Loading...
1// SPDX-License-Identifier: GPL-2.0
2/*
3 * PCI Express I/O Virtualization (IOV) support
4 * Address Translation Service 1.0
5 * Page Request Interface added by Joerg Roedel <joerg.roedel@amd.com>
6 * PASID support added by Joerg Roedel <joerg.roedel@amd.com>
7 *
8 * Copyright (C) 2009 Intel Corporation, Yu Zhao <yu.zhao@intel.com>
9 * Copyright (C) 2011 Advanced Micro Devices,
10 */
11
12#include <linux/export.h>
13#include <linux/pci-ats.h>
14#include <linux/pci.h>
15#include <linux/slab.h>
16
17#include "pci.h"
18
19void pci_ats_init(struct pci_dev *dev)
20{
21 int pos;
22
23 if (pci_ats_disabled())
24 return;
25
26 pos = pci_find_ext_capability(dev, PCI_EXT_CAP_ID_ATS);
27 if (!pos)
28 return;
29
30 dev->ats_cap = pos;
31}
32
33/**
34 * pci_enable_ats - enable the ATS capability
35 * @dev: the PCI device
36 * @ps: the IOMMU page shift
37 *
38 * Returns 0 on success, or negative on failure.
39 */
40int pci_enable_ats(struct pci_dev *dev, int ps)
41{
42 u16 ctrl;
43 struct pci_dev *pdev;
44
45 if (!dev->ats_cap)
46 return -EINVAL;
47
48 if (WARN_ON(dev->ats_enabled))
49 return -EBUSY;
50
51 if (ps < PCI_ATS_MIN_STU)
52 return -EINVAL;
53
54 /*
55 * Note that enabling ATS on a VF fails unless it's already enabled
56 * with the same STU on the PF.
57 */
58 ctrl = PCI_ATS_CTRL_ENABLE;
59 if (dev->is_virtfn) {
60 pdev = pci_physfn(dev);
61 if (pdev->ats_stu != ps)
62 return -EINVAL;
63
64 atomic_inc(&pdev->ats_ref_cnt); /* count enabled VFs */
65 } else {
66 dev->ats_stu = ps;
67 ctrl |= PCI_ATS_CTRL_STU(dev->ats_stu - PCI_ATS_MIN_STU);
68 }
69 pci_write_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, ctrl);
70
71 dev->ats_enabled = 1;
72 return 0;
73}
74EXPORT_SYMBOL_GPL(pci_enable_ats);
75
76/**
77 * pci_disable_ats - disable the ATS capability
78 * @dev: the PCI device
79 */
80void pci_disable_ats(struct pci_dev *dev)
81{
82 struct pci_dev *pdev;
83 u16 ctrl;
84
85 if (WARN_ON(!dev->ats_enabled))
86 return;
87
88 if (atomic_read(&dev->ats_ref_cnt))
89 return; /* VFs still enabled */
90
91 if (dev->is_virtfn) {
92 pdev = pci_physfn(dev);
93 atomic_dec(&pdev->ats_ref_cnt);
94 }
95
96 pci_read_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, &ctrl);
97 ctrl &= ~PCI_ATS_CTRL_ENABLE;
98 pci_write_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, ctrl);
99
100 dev->ats_enabled = 0;
101}
102EXPORT_SYMBOL_GPL(pci_disable_ats);
103
104void pci_restore_ats_state(struct pci_dev *dev)
105{
106 u16 ctrl;
107
108 if (!dev->ats_enabled)
109 return;
110
111 ctrl = PCI_ATS_CTRL_ENABLE;
112 if (!dev->is_virtfn)
113 ctrl |= PCI_ATS_CTRL_STU(dev->ats_stu - PCI_ATS_MIN_STU);
114 pci_write_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, ctrl);
115}
116EXPORT_SYMBOL_GPL(pci_restore_ats_state);
117
118/**
119 * pci_ats_queue_depth - query the ATS Invalidate Queue Depth
120 * @dev: the PCI device
121 *
122 * Returns the queue depth on success, or negative on failure.
