2016-09-20 17:42:33 +02:00
|
|
|
/*
|
|
|
|
* QEMU emulation of AMD IOMMU (AMD-Vi)
|
|
|
|
*
|
|
|
|
* Copyright (C) 2011 Eduard - Gabriel Munteanu
|
2019-03-04 16:18:27 +01:00
|
|
|
* Copyright (C) 2015, 2016 David Kiarie Kahurani
|
2016-09-20 17:42:33 +02:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
|
|
|
|
* You should have received a copy of the GNU General Public License along
|
|
|
|
* with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
* Cache implementation inspired by hw/i386/intel_iommu.c
|
|
|
|
*/
|
2019-08-12 07:23:45 +02:00
|
|
|
|
2016-09-20 17:42:33 +02:00
|
|
|
#include "qemu/osdep.h"
|
2017-10-17 18:44:07 +02:00
|
|
|
#include "hw/i386/pc.h"
|
|
|
|
#include "hw/pci/msi.h"
|
|
|
|
#include "hw/pci/pci_bus.h"
|
2019-08-12 07:23:45 +02:00
|
|
|
#include "migration/vmstate.h"
|
2017-10-17 18:44:07 +02:00
|
|
|
#include "amd_iommu.h"
|
2017-05-08 22:08:12 +02:00
|
|
|
#include "qapi/error.h"
|
2016-09-23 07:02:28 +02:00
|
|
|
#include "qemu/error-report.h"
|
2018-10-01 21:44:37 +02:00
|
|
|
#include "hw/i386/apic_internal.h"
|
2016-09-20 17:42:33 +02:00
|
|
|
#include "trace.h"
|
2018-10-01 21:44:39 +02:00
|
|
|
#include "hw/i386/apic-msidef.h"
|
2016-09-20 17:42:33 +02:00
|
|
|
|
|
|
|
/* used AMD-Vi MMIO registers */
|
|
|
|
const char *amdvi_mmio_low[] = {
|
|
|
|
"AMDVI_MMIO_DEVTAB_BASE",
|
|
|
|
"AMDVI_MMIO_CMDBUF_BASE",
|
|
|
|
"AMDVI_MMIO_EVTLOG_BASE",
|
|
|
|
"AMDVI_MMIO_CONTROL",
|
|
|
|
"AMDVI_MMIO_EXCL_BASE",
|
|
|
|
"AMDVI_MMIO_EXCL_LIMIT",
|
|
|
|
"AMDVI_MMIO_EXT_FEATURES",
|
|
|
|
"AMDVI_MMIO_PPR_BASE",
|
|
|
|
"UNHANDLED"
|
|
|
|
};
|
|
|
|
const char *amdvi_mmio_high[] = {
|
|
|
|
"AMDVI_MMIO_COMMAND_HEAD",
|
|
|
|
"AMDVI_MMIO_COMMAND_TAIL",
|
|
|
|
"AMDVI_MMIO_EVTLOG_HEAD",
|
|
|
|
"AMDVI_MMIO_EVTLOG_TAIL",
|
|
|
|
"AMDVI_MMIO_STATUS",
|
|
|
|
"AMDVI_MMIO_PPR_HEAD",
|
|
|
|
"AMDVI_MMIO_PPR_TAIL",
|
|
|
|
"UNHANDLED"
|
|
|
|
};
|
|
|
|
|
|
|
|
struct AMDVIAddressSpace {
|
|
|
|
uint8_t bus_num; /* bus number */
|
|
|
|
uint8_t devfn; /* device function */
|
|
|
|
AMDVIState *iommu_state; /* AMDVI - one per machine */
|
2018-10-01 21:44:34 +02:00
|
|
|
MemoryRegion root; /* AMDVI Root memory map region */
|
2017-07-11 05:56:19 +02:00
|
|
|
IOMMUMemoryRegion iommu; /* Device's address translation region */
|
2016-09-20 17:42:33 +02:00
|
|
|
MemoryRegion iommu_ir; /* Device's interrupt remapping region */
|
|
|
|
AddressSpace as; /* device's corresponding address space */
|
|
|
|
};
|
|
|
|
|
|
|
|
/* AMDVI cache entry */
|
|
|
|
typedef struct AMDVIIOTLBEntry {
|
|
|
|
uint16_t domid; /* assigned domain id */
|
|
|
|
uint16_t devid; /* device owning entry */
|
|
|
|
uint64_t perms; /* access permissions */
|
|
|
|
uint64_t translated_addr; /* translated address */
|
|
|
|
uint64_t page_mask; /* physical page size */
|
|
|
|
} AMDVIIOTLBEntry;
|
|
|
|
|
|
|
|
/* configure MMIO registers at startup/reset */
|
|
|
|
static void amdvi_set_quad(AMDVIState *s, hwaddr addr, uint64_t val,
|
|
|
|
uint64_t romask, uint64_t w1cmask)
|
|
|
|
{
|
|
|
|
stq_le_p(&s->mmior[addr], val);
|
|
|
|
stq_le_p(&s->romask[addr], romask);
|
|
|
|
stq_le_p(&s->w1cmask[addr], w1cmask);
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint16_t amdvi_readw(AMDVIState *s, hwaddr addr)
|
|
|
|
{
|
|
|
|
return lduw_le_p(&s->mmior[addr]);
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint32_t amdvi_readl(AMDVIState *s, hwaddr addr)
|
|
|
|
{
|
|
|
|
return ldl_le_p(&s->mmior[addr]);
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint64_t amdvi_readq(AMDVIState *s, hwaddr addr)
|
|
|
|
{
|
|
|
|
return ldq_le_p(&s->mmior[addr]);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* internal write */
|
|
|
|
static void amdvi_writeq_raw(AMDVIState *s, uint64_t val, hwaddr addr)
|
|
|
|
{
|
|
|
|
stq_le_p(&s->mmior[addr], val);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* external write */
|
|
|
|
static void amdvi_writew(AMDVIState *s, hwaddr addr, uint16_t val)
|
|
|
|
{
|
|
|
|
uint16_t romask = lduw_le_p(&s->romask[addr]);
|
|
|
|
uint16_t w1cmask = lduw_le_p(&s->w1cmask[addr]);
|
|
|
|
uint16_t oldval = lduw_le_p(&s->mmior[addr]);
|
|
|
|
stw_le_p(&s->mmior[addr],
|
|
|
|
((oldval & romask) | (val & ~romask)) & ~(val & w1cmask));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_writel(AMDVIState *s, hwaddr addr, uint32_t val)
|
|
|
|
{
|
|
|
|
uint32_t romask = ldl_le_p(&s->romask[addr]);
|
|
|
|
uint32_t w1cmask = ldl_le_p(&s->w1cmask[addr]);
|
|
|
|
uint32_t oldval = ldl_le_p(&s->mmior[addr]);
|
|
|
|
stl_le_p(&s->mmior[addr],
|
|
|
|
((oldval & romask) | (val & ~romask)) & ~(val & w1cmask));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_writeq(AMDVIState *s, hwaddr addr, uint64_t val)
|
|
|
|
{
|
|
|
|
uint64_t romask = ldq_le_p(&s->romask[addr]);
|
|
|
|
uint64_t w1cmask = ldq_le_p(&s->w1cmask[addr]);
|
|
|
|
uint32_t oldval = ldq_le_p(&s->mmior[addr]);
|
|
|
|
stq_le_p(&s->mmior[addr],
|
|
|
|
((oldval & romask) | (val & ~romask)) & ~(val & w1cmask));
|
|
|
|
}
|
|
|
|
|
|
|
|
/* OR a 64-bit register with a 64-bit value */
|
|
|
|
static bool amdvi_test_mask(AMDVIState *s, hwaddr addr, uint64_t val)
|
|
|
|
{
|
|
|
|
return amdvi_readq(s, addr) | val;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* OR a 64-bit register with a 64-bit value storing result in the register */
|
|
|
|
static void amdvi_assign_orq(AMDVIState *s, hwaddr addr, uint64_t val)
|
|
|
|
{
|
|
|
|
amdvi_writeq_raw(s, addr, amdvi_readq(s, addr) | val);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* AND a 64-bit register with a 64-bit value storing result in the register */
|
|
|
|
static void amdvi_assign_andq(AMDVIState *s, hwaddr addr, uint64_t val)
|
|
|
|
{
|
|
|
|
amdvi_writeq_raw(s, addr, amdvi_readq(s, addr) & val);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_generate_msi_interrupt(AMDVIState *s)
|
|
|
|
{
|
2016-10-04 06:03:28 +02:00
|
|
|
MSIMessage msg = {};
|
|
|
|
MemTxAttrs attrs = {
|
|
|
|
.requester_id = pci_requester_id(&s->pci.dev)
|
|
|
|
};
|
2016-09-20 17:42:33 +02:00
|
|
|
|
|
|
|
if (msi_enabled(&s->pci.dev)) {
|
|
|
|
msg = msi_get_message(&s->pci.dev, 0);
|
|
|
|
address_space_stl_le(&address_space_memory, msg.address, msg.data,
|
|
|
|
attrs, NULL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_log_event(AMDVIState *s, uint64_t *evt)
|
|
|
|
{
|
|
|
|
/* event logging not enabled */
|
|
|
|
if (!s->evtlog_enabled || amdvi_test_mask(s, AMDVI_MMIO_STATUS,
|
|
|
|
AMDVI_MMIO_STATUS_EVT_OVF)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* event log buffer full */
|
|
|
|
if (s->evtlog_tail >= s->evtlog_len) {
|
|
|
|
amdvi_assign_orq(s, AMDVI_MMIO_STATUS, AMDVI_MMIO_STATUS_EVT_OVF);
|
|
|
|
/* generate interrupt */
|
|
|
|
amdvi_generate_msi_interrupt(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (dma_memory_write(&address_space_memory, s->evtlog + s->evtlog_tail,
|
|
|
|
&evt, AMDVI_EVENT_LEN)) {
|
|
|
|
trace_amdvi_evntlog_fail(s->evtlog, s->evtlog_tail);
|
|
|
|
}
|
|
|
|
|
|
|
|
s->evtlog_tail += AMDVI_EVENT_LEN;
|
|
|
|
amdvi_assign_orq(s, AMDVI_MMIO_STATUS, AMDVI_MMIO_STATUS_COMP_INT);
|
|
|
|
amdvi_generate_msi_interrupt(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_setevent_bits(uint64_t *buffer, uint64_t value, int start,
|
|
|
|
int length)
|
|
|
|
{
|
|
|
|
int index = start / 64, bitpos = start % 64;
|
2016-10-04 06:03:28 +02:00
|
|
|
uint64_t mask = MAKE_64BIT_MASK(start, length);
|
2016-09-20 17:42:33 +02:00
|
|
|
buffer[index] &= ~mask;
|
|
|
|
buffer[index] |= (value << bitpos) & mask;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* AMDVi event structure
|
|
|
|
* 0:15 -> DeviceID
|
|
|
|
* 55:63 -> event type + miscellaneous info
|
|
|
|
* 63:127 -> related address
|
|
|
|
*/
|
|
|
|
static void amdvi_encode_event(uint64_t *evt, uint16_t devid, uint64_t addr,
|
|
|
|
uint16_t info)
|
|
