]>
Commit | Line | Data |
---|---|---|
1da12ec4 LT |
1 | /* |
2 | * QEMU emulation of an Intel IOMMU (VT-d) | |
3 | * (DMA Remapping device) | |
4 | * | |
5 | * Copyright (C) 2013 Knut Omang, Oracle <knut.omang@oracle.com> | |
6 | * Copyright (C) 2014 Le Tan, <tamlokveer@gmail.com> | |
7 | * | |
8 | * This program is free software; you can redistribute it and/or modify | |
9 | * it under the terms of the GNU General Public License as published by | |
10 | * the Free Software Foundation; either version 2 of the License, or | |
11 | * (at your option) any later version. | |
12 | ||
13 | * This program is distributed in the hope that it will be useful, | |
14 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
15 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
16 | * GNU General Public License for more details. | |
17 | ||
18 | * You should have received a copy of the GNU General Public License along | |
19 | * with this program; if not, see <http://www.gnu.org/licenses/>. | |
20 | */ | |
21 | ||
22 | #ifndef INTEL_IOMMU_H | |
23 | #define INTEL_IOMMU_H | |
a27bd6c7 | 24 | |
1c7955c4 | 25 | #include "hw/i386/x86-iommu.h" |
63b88968 | 26 | #include "qemu/iova-tree.h" |
db1015e9 | 27 | #include "qom/object.h" |
1da12ec4 LT |
28 | |
29 | #define TYPE_INTEL_IOMMU_DEVICE "intel-iommu" | |
8063396b | 30 | OBJECT_DECLARE_SIMPLE_TYPE(IntelIOMMUState, INTEL_IOMMU_DEVICE) |
1da12ec4 | 31 | |
1221a474 AK |
32 | #define TYPE_INTEL_IOMMU_MEMORY_REGION "intel-iommu-iommu-memory-region" |
33 | ||
1da12ec4 LT |
34 | /* DMAR Hardware Unit Definition address (IOMMU unit) */ |
35 | #define Q35_HOST_BRIDGE_IOMMU_ADDR 0xfed90000ULL | |
36 | ||
37 | #define VTD_PCI_BUS_MAX 256 | |
38 | #define VTD_PCI_SLOT_MAX 32 | |
39 | #define VTD_PCI_FUNC_MAX 8 | |
1da12ec4 LT |
40 | #define VTD_PCI_SLOT(devfn) (((devfn) >> 3) & 0x1f) |
41 | #define VTD_PCI_FUNC(devfn) ((devfn) & 0x07) | |
1e06f131 | 42 | #define VTD_SID_TO_BUS(sid) (((sid) >> 8) & 0xff) |
d92fa2dc | 43 | #define VTD_SID_TO_DEVFN(sid) ((sid) & 0xff) |
1da12ec4 LT |
44 | |
45 | #define DMAR_REG_SIZE 0x230 | |
92e5d85e PS |
46 | #define VTD_HOST_AW_39BIT 39 |
47 | #define VTD_HOST_AW_48BIT 48 | |
48 | #define VTD_HOST_ADDRESS_WIDTH VTD_HOST_AW_39BIT | |
49 | #define VTD_HAW_MASK(aw) ((1ULL << (aw)) - 1) | |
1da12ec4 | 50 | |
d46114f9 PX |
51 | #define DMAR_REPORT_F_INTR (1) |
52 | ||
651e4cef PX |
53 | #define VTD_MSI_ADDR_HI_MASK (0xffffffff00000000ULL) |
54 | #define VTD_MSI_ADDR_HI_SHIFT (32) | |
55 | #define VTD_MSI_ADDR_LO_MASK (0x00000000ffffffffULL) | |
56 | ||
d92fa2dc LT |
57 | typedef struct VTDContextEntry VTDContextEntry; |
58 | typedef struct VTDContextCacheEntry VTDContextCacheEntry; | |
1da12ec4 | 59 | typedef struct VTDAddressSpace VTDAddressSpace; |
b5a280c0 | 60 | typedef struct VTDIOTLBEntry VTDIOTLBEntry; |
bc38ee10 | 61 | typedef union VTD_IR_TableEntry VTD_IR_TableEntry; |
1f91acee | 62 | typedef union VTD_IR_MSIAddress VTD_IR_MSIAddress; |
