diff options
Diffstat (limited to 'src/VBox/Devices/Bus/MsixCommon.cpp')
-rw-r--r-- | src/VBox/Devices/Bus/MsixCommon.cpp | 355 |
1 files changed, 355 insertions, 0 deletions
diff --git a/src/VBox/Devices/Bus/MsixCommon.cpp b/src/VBox/Devices/Bus/MsixCommon.cpp new file mode 100644 index 00000000..4e25add9 --- /dev/null +++ b/src/VBox/Devices/Bus/MsixCommon.cpp @@ -0,0 +1,355 @@ +/* $Id: MsixCommon.cpp $ */ +/** @file + * MSI-X support routines + */ + +/* + * Copyright (C) 2010-2023 Oracle and/or its affiliates. + * + * This file is part of VirtualBox base platform packages, as + * available from https://www.virtualbox.org. + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License + * as published by the Free Software Foundation, in version 3 of the + * License. + * + * This program is distributed in the hope that it will be useful, but + * WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + * General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, see <https://www.gnu.org/licenses>. + * + * SPDX-License-Identifier: GPL-3.0-only + */ + + +#define LOG_GROUP LOG_GROUP_DEV_PCI +#define PDMPCIDEV_INCLUDE_PRIVATE /* Hack to get pdmpcidevint.h included at the right point. */ +#include <VBox/pci.h> +#include <VBox/msi.h> +#include <VBox/vmm/pdmdev.h> +#include <VBox/log.h> +#include <VBox/vmm/mm.h> +#include <VBox/AssertGuest.h> + +#include <iprt/assert.h> + +#include "MsiCommon.h" +#include "DevPciInternal.h" +#include "PciInline.h" + +typedef struct +{ + uint32_t u32MsgAddressLo; + uint32_t u32MsgAddressHi; + uint32_t u32MsgData; + uint32_t u32VectorControl; +} MsixTableRecord; +AssertCompileSize(MsixTableRecord, VBOX_MSIX_ENTRY_SIZE); + + +/** @todo use accessors so that raw PCI devices work correctly with MSI-X. */ +DECLINLINE(uint16_t) msixGetMessageControl(PPDMPCIDEV pDev) +{ + return PCIDevGetWord(pDev, pDev->Int.s.u8MsixCapOffset + VBOX_MSIX_CAP_MESSAGE_CONTROL); +} + +DECLINLINE(bool) msixIsEnabled(PPDMPCIDEV pDev) +{ + return (msixGetMessageControl(pDev) & VBOX_PCI_MSIX_FLAGS_ENABLE) != 0; +} + +DECLINLINE(bool) msixIsMasked(PPDMPCIDEV pDev) +{ + return (msixGetMessageControl(pDev) & VBOX_PCI_MSIX_FLAGS_FUNCMASK) != 0; +} + +#ifdef IN_RING3 +DECLINLINE(uint16_t) msixTableSize(PPDMPCIDEV pDev) +{ + return (msixGetMessageControl(pDev) & 0x3ff) + 1; +} +#endif + +DECLINLINE(uint8_t *) msixGetPageOffset(PPDMPCIDEV pDev, uint32_t off) +{ + return &pDev->abMsixState[off]; +} + +DECLINLINE(MsixTableRecord *) msixGetVectorRecord(PPDMPCIDEV pDev, uint32_t iVector) +{ + return (MsixTableRecord *)msixGetPageOffset(pDev, iVector * VBOX_MSIX_ENTRY_SIZE); +} + +DECLINLINE(RTGCPHYS) msixGetMsiAddress(PPDMPCIDEV pDev, uint32_t iVector) +{ + MsixTableRecord *pRec = msixGetVectorRecord(pDev, iVector); + return RT_MAKE_U64(pRec->u32MsgAddressLo & ~UINT32_C(0x3), pRec->u32MsgAddressHi); +} + +DECLINLINE(uint32_t) msixGetMsiData(PPDMPCIDEV