iommu.c revision 306471
1/*-
2 * Copyright (c) 2011 NetApp, Inc.
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 *
14 * THIS SOFTWARE IS PROVIDED BY NETAPP, INC ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED.  IN NO EVENT SHALL NETAPP, INC OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24 * SUCH DAMAGE.
25 *
26 * $FreeBSD: stable/11/sys/amd64/vmm/io/iommu.c 306471 2016-09-30 01:39:18Z jhb $
27 */
28
29#include <sys/cdefs.h>
30__FBSDID("$FreeBSD: stable/11/sys/amd64/vmm/io/iommu.c 306471 2016-09-30 01:39:18Z jhb $");
31
32#include <sys/param.h>
33#include <sys/types.h>
34#include <sys/systm.h>
35#include <sys/bus.h>
36#include <sys/sysctl.h>
37
38#include <dev/pci/pcivar.h>
39#include <dev/pci/pcireg.h>
40
41#include <machine/cpu.h>
42#include <machine/md_var.h>
43
44#include "vmm_util.h"
45#include "vmm_mem.h"
46#include "iommu.h"
47
48SYSCTL_DECL(_hw_vmm);
49SYSCTL_NODE(_hw_vmm, OID_AUTO, iommu, CTLFLAG_RW, 0, "bhyve iommu parameters");
50
51static int iommu_avail;
52SYSCTL_INT(_hw_vmm_iommu, OID_AUTO, initialized, CTLFLAG_RD, &iommu_avail,
53    0, "bhyve iommu initialized?");
54
55static int iommu_enable = 1;
56SYSCTL_INT(_hw_vmm_iommu, OID_AUTO, enable, CTLFLAG_RDTUN, &iommu_enable, 0,
57    "Enable use of I/O MMU (required for PCI passthrough).");
58
59static struct iommu_ops *ops;
60static void *host_domain;
61static eventhandler_tag add_tag, delete_tag;
62
63static __inline int
64IOMMU_INIT(void)
65{
66	if (ops != NULL)
67		return ((*ops->init)());
68	else
69		return (ENXIO);
70}
71
72static __inline void
73IOMMU_CLEANUP(void)
74{
75	if (ops != NULL && iommu_avail)
76		(*ops->cleanup)();
77}
78
79static __inline void *
80IOMMU_CREATE_DOMAIN(vm_paddr_t maxaddr)
81{
82
83	if (ops != NULL && iommu_avail)
84		return ((*ops->create_domain)(maxaddr));
85	else
86		return (NULL);
87}
88
89static __inline void
90IOMMU_DESTROY_DOMAIN(void *dom)
91{
92
93	if (ops != NULL && iommu_avail)
94		(*ops->destroy_domain)(dom);
95}
96
97static __inline uint64_t
98IOMMU_CREATE_MAPPING(void *domain, vm_paddr_t gpa, vm_paddr_t hpa, uint64_t len)
99{
100
101	if (ops != NULL && iommu_avail)
102		return ((*ops->create_mapping)(domain, gpa, hpa, len));
103	else
104		return (len);		/* XXX */
105}
106
107static __inline uint64_t
108IOMMU_REMOVE_MAPPING(void *domain, vm_paddr_t gpa, uint64_t len)
109{
110
111	if (ops != NULL && iommu_avail)
112		return ((*ops->remove_mapping)(domain, gpa, len));
113	else
114		return (len);		/* XXX */
115}
116
117static __inline void
118IOMMU_ADD_DEVICE(void *domain, uint16_t rid)
119{
120
121	if (ops != NULL && iommu_avail)
122		(*ops->add_device)(domain, rid);
123}
124
125static __inline void
126IOMMU_REMOVE_DEVICE(void *domain, uint16_t rid)
127{
128
129	if (ops != NULL && iommu_avail)
130		(*ops->remove_device)(domain, rid);
131}
132
133static __inline void
134IOMMU_INVALIDATE_TLB(void *domain)
135{
136
137	if (ops != NULL && iommu_avail)
138		(*ops->invalidate_tlb)(domain);
139}
140
141static __inline void
142IOMMU_ENABLE(void)
143{
144
145	if (ops != NULL && iommu_avail)
146		(*ops->enable)();
147}
148
149static __inline void
150IOMMU_DISABLE(void)
151{
152
153	if (ops != NULL && iommu_avail)
154		(*ops->disable)();
155}
156
157static void
158iommu_pci_add(void *arg, device_t dev)
159{
160
161	/* Add new devices to the host domain. */
162	iommu_add_device(host_domain, pci_get_rid(dev));
163}
164
165static void