123 *
124 * The ATS spec uses 0 in the Invalidate Queue Depth field to
125 * indicate that the function can accept 32 Invalidate Request.
126 * But here we use the `real' values (i.e. 1~32) for the Queue
127 * Depth; and 0 indicates the function shares the Queue with
128 * other functions (doesn't exclusively own a Queue).
129 */
130int pci_ats_queue_depth(struct pci_dev *dev)
131{
132 u16 cap;
133
134 if (!dev->ats_cap)
135 return -EINVAL;
136
137 if (dev->is_virtfn)
138 return 0;
139
140 pci_read_config_word(dev, dev->ats_cap + PCI_ATS_CAP, &cap);
141 return PCI_ATS_CAP_QDEP(cap) ? PCI_ATS_CAP_QDEP(cap) : PCI_ATS_MAX_QDEP;
142}
143EXPORT_SYMBOL_GPL(pci_ats_queue_depth);
144
145/**
146 * pci_ats_page_aligned - Return Page Aligned Request bit status.
147 * @pdev: the PCI device
148 *
149 * Returns 1, if the Untranslated Addresses generated by the device
150 * are always aligned or 0 otherwise.
151 *
152 * Per PCIe spec r4.0, sec 10.5.1.2, if the Page Aligned Request bit
153 * is set, it indicates the Untranslated Addresses generated by the
154 * device are always aligned to a 4096 byte boundary.
155 */
156int pci_ats_page_aligned(struct pci_dev *pdev)
157{
158 u16 cap;
159
160 if (!pdev->ats_cap)
161 return 0;
162
163 pci_read_config_word(pdev, pdev->ats_cap + PCI_ATS_CAP, &cap);
164
165 if (cap & PCI_ATS_CAP_PAGE_ALIGNED)
166 return 1;
167
168 return 0;
169}
170EXPORT_SYMBOL_GPL(pci_ats_page_aligned);
171
172#ifdef CONFIG_PCI_PRI
173/**
174 * pci_enable_pri - Enable PRI capability
175 * @ pdev: PCI device structure
176 *
177 * Returns 0 on success, negative value on error
178 */
179int pci_enable_pri(struct pci_dev *pdev, u32 reqs)
180{
181 u16 control, status;
182 u32 max_requests;
183 int pos;
184
185 if (WARN_ON(pdev->pri_enabled))
186 return -EBUSY;
187
188 pos = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PRI);
189 if (!pos)
190 return -EINVAL;
191
192 pci_read_config_word(pdev, pos + PCI_PRI_STATUS, &status);
193 if (!(status & PCI_PRI_STATUS_STOPPED))
194 return -EBUSY;
195
196 pci_read_config_dword(pdev, pos + PCI_PRI_MAX_REQ, &max_requests);
197 reqs = min(max_requests, reqs);
198 pdev->pri_reqs_alloc = reqs;
199 pci_write_config_dword(pdev, pos + PCI_PRI_ALLOC_REQ, reqs);
200
201 control = PCI_PRI_CTRL_ENABLE;
202 pci_write_config_word(pdev, pos + PCI_PRI_CTRL, control);
203
204 pdev->pri_enabled = 1;
205
206 return 0;
207}
208EXPORT_SYMBOL_GPL(pci_enable_pri);
209
210/**
211 * pci_disable_pri - Disable PRI capability
212 * @pdev: PCI device structure
213 *
214 * Only clears the enabled-bit, regardless of its former value
215 */
216void pci_disable_pri(struct pci_dev *pdev)
217{
218 u16 control;
219 int pos;
220
221 if (WARN_ON(!pdev->pri_enabled))
222 return;
223
224 pos = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PRI);
225 if (!pos)
226 return;
227
228 pci_read_config_word(pdev, pos + PCI_PRI_CTRL, &control);
229 control &= ~PCI_PRI_CTRL_ENABLE;
230 pci_write_config_word(pdev, pos + PCI_PRI_CTRL, control);
231
232 pdev->pri_enabled = 0;
233}
234EXPORT_SYMBOL_GPL(pci_disable_pri);
235
236/**
237 * pci_restore_pri_state - Restore PRI
238 * @pdev: PCI device structure
239 */
240void pci_restore_pri_state(struct pci_dev *pdev)
241{
242 u16 control = PCI_PRI_CTRL_ENABLE;
243 u32 reqs = pdev->pri_reqs_alloc;
244 int pos;
245
246 if (!pdev->pri_enabled)
247 return;
248
249 pos = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PRI);
250 if (!pos)
251 return;
252
253 pci_write_config_dword(pdev, pos + PCI_PRI_ALLOC_REQ, reqs);
254 pci_write_config_word(pdev, pos + PCI_PRI_CTRL, control);
255}
256EXPORT_SYMBOL_GPL(pci_restore_pri_state);
257
258/**
259 * pci_reset_pri - Resets device's PRI state
260 * @pdev: PCI device structure
261 *
262 * The PRI capability must be disabled before this function is called.