pDev, uint32_t iVector) +{ + return msixGetVectorRecord(pDev, iVector)->u32MsgData; +} + +DECLINLINE(uint32_t) msixIsVectorMasked(PPDMPCIDEV pDev, uint32_t iVector) +{ + return (msixGetVectorRecord(pDev, iVector)->u32VectorControl & 0x1) != 0; +} + +DECLINLINE(uint8_t *) msixPendingByte(PPDMPCIDEV pDev, uint32_t iVector) +{ + return msixGetPageOffset(pDev, pDev->Int.s.offMsixPba + iVector / 8); +} + +DECLINLINE(void) msixSetPending(PPDMPCIDEV pDev, uint32_t iVector) +{ + *msixPendingByte(pDev, iVector) |= (1 << (iVector & 0x7)); +} + +DECLINLINE(void) msixClearPending(PPDMPCIDEV pDev, uint32_t iVector) +{ + *msixPendingByte(pDev, iVector) &= ~(1 << (iVector & 0x7)); +} + +#ifdef IN_RING3 + +DECLINLINE(bool) msixR3IsPending(PPDMPCIDEV pDev, uint32_t iVector) +{ + return (*msixPendingByte(pDev, iVector) & (1 << (iVector & 0x7))) != 0; +} + +static void msixR3CheckPendingVector(PPDMDEVINS pDevIns, PCPDMPCIHLP pPciHlp, PPDMPCIDEV pDev, uint32_t iVector) +{ + if (msixR3IsPending(pDev, iVector) && !msixIsVectorMasked(pDev, iVector)) + MsixNotify(pDevIns, pPciHlp, pDev, iVector, 1 /* iLevel */, 0 /*uTagSrc*/); +} + +/** + * @callback_method_impl{FNIOMMMIONEWREAD} + */ +static DECLCALLBACK(VBOXSTRICTRC) msixR3MMIORead(PPDMDEVINS pDevIns, void *pvUser, RTGCPHYS off, void *pv, unsigned cb) +{ + PPDMPCIDEV pPciDev = (PPDMPCIDEV)pvUser; + RT_NOREF(pDevIns); + + /* Validate IOM behaviour. */ + Assert(cb == 4); + Assert((off & 3) == 0); + + /* Do the read if it's within the MSI state. */ + ASSERT_GUEST_MSG_RETURN(off + cb <= pPciDev->Int.s.cbMsixRegion, ("Out of bounds access for the MSI-X region\n"), + VINF_IOM_MMIO_UNUSED_FF); + *(uint32_t *)pv = *(uint32_t *)&pPciDev->abMsixState[off]; + + LogFlowFunc(("off=%RGp cb=%d -> %#010RX32\n", off, cb, *(uint32_t *)pv)); + return VINF_SUCCESS; +} + +/** + * @callback_method_impl{FNIOMMMIONEWWRITE} + */ +static DECLCALLBACK(VBOXSTRICTRC) msixR3MMIOWrite(PPDMDEVINS pDevIns, void *pvUser, RTGCPHYS off, void const *pv, unsigned cb) +{ + PPDMPCIDEV pPciDev = (PPDMPCIDEV)pvUser; + LogFlowFunc(("off=%RGp cb=%d %#010RX32\n", off, cb, *(uint32_t *)pv)); + + /* Validate IOM behaviour. */ + Assert(cb == 4); + Assert((off & 3) == 0); + + /* Do the write if it's within the MSI state. */ + ASSERT_GUEST_MSG_RETURN(off + cb <= pPciDev->Int.s.offMsixPba, ("Trying to write to PBA\n"), + VINF_SUCCESS); + *(uint32_t *)&pPciDev->abMsixState[off] = *(uint32_t *)pv; + + /* (See MsixR3Init the setting up of pvPciBusPtrR3.) */ + msixR3CheckPendingVector(pDevIns, (PCPDMPCIHLP)pPciDev->Int.s.pvPciBusPtrR3, pPciDev, off / VBOX_MSIX_ENTRY_SIZE); + return VINF_SUCCESS; +} + +/** + * Initalizes MSI-X support for the given PCI device. + */ +int MsixR3Init(PCPDMPCIHLP pPciHlp, PPDMPCIDEV pDev, PPDMMSIREG pMsiReg) +{ + if (pMsiReg->cMsixVectors == 0) + return