 03451953c7
			
		
	
	
		03451953c7
		
	
	
	
	
		
			
			ISM device firmware stores unique state information that can
can cause a wholesale unmap of the associated IOMMU (e.g. when
we get a termination signal for QEMU) to trigger firmware errors
because firmware believes we are attempting to invalidate entries
that are still in-use by the guest OS (when in fact that guest is
in the process of being terminated or rebooted).
To alleviate this, register both a shutdown notifier (for unexpected
termination cases e.g. virsh destroy) as well as a reset callback
(for cases like guest OS reboot).  For each of these scenarios, trigger
PCI device reset; this is enough to indicate to firmware that the IOMMU
is no longer in-use by the guest OS, making it safe to invalidate any
associated IOMMU entries.
Fixes: 15d0e7942d3b ("s390x/pci: don't fence interpreted devices without MSI-X")
Signed-off-by: Matthew Rosato <mjrosato@linux.ibm.com>
Message-Id: <20221209195700.263824-1-mjrosato@linux.ibm.com>
Reviewed-by: Eric Farman <farman@linux.ibm.com>
[thuth: Adjusted the hunk in s390-pci-vfio.c due to different context]
Signed-off-by: Thomas Huth <thuth@redhat.com>
		
	
			
		
			
				
	
	
		
			1550 lines
		
	
	
		
			45 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			1550 lines
		
	
	
