1 // SPDX-License-Identifier: GPL-2.0
2 /*
3 * PCI Express I/O Virtualization (IOV) support
4 * Address Translation Service 1.0
5 * Page Request Interface added by Joerg Roedel <joerg.roedel@amd.com>
6 * PASID support added by Joerg Roedel <joerg.roedel@amd.com>
7 *
8 * Copyright (C) 2009 Intel Corporation, Yu Zhao <yu.zhao@intel.com>
9 * Copyright (C) 2011 Advanced Micro Devices,
10 */
11
12 #include <linux/bitfield.h>
13 #include <linux/export.h>
14 #include <linux/pci-ats.h>
15 #include <linux/pci.h>
16 #include <linux/slab.h>
17
18 #include "pci.h"
19
pci_ats_init(struct pci_dev * dev)20 void pci_ats_init(struct pci_dev *dev)
21 {
22 int pos;
23
24 if (pci_ats_disabled())
25 return;
26
27 pos = pci_find_ext_capability(dev, PCI_EXT_CAP_ID_ATS);
28 if (!pos)
29 return;
30
31 dev->ats_cap = pos;
32 }
33
34 /**
35 * pci_ats_supported - check if the device can use ATS
36 * @dev: the PCI device
37 *
38 * Returns true if the device supports ATS and is allowed to use it, false
39 * otherwise.
40 */
pci_ats_supported(struct pci_dev * dev)41 bool pci_ats_supported(struct pci_dev *dev)
42 {
43 if (!dev->ats_cap)
44 return false;
45
46 return (dev->untrusted == 0);
47 }
48 EXPORT_SYMBOL_GPL(pci_ats_supported);
49
50 /**
51 * pci_enable_ats - enable the ATS capability
52 * @dev: the PCI device
53 * @ps: the IOMMU page shift
54 *
55 * Returns 0 on success, or negative on failure.
56 */
pci_enable_ats(struct pci_dev * dev,int ps)57 int pci_enable_ats(struct pci_dev *dev, int ps)
58 {
59 u16 ctrl;
60 struct pci_dev *pdev;
61
62 if (!pci_ats_supported(dev))
63 return -EINVAL;
64
65 if (WARN_ON(dev->ats_enabled))
66 return -EBUSY;
67
68 if (ps < PCI_ATS_MIN_STU)
69 return -EINVAL;
70
71 /*
72 * Note that enabling ATS on a VF fails unless it's already enabled
73 * with the same STU on the PF.
74 */
75 ctrl = PCI_ATS_CTRL_ENABLE;
76 if (dev->is_virtfn) {
77 pdev = pci_physfn(dev);
78 if (pdev->ats_stu != ps)
79 return -EINVAL;
80 } else {
81 dev->ats_stu = ps;
82 ctrl |= PCI_ATS_CTRL_STU(dev->ats_stu - PCI_ATS_MIN_STU);
83 }
84 pci_write_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, ctrl);
85
86 dev->ats_enabled = 1;
87 return 0;
88 }
89 EXPORT_SYMBOL_GPL(pci_enable_ats);
90
91 /**
92 * pci_disable_ats - disable the ATS capability
93 * @dev: the PCI device
94 */
pci_disable_ats(struct pci_dev * dev)95 void pci_disable_ats(struct pci_dev *dev)
96 {
97 u16 ctrl;
98
99 if (WARN_ON(!dev->ats_enabled))
100 return;
101
102 pci_read_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, &ctrl);
103 ctrl &= ~PCI_ATS_CTRL_ENABLE;
104 pci_write_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, ctrl);
105
106 dev->ats_enabled = 0;
107 }
108 EXPORT_SYMBOL_GPL(pci_disable_ats);
109
pci_restore_ats_state(struct pci_dev * dev)110 void pci_restore_ats_state(struct pci_dev *dev)
111 {
112 u16 ctrl;
113
114 if (!dev->ats_enabled)
115 return;
116
117 ctrl = PCI_ATS_CTRL_ENABLE;
118 if (!dev->is_virtfn)
119 ctrl |= PCI_ATS_CTRL_STU(dev->ats_stu - PCI_ATS_MIN_STU);
120 pci_write_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, ctrl);
121 }
122
123 /**
124 * pci_ats_queue_depth - query the ATS Invalidate Queue Depth
125 * @dev: the PCI device
126 *
127 * Returns the queue depth on success, or negative on failure.
128 *
129 * The ATS spec uses 0 in the Invalidate Queue Depth field to
130 * indicate that the function can accept 32 Invalidate Request.
