Statistics
| Branch: | Revision:

root / hw / msix.c @ d60efc6b

History | View | Annotate | Download (11.3 kB)

1
/*
2
 * MSI-X device support
3
 *
4
 * This module includes support for MSI-X in pci devices.
5
 *
6
 * Author: Michael S. Tsirkin <mst@redhat.com>
7
 *
8
 *  Copyright (c) 2009, Red Hat Inc, Michael S. Tsirkin (mst@redhat.com)
9
 *
10
 * This work is licensed under the terms of the GNU GPL, version 2.  See
11
 * the COPYING file in the top-level directory.
12
 */
13

    
14
#include "hw.h"
15
#include "msix.h"
16
#include "pci.h"
17

    
18
/* Declaration from linux/pci_regs.h */
19
#define  PCI_CAP_ID_MSIX 0x11 /* MSI-X */
20
#define  PCI_MSIX_FLAGS 2     /* Table at lower 11 bits */
21
#define  PCI_MSIX_FLAGS_QSIZE        0x7FF
22
#define  PCI_MSIX_FLAGS_ENABLE        (1 << 15)
23
#define  PCI_MSIX_FLAGS_BIRMASK        (7 << 0)
24

    
25
/* MSI-X capability structure */
26
#define MSIX_TABLE_OFFSET 4
27
#define MSIX_PBA_OFFSET 8
28
#define MSIX_CAP_LENGTH 12
29

    
30
/* MSI enable bit is in byte 1 in FLAGS register */
31
#define MSIX_ENABLE_OFFSET (PCI_MSIX_FLAGS + 1)
32
#define MSIX_ENABLE_MASK (PCI_MSIX_FLAGS_ENABLE >> 8)
33

    
34
/* MSI-X table format */
35
#define MSIX_MSG_ADDR 0
36
#define MSIX_MSG_UPPER_ADDR 4
37
#define MSIX_MSG_DATA 8
38
#define MSIX_VECTOR_CTRL 12
39
#define MSIX_ENTRY_SIZE 16
40
#define MSIX_VECTOR_MASK 0x1
41

    
42
/* How much space does an MSIX table need. */
43
/* The spec requires giving the table structure
44
 * a 4K aligned region all by itself. Align it to
45
 * target pages so that drivers can do passthrough
46
 * on the rest of the region. */
47
#define MSIX_PAGE_SIZE TARGET_PAGE_ALIGN(0x1000)
48
/* Reserve second half of the page for pending bits */
49
#define MSIX_PAGE_PENDING (MSIX_PAGE_SIZE / 2)
50
#define MSIX_MAX_ENTRIES 32
51

    
52

    
53
#ifdef MSIX_DEBUG
54
#define DEBUG(fmt, ...)                                       \
55
    do {                                                      \
56
      fprintf(stderr, "%s: " fmt, __func__ , __VA_ARGS__);    \
57
    } while (0)
58
#else
59
#define DEBUG(fmt, ...) do { } while(0)
60
#endif
61

    
62
/* Flag for interrupt controller to declare MSI-X support */
63
int msix_supported;
64

    
65
/* Add MSI-X capability to the config space for the device. */
66
/* Given a bar and its size, add MSI-X table on top of it
67
 * and fill MSI-X capability in the config space.
68
 * Original bar size must be a power of 2 or 0.
69
 * New bar size is returned. */
70
static int msix_add_config(struct PCIDevice *pdev, unsigned short nentries,
71
                           unsigned bar_nr, unsigned bar_size)
72
{
73
    int config_offset;
74
    uint8_t *config;
75
    uint32_t new_size;
76

    
77
    if (nentries < 1 || nentries > PCI_MSIX_FLAGS_QSIZE + 1)
78
        return -EINVAL;
79
    if (bar_size > 0x80000000)
80
        return -ENOSPC;
81

    
82
    /* Add space for MSI-X structures */
83
    if (!bar_size)
84
        new_size = MSIX_PAGE_SIZE;
85
    else if (bar_size < MSIX_PAGE_SIZE) {
86
        bar_size = MSIX_PAGE_SIZE;
87
        new_size = MSIX_PAGE_SIZE * 2;
88
    } else
89
        new_size = bar_size * 2;
90