		
			45 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * s390 PCI BUS
 | |
|  *
 | |
|  * Copyright 2014 IBM Corp.
 | |
|  * Author(s): Frank Blaschka <frank.blaschka@de.ibm.com>
 | |
|  *            Hong Bo Li <lihbbj@cn.ibm.com>
 | |
|  *            Yi Min Zhao <zyimin@cn.ibm.com>
 | |
|  *
 | |
|  * This work is licensed under the terms of the GNU GPL, version 2 or (at
 | |
|  * your option) any later version. See the COPYING file in the top-level
 | |
|  * directory.
 | |
|  */
 | |
| 
 | |
| #include "qemu/osdep.h"
 | |
| #include "qapi/error.h"
 | |
| #include "qapi/visitor.h"
 | |
| #include "hw/s390x/s390-pci-bus.h"
 | |
| #include "hw/s390x/s390-pci-inst.h"
 | |
| #include "hw/s390x/s390-pci-kvm.h"
 | |
| #include "hw/s390x/s390-pci-vfio.h"
 | |
| #include "hw/pci/pci_bus.h"
 | |
| #include "hw/qdev-properties.h"
 | |
| #include "hw/pci/pci_bridge.h"
 | |
| #include "hw/pci/msi.h"
 | |
| #include "qemu/error-report.h"
 | |
| #include "qemu/module.h"
 | |
| #include "sysemu/reset.h"
 | |
| #include "sysemu/runstate.h"
 | |
| 
 | |
| #ifndef DEBUG_S390PCI_BUS
 | |
| #define DEBUG_S390PCI_BUS  0
 | |
| #endif
 | |
| 
 | |
| #define DPRINTF(fmt, ...)                                         \
 | |
|     do {                                                          \
 | |
|         if (DEBUG_S390PCI_BUS) {                                  \
 | |
|             fprintf(stderr, "S390pci-bus: " fmt, ## __VA_ARGS__); \
 | |
|         }                                                         \
 | |
|     } while (0)
 | |
| 
 | |
| S390pciState *s390_get_phb(void)
 | |
| {
 | |
|     static S390pciState *phb;
 | |
| 
 | |
|     if (!phb) {
 | |
|         phb = S390_PCI_HOST_BRIDGE(
 | |
|             object_resolve_path(TYPE_S390_PCI_HOST_BRIDGE, NULL));
 | |
|         assert(phb != NULL);
 | |
|     }
 | |
| 
 | |
|     return phb;
 | |
| }
 | |
| 
 | |
| int pci_chsc_sei_nt2_get_event(void *res)
 | |
| {
 | |
|     ChscSeiNt2Res *nt2_res = (ChscSeiNt2Res *)res;
 | |
|     PciCcdfAvail *accdf;
 | |
|     PciCcdfErr *eccdf;
 | |
|     int rc = 1;
 | |
|     SeiContainer *sei_cont;
 | |
|     S390pciState *s = s390_get_phb();
 | |
| 
 | |
|     sei_cont = QTAILQ_FIRST(&s->pending_sei);
 | |
|     if (sei_cont) {
 | |
|         QTAILQ_REMOVE(&s->pending_sei, sei_cont, link);
 | |
|         nt2_res->nt = 2;
 | |
|         nt2_res->cc = sei_cont->cc;
 | |
|         nt2_res->length = cpu_to_be16(sizeof(ChscSeiNt2Res));
 | |
|         switch (sei_cont->cc) {
 | |
|         case 1: /* error event */
 | |
|             eccdf = (PciCcdfErr *)nt2_res->ccdf;
 | |
|             eccdf->fid = cpu_to_be32(sei_cont->fid);
 | |
|             eccdf->fh = cpu_to_be32(sei_cont->fh);
 | |
|             eccdf->e = cpu_to_be32(sei_cont->e);
 | |
|             eccdf->faddr = cpu_to_be64(sei_cont->faddr);
 | |
|             eccdf->pec = cpu_to_be16(sei_cont->pec);
 | |
|             break;
 | |
|         case 2: /* availability event */
 | |
|             accdf = (PciCcdfAvail *)nt2_res->ccdf;
 | |
|             accdf->fid = cpu_to_be32(sei_cont->fid);
 | |
|             accdf->fh = cpu_to_be32(sei_cont->fh);
 | |
|             accdf->pec = cpu_to_be16(sei_cont->pec);
 | |
|             break;
 | |
|         default:
 | |
|             abort();
 | |
|         }
 | |
|         g_free(sei_cont);
 | |
|         rc = 0;
 | |
|     }
 | |
| 
 | |
|     return rc;
 | |
| }
 | |
| 
 | |
| int pci_chsc_sei_nt2_have_event(void)
 | |
| {
 | |
|     S390pciState *s = s390_get_phb();
 | |
| 
 | |
|     return !QTAILQ_EMPTY(&s->pending_sei);
 | |
| }
 | |
| 
 | |
| S390PCIBusDevice *s390_pci_find_next_avail_dev(S390pciState *s,
 | |
|                                                S390PCIBusDevice *pbdev)
 | |
| {
 | |
|     S390PCIBusDevice *ret = pbdev ? QTAILQ_NEXT(pbdev, link) :
 | |
|         QTAILQ_FIRST(&s->zpci_devs);
 | |
| 
 | |
|     while (ret && ret->state == ZPCI_FS_RESERVED) {
 | |
|         ret = QTAILQ_NEXT(ret, link);
 | |
|     }
 | |
| 
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| S390PCIBusDevice *s390_pci_find_dev_by_fid(S390pciState *s, uint32_t fid)
 | |
| {
 | |
|     S390PCIBusDevice *pbdev;
 | |
| 
 | |
|     QTAILQ_FOREACH(pbdev, &s->zpci_devs, link) {
 | |
|         if (pbdev->fid == fid) {
 | |
|             return pbdev;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     return NULL;
 | |
| }
 | |
| 
 | |
| void s390_pci_sclp_configure(SCCB *sccb)
 | |
| {
 | |
|     IoaCfgSccb *psccb = (IoaCfgSccb *)sccb;
 | |
|     S390PCIBusDevice *pbdev = s390_pci_find_dev_by_fid(s390_get_phb(),
 | |
|                                                        be32_to_cpu(psccb->aid));
 | |
|     uint16_t rc;
 | |
| 
 | |
|     if (!pbdev) {
 | |
|         DPRINTF("sclp config no dev found\n");
 | |
|         rc = SCLP_RC_ADAPTER_ID_NOT_RECOGNIZED;
 | |
|         goto out;
 | |
|     }
 | |
| 
 | |
|     switch (pbdev->state) {
 | |
|     case ZPCI_FS_RESERVED:
 | |
|         rc = SCLP_RC_ADAPTER_IN_RESERVED_STATE;
 | |
|         break;
 | |
|     case ZPCI_FS_STANDBY:
 | |
|         pbdev->state = ZPCI_FS_DISABLED;
 | |
|         rc = SCLP_RC_NORMAL_COMPLETION;
 | |
|         break;
 | |
|     default:
 | |
|         rc = SCLP_RC_NO_ACTION_REQUIRED;
 | |
|     }
 | |
| out:
 | |
|     psccb->header.response_code = cpu_to_be16(rc);
 | |
| }
 | |
| 
 | |
| static void s390_pci_shutdown_notifier(Notifier *n, void *opaque)
 | |
| {
 | |
|     S390PCIBusDevice *pbdev = container_of(n, S390PCIBusDevice,
 | |
|                                            shutdown_notifier);
 | |
| 
 | |
|     pci_device_reset(pbdev->pdev);
 | |
| }
 | |
| 
 | |
| static void s390_pci_reset_cb(void *opaque)
 | |
| {
 | |
|     S390PCIBusDevice *pbdev = opaque;
 | |
| 
 | |
|     pci_device_reset(pbdev->pdev);
 | |
| }
 | |
| 
 | |
| static void s390_pci_perform_unplug(S390PCIBusDevice *pbdev)
 | |
| {
 | |
|     HotplugHandler *hotplug_ctrl;
 | |
| 
 | |
|     if (pbdev->pft == ZPCI_PFT_ISM) {
 | |
|         notifier_remove(&pbdev->shutdown_notifier);
 | |
|         qemu_unregister_reset(s390_pci_reset_cb, pbdev);
 | |
|     }
 | |
| 
 | |
|     /* Unplug the PCI device */
 | |
|     if (pbdev->pdev) {
 | |
|         DeviceState *pdev = DEVICE(pbdev->pdev);
 | |
| 
 | |
|         hotplug_ctrl = qdev_get_hotplug_handler(pdev);
 | |
|         hotplug_handler_unplug(hotplug_ctrl, pdev, &error_abort);
 | |
|         object_unparent(OBJECT(pdev));
 | |
|     }
 | |
| 
 | |
|     /* Unplug the zPCI device */
 | |
|     hotplug_ctrl = qdev_get_hotplug_handler(DEVICE(pbdev));
 | |
|     hotplug_handler_unplug(hotplug_ctrl, DEVICE(pbdev), &error_abort);
 | |
|     object_unparent(OBJECT(pbdev));
 | |
| }
 | |
| 
 | |
| void s390_pci_sclp_deconfigure(SCCB *sccb)
 | |
| {
 | |
|     IoaCfgSccb *psccb = (IoaCfgSccb *)sccb;
 | |
|     S390PCIBusDevice *pbdev = s390_pci_find_dev_by_fid(s390_get_phb(),
 | |
|                                                        be32_to_cpu(psccb->aid));
 | |
|     uint16_t rc;
 | |
| 
 | |
|     if (!pbdev) {
 | |
|         DPRINTF("sclp deconfig no dev found\n");
 | |
|         rc = SCLP_RC_ADAPTER_ID_NOT_RECOGNIZED;
 | |
|         goto out;
 | |
|     }
 | |
| 
 | |
|     switch (pbdev->state) {
 | |
|     case ZPCI_FS_RESERVED:
 | |
|         rc = SCLP_RC_ADAPTER_IN_RESERVED_STATE;
 | |
|         break;
 | |
|     case ZPCI_FS_STANDBY:
 | |
|         rc = SCLP_RC_NO_ACTION_REQUIRED;
 | |
|         break;
 | |
|     default:
 | |
|         if (pbdev->interp && (pbdev->fh & FH_MASK_ENABLE)) {
 | |
|             /* Interpreted devices were using interrupt forwarding */
 | |
|             s390_pci_kvm_aif_disable(pbdev);
 | |
|         } else if (pbdev->summary_ind) {
 | |
|             pci_dereg_irqs(pbdev);
 | |
|         }
 | |
|         if (pbdev->iommu->enabled) {
 | |
|             pci_dereg_ioat(pbdev->iommu);
 | |
|         }
 | |
|         pbdev->state = ZPCI_FS_STANDBY;
 | |
|         rc = SCLP_RC_NORMAL_COMPLETION;
 | |
| 
 | |
|         if (pbdev->unplug_requested) {
 | |
|             s390_pci_perform_unplug(pbdev);
 | |
|         }
 | |
|     }
