xref: /openbmc/qemu/hw/s390x/s390-pci-bus.c (revision 77ae2302)
1 /*
2  * s390 PCI BUS
3  *
4  * Copyright 2014 IBM Corp.
5  * Author(s): Frank Blaschka <frank.blaschka@de.ibm.com>
6  *            Hong Bo Li <lihbbj@cn.ibm.com>
7  *            Yi Min Zhao <zyimin@cn.ibm.com>
8  *
9  * This work is licensed under the terms of the GNU GPL, version 2 or (at
10  * your option) any later version. See the COPYING file in the top-level
11  * directory.
12  */
13 
14 #include "qemu/osdep.h"
15 #include "qapi/error.h"
16 #include "qapi/visitor.h"
17 #include "hw/s390x/s390-pci-bus.h"
18 #include "hw/s390x/s390-pci-inst.h"
19 #include "hw/s390x/s390-pci-vfio.h"
20 #include "hw/pci/pci_bus.h"
21 #include "hw/qdev-properties.h"
22 #include "hw/pci/pci_bridge.h"
23 #include "hw/pci/msi.h"
24 #include "qemu/error-report.h"
25 #include "qemu/module.h"
26 
27 #ifndef DEBUG_S390PCI_BUS
28 #define DEBUG_S390PCI_BUS  0
29 #endif
30 
31 #define DPRINTF(fmt, ...)                                         \
32     do {                                                          \
33         if (DEBUG_S390PCI_BUS) {                                  \
34             fprintf(stderr, "S390pci-bus: " fmt, ## __VA_ARGS__); \
35         }                                                         \
36     } while (0)
37 
38 S390pciState *s390_get_phb(void)
39 {
40     static S390pciState *phb;
41 
42     if (!phb) {
43         phb = S390_PCI_HOST_BRIDGE(
44             object_resolve_path(TYPE_S390_PCI_HOST_BRIDGE, NULL));
45         assert(phb != NULL);
46     }
47 
48     return phb;
49 }
50 
51 int pci_chsc_sei_nt2_get_event(void *res)
52 {
53     ChscSeiNt2Res *nt2_res = (ChscSeiNt2Res *)res;
54     PciCcdfAvail *accdf;
55     PciCcdfErr *eccdf;
56     int rc = 1;
57     SeiContainer *sei_cont;
58     S390pciState *s = s390_get_phb();
59 
60     sei_cont = QTAILQ_FIRST(&s->pending_sei);
61     if (sei_cont) {
62         QTAILQ_REMOVE(&s->pending_sei, sei_cont, link);
63         nt2_res->nt = 2;
64         nt2_res->cc = sei_cont->cc;
65         nt2_res->length = cpu_to_be16(sizeof(ChscSeiNt2Res));
66         switch (sei_cont->cc) {
67         case 1: /* error event */
68             eccdf = (PciCcdfErr *)nt2_res->ccdf;
69             eccdf->fid = cpu_to_be32(sei_cont->fid);
70             eccdf->fh = cpu_to_be32(sei_cont->fh);
71             eccdf->e = cpu_to_be32(sei_cont->e);
72             eccdf->faddr = cpu_to_be64(sei_cont->faddr);
73             eccdf->pec = cpu_to_be16(sei_cont->pec);
74             break;
75         case 2: /* availability event */
76             accdf = (PciCcdfAvail *)nt2_res->ccdf;
77             accdf->fid = cpu_to_be32(sei_cont->fid);
78             accdf->fh = cpu_to_be32(sei_cont->fh);
79             accdf->pec = cpu_to_be16(sei_cont->pec);
80             break;
81         default:
82             abort();
83         }
84         g_free(sei_cont);
85         rc = 0;
86     }
87 
88     return rc;
89 }
90 
91 int pci_chsc_sei_nt2_have_event(void)
92 {
93     S390pciState *s = s390_get_phb();
94 
95     return !QTAILQ_EMPTY(&s->pending_sei);
96 }
97 
98 S390PCIBusDevice *s390_pci_find_next_avail_dev(S390pciState *s,
99                                                S390PCIBusDevice *pbdev)
100 {
101     S390PCIBusDevice *ret = pbdev ? QTAILQ_NEXT(pbdev, link) :
102         QTAILQ_FIRST(&s->zpci_devs);
103 
104     while (ret && ret->state == ZPCI_FS_RESERVED) {
105         ret = QTAILQ_NEXT(ret, link);
106     }
107 
108     return ret;
109 }
110 
111 S390PCIBusDevice *s390_pci_find_dev_by_fid(S390pciState *s, uint32_t fid)
112 {
113     S390PCIBusDevice *pbdev;
114 
115     QTAILQ_FOREACH(pbdev, &s->zpci_devs, link) {
116         if (pbdev->fid == fid) {
117             return pbdev;
118         }
119     }
120 
121     return NULL;
122 }
123 
124 void s390_pci_sclp_configure(SCCB *sccb)
125 {
126     IoaCfgSccb *psccb = (IoaCfgSccb *)sccb;
127     S390PCIBusDevice *pbdev = s390_pci_find_dev_by_fid(s390_get_phb(),
128                                                        be32_to_cpu(psccb->aid));
129     uint16_t rc;
130 
131     if (!pbdev) {
132         DPRINTF("sclp config no dev found\n");
133         rc = SCLP_RC_ADAPTER_ID_NOT_RECOGNIZED;
134         goto out;
135     }
136 
137     switch (pbdev->state) {
138     case ZPCI_FS_RESERVED:
139         rc = SCLP_RC_ADAPTER_IN_RESERVED_STATE;
140         break;
141     case ZPCI_FS_STANDBY:
142         pbdev->state = ZPCI_FS_DISABLED;
143         rc = SCLP_RC_NORMAL_COMPLETION;
144         break;
145     default:
146         rc = SCLP_RC_NO_ACTION_REQUIRED;
147     }
148 out:
149     psccb->header.response_code = cpu_to_be16(rc);
150 }
151 
152 static void s390_pci_perform_unplug(S390PCIBusDevice *pbdev)
153 {
154     HotplugHandler *hotplug_ctrl;
155 
156     /* Unplug the PCI device */
157     if (pbdev->pdev) {
158         DeviceState *pdev = DEVICE(pbdev->pdev);
159 
160         hotplug_ctrl = qdev_get_hotplug_handler(pdev);
161         hotplug_handler_unplug(hotplug_ctrl, pdev, &error_abort);
162         object_unparent(OBJECT(pdev));
163     }
164 
165     /* Unplug the zPCI device */
166     hotplug_ctrl = qdev_get_hotplug_handler(DEVICE(pbdev));
167     hotplug_handler_unplug(hotplug_ctrl, DEVICE(pbdev), &error_abort);
168     object_unparent(OBJECT(pbdev));
169 }
170 
171 void s390_pci_sclp_deconfigure(SCCB *sccb)
172 {
173     IoaCfgSccb *psccb = (IoaCfgSccb *)sccb;
174     S390PCIBusDevice *pbdev = s390_pci_find_dev_by_fid(s390_get_phb(),
175                                                        be32_to_cpu(psccb->aid));
176     uint16_t rc;
177 
178     if (!pbdev) {
179         DPRINTF("sclp deconfig no dev found\n");
180         rc = SCLP_RC_ADAPTER_ID_NOT_RECOGNIZED;
181         goto out;
182     }
183 
184     switch (pbdev->state) {
185     case ZPCI_FS_RESERVED:
186         rc = SCLP_RC_ADAPTER_IN_RESERVED_STATE;
187         break;
188     case ZPCI_FS_STANDBY:
189         rc = SCLP_RC_NO_ACTION_REQUIRED;
190         break;
191     default:
192         if (pbdev->summary_ind) {
193             pci_dereg_irqs(pbdev);
194         }
195         if (pbdev->iommu->enabled) {
196             pci_dereg_ioat(pbdev->iommu);
197         }
198         pbdev->state = ZPCI_FS_STANDBY;
199         rc = SCLP_RC_NORMAL_COMPLETION;