    
91
    pdev->msix_bar_size = new_size;
92
    config_offset = pci_add_capability(pdev, PCI_CAP_ID_MSIX, MSIX_CAP_LENGTH);
93
    if (config_offset < 0)
94
        return config_offset;
95
    config = pdev->config + config_offset;
96

    
97
    pci_set_word(config + PCI_MSIX_FLAGS, nentries - 1);
98
    /* Table on top of BAR */
99
    pci_set_long(config + MSIX_TABLE_OFFSET, bar_size | bar_nr);
100
    /* Pending bits on top of that */
101
    pci_set_long(config + MSIX_PBA_OFFSET, (bar_size + MSIX_PAGE_PENDING) |
102
                 bar_nr);
103
    pdev->msix_cap = config_offset;
104
    /* Make flags bit writeable. */
105
    pdev->wmask[config_offset + MSIX_ENABLE_OFFSET] |= MSIX_ENABLE_MASK;
106
    return 0;
107
}
108

    
109
static void msix_free_irq_entries(PCIDevice *dev)
110
{
111
    int vector;
112

    
113
    for (vector = 0; vector < dev->msix_entries_nr; ++vector)
114
        dev->msix_entry_used[vector] = 0;
115
}
116

    
117
/* Handle MSI-X capability config write. */
118
void msix_write_config(PCIDevice *dev, uint32_t addr,
119
                       uint32_t val, int len)
120
{
121
    unsigned enable_pos = dev->msix_cap + MSIX_ENABLE_OFFSET;
122
    if (addr + len <= enable_pos || addr > enable_pos)
123
        return;
124

    
125
    if (msix_enabled(dev))
126
        qemu_set_irq(dev->irq[0], 0);
127
}
128

    
129
static uint32_t msix_mmio_readl(void *opaque, target_phys_addr_t addr)
130
{
131
    PCIDevice *dev = opaque;
132
    unsigned int offset = addr & (MSIX_PAGE_SIZE - 1);
133
    void *page = dev->msix_table_page;
134
    uint32_t val = 0;
135

    
136
    memcpy(&val, (void *)((char *)page + offset), 4);
137

    
138
    return val;
139
}
140

    
141
static uint32_t msix_mmio_read_unallowed(void *opaque, target_phys_addr_t addr)
142
{
143
    fprintf(stderr, "MSI-X: only dword read is allowed!\n");
144
    return 0;
145
}
146

    
147
static uint8_t msix_pending_mask(int vector)
148
{
149
    return 1 << (vector % 8);
150
}
151

    
152
static uint8_t *msix_pending_byte(PCIDevice *dev, int vector)
153
{
154
    return dev->msix_table_page + MSIX_PAGE_PENDING + vector / 8;
155
}
156

    
157
static int msix_is_pending(PCIDevice *dev, int vector)
158
{
159
    return *msix_pending_byte(dev, vector) & msix_pending_mask(vector);
160
}
161

    
162
static void msix_set_pending(PCIDevice *dev, int vector)
163
{
164
    *msix_pending_byte(dev, vector) |= msix_pending_mask(vector);
165
}
166

    
167
static void msix_clr_pending(PCIDevice *dev, int vector)
168
{
169
    *msix_pending_byte(dev, vector) &= ~msix_pending_mask(vector);
170
}
171

    
172
static int msix_is_masked(PCIDevice *dev, int vector)
173
{
174
    unsigned offset = vector * MSIX_ENTRY_SIZE + MSIX_VECTOR_CTRL;
175
    return dev->msix_table_page[offset] & MSIX_VECTOR_MASK;
176
}
177

    
178
static void msix_mmio_writel(void *opaque, target_phys_addr_t addr,
179
                             uint32_t val)
180
{
181
    PCIDevice *dev = opaque;
182
    unsigned int offset = addr & (MSIX_PAGE_SIZE - 1);
183
    int vector = offset / MSIX_ENTRY_SIZE;
184
    memcpy(dev->msix_table_page + offset, &val, 4);
185
    if (!msix_is_masked(dev, vector) && msix_is_pending(dev, vector)) {
186
        msix_clr_pending(dev, vector);
187
        msix_notify(dev, vector);
188
    }
189
}
190

