mirror of
https://github.com/Motorhead1991/qemu.git
synced 2025-07-27 04:13:53 -06:00

* Correct the validness check of iova * Fix APLIC in_clrip and clripnum write emulation * Support riscv-iommu-sys device * Add Tenstorrent Ascalon CPU * Add AIA userspace irqchip_split support * Add Microblaze V generic board * Upgrade ACPI SPCR table to support SPCR table revision 4 format * Remove tswap64() calls from HTIF * Support 64-bit address of initrd * Introduce svukte ISA extension * Support ssstateen extension * Support for RV64 Xiangshan Nanhu CPU -----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEaukCtqfKh31tZZKWr3yVEwxTgBMFAmdkzjgACgkQr3yVEwxT gBOcyA//e0XhAQciQglCZZCfINdOyI8qSh+P2K0qtrXZ4VERHEMp7UoD5CQr2cZv h8ij1EkatXCwukVELx0rNckxG33bEFgG1oESnQSrwGE0Iu4csNW24nK5WlUS0/r+ A5oD2wtzEF+cbhTKrVSDBN/PvlnWTKGEoJRkuXWfz5d4uR9eyQhfED0S2j36lNEC X1x/OZoKM89XuXtOFe9g55Z5UNzAatcdTISozL0FydiPh7QeVjTLHh28/tt559MX 7v5aJFlQuZ78z1mIHkZmPSorSrJ0zqhkP6NWe1ae06oMgzwRQQhYLppDILV4ZgUF 3mSDRoXmBycQXiYNPcHep3LdXfvxr+PpWHSevx8gH1jwm93On7Y/H7Uol6TDXzfC mrFjalfV5tzrD90ZvB+s5bCMF1q5Z8Dlj0pYF9aN9P1ILoWy3dndFAPJB6uKKDP7 Qd4qOQ3dVyHAX9jLmVkB6QvAV/vTDrYTsAxaF/EaoLOy0IoKhjTvgda3XzE1MFKA gVafLluADIfSEdqa2QR2ExL8d1SZVoiObCp5TMLRer0HIpg/vQZwjfdbo4BgQKL3 7Q6wBxcZUNqrFgspXjm5WFIrdk2rfS/79OmvpNM6SZaK6BnklntdJHJHtAWujGsm EM310AUFpHMp2h6Nqnemb3qr5l4d20KSt8DhoPAUq1IE59Kb8XY= =0iQW -----END PGP SIGNATURE----- Merge tag 'pull-riscv-to-apply-20241220' of https://github.com/alistair23/qemu into staging RISC-V PR for 10.0 * Correct the validness check of iova * Fix APLIC in_clrip and clripnum write emulation * Support riscv-iommu-sys device * Add Tenstorrent Ascalon CPU * Add AIA userspace irqchip_split support * Add Microblaze V generic board * Upgrade ACPI SPCR table to support SPCR table revision 4 format * Remove tswap64() calls from HTIF * Support 64-bit address of initrd * Introduce svukte ISA extension * Support ssstateen extension * Support for RV64 Xiangshan Nanhu CPU # -----BEGIN PGP SIGNATURE----- # # iQIzBAABCAAdFiEEaukCtqfKh31tZZKWr3yVEwxTgBMFAmdkzjgACgkQr3yVEwxT # gBOcyA//e0XhAQciQglCZZCfINdOyI8qSh+P2K0qtrXZ4VERHEMp7UoD5CQr2cZv # h8ij1EkatXCwukVELx0rNckxG33bEFgG1oESnQSrwGE0Iu4csNW24nK5WlUS0/r+ # A5oD2wtzEF+cbhTKrVSDBN/PvlnWTKGEoJRkuXWfz5d4uR9eyQhfED0S2j36lNEC # X1x/OZoKM89XuXtOFe9g55Z5UNzAatcdTISozL0FydiPh7QeVjTLHh28/tt559MX # 7v5aJFlQuZ78z1mIHkZmPSorSrJ0zqhkP6NWe1ae06oMgzwRQQhYLppDILV4ZgUF # 3mSDRoXmBycQXiYNPcHep3LdXfvxr+PpWHSevx8gH1jwm93On7Y/H7Uol6TDXzfC # mrFjalfV5tzrD90ZvB+s5bCMF1q5Z8Dlj0pYF9aN9P1ILoWy3dndFAPJB6uKKDP7 # Qd4qOQ3dVyHAX9jLmVkB6QvAV/vTDrYTsAxaF/EaoLOy0IoKhjTvgda3XzE1MFKA # gVafLluADIfSEdqa2QR2ExL8d1SZVoiObCp5TMLRer0HIpg/vQZwjfdbo4BgQKL3 # 7Q6wBxcZUNqrFgspXjm5WFIrdk2rfS/79OmvpNM6SZaK6BnklntdJHJHtAWujGsm # EM310AUFpHMp2h6Nqnemb3qr5l4d20KSt8DhoPAUq1IE59Kb8XY= # =0iQW # -----END PGP SIGNATURE----- # gpg: Signature made Thu 19 Dec 2024 20:54:00 EST # gpg: using RSA key 6AE902B6A7CA877D6D659296AF7C95130C538013 # gpg: Good signature from "Alistair Francis <alistair@alistair23.me>" [unknown] # gpg: WARNING: This key is not certified with a trusted signature! # gpg: There is no