200 
201         if (pbdev->unplug_requested) {
202             s390_pci_perform_unplug(pbdev);
203         }
204     }
205 out:
206     psccb->header.response_code = cpu_to_be16(rc);
207 }
208 
209 static S390PCIBusDevice *s390_pci_find_dev_by_uid(S390pciState *s, uint16_t uid)
210 {
211     S390PCIBusDevice *pbdev;
212 
213     QTAILQ_FOREACH(pbdev, &s->zpci_devs, link) {
214         if (pbdev->uid == uid) {
215             return pbdev;
216         }
217     }
218 
219     return NULL;
220 }
221 
222 S390PCIBusDevice *s390_pci_find_dev_by_target(S390pciState *s,
223                                               const char *target)
224 {
225     S390PCIBusDevice *pbdev;
226 
227     if (!target) {
228         return NULL;
229     }
230 
231     QTAILQ_FOREACH(pbdev, &s->zpci_devs, link) {
232         if (!strcmp(pbdev->target, target)) {
233             return pbdev;
234         }
235     }
236 
237     return NULL;
238 }
239 
240 static S390PCIBusDevice *s390_pci_find_dev_by_pci(S390pciState *s,
241                                                   PCIDevice *pci_dev)
242 {
243     S390PCIBusDevice *pbdev;
244 
245     if (!pci_dev) {
246         return NULL;
247     }
248 
249     QTAILQ_FOREACH(pbdev, &s->zpci_devs, link) {
250         if (pbdev->pdev == pci_dev) {
251             return pbdev;
252         }
253     }
254 
255     return NULL;
256 }
257 
258 S390PCIBusDevice *s390_pci_find_dev_by_idx(S390pciState *s, uint32_t idx)
259 {
260     return g_hash_table_lookup(s->zpci_table, &idx);
261 }
262 
263 S390PCIBusDevice *s390_pci_find_dev_by_fh(S390pciState *s, uint32_t fh)
264 {
265     uint32_t idx = FH_MASK_INDEX & fh;
266     S390PCIBusDevice *pbdev = s390_pci_find_dev_by_idx(s, idx);
267 
268     if (pbdev && pbdev->fh == fh) {
269         return pbdev;
270     }
271 
272     return NULL;
273 }
274 
275 static void s390_pci_generate_event(uint8_t cc, uint16_t pec, uint32_t fh,
276                                     uint32_t fid, uint64_t faddr, uint32_t e)
277 {
278     SeiContainer *sei_cont;
279     S390pciState *s = s390_get_phb();
280 
281     sei_cont = g_new0(SeiContainer, 1);
282     sei_cont->fh = fh;
283     sei_cont->fid = fid;
284     sei_cont->cc = cc;
285     sei_cont->pec = pec;
286     sei_cont->faddr = faddr;
287     sei_cont->e = e;
288 
289     QTAILQ_INSERT_TAIL(&s->pending_sei, sei_cont, link);
290     css_generate_css_crws(0);
291 }
292 
293 static void s390_pci_generate_plug_event(uint16_t pec, uint32_t fh,
294                                          uint32_t fid)
295 {
296     s390_pci_generate_event(2, pec, fh, fid, 0, 0);
297 }
298 
299 void s390_pci_generate_error_event(uint16_t pec, uint32_t fh, uint32_t fid,
300                                    uint64_t faddr, uint32_t e)
301 {
302     s390_pci_generate_event(1, pec, fh, fid, faddr, e);
303 }
304 
305 static void s390_pci_set_irq(void *opaque, int irq, int level)
306 {
307     /* nothing to do */
308 }
309 
310 static int s390_pci_map_irq(PCIDevice *pci_dev, int irq_num)
311 {
312     /* nothing to do */
313     return 0;
314 }
315 
316 static uint64_t s390_pci_get_table_origin(uint64_t iota)
317 {
318     return iota & ~ZPCI_IOTA_RTTO_FLAG;
319 }
320 
321 static unsigned int calc_rtx(dma_addr_t ptr)
322 {
323     return ((unsigned long) ptr >> ZPCI_RT_SHIFT) & ZPCI_INDEX_MASK;
324 }
325 
326 static unsigned int calc_sx(dma_addr_t ptr)
327 {
328     return ((unsigned long) ptr >> ZPCI_ST_SHIFT) & ZPCI_INDEX_MASK;
329 }
330 
331 static unsigned int calc_px(dma_addr_t ptr)
332 {
333     return ((unsigned long) ptr >> TARGET_PAGE_BITS) & ZPCI_PT_MASK;
334 }
335 
336 static uint64_t get_rt_sto(uint64_t entry)
337 {
338     return ((entry & ZPCI_TABLE_TYPE_MASK) == ZPCI_TABLE_TYPE_RTX)
339                 ? (entry & ZPCI_RTE_ADDR_MASK)
340                 : 0;
341 }
342 
343 static uint64_t get_st_pto(uint64_t entry)
344 {
345     return ((entry & ZPCI_TABLE_TYPE_MASK) == ZPCI_TABLE_TYPE_SX)
346             ? (entry & ZPCI_STE_ADDR_MASK)
347             : 0;
348 }
349 
350 static bool rt_entry_isvalid(uint64_t entry)
351 {
352     return (entry & ZPCI_TABLE_VALID_MASK) == ZPCI_TABLE_VALID;
353 }
354 
355 static bool pt_entry_isvalid(uint64_t entry)
356 {
357     return (entry & ZPCI_PTE_VALID_MASK) == ZPCI_PTE_VALID;
358 }
359 
360 static bool entry_isprotected(uint64_t entry)
361 {
362     return (entry & ZPCI_TABLE_PROT_MASK) == ZPCI_TABLE_PROTECTED;
363 }
364 
365 /* ett is expected table type, -1 page table, 0 segment table, 1 region table */
366 static uint64_t get_table_index(uint64_t iova, int8_t ett)
367 {
368     switch (ett) {
369     case ZPCI_ETT_PT:
370         return calc_px(iova);
371     case ZPCI_ETT_ST:
372         return calc_sx(iova);
373     case ZPCI_ETT_RT:
374         return calc_rtx(iova);
375     }
376 
377     return -1;
378 }
379 
380 static bool entry_isvalid(uint64_t entry, int8_t ett)
381 {
382     switch (ett) {
383     case ZPCI_ETT_PT:
384         return pt_entry_isvalid(entry);
385     case ZPCI_ETT_ST:
386     case ZPCI_ETT_RT:
387         return rt_entry_isvalid(entry);
388     }
389 
390     return false;
391 }
392 
393 /* Return true if address translation is done */
394 static bool translate_iscomplete(uint64_t entry, int8_t ett)
395 {
396     switch (ett) {
397     case 0:
398         return (entry & ZPCI_TABLE_FC) ? true : false;
399     case 1:
400         return false;
401     }
402 
403     return true;
404 }
405 
406 static uint64_t get_frame_size(int8_t ett)
407 {
408     switch (ett) {
409     case ZPCI_ETT_PT:
410         return 1ULL << 12;
411     case ZPCI_ETT_ST:
412         return 1ULL << 20;
413     case ZPCI_ETT_RT:
414         return 1ULL << 31;
415     }
416 
417     return 0;
418 }
419 
420 static uint64_t get_next_table_origin(uint64_t entry, int8_t ett)
421 {
422     switch (ett) {
423     case ZPCI_ETT_PT:
424         return entry & ZPCI_PTE_ADDR_MASK;
425     case ZPCI_ETT_ST:
426         return get_st_pto(entry);
427     case ZPCI_ETT_RT:
428         return get_rt_sto(entry);
429     }
430 
431     return 0;
432 }
433 
434 /**
435  * table_translate: do translation within one table and return the following
436  *                  table origin
437  *
438  * @entry: the entry being translated, the result is stored in this.
