]> git.proxmox.com Git - mirror_qemu.git/blame - include/hw/i386/intel_iommu.h
Merge tag 'for-upstream' of https://repo.or.cz/qemu/kevin into staging
[mirror_qemu.git] / include / hw / i386 / intel_iommu.h
CommitLineData
1da12ec4
LT
1/*
2 * QEMU emulation of an Intel IOMMU (VT-d)
3 * (DMA Remapping device)
4 *
5 * Copyright (C) 2013 Knut Omang, Oracle <knut.omang@oracle.com>
6 * Copyright (C) 2014 Le Tan, <tamlokveer@gmail.com>
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17
18 * You should have received a copy of the GNU General Public License along
19 * with this program; if not, see <http://www.gnu.org/licenses/>.
20 */
21
22#ifndef INTEL_IOMMU_H
23#define INTEL_IOMMU_H
a27bd6c7 24
1c7955c4 25#include "hw/i386/x86-iommu.h"
63b88968 26#include "qemu/iova-tree.h"
db1015e9 27#include "qom/object.h"
1da12ec4
LT
28
29#define TYPE_INTEL_IOMMU_DEVICE "intel-iommu"
8063396b 30OBJECT_DECLARE_SIMPLE_TYPE(IntelIOMMUState, INTEL_IOMMU_DEVICE)
1da12ec4 31
1221a474
AK
32#define TYPE_INTEL_IOMMU_MEMORY_REGION "intel-iommu-iommu-memory-region"
33
1da12ec4
LT
34/* DMAR Hardware Unit Definition address (IOMMU unit) */
35#define Q35_HOST_BRIDGE_IOMMU_ADDR 0xfed90000ULL
36
37#define VTD_PCI_BUS_MAX 256
38#define VTD_PCI_SLOT_MAX 32
39#define VTD_PCI_FUNC_MAX 8
1da12ec4
LT
40#define VTD_PCI_SLOT(devfn) (((devfn) >> 3) & 0x1f)
41#define VTD_PCI_FUNC(devfn) ((devfn) & 0x07)
1e06f131 42#define VTD_SID_TO_BUS(sid) (((sid) >> 8) & 0xff)
d92fa2dc 43#define VTD_SID_TO_DEVFN(sid) ((sid) & 0xff)
1da12ec4
LT
44
45#define DMAR_REG_SIZE 0x230
92e5d85e
PS
46#define VTD_HOST_AW_39BIT 39
47#define VTD_HOST_AW_48BIT 48
48#define VTD_HOST_ADDRESS_WIDTH VTD_HOST_AW_39BIT
49#define VTD_HAW_MASK(aw) ((1ULL << (aw)) - 1)
1da12ec4 50
d46114f9
PX
51#define DMAR_REPORT_F_INTR (1)
52
651e4cef
PX
53#define VTD_MSI_ADDR_HI_MASK (0xffffffff00000000ULL)
54#define VTD_MSI_ADDR_HI_SHIFT (32)
55#define VTD_MSI_ADDR_LO_MASK (0x00000000ffffffffULL)
56
d92fa2dc
LT
57typedef struct VTDContextEntry VTDContextEntry;
58typedef struct VTDContextCacheEntry VTDContextCacheEntry;
1da12ec4 59typedef struct VTDAddressSpace VTDAddressSpace;
b5a280c0 60typedef struct VTDIOTLBEntry VTDIOTLBEntry;
bc38ee10 61typedef union VTD_IR_TableEntry VTD_IR_TableEntry;
1f91acee 62typedef union VTD_IR_MSIAddress VTD_IR_MSIAddress;
fb43cf73
LY
63typedef struct VTDPASIDDirEntry VTDPASIDDirEntry;
64typedef struct VTDPASIDEntry VTDPASIDEntry;
d92fa2dc
LT
65
66/* Context-Entry */
67struct VTDContextEntry {
fb43cf73
LY
68 union {
69 struct {
70 uint64_t lo;
71 uint64_t hi;
72 };
73 struct {
74 uint64_t val[4];
75 };
76 };
d92fa2dc
LT
77};
78
79struct VTDContextCacheEntry {
80 /* The cache entry is obsolete if
81 * context_cache_gen!=IntelIOMMUState.context_cache_gen
82 */