|
|
{
|
|
|
|
amdvi_setevent_bits(evt, devid, 0, 16);
|
|
|
|
amdvi_setevent_bits(evt, info, 55, 8);
|
|
|
|
amdvi_setevent_bits(evt, addr, 63, 64);
|
|
|
|
}
|
|
|
|
/* log an error encountered during a page walk
|
|
|
|
*
|
|
|
|
* @addr: virtual address in translation request
|
|
|
|
*/
|
|
|
|
static void amdvi_page_fault(AMDVIState *s, uint16_t devid,
|
|
|
|
hwaddr addr, uint16_t info)
|
|
|
|
{
|
|
|
|
uint64_t evt[4];
|
|
|
|
|
|
|
|
info |= AMDVI_EVENT_IOPF_I | AMDVI_EVENT_IOPF;
|
|
|
|
amdvi_encode_event(evt, devid, addr, info);
|
|
|
|
amdvi_log_event(s, evt);
|
|
|
|
pci_word_test_and_set_mask(s->pci.dev.config + PCI_STATUS,
|
|
|
|
PCI_STATUS_SIG_TARGET_ABORT);
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* log a master abort accessing device table
|
|
|
|
* @devtab : address of device table entry
|
|
|
|
* @info : error flags
|
|
|
|
*/
|
|
|
|
static void amdvi_log_devtab_error(AMDVIState *s, uint16_t devid,
|
|
|
|
hwaddr devtab, uint16_t info)
|
|
|
|
{
|
|
|
|
uint64_t evt[4];
|
|
|
|
|
|
|
|
info |= AMDVI_EVENT_DEV_TAB_HW_ERROR;
|
|
|
|
|
|
|
|
amdvi_encode_event(evt, devid, devtab, info);
|
|
|
|
amdvi_log_event(s, evt);
|
|
|
|
pci_word_test_and_set_mask(s->pci.dev.config + PCI_STATUS,
|
|
|
|
PCI_STATUS_SIG_TARGET_ABORT);
|
|
|
|
}
|
|
|
|
/* log an event trying to access command buffer
|
|
|
|
* @addr : address that couldn't be accessed
|
|
|
|
*/
|
|
|
|
static void amdvi_log_command_error(AMDVIState *s, hwaddr addr)
|
|
|
|
{
|
|
|
|
uint64_t evt[4], info = AMDVI_EVENT_COMMAND_HW_ERROR;
|
|
|
|
|
|
|
|
amdvi_encode_event(evt, 0, addr, info);
|
|
|
|
amdvi_log_event(s, evt);
|
|
|
|
pci_word_test_and_set_mask(s->pci.dev.config + PCI_STATUS,
|
|
|
|
PCI_STATUS_SIG_TARGET_ABORT);
|
|
|
|
}
|
|
|
|
/* log an illegal comand event
|
|
|
|
* @addr : address of illegal command
|
|
|
|
*/
|
|
|
|
static void amdvi_log_illegalcom_error(AMDVIState *s, uint16_t info,
|
|
|
|
hwaddr addr)
|
|
|
|
{
|
|
|
|
uint64_t evt[4];
|
|
|
|
|
|
|
|
info |= AMDVI_EVENT_ILLEGAL_COMMAND_ERROR;
|
|
|
|
amdvi_encode_event(evt, 0, addr, info);
|
|
|
|
amdvi_log_event(s, evt);
|
|
|
|
}
|
|
|
|
/* log an error accessing device table
|
|
|
|
*
|
|
|
|
* @devid : device owning the table entry
|
|
|
|
* @devtab : address of device table entry
|
|
|
|
* @info : error flags
|
|
|
|
*/
|
|
|
|
static void amdvi_log_illegaldevtab_error(AMDVIState *s, uint16_t devid,
|
|
|
|
hwaddr addr, uint16_t info)
|
|
|
|
{
|
|
|
|
uint64_t evt[4];
|
|
|
|
|
|
|
|
info |= AMDVI_EVENT_ILLEGAL_DEVTAB_ENTRY;
|
|
|
|
amdvi_encode_event(evt, devid, addr, info);
|
|
|
|
amdvi_log_event(s, evt);
|
|
|
|
}
|
|
|
|
/* log an error accessing a PTE entry
|
|
|
|
* @addr : address that couldn't be accessed
|
|
|
|
*/
|
|
|
|
static void amdvi_log_pagetab_error(AMDVIState *s, uint16_t devid,
|
|
|
|
hwaddr addr, uint16_t info)
|
|
|
|
{
|
|
|
|
uint64_t evt[4];
|
|
|
|
|
|
|
|
info |= AMDVI_EVENT_PAGE_TAB_HW_ERROR;
|
|
|
|
amdvi_encode_event(evt, devid, addr, info);
|
|
|
|
amdvi_log_event(s, evt);
|
|
|
|
pci_word_test_and_set_mask(s->pci.dev.config + PCI_STATUS,
|
|
|
|
PCI_STATUS_SIG_TARGET_ABORT);
|
|
|
|
}
|
|
|
|
|
|
|
|
static gboolean amdvi_uint64_equal(gconstpointer v1, gconstpointer v2)
|
|
|
|
{
|
|
|
|
return *((const uint64_t *)v1) == *((const uint64_t *)v2);
|
|
|
|
}
|
|
|
|
|
|
|
|
static guint amdvi_uint64_hash(gconstpointer v)
|
|
|
|
{
|
|
|
|
return (guint)*(const uint64_t *)v;
|
|
|
|
}
|
|
|
|
|
|
|
|
static AMDVIIOTLBEntry *amdvi_iotlb_lookup(AMDVIState *s, hwaddr addr,
|
|
|
|
uint64_t devid)
|
|
|
|
{
|
|
|
|
uint64_t key = (addr >> AMDVI_PAGE_SHIFT_4K) |
|
|
|
|
((uint64_t)(devid) << AMDVI_DEVID_SHIFT);
|
|
|
|
return g_hash_table_lookup(s->iotlb, &key);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_iotlb_reset(AMDVIState *s)
|
|
|
|
{
|
|
|
|
assert(s->iotlb);
|
|
|
|
trace_amdvi_iotlb_reset();
|
|
|
|
g_hash_table_remove_all(s->iotlb);
|
|
|
|
}
|
|
|
|
|
|
|
|
static gboolean amdvi_iotlb_remove_by_devid(gpointer key, gpointer value,
|
|
|
|
gpointer user_data)
|
|
|
|
{
|
|
|
|
AMDVIIOTLBEntry *entry = (AMDVIIOTLBEntry *)value;
|
|
|
|
uint16_t devid = *(uint16_t *)user_data;
|
|
|
|
return entry->devid == devid;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_iotlb_remove_page(AMDVIState *s, hwaddr addr,
|
|
|
|
uint64_t devid)
|
|
|
|
{
|
|
|
|
uint64_t key = (addr >> AMDVI_PAGE_SHIFT_4K) |
|
|
|
|
((uint64_t)(devid) << AMDVI_DEVID_SHIFT);
|
|
|
|
g_hash_table_remove(s->iotlb, &key);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_update_iotlb(AMDVIState *s, uint16_t devid,
|
|
|
|
uint64_t gpa, IOMMUTLBEntry to_cache,
|
|
|
|
uint16_t domid)
|
|
|
|
{
|
2016-10-04 06:03:28 +02:00
|
|
|
AMDVIIOTLBEntry *entry = g_new(AMDVIIOTLBEntry, 1);
|
|
|
|
uint64_t *key = g_new(uint64_t, 1);
|
2016-09-20 17:42:33 +02:00
|
|
|
uint64_t gfn = gpa >> AMDVI_PAGE_SHIFT_4K;
|
|
|
|
|
|
|
|
/* don't cache erroneous translations */
|
|
|
|
if (to_cache.perm != IOMMU_NONE) {
|
|
|
|
trace_amdvi_cache_update(domid, PCI_BUS_NUM(devid), PCI_SLOT(devid),
|
|
|
|
PCI_FUNC(devid), gpa, to_cache.translated_addr);
|
|
|
|
|
|
|
|
if (g_hash_table_size(s->iotlb) >= AMDVI_IOTLB_MAX_SIZE) {
|
|
|
|
amdvi_iotlb_reset(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
entry->domid = domid;
|
|
|
|
entry->perms = to_cache.perm;
|
|
|
|
entry->translated_addr = to_cache.translated_addr;
|
|
|
|
entry->page_mask = to_cache.addr_mask;
|
|
|
|
*key = gfn | ((uint64_t)(devid) << AMDVI_DEVID_SHIFT);
|
|
|
|
g_hash_table_replace(s->iotlb, key, entry);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_completion_wait(AMDVIState *s, uint64_t *cmd)
|
|
|
|
{
|
|
|
|
/* pad the last 3 bits */
|
|
|
|
hwaddr addr = cpu_to_le64(extract64(cmd[0], 3, 49)) << 3;
|
|
|
|
uint64_t data = cpu_to_le64(cmd[1]);
|
|
|
|
|
|
|
|
if (extract64(cmd[0], 51, 8)) {
|
|
|
|
amdvi_log_illegalcom_error(s, extract64(cmd[0], 60, 4),
|
|
|
|
s->cmdbuf + s->cmdbuf_head);
|
|
|
|
}
|
|
|
|
if (extract64(cmd[0], 0, 1)) {
|
|
|
|
if (dma_memory_write(&address_space_memory, addr, &data,
|
|
|
|
AMDVI_COMPLETION_DATA_SIZE)) {
|
|
|
|
trace_amdvi_completion_wait_fail(addr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* set completion interrupt */
|
|
|
|
if (extract64(cmd[0], 1, 1)) {
|
|
|
|
amdvi_test_mask(s, AMDVI_MMIO_STATUS, AMDVI_MMIO_STATUS_COMP_INT);
|
|
|
|
/* generate interrupt */
|
|
|
|
amdvi_generate_msi_interrupt(s);
|
|
|
|
}
|
|
|
|
trace_amdvi_completion_wait(addr, data);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* log error without aborting since linux seems to be using reserved bits */
|
|
|
|
static void amdvi_inval_devtab_entry(AMDVIState *s, uint64_t *cmd)
|
|
|
|
{
|
|
|
|
uint16_t devid = cpu_to_le16((uint16_t)extract64(cmd[0], 0, 16));
|
|
|
|
|
|
|
|
/* This command should invalidate internal caches of which there isn't */
|
|
|
|
if (extract64(cmd[0], 15, 16) || cmd[1]) {
|
|
|
|
amdvi_log_illegalcom_error(s, extract64(cmd[0], 60, 4),
|
|
|
|
s->cmdbuf + s->cmdbuf_head);
|
|
|
|
}
|
|
|
|
trace_amdvi_devtab_inval(PCI_BUS_NUM(devid), PCI_SLOT(devid),
|
|
|
|
PCI_FUNC(devid));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_complete_ppr(AMDVIState *s, uint64_t *cmd)
|
|
|
|
{
|
|
|
|
if (extract64(cmd[0], 15, 16) || extract64(cmd[0], 19, 8) ||
|
|
|
|
extract64(cmd[1], 0, 2) || extract64(cmd[1], 3, 29)
|
|
|
|
|| extract64(cmd[1], 47, 16)) {
|
|
|
|
amdvi_log_illegalcom_error(s, extract64(cmd[0], 60, 4),
|
|
|
|
s->cmdbuf + s->cmdbuf_head);
|
|
|
|
}
|
|
|
|
trace_amdvi_ppr_exec();
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_inval_all(AMDVIState *s, uint64_t *cmd)
|
|
|
|
{
|
|
|
|
if (extract64(cmd[0], 0, 60) || cmd[1]) {
|
|
|
|
amdvi_log_illegalcom_error(s, extract64(cmd[0], 60, 4),
|
|
|
|
s->cmdbuf + s->cmdbuf_head);
|
|
|
|
}
|
|
|
|
|
|
|
|
amdvi_iotlb_reset(s);
|
|
|
|
trace_amdvi_all_inval();