VINF_SUCCESS; + + /* We cannot init MSI-X on raw devices yet. */ + Assert(!pciDevIsPassthrough(pDev)); + + uint16_t cVectors = pMsiReg->cMsixVectors; + uint8_t iCapOffset = pMsiReg->iMsixCapOffset; + uint8_t iNextOffset = pMsiReg->iMsixNextOffset; + uint8_t iBar = pMsiReg->iMsixBar; + + AssertMsgReturn(cVectors <= VBOX_MSIX_MAX_ENTRIES, ("Too many MSI-X vectors: %d\n", cVectors), VERR_TOO_MUCH_DATA); + AssertMsgReturn(iBar <= 5, ("Using wrong BAR for MSI-X: %d\n", iBar), VERR_INVALID_PARAMETER); + Assert(iCapOffset != 0 && iCapOffset < 0xff && iNextOffset < 0xff); + + uint16_t cbPba = cVectors / 8; + if (cVectors % 8) + cbPba++; + uint16_t cbMsixRegion = RT_ALIGN_T(cVectors * sizeof(MsixTableRecord) + cbPba, _4K, uint16_t); + AssertLogRelMsgReturn(cbMsixRegion <= pDev->cbMsixState, + ("%#x vs %#x (%s)\n", cbMsixRegion, pDev->cbMsixState, pDev->pszNameR3), + VERR_MISMATCH); + + /* If device is passthrough, BAR is registered using common mechanism. */ + if (!pciDevIsPassthrough(pDev)) + { + /** @todo r=bird: This used to be IOMMMIO_FLAGS_READ_PASSTHRU | + * IOMMMIO_FLAGS_WRITE_PASSTHRU with the callbacks asserting and + * returning VERR_INTERNAL_ERROR on non-dword reads. That is of + * course certifiable insane behaviour. So, instead I've changed it + * so the callbacks only see dword reads and writes. I'm not at all + * sure about the read-missing behaviour, but it seems like a good + * idea for now. */ + /** @todo r=bird: Shouldn't we at least handle writes in ring-0? */ + int rc = PDMDevHlpPCIIORegionCreateMmio(pDev->Int.s.CTX_SUFF(pDevIns), iBar, cbMsixRegion, PCI_ADDRESS_SPACE_MEM, + msixR3MMIOWrite, msixR3MMIORead, pDev, + IOMMMIO_FLAGS_READ_DWORD | IOMMMIO_FLAGS_WRITE_DWORD_READ_MISSING, + "MSI-X tables", &pDev->Int.s.hMmioMsix); + AssertRCReturn(rc, rc); + } + + uint16_t offTable = 0; + uint16_t offPBA = cVectors * sizeof(MsixTableRecord); + + pDev->Int.s.u8MsixCapOffset = iCapOffset; + pDev->Int.s.u8MsixCapSize = VBOX_MSIX_CAP_SIZE; + pDev->Int.s.cbMsixRegion = cbMsixRegion; + pDev->Int.s.offMsixPba = offPBA; + + /* R3 PCI helper */ + pDev->Int.s.pvPciBusPtrR3 = pPciHlp; + + PCIDevSetByte(pDev, iCapOffset + 0, VBOX_PCI_CAP_ID_MSIX); + PCIDevSetByte(pDev, iCapOffset + 1, iNextOffset); /* next */ + PCIDevSetWord(pDev, iCapOffset + VBOX_MSIX_CAP_MESSAGE_CONTROL, cVectors - 1); + + PCIDevSetDWord(pDev, iCapOffset + VBOX_MSIX_TABLE_BIROFFSET, offTable | iBar); + PCIDevSetDWord(pDev, iCapOffset + VBOX_MSIX_PBA_BIROFFSET, offPBA | iBar); + + pciDevSetMsixCapable(pDev); + + return VINF_SUCCESS; +} + +#endif /* IN_RING3 */ + +/** + * Checks if MSI-X is enabled for the tiven PCI device. + * + * (Must use MSIXNotify() for notifications when true.) + */ +bool MsixIsEnabled(PPDMPCIDEV pDev) +{ + return pciDevIsMsixCapable(pDev) && msixIsEnabled(pDev); +} + +/** + * Device notification (aka interrupt). + */ +void MsixNotify(PPDMDEVINS pDevIns, PCPDMPCIHLP pPciHlp, PPDMPCIDEV pDev, int iVector, int iLevel, uint32_t uTagSrc) +{ + AssertMsg(msixIsEnabled(pDev), ("Must be enabled to use that")); + + Assert(pPciHlp->pfnIoApicSendMsi != NULL); + + /* We only trigger MSI-X on level up */ + if ((iLevel & PDM_IRQ_LEVEL_HIGH) == 0) + { + return; + } + + // if this vector is somehow disabled + if (msixIsMasked(pDev) || msixIsVectorMasked(pDev, iVector)) + { + // mark pending bit + msixSetPending(pDev, iVector); + return; + } + + // clear pending bit + msixClearPending(pDev, iVector); + + MSIMSG Msi; + Msi.Addr.u64 = msixGetMsiAddress(pDev, iVector); + Msi.Data.u32 = msixGetMsiData(pDev, iVector); + + PPDMDEVINS pDevInsBus = pPciHlp->pfnGetBusByNo(pDevIns, pDev->Int.s.idxPdmBus); + Assert(pDevInsBus); + PDEVPCIBUS pBus = PDMINS_2_DATA(pDevInsBus, PDEVPCIBUS); + uint16_t const uBusDevFn = PCIBDF_MAKE(pBus->iBus, pDev->uDevFn); + + pPciHlp->pfnIoApicSendMsi(pDevIns, uBusDevFn, &Msi, uTagSrc); +} + +#ifdef IN_RING3 + +DECLINLINE(bool) msixR3BitJustCleared(uint32_t uOldValue, uint32_t uNewValue, uint32_t uMask) +{ + return !!(uOldValue & uMask) && !(uNewValue & uMask); +} + + +static void msixR3CheckPendingVectors(PPDMDEVINS pDevIns, PCPDMPCIHLP pPciHlp, PPDMPCIDEV pDev) +{ + for (uint32_t i = 0; i < msixTableSize(pDev); i++) + msixR3CheckPendingVector(pDevIns, pPciHlp, pDev, i); +} + +/** + * PCI config space accessors for MSI-X. + */ +void MsixR3PciConfigWrite(PPDMDEVINS pDevIns, PCPDMPCIHLP pPciHlp, PPDMPCIDEV pDev, uint32_t u32Address, uint32_t val, unsigned len) +{ + int32_t iOff = u32Address - pDev->Int.s.u8MsixCapOffset; + Assert(iOff >= 0 && (pciDevIsMsixCapable(pDev) && iOff < pDev->Int.s.u8MsixCapSize)); + + Log2(("MsixR3PciConfigWrite: %d <- %x (%d)\n", iOff, val, len)); + + uint32_t uAddr = u32Address; + uint8_t u8NewVal; + bool fJustEnabled = false; + + for (uint32_t i = 0; i < len; i++) + { + uint32_t reg = i + iOff; + uint8_t u8Val = (uint8_t)val; + switch (reg) + { + case 0: /* Capability ID, ro */ + case 1: /* Next pointer, ro */ + break; + case VBOX_MSIX_CAP_MESSAGE_CONTROL: + /* don't change read-only bits: 0-7 */ + break; + case VBOX_MSIX_CAP_MESSAGE_CONTROL + 1: + { + /* don't change read-only bits 8-13 */ + u8NewVal = (u8Val & UINT8_C(~0x3f)) | (pDev->abConfig[uAddr] & UINT8_C(0x3f)); + /* If just enabled globally - check pending vectors */ + fJustEnabled |= msixR3BitJustCleared(pDev->abConfig[uAddr], u8NewVal, VBOX_PCI_MSIX_FLAGS_ENABLE >> 8); + fJustEnabled |= msixR3BitJustCleared(pDev->abConfig[uAddr], u8NewVal, VBOX_PCI_MSIX_FLAGS_FUNCMASK >> 8); + pDev->abConfig[uAddr] = u8NewVal; + break; + } + default: + /* other fields read-only too */ + break; + } + uAddr++; + val >>= 8; + } + + if (fJustEnabled) + msixR3CheckPendingVectors(pDevIns, pPciHlp, pDev); +} + +#endif /* IN_RING3 */ |