162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Volume Management Device driver 462306a36Sopenharmony_ci * Copyright (c) 2015, Intel Corporation. 562306a36Sopenharmony_ci */ 662306a36Sopenharmony_ci 762306a36Sopenharmony_ci#include <linux/device.h> 862306a36Sopenharmony_ci#include <linux/interrupt.h> 962306a36Sopenharmony_ci#include <linux/irq.h> 1062306a36Sopenharmony_ci#include <linux/kernel.h> 1162306a36Sopenharmony_ci#include <linux/module.h> 1262306a36Sopenharmony_ci#include <linux/msi.h> 1362306a36Sopenharmony_ci#include <linux/pci.h> 1462306a36Sopenharmony_ci#include <linux/pci-acpi.h> 1562306a36Sopenharmony_ci#include <linux/pci-ecam.h> 1662306a36Sopenharmony_ci#include <linux/srcu.h> 1762306a36Sopenharmony_ci#include <linux/rculist.h> 1862306a36Sopenharmony_ci#include <linux/rcupdate.h> 1962306a36Sopenharmony_ci 2062306a36Sopenharmony_ci#include <asm/irqdomain.h> 2162306a36Sopenharmony_ci 2262306a36Sopenharmony_ci#define VMD_CFGBAR 0 2362306a36Sopenharmony_ci#define VMD_MEMBAR1 2 2462306a36Sopenharmony_ci#define VMD_MEMBAR2 4 2562306a36Sopenharmony_ci 2662306a36Sopenharmony_ci#define PCI_REG_VMCAP 0x40 2762306a36Sopenharmony_ci#define BUS_RESTRICT_CAP(vmcap) (vmcap & 0x1) 2862306a36Sopenharmony_ci#define PCI_REG_VMCONFIG 0x44 2962306a36Sopenharmony_ci#define BUS_RESTRICT_CFG(vmcfg) ((vmcfg >> 8) & 0x3) 3062306a36Sopenharmony_ci#define VMCONFIG_MSI_REMAP 0x2 3162306a36Sopenharmony_ci#define PCI_REG_VMLOCK 0x70 3262306a36Sopenharmony_ci#define MB2_SHADOW_EN(vmlock) (vmlock & 0x2) 3362306a36Sopenharmony_ci 3462306a36Sopenharmony_ci#define MB2_SHADOW_OFFSET 0x2000 3562306a36Sopenharmony_ci#define MB2_SHADOW_SIZE 16 3662306a36Sopenharmony_ci 3762306a36Sopenharmony_cienum vmd_features { 3862306a36Sopenharmony_ci /* 3962306a36Sopenharmony_ci * Device may contain registers which hint the physical location of the 4062306a36Sopenharmony_ci * membars, in order to allow proper address translation during 4162306a36Sopenharmony_ci * resource assignment to enable guest virtualization 4262306a36Sopenharmony_ci */ 4362306a36Sopenharmony_ci VMD_FEAT_HAS_MEMBAR_SHADOW = (1 << 0), 4462306a36Sopenharmony_ci 4562306a36Sopenharmony_ci /* 4662306a36Sopenharmony_ci * Device may provide root port configuration information which limits 4762306a36Sopenharmony_ci * bus numbering 4862306a36Sopenharmony_ci */ 4962306a36Sopenharmony_ci VMD_FEAT_HAS_BUS_RESTRICTIONS = (1 << 1), 5062306a36Sopenharmony_ci 5162306a36Sopenharmony_ci /* 5262306a36Sopenharmony_ci * Device contains physical location shadow registers in 5362306a36Sopenharmony_ci * vendor-specific capability space 5462306a36Sopenharmony_ci */ 5562306a36Sopenharmony_ci VMD_FEAT_HAS_MEMBAR_SHADOW_VSCAP = (1 << 2), 5662306a36Sopenharmony_ci 5762306a36Sopenharmony_ci /* 5862306a36Sopenharmony_ci * Device may use MSI-X vector 0 for software triggering and will not 5962306a36Sopenharmony_ci * be used for MSI remapping 6062306a36Sopenharmony_ci */ 6162306a36Sopenharmony_ci VMD_FEAT_OFFSET_FIRST_VECTOR = (1 << 3), 6262306a36Sopenharmony_ci 6362306a36Sopenharmony_ci /* 6462306a36Sopenharmony_ci * Device can bypass remapping MSI-X transactions into its MSI-X table, 6562306a36Sopenharmony_ci * avoiding the requirement of a VMD MSI domain for child device 6662306a36Sopenharmony_ci * interrupt handling. 6762306a36Sopenharmony_ci */ 6862306a36Sopenharmony_ci VMD_FEAT_CAN_BYPASS_MSI_REMAP = (1 << 4), 6962306a36Sopenharmony_ci 7062306a36Sopenharmony_ci /* 7162306a36Sopenharmony_ci * Enable ASPM on the PCIE root ports and set the default LTR of the 7262306a36Sopenharmony_ci * storage devices on platforms where these values are not configured by 7362306a36Sopenharmony_ci * BIOS. This is needed for laptops, which require these settings for 7462306a36Sopenharmony_ci * proper power management of the SoC. 7562306a36Sopenharmony_ci */ 7662306a36Sopenharmony_ci VMD_FEAT_BIOS_PM_QUIRK = (1 << 5), 7762306a36Sopenharmony_ci}; 7862306a36Sopenharmony_ci 7962306a36Sopenharmony_ci#define VMD_BIOS_PM_QUIRK_LTR 0x1003 /* 3145728 ns */ 8062306a36Sopenharmony_ci 8162306a36Sopenharmony_ci#define VMD_FEATS_CLIENT (VMD_FEAT_HAS_MEMBAR_SHADOW_VSCAP | \ 8262306a36Sopenharmony_ci VMD_FEAT_HAS_BUS_RESTRICTIONS | \ 8362306a36Sopenharmony_ci VMD_FEAT_OFFSET_FIRST_VECTOR | \ 8462306a36Sopenharmony_ci VMD_FEAT_BIOS_PM_QUIRK) 8562306a36Sopenharmony_ci 8662306a36Sopenharmony_cistatic DEFINE_IDA(vmd_instance_ida); 8762306a36Sopenharmony_ci 8862306a36Sopenharmony_ci/* 8962306a36Sopenharmony_ci * Lock for manipulating VMD IRQ lists. 9062306a36Sopenharmony_ci */ 9162306a36Sopenharmony_cistatic DEFINE_RAW_SPINLOCK(list_lock); 9262306a36Sopenharmony_ci 9362306a36Sopenharmony_ci/** 9462306a36Sopenharmony_ci * struct vmd_irq - private data to map driver IRQ to the VMD shared vector 9562306a36Sopenharmony_ci * @node: list item for parent traversal. 9662306a36Sopenharmony_ci * @irq: back pointer to parent. 9762306a36Sopenharmony_ci * @enabled: true if driver enabled IRQ 9862306a36Sopenharmony_ci * @virq: the virtual IRQ value provided to the requesting driver. 9962306a36Sopenharmony_ci * 10062306a36Sopenharmony_ci * Every MSI/MSI-X IRQ requested for a device in a VMD domain will be mapped to 10162306a36Sopenharmony_ci * a VMD IRQ using this structure. 10262306a36Sopenharmony_ci */ 10362306a36Sopenharmony_cistruct vmd_irq { 10462306a36Sopenharmony_ci struct list_head node; 10562306a36Sopenharmony_ci struct vmd_irq_list *irq; 10662306a36Sopenharmony_ci bool enabled; 10762306a36Sopenharmony_ci unsigned int virq; 10862306a36Sopenharmony_ci}; 10962306a36Sopenharmony_ci 11062306a36Sopenharmony_ci/** 11162306a36Sopenharmony_ci * struct vmd_irq_list - list of driver requested IRQs mapping to a VMD vector 11262306a36Sopenharmony_ci * @irq_list: the list of irq's the VMD one demuxes to. 11362306a36Sopenharmony_ci * @srcu: SRCU struct for local synchronization. 11462306a36Sopenharmony_ci * @count: number of child IRQs assigned to this vector; used to track 11562306a36Sopenharmony_ci * sharing. 11662306a36Sopenharmony_ci * @virq: The underlying VMD Linux interrupt number 11762306a36Sopenharmony_ci */ 11862306a36Sopenharmony_cistruct vmd_irq_list { 11962306a36Sopenharmony_ci struct list_head irq_list; 12062306a36Sopenharmony_ci struct srcu_struct srcu; 12162306a36Sopenharmony_ci unsigned int count; 12262306a36Sopenharmony_ci unsigned int virq; 12362306a36Sopenharmony_ci}; 12462306a36Sopenharmony_ci 12562306a36Sopenharmony_cistruct vmd_dev { 12662306a36Sopenharmony_ci struct pci_dev *dev; 12762306a36Sopenharmony_ci 12862306a36Sopenharmony_ci spinlock_t cfg_lock; 12962306a36Sopenharmony_ci void __iomem *cfgbar; 13062306a36Sopenharmony_ci 13162306a36Sopenharmony_ci int msix_count; 13262306a36Sopenharmony_ci struct vmd_irq_list *irqs; 13362306a36Sopenharmony_ci 13462306a36Sopenharmony_ci struct pci_sysdata sysdata; 13562306a36Sopenharmony_ci struct resource resources[3]; 13662306a36Sopenharmony_ci struct irq_domain *irq_domain; 13762306a36Sopenharmony_ci struct pci_bus *bus; 13862306a36Sopenharmony_ci u8 busn_start; 13962306a36Sopenharmony_ci u8 first_vec; 14062306a36Sopenharmony_ci char *name; 14162306a36Sopenharmony_ci int instance; 14262306a36Sopenharmony_ci}; 14362306a36Sopenharmony_ci 14462306a36Sopenharmony_cistatic inline struct vmd_dev *vmd_from_bus(struct pci_bus *bus) 14562306a36Sopenharmony_ci{ 