|
|
|
|
}
|
|
|
|
|
|
|
|
static gboolean amdvi_iotlb_remove_by_domid(gpointer key, gpointer value,
|
|
|
|
gpointer user_data)
|
|
|
|
{
|
|
|
|
AMDVIIOTLBEntry *entry = (AMDVIIOTLBEntry *)value;
|
|
|
|
uint16_t domid = *(uint16_t *)user_data;
|
|
|
|
return entry->domid == domid;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* we don't have devid - we can't remove pages by address */
|
|
|
|
static void amdvi_inval_pages(AMDVIState *s, uint64_t *cmd)
|
|
|
|
{
|
|
|
|
uint16_t domid = cpu_to_le16((uint16_t)extract64(cmd[0], 32, 16));
|
|
|
|
|
|
|
|
if (extract64(cmd[0], 20, 12) || extract64(cmd[0], 16, 12) ||
|
|
|
|
extract64(cmd[0], 3, 10)) {
|
|
|
|
amdvi_log_illegalcom_error(s, extract64(cmd[0], 60, 4),
|
|
|
|
s->cmdbuf + s->cmdbuf_head);
|
|
|
|
}
|
|
|
|
|
|
|
|
g_hash_table_foreach_remove(s->iotlb, amdvi_iotlb_remove_by_domid,
|
|
|
|
&domid);
|
|
|
|
trace_amdvi_pages_inval(domid);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_prefetch_pages(AMDVIState *s, uint64_t *cmd)
|
|
|
|
{
|
|
|
|
if (extract64(cmd[0], 16, 8) || extract64(cmd[0], 20, 8) ||
|
|
|
|
extract64(cmd[1], 1, 1) || extract64(cmd[1], 3, 1) ||
|
|
|
|
extract64(cmd[1], 5, 7)) {
|
|
|
|
amdvi_log_illegalcom_error(s, extract64(cmd[0], 60, 4),
|
|
|
|
s->cmdbuf + s->cmdbuf_head);
|
|
|
|
}
|
|
|
|
|
|
|
|
trace_amdvi_prefetch_pages();
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_inval_inttable(AMDVIState *s, uint64_t *cmd)
|
|
|
|
{
|
|
|
|
if (extract64(cmd[0], 16, 16) || cmd[1]) {
|
|
|
|
amdvi_log_illegalcom_error(s, extract64(cmd[0], 60, 4),
|
|
|
|
s->cmdbuf + s->cmdbuf_head);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
trace_amdvi_intr_inval();
|
|
|
|
}
|
|
|
|
|
|
|
|
/* FIXME: Try to work with the specified size instead of all the pages
|
|
|
|
* when the S bit is on
|
|
|
|
*/
|
|
|
|
static void iommu_inval_iotlb(AMDVIState *s, uint64_t *cmd)
|
|
|
|
{
|
|
|
|
|
|
|
|
uint16_t devid = extract64(cmd[0], 0, 16);
|
|
|
|
if (extract64(cmd[1], 1, 1) || extract64(cmd[1], 3, 9)) {
|
|
|
|
amdvi_log_illegalcom_error(s, extract64(cmd[0], 60, 4),
|
|
|
|
s->cmdbuf + s->cmdbuf_head);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (extract64(cmd[1], 0, 1)) {
|
|
|
|
g_hash_table_foreach_remove(s->iotlb, amdvi_iotlb_remove_by_devid,
|
|
|
|
&devid);
|
|
|
|
} else {
|
|
|
|
amdvi_iotlb_remove_page(s, cpu_to_le64(extract64(cmd[1], 12, 52)) << 12,
|
|
|
|
cpu_to_le16(extract64(cmd[1], 0, 16)));
|
|
|
|
}
|
|
|
|
trace_amdvi_iotlb_inval();
|
|
|
|
}
|
|
|
|
|
|
|
|
/* not honouring reserved bits is regarded as an illegal command */
|
|
|
|
static void amdvi_cmdbuf_exec(AMDVIState *s)
|
|
|
|
{
|
|
|
|
uint64_t cmd[2];
|
|
|
|
|
|
|
|
if (dma_memory_read(&address_space_memory, s->cmdbuf + s->cmdbuf_head,
|
|
|
|
cmd, AMDVI_COMMAND_SIZE)) {
|
|
|
|
trace_amdvi_command_read_fail(s->cmdbuf, s->cmdbuf_head);
|
|
|
|
amdvi_log_command_error(s, s->cmdbuf + s->cmdbuf_head);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (extract64(cmd[0], 60, 4)) {
|
|
|
|
case AMDVI_CMD_COMPLETION_WAIT:
|
|
|
|
amdvi_completion_wait(s, cmd);
|
|
|
|
break;
|
|
|
|
case AMDVI_CMD_INVAL_DEVTAB_ENTRY:
|
|
|
|
amdvi_inval_devtab_entry(s, cmd);
|
|
|
|
break;
|
|
|
|
case AMDVI_CMD_INVAL_AMDVI_PAGES:
|
|
|
|
amdvi_inval_pages(s, cmd);
|
|
|
|
break;
|
|
|
|
case AMDVI_CMD_INVAL_IOTLB_PAGES:
|
|
|
|
iommu_inval_iotlb(s, cmd);
|
|
|
|
break;
|
|
|
|
case AMDVI_CMD_INVAL_INTR_TABLE:
|
|
|
|
amdvi_inval_inttable(s, cmd);
|
|
|
|
break;
|
|
|
|
case AMDVI_CMD_PREFETCH_AMDVI_PAGES:
|
|
|
|
amdvi_prefetch_pages(s, cmd);
|
|
|
|
break;
|
|
|
|
case AMDVI_CMD_COMPLETE_PPR_REQUEST:
|
|
|
|
amdvi_complete_ppr(s, cmd);
|
|
|
|
break;
|
|
|
|
case AMDVI_CMD_INVAL_AMDVI_ALL:
|
|
|
|
amdvi_inval_all(s, cmd);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
trace_amdvi_unhandled_command(extract64(cmd[1], 60, 4));
|
|
|
|
/* log illegal command */
|
|
|
|
amdvi_log_illegalcom_error(s, extract64(cmd[1], 60, 4),
|
|
|
|
s->cmdbuf + s->cmdbuf_head);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_cmdbuf_run(AMDVIState *s)
|
|
|
|
{
|
|
|
|
if (!s->cmdbuf_enabled) {
|
|
|
|
trace_amdvi_command_error(amdvi_readq(s, AMDVI_MMIO_CONTROL));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* check if there is work to do. */
|
|
|
|
while (s->cmdbuf_head != s->cmdbuf_tail) {
|
|
|
|
trace_amdvi_command_exec(s->cmdbuf_head, s->cmdbuf_tail, s->cmdbuf);
|
|
|
|
amdvi_cmdbuf_exec(s);
|
|
|
|
s->cmdbuf_head += AMDVI_COMMAND_SIZE;
|
|
|
|
amdvi_writeq_raw(s, s->cmdbuf_head, AMDVI_MMIO_COMMAND_HEAD);
|
|
|
|
|
|
|
|
/* wrap head pointer */
|
|
|
|
if (s->cmdbuf_head >= s->cmdbuf_len * AMDVI_COMMAND_SIZE) {
|
|
|
|
s->cmdbuf_head = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_mmio_trace(hwaddr addr, unsigned size)
|
|
|
|
{
|
|
|
|
uint8_t index = (addr & ~0x2000) / 8;
|
|
|
|
|
|
|
|
if ((addr & 0x2000)) {
|
|
|
|
/* high table */
|
|
|
|
index = index >= AMDVI_MMIO_REGS_HIGH ? AMDVI_MMIO_REGS_HIGH : index;
|
|
|
|
trace_amdvi_mmio_read(amdvi_mmio_high[index], addr, size, addr & ~0x07);
|
|
|
|
} else {
|
|
|
|
index = index >= AMDVI_MMIO_REGS_LOW ? AMDVI_MMIO_REGS_LOW : index;
|
2016-12-02 12:16:26 +01:00
|
|
|
trace_amdvi_mmio_read(amdvi_mmio_low[index], addr, size, addr & ~0x07);
|
2016-09-20 17:42:33 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint64_t amdvi_mmio_read(void *opaque, hwaddr addr, unsigned size)
|
|
|
|
{
|
|
|
|
AMDVIState *s = opaque;
|
|
|
|
|
|
|
|
uint64_t val = -1;
|
|
|
|
if (addr + size > AMDVI_MMIO_SIZE) {
|
2017-03-13 20:55:20 +01:00
|
|
|
trace_amdvi_mmio_read_invalid(AMDVI_MMIO_SIZE, addr, size);
|
2016-09-20 17:42:33 +02:00
|
|
|
return (uint64_t)-1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (size == 2) {
|
|
|
|
val = amdvi_readw(s, addr);
|
|
|
|
} else if (size == 4) {
|
|
|
|
val = amdvi_readl(s, addr);
|
|
|
|
} else if (size == 8) {
|
|
|
|
val = amdvi_readq(s, addr);
|
|
|
|
}
|
|
|
|
amdvi_mmio_trace(addr, size);
|
|
|
|
|
|
|
|
return val;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_handle_control_write(AMDVIState *s)
|
|
|
|
{
|
|
|
|
unsigned long control = amdvi_readq(s, AMDVI_MMIO_CONTROL);
|
|
|
|
s->enabled = !!(control & AMDVI_MMIO_CONTROL_AMDVIEN);
|
|
|
|
|
|
|
|
s->ats_enabled = !!(control & AMDVI_MMIO_CONTROL_HTTUNEN);
|
|
|
|
s->evtlog_enabled = s->enabled && !!(control &
|
|
|
|
AMDVI_MMIO_CONTROL_EVENTLOGEN);
|
|
|
|
|
|
|
|
s->evtlog_intr = !!(control & AMDVI_MMIO_CONTROL_EVENTINTEN);
|
|
|
|
s->completion_wait_intr = !!(control & AMDVI_MMIO_CONTROL_COMWAITINTEN);
|
|
|
|
s->cmdbuf_enabled = s->enabled && !!(control &
|
|
|
|
AMDVI_MMIO_CONTROL_CMDBUFLEN);
|
2018-10-01 21:44:43 +02:00
|
|
|
s->ga_enabled = !!(control & AMDVI_MMIO_CONTROL_GAEN);
|
2016-09-20 17:42:33 +02:00
|
|
|
|
|
|
|
/* update the flags depending on the control register */
|
|
|
|
if (s->cmdbuf_enabled) {
|
|
|
|
amdvi_assign_orq(s, AMDVI_MMIO_STATUS, AMDVI_MMIO_STATUS_CMDBUF_RUN);
|
|
|
|
} else {
|
|
|
|
amdvi_assign_andq(s, AMDVI_MMIO_STATUS, ~AMDVI_MMIO_STATUS_CMDBUF_RUN);
|
|
|
|
}
|
|
|
|
if (s->evtlog_enabled) {
|
|
|
|
amdvi_assign_orq(s, AMDVI_MMIO_STATUS, AMDVI_MMIO_STATUS_EVT_RUN);
|
|
|
|
} else {
|
|
|
|
amdvi_assign_andq(s, AMDVI_MMIO_STATUS, ~AMDVI_MMIO_STATUS_EVT_RUN);
|
|
|
|
}
|
|
|
|
|
|
|
|
trace_amdvi_control_status(control);
|
|
|
|
amdvi_cmdbuf_run(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void amdvi_handle_devtab_write(AMDVIState *s)
|
|
|
|
|
|
|
|
{
|
|
|
|
uint64_t val = amdvi_readq(s, AMDVI_MMIO_DEVICE_TABLE);
|
|
|
|
s->devtab = (val & AMDVI_MMIO_DEVTAB_BASE_MASK);
|
|
|
|
|
|
|
|
/* set device table length */
|
|
|
|
s->devtab_len = ((val & AMDVI_MMIO_DEVTAB_SIZE_MASK) + 1 *
|
|
|
|
(AMDVI_MMIO_DEVTAB_SIZE_UNIT /
|
|
|
|
AMDVI_MMIO_DEVTAB_ENTRY_SIZE));
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void amdvi_handle_cmdhead_write(AMDVIState *s)