83 uint32_t context_cache_gen;
84 struct VTDContextEntry context_entry;
85};
86
fb43cf73
LY
87/* PASID Directory Entry */
88struct VTDPASIDDirEntry {
89 uint64_t val;
90};
91
92/* PASID Table Entry */
93struct VTDPASIDEntry {
94 uint64_t val[8];
95};
96
1da12ec4 97struct VTDAddressSpace {
7df953bd 98 PCIBus *bus;
1da12ec4 99 uint8_t devfn;
1b2b1237 100 uint32_t pasid;
1da12ec4 101 AddressSpace as;
3df9d748 102 IOMMUMemoryRegion iommu;
4b519ef1
PX
103 MemoryRegion root; /* The root container of the device */
104 MemoryRegion nodmar; /* The alias of shared nodmar MR */
651e4cef 105 MemoryRegion iommu_ir; /* Interrupt region: 0xfeeXXXXX */
1b2b1237 106 MemoryRegion iommu_ir_fault; /* Interrupt region for catching fault */
1da12ec4 107 IntelIOMMUState *iommu_state;
d92fa2dc 108 VTDContextCacheEntry context_cache_entry;
b4a4ba0d 109 QLIST_ENTRY(VTDAddressSpace) next;
4f8a62a9
PX
110 /* Superset of notifier flags that this address space has */
111 IOMMUNotifierFlag notifier_flags;
8a7c6060
PX
112 /*
113 * @iova_tree traces mapped IOVA ranges.
114 *
115 * The tree is not needed if no MAP notifier is registered with current
116 * VTD address space, because all guest invalidate commands can be
117 * directly passed to the IOMMU UNMAP notifiers without any further
118 * reshuffling.
119 *
120 * The tree OTOH is required for MAP typed iommu notifiers for a few
121 * reasons.
122 *
123 * Firstly, there's no way to identify whether an PSI (Page Selective
124 * Invalidations) or DSI (Domain Selective Invalidations) event is an
125 * MAP or UNMAP event within the message itself. Without having prior
126 * knowledge of existing state vIOMMU doesn't know whether it should
127 * notify MAP or UNMAP for a PSI message it received when caching mode
128 * is enabled (for MAP notifiers).
129 *
130 * Secondly, PSI messages received from guest driver can be enlarged in
131 * range, covers but not limited to what the guest driver wanted to
132 * invalidate. When the range to invalidates gets bigger than the
133 * limit of a PSI message, it can even become a DSI which will
134 * invalidate the whole domain. If the vIOMMU directly notifies the
135 * registered device with the unmodified range, it may confuse the
136 * registered drivers (e.g. vfio-pci) on either:
137 *
138 * (1) Trying to map the same region more than once (for
139 * VFIO_IOMMU_MAP_DMA, -EEXIST will trigger), or,
140 *
141 * (2) Trying to UNMAP a range that is still partially mapped.
142 *
143 * That accuracy is not required for UNMAP-only notifiers, but it is a
144 * must-to-have for notifiers registered with MAP events, because the
145 * vIOMMU needs to make sure the shadow page table is always in sync
146 * with the guest IOMMU pgtables for a device.
