have been programmed. */
+#else
+ uint64_t rwen : 1;
+ uint64_t dwb : 1;
+ uint64_t ldt : 1;
+ uint64_t stt : 1;
+ uint64_t rwq_byp_dis : 1;
+ uint64_t rwio_byp_dis : 1;
+ uint64_t wfe_thr : 1;
+ uint64_t rwo_flush : 1;
+ uint64_t sso_cclk_dis : 1;
+ uint64_t soc_ccam_dis : 1;
+ uint64_t rwq_alloc_dis : 1;
+ uint64_t qck_sw_dis : 1;
+ uint64_t qck_gw_rsp_dis : 1;
+ uint64_t qck_gw_rsp_adj : 3;
+ uint64_t reserved_16_63 : 48;
+#endif
+ } s;
+ struct cvmx_sso_cfg_s cn68xx;
+ struct cvmx_sso_cfg_cn68xxp1 {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_8_63 : 56;
+ uint64_t rwo_flush : 1; /**< Flush RWO engine
+ Allows outbound NCB entries to go immediately rather
+ than waiting for a complete fill packet. This register
+ is one-shot and clears itself each time it is set. */
+ uint64_t wfe_thr : 1; /**< Use 1 Work-fetch engine (instead of 4) */
+ uint64_t rwio_byp_dis : 1; /**< Disable Bypass path in RWI/RWO Engines */
+ uint64_t rwq_byp_dis : 1; /**< Disable Bypass path in RWQ Engine */
+ uint64_t stt : 1; /**< STT Setting for RW Stores */
+ uint64_t ldt : 1; /**< LDT Setting for RW Loads */
+ uint64_t dwb : 1; /**< DWB Setting for Return Page Requests
+ 1 = 2 128B cache pages to issue DWB for
+ 0 = 0 128B cache pages ro issue DWB for */
+ uint64_t rwen : 1; /**< Enable RWI/RWO operations
+ This bit should be set after SSO_RWQ_HEAD_PTRX and
+ SSO_RWQ_TAIL_PTRX have been programmed. */
+#else
+ uint64_t rwen : 1;
+ uint64_t dwb : 1;
+ uint64_t ldt : 1;
+ uint64_t stt : 1;
+ uint64_t rwq_byp_dis : 1;
+ uint64_t rwio_byp_dis : 1;
+ uint64_t wfe_thr : 1;
+ uint64_t rwo_flush : 1;
+ uint64_t reserved_8_63 : 56;
+#endif
+ } cn68xxp1;
+};
+typedef union cvmx_sso_cfg cvmx_sso_cfg_t;
+
+/**
+ * cvmx_sso_ds_pc
+ *
+ * SSO_DS_PC = SSO De-Schedule Performance Counter
+ *
+ * Counts the number of de-schedule requests.
+ * Counter rolls over through zero when max value exceeded.
+ */
+union cvmx_sso_ds_pc {
+ uint64_t u64;
+ struct cvmx_sso_ds_pc_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t ds_pc : 64; /**< De-schedule performance counter */
+#else
+ uint64_t ds_pc : 64;
+#endif
+ } s;
+ struct cvmx_sso_ds_pc_s cn68xx;
+ struct cvmx_sso_ds_pc_s cn68xxp1;
+};
+typedef union cvmx_sso_ds_pc cvmx_sso_ds_pc_t;
+
+/**
+ * cvmx_sso_err
+ *
+ * SSO_ERR = SSO Error Register
+ *
+ * Contains ECC and other misc error bits.
+ *
+ * <45> The free page error bit will assert when SSO_FPAGE_CNT <= 16 and
+ * SSO_CFG[RWEN] is 1. Software will want to disable the interrupt
+ * associated with this error when recovering SSO pointers from the
+ * FPA and SSO.
+ *
+ * This register also contains the illegal operation error bits:
+ *
+ * <42> Received ADDWQ with tag specified as EMPTY
+ * <41> Received illegal opcode
+ * <40> Received SWTAG/SWTAG_FULL/SWTAG_DESCH/DESCH/UPD_WQP/GET_WORK/ALLOC_WE
+ * from WS with CLR_NSCHED pending
+ * <39> Received CLR_NSCHED
+ * from WS with SWTAG_DESCH/DESCH/CLR_NSCHED pending
+ * <38> Received SWTAG/SWTAG_FULL/SWTAG_DESCH/DESCH/UPD_WQP/GET_WORK/ALLOC_WE
+ * from WS with ALLOC_WE pending
+ * <37> Received SWTAG/SWTAG_FULL/SWTAG_DESCH/DESCH/UPD_WQP/GET_WORK/ALLOC_WE/CLR_NSCHED
+ * from WS with GET_WORK pending
+ * <36> Received SWTAG_FULL/SWTAG_DESCH
+ * with tag specified as UNSCHEDULED
+ * <35> Received SWTAG/SWTAG_FULL/SWTAG_DESCH
+ * with tag specified as EMPTY
+ * <34> Received SWTAG/SWTAG_FULL/SWTAG_DESCH/GET_WORK
+ * from WS with pending tag switch to ORDERED or ATOMIC
+ * <33> Received SWTAG/SWTAG_DESCH/DESCH/UPD_WQP
+ * from WS in UNSCHEDULED state
+ * <32> Received SWTAG/SWTAG_FULL/SWTAG_DESCH/DESCH/UPD_WQP
+ * from WS in EMPTY state
+ */
+union cvmx_sso_err {
+ uint64_t u64;
+ struct cvmx_sso_err_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_48_63 : 16;
+ uint64_t bfp : 1; /**< Bad Fill Packet error
+ Last byte of the fill packet did not match 8'h1a */
+ uint64_t awe : 1; /**< Out-of-memory error (ADDWQ Request is dropped) */
+ uint64_t fpe : 1; /**< Free page error */
+ uint64_t reserved_43_44 : 2;
+ uint64_t iop : 11; /**< Illegal operation errors */
+ uint64_t reserved_12_31 : 20;
+ uint64_t pnd_dbe0 : 1; /**< Double bit error for even PND RAM */
+ uint64_t pnd_sbe0 : 1; /**< Single bit error for even PND RAM */
+ uint64_t pnd_dbe1 : 1; /**< Double bit error for odd PND RAM */
+ uint64_t pnd_sbe1 : 1; /**< Single bit error for odd PND RAM */
+ uint64_t oth_dbe0 : 1; /**< Double bit error for even OTH RAM */
+ uint64_t oth_sbe0 : 1; /**< Single bit error for even OTH RAM */
+ uint64_t oth_dbe1 : 1; /**< Double bit error for odd OTH RAM */
+ uint64_t oth_sbe1 : 1; /**< Single bit error for odd OTH RAM */
+ uint64_t idx_dbe : 1; /**< Double bit error for IDX RAM */
+ uint64_t idx_sbe : 1; /**< Single bit error for IDX RAM */
+ uint64_t fidx_dbe : 1; /**< Double bit error for FIDX RAM */
+ uint64_t fidx_sbe : 1; /**< Single bit error for FIDX RAM */
+#else
+ uint64_t fidx_sbe : 1;
+ uint64_t fidx_dbe : 1;
+ uint64_t idx_sbe : 1;
+ uint64_t idx_dbe : 1;
+ uint64_t oth_sbe1 : 1;
+ uint64_t oth_dbe1 : 1;
+ uint64_t oth_sbe0 : 1;
+ uint64_t oth_dbe0 : 1;
+ uint64_t pnd_sbe1 : 1;
+ uint64_t pnd_dbe1 : 1;
+ uint64_t pnd_sbe0 : 1;
+ uint64_t pnd_dbe0 : 1;
+ uint64_t reserved_12_31 : 20;
+ uint64_t iop : 11;
+ uint64_t reserved_43_44 : 2;
+ uint64_t fpe : 1;
+ uint64_t awe : 1;
+ uint64_t bfp : 1;
+ uint64_t reserved_48_63 : 16;
+#endif
+ } s;
+ struct cvmx_sso_err_s cn68xx;
+ struct cvmx_sso_err_s cn68xxp1;
+};
+typedef union cvmx_sso_err cvmx_sso_err_t;
+
+/**
+ * cvmx_sso_err_enb
+ *
+ * SSO_ERR_ENB = SSO Error Enable Register
+ *
+ * Contains the interrupt enables corresponding to SSO_ERR.