|
|
|
|
{
|
|
|
|
s->cmdbuf_head = amdvi_readq(s, AMDVI_MMIO_COMMAND_HEAD)
|
|
|
|
& AMDVI_MMIO_CMDBUF_HEAD_MASK;
|
|
|
|
amdvi_cmdbuf_run(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void amdvi_handle_cmdbase_write(AMDVIState *s)
|
|
|
|
{
|
|
|
|
s->cmdbuf = amdvi_readq(s, AMDVI_MMIO_COMMAND_BASE)
|
|
|
|
& AMDVI_MMIO_CMDBUF_BASE_MASK;
|
|
|
|
s->cmdbuf_len = 1UL << (amdvi_readq(s, AMDVI_MMIO_CMDBUF_SIZE_BYTE)
|
|
|
|
& AMDVI_MMIO_CMDBUF_SIZE_MASK);
|
|
|
|
s->cmdbuf_head = s->cmdbuf_tail = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void amdvi_handle_cmdtail_write(AMDVIState *s)
|
|
|
|
{
|
|
|
|
s->cmdbuf_tail = amdvi_readq(s, AMDVI_MMIO_COMMAND_TAIL)
|
|
|
|
& AMDVI_MMIO_CMDBUF_TAIL_MASK;
|
|
|
|
amdvi_cmdbuf_run(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void amdvi_handle_excllim_write(AMDVIState *s)
|
|
|
|
{
|
|
|
|
uint64_t val = amdvi_readq(s, AMDVI_MMIO_EXCL_LIMIT);
|
|
|
|
s->excl_limit = (val & AMDVI_MMIO_EXCL_LIMIT_MASK) |
|
|
|
|
AMDVI_MMIO_EXCL_LIMIT_LOW;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void amdvi_handle_evtbase_write(AMDVIState *s)
|
|
|
|
{
|
|
|
|
uint64_t val = amdvi_readq(s, AMDVI_MMIO_EVENT_BASE);
|
|
|
|
s->evtlog = val & AMDVI_MMIO_EVTLOG_BASE_MASK;
|
|
|
|
s->evtlog_len = 1UL << (amdvi_readq(s, AMDVI_MMIO_EVTLOG_SIZE_BYTE)
|
|
|
|
& AMDVI_MMIO_EVTLOG_SIZE_MASK);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void amdvi_handle_evttail_write(AMDVIState *s)
|
|
|
|
{
|
|
|
|
uint64_t val = amdvi_readq(s, AMDVI_MMIO_EVENT_TAIL);
|
|
|
|
s->evtlog_tail = val & AMDVI_MMIO_EVTLOG_TAIL_MASK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void amdvi_handle_evthead_write(AMDVIState *s)
|
|
|
|
{
|
|
|
|
uint64_t val = amdvi_readq(s, AMDVI_MMIO_EVENT_HEAD);
|
|
|
|
s->evtlog_head = val & AMDVI_MMIO_EVTLOG_HEAD_MASK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void amdvi_handle_pprbase_write(AMDVIState *s)
|
|
|
|
{
|
|
|
|
uint64_t val = amdvi_readq(s, AMDVI_MMIO_PPR_BASE);
|
|
|
|
s->ppr_log = val & AMDVI_MMIO_PPRLOG_BASE_MASK;
|
|
|
|
s->pprlog_len = 1UL << (amdvi_readq(s, AMDVI_MMIO_PPRLOG_SIZE_BYTE)
|
|
|
|
& AMDVI_MMIO_PPRLOG_SIZE_MASK);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void amdvi_handle_pprhead_write(AMDVIState *s)
|
|
|
|
{
|
|
|
|
uint64_t val = amdvi_readq(s, AMDVI_MMIO_PPR_HEAD);
|
|
|
|
s->pprlog_head = val & AMDVI_MMIO_PPRLOG_HEAD_MASK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void amdvi_handle_pprtail_write(AMDVIState *s)
|
|
|
|
{
|
|
|
|
uint64_t val = amdvi_readq(s, AMDVI_MMIO_PPR_TAIL);
|
|
|
|
s->pprlog_tail = val & AMDVI_MMIO_PPRLOG_TAIL_MASK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* FIXME: something might go wrong if System Software writes in chunks
|
|
|
|
* of one byte but linux writes in chunks of 4 bytes so currently it
|
|
|
|
* works correctly with linux but will definitely be busted if software
|
|
|
|
* reads/writes 8 bytes
|
|
|
|
*/
|
|
|
|
static void amdvi_mmio_reg_write(AMDVIState *s, unsigned size, uint64_t val,
|
|
|
|
hwaddr addr)
|
|
|
|
{
|
|
|
|
if (size == 2) {
|
|
|
|
amdvi_writew(s, addr, val);
|
|
|
|
} else if (size == 4) {
|
|
|
|
amdvi_writel(s, addr, val);
|
|
|
|
} else if (size == 8) {
|
|
|
|
amdvi_writeq(s, addr, val);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_mmio_write(void *opaque, hwaddr addr, uint64_t val,
|
|
|
|
unsigned size)
|
|
|
|
{
|
|
|
|
AMDVIState *s = opaque;
|
|
|
|
unsigned long offset = addr & 0x07;
|
|
|
|
|
|
|
|
if (addr + size > AMDVI_MMIO_SIZE) {
|
|
|
|
trace_amdvi_mmio_write("error: addr outside region: max ",
|
|
|
|
(uint64_t)AMDVI_MMIO_SIZE, size, val, offset);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
amdvi_mmio_trace(addr, size);
|
|
|
|
switch (addr & ~0x07) {
|
|
|
|
case AMDVI_MMIO_CONTROL:
|
|
|
|
amdvi_mmio_reg_write(s, size, val, addr);
|
|
|
|
amdvi_handle_control_write(s);
|
|
|
|
break;
|
|
|
|
case AMDVI_MMIO_DEVICE_TABLE:
|
|
|
|
amdvi_mmio_reg_write(s, size, val, addr);
|
|
|
|
/* set device table address
|
|
|
|
* This also suffers from inability to tell whether software
|
|
|
|
* is done writing
|
|
|
|
*/
|
|
|
|
if (offset || (size == 8)) {
|
|
|
|
amdvi_handle_devtab_write(s);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case AMDVI_MMIO_COMMAND_HEAD:
|
|
|
|
amdvi_mmio_reg_write(s, size, val, addr);
|
|
|
|
amdvi_handle_cmdhead_write(s);
|
|
|
|
break;
|
|
|
|
case AMDVI_MMIO_COMMAND_BASE:
|
|
|
|
amdvi_mmio_reg_write(s, size, val, addr);
|
|
|
|
/* FIXME - make sure System Software has finished writing incase
|
|
|
|
* it writes in chucks less than 8 bytes in a robust way.As for
|
|
|
|
* now, this hacks works for the linux driver
|
|
|
|
*/
|
|
|
|
if (offset || (size == 8)) {
|
|
|
|
amdvi_handle_cmdbase_write(s);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case AMDVI_MMIO_COMMAND_TAIL:
|
|
|
|
amdvi_mmio_reg_write(s, size, val, addr);
|
|
|
|
amdvi_handle_cmdtail_write(s);
|
|
|
|
break;
|
|
|
|
case AMDVI_MMIO_EVENT_BASE:
|
|
|
|
amdvi_mmio_reg_write(s, size, val, addr);
|
|
|
|
amdvi_handle_evtbase_write(s);
|
|
|
|
break;
|
|
|
|
case AMDVI_MMIO_EVENT_HEAD:
|
|
|
|
amdvi_mmio_reg_write(s, size, val, addr);
|
|
|
|
amdvi_handle_evthead_write(s);
|
|
|
|
break;
|
|
|
|
case AMDVI_MMIO_EVENT_TAIL:
|
|
|
|
amdvi_mmio_reg_write(s, size, val, addr);
|
|
|
|
amdvi_handle_evttail_write(s);
|
|
|
|
break;
|
|
|
|
case AMDVI_MMIO_EXCL_LIMIT:
|
|
|
|
amdvi_mmio_reg_write(s, size, val, addr);
|
|
|
|
amdvi_handle_excllim_write(s);
|
|
|
|
break;
|
|
|
|
/* PPR log base - unused for now */
|
|
|
|
case AMDVI_MMIO_PPR_BASE:
|
|
|
|
amdvi_mmio_reg_write(s, size, val, addr);
|
|
|
|
amdvi_handle_pprbase_write(s);
|
|
|
|
break;
|
|
|
|
/* PPR log head - also unused for now */
|
|
|
|
case AMDVI_MMIO_PPR_HEAD:
|
|
|
|
amdvi_mmio_reg_write(s, size, val, addr);
|
|
|
|
amdvi_handle_pprhead_write(s);
|
|
|
|
break;
|
|
|
|
/* PPR log tail - unused for now */
|
|
|
|
case AMDVI_MMIO_PPR_TAIL:
|
|
|
|
amdvi_mmio_reg_write(s, size, val, addr);
|
|
|
|
amdvi_handle_pprtail_write(s);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline uint64_t amdvi_get_perms(uint64_t entry)
|
|
|
|
{
|
|
|
|
return (entry & (AMDVI_DEV_PERM_READ | AMDVI_DEV_PERM_WRITE)) >>
|
|
|
|
AMDVI_DEV_PERM_SHIFT;
|
|
|
|
}
|
|
|
|
|
2018-10-01 21:44:32 +02:00
|
|
|
/* validate that reserved bits are honoured */
|
2016-09-20 17:42:33 +02:00
|
|
|
static bool amdvi_validate_dte(AMDVIState *s, uint16_t devid,
|
|
|
|
uint64_t *dte)
|
|
|
|
{
|
|
|
|
if ((dte[0] & AMDVI_DTE_LOWER_QUAD_RESERVED)
|
|
|
|
|| (dte[1] & AMDVI_DTE_MIDDLE_QUAD_RESERVED)
|
|
|
|
|| (dte[2] & AMDVI_DTE_UPPER_QUAD_RESERVED) || dte[3]) {
|
|
|
|
amdvi_log_illegaldevtab_error(s, devid,
|
|
|
|
s->devtab +
|
|
|
|
devid * AMDVI_DEVTAB_ENTRY_SIZE, 0);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2018-10-01 21:44:32 +02:00
|
|
|
return true;
|
2016-09-20 17:42:33 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* get a device table entry given the devid */
|
|
|
|
static bool amdvi_get_dte(AMDVIState *s, int devid, uint64_t *entry)
|
|
|
|
{
|
|
|
|
uint32_t offset = devid * AMDVI_DEVTAB_ENTRY_SIZE;
|
|
|
|
|
|
|
|
if (dma_memory_read(&address_space_memory, s->devtab + offset, entry,
|
|
|
|
AMDVI_DEVTAB_ENTRY_SIZE)) {
|
|
|
|
trace_amdvi_dte_get_fail(s->devtab, offset);
|
|
|
|
/* log error accessing dte */
|
|
|
|
amdvi_log_devtab_error(s, devid, s->devtab + offset, 0);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
*entry = le64_to_cpu(*entry);
|
|
|
|
if (!amdvi_validate_dte(s, devid, entry)) {
|
|
|
|
trace_amdvi_invalid_dte(entry[0]);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* get pte translation mode */
|
|
|
|
static inline uint8_t get_pte_translation_mode(uint64_t pte)
|
|
|
|
{
|
|
|
|
return (pte >> AMDVI_DEV_MODE_RSHIFT) & AMDVI_DEV_MODE_MASK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline uint64_t pte_override_page_mask(uint64_t pte)