131 * But here we use the `real' values (i.e. 1~32) for the Queue
132 * Depth; and 0 indicates the function shares the Queue with
133 * other functions (doesn't exclusively own a Queue).
134 */
pci_ats_queue_depth(struct pci_dev * dev)135 int pci_ats_queue_depth(struct pci_dev *dev)
136 {
137 u16 cap;
138
139 if (!dev->ats_cap)
140 return -EINVAL;
141
142 if (dev->is_virtfn)
143 return 0;
144
145 pci_read_config_word(dev, dev->ats_cap + PCI_ATS_CAP, &cap);
146 return PCI_ATS_CAP_QDEP(cap) ? PCI_ATS_CAP_QDEP(cap) : PCI_ATS_MAX_QDEP;
147 }
148
149 /**
150 * pci_ats_page_aligned - Return Page Aligned Request bit status.
151 * @pdev: the PCI device
152 *
153 * Returns 1, if the Untranslated Addresses generated by the device
154 * are always aligned or 0 otherwise.
155 *
156 * Per PCIe spec r4.0, sec 10.5.1.2, if the Page Aligned Request bit
157 * is set, it indicates the Untranslated Addresses generated by the
158 * device are always aligned to a 4096 byte boundary.
159 */
pci_ats_page_aligned(struct pci_dev * pdev)160 int pci_ats_page_aligned(struct pci_dev *pdev)
161 {
162 u16 cap;
163
164 if (!pdev->ats_cap)
165 return 0;
166
167 pci_read_config_word(pdev, pdev->ats_cap + PCI_ATS_CAP, &cap);
168
169 if (cap & PCI_ATS_CAP_PAGE_ALIGNED)
170 return 1;
171
172 return 0;
173 }
174
175 #ifdef CONFIG_PCI_PRI
pci_pri_init(struct pci_dev * pdev)176 void pci_pri_init(struct pci_dev *pdev)
177 {
178 u16 status;
179
180 pdev->pri_cap = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PRI);
181
182 if (!pdev->pri_cap)
183 return;
184
185 pci_read_config_word(pdev, pdev->pri_cap + PCI_PRI_STATUS, &status);
186 if (status & PCI_PRI_STATUS_PASID)
187 pdev->pasid_required = 1;
188 }
189
190 /**
191 * pci_enable_pri - Enable PRI capability
192 * @pdev: PCI device structure
193 * @reqs: outstanding requests
194 *
195 * Returns 0 on success, negative value on error
196 */
pci_enable_pri(struct pci_dev * pdev,u32 reqs)197 int pci_enable_pri(struct pci_dev *pdev, u32 reqs)
198 {
199 u16 control, status;
200 u32 max_requests;
201 int pri = pdev->pri_cap;
202
203 /*
204 * VFs must not implement the PRI Capability. If their PF
205 * implements PRI, it is shared by the VFs, so if the PF PRI is
206 * enabled, it is also enabled for the VF.
207 */
208 if (pdev->is_virtfn) {
209 if (pci_physfn(pdev)->pri_enabled)
210 return 0;
211 return -EINVAL;
212 }
213
214 if (WARN_ON(pdev->pri_enabled))
215 return -EBUSY;
216
217 if (!pri)
218 return -EINVAL;
219
220 pci_read_config_word(pdev, pri + PCI_PRI_STATUS, &status);
221 if (!(status & PCI_PRI_STATUS_STOPPED))
222 return -EBUSY;
223
224 pci_read_config_dword(pdev, pri + PCI_PRI_MAX_REQ, &max_requests);
225 reqs = min(max_requests, reqs);
226 pdev->pri_reqs_alloc = reqs;
227 pci_write_config_dword(pdev, pri + PCI_PRI_ALLOC_REQ, reqs);
228
229 control = PCI_PRI_CTRL_ENABLE;
230 pci_write_config_word(pdev, pri + PCI_PRI_CTRL, control);
231
232 pdev->pri_enabled = 1;
233
234 return 0;
235 }
236
237 /**
238 * pci_disable_pri - Disable PRI capability
239 * @pdev: PCI device structure
240 *
241 * Only clears the enabled-bit, regardless of its former value
242 */
pci_disable_pri(struct pci_dev * pdev)243 void pci_disable_pri(struct pci_dev *pdev)
244 {
245 u16 control;
246 int pri = pdev->pri_cap;
247
248 /* VFs share the PF PRI */