+ */
+union cvmx_sso_err_enb {
+ uint64_t u64;
+ struct cvmx_sso_err_enb_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_48_63 : 16;
+ uint64_t bfp_ie : 1; /**< Bad Fill Packet error interrupt enable */
+ uint64_t awe_ie : 1; /**< Add-work error interrupt enable */
+ uint64_t fpe_ie : 1; /**< Free Page error interrupt enable */
+ uint64_t reserved_43_44 : 2;
+ uint64_t iop_ie : 11; /**< Illegal operation interrupt enables */
+ uint64_t reserved_12_31 : 20;
+ uint64_t pnd_dbe0_ie : 1; /**< Double bit error interrupt enable for even PND RAM */
+ uint64_t pnd_sbe0_ie : 1; /**< Single bit error interrupt enable for even PND RAM */
+ uint64_t pnd_dbe1_ie : 1; /**< Double bit error interrupt enable for odd PND RAM */
+ uint64_t pnd_sbe1_ie : 1; /**< Single bit error interrupt enable for odd PND RAM */
+ uint64_t oth_dbe0_ie : 1; /**< Double bit error interrupt enable for even OTH RAM */
+ uint64_t oth_sbe0_ie : 1; /**< Single bit error interrupt enable for even OTH RAM */
+ uint64_t oth_dbe1_ie : 1; /**< Double bit error interrupt enable for odd OTH RAM */
+ uint64_t oth_sbe1_ie : 1; /**< Single bit error interrupt enable for odd OTH RAM */
+ uint64_t idx_dbe_ie : 1; /**< Double bit error interrupt enable for IDX RAM */
+ uint64_t idx_sbe_ie : 1; /**< Single bit error interrupt enable for IDX RAM */
+ uint64_t fidx_dbe_ie : 1; /**< Double bit error interrupt enable for FIDX RAM */
+ uint64_t fidx_sbe_ie : 1; /**< Single bit error interrupt enable for FIDX RAM */
+#else
+ uint64_t fidx_sbe_ie : 1;
+ uint64_t fidx_dbe_ie : 1;
+ uint64_t idx_sbe_ie : 1;
+ uint64_t idx_dbe_ie : 1;
+ uint64_t oth_sbe1_ie : 1;
+ uint64_t oth_dbe1_ie : 1;
+ uint64_t oth_sbe0_ie : 1;
+ uint64_t oth_dbe0_ie : 1;
+ uint64_t pnd_sbe1_ie : 1;
+ uint64_t pnd_dbe1_ie : 1;
+ uint64_t pnd_sbe0_ie : 1;
+ uint64_t pnd_dbe0_ie : 1;
+ uint64_t reserved_12_31 : 20;
+ uint64_t iop_ie : 11;
+ uint64_t reserved_43_44 : 2;
+ uint64_t fpe_ie : 1;
+ uint64_t awe_ie : 1;
+ uint64_t bfp_ie : 1;
+ uint64_t reserved_48_63 : 16;
+#endif
+ } s;
+ struct cvmx_sso_err_enb_s cn68xx;
+ struct cvmx_sso_err_enb_s cn68xxp1;
+};
+typedef union cvmx_sso_err_enb cvmx_sso_err_enb_t;
+
+/**
+ * cvmx_sso_fidx_ecc_ctl
+ *
+ * SSO_FIDX_ECC_CTL = SSO FIDX ECC Control
+ *
+ */
+union cvmx_sso_fidx_ecc_ctl {
+ uint64_t u64;
+ struct cvmx_sso_fidx_ecc_ctl_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_3_63 : 61;
+ uint64_t flip_synd : 2; /**< Testing feature. Flip Syndrom to generate single or
+ double bit error for the FIDX RAM. */
+ uint64_t ecc_ena : 1; /**< ECC Enable: When set will enable the 5 bit ECC
+ correct logic for the FIDX RAM. */
+#else
+ uint64_t ecc_ena : 1;
+ uint64_t flip_synd : 2;
+ uint64_t reserved_3_63 : 61;
+#endif
+ } s;
+ struct cvmx_sso_fidx_ecc_ctl_s cn68xx;
+ struct cvmx_sso_fidx_ecc_ctl_s cn68xxp1;
+};
+typedef union cvmx_sso_fidx_ecc_ctl cvmx_sso_fidx_ecc_ctl_t;
+
+/**
+ * cvmx_sso_fidx_ecc_st
+ *
+ * SSO_FIDX_ECC_ST = SSO FIDX ECC Status
+ *
+ */
+union cvmx_sso_fidx_ecc_st {
+ uint64_t u64;
+ struct cvmx_sso_fidx_ecc_st_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_27_63 : 37;
+ uint64_t addr : 11; /**< Latch the address for latest sde/dbe occured
+ for the FIDX RAM */
+ uint64_t reserved_9_15 : 7;
+ uint64_t syndrom : 5; /**< Report the latest error syndrom for the
+ FIDX RAM */
+ uint64_t reserved_0_3 : 4;
+#else
+ uint64_t reserved_0_3 : 4;
+ uint64_t syndrom : 5;
+ uint64_t reserved_9_15 : 7;
+ uint64_t addr : 11;
+ uint64_t reserved_27_63 : 37;
+#endif
+ } s;
+ struct cvmx_sso_fidx_ecc_st_s cn68xx;
+ struct cvmx_sso_fidx_ecc_st_s cn68xxp1;
+};
+typedef union cvmx_sso_fidx_ecc_st cvmx_sso_fidx_ecc_st_t;
+
+/**
+ * cvmx_sso_fpage_cnt
+ *
+ * SSO_FPAGE_CNT = SSO Free Page Cnt
+ *
+ * This register keeps track of the number of free pages pointers available for use in external memory.
+ */
+union cvmx_sso_fpage_cnt {
+ uint64_t u64;
+ struct cvmx_sso_fpage_cnt_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_32_63 : 32;
+ uint64_t fpage_cnt : 32; /**< Free Page Cnt
+ HW updates this register. Writes to this register
+ are only for diagnostic purposes */
+#else
+ uint64_t fpage_cnt : 32;
+ uint64_t reserved_32_63 : 32;
+#endif
+ } s;
+ struct cvmx_sso_fpage_cnt_s cn68xx;
+ struct cvmx_sso_fpage_cnt_s cn68xxp1;
+};
+typedef union cvmx_sso_fpage_cnt cvmx_sso_fpage_cnt_t;
+
+/**
+ * cvmx_sso_gwe_cfg
+ *
+ * SSO_GWE_CFG = SSO Get-Work Examiner Configuration
+ *
+ * This register controls the operation of the Get-Work Examiner (GWE)
+ */
+union cvmx_sso_gwe_cfg {
+ uint64_t u64;
+ struct cvmx_sso_gwe_cfg_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_12_63 : 52;
+ uint64_t odu_ffpgw_dis : 1; /**< Disable flushing ODU on periodic restart of GWE */
+ uint64_t gwe_rfpgw_dis : 1; /**< Disable periodic restart of GWE for pending get_work */
+ uint64_t odu_prf_dis : 1; /**< Disable ODU-initiated prefetches of WQEs into L2C
+ For diagnostic use only. */
+ uint64_t odu_bmp_dis : 1; /**< Disable ODU bumps.
+ If SSO_PP_STRICT is true, could
+ prevent forward progress under some circumstances.
+ For diagnostic use only. */
+ uint64_t reserved_5_7 : 3;
+ uint64_t gwe_hvy_dis : 1; /**< Disable GWE automatic, proportional weight-increase
+ mechanism and use SSO_QOSX_RND values as-is.
+ For diagnostic use only. */
+ uint64_t gwe_poe : 1; /**< Pause GWE on extracts
+ For diagnostic use only. */
+ uint64_t gwe_fpor : 1; /**< Flush GWE pipeline when restarting GWE.
+ For diagnostic use only. */
+ uint64_t gwe_rah : 1; /**< Begin at head of input queues when restarting GWE.