|
|
|
|
{
|
|
|
|
uint8_t page_mask = 12;
|
|
|
|
uint64_t addr = (pte & AMDVI_DEV_PT_ROOT_MASK) ^ AMDVI_DEV_PT_ROOT_MASK;
|
|
|
|
/* find the first zero bit */
|
|
|
|
while (addr & 1) {
|
|
|
|
page_mask++;
|
|
|
|
addr = addr >> 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ~((1ULL << page_mask) - 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline uint64_t pte_get_page_mask(uint64_t oldlevel)
|
|
|
|
{
|
|
|
|
return ~((1UL << ((oldlevel * 9) + 3)) - 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline uint64_t amdvi_get_pte_entry(AMDVIState *s, uint64_t pte_addr,
|
|
|
|
uint16_t devid)
|
|
|
|
{
|
|
|
|
uint64_t pte;
|
|
|
|
|
|
|
|
if (dma_memory_read(&address_space_memory, pte_addr, &pte, sizeof(pte))) {
|
|
|
|
trace_amdvi_get_pte_hwerror(pte_addr);
|
|
|
|
amdvi_log_pagetab_error(s, devid, pte_addr, 0);
|
|
|
|
pte = 0;
|
|
|
|
return pte;
|
|
|
|
}
|
|
|
|
|
|
|
|
pte = le64_to_cpu(pte);
|
|
|
|
return pte;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_page_walk(AMDVIAddressSpace *as, uint64_t *dte,
|
|
|
|
IOMMUTLBEntry *ret, unsigned perms,
|
|
|
|
hwaddr addr)
|
|
|
|
{
|
|
|
|
unsigned level, present, pte_perms, oldlevel;
|
|
|
|
uint64_t pte = dte[0], pte_addr, page_mask;
|
|
|
|
|
|
|
|
/* make sure the DTE has TV = 1 */
|
|
|
|
if (pte & AMDVI_DEV_TRANSLATION_VALID) {
|
|
|
|
level = get_pte_translation_mode(pte);
|
|
|
|
if (level >= 7) {
|
|
|
|
trace_amdvi_mode_invalid(level, addr);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (level == 0) {
|
|
|
|
goto no_remap;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* we are at the leaf page table or page table encodes a huge page */
|
|
|
|
while (level > 0) {
|
|
|
|
pte_perms = amdvi_get_perms(pte);
|
|
|
|
present = pte & 1;
|
|
|
|
if (!present || perms != (perms & pte_perms)) {
|
|
|
|
amdvi_page_fault(as->iommu_state, as->devfn, addr, perms);
|
|
|
|
trace_amdvi_page_fault(addr);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* go to the next lower level */
|
|
|
|
pte_addr = pte & AMDVI_DEV_PT_ROOT_MASK;
|
|
|
|
/* add offset and load pte */
|
|
|
|
pte_addr += ((addr >> (3 + 9 * level)) & 0x1FF) << 3;
|
|
|
|
pte = amdvi_get_pte_entry(as->iommu_state, pte_addr, as->devfn);
|
|
|
|
if (!pte) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
oldlevel = level;
|
|
|
|
level = get_pte_translation_mode(pte);
|
|
|
|
if (level == 0x7) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (level == 0x7) {
|
|
|
|
page_mask = pte_override_page_mask(pte);
|
|
|
|
} else {
|
|
|
|
page_mask = pte_get_page_mask(oldlevel);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* get access permissions from pte */
|
|
|
|
ret->iova = addr & page_mask;
|
|
|
|
ret->translated_addr = (pte & AMDVI_DEV_PT_ROOT_MASK) & page_mask;
|
|
|
|
ret->addr_mask = ~page_mask;
|
|
|
|
ret->perm = amdvi_get_perms(pte);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
no_remap:
|
|
|
|
ret->iova = addr & AMDVI_PAGE_MASK_4K;
|
|
|
|
ret->translated_addr = addr & AMDVI_PAGE_MASK_4K;
|
|
|
|
ret->addr_mask = ~AMDVI_PAGE_MASK_4K;
|
|
|
|
ret->perm = amdvi_get_perms(pte);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_do_translate(AMDVIAddressSpace *as, hwaddr addr,
|
|
|
|
bool is_write, IOMMUTLBEntry *ret)
|
|
|
|
{
|
|
|
|
AMDVIState *s = as->iommu_state;
|
|
|
|
uint16_t devid = PCI_BUILD_BDF(as->bus_num, as->devfn);
|
|
|
|
AMDVIIOTLBEntry *iotlb_entry = amdvi_iotlb_lookup(s, addr, devid);
|
|
|
|
uint64_t entry[4];
|
|
|
|
|
|
|
|
if (iotlb_entry) {
|
|
|
|
trace_amdvi_iotlb_hit(PCI_BUS_NUM(devid), PCI_SLOT(devid),
|
|
|
|
PCI_FUNC(devid), addr, iotlb_entry->translated_addr);
|
|
|
|
ret->iova = addr & ~iotlb_entry->page_mask;
|
|
|
|
ret->translated_addr = iotlb_entry->translated_addr;
|
|
|
|
ret->addr_mask = iotlb_entry->page_mask;
|
|
|
|
ret->perm = iotlb_entry->perms;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!amdvi_get_dte(s, devid, entry)) {
|
2018-10-01 21:44:32 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* devices with V = 0 are not translated */
|
|
|
|
if (!(entry[0] & AMDVI_DEV_VALID)) {
|
2016-09-20 17:42:33 +02:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
amdvi_page_walk(as, entry, ret,
|
|
|
|
is_write ? AMDVI_PERM_WRITE : AMDVI_PERM_READ, addr);
|
|
|
|
|
|
|
|
amdvi_update_iotlb(s, devid, addr, *ret,
|
|
|
|
entry[1] & AMDVI_DEV_DOMID_ID_MASK);
|
|
|
|
return;
|
|
|
|
|
|
|
|
out:
|
|
|
|
ret->iova = addr & AMDVI_PAGE_MASK_4K;
|
|
|
|
ret->translated_addr = addr & AMDVI_PAGE_MASK_4K;
|
|
|
|
ret->addr_mask = ~AMDVI_PAGE_MASK_4K;
|
|
|
|
ret->perm = IOMMU_RW;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool amdvi_is_interrupt_addr(hwaddr addr)
|
|
|
|
{
|
|
|
|
return addr >= AMDVI_INT_ADDR_FIRST && addr <= AMDVI_INT_ADDR_LAST;
|
|
|
|
}
|
|
|
|
|
2017-07-11 05:56:19 +02:00
|
|
|
static IOMMUTLBEntry amdvi_translate(IOMMUMemoryRegion *iommu, hwaddr addr,
|
2018-06-15 15:57:16 +02:00
|
|
|
IOMMUAccessFlags flag, int iommu_idx)
|
2016-09-20 17:42:33 +02:00
|
|
|
{
|
|
|
|
AMDVIAddressSpace *as = container_of(iommu, AMDVIAddressSpace, iommu);
|
|
|
|
AMDVIState *s = as->iommu_state;
|
|
|
|
IOMMUTLBEntry ret = {
|
|
|
|
.target_as = &address_space_memory,
|
|
|
|
.iova = addr,
|
|
|
|
.translated_addr = 0,
|
|
|
|
.addr_mask = ~(hwaddr)0,
|
|
|
|
.perm = IOMMU_NONE
|
|
|
|
};
|
|
|
|
|
|
|
|
if (!s->enabled) {
|
|
|
|
/* AMDVI disabled - corresponds to iommu=off not
|
|
|
|
* failure to provide any parameter
|
|
|
|
*/
|
|
|
|
ret.iova = addr & AMDVI_PAGE_MASK_4K;
|
|
|
|
ret.translated_addr = addr & AMDVI_PAGE_MASK_4K;
|
|
|
|
ret.addr_mask = ~AMDVI_PAGE_MASK_4K;
|
|
|
|
ret.perm = IOMMU_RW;
|
|
|
|
return ret;
|
|
|
|
} else if (amdvi_is_interrupt_addr(addr)) {
|
|
|
|
ret.iova = addr & AMDVI_PAGE_MASK_4K;
|
|
|
|
ret.translated_addr = addr & AMDVI_PAGE_MASK_4K;
|
|
|
|
ret.addr_mask = ~AMDVI_PAGE_MASK_4K;
|
|
|
|
ret.perm = IOMMU_WO;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2017-05-19 05:19:40 +02:00
|
|
|
amdvi_do_translate(as, addr, flag & IOMMU_WO, &ret);
|
2016-09-20 17:42:33 +02:00
|
|
|
trace_amdvi_translation_result(as->bus_num, PCI_SLOT(as->devfn),
|
|
|
|
PCI_FUNC(as->devfn), addr, ret.translated_addr);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-10-01 21:44:39 +02:00
|
|
|
static int amdvi_get_irte(AMDVIState *s, MSIMessage *origin, uint64_t *dte,
|
|
|
|
union irte *irte, uint16_t devid)
|
|
|
|
{
|
|
|
|
uint64_t irte_root, offset;
|
|
|
|
|
|
|
|
irte_root = dte[2] & AMDVI_IR_PHYS_ADDR_MASK;
|
|
|
|
offset = (origin->data & AMDVI_IRTE_OFFSET) << 2;
|
|
|
|
|
|
|
|
trace_amdvi_ir_irte(irte_root, offset);
|
|
|
|
|
|
|
|
if (dma_memory_read(&address_space_memory, irte_root + offset,
|
|
|
|
irte, sizeof(*irte))) {
|
|
|
|
trace_amdvi_ir_err("failed to get irte");
|
|
|
|
return -AMDVI_IR_GET_IRTE;
|
|
|
|
}
|
|
|
|
|
|
|
|
trace_amdvi_ir_irte_val(irte->val);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int amdvi_int_remap_legacy(AMDVIState *iommu,
|
|
|
|
MSIMessage *origin,
|
|
|
|
MSIMessage *translated,
|
|
|
|
uint64_t *dte,
|
|
|
|
X86IOMMUIrq *irq,
|
|
|
|
uint16_t sid)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
union irte irte;
|
|
|
|
|
|
|
|
/* get interrupt remapping table */
|
|
|
|
ret = amdvi_get_irte(iommu, origin, dte, &irte, sid);
|
|
|
|
if (ret < 0) {
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!irte.fields.valid) {
|
|
|
|
trace_amdvi_ir_target_abort("RemapEn is disabled");
|
|
|
|
return -AMDVI_IR_TARGET_ABORT;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (irte.fields.guest_mode) {
|
|
|
|
error_report_once("guest mode is not zero");
|
|
|
|
return -AMDVI_IR_ERR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (irte.fields.int_type > AMDVI_IOAPIC_INT_TYPE_ARBITRATED) {
|
|
|
|