    
191
static void msix_mmio_write_unallowed(void *opaque, target_phys_addr_t addr,
192
                                      uint32_t val)
193
{
194
    fprintf(stderr, "MSI-X: only dword write is allowed!\n");
195
}
196

    
197
static CPUWriteMemoryFunc * const msix_mmio_write[] = {
198
    msix_mmio_write_unallowed, msix_mmio_write_unallowed, msix_mmio_writel
199
};
200

    
201
static CPUReadMemoryFunc * const msix_mmio_read[] = {
202
    msix_mmio_read_unallowed, msix_mmio_read_unallowed, msix_mmio_readl
203
};
204

    
205
/* Should be called from device's map method. */
206
void msix_mmio_map(PCIDevice *d, int region_num,
207
                   uint32_t addr, uint32_t size, int type)
208
{
209
    uint8_t *config = d->config + d->msix_cap;
210
    uint32_t table = pci_get_long(config + MSIX_TABLE_OFFSET);
211
    uint32_t offset = table & ~(MSIX_PAGE_SIZE - 1);
212
    /* TODO: for assigned devices, we'll want to make it possible to map
213
     * pending bits separately in case they are in a separate bar. */
214
    int table_bir = table & PCI_MSIX_FLAGS_BIRMASK;
215

    
216
    if (table_bir != region_num)
217
        return;
218
    if (size <= offset)
219
        return;
220
    cpu_register_physical_memory(addr + offset, size - offset,
221
                                 d->msix_mmio_index);
222
}
223

    
224
/* Initialize the MSI-X structures. Note: if MSI-X is supported, BAR size is
225
 * modified, it should be retrieved with msix_bar_size. */
226
int msix_init(struct PCIDevice *dev, unsigned short nentries,
227
              unsigned bar_nr, unsigned bar_size)
228
{
229
    int ret;
230
    /* Nothing to do if MSI is not supported by interrupt controller */
231
    if (!msix_supported)
232
        return -ENOTSUP;
233

    
234
    if (nentries > MSIX_MAX_ENTRIES)
235
        return -EINVAL;
236

    
237
    dev->msix_entry_used = qemu_mallocz(MSIX_MAX_ENTRIES *
238
                                        sizeof *dev->msix_entry_used);
239

    
240
    dev->msix_table_page = qemu_mallocz(MSIX_PAGE_SIZE);
241

    
242
    dev->msix_mmio_index = cpu_register_io_memory(msix_mmio_read,
243
                                                  msix_mmio_write, dev);
244
    if (dev->msix_mmio_index == -1) {
245
        ret = -EBUSY;
246
        goto err_index;
247
    }
248

    
249
    dev->msix_entries_nr = nentries;
250
    ret = msix_add_config(dev, nentries, bar_nr, bar_size);
251
    if (ret)
252
        goto err_config;
253

    
254
    dev->cap_present |= QEMU_PCI_CAP_MSIX;
255
    return 0;
256

    
257
err_config:
258
    dev->msix_entries_nr = 0;
259
    cpu_unregister_io_memory(dev->msix_mmio_index);
260
err_index:
261
    qemu_free(dev->msix_table_page);
262
    dev->msix_table_page = NULL;
263
    qemu_free(dev->msix_entry_used);
264
    dev->msix_entry_used = NULL;
265
    return ret;
266
}
267

    
268
/* Clean up resources for the device. */
269
int msix_uninit(PCIDevice *dev)
270
{
271
    if (!(dev->cap_present & QEMU_PCI_CAP_MSIX))
272
        return 0;
273
    pci_del_capability(dev, PCI_CAP_ID_MSIX, MSIX_CAP_LENGTH);
274
    dev->msix_cap = 0;
275
    msix_free_irq_entries(dev);
276
    dev->msix_entries_nr = 0;
277
    cpu_unregister_io_memory(dev->msix_mmio_index);
278
    qemu_free(dev->msix_table_page);
279
    dev->msix_table_page = NULL;
280
    qemu_free(dev->msix_entry_used);
281
    dev->msix_entry_used = NULL;
282
    dev->cap_present &= ~QEMU_PCI_CAP_MSIX;
283
    return 0;
284
}
285