263 * Returns 0 on success, negative value on error.
264 */
265int pci_reset_pri(struct pci_dev *pdev)
266{
267 u16 control;
268 int pos;
269
270 if (WARN_ON(pdev->pri_enabled))
271 return -EBUSY;
272
273 pos = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PRI);
274 if (!pos)
275 return -EINVAL;
276
277 control = PCI_PRI_CTRL_RESET;
278 pci_write_config_word(pdev, pos + PCI_PRI_CTRL, control);
279
280 return 0;
281}
282EXPORT_SYMBOL_GPL(pci_reset_pri);
283#endif /* CONFIG_PCI_PRI */
284
285#ifdef CONFIG_PCI_PASID
286/**
287 * pci_enable_pasid - Enable the PASID capability
288 * @pdev: PCI device structure
289 * @features: Features to enable
290 *
291 * Returns 0 on success, negative value on error. This function checks
292 * whether the features are actually supported by the device and returns
293 * an error if not.
294 */
295int pci_enable_pasid(struct pci_dev *pdev, int features)
296{
297 u16 control, supported;
298 int pos;
299
300 if (WARN_ON(pdev->pasid_enabled))
301 return -EBUSY;
302
303 if (!pdev->eetlp_prefix_path)
304 return -EINVAL;
305
306 pos = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PASID);
307 if (!pos)
308 return -EINVAL;
309
310 pci_read_config_word(pdev, pos + PCI_PASID_CAP, &supported);
311 supported &= PCI_PASID_CAP_EXEC | PCI_PASID_CAP_PRIV;
312
313 /* User wants to enable anything unsupported? */
314 if ((supported & features) != features)
315 return -EINVAL;
316
317 control = PCI_PASID_CTRL_ENABLE | features;
318 pdev->pasid_features = features;
319
320 pci_write_config_word(pdev, pos + PCI_PASID_CTRL, control);
321
322 pdev->pasid_enabled = 1;
323
324 return 0;
325}
326EXPORT_SYMBOL_GPL(pci_enable_pasid);
327
328/**
329 * pci_disable_pasid - Disable the PASID capability
330 * @pdev: PCI device structure
331 */
332void pci_disable_pasid(struct pci_dev *pdev)
333{
334 u16 control = 0;
335 int pos;
336
337 if (WARN_ON(!pdev->pasid_enabled))
338 return;
339
340 pos = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PASID);
341 if (!pos)
342 return;
343
344 pci_write_config_word(pdev, pos + PCI_PASID_CTRL, control);
345
346 pdev->pasid_enabled = 0;
347}
348EXPORT_SYMBOL_GPL(pci_disable_pasid);
349
350/**
351 * pci_restore_pasid_state - Restore PASID capabilities
352 * @pdev: PCI device structure
353 */
354void pci_restore_pasid_state(struct pci_dev *pdev)
355{
356 u16 control;
357 int pos;
358
359 if (!pdev->pasid_enabled)
360 return;
361
362 pos = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PASID);
363 if (!pos)
364 return;
365
366 control = PCI_PASID_CTRL_ENABLE | pdev->pasid_features;
367 pci_write_config_word(pdev, pos + PCI_PASID_CTRL, control);
368}
369EXPORT_SYMBOL_GPL(pci_restore_pasid_state);
370
371/**
372 * pci_pasid_features - Check which PASID features are supported
373 * @pdev: PCI device structure
374 *
375 * Returns a negative value when no PASI capability is present.