147 */
148 IOVATree *iova_tree;
1da12ec4
LT
149};
150
b5a280c0
LT
151struct VTDIOTLBEntry {
152 uint64_t gfn;
153 uint16_t domain_id;
1b2b1237 154 uint32_t pasid;
b5a280c0 155 uint64_t slpte;
d66b969b 156 uint64_t mask;
07f7b733 157 uint8_t access_flags;
b5a280c0
LT
158};
159
ede9c94a
PX
160/* VT-d Source-ID Qualifier types */
161enum {
162 VTD_SQ_FULL = 0x00, /* Full SID verification */
163 VTD_SQ_IGN_3 = 0x01, /* Ignore bit 3 */
164 VTD_SQ_IGN_2_3 = 0x02, /* Ignore bits 2 & 3 */
165 VTD_SQ_IGN_1_3 = 0x03, /* Ignore bits 1-3 */
166 VTD_SQ_MAX,
167};
168
169/* VT-d Source Validation Types */
170enum {
171 VTD_SVT_NONE = 0x00, /* No validation */
172 VTD_SVT_ALL = 0x01, /* Do full validation */
173 VTD_SVT_BUS = 0x02, /* Validate bus range */
174 VTD_SVT_MAX,
175};
176
1f91acee 177/* Interrupt Remapping Table Entry Definition */
bc38ee10 178union VTD_IR_TableEntry {
1f91acee 179 struct {
e03b5686 180#if HOST_BIG_ENDIAN
1f91acee
PX
181 uint32_t __reserved_1:8; /* Reserved 1 */
182 uint32_t vector:8; /* Interrupt Vector */
183 uint32_t irte_mode:1; /* IRTE Mode */
184 uint32_t __reserved_0:3; /* Reserved 0 */
185 uint32_t __avail:4; /* Available spaces for software */
186 uint32_t delivery_mode:3; /* Delivery Mode */
187 uint32_t trigger_mode:1; /* Trigger Mode */
188 uint32_t redir_hint:1; /* Redirection Hint */
189 uint32_t dest_mode:1; /* Destination Mode */
190 uint32_t fault_disable:1; /* Fault Processing Disable */
191 uint32_t present:1; /* Whether entry present/available */
192#else
193 uint32_t present:1; /* Whether entry present/available */
194 uint32_t fault_disable:1; /* Fault Processing Disable */
195 uint32_t dest_mode:1; /* Destination Mode */
196 uint32_t redir_hint:1; /* Redirection Hint */
197 uint32_t trigger_mode:1; /* Trigger Mode */
198 uint32_t delivery_mode:3; /* Delivery Mode */
199 uint32_t __avail:4; /* Available spaces for software */
200 uint32_t __reserved_0:3; /* Reserved 0 */
201 uint32_t irte_mode:1; /* IRTE Mode */
202 uint32_t vector:8; /* Interrupt Vector */
203 uint32_t __reserved_1:8; /* Reserved 1 */
1f91acee 204#endif
1a43713b
PX
205 uint32_t dest_id; /* Destination ID */
206 uint16_t source_id; /* Source-ID */
e03b5686 207#if HOST_BIG_ENDIAN
1f91acee
PX
208 uint64_t __reserved_2:44; /* Reserved 2 */
209 uint64_t sid_vtype:2; /* Source-ID Validation Type */
210 uint64_t sid_q:2; /* Source-ID Qualifier */
211#else
212 uint64_t sid_q:2; /* Source-ID Qualifier */
213 uint64_t sid_vtype:2; /* Source-ID Validation Type */
214 uint64_t __reserved_2:44; /* Reserved 2 */
215#endif
bc38ee10 216 } QEMU_PACKED irte;
1f91acee
PX
217 uint64_t data[2];
218};
219
220#define VTD_IR_INT_FORMAT_COMPAT (0) /* Compatible Interrupt */
221#define VTD_IR_INT_FORMAT_REMAP (1) /* Remappable Interrupt */
222
223/* Programming format for MSI/MSI-X addresses */
224union VTD_IR_MSIAddress {
225 struct {
e03b5686 226#if HOST_BIG_ENDIAN
1f91acee
PX
227 uint32_t __head:12; /* Should always be: 0x0fee */
228 uint32_t index_l:15; /* Interrupt index bit 14-0 */
229 uint32_t int_mode:1; /* Interrupt format */
230 uint32_t sub_valid:1; /* SHV: Sub-Handle Valid bit */
231 uint32_t index_h:1; /* Interrupt index bit 15 */
232 uint32_t __not_care:2;
233#else
234 uint32_t __not_care:2;
235 uint32_t index_h:1; /* Interrupt index bit 15 */
236 uint32_t sub_valid:1; /* SHV: Sub-Handle Valid bit */
237 uint32_t int_mode:1; /* Interrupt format */
238 uint32_t index_l:15; /* Interrupt index bit 14-0 */
239 uint32_t __head:12; /* Should always be: 0x0fee */