error_report_once("reserved int_type");
|
|
|
|
return -AMDVI_IR_ERR;
|
|
|
|
}
|
|
|
|
|
|
|
|
irq->delivery_mode = irte.fields.int_type;
|
|
|
|
irq->vector = irte.fields.vector;
|
|
|
|
irq->dest_mode = irte.fields.dm;
|
|
|
|
irq->redir_hint = irte.fields.rq_eoi;
|
|
|
|
irq->dest = irte.fields.destination;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-10-01 21:44:43 +02:00
|
|
|
static int amdvi_get_irte_ga(AMDVIState *s, MSIMessage *origin, uint64_t *dte,
|
|
|
|
struct irte_ga *irte, uint16_t devid)
|
|
|
|
{
|
|
|
|
uint64_t irte_root, offset;
|
|
|
|
|
|
|
|
irte_root = dte[2] & AMDVI_IR_PHYS_ADDR_MASK;
|
|
|
|
offset = (origin->data & AMDVI_IRTE_OFFSET) << 4;
|
|
|
|
trace_amdvi_ir_irte(irte_root, offset);
|
|
|
|
|
|
|
|
if (dma_memory_read(&address_space_memory, irte_root + offset,
|
|
|
|
irte, sizeof(*irte))) {
|
|
|
|
trace_amdvi_ir_err("failed to get irte_ga");
|
|
|
|
return -AMDVI_IR_GET_IRTE;
|
|
|
|
}
|
|
|
|
|
|
|
|
trace_amdvi_ir_irte_ga_val(irte->hi.val, irte->lo.val);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int amdvi_int_remap_ga(AMDVIState *iommu,
|
|
|
|
MSIMessage *origin,
|
|
|
|
MSIMessage *translated,
|
|
|
|
uint64_t *dte,
|
|
|
|
X86IOMMUIrq *irq,
|
|
|
|
uint16_t sid)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
struct irte_ga irte;
|
|
|
|
|
|
|
|
/* get interrupt remapping table */
|
|
|
|
ret = amdvi_get_irte_ga(iommu, origin, dte, &irte, sid);
|
|
|
|
if (ret < 0) {
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!irte.lo.fields_remap.valid) {
|
|
|
|
trace_amdvi_ir_target_abort("RemapEn is disabled");
|
|
|
|
return -AMDVI_IR_TARGET_ABORT;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (irte.lo.fields_remap.guest_mode) {
|
|
|
|
error_report_once("guest mode is not zero");
|
|
|
|
return -AMDVI_IR_ERR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (irte.lo.fields_remap.int_type > AMDVI_IOAPIC_INT_TYPE_ARBITRATED) {
|
|
|
|
error_report_once("reserved int_type is set");
|
|
|
|
return -AMDVI_IR_ERR;
|
|
|
|
}
|
|
|
|
|
|
|
|
irq->delivery_mode = irte.lo.fields_remap.int_type;
|
|
|
|
irq->vector = irte.hi.fields.vector;
|
|
|
|
irq->dest_mode = irte.lo.fields_remap.dm;
|
|
|
|
irq->redir_hint = irte.lo.fields_remap.rq_eoi;
|
|
|
|
irq->dest = irte.lo.fields_remap.destination;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-10-01 21:44:39 +02:00
|
|
|
static int __amdvi_int_remap_msi(AMDVIState *iommu,
|
|
|
|
MSIMessage *origin,
|
|
|
|
MSIMessage *translated,
|
|
|
|
uint64_t *dte,
|
|
|
|
X86IOMMUIrq *irq,
|
|
|
|
uint16_t sid)
|
|
|
|
{
|
2018-10-01 21:44:43 +02:00
|
|
|
int ret;
|
2018-10-01 21:44:39 +02:00
|
|
|
uint8_t int_ctl;
|
|
|
|
|
|
|
|
int_ctl = (dte[2] >> AMDVI_IR_INTCTL_SHIFT) & 3;
|
|
|
|
trace_amdvi_ir_intctl(int_ctl);
|
|
|
|
|
|
|
|
switch (int_ctl) {
|
|
|
|
case AMDVI_IR_INTCTL_PASS:
|
|
|
|
memcpy(translated, origin, sizeof(*origin));
|
|
|
|
return 0;
|
|
|
|
case AMDVI_IR_INTCTL_REMAP:
|
|
|
|
break;
|
|
|
|
case AMDVI_IR_INTCTL_ABORT:
|
|
|
|
trace_amdvi_ir_target_abort("int_ctl abort");
|
|
|
|
return -AMDVI_IR_TARGET_ABORT;
|
|
|
|
default:
|
|
|
|
trace_amdvi_ir_err("int_ctl reserved");
|
|
|
|
return -AMDVI_IR_ERR;
|
|
|
|
}
|
|
|
|
|
2018-10-01 21:44:43 +02:00
|
|
|
if (iommu->ga_enabled) {
|
|
|
|
ret = amdvi_int_remap_ga(iommu, origin, translated, dte, irq, sid);
|
|
|
|
} else {
|
|
|
|
ret = amdvi_int_remap_legacy(iommu, origin, translated, dte, irq, sid);
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
2018-10-01 21:44:39 +02:00
|
|
|
}
|
|
|
|
|
2018-10-01 21:44:37 +02:00
|
|
|
/* Interrupt remapping for MSI/MSI-X entry */
|
|
|
|
static int amdvi_int_remap_msi(AMDVIState *iommu,
|
|
|
|
MSIMessage *origin,
|
|
|
|
MSIMessage *translated,
|
|
|
|
uint16_t sid)
|
|
|
|
{
|
2018-10-01 21:44:39 +02:00
|
|
|
int ret = 0;
|
|
|
|
uint64_t pass = 0;
|
|
|
|
uint64_t dte[4] = { 0 };
|
|
|
|
X86IOMMUIrq irq = { 0 };
|
|
|
|
uint8_t dest_mode, delivery_mode;
|
|
|
|
|
2018-10-01 21:44:37 +02:00
|
|
|
assert(origin && translated);
|
|
|
|
|
2018-10-01 21:44:39 +02:00
|
|
|
/*
|
|
|
|
* When IOMMU is enabled, interrupt remap request will come either from
|
|
|
|
* IO-APIC or PCI device. If interrupt is from PCI device then it will
|
|
|
|
* have a valid requester id but if the interrupt is from IO-APIC
|
|
|
|
* then requester id will be invalid.
|
|
|
|
*/
|
|
|
|
if (sid == X86_IOMMU_SID_INVALID) {
|
|
|
|
sid = AMDVI_IOAPIC_SB_DEVID;
|
|
|
|
}
|
|
|
|
|
2018-10-01 21:44:37 +02:00
|
|
|
trace_amdvi_ir_remap_msi_req(origin->address, origin->data, sid);
|
|
|
|
|
2018-10-01 21:44:39 +02:00
|
|
|
/* check if device table entry is set before we go further. */
|
|
|
|
if (!iommu || !iommu->devtab_len) {
|
|
|
|
memcpy(translated, origin, sizeof(*origin));
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!amdvi_get_dte(iommu, sid, dte)) {
|
|
|
|
return -AMDVI_IR_ERR;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check if IR is enabled in DTE */
|
|
|
|
if (!(dte[2] & AMDVI_IR_REMAP_ENABLE)) {
|
2018-10-01 21:44:37 +02:00
|
|
|
memcpy(translated, origin, sizeof(*origin));
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2018-10-01 21:44:39 +02:00
|
|
|
/* validate that we are configure with intremap=on */
|
2018-12-20 06:40:36 +01:00
|
|
|
if (!x86_iommu_ir_supported(X86_IOMMU_DEVICE(iommu))) {
|
2018-10-01 21:44:39 +02:00
|
|
|
trace_amdvi_err("Interrupt remapping is enabled in the guest but "
|
|
|
|
"not in the host. Use intremap=on to enable interrupt "
|
|
|
|
"remapping in amd-iommu.");
|
|
|
|
return -AMDVI_IR_ERR;
|
|
|
|
}
|
|
|
|
|
2018-10-01 21:44:37 +02:00
|
|
|
if (origin->address & AMDVI_MSI_ADDR_HI_MASK) {
|
|
|
|
trace_amdvi_err("MSI address high 32 bits non-zero when "
|
|
|
|
"Interrupt Remapping enabled.");
|
|
|
|
return -AMDVI_IR_ERR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((origin->address & AMDVI_MSI_ADDR_LO_MASK) != APIC_DEFAULT_ADDRESS) {
|
|
|
|
trace_amdvi_err("MSI is not from IOAPIC.");
|
|
|
|
return -AMDVI_IR_ERR;
|
|
|
|
}
|
|
|
|
|
2018-10-01 21:44:39 +02:00
|
|
|
/*
|
|
|
|
* The MSI data register [10:8] are used to get the upstream interrupt type.
|
|
|
|
*
|
|
|
|
* See MSI/MSI-X format:
|
|
|
|
* https://pdfs.semanticscholar.org/presentation/9420/c279e942eca568157711ef5c92b800c40a79.pdf
|
|
|
|
* (page 5)
|
|
|
|
*/
|
|
|
|
delivery_mode = (origin->data >> MSI_DATA_DELIVERY_MODE_SHIFT) & 7;
|
|
|
|
|
|
|
|
switch (delivery_mode) {
|
|
|
|
case AMDVI_IOAPIC_INT_TYPE_FIXED:
|
|
|
|
case AMDVI_IOAPIC_INT_TYPE_ARBITRATED:
|
|
|
|
trace_amdvi_ir_delivery_mode("fixed/arbitrated");
|
|
|
|
ret = __amdvi_int_remap_msi(iommu, origin, translated, dte, &irq, sid);
|
|
|
|
if (ret < 0) {
|
|
|
|
goto remap_fail;
|
|
|
|
} else {
|
|
|
|
/* Translate IRQ to MSI messages */
|
|
|
|
x86_iommu_irq_to_msi_message(&irq, translated);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case AMDVI_IOAPIC_INT_TYPE_SMI:
|
|
|
|
error_report("SMI is not supported!");
|
|
|
|
ret = -AMDVI_IR_ERR;
|
|
|
|
break;
|
|
|
|
case AMDVI_IOAPIC_INT_TYPE_NMI:
|
|
|
|
pass = dte[3] & AMDVI_DEV_NMI_PASS_MASK;
|
|
|
|
trace_amdvi_ir_delivery_mode("nmi");
|
|
|
|
break;
|
|
|
|
case AMDVI_IOAPIC_INT_TYPE_INIT:
|
|
|
|
pass = dte[3] & AMDVI_DEV_INT_PASS_MASK;
|
|
|
|
trace_amdvi_ir_delivery_mode("init");
|
|
|
|
break;
|
|
|
|
case AMDVI_IOAPIC_INT_TYPE_EINT:
|
|
|
|
pass = dte[3] & AMDVI_DEV_EINT_PASS_MASK;
|
|
|
|
trace_amdvi_ir_delivery_mode("eint");
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
trace_amdvi_ir_delivery_mode("unsupported delivery_mode");
|
|
|
|
ret = -AMDVI_IR_ERR;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ret < 0) {
|
|
|
|
goto remap_fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The MSI address register bit[2] is used to get the destination
|
|
|
|
* mode. The dest_mode 1 is valid for fixed and arbitrated interrupts
|
|
|
|
* only.