376 * Otherwise is returns a bitmask with supported features. Current
377 * features reported are:
378 * PCI_PASID_CAP_EXEC - Execute permission supported
379 * PCI_PASID_CAP_PRIV - Privileged mode supported
380 */
381int pci_pasid_features(struct pci_dev *pdev)
382{
383 u16 supported;
384 int pos;
385
386 pos = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PASID);
387 if (!pos)
388 return -EINVAL;
389
390 pci_read_config_word(pdev, pos + PCI_PASID_CAP, &supported);
391
392 supported &= PCI_PASID_CAP_EXEC | PCI_PASID_CAP_PRIV;
393
394 return supported;
395}
396EXPORT_SYMBOL_GPL(pci_pasid_features);
397
398/**
399 * pci_prg_resp_pasid_required - Return PRG Response PASID Required bit
400 * status.
401 * @pdev: PCI device structure
402 *
403 * Returns 1 if PASID is required in PRG Response Message, 0 otherwise.
404 *
405 * Even though the PRG response PASID status is read from PRI Status
406 * Register, since this API will mainly be used by PASID users, this
407 * function is defined within #ifdef CONFIG_PCI_PASID instead of
408 * CONFIG_PCI_PRI.
409 */
410int pci_prg_resp_pasid_required(struct pci_dev *pdev)
411{
412 u16 status;
413 int pos;
414
415 pos = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PRI);
416 if (!pos)
417 return 0;
418
419 pci_read_config_word(pdev, pos + PCI_PRI_STATUS, &status);
420
421 if (status & PCI_PRI_STATUS_PASID)
422 return 1;
423
424 return 0;
425}
426EXPORT_SYMBOL_GPL(pci_prg_resp_pasid_required);
427
428#define PASID_NUMBER_SHIFT 8
429#define PASID_NUMBER_MASK (0x1f << PASID_NUMBER_SHIFT)
430/**
431 * pci_max_pasid - Get maximum number of PASIDs supported by device
432 * @pdev: PCI device structure
433 *
434 * Returns negative value when PASID capability is not present.
435 * Otherwise it returns the number of supported PASIDs.
436 */
437int pci_max_pasids(struct pci_dev *pdev)
438{
439 u16 supported;
440 int pos;
441
442 pos = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PASID);
443 if (!pos)
444 return -EINVAL;
445
446 pci_read_config_word(pdev, pos + PCI_PASID_CAP, &supported);
447
448 supported = (supported & PASID_NUMBER_MASK) >> PASID_NUMBER_SHIFT;
449
450 return (1 << supported);
451}
452EXPORT_SYMBOL_GPL(pci_max_pasids);
453#endif /* CONFIG_PCI_PASID */
1// SPDX-License-Identifier: GPL-2.0
2/*
3 * PCI Express I/O Virtualization (IOV) support
4 * Address Translation Service 1.0
5 * Page Request Interface added by Joerg Roedel <joerg.roedel@amd.com>
6 * PASID support added by Joerg Roedel <joerg.roedel@amd.com>
7 *
8 * Copyright (C) 2009 Intel Corporation, Yu Zhao <yu.zhao@intel.com>
9 * Copyright (C) 2011 Advanced Micro Devices,
10 */
11
12#include <linux/bitfield.h>
13#include <linux/export.h>
14#include <linux/pci-ats.h>
15#include <linux/pci.h>
16#include <linux/slab.h>
17
18#include "pci.h"
19
20void pci_ats_init(struct pci_dev *dev)
21{
22 int pos;
23
24 if (pci_ats_disabled())
25 return;
26
27 pos = pci_find_ext_capability(dev, PCI_EXT_CAP_ID_ATS);
28 if (!pos)
29 return;
30
31 dev->ats_cap = pos;
32}
33
34/**
35 * pci_ats_supported - check if the device can use ATS
36 * @dev: the PCI device
37 *
38 * Returns true if the device supports ATS and is allowed to use it, false
39 * otherwise.