439  * @to: the address of table origin.
440  * @ett: expected table type, 1 region table, 0 segment table and -1 page table.
441  * @error: error code
442  */
443 static uint64_t table_translate(S390IOTLBEntry *entry, uint64_t to, int8_t ett,
444                                 uint16_t *error)
445 {
446     uint64_t tx, te, nto = 0;
447     uint16_t err = 0;
448 
449     tx = get_table_index(entry->iova, ett);
450     te = address_space_ldq(&address_space_memory, to + tx * sizeof(uint64_t),
451                            MEMTXATTRS_UNSPECIFIED, NULL);
452 
453     if (!te) {
454         err = ERR_EVENT_INVALTE;
455         goto out;
456     }
457 
458     if (!entry_isvalid(te, ett)) {
459         entry->perm &= IOMMU_NONE;
460         goto out;
461     }
462 
463     if (ett == ZPCI_ETT_RT && ((te & ZPCI_TABLE_LEN_RTX) != ZPCI_TABLE_LEN_RTX
464                                || te & ZPCI_TABLE_OFFSET_MASK)) {
465         err = ERR_EVENT_INVALTL;
466         goto out;
467     }
468 
469     nto = get_next_table_origin(te, ett);
470     if (!nto) {
471         err = ERR_EVENT_TT;
472         goto out;
473     }
474 
475     if (entry_isprotected(te)) {
476         entry->perm &= IOMMU_RO;
477     } else {
478         entry->perm &= IOMMU_RW;
479     }
480 
481     if (translate_iscomplete(te, ett)) {
482         switch (ett) {
483         case ZPCI_ETT_PT:
484             entry->translated_addr = te & ZPCI_PTE_ADDR_MASK;
485             break;
486         case ZPCI_ETT_ST:
487             entry->translated_addr = (te & ZPCI_SFAA_MASK) |
488                 (entry->iova & ~ZPCI_SFAA_MASK);
489             break;
490         }
491         nto = 0;
492     }
493 out:
494     if (err) {
495         entry->perm = IOMMU_NONE;
496         *error = err;
497     }
498     entry->len = get_frame_size(ett);
499     return nto;
500 }
501 
502 uint16_t s390_guest_io_table_walk(uint64_t g_iota, hwaddr addr,
503                                   S390IOTLBEntry *entry)
504 {
505     uint64_t to = s390_pci_get_table_origin(g_iota);
506     int8_t ett = 1;
507     uint16_t error = 0;
508 
509     entry->iova = addr & TARGET_PAGE_MASK;
510     entry->translated_addr = 0;
511     entry->perm = IOMMU_RW;
512 
513     if (entry_isprotected(g_iota)) {
514         entry->perm &= IOMMU_RO;
515     }
516 
517     while (to) {
518         to = table_translate(entry, to, ett--, &error);
519     }
520 
521     return error;
522 }
523 
524 static IOMMUTLBEntry s390_translate_iommu(IOMMUMemoryRegion *mr, hwaddr addr,
525                                           IOMMUAccessFlags flag, int iommu_idx)
526 {
527     S390PCIIOMMU *iommu = container_of(mr, S390PCIIOMMU, iommu_mr);
528     S390IOTLBEntry *entry;
529     uint64_t iova = addr & TARGET_PAGE_MASK;
530     uint16_t error = 0;
531     IOMMUTLBEntry ret = {
532         .target_as = &address_space_memory,
533         .iova = 0,
534         .translated_addr = 0,
535         .addr_mask = ~(hwaddr)0,
536         .perm = IOMMU_NONE,
537     };
538 
539     switch (iommu->pbdev->state) {
540     case ZPCI_FS_ENABLED:
541     case ZPCI_FS_BLOCKED:
542         if (!iommu->enabled) {
543             return ret;
544         }
545         break;
546     default:
547         return ret;
548     }
549 
550     DPRINTF("iommu trans addr 0x%" PRIx64 "\n", addr);
551 
552     if (addr < iommu->pba || addr > iommu->pal) {
553         error = ERR_EVENT_OORANGE;
554         goto err;
555     }
556 
557     entry = g_hash_table_lookup(iommu->iotlb, &iova);
558     if (entry) {
559         ret.iova = entry->iova;
560         ret.translated_addr = entry->translated_addr;
561         ret.addr_mask = entry->len - 1;
562         ret.perm = entry->perm;
563     } else {
564         ret.iova = iova;
565         ret.addr_mask = ~TARGET_PAGE_MASK;
566         ret.perm = IOMMU_NONE;
567     }
568 
569     if (flag != IOMMU_NONE && !(flag & ret.perm)) {
570         error = ERR_EVENT_TPROTE;
571     }
572 err:
573     if (error) {
574         iommu->pbdev->state = ZPCI_FS_ERROR;
575         s390_pci_generate_error_event(error, iommu->pbdev->fh,
576                                       iommu->pbdev->fid, addr, 0);
577     }
578     return ret;
579 }
580 
581 static void s390_pci_iommu_replay(IOMMUMemoryRegion *iommu,
582                                   IOMMUNotifier *notifier)
583 {
584     /* It's impossible to plug a pci device on s390x that already has iommu
585      * mappings which need to be replayed, that is due to the "one iommu per
586      * zpci device" construct. But when we support migration of vfio-pci
587      * devices in future, we need to revisit this.