indication that the signature belongs to the owner. # Primary key fingerprint: 6AE9 02B6 A7CA 877D 6D65 9296 AF7C 9513 0C53 8013 * tag 'pull-riscv-to-apply-20241220' of https://github.com/alistair23/qemu: (39 commits) target/riscv: add support for RV64 Xiangshan Nanhu CPU target/riscv: add ssstateen target/riscv/tcg: hide warn for named feats when disabling via priv_ver target/riscv: Include missing headers in 'internals.h' target/riscv: Include missing headers in 'vector_internals.h' target/riscv: Check svukte is not enabled in RV32 target/riscv: Expose svukte ISA extension target/riscv: Check memory access to meet svukte rule target/riscv: Support hstatus[HUKTE] bit when svukte extension is enabled target/riscv: Support senvcfg[UKTE] bit when svukte extension is enabled target/riscv: Add svukte extension capability variable hw/riscv: Add the checking if DTB overlaps to kernel or initrd hw/riscv: Add a new struct RISCVBootInfo hw/riscv: Support to load DTB after 3GB memory on 64-bit system. hw/char/riscv_htif: Clarify MemoryRegionOps expect 32-bit accesses hw/char/riscv_htif: Explicit little-endian implementation MAINTAINERS: Cover RISC-V HTIF interface tests/qtest/bios-tables-test: Update virt SPCR golden reference for RISC-V hw/acpi: Upgrade ACPI SPCR table to support SPCR table revision 4 format qtest: allow SPCR acpi table changes ... Conflicts: target/riscv/cpu.c Merge conflict with DEFINE_PROP_END_OF_LIST() removal. No Property array terminator is needed anymore. Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
222 lines
7.1 KiB
C
222 lines
7.1 KiB
C
/*
|
|
* QEMU emulation of an RISC-V IOMMU
|
|
*
|
|
* Copyright (C) 2022-2023 Rivos Inc.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
* under the terms and conditions of the GNU General Public License,
|
|
* version 2 or later, as published by the Free Software Foundation.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License along
|
|
* with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "qemu/osdep.h"
|
|
#include "hw/pci/msi.h"
|
|
#include "hw/pci/msix.h"
|
|
#include "hw/pci/pci_bus.h"
|
|
#include "hw/qdev-properties.h"
|
|
#include "hw/riscv/riscv_hart.h"
|
|
#include "migration/vmstate.h"
|
|
#include "qapi/error.h"
|
|
#include "qemu/error-report.h"
|
|
#include "qemu/host-utils.h"
|
|
#include "qom/object.h"
|
|
|
|
#include "cpu_bits.h"
|
|
#include "riscv-iommu.h"
|
|
#include "riscv-iommu-bits.h"
|
|
#include "trace.h"
|
|
|
|
/* RISC-V IOMMU PCI Device Emulation */
|
|
#define RISCV_PCI_CLASS_SYSTEM_IOMMU 0x0806
|
|
|
|
/*
|
|
* 4 MSIx vectors for ICVEC, one for MRIF. The spec mentions in
|
|
* the "Placement and data flow" section that:
|
|
*
|
|
* "The interfaces related to recording an incoming MSI in a memory-resident
|
|
* interrupt file (MRIF) are implementation-specific. The partitioning of
|
|
* responsibility between the IOMMU and the IO bridge for recording the
|
|
* incoming MSI in an MRIF and generating the associated notice MSI are
|
|
* implementation-specific."
|
|
*
|
|
* We're making a design decision to create the MSIx for MRIF in the
|
|
* IOMMU MSIx emulation.