fb43cf73 LY |
63 | typedef struct VTDPASIDDirEntry VTDPASIDDirEntry; |
64 | typedef struct VTDPASIDEntry VTDPASIDEntry; | |
d92fa2dc LT |
65 | |
66 | /* Context-Entry */ | |
67 | struct VTDContextEntry { | |
fb43cf73 LY |
68 | union { |
69 | struct { | |
70 | uint64_t lo; | |
71 | uint64_t hi; | |
72 | }; | |
73 | struct { | |
74 | uint64_t val[4]; | |
75 | }; | |
76 | }; | |
d92fa2dc LT |
77 | }; |
78 | ||
79 | struct VTDContextCacheEntry { | |
80 | /* The cache entry is obsolete if | |
81 | * context_cache_gen!=IntelIOMMUState.context_cache_gen | |
82 | */ | |
83 | uint32_t context_cache_gen; | |
84 | struct VTDContextEntry context_entry; | |
85 | }; | |
86 | ||
fb43cf73 LY |
87 | /* PASID Directory Entry */ |
88 | struct VTDPASIDDirEntry { | |
89 | uint64_t val; | |
90 | }; | |
91 | ||
92 | /* PASID Table Entry */ | |
93 | struct VTDPASIDEntry { | |
94 | uint64_t val[8]; | |
95 | }; | |
96 | ||
1da12ec4 | 97 | struct VTDAddressSpace { |
7df953bd | 98 | PCIBus *bus; |
1da12ec4 | 99 | uint8_t devfn; |
1b2b1237 | 100 | uint32_t pasid; |
1da12ec4 | 101 | AddressSpace as; |
3df9d748 | 102 | IOMMUMemoryRegion iommu; |
4b519ef1 PX |
103 | MemoryRegion root; /* The root container of the device */ |
104 | MemoryRegion nodmar; /* The alias of shared nodmar MR */ | |
651e4cef | 105 | MemoryRegion iommu_ir; /* Interrupt region: 0xfeeXXXXX */ |
1b2b1237 | 106 | MemoryRegion iommu_ir_fault; /* Interrupt region for catching fault */ |
1da12ec4 | 107 | IntelIOMMUState *iommu_state; |
d92fa2dc | 108 | VTDContextCacheEntry context_cache_entry; |
b4a4ba0d | 109 | QLIST_ENTRY(VTDAddressSpace) next; |
4f8a62a9 PX |
110 | /* Superset of notifier flags that this address space has */ |
111 | IOMMUNotifierFlag notifier_flags; | |
8a7c6060 PX |
112 | /* |
113 | * @iova_tree traces mapped IOVA ranges. | |
114 | * | |
115 | * The tree is not needed if no MAP notifier is registered with current | |
116 | * VTD address space, because all guest invalidate commands can be | |
117 | * directly passed to the IOMMU UNMAP notifiers without any further | |
118 | * reshuffling. | |
119 | * | |
120 | * The tree OTOH is required for MAP typed iommu notifiers for a few | |
121 | * reasons. | |
122 | * | |
123 | * Firstly, there's no way to identify whether an PSI (Page Selective | |
124 | * Invalidations) or DSI (Domain Selective Invalidations) event is an | |
125 | * MAP or UNMAP event within the message itself. Without having prior | |
126 | * knowledge of existing state vIOMMU doesn't know whether it should | |
127 | * notify MAP or UNMAP for a PSI message it received when caching mode | |
128 | * is enabled (for MAP notifiers). | |
129 | * | |
130 | * Secondly, PSI messages received from guest driver can be enlarged in | |
131 | * range, covers but not limited to what the guest driver wanted to | |
132 | * invalidate. When the range to invalidates gets bigger than the | |