14662306a36Sopenharmony_ci return container_of(bus->sysdata, struct vmd_dev, sysdata); 14762306a36Sopenharmony_ci} 14862306a36Sopenharmony_ci 14962306a36Sopenharmony_cistatic inline unsigned int index_from_irqs(struct vmd_dev *vmd, 15062306a36Sopenharmony_ci struct vmd_irq_list *irqs) 15162306a36Sopenharmony_ci{ 15262306a36Sopenharmony_ci return irqs - vmd->irqs; 15362306a36Sopenharmony_ci} 15462306a36Sopenharmony_ci 15562306a36Sopenharmony_ci/* 15662306a36Sopenharmony_ci * Drivers managing a device in a VMD domain allocate their own IRQs as before, 15762306a36Sopenharmony_ci * but the MSI entry for the hardware it's driving will be programmed with a 15862306a36Sopenharmony_ci * destination ID for the VMD MSI-X table. The VMD muxes interrupts in its 15962306a36Sopenharmony_ci * domain into one of its own, and the VMD driver de-muxes these for the 16062306a36Sopenharmony_ci * handlers sharing that VMD IRQ. The vmd irq_domain provides the operations 16162306a36Sopenharmony_ci * and irq_chip to set this up. 16262306a36Sopenharmony_ci */ 16362306a36Sopenharmony_cistatic void vmd_compose_msi_msg(struct irq_data *data, struct msi_msg *msg) 16462306a36Sopenharmony_ci{ 16562306a36Sopenharmony_ci struct vmd_irq *vmdirq = data->chip_data; 16662306a36Sopenharmony_ci struct vmd_irq_list *irq = vmdirq->irq; 16762306a36Sopenharmony_ci struct vmd_dev *vmd = irq_data_get_irq_handler_data(data); 16862306a36Sopenharmony_ci 16962306a36Sopenharmony_ci memset(msg, 0, sizeof(*msg)); 17062306a36Sopenharmony_ci msg->address_hi = X86_MSI_BASE_ADDRESS_HIGH; 17162306a36Sopenharmony_ci msg->arch_addr_lo.base_address = X86_MSI_BASE_ADDRESS_LOW; 17262306a36Sopenharmony_ci msg->arch_addr_lo.destid_0_7 = index_from_irqs(vmd, irq); 17362306a36Sopenharmony_ci} 17462306a36Sopenharmony_ci 17562306a36Sopenharmony_ci/* 17662306a36Sopenharmony_ci * We rely on MSI_FLAG_USE_DEF_CHIP_OPS to set the IRQ mask/unmask ops. 17762306a36Sopenharmony_ci */ 17862306a36Sopenharmony_cistatic void vmd_irq_enable(struct irq_data *data) 17962306a36Sopenharmony_ci{ 18062306a36Sopenharmony_ci struct vmd_irq *vmdirq = data->chip_data; 18162306a36Sopenharmony_ci unsigned long flags; 18262306a36Sopenharmony_ci 18362306a36Sopenharmony_ci raw_spin_lock_irqsave(&list_lock, flags); 18462306a36Sopenharmony_ci WARN_ON(vmdirq->enabled); 18562306a36Sopenharmony_ci list_add_tail_rcu(&vmdirq->node, &vmdirq->irq->irq_list); 18662306a36Sopenharmony_ci vmdirq->enabled = true; 18762306a36Sopenharmony_ci raw_spin_unlock_irqrestore(&list_lock, flags); 18862306a36Sopenharmony_ci 18962306a36Sopenharmony_ci data->chip->irq_unmask(data); 19062306a36Sopenharmony_ci} 19162306a36Sopenharmony_ci 19262306a36Sopenharmony_cistatic void vmd_irq_disable(struct irq_data *data) 19362306a36Sopenharmony_ci{ 19462306a36Sopenharmony_ci struct vmd_irq *vmdirq = data->chip_data; 19562306a36Sopenharmony_ci unsigned long flags; 19662306a36Sopenharmony_ci 19762306a36Sopenharmony_ci data->chip->irq_mask(data); 19862306a36Sopenharmony_ci 19962306a36Sopenharmony_ci raw_spin_lock_irqsave(&list_lock, flags); 20062306a36Sopenharmony_ci if (vmdirq->enabled) { 20162306a36Sopenharmony_ci list_del_rcu(&vmdirq->node); 20262306a36Sopenharmony_ci vmdirq->enabled = false; 20362306a36Sopenharmony_ci } 20462306a36Sopenharmony_ci raw_spin_unlock_irqrestore(&list_lock, flags); 20562306a36Sopenharmony_ci} 20662306a36Sopenharmony_ci 20762306a36Sopenharmony_ci/* 20862306a36Sopenharmony_ci * XXX: Stubbed until we develop acceptable way to not create conflicts with 20962306a36Sopenharmony_ci * other devices sharing the same vector. 21062306a36Sopenharmony_ci */ 21162306a36Sopenharmony_cistatic int vmd_irq_set_affinity(struct irq_data *data, 21262306a36Sopenharmony_ci const struct cpumask *dest, bool force) 21362306a36Sopenharmony_ci{ 21462306a36Sopenharmony_ci return -EINVAL; 21562306a36Sopenharmony_ci} 21662306a36Sopenharmony_ci 21762306a36Sopenharmony_cistatic struct irq_chip vmd_msi_controller = { 21862306a36Sopenharmony_ci .name = "VMD-MSI", 21962306a36Sopenharmony_ci .irq_enable = vmd_irq_enable, 22062306a36Sopenharmony_ci .irq_disable = vmd_irq_disable, 22162306a36Sopenharmony_ci .irq_compose_msi_msg = vmd_compose_msi_msg, 22262306a36Sopenharmony_ci .irq_set_affinity = vmd_irq_set_affinity, 22362306a36Sopenharmony_ci}; 22462306a36Sopenharmony_ci 22562306a36Sopenharmony_cistatic irq_hw_number_t vmd_get_hwirq(struct msi_domain_info *info, 22662306a36Sopenharmony_ci msi_alloc_info_t *arg) 22762306a36Sopenharmony_ci{ 22862306a36Sopenharmony_ci return 0; 22962306a36Sopenharmony_ci} 23062306a36Sopenharmony_ci 23162306a36Sopenharmony_ci/* 23262306a36Sopenharmony_ci * XXX: We can be even smarter selecting the best IRQ once we solve the 23362306a36Sopenharmony_ci * affinity problem. 23462306a36Sopenharmony_ci */ 23562306a36Sopenharmony_cistatic struct vmd_irq_list *vmd_next_irq(struct vmd_dev *vmd, struct msi_desc *desc) 23662306a36Sopenharmony_ci{ 23762306a36Sopenharmony_ci unsigned long flags; 23862306a36Sopenharmony_ci int i, best; 23962306a36Sopenharmony_ci 24062306a36Sopenharmony_ci if (vmd->msix_count == 1 + vmd->first_vec) 24162306a36Sopenharmony_ci return &vmd->irqs[vmd->first_vec]; 24262306a36Sopenharmony_ci 24362306a36Sopenharmony_ci /* 24462306a36Sopenharmony_ci * White list for fast-interrupt handlers. All others will share the 24562306a36Sopenharmony_ci * "slow" interrupt vector. 24662306a36Sopenharmony_ci */ 24762306a36Sopenharmony_ci switch (msi_desc_to_pci_dev(desc)->class) { 24862306a36Sopenharmony_ci case PCI_CLASS_STORAGE_EXPRESS: 24962306a36Sopenharmony_ci break; 25062306a36Sopenharmony_ci default: 25162306a36Sopenharmony_ci return &vmd->irqs[vmd->first_vec]; 25262306a36Sopenharmony_ci } 25362306a36Sopenharmony_ci 25462306a36Sopenharmony_ci raw_spin_lock_irqsave(&list_lock, flags); 25562306a36Sopenharmony_ci best = vmd->first_vec + 1; 25662306a36Sopenharmony_ci for (i = best; i < vmd->msix_count; i++) 25762306a36Sopenharmony_ci if (vmd->irqs[i].count < vmd->irqs[best].count) 25862306a36Sopenharmony_ci best = i; 25962306a36Sopenharmony_ci vmd->irqs[best].count++; 26062306a36Sopenharmony_ci raw_spin_unlock_irqrestore(&list_lock, flags); 26162306a36Sopenharmony_ci 26262306a36Sopenharmony_ci return &vmd->irqs[best]; 26362306a36Sopenharmony_ci} 26462306a36Sopenharmony_ci 26562306a36Sopenharmony_cistatic int vmd_msi_init(struct irq_domain *domain, struct msi_domain_info *info, 26662306a36Sopenharmony_ci unsigned int virq, irq_hw_number_t hwirq, 26762306a36Sopenharmony_ci msi_alloc_info_t *arg) 26862306a36Sopenharmony_ci{ 26962306a36Sopenharmony_ci struct msi_desc *desc = arg->desc; 27062306a36Sopenharmony_ci struct vmd_dev *vmd = vmd_from_bus(msi_desc_to_pci_dev(desc)->bus); 27162306a36Sopenharmony_ci struct vmd_irq *vmdirq = kzalloc(sizeof(*vmdirq), GFP_KERNEL); 27262306a36Sopenharmony_ci 27362306a36Sopenharmony_ci if (!vmdirq) 27462306a36Sopenharmony_ci return -ENOMEM; 27562306a36Sopenharmony_ci 27662306a36Sopenharmony_ci INIT_LIST_HEAD(&vmdirq->node); 27762306a36Sopenharmony_ci vmdirq->irq = vmd_next_irq(vmd, desc); 27862306a36Sopenharmony_ci vmdirq->virq = virq; 27962306a36Sopenharmony_ci 28062306a36Sopenharmony_ci irq_domain_set_info(domain, virq, vmdirq->irq->virq, info->chip, vmdirq, 28162306a36Sopenharmony_ci handle_untracked_irq, vmd, NULL); 28262306a36Sopenharmony_ci