40 */
41bool pci_ats_supported(struct pci_dev *dev)
42{
43 if (!dev->ats_cap)
44 return false;
45
46 return (dev->untrusted == 0);
47}
48EXPORT_SYMBOL_GPL(pci_ats_supported);
49
50/**
51 * pci_prepare_ats - Setup the PS for ATS
52 * @dev: the PCI device
53 * @ps: the IOMMU page shift
54 *
55 * This must be done by the IOMMU driver on the PF before any VFs are created to
56 * ensure that the VF can have ATS enabled.
57 *
58 * Returns 0 on success, or negative on failure.
59 */
60int pci_prepare_ats(struct pci_dev *dev, int ps)
61{
62 u16 ctrl;
63
64 if (!pci_ats_supported(dev))
65 return -EINVAL;
66
67 if (WARN_ON(dev->ats_enabled))
68 return -EBUSY;
69
70 if (ps < PCI_ATS_MIN_STU)
71 return -EINVAL;
72
73 if (dev->is_virtfn)
74 return 0;
75
76 dev->ats_stu = ps;
77 ctrl = PCI_ATS_CTRL_STU(dev->ats_stu - PCI_ATS_MIN_STU);
78 pci_write_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, ctrl);
79 return 0;
80}
81EXPORT_SYMBOL_GPL(pci_prepare_ats);
82
83/**
84 * pci_enable_ats - enable the ATS capability
85 * @dev: the PCI device
86 * @ps: the IOMMU page shift
87 *
88 * Returns 0 on success, or negative on failure.
89 */
90int pci_enable_ats(struct pci_dev *dev, int ps)
91{
92 u16 ctrl;
93 struct pci_dev *pdev;
94
95 if (!pci_ats_supported(dev))
96 return -EINVAL;
97
98 if (WARN_ON(dev->ats_enabled))
99 return -EBUSY;
100
101 if (ps < PCI_ATS_MIN_STU)
102 return -EINVAL;
103
104 /*
105 * Note that enabling ATS on a VF fails unless it's already enabled
106 * with the same STU on the PF.
107 */
108 ctrl = PCI_ATS_CTRL_ENABLE;
109 if (dev->is_virtfn) {
110 pdev = pci_physfn(dev);
111 if (pdev->ats_stu != ps)
112 return -EINVAL;
113 } else {
114 dev->ats_stu = ps;
115 ctrl |= PCI_ATS_CTRL_STU(dev->ats_stu - PCI_ATS_MIN_STU);
116 }
117 pci_write_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, ctrl);
118
119 dev->ats_enabled = 1;
120 return 0;
121}
122EXPORT_SYMBOL_GPL(pci_enable_ats);
123
124/**
125 * pci_disable_ats - disable the ATS capability
126 * @dev: the PCI device
127 */
128void pci_disable_ats(struct pci_dev *dev)
129{
130 u16 ctrl;
131
132 if (WARN_ON(!dev->ats_enabled))
133 return;
134
135 pci_read_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, &ctrl);
136 ctrl &= ~PCI_ATS_CTRL_ENABLE;
137 pci_write_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, ctrl);
138
139 dev->ats_enabled = 0;
140}
141EXPORT_SYMBOL_GPL(pci_disable_ats);
142
143void pci_restore_ats_state(struct pci_dev *dev)
144{
145 u16 ctrl;
146
147 if (!dev->ats_enabled)
148 return;
149
150 ctrl = PCI_ATS_CTRL_ENABLE;
151 if (!dev->is_virtfn)
152 ctrl |= PCI_ATS_CTRL_STU(dev->ats_stu - PCI_ATS_MIN_STU);
153 pci_write_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, ctrl);
154}
155
156/**
157 * pci_ats_queue_depth - query the ATS Invalidate Queue Depth
158 * @dev: the PCI device
159 *
160 * Returns the queue depth on success, or negative on failure.
161 *
162 * The ATS spec uses 0 in the Invalidate Queue Depth field to
163 * indicate that the function can accept 32 Invalidate Request.