133 | * limit of a PSI message, it can even become a DSI which will | |
134 | * invalidate the whole domain. If the vIOMMU directly notifies the | |
135 | * registered device with the unmodified range, it may confuse the | |
136 | * registered drivers (e.g. vfio-pci) on either: | |
137 | * | |
138 | * (1) Trying to map the same region more than once (for | |
139 | * VFIO_IOMMU_MAP_DMA, -EEXIST will trigger), or, | |
140 | * | |
141 | * (2) Trying to UNMAP a range that is still partially mapped. | |
142 | * | |
143 | * That accuracy is not required for UNMAP-only notifiers, but it is a | |
144 | * must-to-have for notifiers registered with MAP events, because the | |
145 | * vIOMMU needs to make sure the shadow page table is always in sync | |
146 | * with the guest IOMMU pgtables for a device. | |
147 | */ | |
148 | IOVATree *iova_tree; | |
1da12ec4 LT |
149 | }; |
150 | ||
b5a280c0 LT |
151 | struct VTDIOTLBEntry { |
152 | uint64_t gfn; | |
153 | uint16_t domain_id; | |
1b2b1237 | 154 | uint32_t pasid; |
b5a280c0 | 155 | uint64_t slpte; |
d66b969b | 156 | uint64_t mask; |
07f7b733 | 157 | uint8_t access_flags; |
b5a280c0 LT |
158 | }; |
159 | ||
ede9c94a PX |
160 | /* VT-d Source-ID Qualifier types */ |
161 | enum { | |
162 | VTD_SQ_FULL = 0x00, /* Full SID verification */ | |
163 | VTD_SQ_IGN_3 = 0x01, /* Ignore bit 3 */ | |
164 | VTD_SQ_IGN_2_3 = 0x02, /* Ignore bits 2 & 3 */ | |
165 | VTD_SQ_IGN_1_3 = 0x03, /* Ignore bits 1-3 */ | |
166 | VTD_SQ_MAX, | |
167 | }; | |
168 | ||
169 | /* VT-d Source Validation Types */ | |
170 | enum { | |
171 | VTD_SVT_NONE = 0x00, /* No validation */ | |
172 | VTD_SVT_ALL = 0x01, /* Do full validation */ | |
173 | VTD_SVT_BUS = 0x02, /* Validate bus range */ | |
174 | VTD_SVT_MAX, | |
175 | }; | |
176 | ||
1f91acee | 177 | /* Interrupt Remapping Table Entry Definition */ |
bc38ee10 | 178 | union VTD_IR_TableEntry { |
1f91acee | 179 | struct { |
e03b5686 | 180 | #if HOST_BIG_ENDIAN |
1f91acee PX |
181 | uint32_t __reserved_1:8; /* Reserved 1 */ |
182 | uint32_t vector:8; /* Interrupt Vector */ | |
183 | uint32_t irte_mode:1; /* IRTE Mode */ | |
184 | uint32_t __reserved_0:3; /* Reserved 0 */ | |
185 | uint32_t __avail:4; /* Available spaces for software */ | |
186 | uint32_t delivery_mode:3; /* Delivery Mode */ | |
187 | uint32_t trigger_mode:1; /* Trigger Mode */ | |
188 | uint32_t redir_hint:1; /* Redirection Hint */ | |
189 | uint32_t dest_mode:1; /* Destination Mode */ | |
190 | uint32_t fault_disable:1; /* Fault Processing Disable */ | |
191 | uint32_t present:1; /* Whether entry present/available */ | |
192 | #else | |
193 | uint32_t present:1; /* Whether entry present/available */ | |
194 | uint32_t fault_disable:1; /* Fault Processing Disable */ | |
195 | uint32_t dest_mode:1; /* Destination Mode */ | |
196 | uint32_t redir_hint:1; /* Redirection Hint */ | |
197 | uint32_t trigger_mode:1; /* Trigger Mode */ | |
198 | uint32_t delivery_mode:3; /* Delivery Mode */ | |