588      */
589     return;
590 }
591 
592 static S390PCIIOMMU *s390_pci_get_iommu(S390pciState *s, PCIBus *bus,
593                                         int devfn)
594 {
595     uint64_t key = (uintptr_t)bus;
596     S390PCIIOMMUTable *table = g_hash_table_lookup(s->iommu_table, &key);
597     S390PCIIOMMU *iommu;
598 
599     if (!table) {
600         table = g_new0(S390PCIIOMMUTable, 1);
601         table->key = key;
602         g_hash_table_insert(s->iommu_table, &table->key, table);
603     }
604 
605     iommu = table->iommu[PCI_SLOT(devfn)];
606     if (!iommu) {
607         iommu = S390_PCI_IOMMU(object_new(TYPE_S390_PCI_IOMMU));
608 
609         char *mr_name = g_strdup_printf("iommu-root-%02x:%02x.%01x",
610                                         pci_bus_num(bus),
611                                         PCI_SLOT(devfn),
612                                         PCI_FUNC(devfn));
613         char *as_name = g_strdup_printf("iommu-pci-%02x:%02x.%01x",
614                                         pci_bus_num(bus),
615                                         PCI_SLOT(devfn),
616                                         PCI_FUNC(devfn));
617         memory_region_init(&iommu->mr, OBJECT(iommu), mr_name, UINT64_MAX);
618         address_space_init(&iommu->as, &iommu->mr, as_name);
619         iommu->iotlb = g_hash_table_new_full(g_int64_hash, g_int64_equal,
620                                              NULL, g_free);
621         table->iommu[PCI_SLOT(devfn)] = iommu;
622 
623         g_free(mr_name);
624         g_free(as_name);
625     }
626 
627     return iommu;
628 }
629 
630 static AddressSpace *s390_pci_dma_iommu(PCIBus *bus, void *opaque, int devfn)
631 {
632     S390pciState *s = opaque;
633     S390PCIIOMMU *iommu = s390_pci_get_iommu(s, bus, devfn);
634 
635     return &iommu->as;
636 }
637 
638 static uint8_t set_ind_atomic(uint64_t ind_loc, uint8_t to_be_set)
639 {
640     uint8_t expected, actual;
641     hwaddr len = 1;
642     /* avoid  multiple fetches */
643     uint8_t volatile *ind_addr;
644 
645     ind_addr = cpu_physical_memory_map(ind_loc, &len, true);
646     if (!ind_addr) {
647         s390_pci_generate_error_event(ERR_EVENT_AIRERR, 0, 0, 0, 0);
648         return -1;
649     }
650     actual = *ind_addr;
651     do {
652         expected = actual;
653         actual = qatomic_cmpxchg(ind_addr, expected, expected | to_be_set);
654     } while (actual != expected);
655     cpu_physical_memory_unmap((void *)ind_addr, len, 1, len);
656 
657     return actual;
658 }
659 
660 static void s390_msi_ctrl_write(void *opaque, hwaddr addr, uint64_t data,
661                                 unsigned int size)
662 {
663     S390PCIBusDevice *pbdev = opaque;
664     uint32_t vec = data & ZPCI_MSI_VEC_MASK;
665     uint64_t ind_bit;
666     uint32_t sum_bit;
667 
668     assert(pbdev);
669     DPRINTF("write_msix data 0x%" PRIx64 " idx %d vec 0x%x\n", data,
670             pbdev->idx, vec);
671 
672     if (pbdev->state != ZPCI_FS_ENABLED) {
673         return;
674     }
675 
676     ind_bit = pbdev->routes.adapter.ind_offset;
677     sum_bit = pbdev->routes.adapter.summary_offset;
678 
679     set_ind_atomic(pbdev->routes.adapter.ind_addr + (ind_bit + vec) / 8,
680                    0x80 >> ((ind_bit + vec) % 8));
681     if (!set_ind_atomic(pbdev->routes.adapter.summary_addr + sum_bit / 8,
682                                        0x80 >> (sum_bit % 8))) {
683         css_adapter_interrupt(CSS_IO_ADAPTER_PCI, pbdev->isc);
684     }
685 }
686 
687 static uint64_t s390_msi_ctrl_read(void *opaque, hwaddr addr, unsigned size)
688 {
689     return 0xffffffff;
690 }
691 
692 static const MemoryRegionOps s390_msi_ctrl_ops = {
693     .write = s390_msi_ctrl_write,
694     .read = s390_msi_ctrl_read,
695     .endianness = DEVICE_LITTLE_ENDIAN,
696 };
697 
698 void s390_pci_iommu_enable(S390PCIIOMMU *iommu)
699 {
700     /*
701      * The iommu region is initialized against a 0-mapped address space,
702      * so the smallest IOMMU region we can define runs from 0 to the end
703      * of the PCI address space.
704      */
705     char *name = g_strdup_printf("iommu-s390-%04x", iommu->pbdev->uid);
706     memory_region_init_iommu(&iommu->iommu_mr, sizeof(iommu->iommu_mr),
707                              TYPE_S390_IOMMU_MEMORY_REGION, OBJECT(&iommu->mr),
708                              name, iommu->pal + 1);
709     iommu->enabled = true;
710     memory_region_add_subregion(&iommu->mr, 0, MEMORY_REGION(&iommu->iommu_mr));
711     g_free(name);
712 }
713 
714 void s390_pci_iommu_disable(S390PCIIOMMU *iommu)
715 {
716     iommu->enabled = false;
717     g_hash_table_remove_all(iommu->iotlb);
718     memory_region_del_subregion(&iommu->mr, MEMORY_REGION(&iommu->iommu_mr));
719     object_unparent(OBJECT(&iommu->iommu_mr));
720 }
721 
722 static void s390_pci_iommu_free(S390pciState *s, PCIBus *bus, int32_t devfn)
723 {
724     uint64_t key = (uintptr_t)bus;
725     S390PCIIOMMUTable *table = g_hash_table_lookup(s->iommu_table, &key);
726     S390PCIIOMMU *iommu = table ? table->iommu[PCI_SLOT(devfn)] : NULL;
727 
728     if (!table || !iommu) {
729         return;
730     }
731 
732     table->iommu[PCI_SLOT(devfn)] = NULL;
733     g_hash_table_destroy(iommu->iotlb);
734     /*
735      * An attached PCI device may have memory listeners, eg. VFIO PCI.
736      * The associated subregion will already have been unmapped in
737      * s390_pci_iommu_disable in response to the guest deconfigure request.
738      * Remove the listeners now before destroying the address space.