 | |
| out:
 | |
|     psccb->header.response_code = cpu_to_be16(rc);
 | |
| }
 | |
| 
 | |
| static S390PCIBusDevice *s390_pci_find_dev_by_uid(S390pciState *s, uint16_t uid)
 | |
| {
 | |
|     S390PCIBusDevice *pbdev;
 | |
| 
 | |
|     QTAILQ_FOREACH(pbdev, &s->zpci_devs, link) {
 | |
|         if (pbdev->uid == uid) {
 | |
|             return pbdev;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     return NULL;
 | |
| }
 | |
| 
 | |
| S390PCIBusDevice *s390_pci_find_dev_by_target(S390pciState *s,
 | |
|                                               const char *target)
 | |
| {
 | |
|     S390PCIBusDevice *pbdev;
 | |
| 
 | |
|     if (!target) {
 | |
|         return NULL;
 | |
|     }
 | |
| 
 | |
|     QTAILQ_FOREACH(pbdev, &s->zpci_devs, link) {
 | |
|         if (!strcmp(pbdev->target, target)) {
 | |
|             return pbdev;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     return NULL;
 | |
| }
 | |
| 
 | |
| static S390PCIBusDevice *s390_pci_find_dev_by_pci(S390pciState *s,
 | |
|                                                   PCIDevice *pci_dev)
 | |
| {
 | |
|     S390PCIBusDevice *pbdev;
 | |
| 
 | |
|     if (!pci_dev) {
 | |
|         return NULL;
 | |
|     }
 | |
| 
 | |
|     QTAILQ_FOREACH(pbdev, &s->zpci_devs, link) {
 | |
|         if (pbdev->pdev == pci_dev) {
 | |
|             return pbdev;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     return NULL;
 | |
| }
 | |
| 
 | |
| S390PCIBusDevice *s390_pci_find_dev_by_idx(S390pciState *s, uint32_t idx)
 | |
| {
 | |
|     return g_hash_table_lookup(s->zpci_table, &idx);
 | |
| }
 | |
| 
 | |
| S390PCIBusDevice *s390_pci_find_dev_by_fh(S390pciState *s, uint32_t fh)
 | |
| {
 | |
|     uint32_t idx = FH_MASK_INDEX & fh;
 | |
|     S390PCIBusDevice *pbdev = s390_pci_find_dev_by_idx(s, idx);
 | |
| 
 | |
|     if (pbdev && pbdev->fh == fh) {
 | |
|         return pbdev;
 | |
|     }
 | |
| 
 | |
|     return NULL;
 | |
| }
 | |
| 
 | |
| static void s390_pci_generate_event(uint8_t cc, uint16_t pec, uint32_t fh,
 | |
|                                     uint32_t fid, uint64_t faddr, uint32_t e)
 | |
| {
 | |
|     SeiContainer *sei_cont;
 | |
|     S390pciState *s = s390_get_phb();
 | |
| 
 | |
|     sei_cont = g_new0(SeiContainer, 1);
 | |
|     sei_cont->fh = fh;
 | |
|     sei_cont->fid = fid;
 | |
|     sei_cont->cc = cc;
 | |
|     sei_cont->pec = pec;
 | |
|     sei_cont->faddr = faddr;
 | |
|     sei_cont->e = e;
 | |
| 
 | |
|     QTAILQ_INSERT_TAIL(&s->pending_sei, sei_cont, link);
 | |
|     css_generate_css_crws(0);
 | |
| }
 | |
| 
 | |
| static void s390_pci_generate_plug_event(uint16_t pec, uint32_t fh,
 | |
|                                          uint32_t fid)
 | |
| {
 | |
|     s390_pci_generate_event(2, pec, fh, fid, 0, 0);
 | |
| }
 | |
| 
 | |
| void s390_pci_generate_error_event(uint16_t pec, uint32_t fh, uint32_t fid,
 | |
|                                    uint64_t faddr, uint32_t e)
 | |
| {
 | |
|     s390_pci_generate_event(1, pec, fh, fid, faddr, e);
 | |
| }
 | |
| 
 | |
| static void s390_pci_set_irq(void *opaque, int irq, int level)
 | |
| {
 | |
|     /* nothing to do */
 | |
| }
 | |
| 
 | |
| static int s390_pci_map_irq(PCIDevice *pci_dev, int irq_num)
 | |
| {
 | |
|     /* nothing to do */
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static uint64_t s390_pci_get_table_origin(uint64_t iota)
 | |
| {
 | |
|     return iota & ~ZPCI_IOTA_RTTO_FLAG;
 | |
| }
 | |
| 
 | |
| static unsigned int calc_rtx(dma_addr_t ptr)
 | |
| {
 | |
|     return ((unsigned long) ptr >> ZPCI_RT_SHIFT) & ZPCI_INDEX_MASK;
 | |
| }
 | |
| 
 | |
| static unsigned int calc_sx(dma_addr_t ptr)
 | |
| {
 | |
|     return ((unsigned long) ptr >> ZPCI_ST_SHIFT) & ZPCI_INDEX_MASK;
 | |
| }
 | |
| 
 | |
| static unsigned int calc_px(dma_addr_t ptr)
 | |
| {
 | |
|     return ((unsigned long) ptr >> TARGET_PAGE_BITS) & ZPCI_PT_MASK;
 | |
| }
 | |
| 
 | |
| static uint64_t get_rt_sto(uint64_t entry)
 | |
| {
 | |
|     return ((entry & ZPCI_TABLE_TYPE_MASK) == ZPCI_TABLE_TYPE_RTX)
 | |
|                 ? (entry & ZPCI_RTE_ADDR_MASK)
 | |
|                 : 0;
 | |
| }
 | |
| 
 | |
| static uint64_t get_st_pto(uint64_t entry)
 | |
| {
 | |
|     return ((entry & ZPCI_TABLE_TYPE_MASK) == ZPCI_TABLE_TYPE_SX)
 | |
|             ? (entry & ZPCI_STE_ADDR_MASK)
 | |
|             : 0;
 | |
| }
 | |
| 
 | |
| static bool rt_entry_isvalid(uint64_t entry)
 | |
| {
 | |
|     return (entry & ZPCI_TABLE_VALID_MASK) == ZPCI_TABLE_VALID;
 | |
| }
 | |
| 
 | |
| static bool pt_entry_isvalid(uint64_t entry)
 | |
| {
 | |
|     return (entry & ZPCI_PTE_VALID_MASK) == ZPCI_PTE_VALID;
 | |
| }
 | |
| 
 | |
| static bool entry_isprotected(uint64_t entry)
 | |
| {
 | |
|     return (entry & ZPCI_TABLE_PROT_MASK) == ZPCI_TABLE_PROTECTED;
 | |
| }
 | |
| 
 | |
| /* ett is expected table type, -1 page table, 0 segment table, 1 region table */
 | |
| static uint64_t get_table_index(uint64_t iova, int8_t ett)
 | |
| {
 | |
|     switch (ett) {
 | |
|     case ZPCI_ETT_PT:
 | |
|         return calc_px(iova);
 | |
|     case ZPCI_ETT_ST:
 | |
|         return calc_sx(iova);
 | |
|     case ZPCI_ETT_RT:
 | |
|         return calc_rtx(iova);
 | |
|     }
 | |
| 
 | |
|     return -1;
 | |
| }
 | |
| 
 | |
| static bool entry_isvalid(uint64_t entry, int8_t ett)
 | |
| {
 | |
|     switch (ett) {
 | |
|     case ZPCI_ETT_PT:
 | |
|         return pt_entry_isvalid(entry);
 | |
|     case ZPCI_ETT_ST:
 | |
|     case ZPCI_ETT_RT:
 | |
|         return rt_entry_isvalid(entry);
 | |
|     }
 | |
| 
 | |
|     return false;
 | |
| }
 | |
| 
 | |
| /* Return true if address translation is done */
 | |
| static bool translate_iscomplete(uint64_t entry, int8_t ett)
 | |
| {
 | |
|     switch (ett) {
 | |
|     case 0:
 | |
|         return (entry & ZPCI_TABLE_FC) ? true : false;
 | |
|     case 1:
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     return true;
 | |
| }
 | |
| 
 | |
| static uint64_t get_frame_size(int8_t ett)
 | |
| {
 | |
|     switch (ett) {
 | |
|     case ZPCI_ETT_PT:
 | |
|         return 1ULL << 12;
 | |
|     case ZPCI_ETT_ST:
 | |
|         return 1ULL << 20;
 | |
|     case ZPCI_ETT_RT:
 | |
|         return 1ULL << 31;
 | |
|     }
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static uint64_t get_next_table_origin(uint64_t entry, int8_t ett)
 | |
| {
 | |
|     switch (ett) {
 | |
|     case ZPCI_ETT_PT:
 | |
|         return entry & ZPCI_PTE_ADDR_MASK;
 | |
|     case ZPCI_ETT_ST:
 | |
|         return get_st_pto(entry);
 | |
|     case ZPCI_ETT_RT:
 | |
|         return get_rt_sto(entry);
 | |
|     }
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * table_translate: do translation within one table and return the following
 | |
|  *                  table origin
 | |
|  *
 | |
|  * @entry: the entry being translated, the result is stored in this.
 | |
|  * @to: the address of table origin.
 | |
|  * @ett: expected table type, 1 region table, 0 segment table and -1 page table.
 | |
|  * @error: error code
 | |
|  */
 | |
| static uint64_t table_translate(S390IOTLBEntry *entry, uint64_t to, int8_t ett,
 | |
|                                 uint16_t *error)
 | |
| {
 | |
|     uint64_t tx, te, nto = 0;
 | |
|     uint16_t err = 0;
 | |
| 
 | |
|     tx = get_table_index(entry->iova, ett);
 | |
|     te = address_space_ldq(&address_space_memory, to + tx * sizeof(uint64_t),
 | |
|                            MEMTXATTRS_UNSPECIFIED, NULL);
 | |
| 
 | |
|     if (!te) {
 | |
|         err = ERR_EVENT_INVALTE;
 | |
|         goto out;
 | |
|     }
 | |
| 
 | |
|     if (!entry_isvalid(te, ett)) {
 | |
|         entry->perm &= IOMMU_NONE;
 | |
|         goto out;
 | |
|     }
 | |
| 
 | |
|     if (ett == ZPCI_ETT_RT && ((te & ZPCI_TABLE_LEN_RTX) != ZPCI_TABLE_LEN_RTX
 | |
|                                || te & ZPCI_TABLE_OFFSET_MASK)) {
 | |
|         err = ERR_EVENT_INVALTL;
 | |
|         goto out;
 | |
|     }
 | |
| 
 | |
|     nto = get_next_table_origin(te, ett);
 | |
|     if (!nto) {
 | |
|         err = ERR_EVENT_TT;
 | |
|         goto out;