240#endif
bc38ee10 241 } QEMU_PACKED addr;
1f91acee
PX
242 uint32_t data;
243};
244
245/* When IR is enabled, all MSI/MSI-X data bits should be zero */
246#define VTD_IR_MSI_DATA (0)
247
1da12ec4
LT
248/* The iommu (DMAR) device state struct */
249struct IntelIOMMUState {
1c7955c4 250 X86IOMMUState x86_iommu;
1da12ec4 251 MemoryRegion csrmem;
4b519ef1
PX
252 MemoryRegion mr_nodmar;
253 MemoryRegion mr_ir;
254 MemoryRegion mr_sys_alias;
1da12ec4
LT
255 uint8_t csr[DMAR_REG_SIZE]; /* register values */
256 uint8_t wmask[DMAR_REG_SIZE]; /* R/W bytes */
257 uint8_t w1cmask[DMAR_REG_SIZE]; /* RW1C(Write 1 to Clear) bytes */
258 uint8_t womask[DMAR_REG_SIZE]; /* WO (write only - read returns 0) */
259 uint32_t version;
260
4a4f219e
YS
261 bool caching_mode; /* RO - is cap CM enabled? */
262 bool scalable_mode; /* RO - is Scalable Mode supported? */
b8ffd7d6 263 bool snoop_control; /* RO - is SNP filed supported? */
3b40f0e5 264
1da12ec4 265 dma_addr_t root; /* Current root table pointer */
fb43cf73 266 bool root_scalable; /* Type of root table (scalable or not) */
1da12ec4
LT
267 bool dmar_enabled; /* Set if DMA remapping is enabled */
268
269 uint16_t iq_head; /* Current invalidation queue head */
270 uint16_t iq_tail; /* Current invalidation queue tail */
271 dma_addr_t iq; /* Current invalidation queue pointer */
272 uint16_t iq_size; /* IQ Size in number of entries */
c0c1d351 273 bool iq_dw; /* IQ descriptor width 256bit or not */
1da12ec4
LT
274 bool qi_enabled; /* Set if the QI is enabled */
275 uint8_t iq_last_desc_type; /* The type of last completed descriptor */
276
277 /* The index of the Fault Recording Register to be used next.
278 * Wraps around from N-1 to 0, where N is the number of FRCD_REG.
279 */
280 uint16_t next_frcd_reg;
281
282 uint64_t cap; /* The value of capability reg */
283 uint64_t ecap; /* The value of extended capability reg */
284
d92fa2dc 285 uint32_t context_cache_gen; /* Should be in [1,MAX] */
b5a280c0 286 GHashTable *iotlb; /* IOTLB */
d92fa2dc 287
da8d439c
JW
288 GHashTable *vtd_address_spaces; /* VTD address spaces */
289 VTDAddressSpace *vtd_as_cache[VTD_PCI_BUS_MAX]; /* VTD address space cache */
dd4d607e 290 /* list of registered notifiers */
b4a4ba0d 291 QLIST_HEAD(, VTDAddressSpace) vtd_as_with_notifiers;
a5861439
PX
292
293 /* interrupt remapping */
294 bool intr_enabled; /* Whether guest enabled IR */
295 dma_addr_t intr_root; /* Interrupt remapping table pointer */
296 uint32_t intr_size; /* Number of IR table entries */
28589311 297 bool intr_eime; /* Extended interrupt mode enabled */
e6b6af05 298 OnOffAuto intr_eim; /* Toggle for EIM cabability */
fb506e70 299 bool buggy_eim; /* Force buggy EIM unless eim=off */
37f51384 300 uint8_t aw_bits; /* Host/IOVA address width (in bits) */
ccc23bb0 301 bool dma_drain; /* Whether DMA r/w draining enabled */
8646d9c7 302 bool dma_translation; /* Whether DMA translation supported */
1b2b1237 303 bool pasid; /* Whether to support PASID */
1d9efa73
PX
304
305 /*
306 * Protects IOMMU states in general. Currently it protects the
307 * per-IOMMU IOTLB cache, and context entry cache in VTDAddressSpace.
308 */
309 QemuMutex iommu_lock;
1da12ec4
LT
310};
311
7df953bd
KO
312/* Find the VTD Address space associated with the given bus pointer,
313 * create a new one if none exists
314 */
1b2b1237
JW
315VTDAddressSpace *vtd_find_add_as(IntelIOMMUState *s, PCIBus *bus,
316 int devfn, unsigned int pasid);
7df953bd 317
1da12ec4 318#endif