199 | uint32_t __avail:4; /* Available spaces for software */ | |
200 | uint32_t __reserved_0:3; /* Reserved 0 */ | |
201 | uint32_t irte_mode:1; /* IRTE Mode */ | |
202 | uint32_t vector:8; /* Interrupt Vector */ | |
203 | uint32_t __reserved_1:8; /* Reserved 1 */ | |
1f91acee | 204 | #endif |
1a43713b PX |
205 | uint32_t dest_id; /* Destination ID */ |
206 | uint16_t source_id; /* Source-ID */ | |
e03b5686 | 207 | #if HOST_BIG_ENDIAN |
1f91acee PX |
208 | uint64_t __reserved_2:44; /* Reserved 2 */ |
209 | uint64_t sid_vtype:2; /* Source-ID Validation Type */ | |
210 | uint64_t sid_q:2; /* Source-ID Qualifier */ | |
211 | #else | |
212 | uint64_t sid_q:2; /* Source-ID Qualifier */ | |
213 | uint64_t sid_vtype:2; /* Source-ID Validation Type */ | |
214 | uint64_t __reserved_2:44; /* Reserved 2 */ | |
215 | #endif | |
bc38ee10 | 216 | } QEMU_PACKED irte; |
1f91acee PX |
217 | uint64_t data[2]; |
218 | }; | |
219 | ||
220 | #define VTD_IR_INT_FORMAT_COMPAT (0) /* Compatible Interrupt */ | |
221 | #define VTD_IR_INT_FORMAT_REMAP (1) /* Remappable Interrupt */ | |
222 | ||
223 | /* Programming format for MSI/MSI-X addresses */ | |
224 | union VTD_IR_MSIAddress { | |
225 | struct { | |
e03b5686 | 226 | #if HOST_BIG_ENDIAN |
1f91acee PX |
227 | uint32_t __head:12; /* Should always be: 0x0fee */ |
228 | uint32_t index_l:15; /* Interrupt index bit 14-0 */ | |
229 | uint32_t int_mode:1; /* Interrupt format */ | |
230 | uint32_t sub_valid:1; /* SHV: Sub-Handle Valid bit */ | |
231 | uint32_t index_h:1; /* Interrupt index bit 15 */ | |
232 | uint32_t __not_care:2; | |
233 | #else | |
234 | uint32_t __not_care:2; | |
235 | uint32_t index_h:1; /* Interrupt index bit 15 */ | |
236 | uint32_t sub_valid:1; /* SHV: Sub-Handle Valid bit */ | |
237 | uint32_t int_mode:1; /* Interrupt format */ | |
238 | uint32_t index_l:15; /* Interrupt index bit 14-0 */ | |
239 | uint32_t __head:12; /* Should always be: 0x0fee */ | |
240 | #endif | |
bc38ee10 | 241 | } QEMU_PACKED addr; |
1f91acee PX |
242 | uint32_t data; |
243 | }; | |
244 | ||
245 | /* When IR is enabled, all MSI/MSI-X data bits should be zero */ | |
246 | #define VTD_IR_MSI_DATA (0) | |
247 | ||
1da12ec4 LT |
248 | /* The iommu (DMAR) device state struct */ |
249 | struct IntelIOMMUState { | |
1c7955c4 | 250 | X86IOMMUState x86_iommu; |
1da12ec4 | 251 | MemoryRegion csrmem; |
4b519ef1 PX |
252 | MemoryRegion mr_nodmar; |
253 | MemoryRegion mr_ir; | |
254 | MemoryRegion mr_sys_alias; | |
1da12ec4 LT |
255 | uint8_t csr[DMAR_REG_SIZE]; /* register values */ |
256 | uint8_t wmask[DMAR_REG_SIZE]; /* R/W bytes */ | |
257 | uint8_t w1cmask[DMAR_REG_SIZE]; /* RW1C(Write 1 to Clear) bytes */ | |
258 | uint8_t womask[DMAR_REG_SIZE]; /* WO (write only - read returns 0) */ | |
259 | uint32_t version; | |
260 | ||
4a4f219e YS |
261 | bool caching_mode; /* RO - is cap CM enabled? */ |
262 | bool scalable_mode; /* RO - is Scalable Mode supported? */ | |