739      */
740     address_space_remove_listeners(&iommu->as);
741     address_space_destroy(&iommu->as);
742     object_unparent(OBJECT(&iommu->mr));
743     object_unparent(OBJECT(iommu));
744     object_unref(OBJECT(iommu));
745 }
746 
747 S390PCIGroup *s390_group_create(int id)
748 {
749     S390PCIGroup *group;
750     S390pciState *s = s390_get_phb();
751 
752     group = g_new0(S390PCIGroup, 1);
753     group->id = id;
754     QTAILQ_INSERT_TAIL(&s->zpci_groups, group, link);
755     return group;
756 }
757 
758 S390PCIGroup *s390_group_find(int id)
759 {
760     S390PCIGroup *group;
761     S390pciState *s = s390_get_phb();
762 
763     QTAILQ_FOREACH(group, &s->zpci_groups, link) {
764         if (group->id == id) {
765             return group;
766         }
767     }
768     return NULL;
769 }
770 
771 static void s390_pci_init_default_group(void)
772 {
773     S390PCIGroup *group;
774     ClpRspQueryPciGrp *resgrp;
775 
776     group = s390_group_create(ZPCI_DEFAULT_FN_GRP);
777     resgrp = &group->zpci_group;
778     resgrp->fr = 1;
779     resgrp->dasm = 0;
780     resgrp->msia = ZPCI_MSI_ADDR;
781     resgrp->mui = DEFAULT_MUI;
782     resgrp->i = 128;
783     resgrp->maxstbl = 128;
784     resgrp->version = 0;
785 }
786 
787 static void set_pbdev_info(S390PCIBusDevice *pbdev)
788 {
789     pbdev->zpci_fn.sdma = ZPCI_SDMA_ADDR;
790     pbdev->zpci_fn.edma = ZPCI_EDMA_ADDR;
791     pbdev->zpci_fn.pchid = 0;
792     pbdev->zpci_fn.pfgid = ZPCI_DEFAULT_FN_GRP;
793     pbdev->zpci_fn.fid = pbdev->fid;
794     pbdev->zpci_fn.uid = pbdev->uid;
795     pbdev->pci_group = s390_group_find(ZPCI_DEFAULT_FN_GRP);
796 }
797 
798 static void s390_pcihost_realize(DeviceState *dev, Error **errp)
799 {
800     PCIBus *b;
801     BusState *bus;
802     PCIHostState *phb = PCI_HOST_BRIDGE(dev);
803     S390pciState *s = S390_PCI_HOST_BRIDGE(dev);
804 
805     DPRINTF("host_init\n");
806 
807     b = pci_register_root_bus(dev, NULL, s390_pci_set_irq, s390_pci_map_irq,
808                               NULL, get_system_memory(), get_system_io(), 0,
809                               64, TYPE_PCI_BUS);
810     pci_setup_iommu(b, s390_pci_dma_iommu, s);
811 
812     bus = BUS(b);
813     qbus_set_hotplug_handler(bus, OBJECT(dev));
814     phb->bus = b;
815 
816     s->bus = S390_PCI_BUS(qbus_new(TYPE_S390_PCI_BUS, dev, NULL));
817     qbus_set_hotplug_handler(BUS(s->bus), OBJECT(dev));
818 
819     s->iommu_table = g_hash_table_new_full(g_int64_hash, g_int64_equal,
820                                            NULL, g_free);
821     s->zpci_table = g_hash_table_new_full(g_int_hash, g_int_equal, NULL, NULL);
822     s->bus_no = 0;
823     QTAILQ_INIT(&s->pending_sei);
824     QTAILQ_INIT(&s->zpci_devs);
825     QTAILQ_INIT(&s->zpci_dma_limit);
826     QTAILQ_INIT(&s->zpci_groups);
827 
828     s390_pci_init_default_group();
829     css_register_io_adapters(CSS_IO_ADAPTER_PCI, true, false,
830                              S390_ADAPTER_SUPPRESSIBLE, errp);
831 }
832 
833 static void s390_pcihost_unrealize(DeviceState *dev)
834 {
835     S390PCIGroup *group;
836     S390pciState *s = S390_PCI_HOST_BRIDGE(dev);
837 
838     while (!QTAILQ_EMPTY(&s->zpci_groups)) {
839         group = QTAILQ_FIRST(&s->zpci_groups);
840         QTAILQ_REMOVE(&s->zpci_groups, group, link);
841     }
842 }
843 
844 static int s390_pci_msix_init(S390PCIBusDevice *pbdev)
845 {
846     char *name;
847     uint8_t pos;
848     uint16_t ctrl;
849     uint32_t table, pba;
850 
851     pos = pci_find_capability(pbdev->pdev, PCI_CAP_ID_MSIX);
852     if (!pos) {
853         return -1;
854     }
855 
856     ctrl = pci_host_config_read_common(pbdev->pdev, pos + PCI_MSIX_FLAGS,
857              pci_config_size(pbdev->pdev), sizeof(ctrl));
858     table = pci_host_config_read_common(pbdev->pdev, pos + PCI_MSIX_TABLE,
859              pci_config_size(pbdev->pdev), sizeof(table));
860     pba = pci_host_config_read_common(pbdev->pdev, pos + PCI_MSIX_PBA,
861              pci_config_size(pbdev->pdev), sizeof(pba));
862 
863     pbdev->msix.table_bar = table & PCI_MSIX_FLAGS_BIRMASK;
864     pbdev->msix.table_offset = table & ~PCI_MSIX_FLAGS_BIRMASK;
865     pbdev->msix.pba_bar = pba & PCI_MSIX_FLAGS_BIRMASK;
866     pbdev->msix.pba_offset = pba & ~PCI_MSIX_FLAGS_BIRMASK;
867     pbdev->msix.entries = (ctrl & PCI_MSIX_FLAGS_QSIZE) + 1;
868 
869     name = g_strdup_printf("msix-s390-%04x", pbdev->uid);
870     memory_region_init_io(&pbdev->msix_notify_mr, OBJECT(pbdev),
871                           &s390_msi_ctrl_ops, pbdev, name, TARGET_PAGE_SIZE);
872     memory_region_add_subregion(&pbdev->iommu->mr,
873                                 pbdev->pci_group->zpci_group.msia,
874                                 &pbdev->msix_notify_mr);
875     g_free(name);
876 
877     return 0;
878 }
879 
880 static void s390_pci_msix_free(S390PCIBusDevice *pbdev)
881 {
882     memory_region_del_subregion(&pbdev->iommu->mr, &pbdev->msix_notify_mr);
883     object_unparent(OBJECT(&pbdev->msix_notify_mr));
884 }
885 
886 static S390PCIBusDevice *s390_pci_device_new(S390pciState *s,
887                                              const char *target, Error **errp)
888 {
889     Error *local_err = NULL;
890     DeviceState *dev;
891 
892     dev = qdev_try_new(TYPE_S390_PCI_DEVICE);
893     if (!dev) {
894         error_setg(errp, "zPCI device could not be created");
895         return NULL;
896     }
897 
898     if (!object_property_set_str(OBJECT(dev), "target", target, &local_err)) {
899         object_unparent(OBJECT(dev));
900         error_propagate_prepend(errp, local_err,
901                                 "zPCI device could not be created: ");
902         return NULL;
903     }
904     if (!qdev_realize_and_unref(dev, BUS(s->bus), &local_err)) {
905         object_unparent(OBJECT(dev));
906         error_propagate_prepend(errp, local_err,
907                                 "zPCI device could not be created: ");
908         return NULL;
909     }
910 
911     return S390_PCI_DEVICE(dev);
912 }
913 
914 static bool s390_pci_alloc_idx(S390pciState *s, S390PCIBusDevice *pbdev)
915 {
916     uint32_t idx;
917 
918     idx = s->next_idx;
919     while (s390_pci_find_dev_by_idx(s, idx)) {
920         idx = (idx + 1) & FH_MASK_INDEX;
921         if (idx == s->next_idx) {
922             return false;
923         }
924     }
925 
926     pbdev->idx = idx;
927     return true;
928 }
929 
930 static void s390_pcihost_pre_plug(HotplugHandler *hotplug_dev, DeviceState *dev,
931                                    Error **errp)
932 {
933     S390pciState *s = S390_PCI_HOST_BRIDGE(hotplug_dev);
934 
935     if (!s390_has_feat(S390_FEAT_ZPCI)) {
936         warn_report("Plugging a PCI/zPCI device without the 'zpci' CPU "