 | |
|     }
 | |
| 
 | |
|     if (entry_isprotected(te)) {
 | |
|         entry->perm &= IOMMU_RO;
 | |
|     } else {
 | |
|         entry->perm &= IOMMU_RW;
 | |
|     }
 | |
| 
 | |
|     if (translate_iscomplete(te, ett)) {
 | |
|         switch (ett) {
 | |
|         case ZPCI_ETT_PT:
 | |
|             entry->translated_addr = te & ZPCI_PTE_ADDR_MASK;
 | |
|             break;
 | |
|         case ZPCI_ETT_ST:
 | |
|             entry->translated_addr = (te & ZPCI_SFAA_MASK) |
 | |
|                 (entry->iova & ~ZPCI_SFAA_MASK);
 | |
|             break;
 | |
|         }
 | |
|         nto = 0;
 | |
|     }
 | |
| out:
 | |
|     if (err) {
 | |
|         entry->perm = IOMMU_NONE;
 | |
|         *error = err;
 | |
|     }
 | |
|     entry->len = get_frame_size(ett);
 | |
|     return nto;
 | |
| }
 | |
| 
 | |
| uint16_t s390_guest_io_table_walk(uint64_t g_iota, hwaddr addr,
 | |
|                                   S390IOTLBEntry *entry)
 | |
| {
 | |
|     uint64_t to = s390_pci_get_table_origin(g_iota);
 | |
|     int8_t ett = 1;
 | |
|     uint16_t error = 0;
 | |
| 
 | |
|     entry->iova = addr & TARGET_PAGE_MASK;
 | |
|     entry->translated_addr = 0;
 | |
|     entry->perm = IOMMU_RW;
 | |
| 
 | |
|     if (entry_isprotected(g_iota)) {
 | |
|         entry->perm &= IOMMU_RO;
 | |
|     }
 | |
| 
 | |
|     while (to) {
 | |
|         to = table_translate(entry, to, ett--, &error);
 | |
|     }
 | |
| 
 | |
|     return error;
 | |
| }
 | |
| 
 | |
| static IOMMUTLBEntry s390_translate_iommu(IOMMUMemoryRegion *mr, hwaddr addr,
 | |
|                                           IOMMUAccessFlags flag, int iommu_idx)
 | |
| {
 | |
|     S390PCIIOMMU *iommu = container_of(mr, S390PCIIOMMU, iommu_mr);
 | |
|     S390IOTLBEntry *entry;
 | |
|     uint64_t iova = addr & TARGET_PAGE_MASK;
 | |
|     uint16_t error = 0;
 | |
|     IOMMUTLBEntry ret = {
 | |
|         .target_as = &address_space_memory,
 | |
|         .iova = 0,
 | |
|         .translated_addr = 0,
 | |
|         .addr_mask = ~(hwaddr)0,
 | |
|         .perm = IOMMU_NONE,
 | |
|     };
 | |
| 
 | |
|     switch (iommu->pbdev->state) {
 | |
|     case ZPCI_FS_ENABLED:
 | |
|     case ZPCI_FS_BLOCKED:
 | |
|         if (!iommu->enabled) {
 | |
|             return ret;
 | |
|         }
 | |
|         break;
 | |
|     default:
 | |
|         return ret;
 | |
|     }
 | |
| 
 | |
|     DPRINTF("iommu trans addr 0x%" PRIx64 "\n", addr);
 | |
| 
 | |
|     if (addr < iommu->pba || addr > iommu->pal) {
 | |
|         error = ERR_EVENT_OORANGE;
 | |
|         goto err;
 | |
|     }
 | |
| 
 | |
|     entry = g_hash_table_lookup(iommu->iotlb, &iova);
 | |
|     if (entry) {
 | |
|         ret.iova = entry->iova;
 | |
|         ret.translated_addr = entry->translated_addr;
 | |
|         ret.addr_mask = entry->len - 1;
 | |
|         ret.perm = entry->perm;
 | |
|     } else {
 | |
|         ret.iova = iova;
 | |
|         ret.addr_mask = ~TARGET_PAGE_MASK;
 | |
|         ret.perm = IOMMU_NONE;
 | |
|     }
 | |
| 
 | |
|     if (flag != IOMMU_NONE && !(flag & ret.perm)) {
 | |
|         error = ERR_EVENT_TPROTE;
 | |
|     }
 | |
| err:
 | |
|     if (error) {
 | |
|         iommu->pbdev->state = ZPCI_FS_ERROR;
 | |
|         s390_pci_generate_error_event(error, iommu->pbdev->fh,
 | |
|                                       iommu->pbdev->fid, addr, 0);
 | |
|     }
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| static void s390_pci_iommu_replay(IOMMUMemoryRegion *iommu,
 | |
|                                   IOMMUNotifier *notifier)
 | |
| {
 | |
|     /* It's impossible to plug a pci device on s390x that already has iommu
 | |
|      * mappings which need to be replayed, that is due to the "one iommu per
 | |
|      * zpci device" construct. But when we support migration of vfio-pci
 | |
|      * devices in future, we need to revisit this.
 | |
|      */
 | |
|     return;
 | |
| }
 | |
| 
 | |
| static S390PCIIOMMU *s390_pci_get_iommu(S390pciState *s, PCIBus *bus,
 | |
|                                         int devfn)
 | |
| {
 | |
|     uint64_t key = (uintptr_t)bus;
 | |
|     S390PCIIOMMUTable *table = g_hash_table_lookup(s->iommu_table, &key);
 | |
|     S390PCIIOMMU *iommu;
 | |
| 
 | |
|     if (!table) {
 | |
|         table = g_new0(S390PCIIOMMUTable, 1);
 | |
|         table->key = key;
 | |
|         g_hash_table_insert(s->iommu_table, &table->key, table);
 | |
|     }
 | |
| 
 | |
|     iommu = table->iommu[PCI_SLOT(devfn)];
 | |
|     if (!iommu) {
 | |
|         iommu = S390_PCI_IOMMU(object_new(TYPE_S390_PCI_IOMMU));
 | |
| 
 | |
|         char *mr_name = g_strdup_printf("iommu-root-%02x:%02x.%01x",
 | |
|                                         pci_bus_num(bus),
 | |
|                                         PCI_SLOT(devfn),
 | |
|                                         PCI_FUNC(devfn));
 | |
|         char *as_name = g_strdup_printf("iommu-pci-%02x:%02x.%01x",
 | |
|                                         pci_bus_num(bus),
 | |
|                                         PCI_SLOT(devfn),
 | |
|                                         PCI_FUNC(devfn));
 | |
|         memory_region_init(&iommu->mr, OBJECT(iommu), mr_name, UINT64_MAX);
 | |
|         address_space_init(&iommu->as, &iommu->mr, as_name);
 | |
|         iommu->iotlb = g_hash_table_new_full(g_int64_hash, g_int64_equal,
 | |
|                                              NULL, g_free);
 | |
|         table->iommu[PCI_SLOT(devfn)] = iommu;
 | |
| 
 | |
|         g_free(mr_name);
 | |
|         g_free(as_name);
 | |
|     }
 | |
| 
 | |
|     return iommu;
 | |
| }
 | |
| 
 | |
| static AddressSpace *s390_pci_dma_iommu(PCIBus *bus, void *opaque, int devfn)
 | |
| {
 | |
|     S390pciState *s = opaque;
 | |
|     S390PCIIOMMU *iommu = s390_pci_get_iommu(s, bus, devfn);
 | |
| 
 | |
|     return &iommu->as;
 | |
| }
 | |
| 
 | |
| static uint8_t set_ind_atomic(uint64_t ind_loc, uint8_t to_be_set)
 | |
| {
 | |
|     uint8_t expected, actual;
 | |
|     hwaddr len = 1;
 | |
|     /* avoid  multiple fetches */
 | |
|     uint8_t volatile *ind_addr;
 | |
| 
 | |
|     ind_addr = cpu_physical_memory_map(ind_loc, &len, true);
 | |
|     if (!ind_addr) {
 | |
|         s390_pci_generate_error_event(ERR_EVENT_AIRERR, 0, 0, 0, 0);
 | |
|         return -1;
 | |
|     }
 | |
|     actual = *ind_addr;
 | |
|     do {
 | |
|         expected = actual;
 | |
|         actual = qatomic_cmpxchg(ind_addr, expected, expected | to_be_set);
 | |
|     } while (actual != expected);
 | |
|     cpu_physical_memory_unmap((void *)ind_addr, len, 1, len);
 | |
| 
 | |
|     return actual;
 | |
| }
 | |
| 
 | |
| static void s390_msi_ctrl_write(void *opaque, hwaddr addr, uint64_t data,
 | |
|                                 unsigned int size)
 | |
| {
 | |
|     S390PCIBusDevice *pbdev = opaque;
 | |
|     uint32_t vec = data & ZPCI_MSI_VEC_MASK;
 | |
|     uint64_t ind_bit;
 | |
|     uint32_t sum_bit;
 | |
| 
 | |
|     assert(pbdev);
 | |
|     DPRINTF("write_msix data 0x%" PRIx64 " idx %d vec 0x%x\n", data,
 | |
|             pbdev->idx, vec);
 | |
| 
 | |
|     if (pbdev->state != ZPCI_FS_ENABLED) {
 | |
|         return;
 | |
|     }
 | |
| 
 | |
|     ind_bit = pbdev->routes.adapter.ind_offset;
 | |
|     sum_bit = pbdev->routes.adapter.summary_offset;
 | |
| 
 | |
|     set_ind_atomic(pbdev->routes.adapter.ind_addr + (ind_bit + vec) / 8,
 | |
|                    0x80 >> ((ind_bit + vec) % 8));
 | |
|     if (!set_ind_atomic(pbdev->routes.adapter.summary_addr + sum_bit / 8,
 | |
|                                        0x80 >> (sum_bit % 8))) {
 | |
|         css_adapter_interrupt(CSS_IO_ADAPTER_PCI, pbdev->isc);
 | |
|     }
 | |
| }
 | |
| 
 | |
| static uint64_t s390_msi_ctrl_read(void *opaque, hwaddr addr, unsigned size)
 | |
| {
 | |
|     return 0xffffffff;
 | |
| }
 | |
| 
 | |
| static const MemoryRegionOps s390_msi_ctrl_ops = {
 | |
|     .write = s390_msi_ctrl_write,
 | |
|     .read = s390_msi_ctrl_read,
 | |
|     .endianness = DEVICE_LITTLE_ENDIAN,
 | |
| };
 | |
| 
 | |
| void s390_pci_iommu_enable(S390PCIIOMMU *iommu)