166iommu_pci_delete(void *arg, device_t dev)
167{
168
169	iommu_remove_device(host_domain, pci_get_rid(dev));
170}
171
172static void
173iommu_init(void)
174{
175	int error, bus, slot, func;
176	vm_paddr_t maxaddr;
177	device_t dev;
178
179	if (!iommu_enable)
180		return;
181
182	if (vmm_is_intel())
183		ops = &iommu_ops_intel;
184	else if (vmm_is_amd())
185		ops = &iommu_ops_amd;
186	else
187		ops = NULL;
188
189	error = IOMMU_INIT();
190	if (error)
191		return;
192
193	iommu_avail = 1;
194
195	/*
196	 * Create a domain for the devices owned by the host
197	 */
198	maxaddr = vmm_mem_maxaddr();
199	host_domain = IOMMU_CREATE_DOMAIN(maxaddr);
200	if (host_domain == NULL) {
201		printf("iommu_init: unable to create a host domain");
202		IOMMU_CLEANUP();
203		ops = NULL;
204		iommu_avail = 0;
205		return;
206	}
207
208	/*
209	 * Create 1:1 mappings from '0' to 'maxaddr' for devices assigned to
210	 * the host
211	 */
212	iommu_create_mapping(host_domain, 0, 0, maxaddr);
213
214	add_tag = EVENTHANDLER_REGISTER(pci_add_device, iommu_pci_add, NULL, 0);
215	delete_tag = EVENTHANDLER_REGISTER(pci_delete_device, iommu_pci_delete,
216	    NULL, 0);
217	for (bus = 0; bus <= PCI_BUSMAX; bus++) {
218		for (slot = 0; slot <= PCI_SLOTMAX; slot++) {
219			for (func = 0; func <= PCI_FUNCMAX; func++) {
220				dev = pci_find_dbsf(0, bus, slot, func);
221				if (dev == NULL)
222					continue;
223
224				/* Everything belongs to the host domain. */
225				iommu_add_device(host_domain,
226				    pci_get_rid(dev));
227			}
228		}
229	}
230	IOMMU_ENABLE();
231
232}
233
234void
235iommu_cleanup(void)
236{
237
238	if (add_tag != NULL) {
239		EVENTHANDLER_DEREGISTER(pci_add_device, add_tag);
240		add_tag = NULL;
241	}
242	if (delete_tag != NULL) {
243		EVENTHANDLER_DEREGISTER(pci_delete_device, delete_tag);
244		delete_tag = NULL;
245	}
246	IOMMU_DISABLE();
247	IOMMU_DESTROY_DOMAIN(host_domain);
248	IOMMU_CLEANUP();
249}
250
251void *
252iommu_create_domain(vm_paddr_t maxaddr)
253{
254	static volatile int iommu_initted;
255
256	if (iommu_initted < 2) {
257		if (atomic_cmpset_int(&iommu_initted, 0, 1)) {
258			iommu_init();
259			atomic_store_rel_int(&iommu_initted, 2);
260		} else
261			while (iommu_initted == 1)
262				cpu_spinwait();
263	}
264	return (IOMMU_CREATE_DOMAIN(maxaddr));
265}
266
267void
268iommu_destroy_domain(void *dom)
269{
270
271	IOMMU_DESTROY_DOMAIN(dom);
272}
273
274void
275iommu_create_mapping(void *dom, vm_paddr_t gpa, vm_paddr_t hpa, size_t len)
276{
277	uint64_t mapped, remaining;
278
279	remaining = len;
280
281	while (remaining > 0) {
282		mapped = IOMMU_CREATE_MAPPING(dom, gpa, hpa, remaining);
283		gpa += mapped;
284		hpa += mapped;
285		remaining -= mapped;
286	}
287}
288
289void
290iommu_remove_mapping(void *dom, vm_paddr_t gpa, size_t len)
291{
292	uint64_t unmapped, remaining;
293
294	remaining = len;
295
296	while (remaining > 0) {
297		unmapped = IOMMU_REMOVE_MAPPING(dom, gpa, remaining);
298		gpa += unmapped;
299		remaining -= unmapped;
300	}
301}
302
303void *
304iommu_host_domain(void)
305{
306
307	return (host_domain);
308}
309
310void
311iommu_add_device(void *dom, uint16_t rid)
312{
313
314	IOMMU_ADD_DEVICE(dom, rid);
315}
316
317void
318iommu_remove_device(void *dom, uint16_t rid)
319{
320
321	IOMMU_REMOVE_DEVICE(dom, rid);
322}
323
324void
325iommu_invalidate_tlb(void *domain)
326{
327
328	IOMMU_INVALIDATE_TLB(domain);
329}
330