|
|
*/
|
|
#define RISCV_IOMMU_PCI_MSIX_VECTORS 5
|
|
|
|
/*
|
|
* 4 vectors that can be used by civ, fiv, pmiv and piv. Number of
|
|
* vectors is represented by 2^N, where N = number of writable bits
|
|
* in each cause. For 4 vectors we'll write 0b11 (3) in each reg.
|
|
*/
|
|
#define RISCV_IOMMU_PCI_ICVEC_VECTORS 0x3333
|
|
|
|
typedef struct RISCVIOMMUStatePci {
|
|
PCIDevice pci; /* Parent PCIe device state */
|
|
uint16_t vendor_id;
|
|
uint16_t device_id;
|
|
uint8_t revision;
|
|
MemoryRegion bar0; /* PCI BAR (including MSI-x config) */
|
|
RISCVIOMMUState iommu; /* common IOMMU state */
|
|
} RISCVIOMMUStatePci;
|
|
|
|
struct RISCVIOMMUPciClass {
|
|
/*< public >*/
|
|
DeviceRealize parent_realize;
|
|
ResettablePhases parent_phases;
|
|
};
|
|
|
|
/* interrupt delivery callback */
|
|
static void riscv_iommu_pci_notify(RISCVIOMMUState *iommu, unsigned vector)
|
|
{
|
|
RISCVIOMMUStatePci *s = container_of(iommu, RISCVIOMMUStatePci, iommu);
|
|
|
|
if (msix_enabled(&(s->pci))) {
|
|
msix_notify(&(s->pci), vector);
|
|
}
|
|
}
|
|
|
|
static void riscv_iommu_pci_realize(PCIDevice *dev, Error **errp)
|
|
{
|
|
RISCVIOMMUStatePci *s = DO_UPCAST(RISCVIOMMUStatePci, pci, dev);
|
|
RISCVIOMMUState *iommu = &s->iommu;
|
|
uint8_t *pci_conf = dev->config;
|
|
Error *err = NULL;
|
|
|
|
pci_set_word(pci_conf + PCI_VENDOR_ID, s->vendor_id);
|
|
pci_set_word(pci_conf + PCI_SUBSYSTEM_VENDOR_ID, s->vendor_id);
|
|
pci_set_word(pci_conf + PCI_DEVICE_ID, s->device_id);
|
|
pci_set_word(pci_conf + PCI_SUBSYSTEM_ID, s->device_id);
|
|
pci_set_byte(pci_conf + PCI_REVISION_ID, s->revision);
|
|
|
|
/* Set device id for trace / debug */
|
|
DEVICE(iommu)->id = g_strdup_printf("%02x:%02x.%01x",
|
|
pci_dev_bus_num(dev), PCI_SLOT(dev->devfn), PCI_FUNC(dev->devfn));
|
|
qdev_realize(DEVICE(iommu), NULL, errp);
|
|
|
|
memory_region_init(&s->bar0, OBJECT(s), "riscv-iommu-bar0",
|
|
QEMU_ALIGN_UP(memory_region_size(&iommu->regs_mr), TARGET_PAGE_SIZE));
|
|
memory_region_add_subregion(&s->bar0, 0, &iommu->regs_mr);
|
|
|
|
pcie_endpoint_cap_init(dev, 0);
|
|
|
|
pci_register_bar(dev, 0, PCI_BASE_ADDRESS_SPACE_MEMORY |
|
|
PCI_BASE_ADDRESS_MEM_TYPE_64, &s->bar0);
|
|
|
|
int ret = msix_init(dev, RISCV_IOMMU_PCI_MSIX_VECTORS,
|
|
&s->bar0, 0, RISCV_IOMMU_REG_MSI_CONFIG,
|
|
&s->bar0, 0, RISCV_IOMMU_REG_MSI_CONFIG + 256, 0, &err);
|
|
|
|
if (ret == -ENOTSUP) {
|
|
/*
|
|
* MSI-x is not supported by the platform.
|
|
* Driver should use timer/polling based notification handlers.