 | |
| {
 | |
|     /*
 | |
|      * The iommu region is initialized against a 0-mapped address space,
 | |
|      * so the smallest IOMMU region we can define runs from 0 to the end
 | |
|      * of the PCI address space.
 | |
|      */
 | |
|     char *name = g_strdup_printf("iommu-s390-%04x", iommu->pbdev->uid);
 | |
|     memory_region_init_iommu(&iommu->iommu_mr, sizeof(iommu->iommu_mr),
 | |
|                              TYPE_S390_IOMMU_MEMORY_REGION, OBJECT(&iommu->mr),
 | |
|                              name, iommu->pal + 1);
 | |
|     iommu->enabled = true;
 | |
|     memory_region_add_subregion(&iommu->mr, 0, MEMORY_REGION(&iommu->iommu_mr));
 | |
|     g_free(name);
 | |
| }
 | |
| 
 | |
| void s390_pci_iommu_disable(S390PCIIOMMU *iommu)
 | |
| {
 | |
|     iommu->enabled = false;
 | |
|     g_hash_table_remove_all(iommu->iotlb);
 | |
|     memory_region_del_subregion(&iommu->mr, MEMORY_REGION(&iommu->iommu_mr));
 | |
|     object_unparent(OBJECT(&iommu->iommu_mr));
 | |
| }
 | |
| 
 | |
| static void s390_pci_iommu_free(S390pciState *s, PCIBus *bus, int32_t devfn)
 | |
| {
 | |
|     uint64_t key = (uintptr_t)bus;
 | |
|     S390PCIIOMMUTable *table = g_hash_table_lookup(s->iommu_table, &key);
 | |
|     S390PCIIOMMU *iommu = table ? table->iommu[PCI_SLOT(devfn)] : NULL;
 | |
| 
 | |
|     if (!table || !iommu) {
 | |
|         return;
 | |
|     }
 | |
| 
 | |
|     table->iommu[PCI_SLOT(devfn)] = NULL;
 | |
|     g_hash_table_destroy(iommu->iotlb);
 | |
|     /*
 | |
|      * An attached PCI device may have memory listeners, eg. VFIO PCI.
 | |
|      * The associated subregion will already have been unmapped in
 | |
|      * s390_pci_iommu_disable in response to the guest deconfigure request.
 | |
|      * Remove the listeners now before destroying the address space.
 | |
|      */
 | |
|     address_space_remove_listeners(&iommu->as);
 | |
|     address_space_destroy(&iommu->as);
 | |
|     object_unparent(OBJECT(&iommu->mr));
 | |
|     object_unparent(OBJECT(iommu));
 | |
|     object_unref(OBJECT(iommu));
 | |
| }
 | |
| 
 | |
| S390PCIGroup *s390_group_create(int id, int host_id)
 | |
| {
 | |
|     S390PCIGroup *group;
 | |
|     S390pciState *s = s390_get_phb();
 | |
| 
 | |
|     group = g_new0(S390PCIGroup, 1);
 | |
|     group->id = id;
 | |
|     group->host_id = host_id;
 | |
|     QTAILQ_INSERT_TAIL(&s->zpci_groups, group, link);
 | |
|     return group;
 | |
| }
 | |
| 
 | |
| S390PCIGroup *s390_group_find(int id)
 | |
| {
 | |
|     S390PCIGroup *group;
 | |
|     S390pciState *s = s390_get_phb();
 | |
| 
 | |
|     QTAILQ_FOREACH(group, &s->zpci_groups, link) {
 | |
|         if (group->id == id) {
 | |
|             return group;
 | |
|         }
 | |
|     }
 | |
|     return NULL;
 | |
| }
 | |
| 
 | |
| S390PCIGroup *s390_group_find_host_sim(int host_id)
 | |
| {
 | |
|     S390PCIGroup *group;
 | |
|     S390pciState *s = s390_get_phb();
 | |
| 
 | |
|     QTAILQ_FOREACH(group, &s->zpci_groups, link) {
 | |
|         if (group->id >= ZPCI_SIM_GRP_START && group->host_id == host_id) {
 | |
|             return group;
 | |
|         }
 | |
|     }
 | |
|     return NULL;
 | |
| }
 | |
| 
 | |
| static void s390_pci_init_default_group(void)
 | |
| {
 | |
|     S390PCIGroup *group;
 | |
|     ClpRspQueryPciGrp *resgrp;
 | |
| 
 | |
|     group = s390_group_create(ZPCI_DEFAULT_FN_GRP, ZPCI_DEFAULT_FN_GRP);
 | |
|     resgrp = &group->zpci_group;
 | |
|     resgrp->fr = 1;
 | |
|     resgrp->dasm = 0;
 | |
|     resgrp->msia = ZPCI_MSI_ADDR;
 | |
|     resgrp->mui = DEFAULT_MUI;
 | |
|     resgrp->i = 128;
 | |
|     resgrp->maxstbl = 128;
 | |
|     resgrp->version = 0;
 | |
|     resgrp->dtsm = ZPCI_DTSM;
 | |
| }
 | |
| 
 | |
| static void set_pbdev_info(S390PCIBusDevice *pbdev)
 | |
| {
 | |
|     pbdev->zpci_fn.sdma = ZPCI_SDMA_ADDR;
 | |
|     pbdev->zpci_fn.edma = ZPCI_EDMA_ADDR;
 | |
|     pbdev->zpci_fn.pchid = 0;
 | |
|     pbdev->zpci_fn.pfgid = ZPCI_DEFAULT_FN_GRP;
 | |
|     pbdev->zpci_fn.fid = pbdev->fid;
 | |
|     pbdev->zpci_fn.uid = pbdev->uid;
 | |
|     pbdev->pci_group = s390_group_find(ZPCI_DEFAULT_FN_GRP);
 | |
| }
 | |
| 
 | |
| static void s390_pcihost_realize(DeviceState *dev, Error **errp)
 | |
| {
 | |
|     PCIBus *b;
 | |
|     BusState *bus;
 | |
|     PCIHostState *phb = PCI_HOST_BRIDGE(dev);
 | |
|     S390pciState *s = S390_PCI_HOST_BRIDGE(dev);
 | |
| 
 | |
|     DPRINTF("host_init\n");
 | |
| 
 | |
|     b = pci_register_root_bus(dev, NULL, s390_pci_set_irq, s390_pci_map_irq,
 | |
|                               NULL, get_system_memory(), get_system_io(), 0,
 | |
|                               64, TYPE_PCI_BUS);
 | |
|     pci_setup_iommu(b, s390_pci_dma_iommu, s);
 | |
| 
 | |
|     bus = BUS(b);
 | |
|     qbus_set_hotplug_handler(bus, OBJECT(dev));
 | |
|     phb->bus = b;
 | |
| 
 | |
|     s->bus = S390_PCI_BUS(qbus_new(TYPE_S390_PCI_BUS, dev, NULL));
 | |
|     qbus_set_hotplug_handler(BUS(s->bus), OBJECT(dev));
 | |
| 
 | |
|     s->iommu_table = g_hash_table_new_full(g_int64_hash, g_int64_equal,
 | |
|                                            NULL, g_free);
 | |
|     s->zpci_table = g_hash_table_new_full(g_int_hash, g_int_equal, NULL, NULL);
 | |
|     s->bus_no = 0;
 | |
|     s->next_sim_grp = ZPCI_SIM_GRP_START;
 | |
|     QTAILQ_INIT(&s->pending_sei);
 | |
|     QTAILQ_INIT(&s->zpci_devs);
 | |
|     QTAILQ_INIT(&s->zpci_dma_limit);
 | |
|     QTAILQ_INIT(&s->zpci_groups);
 | |
| 
 | |
|     s390_pci_init_default_group();
 | |
|     css_register_io_adapters(CSS_IO_ADAPTER_PCI, true, false,
 | |
|                              S390_ADAPTER_SUPPRESSIBLE, errp);
 | |
| }
 | |
| 
 | |
| static void s390_pcihost_unrealize(DeviceState *dev)
 | |
| {
 | |
|     S390PCIGroup *group;
 | |
|     S390pciState *s = S390_PCI_HOST_BRIDGE(dev);
 | |
| 
 | |
|     while (!QTAILQ_EMPTY(&s->zpci_groups)) {
 | |
|         group = QTAILQ_FIRST(&s->zpci_groups);
 | |
|         QTAILQ_REMOVE(&s->zpci_groups, group, link);
 | |
|     }
 | |
| }
 | |
| 
 | |
| static int s390_pci_msix_init(S390PCIBusDevice *pbdev)
 | |
| {
 | |
|     char *name;
 | |
|     uint8_t pos;
 | |
|     uint16_t ctrl;
 | |
|     uint32_t table, pba;
 | |
| 
 | |
|     pos = pci_find_capability(pbdev->pdev, PCI_CAP_ID_MSIX);
 | |
|     if (!pos) {
 | |
|         return -1;
 | |
|     }
 | |
| 
 | |
|     ctrl = pci_host_config_read_common(pbdev->pdev, pos + PCI_MSIX_FLAGS,
 | |
|              pci_config_size(pbdev->pdev), sizeof(ctrl));
 | |
|     table = pci_host_config_read_common(pbdev->pdev, pos + PCI_MSIX_TABLE,
 | |
|              pci_config_size(pbdev->pdev), sizeof(table));
 | |
|     pba = pci_host_config_read_common(pbdev->pdev, pos + PCI_MSIX_PBA,
 | |
|              pci_config_size(pbdev->pdev), sizeof(pba));
 | |
| 
 | |
|     pbdev->msix.table_bar = table & PCI_MSIX_FLAGS_BIRMASK;
 | |
|     pbdev->msix.table_offset = table & ~PCI_MSIX_FLAGS_BIRMASK;
 | |
|     pbdev->msix.pba_bar = pba & PCI_MSIX_FLAGS_BIRMASK;
 | |
|     pbdev->msix.pba_offset = pba & ~PCI_MSIX_FLAGS_BIRMASK;
 | |
|     pbdev->msix.entries = (ctrl & PCI_MSIX_FLAGS_QSIZE) + 1;
 | |
| 
 | |
|     name = g_strdup_printf("msix-s390-%04x", pbdev->uid);
 | |
|     memory_region_init_io(&pbdev->msix_notify_mr, OBJECT(pbdev),
 | |
|                           &s390_msi_ctrl_ops, pbdev, name, TARGET_PAGE_SIZE);
 | |
|     memory_region_add_subregion(&pbdev->iommu->mr,
 | |
|                                 pbdev->pci_group->zpci_group.msia,
 | |
|                                 &pbdev->msix_notify_mr);
 | |
|     g_free(name);
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static void s390_pci_msix_free(S390PCIBusDevice *pbdev)
 | |
| {
 | |
|     if (pbdev->msix.entries == 0) {
 | |
|         return;
 | |
|     }
 | |
| 
 | |
|     memory_region_del_subregion(&pbdev->iommu->mr, &pbdev->msix_notify_mr);
 | |
|     object_unparent(OBJECT(&pbdev->msix_notify_mr));
 | |
| }
 | |
| 
 | |
| static S390PCIBusDevice *s390_pci_device_new(S390pciState *s,
 | |
|                                              const char *target, Error **errp)