164 * But here we use the `real' values (i.e. 1~32) for the Queue
165 * Depth; and 0 indicates the function shares the Queue with
166 * other functions (doesn't exclusively own a Queue).
167 */
168int pci_ats_queue_depth(struct pci_dev *dev)
169{
170 u16 cap;
171
172 if (!dev->ats_cap)
173 return -EINVAL;
174
175 if (dev->is_virtfn)
176 return 0;
177
178 pci_read_config_word(dev, dev->ats_cap + PCI_ATS_CAP, &cap);
179 return PCI_ATS_CAP_QDEP(cap) ? PCI_ATS_CAP_QDEP(cap) : PCI_ATS_MAX_QDEP;
180}
181
182/**
183 * pci_ats_page_aligned - Return Page Aligned Request bit status.
184 * @pdev: the PCI device
185 *
186 * Returns 1, if the Untranslated Addresses generated by the device
187 * are always aligned or 0 otherwise.
188 *
189 * Per PCIe spec r4.0, sec 10.5.1.2, if the Page Aligned Request bit
190 * is set, it indicates the Untranslated Addresses generated by the
191 * device are always aligned to a 4096 byte boundary.
192 */
193int pci_ats_page_aligned(struct pci_dev *pdev)
194{
195 u16 cap;
196
197 if (!pdev->ats_cap)
198 return 0;
199
200 pci_read_config_word(pdev, pdev->ats_cap + PCI_ATS_CAP, &cap);
201
202 if (cap & PCI_ATS_CAP_PAGE_ALIGNED)
203 return 1;
204
205 return 0;
206}
207
208#ifdef CONFIG_PCI_PRI
209void pci_pri_init(struct pci_dev *pdev)
210{
211 u16 status;
212
213 pdev->pri_cap = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PRI);
214
215 if (!pdev->pri_cap)
216 return;
217
218 pci_read_config_word(pdev, pdev->pri_cap + PCI_PRI_STATUS, &status);
219 if (status & PCI_PRI_STATUS_PASID)
220 pdev->pasid_required = 1;
221}
222
223/**
224 * pci_enable_pri - Enable PRI capability
225 * @pdev: PCI device structure
226 * @reqs: outstanding requests
227 *
228 * Returns 0 on success, negative value on error
229 */
230int pci_enable_pri(struct pci_dev *pdev, u32 reqs)
231{
232 u16 control, status;
233 u32 max_requests;
234 int pri = pdev->pri_cap;
235
236 /*
237 * VFs must not implement the PRI Capability. If their PF
238 * implements PRI, it is shared by the VFs, so if the PF PRI is
239 * enabled, it is also enabled for the VF.
240 */
241 if (pdev->is_virtfn) {
242 if (pci_physfn(pdev)->pri_enabled)
243 return 0;
244 return -EINVAL;
245 }
246
247 if (WARN_ON(pdev->pri_enabled))
248 return -EBUSY;
249
250 if (!pri)
251 return -EINVAL;
252
253 pci_read_config_word(pdev, pri + PCI_PRI_STATUS, &status);
254 if (!(status & PCI_PRI_STATUS_STOPPED))
255 return -EBUSY;
256
257 pci_read_config_dword(pdev, pri + PCI_PRI_MAX_REQ, &max_requests);
258 reqs = min(max_requests, reqs);
259 pdev->pri_reqs_alloc = reqs;
260 pci_write_config_dword(pdev, pri + PCI_PRI_ALLOC_REQ, reqs);
261
262 control = PCI_PRI_CTRL_ENABLE;
263 pci_write_config_word(pdev, pri + PCI_PRI_CTRL, control);
264
265 pdev->pri_enabled = 1;
266
267 return 0;
268}
269
270/**
271 * pci_disable_pri - Disable PRI capability
272 * @pdev: PCI device structure
273 *
274 * Only clears the enabled-bit, regardless of its former value
275 */
276void pci_disable_pri(struct pci_dev *pdev)
277{
278 u16 control;
279 int pri = pdev->pri_cap;