b8ffd7d6 | 263 | bool snoop_control; /* RO - is SNP filed supported? */ |
3b40f0e5 | 264 | |
1da12ec4 | 265 | dma_addr_t root; /* Current root table pointer */ |
fb43cf73 | 266 | bool root_scalable; /* Type of root table (scalable or not) */ |
1da12ec4 LT |
267 | bool dmar_enabled; /* Set if DMA remapping is enabled */ |
268 | ||
269 | uint16_t iq_head; /* Current invalidation queue head */ | |
270 | uint16_t iq_tail; /* Current invalidation queue tail */ | |
271 | dma_addr_t iq; /* Current invalidation queue pointer */ | |
272 | uint16_t iq_size; /* IQ Size in number of entries */ | |
c0c1d351 | 273 | bool iq_dw; /* IQ descriptor width 256bit or not */ |
1da12ec4 LT |
274 | bool qi_enabled; /* Set if the QI is enabled */ |
275 | uint8_t iq_last_desc_type; /* The type of last completed descriptor */ | |
276 | ||
277 | /* The index of the Fault Recording Register to be used next. | |
278 | * Wraps around from N-1 to 0, where N is the number of FRCD_REG. | |
279 | */ | |
280 | uint16_t next_frcd_reg; | |
281 | ||
282 | uint64_t cap; /* The value of capability reg */ | |
283 | uint64_t ecap; /* The value of extended capability reg */ | |
284 | ||
d92fa2dc | 285 | uint32_t context_cache_gen; /* Should be in [1,MAX] */ |
b5a280c0 | 286 | GHashTable *iotlb; /* IOTLB */ |
d92fa2dc | 287 | |
da8d439c JW |
288 | GHashTable *vtd_address_spaces; /* VTD address spaces */ |
289 | VTDAddressSpace *vtd_as_cache[VTD_PCI_BUS_MAX]; /* VTD address space cache */ | |
dd4d607e | 290 | /* list of registered notifiers */ |
b4a4ba0d | 291 | QLIST_HEAD(, VTDAddressSpace) vtd_as_with_notifiers; |
a5861439 PX |
292 | |
293 | /* interrupt remapping */ | |
294 | bool intr_enabled; /* Whether guest enabled IR */ | |
295 | dma_addr_t intr_root; /* Interrupt remapping table pointer */ | |
296 | uint32_t intr_size; /* Number of IR table entries */ | |
28589311 | 297 | bool intr_eime; /* Extended interrupt mode enabled */ |
e6b6af05 | 298 | OnOffAuto intr_eim; /* Toggle for EIM cabability */ |
fb506e70 | 299 | bool buggy_eim; /* Force buggy EIM unless eim=off */ |
37f51384 | 300 | uint8_t aw_bits; /* Host/IOVA address width (in bits) */ |
ccc23bb0 | 301 | bool dma_drain; /* Whether DMA r/w draining enabled */ |
8646d9c7 | 302 | bool dma_translation; /* Whether DMA translation supported */ |
1b2b1237 | 303 | bool pasid; /* Whether to support PASID */ |
1d9efa73 PX |
304 | |
305 | /* | |
306 | * Protects IOMMU states in general. Currently it protects the | |
307 | * per-IOMMU IOTLB cache, and context entry cache in VTDAddressSpace. | |
308 | */ | |
309 | QemuMutex iommu_lock; | |
1da12ec4 LT |
310 | }; |
311 | ||
7df953bd KO |
312 | /* Find the VTD Address space associated with the given bus pointer, |
313 | * create a new one if none exists | |
314 | */ | |
1b2b1237 JW |
315 | VTDAddressSpace *vtd_find_add_as(IntelIOMMUState *s, PCIBus *bus, |
316 | int devfn, unsigned int pasid); | |
7df953bd | 317 | |
1da12ec4 | 318 | #endif |