 | |
| {
 | |
|     Error *local_err = NULL;
 | |
|     DeviceState *dev;
 | |
| 
 | |
|     dev = qdev_try_new(TYPE_S390_PCI_DEVICE);
 | |
|     if (!dev) {
 | |
|         error_setg(errp, "zPCI device could not be created");
 | |
|         return NULL;
 | |
|     }
 | |
| 
 | |
|     if (!object_property_set_str(OBJECT(dev), "target", target, &local_err)) {
 | |
|         object_unparent(OBJECT(dev));
 | |
|         error_propagate_prepend(errp, local_err,
 | |
|                                 "zPCI device could not be created: ");
 | |
|         return NULL;
 | |
|     }
 | |
|     if (!qdev_realize_and_unref(dev, BUS(s->bus), &local_err)) {
 | |
|         object_unparent(OBJECT(dev));
 | |
|         error_propagate_prepend(errp, local_err,
 | |
|                                 "zPCI device could not be created: ");
 | |
|         return NULL;
 | |
|     }
 | |
| 
 | |
|     return S390_PCI_DEVICE(dev);
 | |
| }
 | |
| 
 | |
| static bool s390_pci_alloc_idx(S390pciState *s, S390PCIBusDevice *pbdev)
 | |
| {
 | |
|     uint32_t idx;
 | |
| 
 | |
|     idx = s->next_idx;
 | |
|     while (s390_pci_find_dev_by_idx(s, idx)) {
 | |
|         idx = (idx + 1) & FH_MASK_INDEX;
 | |
|         if (idx == s->next_idx) {
 | |
|             return false;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     pbdev->idx = idx;
 | |
|     return true;
 | |
| }
 | |
| 
 | |
| static void s390_pcihost_pre_plug(HotplugHandler *hotplug_dev, DeviceState *dev,
 | |
|                                    Error **errp)
 | |
| {
 | |
|     S390pciState *s = S390_PCI_HOST_BRIDGE(hotplug_dev);
 | |
| 
 | |
|     if (!s390_has_feat(S390_FEAT_ZPCI)) {
 | |
|         warn_report("Plugging a PCI/zPCI device without the 'zpci' CPU "
 | |
|                     "feature enabled; the guest will not be able to see/use "
 | |
|                     "this device");
 | |
|     }
 | |
| 
 | |
|     if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_DEVICE)) {
 | |
|         PCIDevice *pdev = PCI_DEVICE(dev);
 | |
| 
 | |
|         if (pdev->cap_present & QEMU_PCI_CAP_MULTIFUNCTION) {
 | |
|             error_setg(errp, "multifunction not supported in s390");
 | |
|             return;
 | |
|         }
 | |
|     } else if (object_dynamic_cast(OBJECT(dev), TYPE_S390_PCI_DEVICE)) {
 | |
|         S390PCIBusDevice *pbdev = S390_PCI_DEVICE(dev);
 | |
| 
 | |
|         if (!s390_pci_alloc_idx(s, pbdev)) {
 | |
|             error_setg(errp, "no slot for plugging zpci device");
 | |
|             return;
 | |
|         }
 | |
|     }
 | |
| }
 | |
| 
 | |
| static void s390_pci_update_subordinate(PCIDevice *dev, uint32_t nr)
 | |
| {
 | |
|     uint32_t old_nr;
 | |
| 
 | |
|     pci_default_write_config(dev, PCI_SUBORDINATE_BUS, nr, 1);
 | |
|     while (!pci_bus_is_root(pci_get_bus(dev))) {
 | |
|         dev = pci_get_bus(dev)->parent_dev;
 | |
| 
 | |
|         old_nr = pci_default_read_config(dev, PCI_SUBORDINATE_BUS, 1);
 | |
|         if (old_nr < nr) {
 | |
|             pci_default_write_config(dev, PCI_SUBORDINATE_BUS, nr, 1);
 | |
|         }
 | |
|     }
 | |
| }
 | |
| 
 | |
| static int s390_pci_interp_plug(S390pciState *s, S390PCIBusDevice *pbdev)
 | |
| {
 | |
|     uint32_t idx, fh;
 | |
| 
 | |
|     if (!s390_pci_get_host_fh(pbdev, &fh)) {
 | |
|         return -EPERM;
 | |
|     }
 | |
| 
 | |
|     /*
 | |
|      * The host device is already in an enabled state, but we always present
 | |
|      * the initial device state to the guest as disabled (ZPCI_FS_DISABLED).
 | |
|      * Therefore, mask off the enable bit from the passthrough handle until
 | |
|      * the guest issues a CLP SET PCI FN later to enable the device.
 | |
|      */
 | |
|     pbdev->fh = fh & ~FH_MASK_ENABLE;
 | |
| 
 | |
|     /* Next, see if the idx is already in-use */
 | |
|     idx = pbdev->fh & FH_MASK_INDEX;
 | |
|     if (pbdev->idx != idx) {
 | |
|         if (s390_pci_find_dev_by_idx(s, idx)) {
 | |
|             return -EINVAL;
 | |
|         }
 | |
|         /*
 | |
|          * Update the idx entry with the passed through idx
 | |
|          * If the relinquished idx is lower than next_idx, use it
 | |
|          * to replace next_idx
 | |
|          */
 | |
|         g_hash_table_remove(s->zpci_table, &pbdev->idx);
 | |
|         if (idx < s->next_idx) {
 | |
|             s->next_idx = idx;
 | |
|         }
 | |
|         pbdev->idx = idx;
 | |
|         g_hash_table_insert(s->zpci_table, &pbdev->idx, pbdev);
 | |
|     }
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static void s390_pcihost_plug(HotplugHandler *hotplug_dev, DeviceState *dev,
 | |
|                               Error **errp)
 | |
| {
 | |
|     S390pciState *s = S390_PCI_HOST_BRIDGE(hotplug_dev);
 | |
|     PCIDevice *pdev = NULL;
 | |
|     S390PCIBusDevice *pbdev = NULL;
 | |
|     int rc;
 | |
| 
 | |
|     if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_BRIDGE)) {
 | |
|         PCIBridge *pb = PCI_BRIDGE(dev);
 | |
| 
 | |
|         pdev = PCI_DEVICE(dev);
 | |
|         pci_bridge_map_irq(pb, dev->id, s390_pci_map_irq);
 | |
|         pci_setup_iommu(&pb->sec_bus, s390_pci_dma_iommu, s);
 | |
| 
 | |
|         qbus_set_hotplug_handler(BUS(&pb->sec_bus), OBJECT(s));
 | |
| 
 | |
|         if (dev->hotplugged) {
 | |
|             pci_default_write_config(pdev, PCI_PRIMARY_BUS,
 | |
|                                      pci_dev_bus_num(pdev), 1);
 | |
|             s->bus_no += 1;
 | |
|             pci_default_write_config(pdev, PCI_SECONDARY_BUS, s->bus_no, 1);
 | |
| 
 | |
|             s390_pci_update_subordinate(pdev, s->bus_no);
 | |
|         }
 | |
|     } else if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_DEVICE)) {
 | |
|         pdev = PCI_DEVICE(dev);
 | |
| 
 | |
|         if (!dev->id) {
 | |
|             /* In the case the PCI device does not define an id */
 | |
|             /* we generate one based on the PCI address         */
 | |
|             dev->id = g_strdup_printf("auto_%02x:%02x.%01x",
 | |
|                                       pci_dev_bus_num(pdev),
 | |
|                                       PCI_SLOT(pdev->devfn),
 | |
|                                       PCI_FUNC(pdev->devfn));
 | |
|         }
 | |
| 
 | |
|         pbdev = s390_pci_find_dev_by_target(s, dev->id);
 | |
|         if (!pbdev) {
 | |
|             pbdev = s390_pci_device_new(s, dev->id, errp);
 | |
|             if (!pbdev) {
 | |
|                 return;
 | |
|             }
 | |
|         }
 | |
| 
 | |
|         pbdev->pdev = pdev;
 | |
|         pbdev->iommu = s390_pci_get_iommu(s, pci_get_bus(pdev), pdev->devfn);
 | |
|         pbdev->iommu->pbdev = pbdev;
 | |
|         pbdev->state = ZPCI_FS_DISABLED;
 | |
|         set_pbdev_info(pbdev);
 | |
| 
 | |
|         if (object_dynamic_cast(OBJECT(dev), "vfio-pci")) {
 | |
|             /*
 | |
|              * By default, interpretation is always requested; if the available
 | |
|              * facilities indicate it is not available, fallback to the
 | |
|              * interception model.
 | |
|              */
 | |
|             if (pbdev->interp) {
 | |
|                 if (s390_pci_kvm_interp_allowed()) {
 | |
|                     rc = s390_pci_interp_plug(s, pbdev);
 | |
|                     if (rc) {
 | |
|                         error_setg(errp, "Plug failed for zPCI device in "
 | |
|                                    "interpretation mode: %d", rc);
 | |
|                         return;
 | |
|                     }
 | |
|                 } else {
 | |
|                     DPRINTF("zPCI interpretation facilities missing.\n");
 | |
|                     pbdev->interp = false;
 | |
|                     pbdev->forwarding_assist = false;
 | |
|                 }
 | |
|             }
 | |
|             pbdev->iommu->dma_limit = s390_pci_start_dma_count(s, pbdev);
 | |
|             /* Fill in CLP information passed via the vfio region */
 | |
|             s390_pci_get_clp_info(pbdev);
 | |
|             if (!pbdev->interp) {
 | |
|                 /* Do vfio passthrough but intercept for I/O */
 | |