280
281 /* VFs share the PF PRI */
282 if (pdev->is_virtfn)
283 return;
284
285 if (WARN_ON(!pdev->pri_enabled))
286 return;
287
288 if (!pri)
289 return;
290
291 pci_read_config_word(pdev, pri + PCI_PRI_CTRL, &control);
292 control &= ~PCI_PRI_CTRL_ENABLE;
293 pci_write_config_word(pdev, pri + PCI_PRI_CTRL, control);
294
295 pdev->pri_enabled = 0;
296}
297EXPORT_SYMBOL_GPL(pci_disable_pri);
298
299/**
300 * pci_restore_pri_state - Restore PRI
301 * @pdev: PCI device structure
302 */
303void pci_restore_pri_state(struct pci_dev *pdev)
304{
305 u16 control = PCI_PRI_CTRL_ENABLE;
306 u32 reqs = pdev->pri_reqs_alloc;
307 int pri = pdev->pri_cap;
308
309 if (pdev->is_virtfn)
310 return;
311
312 if (!pdev->pri_enabled)
313 return;
314
315 if (!pri)
316 return;
317
318 pci_write_config_dword(pdev, pri + PCI_PRI_ALLOC_REQ, reqs);
319 pci_write_config_word(pdev, pri + PCI_PRI_CTRL, control);
320}
321
322/**
323 * pci_reset_pri - Resets device's PRI state
324 * @pdev: PCI device structure
325 *
326 * The PRI capability must be disabled before this function is called.
327 * Returns 0 on success, negative value on error.
328 */
329int pci_reset_pri(struct pci_dev *pdev)
330{
331 u16 control;
332 int pri = pdev->pri_cap;
333
334 if (pdev->is_virtfn)
335 return 0;
336
337 if (WARN_ON(pdev->pri_enabled))
338 return -EBUSY;
339
340 if (!pri)
341 return -EINVAL;
342
343 control = PCI_PRI_CTRL_RESET;
344 pci_write_config_word(pdev, pri + PCI_PRI_CTRL, control);
345
346 return 0;
347}
348
349/**
350 * pci_prg_resp_pasid_required - Return PRG Response PASID Required bit
351 * status.
352 * @pdev: PCI device structure
353 *
354 * Returns 1 if PASID is required in PRG Response Message, 0 otherwise.
355 */
356int pci_prg_resp_pasid_required(struct pci_dev *pdev)
357{
358 if (pdev->is_virtfn)
359 pdev = pci_physfn(pdev);
360
361 return pdev->pasid_required;
362}
363
364/**
365 * pci_pri_supported - Check if PRI is supported.
366 * @pdev: PCI device structure
367 *
368 * Returns true if PRI capability is present, false otherwise.
369 */
370bool pci_pri_supported(struct pci_dev *pdev)
371{
372 /* VFs share the PF PRI */
373 if (pci_physfn(pdev)->pri_cap)
374 return true;
375 return false;
376}
377EXPORT_SYMBOL_GPL(pci_pri_supported);
378#endif /* CONFIG_PCI_PRI */
379
380#ifdef CONFIG_PCI_PASID
381void pci_pasid_init(struct pci_dev *pdev)
382{
383 pdev->pasid_cap = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PASID);
384}
385
386/**
387 * pci_enable_pasid - Enable the PASID capability
388 * @pdev: PCI device structure
389 * @features: Features to enable
390 *
391 * Returns 0 on success, negative value on error. This function checks
392 * whether the features are actually supported by the device and returns
393 * an error if not.
394 */
395int pci_enable_pasid(struct pci_dev *pdev, int features)
396{
397 u16 control, supported;
398 int pasid = pdev->pasid_cap;
399
400 /*
401 * VFs must not implement the PASID Capability, but if a PF
402 * supports PASID, its VFs share the PF PASID configuration.