+ For diagnostic use only. */
+ uint64_t gwe_dis : 1; /**< Disable Get-Work Examiner */
+#else
+ uint64_t gwe_dis : 1;
+ uint64_t gwe_rah : 1;
+ uint64_t gwe_fpor : 1;
+ uint64_t gwe_poe : 1;
+ uint64_t gwe_hvy_dis : 1;
+ uint64_t reserved_5_7 : 3;
+ uint64_t odu_bmp_dis : 1;
+ uint64_t odu_prf_dis : 1;
+ uint64_t gwe_rfpgw_dis : 1;
+ uint64_t odu_ffpgw_dis : 1;
+ uint64_t reserved_12_63 : 52;
+#endif
+ } s;
+ struct cvmx_sso_gwe_cfg_s cn68xx;
+ struct cvmx_sso_gwe_cfg_cn68xxp1 {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_4_63 : 60;
+ uint64_t gwe_poe : 1; /**< Pause GWE on extracts
+ For diagnostic use only. */
+ uint64_t gwe_fpor : 1; /**< Flush GWE pipeline when restarting GWE.
+ For diagnostic use only. */
+ uint64_t gwe_rah : 1; /**< Begin at head of input queues when restarting GWE.
+ For diagnostic use only. */
+ uint64_t gwe_dis : 1; /**< Disable Get-Work Examiner */
+#else
+ uint64_t gwe_dis : 1;
+ uint64_t gwe_rah : 1;
+ uint64_t gwe_fpor : 1;
+ uint64_t gwe_poe : 1;
+ uint64_t reserved_4_63 : 60;
+#endif
+ } cn68xxp1;
+};
+typedef union cvmx_sso_gwe_cfg cvmx_sso_gwe_cfg_t;
+
+/**
+ * cvmx_sso_idx_ecc_ctl
+ *
+ * SSO_IDX_ECC_CTL = SSO IDX ECC Control
+ *
+ */
+union cvmx_sso_idx_ecc_ctl {
+ uint64_t u64;
+ struct cvmx_sso_idx_ecc_ctl_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_3_63 : 61;
+ uint64_t flip_synd : 2; /**< Testing feature. Flip Syndrom to generate single or
+ double bit error for the IDX RAM. */
+ uint64_t ecc_ena : 1; /**< ECC Enable: When set will enable the 5 bit ECC
+ correct logic for the IDX RAM. */
+#else
+ uint64_t ecc_ena : 1;
+ uint64_t flip_synd : 2;
+ uint64_t reserved_3_63 : 61;
+#endif
+ } s;
+ struct cvmx_sso_idx_ecc_ctl_s cn68xx;
+ struct cvmx_sso_idx_ecc_ctl_s cn68xxp1;
+};
+typedef union cvmx_sso_idx_ecc_ctl cvmx_sso_idx_ecc_ctl_t;
+
+/**
+ * cvmx_sso_idx_ecc_st
+ *
+ * SSO_IDX_ECC_ST = SSO IDX ECC Status
+ *
+ */
+union cvmx_sso_idx_ecc_st {
+ uint64_t u64;
+ struct cvmx_sso_idx_ecc_st_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_27_63 : 37;
+ uint64_t addr : 11; /**< Latch the address for latest sde/dbe occured
+ for the IDX RAM */
+ uint64_t reserved_9_15 : 7;
+ uint64_t syndrom : 5; /**< Report the latest error syndrom for the
+ IDX RAM */
+ uint64_t reserved_0_3 : 4;
+#else
+ uint64_t reserved_0_3 : 4;
+ uint64_t syndrom : 5;
+ uint64_t reserved_9_15 : 7;
+ uint64_t addr : 11;
+ uint64_t reserved_27_63 : 37;
+#endif
+ } s;
+ struct cvmx_sso_idx_ecc_st_s cn68xx;
+ struct cvmx_sso_idx_ecc_st_s cn68xxp1;
+};
+typedef union cvmx_sso_idx_ecc_st cvmx_sso_idx_ecc_st_t;
+
+/**
+ * cvmx_sso_iq_cnt#
+ *
+ * CSR reserved addresses: (64): 0x8200..0x83f8
+ * CSR align addresses: ===========================================================================================================
+ * SSO_IQ_CNTX = SSO Input Queue Count Register
+ * (one per QOS level)
+ *
+ * Contains a read-only count of the number of work queue entries for each QOS
+ * level. Counts both in-unit and in-memory entries.
+ */
+union cvmx_sso_iq_cntx {
+ uint64_t u64;
+ struct cvmx_sso_iq_cntx_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_32_63 : 32;
+ uint64_t iq_cnt : 32; /**< Input queue count for QOS level X */
+#else
+ uint64_t iq_cnt : 32;
+ uint64_t reserved_32_63 : 32;
+#endif
+ } s;
+ struct cvmx_sso_iq_cntx_s cn68xx;
+ struct cvmx_sso_iq_cntx_s cn68xxp1;
+};
+typedef union cvmx_sso_iq_cntx cvmx_sso_iq_cntx_t;
+
+/**
+ * cvmx_sso_iq_com_cnt
+ *
+ * SSO_IQ_COM_CNT = SSO Input Queue Combined Count Register
+ *
+ * Contains a read-only count of the total number of work queue entries in all
+ * QOS levels. Counts both in-unit and in-memory entries.
+ */
+union cvmx_sso_iq_com_cnt {
+ uint64_t u64;
+ struct cvmx_sso_iq_com_cnt_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_32_63 : 32;
+ uint64_t iq_cnt : 32; /**< Input queue combined count */
+#else
+ uint64_t iq_cnt : 32;
+ uint64_t reserved_32_63 : 32;
+#endif
+ } s;
+ struct cvmx_sso_iq_com_cnt_s cn68xx;
+ struct cvmx_sso_iq_com_cnt_s cn68xxp1;
+};
+typedef union cvmx_sso_iq_com_cnt cvmx_sso_iq_com_cnt_t;
+
+/**
+ * cvmx_sso_iq_int
+ *
+ * SSO_IQ_INT = SSO Input Queue Interrupt Register
+ *
+ * Contains the bits (one per QOS level) that can trigger the input queue
+ * interrupt. An IQ_INT bit will be set if SSO_IQ_CNT#QOS# changes and the
+ * resulting value is equal to SSO_IQ_THR#QOS#.
+ */
+union cvmx_sso_iq_int {
+ uint64_t u64;
+ struct cvmx_sso_iq_int_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_8_63 : 56;
+ uint64_t iq_int : 8; /**< Input queue interrupt bits */
+#else
+ uint64_t iq_int : 8;
+ uint64_t reserved_8_63 : 56;
+#endif
+ } s;
+ struct cvmx_sso_iq_int_s cn68xx;
+ struct cvmx_sso_iq_int_s cn68xxp1;
+};
+typedef union cvmx_sso_iq_int cvmx_sso_iq_int_t;
+
+/**
+ * cvmx_sso_iq_int_en
+ *
+ * SSO_IQ_INT_EN = SSO Input Queue Interrupt Enable Register
+ *
+ * Contains the bits (one per QOS level) that enable the input queue interrupt.
+ */
+union cvmx_sso_iq_int_en {
+ uint64_t u64;
+ struct cvmx_sso_iq_int_en_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_8_63 : 56;
+ uint64_t int_en : 8; /**< Input queue interrupt enable bits */
+#else
+ uint64_t int_en : 8;
+ uint64_t reserved_8_63 : 56;
+#endif
+ } s;
+ struct cvmx_sso_iq_int_en_s cn68xx;
+ struct cvmx_sso_iq_int_en_s cn68xxp1;
+};
+typedef union cvmx_sso_iq_int_en cvmx_sso_iq_int_en_t;
+
+/**
+ * cvmx_sso_iq_thr#
+ *
+ * CSR reserved addresses: (24): 0x9040..0x90f8
+ * CSR align addresses: ===========================================================================================================
+ * SSO_IQ_THRX = SSO Input Queue Threshold Register
+ * (one per QOS level)
+ *
+ * Threshold value for triggering input queue interrupts.
+ */
+union cvmx_sso_iq_thrx {
+ uint64_t u64;
+ struct cvmx_sso_iq_thrx_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_32_63 : 32;
+ uint64_t iq_thr : 32; /**< Input queue threshold for QOS level X */
+#else
+ uint64_t iq_thr : 32;
+ uint64_t reserved_32_63 : 32;
+#endif
+ } s;
+ struct cvmx_sso_iq_thrx_s cn68xx;
+ struct cvmx_sso_iq_thrx_s cn68xxp1;
+};
+typedef union cvmx_sso_iq_thrx cvmx_sso_iq_thrx_t;
+
+/**
+ * cvmx_sso_nos_cnt
+ *
+ * SSO_NOS_CNT = SSO No-schedule Count Register
+ *
+ * Contains the number of work queue entries on the no-schedule list.