|                 pbdev->fh |= FH_SHM_VFIO;
 | |
|                 pbdev->forwarding_assist = false;
 | |
|             }
 | |
|             /* Register shutdown notifier and reset callback for ISM devices */
 | |
|             if (pbdev->pft == ZPCI_PFT_ISM) {
 | |
|                 pbdev->shutdown_notifier.notify = s390_pci_shutdown_notifier;
 | |
|                 qemu_register_shutdown_notifier(&pbdev->shutdown_notifier);
 | |
|                 qemu_register_reset(s390_pci_reset_cb, pbdev);
 | |
|             }
 | |
|         } else {
 | |
|             pbdev->fh |= FH_SHM_EMUL;
 | |
|             /* Always intercept emulated devices */
 | |
|             pbdev->interp = false;
 | |
|             pbdev->forwarding_assist = false;
 | |
|         }
 | |
| 
 | |
|         if (s390_pci_msix_init(pbdev) && !pbdev->interp) {
 | |
|             error_setg(errp, "MSI-X support is mandatory "
 | |
|                        "in the S390 architecture");
 | |
|             return;
 | |
|         }
 | |
| 
 | |
|         if (dev->hotplugged) {
 | |
|             s390_pci_generate_plug_event(HP_EVENT_TO_CONFIGURED ,
 | |
|                                          pbdev->fh, pbdev->fid);
 | |
|         }
 | |
|     } else if (object_dynamic_cast(OBJECT(dev), TYPE_S390_PCI_DEVICE)) {
 | |
|         pbdev = S390_PCI_DEVICE(dev);
 | |
| 
 | |
|         /* the allocated idx is actually getting used */
 | |
|         s->next_idx = (pbdev->idx + 1) & FH_MASK_INDEX;
 | |
|         pbdev->fh = pbdev->idx;
 | |
|         QTAILQ_INSERT_TAIL(&s->zpci_devs, pbdev, link);
 | |
|         g_hash_table_insert(s->zpci_table, &pbdev->idx, pbdev);
 | |
|     } else {
 | |
|         g_assert_not_reached();
 | |
|     }
 | |
| }
 | |
| 
 | |
| static void s390_pcihost_unplug(HotplugHandler *hotplug_dev, DeviceState *dev,
 | |
|                                 Error **errp)
 | |
| {
 | |
|     S390pciState *s = S390_PCI_HOST_BRIDGE(hotplug_dev);
 | |
|     S390PCIBusDevice *pbdev = NULL;
 | |
| 
 | |
|     if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_DEVICE)) {
 | |
|         PCIDevice *pci_dev = PCI_DEVICE(dev);
 | |
|         PCIBus *bus;
 | |
|         int32_t devfn;
 | |
| 
 | |
|         pbdev = s390_pci_find_dev_by_pci(s, PCI_DEVICE(dev));
 | |
|         g_assert(pbdev);
 | |
| 
 | |
|         s390_pci_generate_plug_event(HP_EVENT_STANDBY_TO_RESERVED,
 | |
|                                      pbdev->fh, pbdev->fid);
 | |
|         bus = pci_get_bus(pci_dev);
 | |
|         devfn = pci_dev->devfn;
 | |
|         qdev_unrealize(dev);
 | |
| 
 | |
|         s390_pci_msix_free(pbdev);
 | |
|         s390_pci_iommu_free(s, bus, devfn);
 | |
|         pbdev->pdev = NULL;
 | |
|         pbdev->state = ZPCI_FS_RESERVED;
 | |
|     } else if (object_dynamic_cast(OBJECT(dev), TYPE_S390_PCI_DEVICE)) {
 | |
|         pbdev = S390_PCI_DEVICE(dev);
 | |
|         pbdev->fid = 0;
 | |
|         QTAILQ_REMOVE(&s->zpci_devs, pbdev, link);
 | |
|         g_hash_table_remove(s->zpci_table, &pbdev->idx);
 | |
|         if (pbdev->iommu->dma_limit) {
 | |
|             s390_pci_end_dma_count(s, pbdev->iommu->dma_limit);
 | |
|         }
 | |
|         qdev_unrealize(dev);
 | |
|     }
 | |
| }
 | |
| 
 | |
| static void s390_pcihost_unplug_request(HotplugHandler *hotplug_dev,
 | |
|                                         DeviceState *dev,
 | |
|                                         Error **errp)
 | |
| {
 | |
|     S390pciState *s = S390_PCI_HOST_BRIDGE(hotplug_dev);
 | |
|     S390PCIBusDevice *pbdev;
 | |
| 
 | |
|     if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_BRIDGE)) {
 | |
|         error_setg(errp, "PCI bridge hot unplug currently not supported");
 | |
|     } else if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_DEVICE)) {
 | |
|         /*
 | |
|          * Redirect the unplug request to the zPCI device and remember that
 | |
|          * we've checked the PCI device already (to prevent endless recursion).
 | |
|          */
 | |
|         pbdev = s390_pci_find_dev_by_pci(s, PCI_DEVICE(dev));
 | |
|         g_assert(pbdev);
 | |
|         pbdev->pci_unplug_request_processed = true;
 | |
|         qdev_unplug(DEVICE(pbdev), errp);
 | |
|     } else if (object_dynamic_cast(OBJECT(dev), TYPE_S390_PCI_DEVICE)) {
 | |
|         pbdev = S390_PCI_DEVICE(dev);
 | |
| 
 | |
|         /*
 | |
|          * If unplug was initially requested for the zPCI device, we
 | |
|          * first have to redirect to the PCI device, which will in return
 | |
|          * redirect back to us after performing its checks (if the request
 | |
|          * is not blocked, e.g. because it's a PCI bridge).
 | |
|          */
 | |
|         if (pbdev->pdev && !pbdev->pci_unplug_request_processed) {
 | |
|             qdev_unplug(DEVICE(pbdev->pdev), errp);
 | |
|             return;
 | |
|         }
 | |
|         pbdev->pci_unplug_request_processed = false;
 | |
| 
 | |
|         switch (pbdev->state) {
 | |
|         case ZPCI_FS_STANDBY:
 | |
|         case ZPCI_FS_RESERVED:
 | |
|             s390_pci_perform_unplug(pbdev);
 | |
|             break;
 | |
|         default:
 | |
|             /*
 | |
|              * Allow to send multiple requests, e.g. if the guest crashed
 | |
|              * before releasing the device, we would not be able to send
 | |
|              * another request to the same VM (e.g. fresh OS).
 | |
|              */
 | |
|             pbdev->unplug_requested = true;
 | |
|             s390_pci_generate_plug_event(HP_EVENT_DECONFIGURE_REQUEST,
 | |
|                                          pbdev->fh, pbdev->fid);
 | |
|         }
 | |
|     } else {
 | |
|         g_assert_not_reached();
 | |
|     }
 | |
| }
 | |
| 
 | |
| static void s390_pci_enumerate_bridge(PCIBus *bus, PCIDevice *pdev,
 | |
|                                       void *opaque)
 | |
| {
 | |
|     S390pciState *s = opaque;
 | |
|     PCIBus *sec_bus = NULL;
 | |
| 
 | |
|     if ((pci_default_read_config(pdev, PCI_HEADER_TYPE, 1) !=
 | |
|          PCI_HEADER_TYPE_BRIDGE)) {
 | |
|         return;
 | |
|     }
 | |
| 
 | |
|     (s->bus_no)++;
 | |
|     pci_default_write_config(pdev, PCI_PRIMARY_BUS, pci_dev_bus_num(pdev), 1);
 | |
|     pci_default_write_config(pdev, PCI_SECONDARY_BUS, s->bus_no, 1);
 | |
|     pci_default_write_config(pdev, PCI_SUBORDINATE_BUS, s->bus_no, 1);
 | |
| 
 | |
|     sec_bus = pci_bridge_get_sec_bus(PCI_BRIDGE(pdev));
 | |
|     if (!sec_bus) {
 | |
|         return;
 | |
|     }
 | |
| 
 | |
|     /* Assign numbers to all child bridges. The last is the highest number. */
 | |
|     pci_for_each_device_under_bus(sec_bus, s390_pci_enumerate_bridge, s);
 | |
|     pci_default_write_config(pdev, PCI_SUBORDINATE_BUS, s->bus_no, 1);
 | |
| }
 | |
| 
 | |
| static void s390_pcihost_reset(DeviceState *dev)
 | |
| {
 | |
|     S390pciState *s = S390_PCI_HOST_BRIDGE(dev);
 | |
|     PCIBus *bus = s->parent_obj.bus;
 | |
|     S390PCIBusDevice *pbdev, *next;
 | |
| 
 | |
|     /* Process all pending unplug requests */
 | |
|     QTAILQ_FOREACH_SAFE(pbdev, &s->zpci_devs, link, next) {
 | |
|         if (pbdev->unplug_requested) {
 | |
|             if (pbdev->interp && (pbdev->fh & FH_MASK_ENABLE)) {
 | |
|                 /* Interpreted devices were using interrupt forwarding */
 | |
|                 s390_pci_kvm_aif_disable(pbdev);
 | |
|             } else if (pbdev->summary_ind) {
 | |
|                 pci_dereg_irqs(pbdev);
 | |
|             }
 | |
|             if (pbdev->iommu->enabled) {
 | |
|                 pci_dereg_ioat(pbdev->iommu);
 | |
|             }
 | |
|             pbdev->state = ZPCI_FS_STANDBY;
 | |
|             s390_pci_perform_unplug(pbdev);
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     /*
 | |
|      * When resetting a PCI bridge, the assigned numbers are set to 0. So
 | |
|      * on every system reset, we also have to reassign numbers.
 | |
|      */
 | |
|     s->bus_no = 0;
 | |
|     pci_for_each_device_under_bus(bus, s390_pci_enumerate_bridge, s);
 | |
| }
 | |
| 
 | |
| static void s390_pcihost_class_init(ObjectClass *klass, void *data)