937                     "feature enabled; the guest will not be able to see/use "
938                     "this device");
939     }
940 
941     if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_DEVICE)) {
942         PCIDevice *pdev = PCI_DEVICE(dev);
943 
944         if (pdev->cap_present & QEMU_PCI_CAP_MULTIFUNCTION) {
945             error_setg(errp, "multifunction not supported in s390");
946             return;
947         }
948     } else if (object_dynamic_cast(OBJECT(dev), TYPE_S390_PCI_DEVICE)) {
949         S390PCIBusDevice *pbdev = S390_PCI_DEVICE(dev);
950 
951         if (!s390_pci_alloc_idx(s, pbdev)) {
952             error_setg(errp, "no slot for plugging zpci device");
953             return;
954         }
955     }
956 }
957 
958 static void s390_pci_update_subordinate(PCIDevice *dev, uint32_t nr)
959 {
960     uint32_t old_nr;
961 
962     pci_default_write_config(dev, PCI_SUBORDINATE_BUS, nr, 1);
963     while (!pci_bus_is_root(pci_get_bus(dev))) {
964         dev = pci_get_bus(dev)->parent_dev;
965 
966         old_nr = pci_default_read_config(dev, PCI_SUBORDINATE_BUS, 1);
967         if (old_nr < nr) {
968             pci_default_write_config(dev, PCI_SUBORDINATE_BUS, nr, 1);
969         }
970     }
971 }
972 
973 static void s390_pcihost_plug(HotplugHandler *hotplug_dev, DeviceState *dev,
974                               Error **errp)
975 {
976     S390pciState *s = S390_PCI_HOST_BRIDGE(hotplug_dev);
977     PCIDevice *pdev = NULL;
978     S390PCIBusDevice *pbdev = NULL;
979 
980     if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_BRIDGE)) {
981         PCIBridge *pb = PCI_BRIDGE(dev);
982 
983         pdev = PCI_DEVICE(dev);
984         pci_bridge_map_irq(pb, dev->id, s390_pci_map_irq);
985         pci_setup_iommu(&pb->sec_bus, s390_pci_dma_iommu, s);
986 
987         qbus_set_hotplug_handler(BUS(&pb->sec_bus), OBJECT(s));
988 
989         if (dev->hotplugged) {
990             pci_default_write_config(pdev, PCI_PRIMARY_BUS,
991                                      pci_dev_bus_num(pdev), 1);
992             s->bus_no += 1;
993             pci_default_write_config(pdev, PCI_SECONDARY_BUS, s->bus_no, 1);
994 
995             s390_pci_update_subordinate(pdev, s->bus_no);
996         }
997     } else if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_DEVICE)) {
998         pdev = PCI_DEVICE(dev);
999 
1000         if (!dev->id) {
1001             /* In the case the PCI device does not define an id */
1002             /* we generate one based on the PCI address         */
1003             dev->id = g_strdup_printf("auto_%02x:%02x.%01x",
1004                                       pci_dev_bus_num(pdev),
1005                                       PCI_SLOT(pdev->devfn),
1006                                       PCI_FUNC(pdev->devfn));
1007         }
1008 
1009         pbdev = s390_pci_find_dev_by_target(s, dev->id);
1010         if (!pbdev) {
1011             pbdev = s390_pci_device_new(s, dev->id, errp);
1012             if (!pbdev) {
1013                 return;
1014             }
1015         }
1016 
1017         pbdev->pdev = pdev;
1018         pbdev->iommu = s390_pci_get_iommu(s, pci_get_bus(pdev), pdev->devfn);
1019         pbdev->iommu->pbdev = pbdev;
1020         pbdev->state = ZPCI_FS_DISABLED;
1021         set_pbdev_info(pbdev);
1022 
1023         if (object_dynamic_cast(OBJECT(dev), "vfio-pci")) {
1024             pbdev->fh |= FH_SHM_VFIO;
1025             pbdev->iommu->dma_limit = s390_pci_start_dma_count(s, pbdev);
1026             /* Fill in CLP information passed via the vfio region */
1027             s390_pci_get_clp_info(pbdev);
1028         } else {
1029             pbdev->fh |= FH_SHM_EMUL;
1030         }
1031 
1032         if (s390_pci_msix_init(pbdev)) {
1033             error_setg(errp, "MSI-X support is mandatory "
1034                        "in the S390 architecture");
1035             return;
1036         }
1037 
1038         if (dev->hotplugged) {
1039             s390_pci_generate_plug_event(HP_EVENT_TO_CONFIGURED ,
1040                                          pbdev->fh, pbdev->fid);
1041         }
1042     } else if (object_dynamic_cast(OBJECT(dev), TYPE_S390_PCI_DEVICE)) {
1043         pbdev = S390_PCI_DEVICE(dev);
1044 
1045         /* the allocated idx is actually getting used */
1046         s->next_idx = (pbdev->idx + 1) & FH_MASK_INDEX;
1047         pbdev->fh = pbdev->idx;
1048         QTAILQ_INSERT_TAIL(&s->zpci_devs, pbdev, link);
1049         g_hash_table_insert(s->zpci_table, &pbdev->idx, pbdev);
1050     } else {
1051         g_assert_not_reached();
1052     }
1053 }
1054 
1055 static void s390_pcihost_unplug(HotplugHandler *hotplug_dev, DeviceState *dev,
1056                                 Error **errp)
1057 {
1058     S390pciState *s = S390_PCI_HOST_BRIDGE(hotplug_dev);
1059     S390PCIBusDevice *pbdev = NULL;
1060 
1061     if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_DEVICE)) {
1062         PCIDevice *pci_dev = PCI_DEVICE(dev);
1063         PCIBus *bus;
1064         int32_t devfn;
1065 
1066         pbdev = s390_pci_find_dev_by_pci(s, PCI_DEVICE(dev));
1067         g_assert(pbdev);
1068 
1069         s390_pci_generate_plug_event(HP_EVENT_STANDBY_TO_RESERVED,
1070                                      pbdev->fh, pbdev->fid);
1071         bus = pci_get_bus(pci_dev);
1072         devfn = pci_dev->devfn;
1073         qdev_unrealize(dev);
1074 
1075         s390_pci_msix_free(pbdev);
1076         s390_pci_iommu_free(s, bus, devfn);
1077         pbdev->pdev = NULL;
1078         pbdev->state = ZPCI_FS_RESERVED;
1079     } else if (object_dynamic_cast(OBJECT(dev), TYPE_S390_PCI_DEVICE)) {
1080         pbdev = S390_PCI_DEVICE(dev);
1081         pbdev->fid = 0;
1082         QTAILQ_REMOVE(&s->zpci_devs, pbdev, link);
1083         g_hash_table_remove(s->zpci_table, &pbdev->idx);
1084         if (pbdev->iommu->dma_limit) {
1085             s390_pci_end_dma_count(s, pbdev->iommu->dma_limit);
1086         }
1087         qdev_unrealize(dev);
1088     }
1089 }
1090 
1091 static void s390_pcihost_unplug_request(HotplugHandler *hotplug_dev,
1092                                         DeviceState *dev,
1093                                         Error **errp)
1094 {
1095     S390pciState *s = S390_PCI_HOST_BRIDGE(hotplug_dev);
1096     S390PCIBusDevice *pbdev;
1097 
1098     if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_BRIDGE)) {
1099         error_setg(errp, "PCI bridge hot unplug currently not supported");
1100     } else if (object_dynamic_cast(OBJECT(dev), TYPE_PCI_DEVICE)) {
1101         /*
1102          * Redirect the unplug request to the zPCI device and remember that
1103          * we've checked the PCI device already (to prevent endless recursion).