+ */
+union cvmx_sso_nos_cnt {
+ uint64_t u64;
+ struct cvmx_sso_nos_cnt_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_12_63 : 52;
+ uint64_t nos_cnt : 12; /**< Number of work queue entries on the no-schedule list */
+#else
+ uint64_t nos_cnt : 12;
+ uint64_t reserved_12_63 : 52;
+#endif
+ } s;
+ struct cvmx_sso_nos_cnt_s cn68xx;
+ struct cvmx_sso_nos_cnt_s cn68xxp1;
+};
+typedef union cvmx_sso_nos_cnt cvmx_sso_nos_cnt_t;
+
+/**
+ * cvmx_sso_nw_tim
+ *
+ * SSO_NW_TIM = SSO New Work Timer Period Register
+ *
+ * Sets the minimum period for a new work request timeout. Period is specified
+ * in n-1 notation where the increment value is 1024 clock cycles. Thus, a
+ * value of 0x0 in this register translates to 1024 cycles, 0x1 translates to
+ * 2048 cycles, 0x2 translates to 3072 cycles, etc... Note: the maximum period
+ * for a new work request timeout is 2 times the minimum period. Note: the new
+ * work request timeout counter is reset when this register is written.
+ *
+ * There are two new work request timeout cases:
+ *
+ * - WAIT bit clear. The new work request can timeout if the timer expires
+ * before the pre-fetch engine has reached the end of all work queues. This
+ * can occur if the executable work queue entry is deep in the queue and the
+ * pre-fetch engine is subject to many resets (i.e. high switch, de-schedule,
+ * or new work load from other PP's). Thus, it is possible for a PP to
+ * receive a work response with the NO_WORK bit set even though there was at
+ * least one executable entry in the work queues. The other (and typical)
+ * scenario for receiving a NO_WORK response with the WAIT bit clear is that
+ * the pre-fetch engine has reached the end of all work queues without
+ * finding executable work.
+ *
+ * - WAIT bit set. The new work request can timeout if the timer expires
+ * before the pre-fetch engine has found executable work. In this case, the
+ * only scenario where the PP will receive a work response with the NO_WORK
+ * bit set is if the timer expires. Note: it is still possible for a PP to
+ * receive a NO_WORK response even though there was at least one executable
+ * entry in the work queues.
+ *
+ * In either case, it's important to note that switches and de-schedules are
+ * higher priority operations that can cause the pre-fetch engine to reset.
+ * Thus in a system with many switches or de-schedules occurring, it's possible
+ * for the new work timer to expire (resulting in NO_WORK responses) before the
+ * pre-fetch engine is able to get very deep into the work queues.
+ */
+union cvmx_sso_nw_tim {
+ uint64_t u64;
+ struct cvmx_sso_nw_tim_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_10_63 : 54;
+ uint64_t nw_tim : 10; /**< New work timer period */
+#else
+ uint64_t nw_tim : 10;
+ uint64_t reserved_10_63 : 54;
+#endif
+ } s;
+ struct cvmx_sso_nw_tim_s cn68xx;
+ struct cvmx_sso_nw_tim_s cn68xxp1;
+};
+typedef union cvmx_sso_nw_tim cvmx_sso_nw_tim_t;
+
+/**
+ * cvmx_sso_oth_ecc_ctl
+ *
+ * SSO_OTH_ECC_CTL = SSO OTH ECC Control
+ *
+ */
+union cvmx_sso_oth_ecc_ctl {
+ uint64_t u64;
+ struct cvmx_sso_oth_ecc_ctl_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_6_63 : 58;
+ uint64_t flip_synd1 : 2; /**< Testing feature. Flip Syndrom to generate single or
+ double bit error for the odd OTH RAM. */
+ uint64_t ecc_ena1 : 1; /**< ECC Enable: When set will enable the 7 bit ECC
+ correct logic for the odd OTH RAM. */
+ uint64_t flip_synd0 : 2; /**< Testing feature. Flip Syndrom to generate single or
+ double bit error for the even OTH RAM. */
+ uint64_t ecc_ena0 : 1; /**< ECC Enable: When set will enable the 7 bit ECC
+ correct logic for the even OTH RAM. */
+#else
+ uint64_t ecc_ena0 : 1;
+ uint64_t flip_synd0 : 2;
+ uint64_t ecc_ena1 : 1;
+ uint64_t flip_synd1 : 2;
+ uint64_t reserved_6_63 : 58;
+#endif
+ } s;
+ struct cvmx_sso_oth_ecc_ctl_s cn68xx;
+ struct cvmx_sso_oth_ecc_ctl_s cn68xxp1;
+};
+typedef union cvmx_sso_oth_ecc_ctl cvmx_sso_oth_ecc_ctl_t;
+
+/**
+ * cvmx_sso_oth_ecc_st
+ *
+ * SSO_OTH_ECC_ST = SSO OTH ECC Status
+ *
+ */
+union cvmx_sso_oth_ecc_st {
+ uint64_t u64;
+ struct cvmx_sso_oth_ecc_st_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_59_63 : 5;
+ uint64_t addr1 : 11; /**< Latch the address for latest sde/dbe occured
+ for the odd OTH RAM */
+ uint64_t reserved_43_47 : 5;
+ uint64_t syndrom1 : 7; /**< Report the latest error syndrom for the odd
+ OTH RAM */
+ uint64_t reserved_27_35 : 9;
+ uint64_t addr0 : 11; /**< Latch the address for latest sde/dbe occured
+ for the even OTH RAM */
+ uint64_t reserved_11_15 : 5;
+ uint64_t syndrom0 : 7; /**< Report the latest error syndrom for the even
+ OTH RAM */
+ uint64_t reserved_0_3 : 4;
+#else
+ uint64_t reserved_0_3 : 4;
+ uint64_t syndrom0 : 7;
+ uint64_t reserved_11_15 : 5;
+ uint64_t addr0 : 11;
+ uint64_t reserved_27_35 : 9;
+ uint64_t syndrom1 : 7;
+ uint64_t reserved_43_47 : 5;
+ uint64_t addr1 : 11;
+ uint64_t reserved_59_63 : 5;
+#endif
+ } s;
+ struct cvmx_sso_oth_ecc_st_s cn68xx;
+ struct cvmx_sso_oth_ecc_st_s cn68xxp1;
+};
+typedef union cvmx_sso_oth_ecc_st cvmx_sso_oth_ecc_st_t;
+
+/**
+ * cvmx_sso_pnd_ecc_ctl
+ *
+ * SSO_PND_ECC_CTL = SSO PND ECC Control
+ *
+ */
+union cvmx_sso_pnd_ecc_ctl {
+ uint64_t u64;
+ struct cvmx_sso_pnd_ecc_ctl_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_6_63 : 58;
+ uint64_t flip_synd1 : 2; /**< Testing feature. Flip Syndrom to generate single or
+ double bit error for the odd PND RAM. */
+ uint64_t ecc_ena1 : 1; /**< ECC Enable: When set will enable the 7 bit ECC
+ correct logic for the odd PND RAM. */
+ uint64_t flip_synd0 : 2; /**< Testing feature. Flip Syndrom to generate single or
+ double bit error for the even PND RAM. */
+ uint64_t ecc_ena0 : 1; /**< ECC Enable: When set will enable the 7 bit ECC
+ correct logic for the even PND RAM. */
+#else
+ uint64_t ecc_ena0 : 1;
+ uint64_t flip_synd0 : 2;
+ uint64_t ecc_ena1 : 1;
+ uint64_t flip_synd1 : 2;
+ uint64_t reserved_6_63 : 58;
+#endif
+ } s;
+ struct cvmx_sso_pnd_ecc_ctl_s cn68xx;
+ struct cvmx_sso_pnd_ecc_ctl_s cn68xxp1;
+};
+typedef union cvmx_sso_pnd_ecc_ctl cvmx_sso_pnd_ecc_ctl_t;
+
+/**
+ * cvmx_sso_pnd_ecc_st
+ *
+ * SSO_PND_ECC_ST = SSO PND ECC Status
+ *
+ */
+union cvmx_sso_pnd_ecc_st {
+ uint64_t u64;
+ struct cvmx_sso_pnd_ecc_st_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_59_63 : 5;
+ uint64_t addr1 : 11; /**< Latch the address for latest sde/dbe occured
+ for the odd PND RAM */
+ uint64_t reserved_43_47 : 5;
+ uint64_t syndrom1 : 7; /**< Report the latest error syndrom for the odd
+ PND RAM */
+ uint64_t reserved_27_35 : 9;
+ uint64_t addr0 : 11; /**< Latch the address for latest sde/dbe occured
+ for the even PND RAM */
+ uint64_t reserved_11_15 : 5;
+ uint64_t syndrom0 : 7; /**< Report the latest error syndrom for the even
+ PND RAM */
+ uint64_t reserved_0_3 : 4;
+#else
+ uint64_t reserved_0_3 : 4;
+ uint64_t syndrom0 : 7;
+ uint64_t reserved_11_15 : 5;
+ uint64_t addr0 : 11;
+ uint64_t reserved_27_35 : 9;
+ uint64_t syndrom1 : 7;
+ uint64_t reserved_43_47 : 5;
+ uint64_t addr1 : 11;
+ uint64_t reserved_59_63 : 5;
+#endif
+ } s;
+ struct cvmx_sso_pnd_ecc_st_s cn68xx;
+ struct cvmx_sso_pnd_ecc_st_s cn68xxp1;
+};
+typedef union cvmx_sso_pnd_ecc_st cvmx_sso_pnd_ecc_st_t;
+
+/**
+ * cvmx_sso_pp#_grp_msk
+ *
+ * CSR reserved addresses: (24): 0x5040..0x50f8
+ * CSR align addresses: ===========================================================================================================
+ * SSO_PPX_GRP_MSK = SSO PP Group Mask Register
+ * (one bit per group per PP)
+ *
+ * Selects which group(s) a PP belongs to. A '1' in any bit position sets the
+ * PP's membership in the corresponding group. A value of 0x0 will prevent the
+ * PP from receiving new work.