 | |
| {
 | |
|     DeviceClass *dc = DEVICE_CLASS(klass);
 | |
|     HotplugHandlerClass *hc = HOTPLUG_HANDLER_CLASS(klass);
 | |
| 
 | |
|     dc->reset = s390_pcihost_reset;
 | |
|     dc->realize = s390_pcihost_realize;
 | |
|     dc->unrealize = s390_pcihost_unrealize;
 | |
|     hc->pre_plug = s390_pcihost_pre_plug;
 | |
|     hc->plug = s390_pcihost_plug;
 | |
|     hc->unplug_request = s390_pcihost_unplug_request;
 | |
|     hc->unplug = s390_pcihost_unplug;
 | |
|     msi_nonbroken = true;
 | |
| }
 | |
| 
 | |
| static const TypeInfo s390_pcihost_info = {
 | |
|     .name          = TYPE_S390_PCI_HOST_BRIDGE,
 | |
|     .parent        = TYPE_PCI_HOST_BRIDGE,
 | |
|     .instance_size = sizeof(S390pciState),
 | |
|     .class_init    = s390_pcihost_class_init,
 | |
|     .interfaces = (InterfaceInfo[]) {
 | |
|         { TYPE_HOTPLUG_HANDLER },
 | |
|         { }
 | |
|     }
 | |
| };
 | |
| 
 | |
| static const TypeInfo s390_pcibus_info = {
 | |
|     .name = TYPE_S390_PCI_BUS,
 | |
|     .parent = TYPE_BUS,
 | |
|     .instance_size = sizeof(S390PCIBus),
 | |
| };
 | |
| 
 | |
| static uint16_t s390_pci_generate_uid(S390pciState *s)
 | |
| {
 | |
|     uint16_t uid = 0;
 | |
| 
 | |
|     do {
 | |
|         uid++;
 | |
|         if (!s390_pci_find_dev_by_uid(s, uid)) {
 | |
|             return uid;
 | |
|         }
 | |
|     } while (uid < ZPCI_MAX_UID);
 | |
| 
 | |
|     return UID_UNDEFINED;
 | |
| }
 | |
| 
 | |
| static uint32_t s390_pci_generate_fid(S390pciState *s, Error **errp)
 | |
| {
 | |
|     uint32_t fid = 0;
 | |
| 
 | |
|     do {
 | |
|         if (!s390_pci_find_dev_by_fid(s, fid)) {
 | |
|             return fid;
 | |
|         }
 | |
|     } while (fid++ != ZPCI_MAX_FID);
 | |
| 
 | |
|     error_setg(errp, "no free fid could be found");
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static void s390_pci_device_realize(DeviceState *dev, Error **errp)
 | |
| {
 | |
|     S390PCIBusDevice *zpci = S390_PCI_DEVICE(dev);
 | |
|     S390pciState *s = s390_get_phb();
 | |
| 
 | |
|     if (!zpci->target) {
 | |
|         error_setg(errp, "target must be defined");
 | |
|         return;
 | |
|     }
 | |
| 
 | |
|     if (s390_pci_find_dev_by_target(s, zpci->target)) {
 | |
|         error_setg(errp, "target %s already has an associated zpci device",
 | |
|                    zpci->target);
 | |
|         return;
 | |
|     }
 | |
| 
 | |
|     if (zpci->uid == UID_UNDEFINED) {
 | |
|         zpci->uid = s390_pci_generate_uid(s);
 | |
|         if (!zpci->uid) {
 | |
|             error_setg(errp, "no free uid could be found");
 | |
|             return;
 | |
|         }
 | |
|     } else if (s390_pci_find_dev_by_uid(s, zpci->uid)) {
 | |
|         error_setg(errp, "uid %u already in use", zpci->uid);
 | |
|         return;
 | |
|     }
 | |
| 
 | |
|     if (!zpci->fid_defined) {
 | |
|         Error *local_error = NULL;
 | |
| 
 | |
|         zpci->fid = s390_pci_generate_fid(s, &local_error);
 | |
|         if (local_error) {
 | |
|             error_propagate(errp, local_error);
 | |
|             return;
 | |
|         }
 | |
|     } else if (s390_pci_find_dev_by_fid(s, zpci->fid)) {
 | |
|         error_setg(errp, "fid %u already in use", zpci->fid);
 | |
|         return;
 | |
|     }
 | |
| 
 | |
|     zpci->state = ZPCI_FS_RESERVED;
 | |
|     zpci->fmb.format = ZPCI_FMB_FORMAT;
 | |
| }
 | |
| 
 | |
| static void s390_pci_device_reset(DeviceState *dev)
 | |
| {
 | |
|     S390PCIBusDevice *pbdev = S390_PCI_DEVICE(dev);
 | |
| 
 | |
|     switch (pbdev->state) {
 | |
|     case ZPCI_FS_RESERVED:
 | |
|         return;
 | |
|     case ZPCI_FS_STANDBY:
 | |
|         break;
 | |
|     default:
 | |
|         pbdev->fh &= ~FH_MASK_ENABLE;
 | |
|         pbdev->state = ZPCI_FS_DISABLED;
 | |
|         break;
 | |
|     }
 | |
| 
 | |
|     if (pbdev->interp && (pbdev->fh & FH_MASK_ENABLE)) {
 | |
|         /* Interpreted devices were using interrupt forwarding */
 | |
|         s390_pci_kvm_aif_disable(pbdev);
 | |
|     } else if (pbdev->summary_ind) {
 | |
|         pci_dereg_irqs(pbdev);
 | |
|     }
 | |
|     if (pbdev->iommu->enabled) {
 | |
|         pci_dereg_ioat(pbdev->iommu);
 | |
|     }
 | |
| 
 | |
|     fmb_timer_free(pbdev);
 | |
| }
 | |
| 
 | |
| static void s390_pci_get_fid(Object *obj, Visitor *v, const char *name,
 | |
|                          void *opaque, Error **errp)
 | |
| {
 | |
|     Property *prop = opaque;
 | |
|     uint32_t *ptr = object_field_prop_ptr(obj, prop);
 | |
| 
 | |
|     visit_type_uint32(v, name, ptr, errp);
 | |
| }
 | |
| 
 | |
| static void s390_pci_set_fid(Object *obj, Visitor *v, const char *name,
 | |
|                          void *opaque, Error **errp)
 | |
| {
 | |
|     S390PCIBusDevice *zpci = S390_PCI_DEVICE(obj);
 | |
|     Property *prop = opaque;
 | |
|     uint32_t *ptr = object_field_prop_ptr(obj, prop);
 | |
| 
 | |
|     if (!visit_type_uint32(v, name, ptr, errp)) {
 | |
|         return;
 | |
|     }
 | |
|     zpci->fid_defined = true;
 | |
| }
 | |
| 
 | |
| static const PropertyInfo s390_pci_fid_propinfo = {
 | |
|     .name = "zpci_fid",
 | |
|     .get = s390_pci_get_fid,
 | |
|     .set = s390_pci_set_fid,
 | |
| };
 | |
| 
 | |
| #define DEFINE_PROP_S390_PCI_FID(_n, _s, _f) \
 | |
|     DEFINE_PROP(_n, _s, _f, s390_pci_fid_propinfo, uint32_t)
 | |
| 
 | |
| static Property s390_pci_device_properties[] = {
 | |
|     DEFINE_PROP_UINT16("uid", S390PCIBusDevice, uid, UID_UNDEFINED),
 | |
|     DEFINE_PROP_S390_PCI_FID("fid", S390PCIBusDevice, fid),
 | |
|     DEFINE_PROP_STRING("target", S390PCIBusDevice, target),
 | |
|     DEFINE_PROP_BOOL("interpret", S390PCIBusDevice, interp, true),
 | |
|     DEFINE_PROP_BOOL("forwarding-assist", S390PCIBusDevice, forwarding_assist,
 | |
|                      true),
 | |
|     DEFINE_PROP_END_OF_LIST(),
 | |
| };
 | |
| 
 | |
| static const VMStateDescription s390_pci_device_vmstate = {
 | |
|     .name = TYPE_S390_PCI_DEVICE,
 | |
|     /*
 | |
|      * TODO: add state handling here, so migration works at least with
 | |
|      * emulated pci devices on s390x
 | |
|      */
 | |
|     .unmigratable = 1,
 | |
| };
 | |
| 
 | |
| static void s390_pci_device_class_init(ObjectClass *klass, void *data)
 | |
| {
 | |
|     DeviceClass *dc = DEVICE_CLASS(klass);
 | |
| 
 | |
|     dc->desc = "zpci device";
 | |
|     set_bit(DEVICE_CATEGORY_MISC, dc->categories);
 | |
|     dc->reset = s390_pci_device_reset;
 | |
|     dc->bus_type = TYPE_S390_PCI_BUS;
 | |
|     dc->realize = s390_pci_device_realize;
 | |
|     device_class_set_props(dc, s390_pci_device_properties);
 | |
|     dc->vmsd = &s390_pci_device_vmstate;
 | |
| }
 | |
| 
 | |
| static const TypeInfo s390_pci_device_info = {
 | |
|     .name = TYPE_S390_PCI_DEVICE,
 | |
|     .parent = TYPE_DEVICE,
 | |
|     .instance_size = sizeof(S390PCIBusDevice),
 | |
|     .class_init = s390_pci_device_class_init,
 | |
| };
 | |
| 
 | |
| static const TypeInfo s390_pci_iommu_info = {
 | |
|     .name = TYPE_S390_PCI_IOMMU,
 | |
|     .parent = TYPE_OBJECT,
 | |
|     .instance_size = sizeof(S390PCIIOMMU),
 | |
| };
 | |
| 
 | |
| static void s390_iommu_memory_region_class_init(ObjectClass *klass, void *data)
 | |
| {
 | |
|     IOMMUMemoryRegionClass *imrc = IOMMU_MEMORY_REGION_CLASS(klass);
 | |
| 
 | |
|     imrc->translate = s390_translate_iommu;
 | |
|     imrc->replay = s390_pci_iommu_replay;
 | |
| }
 | |
| 
 | |
| static const TypeInfo s390_iommu_memory_region_info = {
 | |
|     .parent = TYPE_IOMMU_MEMORY_REGION,
 | |
|     .name = TYPE_S390_IOMMU_MEMORY_REGION,
 | |
|     .class_init = s390_iommu_memory_region_class_init,
 | |
| };
 | |
| 
 | |
| static void s390_pci_register_types(void)
 | |
| {
 | |
|     type_register_static(&s390_pcihost_info);
 | |
|     type_register_static(&s390_pcibus_info);
 | |
|     type_register_static(&s390_pci_device_info);
 | |
|     type_register_static(&s390_pci_iommu_info);
 | |
|     type_register_static(&s390_iommu_memory_region_info);
 | |
| }
 | |
| 
 | |
| type_init(s390_pci_register_types)
 |