249 if (pdev->is_virtfn)
250 return;
251
252 if (WARN_ON(!pdev->pri_enabled))
253 return;
254
255 if (!pri)
256 return;
257
258 pci_read_config_word(pdev, pri + PCI_PRI_CTRL, &control);
259 control &= ~PCI_PRI_CTRL_ENABLE;
260 pci_write_config_word(pdev, pri + PCI_PRI_CTRL, control);
261
262 pdev->pri_enabled = 0;
263 }
264 EXPORT_SYMBOL_GPL(pci_disable_pri);
265
266 /**
267 * pci_restore_pri_state - Restore PRI
268 * @pdev: PCI device structure
269 */
pci_restore_pri_state(struct pci_dev * pdev)270 void pci_restore_pri_state(struct pci_dev *pdev)
271 {
272 u16 control = PCI_PRI_CTRL_ENABLE;
273 u32 reqs = pdev->pri_reqs_alloc;
274 int pri = pdev->pri_cap;
275
276 if (pdev->is_virtfn)
277 return;
278
279 if (!pdev->pri_enabled)
280 return;
281
282 if (!pri)
283 return;
284
285 pci_write_config_dword(pdev, pri + PCI_PRI_ALLOC_REQ, reqs);
286 pci_write_config_word(pdev, pri + PCI_PRI_CTRL, control);
287 }
288
289 /**
290 * pci_reset_pri - Resets device's PRI state
291 * @pdev: PCI device structure
292 *
293 * The PRI capability must be disabled before this function is called.
294 * Returns 0 on success, negative value on error.
295 */
pci_reset_pri(struct pci_dev * pdev)296 int pci_reset_pri(struct pci_dev *pdev)
297 {
298 u16 control;
299 int pri = pdev->pri_cap;
300
301 if (pdev->is_virtfn)
302 return 0;
303
304 if (WARN_ON(pdev->pri_enabled))
305 return -EBUSY;
306
307 if (!pri)
308 return -EINVAL;
309
310 control = PCI_PRI_CTRL_RESET;
311 pci_write_config_word(pdev, pri + PCI_PRI_CTRL, control);
312
313 return 0;
314 }
315
316 /**
317 * pci_prg_resp_pasid_required - Return PRG Response PASID Required bit
318 * status.
319 * @pdev: PCI device structure
320 *
321 * Returns 1 if PASID is required in PRG Response Message, 0 otherwise.
322 */
pci_prg_resp_pasid_required(struct pci_dev * pdev)323 int pci_prg_resp_pasid_required(struct pci_dev *pdev)
324 {
325 if (pdev->is_virtfn)
326 pdev = pci_physfn(pdev);
327
328 return pdev->pasid_required;
329 }
330
331 /**
332 * pci_pri_supported - Check if PRI is supported.
333 * @pdev: PCI device structure
334 *
335 * Returns true if PRI capability is present, false otherwise.
336 */
pci_pri_supported(struct pci_dev * pdev)337 bool pci_pri_supported(struct pci_dev *pdev)
338 {
339 /* VFs share the PF PRI */
340 if (pci_physfn(pdev)->pri_cap)
341 return true;
342 return false;
343 }
344 EXPORT_SYMBOL_GPL(pci_pri_supported);
345 #endif /* CONFIG_PCI_PRI */
346
347 #ifdef CONFIG_PCI_PASID
pci_pasid_init(struct pci_dev * pdev)348 void pci_pasid_init(struct pci_dev *pdev)
349 {
350 pdev->pasid_cap = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PASID);
351 }
352
353 /**
354 * pci_enable_pasid - Enable the PASID capability
355 * @pdev: PCI device structure
356 * @features: Features to enable
357 *
358 * Returns 0 on success, negative value on error. This function checks
359 * whether the features are actually supported by the device and returns
360 * an error if not.
361 */
pci_enable_pasid(struct pci_dev * pdev,int features)362 int pci_enable_pasid(struct pci_dev *pdev, int features)
363 {
364 u16 control, supported;
365 int pasid = pdev->pasid_cap;
366
367 /*
368 * VFs must not implement the PASID Capability, but if a PF
369 * supports PASID, its VFs share the PF PASID configuration.