return 0; 28362306a36Sopenharmony_ci} 28462306a36Sopenharmony_ci 28562306a36Sopenharmony_cistatic void vmd_msi_free(struct irq_domain *domain, 28662306a36Sopenharmony_ci struct msi_domain_info *info, unsigned int virq) 28762306a36Sopenharmony_ci{ 28862306a36Sopenharmony_ci struct vmd_irq *vmdirq = irq_get_chip_data(virq); 28962306a36Sopenharmony_ci unsigned long flags; 29062306a36Sopenharmony_ci 29162306a36Sopenharmony_ci synchronize_srcu(&vmdirq->irq->srcu); 29262306a36Sopenharmony_ci 29362306a36Sopenharmony_ci /* XXX: Potential optimization to rebalance */ 29462306a36Sopenharmony_ci raw_spin_lock_irqsave(&list_lock, flags); 29562306a36Sopenharmony_ci vmdirq->irq->count--; 29662306a36Sopenharmony_ci raw_spin_unlock_irqrestore(&list_lock, flags); 29762306a36Sopenharmony_ci 29862306a36Sopenharmony_ci kfree(vmdirq); 29962306a36Sopenharmony_ci} 30062306a36Sopenharmony_ci 30162306a36Sopenharmony_cistatic int vmd_msi_prepare(struct irq_domain *domain, struct device *dev, 30262306a36Sopenharmony_ci int nvec, msi_alloc_info_t *arg) 30362306a36Sopenharmony_ci{ 30462306a36Sopenharmony_ci struct pci_dev *pdev = to_pci_dev(dev); 30562306a36Sopenharmony_ci struct vmd_dev *vmd = vmd_from_bus(pdev->bus); 30662306a36Sopenharmony_ci 30762306a36Sopenharmony_ci if (nvec > vmd->msix_count) 30862306a36Sopenharmony_ci return vmd->msix_count; 30962306a36Sopenharmony_ci 31062306a36Sopenharmony_ci memset(arg, 0, sizeof(*arg)); 31162306a36Sopenharmony_ci return 0; 31262306a36Sopenharmony_ci} 31362306a36Sopenharmony_ci 31462306a36Sopenharmony_cistatic void vmd_set_desc(msi_alloc_info_t *arg, struct msi_desc *desc) 31562306a36Sopenharmony_ci{ 31662306a36Sopenharmony_ci arg->desc = desc; 31762306a36Sopenharmony_ci} 31862306a36Sopenharmony_ci 31962306a36Sopenharmony_cistatic struct msi_domain_ops vmd_msi_domain_ops = { 32062306a36Sopenharmony_ci .get_hwirq = vmd_get_hwirq, 32162306a36Sopenharmony_ci .msi_init = vmd_msi_init, 32262306a36Sopenharmony_ci .msi_free = vmd_msi_free, 32362306a36Sopenharmony_ci .msi_prepare = vmd_msi_prepare, 32462306a36Sopenharmony_ci .set_desc = vmd_set_desc, 32562306a36Sopenharmony_ci}; 32662306a36Sopenharmony_ci 32762306a36Sopenharmony_cistatic struct msi_domain_info vmd_msi_domain_info = { 32862306a36Sopenharmony_ci .flags = MSI_FLAG_USE_DEF_DOM_OPS | MSI_FLAG_USE_DEF_CHIP_OPS | 32962306a36Sopenharmony_ci MSI_FLAG_PCI_MSIX, 33062306a36Sopenharmony_ci .ops = &vmd_msi_domain_ops, 33162306a36Sopenharmony_ci .chip = &vmd_msi_controller, 33262306a36Sopenharmony_ci}; 33362306a36Sopenharmony_ci 33462306a36Sopenharmony_cistatic void vmd_set_msi_remapping(struct vmd_dev *vmd, bool enable) 33562306a36Sopenharmony_ci{ 33662306a36Sopenharmony_ci u16 reg; 33762306a36Sopenharmony_ci 33862306a36Sopenharmony_ci pci_read_config_word(vmd->dev, PCI_REG_VMCONFIG, ®); 33962306a36Sopenharmony_ci reg = enable ? (reg & ~VMCONFIG_MSI_REMAP) : 34062306a36Sopenharmony_ci (reg | VMCONFIG_MSI_REMAP); 34162306a36Sopenharmony_ci pci_write_config_word(vmd->dev, PCI_REG_VMCONFIG, reg); 34262306a36Sopenharmony_ci} 34362306a36Sopenharmony_ci 34462306a36Sopenharmony_cistatic int vmd_create_irq_domain(struct vmd_dev *vmd) 34562306a36Sopenharmony_ci{ 34662306a36Sopenharmony_ci struct fwnode_handle *fn; 34762306a36Sopenharmony_ci 34862306a36Sopenharmony_ci fn = irq_domain_alloc_named_id_fwnode("VMD-MSI", vmd->sysdata.domain); 34962306a36Sopenharmony_ci if (!fn) 35062306a36Sopenharmony_ci return -ENODEV; 35162306a36Sopenharmony_ci 35262306a36Sopenharmony_ci vmd->irq_domain = pci_msi_create_irq_domain(fn, &vmd_msi_domain_info, NULL); 35362306a36Sopenharmony_ci if (!vmd->irq_domain) { 35462306a36Sopenharmony_ci irq_domain_free_fwnode(fn); 35562306a36Sopenharmony_ci return -ENODEV; 35662306a36Sopenharmony_ci } 35762306a36Sopenharmony_ci 35862306a36Sopenharmony_ci return 0; 35962306a36Sopenharmony_ci} 36062306a36Sopenharmony_ci 36162306a36Sopenharmony_cistatic void vmd_remove_irq_domain(struct vmd_dev *vmd) 36262306a36Sopenharmony_ci{ 36362306a36Sopenharmony_ci /* 36462306a36Sopenharmony_ci * Some production BIOS won't enable remapping between soft reboots. 36562306a36Sopenharmony_ci * Ensure remapping is restored before unloading the driver. 36662306a36Sopenharmony_ci */ 36762306a36Sopenharmony_ci if (!vmd->msix_count) 36862306a36Sopenharmony_ci vmd_set_msi_remapping(vmd, true); 36962306a36Sopenharmony_ci 37062306a36Sopenharmony_ci if (vmd->irq_domain) { 37162306a36Sopenharmony_ci struct fwnode_handle *fn = vmd->irq_domain->fwnode; 37262306a36Sopenharmony_ci 37362306a36Sopenharmony_ci irq_domain_remove(vmd->irq_domain); 37462306a36Sopenharmony_ci irq_domain_free_fwnode(fn); 37562306a36Sopenharmony_ci } 37662306a36Sopenharmony_ci} 37762306a36Sopenharmony_ci 37862306a36Sopenharmony_cistatic void __iomem *vmd_cfg_addr(struct vmd_dev *vmd, struct pci_bus *bus, 37962306a36Sopenharmony_ci unsigned int devfn, int reg, int len) 38062306a36Sopenharmony_ci{ 38162306a36Sopenharmony_ci unsigned int busnr_ecam = bus->number - vmd->busn_start; 38262306a36Sopenharmony_ci u32 offset = PCIE_ECAM_OFFSET(busnr_ecam, devfn, reg); 38362306a36Sopenharmony_ci 38462306a36Sopenharmony_ci if (offset + len >= resource_size(&vmd->dev->resource[VMD_CFGBAR])) 38562306a36Sopenharmony_ci return NULL; 38662306a36Sopenharmony_ci 38762306a36Sopenharmony_ci return vmd->cfgbar + offset; 38862306a36Sopenharmony_ci} 38962306a36Sopenharmony_ci 39062306a36Sopenharmony_ci/* 39162306a36Sopenharmony_ci * CPU may deadlock if config space is not serialized on some versions of this 39262306a36Sopenharmony_ci * hardware, so all config space access is done under a spinlock. 39362306a36Sopenharmony_ci */ 39462306a36Sopenharmony_cistatic int vmd_pci_read(struct pci_bus *bus, unsigned int devfn, int reg, 39562306a36Sopenharmony_ci int len, u32 *value) 39662306a36Sopenharmony_ci{ 39762306a36Sopenharmony_ci struct vmd_dev *vmd = vmd_from_bus(bus); 39862306a36Sopenharmony_ci void __iomem *addr = vmd_cfg_addr(vmd, bus, devfn, reg, len); 39962306a36Sopenharmony_ci unsigned long flags; 40062306a36Sopenharmony_ci int ret = 0; 40162306a36Sopenharmony_ci 40262306a36Sopenharmony_ci if (!addr) 40362306a36Sopenharmony_ci return -EFAULT; 40462306a36Sopenharmony_ci 40562306a36Sopenharmony_ci spin_lock_irqsave(&vmd->cfg_lock, flags); 40662306a36Sopenharmony_ci switch (len) { 40762306a36Sopenharmony_ci case 1: 40862306a36Sopenharmony_ci *value = readb(addr); 40962306a36Sopenharmony_ci break; 41062306a36Sopenharmony_ci case 2: 41162306a36Sopenharmony_ci *value = readw(addr); 41262306a36Sopenharmony_ci break; 41362306a36Sopenharmony_ci case 4: 41462306a36Sopenharmony_ci *value = readl(addr); 41562306a36Sopenharmony_ci break; 41662306a36Sopenharmony_ci default: 41762306a36Sopenharmony_ci ret = -EINVAL; 41862306a36Sopenharmony_ci break; 41962306a36Sopenharmony_ci } 42062306a36Sopenharmony_ci spin_unlock_irqrestore(&vmd->cfg_lock, flags); 42162306a36Sopenharmony_ci return ret; 42262306a36Sopenharmony_ci} 42362306a36Sopenharmony_ci 42462306a36Sopenharmony_ci/* 42562306a36Sopenharmony_ci * VMD h/w converts non-posted config writes to posted memory writes. The 42662306a36Sopenharmony_ci * read-back in this function forces the completion so it returns only after 42762306a36Sopenharmony_ci * the config space was written, as expected. 