|
|
*/
|
|
warn_report_err(err);
|
|
} else if (ret < 0) {
|
|
error_propagate(errp, err);
|
|
return;
|
|
} else {
|
|
/* Mark all ICVEC MSIx vectors as used */
|
|
for (int i = 0; i < RISCV_IOMMU_PCI_MSIX_VECTORS; i++) {
|
|
msix_vector_use(dev, i);
|
|
}
|
|
|
|
iommu->notify = riscv_iommu_pci_notify;
|
|
}
|
|
|
|
PCIBus *bus = pci_device_root_bus(dev);
|
|
if (!bus) {
|
|
error_setg(errp, "can't find PCIe root port for %02x:%02x.%x",
|
|
pci_bus_num(pci_get_bus(dev)), PCI_SLOT(dev->devfn),
|
|
PCI_FUNC(dev->devfn));
|
|
return;
|
|
}
|
|
|
|
riscv_iommu_pci_setup_iommu(iommu, bus, errp);
|
|
}
|
|
|
|
static void riscv_iommu_pci_exit(PCIDevice *pci_dev)
|
|
{
|
|
pci_setup_iommu(pci_device_root_bus(pci_dev), NULL, NULL);
|
|
}
|
|
|
|
static const VMStateDescription riscv_iommu_vmstate = {
|
|
.name = "riscv-iommu",
|
|
.unmigratable = 1
|
|
};
|
|
|
|
static void riscv_iommu_pci_init(Object *obj)
|
|
{
|
|
RISCVIOMMUStatePci *s = RISCV_IOMMU_PCI(obj);
|
|
RISCVIOMMUState *iommu = &s->iommu;
|
|
|
|
object_initialize_child(obj, "iommu", iommu, TYPE_RISCV_IOMMU);
|
|
qdev_alias_all_properties(DEVICE(iommu), obj);
|
|
|
|
iommu->icvec_avail_vectors = RISCV_IOMMU_PCI_ICVEC_VECTORS;
|
|
riscv_iommu_set_cap_igs(iommu, RISCV_IOMMU_CAP_IGS_MSI);
|
|
}
|
|
|
|
static const Property riscv_iommu_pci_properties[] = {
|
|
DEFINE_PROP_UINT16("vendor-id", RISCVIOMMUStatePci, vendor_id,
|
|
PCI_VENDOR_ID_REDHAT),
|
|
DEFINE_PROP_UINT16("device-id", RISCVIOMMUStatePci, device_id,
|
|
PCI_DEVICE_ID_REDHAT_RISCV_IOMMU),
|
|
DEFINE_PROP_UINT8("revision", RISCVIOMMUStatePci, revision, 0x01),
|
|
};
|
|
|
|
static void riscv_iommu_pci_reset_hold(Object *obj, ResetType type)
|
|
{
|
|
RISCVIOMMUStatePci *pci = RISCV_IOMMU_PCI(obj);
|
|
RISCVIOMMUState *iommu = &pci->iommu;
|
|
|
|
riscv_iommu_reset(iommu);
|
|
|
|
trace_riscv_iommu_pci_reset_hold(type);
|
|
}
|
|
|
|
static void riscv_iommu_pci_class_init(ObjectClass *klass, void *data)
|
|
{
|
|
DeviceClass *dc = DEVICE_CLASS(klass);
|
|
PCIDeviceClass *k = PCI_DEVICE_CLASS(klass);
|
|
ResettableClass *rc = RESETTABLE_CLASS(klass);
|
|
|
|
rc->phases.hold = riscv_iommu_pci_reset_hold;
|
|
|
|
k->realize = riscv_iommu_pci_realize;
|
|
k->exit = riscv_iommu_pci_exit;
|
|
k->class_id = RISCV_PCI_CLASS_SYSTEM_IOMMU;
|
|
dc->desc = "RISCV-IOMMU DMA Remapping device";
|
|
dc->vmsd = &riscv_iommu_vmstate;
|
|
dc->hotpluggable = false;
|
|
dc->user_creatable = true;
|
|
set_bit(DEVICE_CATEGORY_MISC, dc->categories);
|
|
device_class_set_props(dc, riscv_iommu_pci_properties);
|
|
}
|
|
|
|
static const TypeInfo riscv_iommu_pci = {
|
|
.name = TYPE_RISCV_IOMMU_PCI,
|
|
.parent = TYPE_PCI_DEVICE,
|
|
.class_init = riscv_iommu_pci_class_init,
|
|
.instance_init = riscv_iommu_pci_init,
|
|
.instance_size = sizeof(RISCVIOMMUStatePci),
|
|
.interfaces = (InterfaceInfo[]) {
|
|
{ INTERFACE_PCIE_DEVICE },
|
|
{ },
|
|
},
|
|
};
|
|
|
|
static void riscv_iommu_register_pci_types(void)
|
|
{
|
|
type_register_static(&riscv_iommu_pci);
|
|
}
|
|
|
|
type_init(riscv_iommu_register_pci_types);
|