370 */
371 if (pdev->is_virtfn) {
372 if (pci_physfn(pdev)->pasid_enabled)
373 return 0;
374 return -EINVAL;
375 }
376
377 if (WARN_ON(pdev->pasid_enabled))
378 return -EBUSY;
379
380 if (!pdev->eetlp_prefix_path && !pdev->pasid_no_tlp)
381 return -EINVAL;
382
383 if (!pasid)
384 return -EINVAL;
385
386 if (!pci_acs_path_enabled(pdev, NULL, PCI_ACS_RR | PCI_ACS_UF))
387 return -EINVAL;
388
389 pci_read_config_word(pdev, pasid + PCI_PASID_CAP, &supported);
390 supported &= PCI_PASID_CAP_EXEC | PCI_PASID_CAP_PRIV;
391
392 /* User wants to enable anything unsupported? */
393 if ((supported & features) != features)
394 return -EINVAL;
395
396 control = PCI_PASID_CTRL_ENABLE | features;
397 pdev->pasid_features = features;
398
399 pci_write_config_word(pdev, pasid + PCI_PASID_CTRL, control);
400
401 pdev->pasid_enabled = 1;
402
403 return 0;
404 }
405 EXPORT_SYMBOL_GPL(pci_enable_pasid);
406
407 /**
408 * pci_disable_pasid - Disable the PASID capability
409 * @pdev: PCI device structure
410 */
pci_disable_pasid(struct pci_dev * pdev)411 void pci_disable_pasid(struct pci_dev *pdev)
412 {
413 u16 control = 0;
414 int pasid = pdev->pasid_cap;
415
416 /* VFs share the PF PASID configuration */
417 if (pdev->is_virtfn)
418 return;
419
420 if (WARN_ON(!pdev->pasid_enabled))
421 return;
422
423 if (!pasid)
424 return;
425
426 pci_write_config_word(pdev, pasid + PCI_PASID_CTRL, control);
427
428 pdev->pasid_enabled = 0;
429 }
430 EXPORT_SYMBOL_GPL(pci_disable_pasid);
431
432 /**
433 * pci_restore_pasid_state - Restore PASID capabilities
434 * @pdev: PCI device structure
435 */
pci_restore_pasid_state(struct pci_dev * pdev)436 void pci_restore_pasid_state(struct pci_dev *pdev)
437 {
438 u16 control;
439 int pasid = pdev->pasid_cap;
440
441 if (pdev->is_virtfn)
442 return;
443
444 if (!pdev->pasid_enabled)
445 return;
446
447 if (!pasid)
448 return;
449
450 control = PCI_PASID_CTRL_ENABLE | pdev->pasid_features;
451 pci_write_config_word(pdev, pasid + PCI_PASID_CTRL, control);
452 }
453
454 /**
455 * pci_pasid_features - Check which PASID features are supported
456 * @pdev: PCI device structure
457 *
458 * Returns a negative value when no PASI capability is present.
459 * Otherwise is returns a bitmask with supported features. Current
460 * features reported are:
461 * PCI_PASID_CAP_EXEC - Execute permission supported
462 * PCI_PASID_CAP_PRIV - Privileged mode supported
463 */
pci_pasid_features(struct pci_dev * pdev)464 int pci_pasid_features(struct pci_dev *pdev)
465 {
466 u16 supported;
467 int pasid;
468
469 if (pdev->is_virtfn)
470 pdev = pci_physfn(pdev);
471
472 pasid = pdev->pasid_cap;
473 if (!pasid)
474 return -EINVAL;
475
476 pci_read_config_word(pdev, pasid + PCI_PASID_CAP, &supported);
477
478 supported &= PCI_PASID_CAP_EXEC | PCI_PASID_CAP_PRIV;
479
480 return supported;
481 }
482 EXPORT_SYMBOL_GPL(pci_pasid_features);
483
484 /**
485 * pci_max_pasids - Get maximum number of PASIDs supported by device
486 * @pdev: PCI device structure
487 *
488 * Returns negative value when PASID capability is not present.
489 * Otherwise it returns the number of supported PASIDs.
490 */
pci_max_pasids(struct pci_dev * pdev)491 int pci_max_pasids(struct pci_dev *pdev)
492 {
493 u16 supported;
494 int pasid;
495
496 if (pdev->is_virtfn)
497 pdev = pci_physfn(pdev);
498
499 pasid = pdev->pasid_cap;
500 if (!pasid)
501 return -EINVAL;
502
503 pci_read_config_word(pdev, pasid + PCI_PASID_CAP, &supported);
504
505 return (1 << FIELD_GET(PCI_PASID_CAP_WIDTH, supported));
506 }
507 EXPORT_SYMBOL_GPL(pci_max_pasids);
508 #endif /* CONFIG_PCI_PASID */
509