+ *
+ * Note that these do not contain QOS level priorities for each PP. This is a
+ * change from previous POW designs.
+ */
+union cvmx_sso_ppx_grp_msk {
+ uint64_t u64;
+ struct cvmx_sso_ppx_grp_msk_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t grp_msk : 64; /**< PPX group mask */
+#else
+ uint64_t grp_msk : 64;
+#endif
+ } s;
+ struct cvmx_sso_ppx_grp_msk_s cn68xx;
+ struct cvmx_sso_ppx_grp_msk_s cn68xxp1;
+};
+typedef union cvmx_sso_ppx_grp_msk cvmx_sso_ppx_grp_msk_t;
+
+/**
+ * cvmx_sso_pp#_qos_pri
+ *
+ * CSR reserved addresses: (56): 0x2040..0x21f8
+ * CSR align addresses: ===========================================================================================================
+ * SSO_PP(0..31)_QOS_PRI = SSO PP QOS Priority Register
+ * (one field per IQ per PP)
+ *
+ * Contains the QOS level priorities for each PP.
+ * 0x0 is the highest priority
+ * 0x7 is the lowest priority
+ * 0xf prevents the PP from receiving work from that QOS level
+ * 0x8-0xe Reserved
+ *
+ * For a given PP, priorities should begin at 0x0, and remain contiguous
+ * throughout the range. Failure to do so may result in severe
+ * performance degradation.
+ *
+ *
+ * Priorities for IQs 0..7
+ */
+union cvmx_sso_ppx_qos_pri {
+ uint64_t u64;
+ struct cvmx_sso_ppx_qos_pri_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_60_63 : 4;
+ uint64_t qos7_pri : 4; /**< QOS7 priority for PPX */
+ uint64_t reserved_52_55 : 4;
+ uint64_t qos6_pri : 4; /**< QOS6 priority for PPX */
+ uint64_t reserved_44_47 : 4;
+ uint64_t qos5_pri : 4; /**< QOS5 priority for PPX */
+ uint64_t reserved_36_39 : 4;
+ uint64_t qos4_pri : 4; /**< QOS4 priority for PPX */
+ uint64_t reserved_28_31 : 4;
+ uint64_t qos3_pri : 4; /**< QOS3 priority for PPX */
+ uint64_t reserved_20_23 : 4;
+ uint64_t qos2_pri : 4; /**< QOS2 priority for PPX */
+ uint64_t reserved_12_15 : 4;
+ uint64_t qos1_pri : 4; /**< QOS1 priority for PPX */
+ uint64_t reserved_4_7 : 4;
+ uint64_t qos0_pri : 4; /**< QOS0 priority for PPX */
+#else
+ uint64_t qos0_pri : 4;
+ uint64_t reserved_4_7 : 4;
+ uint64_t qos1_pri : 4;
+ uint64_t reserved_12_15 : 4;
+ uint64_t qos2_pri : 4;
+ uint64_t reserved_20_23 : 4;
+ uint64_t qos3_pri : 4;
+ uint64_t reserved_28_31 : 4;
+ uint64_t qos4_pri : 4;
+ uint64_t reserved_36_39 : 4;
+ uint64_t qos5_pri : 4;
+ uint64_t reserved_44_47 : 4;
+ uint64_t qos6_pri : 4;
+ uint64_t reserved_52_55 : 4;
+ uint64_t qos7_pri : 4;
+ uint64_t reserved_60_63 : 4;
+#endif
+ } s;
+ struct cvmx_sso_ppx_qos_pri_s cn68xx;
+ struct cvmx_sso_ppx_qos_pri_s cn68xxp1;
+};
+typedef union cvmx_sso_ppx_qos_pri cvmx_sso_ppx_qos_pri_t;
+
+/**
+ * cvmx_sso_pp_strict
+ *
+ * SSO_PP_STRICT = SSO Strict Priority
+ *
+ * This register controls getting work from the input queues. If the bit
+ * corresponding to a PP is set, that PP will not take work off the input
+ * queues until it is known that there is no higher-priority work available.
+ *
+ * Setting SSO_PP_STRICT may incur a performance penalty if highest-priority
+ * work is not found early.
+ *
+ * It is possible to starve a PP of work with SSO_PP_STRICT. If the
+ * SSO_PPX_GRP_MSK for a PP masks-out much of the work added to the input
+ * queues that are higher-priority for that PP, and if there is a constant
+ * stream of work through one or more of those higher-priority input queues,
+ * then that PP may not accept work from lower-priority input queues. This can
+ * be alleviated by ensuring that most or all the work added to the
+ * higher-priority input queues for a PP with SSO_PP_STRICT set are in a group
+ * acceptable to that PP.
+ *
+ * It is also possible to neglect work in an input queue if SSO_PP_STRICT is
+ * used. If an input queue is a lower-priority queue for all PPs, and if all
+ * the PPs have their corresponding bit in SSO_PP_STRICT set, then work may
+ * never be taken (or be seldom taken) from that queue. This can be alleviated
+ * by ensuring that work in all input queues can be serviced by one or more PPs
+ * that do not have SSO_PP_STRICT set, or that the input queue is the
+ * highest-priority input queue for one or more PPs that do have SSO_PP_STRICT
+ * set.
+ */
+union cvmx_sso_pp_strict {
+ uint64_t u64;
+ struct cvmx_sso_pp_strict_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_32_63 : 32;
+ uint64_t pp_strict : 32; /**< Corresponding PP operates in strict mode. */
+#else
+ uint64_t pp_strict : 32;
+ uint64_t reserved_32_63 : 32;
+#endif
+ } s;
+ struct cvmx_sso_pp_strict_s cn68xx;
+ struct cvmx_sso_pp_strict_s cn68xxp1;
+};
+typedef union cvmx_sso_pp_strict cvmx_sso_pp_strict_t;
+
+/**
+ * cvmx_sso_qos#_rnd
+ *
+ * CSR align addresses: ===========================================================================================================
+ * SSO_QOS(0..7)_RND = SSO QOS Issue Round Register
+ * (one per IQ)
+ *
+ * The number of arbitration rounds each QOS level participates in.