42862306a36Sopenharmony_ci */ 42962306a36Sopenharmony_cistatic int vmd_pci_write(struct pci_bus *bus, unsigned int devfn, int reg, 43062306a36Sopenharmony_ci int len, u32 value) 43162306a36Sopenharmony_ci{ 43262306a36Sopenharmony_ci struct vmd_dev *vmd = vmd_from_bus(bus); 43362306a36Sopenharmony_ci void __iomem *addr = vmd_cfg_addr(vmd, bus, devfn, reg, len); 43462306a36Sopenharmony_ci unsigned long flags; 43562306a36Sopenharmony_ci int ret = 0; 43662306a36Sopenharmony_ci 43762306a36Sopenharmony_ci if (!addr) 43862306a36Sopenharmony_ci return -EFAULT; 43962306a36Sopenharmony_ci 44062306a36Sopenharmony_ci spin_lock_irqsave(&vmd->cfg_lock, flags); 44162306a36Sopenharmony_ci switch (len) { 44262306a36Sopenharmony_ci case 1: 44362306a36Sopenharmony_ci writeb(value, addr); 44462306a36Sopenharmony_ci readb(addr); 44562306a36Sopenharmony_ci break; 44662306a36Sopenharmony_ci case 2: 44762306a36Sopenharmony_ci writew(value, addr); 44862306a36Sopenharmony_ci readw(addr); 44962306a36Sopenharmony_ci break; 45062306a36Sopenharmony_ci case 4: 45162306a36Sopenharmony_ci writel(value, addr); 45262306a36Sopenharmony_ci readl(addr); 45362306a36Sopenharmony_ci break; 45462306a36Sopenharmony_ci default: 45562306a36Sopenharmony_ci ret = -EINVAL; 45662306a36Sopenharmony_ci break; 45762306a36Sopenharmony_ci } 45862306a36Sopenharmony_ci spin_unlock_irqrestore(&vmd->cfg_lock, flags); 45962306a36Sopenharmony_ci return ret; 46062306a36Sopenharmony_ci} 46162306a36Sopenharmony_ci 46262306a36Sopenharmony_cistatic struct pci_ops vmd_ops = { 46362306a36Sopenharmony_ci .read = vmd_pci_read, 46462306a36Sopenharmony_ci .write = vmd_pci_write, 46562306a36Sopenharmony_ci}; 46662306a36Sopenharmony_ci 46762306a36Sopenharmony_ci#ifdef CONFIG_ACPI 46862306a36Sopenharmony_cistatic struct acpi_device *vmd_acpi_find_companion(struct pci_dev *pci_dev) 46962306a36Sopenharmony_ci{ 47062306a36Sopenharmony_ci struct pci_host_bridge *bridge; 47162306a36Sopenharmony_ci u32 busnr, addr; 47262306a36Sopenharmony_ci 47362306a36Sopenharmony_ci if (pci_dev->bus->ops != &vmd_ops) 47462306a36Sopenharmony_ci return NULL; 47562306a36Sopenharmony_ci 47662306a36Sopenharmony_ci bridge = pci_find_host_bridge(pci_dev->bus); 47762306a36Sopenharmony_ci busnr = pci_dev->bus->number - bridge->bus->number; 47862306a36Sopenharmony_ci /* 47962306a36Sopenharmony_ci * The address computation below is only applicable to relative bus 48062306a36Sopenharmony_ci * numbers below 32. 48162306a36Sopenharmony_ci */ 48262306a36Sopenharmony_ci if (busnr > 31) 48362306a36Sopenharmony_ci return NULL; 48462306a36Sopenharmony_ci 48562306a36Sopenharmony_ci addr = (busnr << 24) | ((u32)pci_dev->devfn << 16) | 0x8000FFFFU; 48662306a36Sopenharmony_ci 48762306a36Sopenharmony_ci dev_dbg(&pci_dev->dev, "Looking for ACPI companion (address 0x%x)\n", 48862306a36Sopenharmony_ci addr); 48962306a36Sopenharmony_ci 49062306a36Sopenharmony_ci return acpi_find_child_device(ACPI_COMPANION(bridge->dev.parent), addr, 49162306a36Sopenharmony_ci false); 49262306a36Sopenharmony_ci} 49362306a36Sopenharmony_ci 49462306a36Sopenharmony_cistatic bool hook_installed; 49562306a36Sopenharmony_ci 49662306a36Sopenharmony_cistatic void vmd_acpi_begin(void) 49762306a36Sopenharmony_ci{ 49862306a36Sopenharmony_ci if (pci_acpi_set_companion_lookup_hook(vmd_acpi_find_companion)) 49962306a36Sopenharmony_ci return; 50062306a36Sopenharmony_ci 50162306a36Sopenharmony_ci hook_installed = true; 50262306a36Sopenharmony_ci} 50362306a36Sopenharmony_ci 50462306a36Sopenharmony_cistatic void vmd_acpi_end(void) 50562306a36Sopenharmony_ci{ 50662306a36Sopenharmony_ci if (!hook_installed) 50762306a36Sopenharmony_ci return; 50862306a36Sopenharmony_ci 50962306a36Sopenharmony_ci pci_acpi_clear_companion_lookup_hook(); 51062306a36Sopenharmony_ci hook_installed = false; 51162306a36Sopenharmony_ci} 51262306a36Sopenharmony_ci#else 51362306a36Sopenharmony_cistatic inline void vmd_acpi_begin(void) { } 51462306a36Sopenharmony_cistatic inline void vmd_acpi_end(void) { } 51562306a36Sopenharmony_ci#endif /* CONFIG_ACPI */ 51662306a36Sopenharmony_ci 51762306a36Sopenharmony_cistatic void vmd_domain_reset(struct vmd_dev *vmd) 51862306a36Sopenharmony_ci{ 51962306a36Sopenharmony_ci u16 bus, max_buses = resource_size(&vmd->resources[0]); 52062306a36Sopenharmony_ci u8 dev, functions, fn, hdr_type; 52162306a36Sopenharmony_ci char __iomem *base; 52262306a36Sopenharmony_ci 52362306a36Sopenharmony_ci for (bus = 0; bus < max_buses; bus++) { 52462306a36Sopenharmony_ci for (dev = 0; dev < 32; dev++) { 52562306a36Sopenharmony_ci base = vmd->cfgbar + PCIE_ECAM_OFFSET(bus, 52662306a36Sopenharmony_ci PCI_DEVFN(dev, 0), 0); 52762306a36Sopenharmony_ci 52862306a36Sopenharmony_ci hdr_type = readb(base + PCI_HEADER_TYPE); 52962306a36Sopenharmony_ci 53062306a36Sopenharmony_ci functions = (hdr_type & 0x80) ? 8 : 1; 53162306a36Sopenharmony_ci for (fn = 0; fn < functions; fn++) { 53262306a36Sopenharmony_ci base = vmd->cfgbar + PCIE_ECAM_OFFSET(bus, 53362306a36Sopenharmony_ci PCI_DEVFN(dev, fn), 0); 53462306a36Sopenharmony_ci 53562306a36Sopenharmony_ci hdr_type = readb(base + PCI_HEADER_TYPE) & 53662306a36Sopenharmony_ci PCI_HEADER_TYPE_MASK; 53762306a36Sopenharmony_ci 53862306a36Sopenharmony_ci if (hdr_type != PCI_HEADER_TYPE_BRIDGE || 53962306a36Sopenharmony_ci (readw(base + PCI_CLASS_DEVICE) != 54062306a36Sopenharmony_ci PCI_CLASS_BRIDGE_PCI)) 54162306a36Sopenharmony_ci continue; 54262306a36Sopenharmony_ci 54362306a36Sopenharmony_ci /* 54462306a36Sopenharmony_ci * Temporarily disable the I/O range before updating 54562306a36Sopenharmony_ci * PCI_IO_BASE. 54662306a36Sopenharmony_ci */ 54762306a36Sopenharmony_ci writel(0x0000ffff, base + PCI_IO_BASE_UPPER16); 54862306a36Sopenharmony_ci /* Update lower 16 bits of I/O base/limit */ 54962306a36Sopenharmony_ci writew(0x00f0, base + PCI_IO_BASE); 55062306a36Sopenharmony_ci /* Update upper 16 bits of I/O base/limit */ 55162306a36Sopenharmony_ci writel(0, base + PCI_IO_BASE_UPPER16); 55262306a36Sopenharmony_ci 55362306a36Sopenharmony_ci /* MMIO Base/Limit */ 55462306a36Sopenharmony_ci writel(0x0000fff0, base + PCI_MEMORY_BASE); 55562306a36Sopenharmony_ci 55662306a36Sopenharmony_ci /* Prefetchable MMIO Base/Limit */ 55762306a36Sopenharmony_ci writel(0, base + PCI_PREF_LIMIT_UPPER32); 55862306a36Sopenharmony_ci writel(0x0000fff0, base + PCI_PREF_MEMORY_BASE); 55962306a36Sopenharmony_ci writel(0xffffffff, base + PCI_PREF_BASE_UPPER32); 56062306a36Sopenharmony_ci } 56162306a36Sopenharmony_ci } 56262306a36Sopenharmony_ci } 56362306a36Sopenharmony_ci} 56462306a36Sopenharmony_ci 56562306a36Sopenharmony_cistatic void vmd_attach_resources(struct vmd_dev *vmd) 56662306a36Sopenharmony_ci{ 56762306a36Sopenharmony_ci vmd->dev->resource[VMD_MEMBAR1].child = &vmd->resources[1]; 56862306a36Sopenharmony_ci vmd->dev->resource[VMD_MEMBAR2].child = &vmd->resources[2]; 56962306a36Sopenharmony_ci} 57062306a36Sopenharmony_ci 57162306a36Sopenharmony_cistatic void vmd_detach_resources(struct vmd_dev *vmd) 57262306a36Sopenharmony_ci{ 57362306a36Sopenharmony_ci vmd->dev->resource[VMD_MEMBAR1].child = NULL; 57462306a36Sopenharmony_ci vmd->dev->resource[VMD_MEMBAR2].child = NULL; 57562306a36Sopenharmony_ci} 57662306a36Sopenharmony_ci 57762306a36Sopenharmony_ci/* 57862306a36Sopenharmony_ci * VMD domains start at 0x10000 to not clash with ACPI _SEG domains. 