1104          */
1105         pbdev = s390_pci_find_dev_by_pci(s, PCI_DEVICE(dev));
1106         g_assert(pbdev);
1107         pbdev->pci_unplug_request_processed = true;
1108         qdev_unplug(DEVICE(pbdev), errp);
1109     } else if (object_dynamic_cast(OBJECT(dev), TYPE_S390_PCI_DEVICE)) {
1110         pbdev = S390_PCI_DEVICE(dev);
1111 
1112         /*
1113          * If unplug was initially requested for the zPCI device, we
1114          * first have to redirect to the PCI device, which will in return
1115          * redirect back to us after performing its checks (if the request
1116          * is not blocked, e.g. because it's a PCI bridge).
1117          */
1118         if (pbdev->pdev && !pbdev->pci_unplug_request_processed) {
1119             qdev_unplug(DEVICE(pbdev->pdev), errp);
1120             return;
1121         }
1122         pbdev->pci_unplug_request_processed = false;
1123 
1124         switch (pbdev->state) {
1125         case ZPCI_FS_STANDBY:
1126         case ZPCI_FS_RESERVED:
1127             s390_pci_perform_unplug(pbdev);
1128             break;
1129         default:
1130             /*
1131              * Allow to send multiple requests, e.g. if the guest crashed
1132              * before releasing the device, we would not be able to send
1133              * another request to the same VM (e.g. fresh OS).
1134              */
1135             pbdev->unplug_requested = true;
1136             s390_pci_generate_plug_event(HP_EVENT_DECONFIGURE_REQUEST,
1137                                          pbdev->fh, pbdev->fid);
1138         }
1139     } else {
1140         g_assert_not_reached();
1141     }
1142 }
1143 
1144 static void s390_pci_enumerate_bridge(PCIBus *bus, PCIDevice *pdev,
1145                                       void *opaque)
1146 {
1147     S390pciState *s = opaque;
1148     PCIBus *sec_bus = NULL;
1149 
1150     if ((pci_default_read_config(pdev, PCI_HEADER_TYPE, 1) !=
1151          PCI_HEADER_TYPE_BRIDGE)) {
1152         return;
1153     }
1154 
1155     (s->bus_no)++;
1156     pci_default_write_config(pdev, PCI_PRIMARY_BUS, pci_dev_bus_num(pdev), 1);
1157     pci_default_write_config(pdev, PCI_SECONDARY_BUS, s->bus_no, 1);
1158     pci_default_write_config(pdev, PCI_SUBORDINATE_BUS, s->bus_no, 1);
1159 
1160     sec_bus = pci_bridge_get_sec_bus(PCI_BRIDGE(pdev));
1161     if (!sec_bus) {
1162         return;
1163     }
1164 
1165     /* Assign numbers to all child bridges. The last is the highest number. */
1166     pci_for_each_device(sec_bus, pci_bus_num(sec_bus),
1167                         s390_pci_enumerate_bridge, s);
1168     pci_default_write_config(pdev, PCI_SUBORDINATE_BUS, s->bus_no, 1);
1169 }
1170 
1171 static void s390_pcihost_reset(DeviceState *dev)
1172 {
1173     S390pciState *s = S390_PCI_HOST_BRIDGE(dev);
1174     PCIBus *bus = s->parent_obj.bus;
1175     S390PCIBusDevice *pbdev, *next;
1176 
1177     /* Process all pending unplug requests */
1178     QTAILQ_FOREACH_SAFE(pbdev, &s->zpci_devs, link, next) {
1179         if (pbdev->unplug_requested) {
1180             if (pbdev->summary_ind) {
1181                 pci_dereg_irqs(pbdev);
1182             }
1183             if (pbdev->iommu->enabled) {
1184                 pci_dereg_ioat(pbdev->iommu);
1185             }
1186             pbdev->state = ZPCI_FS_STANDBY;
1187             s390_pci_perform_unplug(pbdev);
1188         }
1189     }
1190 
1191     /*
1192      * When resetting a PCI bridge, the assigned numbers are set to 0. So
1193      * on every system reset, we also have to reassign numbers.