|
|
|
|
*/
|
|
|
|
dest_mode = (origin->address >> MSI_ADDR_DEST_MODE_SHIFT) & 1;
|
|
|
|
if (dest_mode) {
|
|
|
|
trace_amdvi_ir_err("invalid dest_mode");
|
|
|
|
ret = -AMDVI_IR_ERR;
|
|
|
|
goto remap_fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pass) {
|
|
|
|
memcpy(translated, origin, sizeof(*origin));
|
|
|
|
} else {
|
|
|
|
trace_amdvi_ir_err("passthrough is not enabled");
|
|
|
|
ret = -AMDVI_IR_ERR;
|
|
|
|
goto remap_fail;
|
|
|
|
}
|
|
|
|
|
2018-10-01 21:44:37 +02:00
|
|
|
out:
|
|
|
|
trace_amdvi_ir_remap_msi(origin->address, origin->data,
|
|
|
|
translated->address, translated->data);
|
|
|
|
return 0;
|
2018-10-01 21:44:39 +02:00
|
|
|
|
|
|
|
remap_fail:
|
|
|
|
return ret;
|
2018-10-01 21:44:37 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static int amdvi_int_remap(X86IOMMUState *iommu,
|
|
|
|
MSIMessage *origin,
|
|
|
|
MSIMessage *translated,
|
|
|
|
uint16_t sid)
|
|
|
|
{
|
|
|
|
return amdvi_int_remap_msi(AMD_IOMMU_DEVICE(iommu), origin,
|
|
|
|
translated, sid);
|
|
|
|
}
|
|
|
|
|
|
|
|
static MemTxResult amdvi_mem_ir_write(void *opaque, hwaddr addr,
|
|
|
|
uint64_t value, unsigned size,
|
|
|
|
MemTxAttrs attrs)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
MSIMessage from = { 0, 0 }, to = { 0, 0 };
|
|
|
|
uint16_t sid = AMDVI_IOAPIC_SB_DEVID;
|
|
|
|
|
|
|
|
from.address = (uint64_t) addr + AMDVI_INT_ADDR_FIRST;
|
|
|
|
from.data = (uint32_t) value;
|
|
|
|
|
|
|
|
trace_amdvi_mem_ir_write_req(addr, value, size);
|
|
|
|
|
|
|
|
if (!attrs.unspecified) {
|
|
|
|
/* We have explicit Source ID */
|
|
|
|
sid = attrs.requester_id;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = amdvi_int_remap_msi(opaque, &from, &to, sid);
|
|
|
|
if (ret < 0) {
|
|
|
|
/* TODO: log the event using IOMMU log event interface */
|
|
|
|
error_report_once("failed to remap interrupt from devid 0x%x", sid);
|
|
|
|
return MEMTX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
apic_get_class()->send_msi(&to);
|
|
|
|
|
|
|
|
trace_amdvi_mem_ir_write(to.address, to.data);
|
|
|
|
return MEMTX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static MemTxResult amdvi_mem_ir_read(void *opaque, hwaddr addr,
|
|
|
|
uint64_t *data, unsigned size,
|
|
|
|
MemTxAttrs attrs)
|
|
|
|
{
|
|
|
|
return MEMTX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const MemoryRegionOps amdvi_ir_ops = {
|
|
|
|
.read_with_attrs = amdvi_mem_ir_read,
|
|
|
|
.write_with_attrs = amdvi_mem_ir_write,
|
|
|
|
.endianness = DEVICE_LITTLE_ENDIAN,
|
|
|
|
.impl = {
|
|
|
|
.min_access_size = 4,
|
|
|
|
.max_access_size = 4,
|
|
|
|
},
|
|
|
|
.valid = {
|
|
|
|
.min_access_size = 4,
|
|
|
|
.max_access_size = 4,
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2016-09-20 17:42:33 +02:00
|
|
|
static AddressSpace *amdvi_host_dma_iommu(PCIBus *bus, void *opaque, int devfn)
|
|
|
|
{
|
2018-10-01 21:44:34 +02:00
|
|
|
char name[128];
|
2016-09-20 17:42:33 +02:00
|
|
|
AMDVIState *s = opaque;
|
2018-10-01 21:44:34 +02:00
|
|
|
AMDVIAddressSpace **iommu_as, *amdvi_dev_as;
|
2016-09-20 17:42:33 +02:00
|
|
|
int bus_num = pci_bus_num(bus);
|
|
|
|
|
|
|
|
iommu_as = s->address_spaces[bus_num];
|
|
|
|
|
|
|
|
/* allocate memory during the first run */
|
|
|
|
if (!iommu_as) {
|
|
|
|
iommu_as = g_malloc0(sizeof(AMDVIAddressSpace *) * PCI_DEVFN_MAX);
|
|
|
|
s->address_spaces[bus_num] = iommu_as;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* set up AMD-Vi region */
|
|
|
|
if (!iommu_as[devfn]) {
|
2018-10-01 21:44:34 +02:00
|
|
|
snprintf(name, sizeof(name), "amd_iommu_devfn_%d", devfn);
|
|
|
|
|
2016-09-20 17:42:33 +02:00
|
|
|
iommu_as[devfn] = g_malloc0(sizeof(AMDVIAddressSpace));
|
|
|
|
iommu_as[devfn]->bus_num = (uint8_t)bus_num;
|
|
|
|
iommu_as[devfn]->devfn = (uint8_t)devfn;
|
|
|
|
iommu_as[devfn]->iommu_state = s;
|
|
|
|
|
2018-10-01 21:44:34 +02:00
|
|
|
amdvi_dev_as = iommu_as[devfn];
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Memory region relationships looks like (Address range shows
|
|
|
|
* only lower 32 bits to make it short in length...):
|
|
|
|
*
|
|
|
|
* |-----------------+-------------------+----------|
|
|
|
|
* | Name | Address range | Priority |
|
|
|
|
* |-----------------+-------------------+----------+
|
|
|
|
* | amdvi_root | 00000000-ffffffff | 0 |
|
|
|
|
* | amdvi_iommu | 00000000-ffffffff | 1 |
|
2018-10-01 21:44:37 +02:00
|
|
|
* | amdvi_iommu_ir | fee00000-feefffff | 64 |
|
2018-10-01 21:44:34 +02:00
|
|
|
* |-----------------+-------------------+----------|
|
|
|
|
*/
|
|
|
|
memory_region_init_iommu(&amdvi_dev_as->iommu,
|
|
|
|
sizeof(amdvi_dev_as->iommu),
|
2017-07-11 05:56:20 +02:00
|
|
|
TYPE_AMD_IOMMU_MEMORY_REGION,
|
|
|
|
OBJECT(s),
|
2018-10-01 21:44:34 +02:00
|
|
|
"amd_iommu", UINT64_MAX);
|
|
|
|
memory_region_init(&amdvi_dev_as->root, OBJECT(s),
|
|
|
|
"amdvi_root", UINT64_MAX);
|
|
|
|
address_space_init(&amdvi_dev_as->as, &amdvi_dev_as->root, name);
|
2018-10-01 21:44:37 +02:00
|
|
|
memory_region_init_io(&amdvi_dev_as->iommu_ir, OBJECT(s),
|
|
|
|
&amdvi_ir_ops, s, "amd_iommu_ir",
|
|
|
|
AMDVI_INT_ADDR_SIZE);
|
|
|
|
memory_region_add_subregion_overlap(&amdvi_dev_as->root,
|
|
|
|
AMDVI_INT_ADDR_FIRST,
|
|
|
|
&amdvi_dev_as->iommu_ir,
|
|
|
|
64);
|
2018-10-01 21:44:34 +02:00
|
|
|
memory_region_add_subregion_overlap(&amdvi_dev_as->root, 0,
|
|
|
|
MEMORY_REGION(&amdvi_dev_as->iommu),
|
|
|
|
1);
|
2016-09-20 17:42:33 +02:00
|
|
|
}
|
|
|
|
return &iommu_as[devfn]->as;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const MemoryRegionOps mmio_mem_ops = {
|
|
|
|
.read = amdvi_mmio_read,
|
|
|
|
.write = amdvi_mmio_write,
|
|
|
|
.endianness = DEVICE_LITTLE_ENDIAN,
|
|
|
|
.impl = {
|
|
|
|
.min_access_size = 1,
|
|
|
|
.max_access_size = 8,
|
|
|
|
.unaligned = false,
|
|
|
|
},
|
|
|
|
.valid = {
|
|
|
|
.min_access_size = 1,
|
|
|
|
.max_access_size = 8,
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-09-24 10:25:17 +02:00
|
|
|
static int amdvi_iommu_notify_flag_changed(IOMMUMemoryRegion *iommu,
|
|
|
|
IOMMUNotifierFlag old,
|
|
|
|
IOMMUNotifierFlag new,
|
|
|
|
Error **errp)
|
2016-09-20 17:42:33 +02:00
|
|
|
{
|
|
|
|
AMDVIAddressSpace *as = container_of(iommu, AMDVIAddressSpace, iommu);
|
|
|
|
|
2016-09-23 07:02:28 +02:00
|
|
|
if (new & IOMMU_NOTIFIER_MAP) {
|
2019-09-24 10:25:17 +02:00
|
|
|
error_setg(errp,
|
|
|
|
"device %02x.%02x.%x requires iommu notifier which is not "
|
|
|
|
"currently supported", as->bus_num, PCI_SLOT(as->devfn),
|
|
|
|
PCI_FUNC(as->devfn));
|
|
|
|
return -EINVAL;
|
2016-09-23 07:02:28 +02:00
|
|
|
}
|
2019-09-24 10:25:17 +02:00
|
|
|
return 0;
|
2016-09-20 17:42:33 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_init(AMDVIState *s)
|
|
|
|
{
|
|
|
|
amdvi_iotlb_reset(s);
|
|
|
|
|
|
|
|
s->devtab_len = 0;
|
|
|
|
s->cmdbuf_len = 0;
|
|
|
|
s->cmdbuf_head = 0;
|
|
|
|
s->cmdbuf_tail = 0;
|
|
|
|
s->evtlog_head = 0;
|
|
|
|
s->evtlog_tail = 0;
|
|
|
|
s->excl_enabled = false;
|
|
|
|
s->excl_allow = false;
|
|
|
|
s->mmio_enabled = false;
|
|
|
|
s->enabled = false;
|
|
|
|
s->ats_enabled = false;
|
|
|
|
s->cmdbuf_enabled = false;
|
|
|
|
|
|
|
|
/* reset MMIO */
|
|
|
|
memset(s->mmior, 0, AMDVI_MMIO_SIZE);
|
|
|
|
amdvi_set_quad(s, AMDVI_MMIO_EXT_FEATURES, AMDVI_EXT_FEATURES,
|
|
|
|
0xffffffffffffffef, 0);
|
|
|
|
amdvi_set_quad(s, AMDVI_MMIO_STATUS, 0, 0x98, 0x67);
|
|
|
|
|
|
|
|
/* reset device ident */
|
|
|
|
pci_config_set_vendor_id(s->pci.dev.config, PCI_VENDOR_ID_AMD);
|
|
|
|
pci_config_set_prog_interface(s->pci.dev.config, 00);
|
|
|
|
pci_config_set_device_id(s->pci.dev.config, s->devid);
|
|
|
|
pci_config_set_class(s->pci.dev.config, 0x0806);
|
|
|
|
|
|
|
|
/* reset AMDVI specific capabilities, all r/o */
|
|
|
|
pci_set_long(s->pci.dev.config + s->capab_offset, AMDVI_CAPAB_FEATURES);
|
|
|
|
pci_set_long(s->pci.dev.config + s->capab_offset + AMDVI_CAPAB_BAR_LOW,
|
|
|
|
s->mmio.addr & ~(0xffff0000));
|
|
|
|
pci_set_long(s->pci.dev.config + s->capab_offset + AMDVI_CAPAB_BAR_HIGH,
|
|
|
|
(s->mmio.addr & ~(0xffff)) >> 16);
|
|
|
|
pci_set_long(s->pci.dev.config + s->capab_offset + AMDVI_CAPAB_RANGE,
|
|
|
|
0xff000000);
|
|
|
|
pci_set_long(s->pci.dev.config + s->capab_offset + AMDVI_CAPAB_MISC, 0);
|
|
|
|
pci_set_long(s->pci.dev.config + s->capab_offset + AMDVI_CAPAB_MISC,
|
|
|
|
AMDVI_MAX_PH_ADDR | AMDVI_MAX_GVA_ADDR | AMDVI_MAX_VA_ADDR);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_reset(DeviceState *dev)
|
|
|
|
{
|
|
|
|
AMDVIState *s = AMD_IOMMU_DEVICE(dev);
|
|
|
|
|
|
|
|
msi_reset(&s->pci.dev);
|
|
|
|
amdvi_init(s);
|
|
|
|
}
|
|
|
|
|
2019-12-05 18:46:25 +01:00
|
|
|
static void amdvi_realize(DeviceState *dev, Error **errp)
|
2016-09-20 17:42:33 +02:00
|
|
|
{
|
2016-10-04 06:03:28 +02:00
|
|
|
int ret = 0;
|
2016-09-20 17:42:33 +02:00
|
|
|
AMDVIState *s = AMD_IOMMU_DEVICE(dev);
|
2016-09-20 17:42:34 +02:00
|
|
|
X86IOMMUState *x86_iommu = X86_IOMMU_DEVICE(dev);
|
2017-05-08 22:08:12 +02:00
|
|
|
MachineState *ms = MACHINE(qdev_get_machine());
|
2017-11-29 13:33:12 +01:00
|
|
|
PCMachineState *pcms = PC_MACHINE(ms);
|
2019-10-22 09:39:50 +02:00
|
|
|
X86MachineState *x86ms = X86_MACHINE(ms);
|