57962306a36Sopenharmony_ci * Per ACPI r6.0, sec 6.5.6, _SEG returns an integer, of which the lower 58062306a36Sopenharmony_ci * 16 bits are the PCI Segment Group (domain) number. Other bits are 58162306a36Sopenharmony_ci * currently reserved. 58262306a36Sopenharmony_ci */ 58362306a36Sopenharmony_cistatic int vmd_find_free_domain(void) 58462306a36Sopenharmony_ci{ 58562306a36Sopenharmony_ci int domain = 0xffff; 58662306a36Sopenharmony_ci struct pci_bus *bus = NULL; 58762306a36Sopenharmony_ci 58862306a36Sopenharmony_ci while ((bus = pci_find_next_bus(bus)) != NULL) 58962306a36Sopenharmony_ci domain = max_t(int, domain, pci_domain_nr(bus)); 59062306a36Sopenharmony_ci return domain + 1; 59162306a36Sopenharmony_ci} 59262306a36Sopenharmony_ci 59362306a36Sopenharmony_cistatic int vmd_get_phys_offsets(struct vmd_dev *vmd, bool native_hint, 59462306a36Sopenharmony_ci resource_size_t *offset1, 59562306a36Sopenharmony_ci resource_size_t *offset2) 59662306a36Sopenharmony_ci{ 59762306a36Sopenharmony_ci struct pci_dev *dev = vmd->dev; 59862306a36Sopenharmony_ci u64 phys1, phys2; 59962306a36Sopenharmony_ci 60062306a36Sopenharmony_ci if (native_hint) { 60162306a36Sopenharmony_ci u32 vmlock; 60262306a36Sopenharmony_ci int ret; 60362306a36Sopenharmony_ci 60462306a36Sopenharmony_ci ret = pci_read_config_dword(dev, PCI_REG_VMLOCK, &vmlock); 60562306a36Sopenharmony_ci if (ret || PCI_POSSIBLE_ERROR(vmlock)) 60662306a36Sopenharmony_ci return -ENODEV; 60762306a36Sopenharmony_ci 60862306a36Sopenharmony_ci if (MB2_SHADOW_EN(vmlock)) { 60962306a36Sopenharmony_ci void __iomem *membar2; 61062306a36Sopenharmony_ci 61162306a36Sopenharmony_ci membar2 = pci_iomap(dev, VMD_MEMBAR2, 0); 61262306a36Sopenharmony_ci if (!membar2) 61362306a36Sopenharmony_ci return -ENOMEM; 61462306a36Sopenharmony_ci phys1 = readq(membar2 + MB2_SHADOW_OFFSET); 61562306a36Sopenharmony_ci phys2 = readq(membar2 + MB2_SHADOW_OFFSET + 8); 61662306a36Sopenharmony_ci pci_iounmap(dev, membar2); 61762306a36Sopenharmony_ci } else 61862306a36Sopenharmony_ci return 0; 61962306a36Sopenharmony_ci } else { 62062306a36Sopenharmony_ci /* Hypervisor-Emulated Vendor-Specific Capability */ 62162306a36Sopenharmony_ci int pos = pci_find_capability(dev, PCI_CAP_ID_VNDR); 62262306a36Sopenharmony_ci u32 reg, regu; 62362306a36Sopenharmony_ci 62462306a36Sopenharmony_ci pci_read_config_dword(dev, pos + 4, ®); 62562306a36Sopenharmony_ci 62662306a36Sopenharmony_ci /* "SHDW" */ 62762306a36Sopenharmony_ci if (pos && reg == 0x53484457) { 62862306a36Sopenharmony_ci pci_read_config_dword(dev, pos + 8, ®); 62962306a36Sopenharmony_ci pci_read_config_dword(dev, pos + 12, ®u); 63062306a36Sopenharmony_ci phys1 = (u64) regu << 32 | reg; 63162306a36Sopenharmony_ci 63262306a36Sopenharmony_ci pci_read_config_dword(dev, pos + 16, ®); 63362306a36Sopenharmony_ci pci_read_config_dword(dev, pos + 20, ®u); 63462306a36Sopenharmony_ci phys2 = (u64) regu << 32 | reg; 63562306a36Sopenharmony_ci } else 63662306a36Sopenharmony_ci return 0; 63762306a36Sopenharmony_ci } 63862306a36Sopenharmony_ci 63962306a36Sopenharmony_ci *offset1 = dev->resource[VMD_MEMBAR1].start - 64062306a36Sopenharmony_ci (phys1 & PCI_BASE_ADDRESS_MEM_MASK); 64162306a36Sopenharmony_ci *offset2 = dev->resource[VMD_MEMBAR2].start - 64262306a36Sopenharmony_ci (phys2 & PCI_BASE_ADDRESS_MEM_MASK); 64362306a36Sopenharmony_ci 64462306a36Sopenharmony_ci return 0; 64562306a36Sopenharmony_ci} 64662306a36Sopenharmony_ci 64762306a36Sopenharmony_cistatic int vmd_get_bus_number_start(struct vmd_dev *vmd) 64862306a36Sopenharmony_ci{ 64962306a36Sopenharmony_ci struct pci_dev *dev = vmd->dev; 65062306a36Sopenharmony_ci u16 reg; 65162306a36Sopenharmony_ci 65262306a36Sopenharmony_ci pci_read_config_word(dev, PCI_REG_VMCAP, ®); 65362306a36Sopenharmony_ci if (BUS_RESTRICT_CAP(reg)) { 65462306a36Sopenharmony_ci pci_read_config_word(dev, PCI_REG_VMCONFIG, ®); 65562306a36Sopenharmony_ci 65662306a36Sopenharmony_ci switch (BUS_RESTRICT_CFG(reg)) { 65762306a36Sopenharmony_ci case 0: 65862306a36Sopenharmony_ci vmd->busn_start = 0; 65962306a36Sopenharmony_ci break; 66062306a36Sopenharmony_ci case 1: 66162306a36Sopenharmony_ci vmd->busn_start = 128; 66262306a36Sopenharmony_ci break; 66362306a36Sopenharmony_ci case 2: 66462306a36Sopenharmony_ci vmd->busn_start = 224; 66562306a36Sopenharmony_ci break; 66662306a36Sopenharmony_ci default: 66762306a36Sopenharmony_ci pci_err(dev, "Unknown Bus Offset Setting (%d)\n", 66862306a36Sopenharmony_ci BUS_RESTRICT_CFG(reg)); 66962306a36Sopenharmony_ci return -ENODEV; 67062306a36Sopenharmony_ci } 67162306a36Sopenharmony_ci } 67262306a36Sopenharmony_ci 67362306a36Sopenharmony_ci return 0; 67462306a36Sopenharmony_ci} 67562306a36Sopenharmony_ci 67662306a36Sopenharmony_cistatic irqreturn_t vmd_irq(int irq, void *data) 67762306a36Sopenharmony_ci{ 67862306a36Sopenharmony_ci struct vmd_irq_list *irqs = data; 67962306a36Sopenharmony_ci struct vmd_irq *vmdirq; 68062306a36Sopenharmony_ci int idx; 68162306a36Sopenharmony_ci 68262306a36Sopenharmony_ci idx = srcu_read_lock(&irqs->srcu); 68362306a36Sopenharmony_ci list_for_each_entry_rcu(vmdirq, &irqs->irq_list, node) 68462306a36Sopenharmony_ci generic_handle_irq(vmdirq->virq); 68562306a36Sopenharmony_ci srcu_read_unlock(&irqs->srcu, idx); 68662306a36Sopenharmony_ci 68762306a36Sopenharmony_ci return IRQ_HANDLED; 68862306a36Sopenharmony_ci} 68962306a36Sopenharmony_ci 69062306a36Sopenharmony_cistatic int vmd_alloc_irqs(struct vmd_dev *vmd) 69162306a36Sopenharmony_ci{ 69262306a36Sopenharmony_ci struct pci_dev *dev = vmd->dev; 69362306a36Sopenharmony_ci int i, err; 69462306a36Sopenharmony_ci 69562306a36Sopenharmony_ci vmd->msix_count = pci_msix_vec_count(dev); 69662306a36Sopenharmony_ci if (vmd->msix_count < 0) 69762306a36Sopenharmony_ci return -ENODEV; 69862306a36Sopenharmony_ci 69962306a36Sopenharmony_ci vmd->msix_count = pci_alloc_irq_vectors(dev, vmd->first_vec + 1, 70062306a36Sopenharmony_ci vmd->msix_count, PCI_IRQ_MSIX); 70162306a36Sopenharmony_ci if (vmd->msix_count < 0) 70262306a36Sopenharmony_ci return vmd->msix_count; 70362306a36Sopenharmony_ci 70462306a36Sopenharmony_ci vmd->irqs = devm_kcalloc(&dev->dev, vmd->msix_count, sizeof(*vmd->irqs), 70562306a36Sopenharmony_ci GFP_KERNEL); 70662306a36Sopenharmony_ci if (!vmd->irqs) 70762306a36Sopenharmony_ci return -ENOMEM; 70862306a36Sopenharmony_ci 70962306a36Sopenharmony_ci for (i = 0; i < vmd->msix_count; i++) { 71062306a36Sopenharmony_ci err = init_srcu_struct(&vmd->irqs[i].srcu); 71162306a36Sopenharmony_ci if (err) 71262306a36Sopenharmony_ci return err; 71362306a36Sopenharmony_ci 71462306a36Sopenharmony_ci INIT_LIST_HEAD(&vmd->irqs[i].irq_list); 71562306a36Sopenharmony_ci vmd->irqs[i].virq = pci_irq_vector(dev, i); 71662306a36Sopenharmony_ci err = devm_request_irq(&dev->dev, vmd->irqs[i].virq, 71762306a36Sopenharmony_ci vmd_irq, IRQF_NO_THREAD, 71862306a36Sopenharmony_ci vmd->name, &vmd->irqs[i]); 71962306a36Sopenharmony_ci if (err) 72062306a36Sopenharmony_ci return err; 72162306a36Sopenharmony_ci } 72262306a36Sopenharmony_ci 72362306a36Sopenharmony_ci return 0; 72462306a36Sopenharmony_ci} 72562306a36Sopenharmony_ci 72662306a36Sopenharmony_ci/* 72762306a36Sopenharmony_ci * Since VMD is an aperture to regular PCIe root ports, only allow it to 72862306a36Sopenharmony_ci * control features that the OS is allowed to control