403 */
404 if (pdev->is_virtfn) {
405 if (pci_physfn(pdev)->pasid_enabled)
406 return 0;
407 return -EINVAL;
408 }
409
410 if (WARN_ON(pdev->pasid_enabled))
411 return -EBUSY;
412
413 if (!pdev->eetlp_prefix_path && !pdev->pasid_no_tlp)
414 return -EINVAL;
415
416 if (!pasid)
417 return -EINVAL;
418
419 if (!pci_acs_path_enabled(pdev, NULL, PCI_ACS_RR | PCI_ACS_UF))
420 return -EINVAL;
421
422 pci_read_config_word(pdev, pasid + PCI_PASID_CAP, &supported);
423 supported &= PCI_PASID_CAP_EXEC | PCI_PASID_CAP_PRIV;
424
425 /* User wants to enable anything unsupported? */
426 if ((supported & features) != features)
427 return -EINVAL;
428
429 control = PCI_PASID_CTRL_ENABLE | features;
430 pdev->pasid_features = features;
431
432 pci_write_config_word(pdev, pasid + PCI_PASID_CTRL, control);
433
434 pdev->pasid_enabled = 1;
435
436 return 0;
437}
438EXPORT_SYMBOL_GPL(pci_enable_pasid);
439
440/**
441 * pci_disable_pasid - Disable the PASID capability
442 * @pdev: PCI device structure
443 */
444void pci_disable_pasid(struct pci_dev *pdev)
445{
446 u16 control = 0;
447 int pasid = pdev->pasid_cap;
448
449 /* VFs share the PF PASID configuration */
450 if (pdev->is_virtfn)
451 return;
452
453 if (WARN_ON(!pdev->pasid_enabled))
454 return;
455
456 if (!pasid)
457 return;
458
459 pci_write_config_word(pdev, pasid + PCI_PASID_CTRL, control);
460
461 pdev->pasid_enabled = 0;
462}
463EXPORT_SYMBOL_GPL(pci_disable_pasid);
464
465/**
466 * pci_restore_pasid_state - Restore PASID capabilities
467 * @pdev: PCI device structure
468 */
469void pci_restore_pasid_state(struct pci_dev *pdev)
470{
471 u16 control;
472 int pasid = pdev->pasid_cap;
473
474 if (pdev->is_virtfn)
475 return;
476
477 if (!pdev->pasid_enabled)
478 return;
479
480 if (!pasid)
481 return;
482
483 control = PCI_PASID_CTRL_ENABLE | pdev->pasid_features;
484 pci_write_config_word(pdev, pasid + PCI_PASID_CTRL, control);
485}
486
487/**
488 * pci_pasid_features - Check which PASID features are supported
489 * @pdev: PCI device structure
490 *
491 * Return a negative value when no PASID capability is present.
492 * Otherwise return a bitmask with supported features. Current
493 * features reported are:
494 * PCI_PASID_CAP_EXEC - Execute permission supported
495 * PCI_PASID_CAP_PRIV - Privileged mode supported
496 */
497int pci_pasid_features(struct pci_dev *pdev)
498{
499 u16 supported;
500 int pasid;
501
502 if (pdev->is_virtfn)
503 pdev = pci_physfn(pdev);
504
505 pasid = pdev->pasid_cap;
506 if (!pasid)
507 return -EINVAL;
508
509 pci_read_config_word(pdev, pasid + PCI_PASID_CAP, &supported);
510
511 supported &= PCI_PASID_CAP_EXEC | PCI_PASID_CAP_PRIV;
512
513 return supported;
514}
515EXPORT_SYMBOL_GPL(pci_pasid_features);
516
517/**
518 * pci_max_pasids - Get maximum number of PASIDs supported by device
519 * @pdev: PCI device structure
520 *
521 * Returns negative value when PASID capability is not present.
522 * Otherwise it returns the number of supported PASIDs.
523 */
524int pci_max_pasids(struct pci_dev *pdev)
525{
526 u16 supported;
527 int pasid;
528
529 if (pdev->is_virtfn)
530 pdev = pci_physfn(pdev);
531
532 pasid = pdev->pasid_cap;
533 if (!pasid)
534 return -EINVAL;
535
536 pci_read_config_word(pdev, pasid + PCI_PASID_CAP, &supported);
537
538 return (1 << FIELD_GET(PCI_PASID_CAP_WIDTH, supported));
539}
540EXPORT_SYMBOL_GPL(pci_max_pasids);
541#endif /* CONFIG_PCI_PASID */