+ */
+union cvmx_sso_qosx_rnd {
+ uint64_t u64;
+ struct cvmx_sso_qosx_rnd_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_8_63 : 56;
+ uint64_t rnds_qos : 8; /**< Number of rounds to participate in for IQ(X). */
+#else
+ uint64_t rnds_qos : 8;
+ uint64_t reserved_8_63 : 56;
+#endif
+ } s;
+ struct cvmx_sso_qosx_rnd_s cn68xx;
+ struct cvmx_sso_qosx_rnd_s cn68xxp1;
+};
+typedef union cvmx_sso_qosx_rnd cvmx_sso_qosx_rnd_t;
+
+/**
+ * cvmx_sso_qos_thr#
+ *
+ * CSR reserved addresses: (24): 0xa040..0xa0f8
+ * CSR align addresses: ===========================================================================================================
+ * SSO_QOS_THRX = SSO QOS Threshold Register
+ * (one per QOS level)
+ *
+ * Contains the thresholds for allocating SSO internal storage buffers. If the
+ * number of remaining free buffers drops below the minimum threshold (MIN_THR)
+ * or the number of allocated buffers for this QOS level rises above the
+ * maximum threshold (MAX_THR), future incoming work queue entries will be
+ * buffered externally rather than internally. This register also contains the
+ * number of internal buffers currently allocated to this QOS level (BUF_CNT).
+ */
+union cvmx_sso_qos_thrx {
+ uint64_t u64;
+ struct cvmx_sso_qos_thrx_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_40_63 : 24;
+ uint64_t buf_cnt : 12; /**< # of internal buffers allocated to QOS level X */
+ uint64_t reserved_26_27 : 2;
+ uint64_t max_thr : 12; /**< Max threshold for QOS level X
+ For performance reasons, MAX_THR can have a slop of 4
+ WQE for QOS level X. */
+ uint64_t reserved_12_13 : 2;
+ uint64_t min_thr : 12; /**< Min threshold for QOS level X
+ For performance reasons, MIN_THR can have a slop of 4
+ WQEs for QOS level X. */
+#else
+ uint64_t min_thr : 12;
+ uint64_t reserved_12_13 : 2;
+ uint64_t max_thr : 12;
+ uint64_t reserved_26_27 : 2;
+ uint64_t buf_cnt : 12;
+ uint64_t reserved_40_63 : 24;
+#endif
+ } s;
+ struct cvmx_sso_qos_thrx_s cn68xx;
+ struct cvmx_sso_qos_thrx_s cn68xxp1;
+};
+typedef union cvmx_sso_qos_thrx cvmx_sso_qos_thrx_t;
+
+/**
+ * cvmx_sso_qos_we
+ *
+ * SSO_QOS_WE = SSO WE Buffers
+ *
+ * This register contains a read-only count of the current number of free
+ * buffers (FREE_CNT) and the total number of tag chain heads on the de-schedule list
+ * (DES_CNT) (which is not the same as the total number of entries on all of the descheduled
+ * tag chains.)
+ */
+union cvmx_sso_qos_we {
+ uint64_t u64;
+ struct cvmx_sso_qos_we_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_26_63 : 38;
+ uint64_t des_cnt : 12; /**< Number of buffers on de-schedule list */
+ uint64_t reserved_12_13 : 2;
+ uint64_t free_cnt : 12; /**< Number of total free buffers */
+#else
+ uint64_t free_cnt : 12;
+ uint64_t reserved_12_13 : 2;
+ uint64_t des_cnt : 12;
+ uint64_t reserved_26_63 : 38;
+#endif
+ } s;
+ struct cvmx_sso_qos_we_s cn68xx;
+ struct cvmx_sso_qos_we_s cn68xxp1;
+};
+typedef union cvmx_sso_qos_we cvmx_sso_qos_we_t;
+
+/**
+ * cvmx_sso_reset
+ *
+ * SSO_RESET = SSO Soft Reset
+ *
+ * Writing a one to SSO_RESET[RESET] will reset the SSO. After receiving a
+ * store to this CSR, the SSO must not be sent any other operations for 2500
+ * sclk cycles.
+ *
+ * Note that the contents of this register are reset along with the rest of the
+ * SSO.
+ *
+ * IMPLEMENTATION NOTES--NOT FOR SPEC:
+ * The SSO must return the bus credit associated with the CSR store used
+ * to write this register before reseting itself. And the RSL tree
+ * that passes through the SSO must continue to work for RSL operations
+ * that do not target the SSO itself.
+ */
+union cvmx_sso_reset {
+ uint64_t u64;
+ struct cvmx_sso_reset_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_1_63 : 63;
+ uint64_t reset : 1; /**< Reset the SSO */
+#else
+ uint64_t reset : 1;
+ uint64_t reserved_1_63 : 63;
+#endif
+ } s;
+ struct cvmx_sso_reset_s cn68xx;
+};
+typedef union cvmx_sso_reset cvmx_sso_reset_t;
+
+/**
+ * cvmx_sso_rwq_head_ptr#
+ *
+ * CSR reserved addresses: (24): 0xb040..0xb0f8
+ * CSR align addresses: ===========================================================================================================
+ * SSO_RWQ_HEAD_PTRX = SSO Remote Queue Head Register
+ * (one per QOS level)
+ * Contains the ptr to the first entry of the remote linked list(s) for a particular
+ * QoS level. SW should initialize the remote linked list(s) by programming
+ * SSO_RWQ_HEAD_PTRX and SSO_RWQ_TAIL_PTRX to identical values.
+ */
+union cvmx_sso_rwq_head_ptrx {
+ uint64_t u64;
+ struct cvmx_sso_rwq_head_ptrx_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_38_63 : 26;
+ uint64_t ptr : 31; /**< Head Pointer */
+ uint64_t reserved_5_6 : 2;
+ uint64_t rctr : 5; /**< Index of next WQE entry in fill packet to be
+ processed (inbound queues) */
+#else
+ uint64_t rctr : 5;
+ uint64_t reserved_5_6 : 2;
+ uint64_t ptr : 31;
+ uint64_t reserved_38_63 : 26;
+#endif
+ } s;
+ struct cvmx_sso_rwq_head_ptrx_s cn68xx;
+ struct cvmx_sso_rwq_head_ptrx_s cn68xxp1;
+};
+typedef union cvmx_sso_rwq_head_ptrx cvmx_sso_rwq_head_ptrx_t;
+
+/**
+ * cvmx_sso_rwq_pop_fptr
+ *
+ * SSO_RWQ_POP_FPTR = SSO Pop Free Pointer
+ *
+ * This register is used by SW to remove pointers for buffer-reallocation and diagnostics, and
+ * should only be used when SSO is idle.
+ *
+ * To remove ALL pointers, software must insure that there are modulus 16
+ * pointers in the FPA. To do this, SSO_CFG.RWQ_BYP_DIS must be set, the FPA
+ * pointer count read, and enough fake buffers pushed via SSO_RWQ_PSH_FPTR to
+ * bring the FPA pointer count up to mod 16.
+ */
+union cvmx_sso_rwq_pop_fptr {
+ uint64_t u64;
+ struct cvmx_sso_rwq_pop_fptr_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t val : 1; /**< Free Pointer Valid */
+ uint64_t cnt : 6; /**< fptr_in count */
+ uint64_t reserved_38_56 : 19;
+ uint64_t fptr : 31; /**< Free Pointer */
+ uint64_t reserved_0_6 : 7;
+#else
+ uint64_t reserved_0_6 : 7;
+ uint64_t fptr : 31;
+ uint64_t reserved_38_56 : 19;
+ uint64_t cnt : 6;
+ uint64_t val : 1;
+#endif
+ } s;
+ struct cvmx_sso_rwq_pop_fptr_s cn68xx;
+ struct cvmx_sso_rwq_pop_fptr_cn68xxp1 {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t val : 1; /**< Free Pointer Valid */
+ uint64_t reserved_38_62 : 25;
+ uint64_t fptr : 31; /**< Free Pointer */
+ uint64_t reserved_0_6 : 7;
+#else
+ uint64_t reserved_0_6 : 7;
+ uint64_t fptr : 31;
+ uint64_t reserved_38_62 : 25;
+ uint64_t val : 1;
+#endif
+ } cn68xxp1;
+};
+typedef union cvmx_sso_rwq_pop_fptr cvmx_sso_rwq_pop_fptr_t;
+
+/**
+ * cvmx_sso_rwq_psh_fptr
+ *
+ * CSR reserved addresses: (56): 0xc240..0xc3f8
+ * SSO_RWQ_PSH_FPTR = SSO Free Pointer FIFO
+ *
+ * This register is used by SW to initialize the SSO with a pool of free
+ * pointers by writing the FPTR field whenever FULL = 0. Free pointers are
+ * fetched/released from/to the pool when accessing WQE entries stored remotely
+ * (in remote linked lists). Free pointers should be 128 byte aligned, each of
+ * 256 bytes. This register should only be used when SSO is idle.