on the physical PCI bus. 72962306a36Sopenharmony_ci */ 73062306a36Sopenharmony_cistatic void vmd_copy_host_bridge_flags(struct pci_host_bridge *root_bridge, 73162306a36Sopenharmony_ci struct pci_host_bridge *vmd_bridge) 73262306a36Sopenharmony_ci{ 73362306a36Sopenharmony_ci vmd_bridge->native_pcie_hotplug = root_bridge->native_pcie_hotplug; 73462306a36Sopenharmony_ci vmd_bridge->native_shpc_hotplug = root_bridge->native_shpc_hotplug; 73562306a36Sopenharmony_ci vmd_bridge->native_aer = root_bridge->native_aer; 73662306a36Sopenharmony_ci vmd_bridge->native_pme = root_bridge->native_pme; 73762306a36Sopenharmony_ci vmd_bridge->native_ltr = root_bridge->native_ltr; 73862306a36Sopenharmony_ci vmd_bridge->native_dpc = root_bridge->native_dpc; 73962306a36Sopenharmony_ci} 74062306a36Sopenharmony_ci 74162306a36Sopenharmony_ci/* 74262306a36Sopenharmony_ci * Enable ASPM and LTR settings on devices that aren't configured by BIOS. 74362306a36Sopenharmony_ci */ 74462306a36Sopenharmony_cistatic int vmd_pm_enable_quirk(struct pci_dev *pdev, void *userdata) 74562306a36Sopenharmony_ci{ 74662306a36Sopenharmony_ci unsigned long features = *(unsigned long *)userdata; 74762306a36Sopenharmony_ci u16 ltr = VMD_BIOS_PM_QUIRK_LTR; 74862306a36Sopenharmony_ci u32 ltr_reg; 74962306a36Sopenharmony_ci int pos; 75062306a36Sopenharmony_ci 75162306a36Sopenharmony_ci if (!(features & VMD_FEAT_BIOS_PM_QUIRK)) 75262306a36Sopenharmony_ci return 0; 75362306a36Sopenharmony_ci 75462306a36Sopenharmony_ci pci_enable_link_state_locked(pdev, PCIE_LINK_STATE_ALL); 75562306a36Sopenharmony_ci 75662306a36Sopenharmony_ci pos = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_LTR); 75762306a36Sopenharmony_ci if (!pos) 75862306a36Sopenharmony_ci return 0; 75962306a36Sopenharmony_ci 76062306a36Sopenharmony_ci /* 76162306a36Sopenharmony_ci * Skip if the max snoop LTR is non-zero, indicating BIOS has set it 76262306a36Sopenharmony_ci * so the LTR quirk is not needed. 76362306a36Sopenharmony_ci */ 76462306a36Sopenharmony_ci pci_read_config_dword(pdev, pos + PCI_LTR_MAX_SNOOP_LAT, <r_reg); 76562306a36Sopenharmony_ci if (!!(ltr_reg & (PCI_LTR_VALUE_MASK | PCI_LTR_SCALE_MASK))) 76662306a36Sopenharmony_ci return 0; 76762306a36Sopenharmony_ci 76862306a36Sopenharmony_ci /* 76962306a36Sopenharmony_ci * Set the default values to the maximum required by the platform to 77062306a36Sopenharmony_ci * allow the deepest power management savings. Write as a DWORD where 77162306a36Sopenharmony_ci * the lower word is the max snoop latency and the upper word is the 77262306a36Sopenharmony_ci * max non-snoop latency. 77362306a36Sopenharmony_ci */ 77462306a36Sopenharmony_ci ltr_reg = (ltr << 16) | ltr; 77562306a36Sopenharmony_ci pci_write_config_dword(pdev, pos + PCI_LTR_MAX_SNOOP_LAT, ltr_reg); 77662306a36Sopenharmony_ci pci_info(pdev, "VMD: Default LTR value set by driver\n"); 77762306a36Sopenharmony_ci 77862306a36Sopenharmony_ci return 0; 77962306a36Sopenharmony_ci} 78062306a36Sopenharmony_ci 78162306a36Sopenharmony_cistatic int vmd_enable_domain(struct vmd_dev *vmd, unsigned long features) 78262306a36Sopenharmony_ci{ 78362306a36Sopenharmony_ci struct pci_sysdata *sd = &vmd->sysdata; 78462306a36Sopenharmony_ci struct resource *res; 78562306a36Sopenharmony_ci u32 upper_bits; 78662306a36Sopenharmony_ci unsigned long flags; 78762306a36Sopenharmony_ci LIST_HEAD(resources); 78862306a36Sopenharmony_ci resource_size_t offset[2] = {0}; 78962306a36Sopenharmony_ci resource_size_t membar2_offset = 0x2000; 79062306a36Sopenharmony_ci struct pci_bus *child; 79162306a36Sopenharmony_ci struct pci_dev *dev; 79262306a36Sopenharmony_ci int ret; 79362306a36Sopenharmony_ci 79462306a36Sopenharmony_ci /* 79562306a36Sopenharmony_ci * Shadow registers may exist in certain VMD device ids which allow 79662306a36Sopenharmony_ci * guests to correctly assign host physical addresses to the root ports 79762306a36Sopenharmony_ci * and child devices. These registers will either return the host value 79862306a36Sopenharmony_ci * or 0, depending on an enable bit in the VMD device. 79962306a36Sopenharmony_ci */ 80062306a36Sopenharmony_ci if (features & VMD_FEAT_HAS_MEMBAR_SHADOW) { 80162306a36Sopenharmony_ci membar2_offset = MB2_SHADOW_OFFSET + MB2_SHADOW_SIZE; 80262306a36Sopenharmony_ci ret = vmd_get_phys_offsets(vmd, true, &offset[0], &offset[1]); 80362306a36Sopenharmony_ci if (ret) 80462306a36Sopenharmony_ci return ret; 80562306a36Sopenharmony_ci } else if (features & VMD_FEAT_HAS_MEMBAR_SHADOW_VSCAP) { 80662306a36Sopenharmony_ci ret = vmd_get_phys_offsets(vmd, false, &offset[0], &offset[1]); 80762306a36Sopenharmony_ci if (ret) 80862306a36Sopenharmony_ci return ret; 80962306a36Sopenharmony_ci } 81062306a36Sopenharmony_ci 81162306a36Sopenharmony_ci /* 81262306a36Sopenharmony_ci * Certain VMD devices may have a root port configuration option which 81362306a36Sopenharmony_ci * limits the bus range to between 0-127, 128-255, or 224-255 81462306a36Sopenharmony_ci */ 81562306a36Sopenharmony_ci if (features & VMD_FEAT_HAS_BUS_RESTRICTIONS) { 81662306a36Sopenharmony_ci ret = vmd_get_bus_number_start(vmd); 81762306a36Sopenharmony_ci if (ret) 81862306a36Sopenharmony_ci return ret; 81962306a36Sopenharmony_ci } 82062306a36Sopenharmony_ci 82162306a36Sopenharmony_ci res = &vmd->dev->resource[VMD_CFGBAR]; 82262306a36Sopenharmony_ci vmd->resources[0] = (struct resource) { 82362306a36Sopenharmony_ci .name = "VMD CFGBAR", 82462306a36Sopenharmony_ci .start = vmd->busn_start, 82562306a36Sopenharmony_ci .end = vmd->busn_start + (resource_size(res) >> 20) - 1, 82662306a36Sopenharmony_ci .flags = IORESOURCE_BUS | IORESOURCE_PCI_FIXED, 82762306a36Sopenharmony_ci }; 82862306a36Sopenharmony_ci 82962306a36Sopenharmony_ci /* 83062306a36Sopenharmony_ci * If the window is below 4GB, clear IORESOURCE_MEM_64 so we can 83162306a36Sopenharmony_ci * put 32-bit resources in the window. 83262306a36Sopenharmony_ci * 83362306a36Sopenharmony_ci * There's no hardware reason why a 64-bit window *couldn't* 83462306a36Sopenharmony_ci * contain a 32-bit resource, but pbus_size_mem() computes the 83562306a36Sopenharmony_ci * bridge window size assuming a 64-bit window will contain no 83662306a36Sopenharmony_ci * 32-bit resources. __pci_assign_resource() enforces that 83762306a36Sopenharmony_ci * artificial restriction to make sure everything will fit. 83862306a36Sopenharmony_ci * 83962306a36Sopenharmony_ci * The only way we could use a 64-bit non-prefetchable MEMBAR is 84062306a36Sopenharmony_ci * if its address is <4GB so that we can convert it to a 32-bit 84162306a36Sopenharmony_ci * resource. To be visible to the host OS, all VMD endpoints must 84262306a36Sopenharmony_ci * be initially configured by platform BIOS, which includes setting 84362306a36Sopenharmony_ci * up these resources. We can assume the device is configured 84462306a36Sopenharmony_ci * according to the platform needs. 