    
286
void msix_save(PCIDevice *dev, QEMUFile *f)
287
{
288
    unsigned n = dev->msix_entries_nr;
289

    
290
    if (!(dev->cap_present & QEMU_PCI_CAP_MSIX)) {
291
        return;
292
    }
293

    
294
    qemu_put_buffer(f, dev->msix_table_page, n * MSIX_ENTRY_SIZE);
295
    qemu_put_buffer(f, dev->msix_table_page + MSIX_PAGE_PENDING, (n + 7) / 8);
296
}
297

    
298
/* Should be called after restoring the config space. */
299
void msix_load(PCIDevice *dev, QEMUFile *f)
300
{
301
    unsigned n = dev->msix_entries_nr;
302

    
303
    if (!(dev->cap_present & QEMU_PCI_CAP_MSIX)) {
304
        return;
305
    }
306

    
307
    msix_free_irq_entries(dev);
308
    qemu_get_buffer(f, dev->msix_table_page, n * MSIX_ENTRY_SIZE);
309
    qemu_get_buffer(f, dev->msix_table_page + MSIX_PAGE_PENDING, (n + 7) / 8);
310
}
311

    
312
/* Does device support MSI-X? */
313
int msix_present(PCIDevice *dev)
314
{
315
    return dev->cap_present & QEMU_PCI_CAP_MSIX;
316
}
317

    
318
/* Is MSI-X enabled? */
319
int msix_enabled(PCIDevice *dev)
320
{
321
    return (dev->cap_present & QEMU_PCI_CAP_MSIX) &&
322
        (dev->config[dev->msix_cap + MSIX_ENABLE_OFFSET] &
323
         MSIX_ENABLE_MASK);
324
}
325

    
326
/* Size of bar where MSI-X table resides, or 0 if MSI-X not supported. */
327
uint32_t msix_bar_size(PCIDevice *dev)
328
{
329
    return (dev->cap_present & QEMU_PCI_CAP_MSIX) ?
330
        dev->msix_bar_size : 0;
331
}
332

    
333
/* Send an MSI-X message */
334
void msix_notify(PCIDevice *dev, unsigned vector)
335
{
336
    uint8_t *table_entry = dev->msix_table_page + vector * MSIX_ENTRY_SIZE;
337
    uint64_t address;
338
    uint32_t data;
339

    
340
    if (vector >= dev->msix_entries_nr || !dev->msix_entry_used[vector])
341
        return;
342
    if (msix_is_masked(dev, vector)) {
343
        msix_set_pending(dev, vector);
344
        return;
345
    }
346

    
347
    address = pci_get_long(table_entry + MSIX_MSG_UPPER_ADDR);
348
    address = (address << 32) | pci_get_long(table_entry + MSIX_MSG_ADDR);
349
    data = pci_get_long(table_entry + MSIX_MSG_DATA);
350
    stl_phys(address, data);
351
}
352

    
353
void msix_reset(PCIDevice *dev)
354
{
355
    if (!(dev->cap_present & QEMU_PCI_CAP_MSIX))
356
        return;
357
    msix_free_irq_entries(dev);
358
    dev->config[dev->msix_cap + MSIX_ENABLE_OFFSET] &= MSIX_ENABLE_MASK;
359
    memset(dev->msix_table_page, 0, MSIX_PAGE_SIZE);
360
}
361

    
362
/* PCI spec suggests that devices make it possible for software to configure
363
 * less vectors than supported by the device, but does not specify a standard
364
 * mechanism for devices to do so.
365
 *
366
 * We support this by asking devices to declare vectors software is going to
367
 * actually use, and checking this on the notification path. Devices that
368
 * don't want to follow the spec suggestion can declare all vectors as used. */
369

    
370
/* Mark vector as used. */
371
int msix_vector_use(PCIDevice *dev, unsigned vector)
372
{
373
    if (vector >= dev->msix_entries_nr)
374
        return -EINVAL;
375
    dev->msix_entry_used[vector]++;
376
    return 0;
377
}
378

    
379
/* Mark vector as unused. */
380
void msix_vector_unuse(PCIDevice *dev, unsigned vector)
381
{
382
    if (vector < dev->msix_entries_nr && dev->msix_entry_used[vector])
383
        --dev->msix_entry_used[vector];
384
}