+ *
+ * Software needs to set aside buffering for
+ * 8 + 48 + ROUNDUP(N/26)
+ *
+ * where as many as N DRAM work queue entries may be used. The first 8 buffers
+ * are used to setup the SSO_RWQ_HEAD_PTR and SSO_RWQ_TAIL_PTRs, and the
+ * remainder are pushed via this register.
+ *
+ * IMPLEMENTATION NOTES--NOT FOR SPEC:
+ * 48 avoids false out of buffer error due to (16) FPA and in-sso FPA buffering (32)
+ * 26 is number of WAE's per 256B buffer
+ */
+union cvmx_sso_rwq_psh_fptr {
+ uint64_t u64;
+ struct cvmx_sso_rwq_psh_fptr_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t full : 1; /**< FIFO Full. When set, the FPA is busy writing entries
+ and software must wait before adding new entries. */
+ uint64_t cnt : 4; /**< fptr_out count */
+ uint64_t reserved_38_58 : 21;
+ uint64_t fptr : 31; /**< Free Pointer */
+ uint64_t reserved_0_6 : 7;
+#else
+ uint64_t reserved_0_6 : 7;
+ uint64_t fptr : 31;
+ uint64_t reserved_38_58 : 21;
+ uint64_t cnt : 4;
+ uint64_t full : 1;
+#endif
+ } s;
+ struct cvmx_sso_rwq_psh_fptr_s cn68xx;
+ struct cvmx_sso_rwq_psh_fptr_cn68xxp1 {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t full : 1; /**< FIFO Full. When set, the FPA is busy writing entries
+ and software must wait before adding new entries. */
+ uint64_t reserved_38_62 : 25;
+ uint64_t fptr : 31; /**< Free Pointer */
+ uint64_t reserved_0_6 : 7;
+#else
+ uint64_t reserved_0_6 : 7;
+ uint64_t fptr : 31;
+ uint64_t reserved_38_62 : 25;
+ uint64_t full : 1;
+#endif
+ } cn68xxp1;
+};
+typedef union cvmx_sso_rwq_psh_fptr cvmx_sso_rwq_psh_fptr_t;
+
+/**
+ * cvmx_sso_rwq_tail_ptr#
+ *
+ * CSR reserved addresses: (56): 0xc040..0xc1f8
+ * SSO_RWQ_TAIL_PTRX = SSO Remote Queue Tail Register
+ * (one per QOS level)
+ * Contains the ptr to the last entry of the remote linked list(s) for a particular
+ * QoS level. SW must initialize the remote linked list(s) by programming
+ * SSO_RWQ_HEAD_PTRX and SSO_RWQ_TAIL_PTRX to identical values.
+ */
+union cvmx_sso_rwq_tail_ptrx {
+ uint64_t u64;
+ struct cvmx_sso_rwq_tail_ptrx_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_38_63 : 26;
+ uint64_t ptr : 31; /**< Tail Pointer */
+ uint64_t reserved_5_6 : 2;
+ uint64_t rctr : 5; /**< Number of entries waiting to be sent out to external
+ RAM (outbound queues) */
+#else
+ uint64_t rctr : 5;
+ uint64_t reserved_5_6 : 2;
+ uint64_t ptr : 31;
+ uint64_t reserved_38_63 : 26;
+#endif
+ } s;
+ struct cvmx_sso_rwq_tail_ptrx_s cn68xx;
+ struct cvmx_sso_rwq_tail_ptrx_s cn68xxp1;
+};
+typedef union cvmx_sso_rwq_tail_ptrx cvmx_sso_rwq_tail_ptrx_t;
+
+/**
+ * cvmx_sso_ts_pc
+ *
+ * SSO_TS_PC = SSO Tag Switch Performance Counter
+ *
+ * Counts the number of tag switch requests.
+ * Counter rolls over through zero when max value exceeded.
+ */
+union cvmx_sso_ts_pc {
+ uint64_t u64;
+ struct cvmx_sso_ts_pc_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t ts_pc : 64; /**< Tag switch performance counter */
+#else
+ uint64_t ts_pc : 64;
+#endif
+ } s;
+ struct cvmx_sso_ts_pc_s cn68xx;
+ struct cvmx_sso_ts_pc_s cn68xxp1;
+};
+typedef union cvmx_sso_ts_pc cvmx_sso_ts_pc_t;
+
+/**
+ * cvmx_sso_wa_com_pc
+ *
+ * SSO_WA_COM_PC = SSO Work Add Combined Performance Counter
+ *
+ * Counts the number of add new work requests for all QOS levels.
+ * Counter rolls over through zero when max value exceeded.
+ */
+union cvmx_sso_wa_com_pc {
+ uint64_t u64;
+ struct cvmx_sso_wa_com_pc_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t wa_pc : 64; /**< Work add combined performance counter */
+#else
+ uint64_t wa_pc : 64;
+#endif
+ } s;
+ struct cvmx_sso_wa_com_pc_s cn68xx;
+ struct cvmx_sso_wa_com_pc_s cn68xxp1;
+};
+typedef union cvmx_sso_wa_com_pc cvmx_sso_wa_com_pc_t;
+
+/**
+ * cvmx_sso_wa_pc#
+ *
+ * CSR reserved addresses: (64): 0x4200..0x43f8
+ * CSR align addresses: ===========================================================================================================
+ * SSO_WA_PCX = SSO Work Add Performance Counter
+ * (one per QOS level)
+ *
+ * Counts the number of add new work requests for each QOS level.
+ * Counter rolls over through zero when max value exceeded.
+ */
+union cvmx_sso_wa_pcx {
+ uint64_t u64;
+ struct cvmx_sso_wa_pcx_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t wa_pc : 64; /**< Work add performance counter for QOS level X */
+#else
+ uint64_t wa_pc : 64;
+#endif
+ } s;
+ struct cvmx_sso_wa_pcx_s cn68xx;
+ struct cvmx_sso_wa_pcx_s cn68xxp1;
+};
+typedef union cvmx_sso_wa_pcx cvmx_sso_wa_pcx_t;
+
+/**
+ * cvmx_sso_wq_int
+ *
+ * Note, the old POW offsets ran from 0x0 to 0x3f8, leaving the next available slot at 0x400.
+ * To ensure no overlap, start on 4k boundary: 0x1000.
+ * SSO_WQ_INT = SSO Work Queue Interrupt Register
+ *
+ * Contains the bits (one per group) that set work queue interrupts and are
+ * used to clear these interrupts. For more information regarding this
+ * register, see the interrupt section of the SSO spec.
+ */
+union cvmx_sso_wq_int {
+ uint64_t u64;
+ struct cvmx_sso_wq_int_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t wq_int : 64; /**< Work queue interrupt bits
+ Corresponding WQ_INT bit is set by HW whenever:
+ - SSO_WQ_INT_CNTX[IQ_CNT] >=
+ SSO_WQ_INT_THRX[IQ_THR] and the threshold
+ interrupt is not disabled.
+ SSO_WQ_IQ_DISX[IQ_DIS<X>]==1 disables the interrupt
+ SSO_WQ_INT_THRX[IQ_THR]==0 disables the int.
+ - SSO_WQ_INT_CNTX[DS_CNT] >=
+ SSO_WQ_INT_THRX[DS_THR] and the threshold
+ interrupt is not disabled
+ SSO_WQ_INT_THRX[DS_THR]==0 disables the int.
+ - SSO_WQ_INT_CNTX[TC_CNT]==1 when periodic
+ counter SSO_WQ_INT_PC[PC]==0 and
+ SSO_WQ_INT_THRX[TC_EN]==1 and at least one of:
+ - SSO_WQ_INT_CNTX[IQ_CNT] > 0
+ - SSO_WQ_INT_CNTX[DS_CNT] > 0 */
+#else
+ uint64_t wq_int : 64;
+#endif
+ } s;
+ struct cvmx_sso_wq_int_s cn68xx;
+ struct cvmx_sso_wq_int_s cn68xxp1;
+};
+typedef union cvmx_sso_wq_int cvmx_sso_wq_int_t;
+
+/**
+ * cvmx_sso_wq_int_cnt#
+ *
+ * CSR reserved addresses: (64): 0x7200..0x73f8
+ * CSR align addresses: ===========================================================================================================
+ * SSO_WQ_INT_CNTX = SSO Work Queue Interrupt Count Register
+ * (one per group)
+ *
+ * Contains a read-only copy of the counts used to trigger work queue
+ * interrupts. For more information regarding this register, see the interrupt
+ * section.