84562306a36Sopenharmony_ci */ 84662306a36Sopenharmony_ci res = &vmd->dev->resource[VMD_MEMBAR1]; 84762306a36Sopenharmony_ci upper_bits = upper_32_bits(res->end); 84862306a36Sopenharmony_ci flags = res->flags & ~IORESOURCE_SIZEALIGN; 84962306a36Sopenharmony_ci if (!upper_bits) 85062306a36Sopenharmony_ci flags &= ~IORESOURCE_MEM_64; 85162306a36Sopenharmony_ci vmd->resources[1] = (struct resource) { 85262306a36Sopenharmony_ci .name = "VMD MEMBAR1", 85362306a36Sopenharmony_ci .start = res->start, 85462306a36Sopenharmony_ci .end = res->end, 85562306a36Sopenharmony_ci .flags = flags, 85662306a36Sopenharmony_ci .parent = res, 85762306a36Sopenharmony_ci }; 85862306a36Sopenharmony_ci 85962306a36Sopenharmony_ci res = &vmd->dev->resource[VMD_MEMBAR2]; 86062306a36Sopenharmony_ci upper_bits = upper_32_bits(res->end); 86162306a36Sopenharmony_ci flags = res->flags & ~IORESOURCE_SIZEALIGN; 86262306a36Sopenharmony_ci if (!upper_bits) 86362306a36Sopenharmony_ci flags &= ~IORESOURCE_MEM_64; 86462306a36Sopenharmony_ci vmd->resources[2] = (struct resource) { 86562306a36Sopenharmony_ci .name = "VMD MEMBAR2", 86662306a36Sopenharmony_ci .start = res->start + membar2_offset, 86762306a36Sopenharmony_ci .end = res->end, 86862306a36Sopenharmony_ci .flags = flags, 86962306a36Sopenharmony_ci .parent = res, 87062306a36Sopenharmony_ci }; 87162306a36Sopenharmony_ci 87262306a36Sopenharmony_ci sd->vmd_dev = vmd->dev; 87362306a36Sopenharmony_ci sd->domain = vmd_find_free_domain(); 87462306a36Sopenharmony_ci if (sd->domain < 0) 87562306a36Sopenharmony_ci return sd->domain; 87662306a36Sopenharmony_ci 87762306a36Sopenharmony_ci sd->node = pcibus_to_node(vmd->dev->bus); 87862306a36Sopenharmony_ci 87962306a36Sopenharmony_ci /* 88062306a36Sopenharmony_ci * Currently MSI remapping must be enabled in guest passthrough mode 88162306a36Sopenharmony_ci * due to some missing interrupt remapping plumbing. This is probably 88262306a36Sopenharmony_ci * acceptable because the guest is usually CPU-limited and MSI 88362306a36Sopenharmony_ci * remapping doesn't become a performance bottleneck. 88462306a36Sopenharmony_ci */ 88562306a36Sopenharmony_ci if (!(features & VMD_FEAT_CAN_BYPASS_MSI_REMAP) || 88662306a36Sopenharmony_ci offset[0] || offset[1]) { 88762306a36Sopenharmony_ci ret = vmd_alloc_irqs(vmd); 88862306a36Sopenharmony_ci if (ret) 88962306a36Sopenharmony_ci return ret; 89062306a36Sopenharmony_ci 89162306a36Sopenharmony_ci vmd_set_msi_remapping(vmd, true); 89262306a36Sopenharmony_ci 89362306a36Sopenharmony_ci ret = vmd_create_irq_domain(vmd); 89462306a36Sopenharmony_ci if (ret) 89562306a36Sopenharmony_ci return ret; 89662306a36Sopenharmony_ci 89762306a36Sopenharmony_ci /* 89862306a36Sopenharmony_ci * Override the IRQ domain bus token so the domain can be 89962306a36Sopenharmony_ci * distinguished from a regular PCI/MSI domain. 90062306a36Sopenharmony_ci */ 90162306a36Sopenharmony_ci irq_domain_update_bus_token(vmd->irq_domain, DOMAIN_BUS_VMD_MSI); 90262306a36Sopenharmony_ci } else { 90362306a36Sopenharmony_ci vmd_set_msi_remapping(vmd, false); 90462306a36Sopenharmony_ci } 90562306a36Sopenharmony_ci 90662306a36Sopenharmony_ci pci_add_resource(&resources, &vmd->resources[0]); 90762306a36Sopenharmony_ci pci_add_resource_offset(&resources, &vmd->resources[1], offset[0]); 90862306a36Sopenharmony_ci pci_add_resource_offset(&resources, &vmd->resources[2], offset[1]); 90962306a36Sopenharmony_ci 91062306a36Sopenharmony_ci vmd->bus = pci_create_root_bus(&vmd->dev->dev, vmd->busn_start, 91162306a36Sopenharmony_ci &vmd_ops, sd, &resources); 91262306a36Sopenharmony_ci if (!vmd->bus) { 91362306a36Sopenharmony_ci pci_free_resource_list(&resources); 91462306a36Sopenharmony_ci vmd_remove_irq_domain(vmd); 91562306a36Sopenharmony_ci return -ENODEV; 91662306a36Sopenharmony_ci } 91762306a36Sopenharmony_ci 91862306a36Sopenharmony_ci vmd_copy_host_bridge_flags(pci_find_host_bridge(vmd->dev->bus), 91962306a36Sopenharmony_ci to_pci_host_bridge(vmd->bus->bridge)); 92062306a36Sopenharmony_ci 92162306a36Sopenharmony_ci vmd_attach_resources(vmd); 92262306a36Sopenharmony_ci if (vmd->irq_domain) 92362306a36Sopenharmony_ci dev_set_msi_domain(&vmd->bus->dev, vmd->irq_domain); 92462306a36Sopenharmony_ci else 92562306a36Sopenharmony_ci dev_set_msi_domain(&vmd->bus->dev, 92662306a36Sopenharmony_ci dev_get_msi_domain(&vmd->dev->dev)); 92762306a36Sopenharmony_ci 92862306a36Sopenharmony_ci vmd_acpi_begin(); 92962306a36Sopenharmony_ci 93062306a36Sopenharmony_ci pci_scan_child_bus(vmd->bus); 93162306a36Sopenharmony_ci vmd_domain_reset(vmd); 93262306a36Sopenharmony_ci 93362306a36Sopenharmony_ci /* When Intel VMD is enabled, the OS does not discover the Root Ports 93462306a36Sopenharmony_ci * owned by Intel VMD within the MMCFG space. pci_reset_bus() applies 93562306a36Sopenharmony_ci * a reset to the parent of the PCI device supplied as argument. This 93662306a36Sopenharmony_ci * is why we pass a child device, so the reset can be triggered at 93762306a36Sopenharmony_ci * the Intel bridge level and propagated to all the children in the 93862306a36Sopenharmony_ci * hierarchy. 93962306a36Sopenharmony_ci */ 94062306a36Sopenharmony_ci list_for_each_entry(child, &vmd->bus->children, node) { 94162306a36Sopenharmony_ci if (!list_empty(&child->devices)) { 94262306a36Sopenharmony_ci dev = list_first_entry(&child->devices, 94362306a36Sopenharmony_ci struct pci_dev, bus_list); 94462306a36Sopenharmony_ci ret = pci_reset_bus(dev); 94562306a36Sopenharmony_ci if (ret) 94662306a36Sopenharmony_ci pci_warn(dev, "can't reset device: %d\n", ret); 94762306a36Sopenharmony_ci 94862306a36Sopenharmony_ci break; 94962306a36Sopenharmony_ci } 95062306a36Sopenharmony_ci } 95162306a36Sopenharmony_ci 95262306a36Sopenharmony_ci pci_assign_unassigned_bus_resources(vmd->bus); 95362306a36Sopenharmony_ci 95462306a36Sopenharmony_ci pci_walk_bus(vmd->bus, vmd_pm_enable_quirk, &features); 95562306a36Sopenharmony_ci 95662306a36Sopenharmony_ci /* 95762306a36Sopenharmony_ci * VMD root buses are virtual and don't return true on pci_is_pcie() 95862306a36Sopenharmony_ci * and will fail pcie_bus_configure_settings() early. It can instead be 95962306a36Sopenharmony_ci * run on each of the real root ports. 96062306a36Sopenharmony_ci */ 96162306a36Sopenharmony_ci list_for_each_entry(child, &vmd->bus->children, node) 96262306a36Sopenharmony_ci pcie_bus_configure_settings(child); 96362306a36Sopenharmony_ci 96462306a36Sopenharmony_ci pci_bus_add_devices(vmd->bus); 96562306a36Sopenharmony_ci 96662306a36Sopenharmony_ci vmd_acpi_end(); 96762306a36Sopenharmony_ci 96862306a36Sopenharmony_ci WARN(sysfs_create_link(&vmd->dev->dev.kobj, &vmd->bus->dev.kobj, 96962306a36Sopenharmony_ci "domain"), "Can't create symlink to domain\n"); 97062306a36Sopenharmony_ci return 0; 97162306a36Sopenharmony_ci} 97262306a36Sopenharmony_ci 97362306a36Sopenharmony_cistatic int vmd_probe(struct pci_dev *dev, const struct pci_device_id *id) 97462306a36Sopenharmony_ci{ 97562306a36Sopenharmony_ci unsigned long features = (unsigned long) id->driver_data; 97662306a36Sopenharmony_ci struct vmd_dev *vmd; 97762306a36Sopenharmony_ci int err; 97862306a36Sopenharmony_ci 97962306a36Sopenharmony_ci if (resource_size(&dev->resource[VMD_CFGBAR]) < (1 << 20)) 98062306a36Sopenharmony_ci return -ENOMEM; 98162306a36Sopenharmony_ci 98262306a36Sopenharmony_ci vmd = devm_kzalloc(&dev->dev, sizeof(*vmd), GFP_KERNEL); 98362306a36Sopenharmony_ci if (!vmd) 98462306a36Sopenharmony_ci return -ENOMEM; 98562306a36Sopenharmony_ci 98662306a36Sopenharmony_ci vmd->dev = dev; 98762306a36Sopenharmony_ci vmd->instance = ida_simple_get(&vmd_instance_ida, 0, 0, GFP_KERNEL); 98862306a36Sopenharmony_ci if (vmd->instance < 0) 98962306a36Sopenharmony_ci return vmd->instance; 99062306a36Sopenharmony_ci 