2017-11-29 13:33:12 +01:00
|
|
|
PCIBus *bus = pcms->bus;
|
2017-05-08 22:08:12 +02:00
|
|
|
|
2016-09-20 17:42:33 +02:00
|
|
|
s->iotlb = g_hash_table_new_full(amdvi_uint64_hash,
|
|
|
|
amdvi_uint64_equal, g_free, g_free);
|
|
|
|
|
|
|
|
/* This device should take care of IOMMU PCI properties */
|
2016-09-20 17:42:34 +02:00
|
|
|
x86_iommu->type = TYPE_AMD;
|
2016-09-20 17:42:33 +02:00
|
|
|
qdev_set_parent_bus(DEVICE(&s->pci), &bus->qbus);
|
2019-12-05 18:46:25 +01:00
|
|
|
object_property_set_bool(OBJECT(&s->pci), true, "realized", errp);
|
2017-06-27 08:16:50 +02:00
|
|
|
ret = pci_add_capability(&s->pci.dev, AMDVI_CAPAB_ID_SEC, 0,
|
2019-12-05 18:46:25 +01:00
|
|
|
AMDVI_CAPAB_SIZE, errp);
|
2017-06-27 08:16:50 +02:00
|
|
|
if (ret < 0) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
s->capab_offset = ret;
|
|
|
|
|
|
|
|
ret = pci_add_capability(&s->pci.dev, PCI_CAP_ID_MSI, 0,
|
2019-12-05 18:46:25 +01:00
|
|
|
AMDVI_CAPAB_REG_SIZE, errp);
|
2017-06-27 08:16:50 +02:00
|
|
|
if (ret < 0) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
ret = pci_add_capability(&s->pci.dev, PCI_CAP_ID_HT, 0,
|
2019-12-05 18:46:25 +01:00
|
|
|
AMDVI_CAPAB_REG_SIZE, errp);
|
2017-06-27 08:16:50 +02:00
|
|
|
if (ret < 0) {
|
|
|
|
return;
|
|
|
|
}
|
2016-09-20 17:42:33 +02:00
|
|
|
|
2018-10-01 21:44:37 +02:00
|
|
|
/* Pseudo address space under root PCI bus. */
|
2019-10-22 09:39:50 +02:00
|
|
|
x86ms->ioapic_as = amdvi_host_dma_iommu(bus, s, AMDVI_IOAPIC_SB_DEVID);
|
2018-10-01 21:44:37 +02:00
|
|
|
|
2016-09-20 17:42:33 +02:00
|
|
|
/* set up MMIO */
|
|
|
|
memory_region_init_io(&s->mmio, OBJECT(s), &mmio_mem_ops, s, "amdvi-mmio",
|
|
|
|
AMDVI_MMIO_SIZE);
|
|
|
|
|
|
|
|
sysbus_init_mmio(SYS_BUS_DEVICE(s), &s->mmio);
|
|
|
|
sysbus_mmio_map(SYS_BUS_DEVICE(s), 0, AMDVI_BASE_ADDR);
|
|
|
|
pci_setup_iommu(bus, amdvi_host_dma_iommu, s);
|
2019-12-05 18:46:25 +01:00
|
|
|
s->devid = object_property_get_int(OBJECT(&s->pci), "addr", errp);
|
|
|
|
msi_init(&s->pci.dev, 0, 1, true, false, errp);
|
2016-09-20 17:42:33 +02:00
|
|
|
amdvi_init(s);
|
|
|
|
}
|
|
|
|
|
|
|
|
static const VMStateDescription vmstate_amdvi = {
|
|
|
|
.name = "amd-iommu",
|
|
|
|
.unmigratable = 1
|
|
|
|
};
|
|
|
|
|
|
|
|
static void amdvi_instance_init(Object *klass)
|
|
|
|
{
|
|
|
|
AMDVIState *s = AMD_IOMMU_DEVICE(klass);
|
|
|
|
|
|
|
|
object_initialize(&s->pci, sizeof(s->pci), TYPE_AMD_IOMMU_PCI);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void amdvi_class_init(ObjectClass *klass, void* data)
|
|
|
|
{
|
|
|
|
DeviceClass *dc = DEVICE_CLASS(klass);
|
|
|
|
X86IOMMUClass *dc_class = X86_IOMMU_CLASS(klass);
|
|
|
|
|
|
|
|
dc->reset = amdvi_reset;
|
|
|
|
dc->vmsd = &vmstate_amdvi;
|
|
|
|
dc->hotpluggable = false;
|
|
|
|
dc_class->realize = amdvi_realize;
|
2018-10-01 21:44:37 +02:00
|
|
|
dc_class->int_remap = amdvi_int_remap;
|
2017-05-03 22:35:47 +02:00
|
|
|
/* Supported by the pc-q35-* machine types */
|
sysbus: Set user_creatable=false by default on TYPE_SYS_BUS_DEVICE
commit 33cd52b5d7b9adfd009e95f07e6c64dd88ae2a31 unset
cannot_instantiate_with_device_add_yet in TYPE_SYSBUS, making all
sysbus devices appear on "-device help" and lack the "no-user"
flag in "info qdm".
To fix this, we can set user_creatable=false by default on
TYPE_SYS_BUS_DEVICE, but this requires setting
user_creatable=true explicitly on the sysbus devices that
actually work with -device.
Fortunately today we have just a few has_dynamic_sysbus=1
machines: virt, pc-q35-*, ppce500, and spapr.
virt, ppce500, and spapr have extra checks to ensure just a few
device types can be instantiated:
* virt supports only TYPE_VFIO_CALXEDA_XGMAC, TYPE_VFIO_AMD_XGBE.
* ppce500 supports only TYPE_ETSEC_COMMON.
* spapr supports only TYPE_SPAPR_PCI_HOST_BRIDGE.
This patch sets user_creatable=true explicitly on those 4 device
classes.
Now, the more complex cases:
pc-q35-*: q35 has no sysbus device whitelist yet (which is a
separate bug). We are in the process of fixing it and building a
sysbus whitelist on q35, but in the meantime we can fix the
"-device help" and "info qdm" bugs mentioned above. Also, despite
not being strictly necessary for fixing the q35 bug, reducing the
list of user_creatable=true devices will help us be more
confident when building the q35 whitelist.
xen: We also have a hack at xen_set_dynamic_sysbus(), that sets
has_dynamic_sysbus=true at runtime when using the Xen
accelerator. This hack is only used to allow xen-backend devices
to be dynamically plugged/unplugged.
This means today we can use -device with the following 22 device
types, that are the ones compiled into the qemu-system-x86_64 and
qemu-system-i386 binaries:
* allwinner-ahci
* amd-iommu
* cfi.pflash01
* esp
* fw_cfg_io
* fw_cfg_mem
* generic-sdhci
* hpet
* intel-iommu
* ioapic
* isabus-bridge
* kvmclock
* kvm-ioapic
* kvmvapic
* SUNW,fdtwo
* sysbus-ahci
* sysbus-fdc
* sysbus-ohci
* unimplemented-device
* virtio-mmio
* xen-backend
* xen-sysdev
This patch adds user_creatable=true explicitly to those devices,
temporarily, just to keep 100% compatibility with existing
behavior of q35. Subsequent patches will remove
user_creatable=true from the devices that are really not meant to
user-creatable on any machine, and remove the FIXME comment from
the ones that are really supposed to be user-creatable. This is
being done in separate patches because we still don't have an
obvious list of devices that will be whitelisted by q35, and I
would like to get each device reviewed individually.
Cc: Alexander Graf <agraf@suse.de>
Cc: Alex Williamson <alex.williamson@redhat.com>
Cc: Alistair Francis <alistair.francis@xilinx.com>
Cc: Beniamino Galvani <b.galvani@gmail.com>
Cc: Christian Borntraeger <borntraeger@de.ibm.com>
Cc: Cornelia Huck <cornelia.huck@de.ibm.com>
Cc: David Gibson <david@gibson.dropbear.id.au>
Cc: "Edgar E. Iglesias" <edgar.iglesias@gmail.com>
Cc: Eduardo Habkost <ehabkost@redhat.com>
Cc: Frank Blaschka <frank.blaschka@de.ibm.com>
Cc: Gabriel L. Somlo <somlo@cmu.edu>
Cc: Gerd Hoffmann <kraxel@redhat.com>
Cc: Igor Mammedov <imammedo@redhat.com>
Cc: Jason Wang <jasowang@redhat.com>
Cc: John Snow <jsnow@redhat.com>
Cc: Juergen Gross <jgross@suse.com>
Cc: Kevin Wolf <kwolf@redhat.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Cc: Marcel Apfelbaum <marcel@redhat.com>
Cc: Markus Armbruster <armbru@redhat.com>
Cc: Max Reitz <mreitz@redhat.com>
Cc: "Michael S. Tsirkin" <mst@redhat.com>
Cc: Paolo Bonzini <pbonzini@redhat.com>
Cc: Peter Maydell <peter.maydell@linaro.org>
Cc: Pierre Morel <pmorel@linux.vnet.ibm.com>
Cc: Prasad J Pandit <pjp@fedoraproject.org>
Cc: qemu-arm@nongnu.org
Cc: qemu-block@nongnu.org
Cc: qemu-ppc@nongnu.org
Cc: Richard Henderson <rth@twiddle.net>
Cc: Rob Herring <robh@kernel.org>
Cc: Shannon Zhao <zhaoshenglong@huawei.com>
Cc: sstabellini@kernel.org
Cc: Thomas Huth <thuth@redhat.com>
Cc: Yi Min Zhao <zyimin@linux.vnet.ibm.com>
Acked-by: John Snow <jsnow@redhat.com>
Acked-by: Juergen Gross <jgross@suse.com>
Acked-by: Marcel Apfelbaum <marcel@redhat.com>
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
Message-Id: <20170503203604.31462-3-ehabkost@redhat.com>
Reviewed-by: Markus Armbruster <armbru@redhat.com>
[ehabkost: Small changes at sysbus_device_class_init() comments]
Signed-off-by: Eduardo Habkost <ehabkost@redhat.com>
2017-05-03 22:35:45 +02:00
|
|
|
dc->user_creatable = true;
|
2019-03-27 18:05:18 +01:00
|
|
|
set_bit(DEVICE_CATEGORY_MISC, dc->categories);
|
|
|
|
dc->desc = "AMD IOMMU (AMD-Vi) DMA Remapping device";
|
2016-09-20 17:42:33 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static const TypeInfo amdvi = {
|
|
|
|
.name = TYPE_AMD_IOMMU_DEVICE,
|
|
|
|
.parent = TYPE_X86_IOMMU_DEVICE,
|
|
|
|
.instance_size = sizeof(AMDVIState),
|
|
|
|
.instance_init = amdvi_instance_init,
|
|
|
|
.class_init = amdvi_class_init
|
|
|
|
};
|
|
|
|
|
|
|
|
static const TypeInfo amdviPCI = {
|
|
|
|
.name = "AMDVI-PCI",
|
|
|
|
.parent = TYPE_PCI_DEVICE,
|
|
|
|
.instance_size = sizeof(AMDVIPCIState),
|
2017-09-27 21:56:34 +02:00
|
|
|
.interfaces = (InterfaceInfo[]) {
|
|
|
|
{ INTERFACE_CONVENTIONAL_PCI_DEVICE },
|
|
|
|
{ },
|
|
|
|
},
|
2016-09-20 17:42:33 +02:00
|
|
|
};
|
|
|
|
|
2017-07-11 05:56:20 +02:00
|
|
|
static void amdvi_iommu_memory_region_class_init(ObjectClass *klass, void *data)
|
|
|
|
{
|
|
|
|
IOMMUMemoryRegionClass *imrc = IOMMU_MEMORY_REGION_CLASS(klass);
|
|
|
|
|
|
|
|
imrc->translate = amdvi_translate;
|
|
|
|
imrc->notify_flag_changed = amdvi_iommu_notify_flag_changed;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const TypeInfo amdvi_iommu_memory_region_info = {
|
|
|
|
.parent = TYPE_IOMMU_MEMORY_REGION,
|
|
|
|
.name = TYPE_AMD_IOMMU_MEMORY_REGION,
|
|
|
|
.class_init = amdvi_iommu_memory_region_class_init,
|
|
|
|
};
|
|
|
|
|
2016-09-20 17:42:33 +02:00
|
|
|
static void amdviPCI_register_types(void)
|
|
|
|
{
|
|
|
|
type_register_static(&amdviPCI);
|
|
|
|
type_register_static(&amdvi);
|
2017-07-11 05:56:20 +02:00
|
|
|
type_register_static(&amdvi_iommu_memory_region_info);
|
2016-09-20 17:42:33 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
type_init(amdviPCI_register_types);
|