1194      */
1195     s->bus_no = 0;
1196     pci_for_each_device(bus, pci_bus_num(bus), s390_pci_enumerate_bridge, s);
1197 }
1198 
1199 static void s390_pcihost_class_init(ObjectClass *klass, void *data)
1200 {
1201     DeviceClass *dc = DEVICE_CLASS(klass);
1202     HotplugHandlerClass *hc = HOTPLUG_HANDLER_CLASS(klass);
1203 
1204     dc->reset = s390_pcihost_reset;
1205     dc->realize = s390_pcihost_realize;
1206     dc->unrealize = s390_pcihost_unrealize;
1207     hc->pre_plug = s390_pcihost_pre_plug;
1208     hc->plug = s390_pcihost_plug;
1209     hc->unplug_request = s390_pcihost_unplug_request;
1210     hc->unplug = s390_pcihost_unplug;
1211     msi_nonbroken = true;
1212 }
1213 
1214 static const TypeInfo s390_pcihost_info = {
1215     .name          = TYPE_S390_PCI_HOST_BRIDGE,
1216     .parent        = TYPE_PCI_HOST_BRIDGE,
1217     .instance_size = sizeof(S390pciState),
1218     .class_init    = s390_pcihost_class_init,
1219     .interfaces = (InterfaceInfo[]) {
1220         { TYPE_HOTPLUG_HANDLER },
1221         { }
1222     }
1223 };
1224 
1225 static const TypeInfo s390_pcibus_info = {
1226     .name = TYPE_S390_PCI_BUS,
1227     .parent = TYPE_BUS,
1228     .instance_size = sizeof(S390PCIBus),
1229 };
1230 
1231 static uint16_t s390_pci_generate_uid(S390pciState *s)
1232 {
1233     uint16_t uid = 0;
1234 
1235     do {
1236         uid++;
1237         if (!s390_pci_find_dev_by_uid(s, uid)) {
1238             return uid;
1239         }
1240     } while (uid < ZPCI_MAX_UID);
1241 
1242     return UID_UNDEFINED;
1243 }
1244 
1245 static uint32_t s390_pci_generate_fid(S390pciState *s, Error **errp)
1246 {
1247     uint32_t fid = 0;
1248 
1249     do {
1250         if (!s390_pci_find_dev_by_fid(s, fid)) {
1251             return fid;
1252         }
1253     } while (fid++ != ZPCI_MAX_FID);
1254 
1255     error_setg(errp, "no free fid could be found");
1256     return 0;
1257 }
1258 
1259 static void s390_pci_device_realize(DeviceState *dev, Error **errp)
1260 {
1261     S390PCIBusDevice *zpci = S390_PCI_DEVICE(dev);
1262     S390pciState *s = s390_get_phb();
1263 
1264     if (!zpci->target) {
1265         error_setg(errp, "target must be defined");
1266         return;
1267     }
1268 
1269     if (s390_pci_find_dev_by_target(s, zpci->target)) {
1270         error_setg(errp, "target %s already has an associated zpci device",
1271                    zpci->target);
1272         return;
1273     }
1274 
1275     if (zpci->uid == UID_UNDEFINED) {
1276         zpci->uid = s390_pci_generate_uid(s);
1277         if (!zpci->uid) {
1278             error_setg(errp, "no free uid could be found");
1279             return;
1280         }
1281     } else if (s390_pci_find_dev_by_uid(s, zpci->uid)) {
1282         error_setg(errp, "uid %u already in use", zpci->uid);
1283         return;
1284     }
1285 
1286     if (!zpci->fid_defined) {
1287         Error *local_error = NULL;
1288 
1289         zpci->fid = s390_pci_generate_fid(s, &local_error);
1290         if (local_error) {
1291             error_propagate(errp, local_error);
1292             return;
1293         }
1294     } else if (s390_pci_find_dev_by_fid(s, zpci->fid)) {
1295         error_setg(errp, "fid %u already in use", zpci->fid);
1296         return;
1297     }
1298 
1299     zpci->state = ZPCI_FS_RESERVED;
1300     zpci->fmb.format = ZPCI_FMB_FORMAT;
1301 }
1302 
1303 static void s390_pci_device_reset(DeviceState *dev)
1304 {
1305     S390PCIBusDevice *pbdev = S390_PCI_DEVICE(dev);
1306 
1307     switch (pbdev->state) {
1308     case ZPCI_FS_RESERVED:
1309         return;
1310     case ZPCI_FS_STANDBY:
1311         break;
1312     default:
1313         pbdev->fh &= ~FH_MASK_ENABLE;
1314         pbdev->state = ZPCI_FS_DISABLED;
1315         break;
1316     }
1317 
1318     if (pbdev->summary_ind) {
1319         pci_dereg_irqs(pbdev);
1320     }
1321     if (pbdev->iommu->enabled) {
1322         pci_dereg_ioat(pbdev->iommu);
1323     }
1324 
1325     fmb_timer_free(pbdev);
1326 }
1327 
1328 static void s390_pci_get_fid(Object *obj, Visitor *v, const char *name,
1329                          void *opaque, Error **errp)
1330 {
1331     Property *prop = opaque;
1332     uint32_t *ptr = object_field_prop_ptr(obj, prop);
1333 
1334     visit_type_uint32(v, name, ptr, errp);
1335 }
1336 
1337 static void s390_pci_set_fid(Object *obj, Visitor *v, const char *name,
1338                          void *opaque, Error **errp)
1339 {
1340     S390PCIBusDevice *zpci = S390_PCI_DEVICE(obj);
1341     Property *prop = opaque;
1342     uint32_t *ptr = object_field_prop_ptr(obj, prop);
1343 
1344     if (!visit_type_uint32(v, name, ptr, errp)) {
1345         return;
1346     }
1347     zpci->fid_defined = true;
1348 }
1349 
1350 static const PropertyInfo s390_pci_fid_propinfo = {
1351     .name = "zpci_fid",
1352     .get = s390_pci_get_fid,
1353     .set = s390_pci_set_fid,
1354 };
1355 
1356 #define DEFINE_PROP_S390_PCI_FID(_n, _s, _f) \
1357     DEFINE_PROP(_n, _s, _f, s390_pci_fid_propinfo, uint32_t)
1358 
1359 static Property s390_pci_device_properties[] = {
1360     DEFINE_PROP_UINT16("uid", S390PCIBusDevice, uid, UID_UNDEFINED),
1361     DEFINE_PROP_S390_PCI_FID("fid", S390PCIBusDevice, fid),
1362     DEFINE_PROP_STRING("target", S390PCIBusDevice, target),
1363     DEFINE_PROP_END_OF_LIST(),
1364 };
1365 
1366 static const VMStateDescription s390_pci_device_vmstate = {
1367     .name = TYPE_S390_PCI_DEVICE,
1368     /*
1369      * TODO: add state handling here, so migration works at least with
1370      * emulated pci devices on s390x
1371      */
1372     .unmigratable = 1,
1373 };
1374 
1375 static void s390_pci_device_class_init(ObjectClass *klass, void *data)
1376 {
1377     DeviceClass *dc = DEVICE_CLASS(klass);
1378 
1379     dc->desc = "zpci device";
1380     set_bit(DEVICE_CATEGORY_MISC, dc->categories);
1381     dc->reset = s390_pci_device_reset;
1382     dc->bus_type = TYPE_S390_PCI_BUS;
1383     dc->realize = s390_pci_device_realize;
1384     device_class_set_props(dc, s390_pci_device_properties);
1385     dc->vmsd = &s390_pci_device_vmstate;
1386 }
1387 
1388 static const TypeInfo s390_pci_device_info = {
1389     .name = TYPE_S390_PCI_DEVICE,
1390     .parent = TYPE_DEVICE,
1391     .instance_size = sizeof(S390PCIBusDevice),
1392     .class_init = s390_pci_device_class_init,
1393 };
1394 
1395 static TypeInfo s390_pci_iommu_info = {
1396     .name = TYPE_S390_PCI_IOMMU,
1397     .parent = TYPE_OBJECT,
1398     .instance_size = sizeof(S390PCIIOMMU),
1399 };
1400 
1401 static void s390_iommu_memory_region_class_init(ObjectClass *klass, void *data)
1402 {
1403     IOMMUMemoryRegionClass *imrc = IOMMU_MEMORY_REGION_CLASS(klass);
1404 
1405     imrc->translate = s390_translate_iommu;
1406     imrc->replay = s390_pci_iommu_replay;
1407 }
1408 
1409 static const TypeInfo s390_iommu_memory_region_info = {
1410     .parent = TYPE_IOMMU_MEMORY_REGION,
1411     .name = TYPE_S390_IOMMU_MEMORY_REGION,
1412     .class_init = s390_iommu_memory_region_class_init,
1413 };
1414 
1415 static void s390_pci_register_types(void)
1416 {
1417     type_register_static(&s390_pcihost_info);
1418     type_register_static(&s390_pcibus_info);
1419     type_register_static(&s390_pci_device_info);
1420     type_register_static(&s390_pci_iommu_info);
1421     type_register_static(&s390_iommu_memory_region_info);
1422 }
1423 
1424 type_init(s390_pci_register_types)
1425