99162306a36Sopenharmony_ci vmd->name = devm_kasprintf(&dev->dev, GFP_KERNEL, "vmd%d", 99262306a36Sopenharmony_ci vmd->instance); 99362306a36Sopenharmony_ci if (!vmd->name) { 99462306a36Sopenharmony_ci err = -ENOMEM; 99562306a36Sopenharmony_ci goto out_release_instance; 99662306a36Sopenharmony_ci } 99762306a36Sopenharmony_ci 99862306a36Sopenharmony_ci err = pcim_enable_device(dev); 99962306a36Sopenharmony_ci if (err < 0) 100062306a36Sopenharmony_ci goto out_release_instance; 100162306a36Sopenharmony_ci 100262306a36Sopenharmony_ci vmd->cfgbar = pcim_iomap(dev, VMD_CFGBAR, 0); 100362306a36Sopenharmony_ci if (!vmd->cfgbar) { 100462306a36Sopenharmony_ci err = -ENOMEM; 100562306a36Sopenharmony_ci goto out_release_instance; 100662306a36Sopenharmony_ci } 100762306a36Sopenharmony_ci 100862306a36Sopenharmony_ci pci_set_master(dev); 100962306a36Sopenharmony_ci if (dma_set_mask_and_coherent(&dev->dev, DMA_BIT_MASK(64)) && 101062306a36Sopenharmony_ci dma_set_mask_and_coherent(&dev->dev, DMA_BIT_MASK(32))) { 101162306a36Sopenharmony_ci err = -ENODEV; 101262306a36Sopenharmony_ci goto out_release_instance; 101362306a36Sopenharmony_ci } 101462306a36Sopenharmony_ci 101562306a36Sopenharmony_ci if (features & VMD_FEAT_OFFSET_FIRST_VECTOR) 101662306a36Sopenharmony_ci vmd->first_vec = 1; 101762306a36Sopenharmony_ci 101862306a36Sopenharmony_ci spin_lock_init(&vmd->cfg_lock); 101962306a36Sopenharmony_ci pci_set_drvdata(dev, vmd); 102062306a36Sopenharmony_ci err = vmd_enable_domain(vmd, features); 102162306a36Sopenharmony_ci if (err) 102262306a36Sopenharmony_ci goto out_release_instance; 102362306a36Sopenharmony_ci 102462306a36Sopenharmony_ci dev_info(&vmd->dev->dev, "Bound to PCI domain %04x\n", 102562306a36Sopenharmony_ci vmd->sysdata.domain); 102662306a36Sopenharmony_ci return 0; 102762306a36Sopenharmony_ci 102862306a36Sopenharmony_ci out_release_instance: 102962306a36Sopenharmony_ci ida_simple_remove(&vmd_instance_ida, vmd->instance); 103062306a36Sopenharmony_ci return err; 103162306a36Sopenharmony_ci} 103262306a36Sopenharmony_ci 103362306a36Sopenharmony_cistatic void vmd_cleanup_srcu(struct vmd_dev *vmd) 103462306a36Sopenharmony_ci{ 103562306a36Sopenharmony_ci int i; 103662306a36Sopenharmony_ci 103762306a36Sopenharmony_ci for (i = 0; i < vmd->msix_count; i++) 103862306a36Sopenharmony_ci cleanup_srcu_struct(&vmd->irqs[i].srcu); 103962306a36Sopenharmony_ci} 104062306a36Sopenharmony_ci 104162306a36Sopenharmony_cistatic void vmd_remove(struct pci_dev *dev) 104262306a36Sopenharmony_ci{ 104362306a36Sopenharmony_ci struct vmd_dev *vmd = pci_get_drvdata(dev); 104462306a36Sopenharmony_ci 104562306a36Sopenharmony_ci sysfs_remove_link(&vmd->dev->dev.kobj, "domain"); 104662306a36Sopenharmony_ci pci_stop_root_bus(vmd->bus); 104762306a36Sopenharmony_ci pci_remove_root_bus(vmd->bus); 104862306a36Sopenharmony_ci vmd_cleanup_srcu(vmd); 104962306a36Sopenharmony_ci vmd_detach_resources(vmd); 105062306a36Sopenharmony_ci vmd_remove_irq_domain(vmd); 105162306a36Sopenharmony_ci ida_simple_remove(&vmd_instance_ida, vmd->instance); 105262306a36Sopenharmony_ci} 105362306a36Sopenharmony_ci 105462306a36Sopenharmony_cistatic void vmd_shutdown(struct pci_dev *dev) 105562306a36Sopenharmony_ci{ 105662306a36Sopenharmony_ci struct vmd_dev *vmd = pci_get_drvdata(dev); 105762306a36Sopenharmony_ci 105862306a36Sopenharmony_ci vmd_remove_irq_domain(vmd); 105962306a36Sopenharmony_ci} 106062306a36Sopenharmony_ci 106162306a36Sopenharmony_ci#ifdef CONFIG_PM_SLEEP 106262306a36Sopenharmony_cistatic int vmd_suspend(struct device *dev) 106362306a36Sopenharmony_ci{ 106462306a36Sopenharmony_ci struct pci_dev *pdev = to_pci_dev(dev); 106562306a36Sopenharmony_ci struct vmd_dev *vmd = pci_get_drvdata(pdev); 106662306a36Sopenharmony_ci int i; 106762306a36Sopenharmony_ci 106862306a36Sopenharmony_ci for (i = 0; i < vmd->msix_count; i++) 106962306a36Sopenharmony_ci devm_free_irq(dev, vmd->irqs[i].virq, &vmd->irqs[i]); 107062306a36Sopenharmony_ci 107162306a36Sopenharmony_ci return 0; 107262306a36Sopenharmony_ci} 107362306a36Sopenharmony_ci 107462306a36Sopenharmony_cistatic int vmd_resume(struct device *dev) 107562306a36Sopenharmony_ci{ 107662306a36Sopenharmony_ci struct pci_dev *pdev = to_pci_dev(dev); 107762306a36Sopenharmony_ci struct vmd_dev *vmd = pci_get_drvdata(pdev); 107862306a36Sopenharmony_ci int err, i; 107962306a36Sopenharmony_ci 108062306a36Sopenharmony_ci if (vmd->irq_domain) 108162306a36Sopenharmony_ci vmd_set_msi_remapping(vmd, true); 108262306a36Sopenharmony_ci else 108362306a36Sopenharmony_ci vmd_set_msi_remapping(vmd, false); 108462306a36Sopenharmony_ci 108562306a36Sopenharmony_ci for (i = 0; i < vmd->msix_count; i++) { 108662306a36Sopenharmony_ci err = devm_request_irq(dev, vmd->irqs[i].virq, 108762306a36Sopenharmony_ci vmd_irq, IRQF_NO_THREAD, 108862306a36Sopenharmony_ci vmd->name, &vmd->irqs[i]); 108962306a36Sopenharmony_ci if (err) 109062306a36Sopenharmony_ci return err; 109162306a36Sopenharmony_ci } 109262306a36Sopenharmony_ci 109362306a36Sopenharmony_ci return 0; 109462306a36Sopenharmony_ci} 109562306a36Sopenharmony_ci#endif 109662306a36Sopenharmony_cistatic SIMPLE_DEV_PM_OPS(vmd_dev_pm_ops, vmd_suspend, vmd_resume); 109762306a36Sopenharmony_ci 109862306a36Sopenharmony_cistatic const struct pci_device_id vmd_ids[] = { 109962306a36Sopenharmony_ci {PCI_VDEVICE(INTEL, PCI_DEVICE_ID_INTEL_VMD_201D), 110062306a36Sopenharmony_ci .driver_data = VMD_FEAT_HAS_MEMBAR_SHADOW_VSCAP,}, 110162306a36Sopenharmony_ci {PCI_VDEVICE(INTEL, PCI_DEVICE_ID_INTEL_VMD_28C0), 110262306a36Sopenharmony_ci .driver_data = VMD_FEAT_HAS_MEMBAR_SHADOW | 110362306a36Sopenharmony_ci VMD_FEAT_HAS_BUS_RESTRICTIONS | 110462306a36Sopenharmony_ci VMD_FEAT_CAN_BYPASS_MSI_REMAP,}, 110562306a36Sopenharmony_ci {PCI_VDEVICE(INTEL, 0x467f), 110662306a36Sopenharmony_ci .driver_data = VMD_FEATS_CLIENT,}, 110762306a36Sopenharmony_ci {PCI_VDEVICE(INTEL, 0x4c3d), 110862306a36Sopenharmony_ci .driver_data = VMD_FEATS_CLIENT,}, 110962306a36Sopenharmony_ci {PCI_VDEVICE(INTEL, 0xa77f), 111062306a36Sopenharmony_ci .driver_data = VMD_FEATS_CLIENT,}, 111162306a36Sopenharmony_ci {PCI_VDEVICE(INTEL, 0x7d0b), 111262306a36Sopenharmony_ci .driver_data = VMD_FEATS_CLIENT,}, 111362306a36Sopenharmony_ci {PCI_VDEVICE(INTEL, 0xad0b), 111462306a36Sopenharmony_ci .driver_data = VMD_FEATS_CLIENT,}, 111562306a36Sopenharmony_ci {PCI_VDEVICE(INTEL, PCI_DEVICE_ID_INTEL_VMD_9A0B), 111662306a36Sopenharmony_ci .driver_data = VMD_FEATS_CLIENT,}, 111762306a36Sopenharmony_ci {0,} 111862306a36Sopenharmony_ci}; 111962306a36Sopenharmony_ciMODULE_DEVICE_TABLE(pci, vmd_ids); 112062306a36Sopenharmony_ci 112162306a36Sopenharmony_cistatic struct pci_driver vmd_drv = { 112262306a36Sopenharmony_ci .name = "vmd", 112362306a36Sopenharmony_ci .id_table = vmd_ids, 112462306a36Sopenharmony_ci .probe = vmd_probe, 112562306a36Sopenharmony_ci .remove = vmd_remove, 112662306a36Sopenharmony_ci .shutdown = vmd_shutdown, 112762306a36Sopenharmony_ci .driver = { 112862306a36Sopenharmony_ci .pm = &vmd_dev_pm_ops, 112962306a36Sopenharmony_ci }, 113062306a36Sopenharmony_ci}; 113162306a36Sopenharmony_cimodule_pci_driver(vmd_drv); 113262306a36Sopenharmony_ci 113362306a36Sopenharmony_ciMODULE_AUTHOR("Intel Corporation"); 113462306a36Sopenharmony_ciMODULE_LICENSE("GPL v2"); 113562306a36Sopenharmony_ciMODULE_VERSION("0.6"); 1136