+ */
+union cvmx_sso_wq_int_cntx {
+ uint64_t u64;
+ struct cvmx_sso_wq_int_cntx_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_32_63 : 32;
+ uint64_t tc_cnt : 4; /**< Time counter current value for group X
+ HW sets TC_CNT to SSO_WQ_INT_THRX[TC_THR] whenever:
+ - corresponding SSO_WQ_INT_CNTX[IQ_CNT]==0 and
+ corresponding SSO_WQ_INT_CNTX[DS_CNT]==0
+ - corresponding SSO_WQ_INT[WQ_INT<X>] is written
+ with a 1 by SW
+ - corresponding SSO_WQ_IQ_DIS[IQ_DIS<X>] is written
+ with a 1 by SW
+ - corresponding SSO_WQ_INT_THRX is written by SW
+ - TC_CNT==1 and periodic counter
+ SSO_WQ_INT_PC[PC]==0
+ Otherwise, HW decrements TC_CNT whenever the
+ periodic counter SSO_WQ_INT_PC[PC]==0.
+ TC_CNT is 0 whenever SSO_WQ_INT_THRX[TC_THR]==0. */
+ uint64_t reserved_26_27 : 2;
+ uint64_t ds_cnt : 12; /**< De-schedule executable count for group X */
+ uint64_t reserved_12_13 : 2;
+ uint64_t iq_cnt : 12; /**< Input queue executable count for group X */
+#else
+ uint64_t iq_cnt : 12;
+ uint64_t reserved_12_13 : 2;
+ uint64_t ds_cnt : 12;
+ uint64_t reserved_26_27 : 2;
+ uint64_t tc_cnt : 4;
+ uint64_t reserved_32_63 : 32;
+#endif
+ } s;
+ struct cvmx_sso_wq_int_cntx_s cn68xx;
+ struct cvmx_sso_wq_int_cntx_s cn68xxp1;
+};
+typedef union cvmx_sso_wq_int_cntx cvmx_sso_wq_int_cntx_t;
+
+/**
+ * cvmx_sso_wq_int_pc
+ *
+ * CSR reserved addresses: (1): 0x1018..0x1018
+ * SSO_WQ_INT_PC = SSO Work Queue Interrupt Periodic Counter Register
+ *
+ * Contains the threshold value for the work queue interrupt periodic counter
+ * and also a read-only copy of the periodic counter. For more information
+ * regarding this register, see the interrupt section.
+ */
+union cvmx_sso_wq_int_pc {
+ uint64_t u64;
+ struct cvmx_sso_wq_int_pc_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_60_63 : 4;
+ uint64_t pc : 28; /**< Work queue interrupt periodic counter */
+ uint64_t reserved_28_31 : 4;
+ uint64_t pc_thr : 20; /**< Work queue interrupt periodic counter threshold */
+ uint64_t reserved_0_7 : 8;
+#else
+ uint64_t reserved_0_7 : 8;
+ uint64_t pc_thr : 20;
+ uint64_t reserved_28_31 : 4;
+ uint64_t pc : 28;
+ uint64_t reserved_60_63 : 4;
+#endif
+ } s;
+ struct cvmx_sso_wq_int_pc_s cn68xx;
+ struct cvmx_sso_wq_int_pc_s cn68xxp1;
+};
+typedef union cvmx_sso_wq_int_pc cvmx_sso_wq_int_pc_t;
+
+/**
+ * cvmx_sso_wq_int_thr#
+ *
+ * CSR reserved addresses: (96): 0x6100..0x63f8
+ * CSR align addresses: ===========================================================================================================
+ * SSO_WQ_INT_THR(0..63) = SSO Work Queue Interrupt Threshold Registers
+ * (one per group)
+ *
+ * Contains the thresholds for enabling and setting work queue interrupts. For
+ * more information, see the interrupt section.
+ *
+ * Note: Up to 16 of the SSO's internal storage buffers can be allocated
+ * for hardware use and are therefore not available for incoming work queue
+ * entries. Additionally, any WS that is not in the EMPTY state consumes a
+ * buffer. Thus in a 32 PP system, it is not advisable to set either IQ_THR or
+ * DS_THR to greater than 2048 - 16 - 32*2 = 1968. Doing so may prevent the
+ * interrupt from ever triggering.
+ *
+ * Priorities for QOS levels 0..7
+ */
+union cvmx_sso_wq_int_thrx {
+ uint64_t u64;
+ struct cvmx_sso_wq_int_thrx_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t reserved_33_63 : 31;
+ uint64_t tc_en : 1; /**< Time counter interrupt enable for group X
+ TC_EN must be zero when TC_THR==0 */
+ uint64_t tc_thr : 4; /**< Time counter interrupt threshold for group X
+ When TC_THR==0, SSO_WQ_INT_CNTX[TC_CNT] is zero */
+ uint64_t reserved_26_27 : 2;
+ uint64_t ds_thr : 12; /**< De-schedule count threshold for group X
+ DS_THR==0 disables the threshold interrupt */
+ uint64_t reserved_12_13 : 2;
+ uint64_t iq_thr : 12; /**< Input queue count threshold for group X
+ IQ_THR==0 disables the threshold interrupt */
+#else
+ uint64_t iq_thr : 12;
+ uint64_t reserved_12_13 : 2;
+ uint64_t ds_thr : 12;
+ uint64_t reserved_26_27 : 2;
+ uint64_t tc_thr : 4;
+ uint64_t tc_en : 1;
+ uint64_t reserved_33_63 : 31;
+#endif
+ } s;
+ struct cvmx_sso_wq_int_thrx_s cn68xx;
+ struct cvmx_sso_wq_int_thrx_s cn68xxp1;
+};
+typedef union cvmx_sso_wq_int_thrx cvmx_sso_wq_int_thrx_t;
+
+/**
+ * cvmx_sso_wq_iq_dis
+ *
+ * CSR reserved addresses: (1): 0x1008..0x1008
+ * SSO_WQ_IQ_DIS = SSO Input Queue Interrupt Temporary Disable Mask
+ *
+ * Contains the input queue interrupt temporary disable bits (one per group).
+ * For more information regarding this register, see the interrupt section.
+ */
+union cvmx_sso_wq_iq_dis {
+ uint64_t u64;
+ struct cvmx_sso_wq_iq_dis_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t iq_dis : 64; /**< Input queue interrupt temporary disable mask
+ Corresponding SSO_WQ_INTX[WQ_INT<X>] bit cannot be
+ set due to IQ_CNT/IQ_THR check when this bit is set.
+ Corresponding IQ_DIS bit is cleared by HW whenever:
+ - SSO_WQ_INT_CNTX[IQ_CNT] is zero, or
+ - SSO_WQ_INT_CNTX[TC_CNT]==1 when periodic
+ counter SSO_WQ_INT_PC[PC]==0 */
+#else
+ uint64_t iq_dis : 64;
+#endif
+ } s;
+ struct cvmx_sso_wq_iq_dis_s cn68xx;
+ struct cvmx_sso_wq_iq_dis_s cn68xxp1;
+};
+typedef union cvmx_sso_wq_iq_dis cvmx_sso_wq_iq_dis_t;
+
+/**
+ * cvmx_sso_ws_pc#
+ *
+ * CSR reserved addresses: (225): 0x3100..0x3800
+ * CSR align addresses: ===========================================================================================================
+ * SSO_WS_PCX = SSO Work Schedule Performance Counter
+ * (one per group)
+ *
+ * Counts the number of work schedules for each group.
+ * Counter rolls over through zero when max value exceeded.
+ */
+union cvmx_sso_ws_pcx {
+ uint64_t u64;
+ struct cvmx_sso_ws_pcx_s {
+#ifdef __BIG_ENDIAN_BITFIELD
+ uint64_t ws_pc : 64; /**< Work schedule performance counter for group X */
+#else
+ uint64_t ws_pc : 64;
+#endif
+ } s;
+ struct cvmx_sso_ws_pcx_s cn68xx;
+ struct cvmx_sso_ws_pcx_s cn68xxp1;
+};
+typedef union cvmx_sso_ws_pcx cvmx_sso_ws_pcx_t;
+
+#endif
OpenPOWER on IntegriCloud