Revert "unicode: Don't special case ignorable code points"
[linux.git] / drivers / pci / ats.c
blob6afff1f1b143019030cbba1bb250b442cfc7ab1d
1 // SPDX-License-Identifier: GPL-2.0
2 /*
3 * PCI Express I/O Virtualization (IOV) support
4 * Address Translation Service 1.0
5 * Page Request Interface added by Joerg Roedel <joerg.roedel@amd.com>
6 * PASID support added by Joerg Roedel <joerg.roedel@amd.com>
8 * Copyright (C) 2009 Intel Corporation, Yu Zhao <yu.zhao@intel.com>
9 * Copyright (C) 2011 Advanced Micro Devices,
12 #include <linux/bitfield.h>
13 #include <linux/export.h>
14 #include <linux/pci-ats.h>
15 #include <linux/pci.h>
16 #include <linux/slab.h>
18 #include "pci.h"
20 void pci_ats_init(struct pci_dev *dev)
22 int pos;
24 if (pci_ats_disabled())
25 return;
27 pos = pci_find_ext_capability(dev, PCI_EXT_CAP_ID_ATS);
28 if (!pos)
29 return;
31 dev->ats_cap = pos;
34 /**
35 * pci_ats_supported - check if the device can use ATS
36 * @dev: the PCI device
38 * Returns true if the device supports ATS and is allowed to use it, false
39 * otherwise.
41 bool pci_ats_supported(struct pci_dev *dev)
43 if (!dev->ats_cap)
44 return false;
46 return (dev->untrusted == 0);
48 EXPORT_SYMBOL_GPL(pci_ats_supported);
50 /**
51 * pci_prepare_ats - Setup the PS for ATS
52 * @dev: the PCI device
53 * @ps: the IOMMU page shift
55 * This must be done by the IOMMU driver on the PF before any VFs are created to
56 * ensure that the VF can have ATS enabled.
58 * Returns 0 on success, or negative on failure.
60 int pci_prepare_ats(struct pci_dev *dev, int ps)
62 u16 ctrl;
64 if (!pci_ats_supported(dev))
65 return -EINVAL;
67 if (WARN_ON(dev->ats_enabled))
68 return -EBUSY;
70 if (ps < PCI_ATS_MIN_STU)
71 return -EINVAL;
73 if (dev->is_virtfn)
74 return 0;
76 dev->ats_stu = ps;
77 ctrl = PCI_ATS_CTRL_STU(dev->ats_stu - PCI_ATS_MIN_STU);
78 pci_write_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, ctrl);
79 return 0;
81 EXPORT_SYMBOL_GPL(pci_prepare_ats);
83 /**
84 * pci_enable_ats - enable the ATS capability
85 * @dev: the PCI device
86 * @ps: the IOMMU page shift
88 * Returns 0 on success, or negative on failure.
90 int pci_enable_ats(struct pci_dev *dev, int ps)
92 u16 ctrl;
93 struct pci_dev *pdev;
95 if (!pci_ats_supported(dev))
96 return -EINVAL;
98 if (WARN_ON(dev->ats_enabled))
99 return -EBUSY;
101 if (ps < PCI_ATS_MIN_STU)
102 return -EINVAL;
105 * Note that enabling ATS on a VF fails unless it's already enabled
106 * with the same STU on the PF.
108 ctrl = PCI_ATS_CTRL_ENABLE;
109 if (dev->is_virtfn) {
110 pdev = pci_physfn(dev);
111 if (pdev->ats_stu != ps)
112 return -EINVAL;
113 } else {
114 dev->ats_stu = ps;
115 ctrl |= PCI_ATS_CTRL_STU(dev->ats_stu - PCI_ATS_MIN_STU);
117 pci_write_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, ctrl);
119 dev->ats_enabled = 1;
120 return 0;
122 EXPORT_SYMBOL_GPL(pci_enable_ats);
125 * pci_disable_ats - disable the ATS capability
126 * @dev: the PCI device
128 void pci_disable_ats(struct pci_dev *dev)
130 u16 ctrl;
132 if (WARN_ON(!dev->ats_enabled))
133 return;
135 pci_read_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, &ctrl);
136 ctrl &= ~PCI_ATS_CTRL_ENABLE;
137 pci_write_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, ctrl);
139 dev->ats_enabled = 0;
141 EXPORT_SYMBOL_GPL(pci_disable_ats);
143 void pci_restore_ats_state(struct pci_dev *dev)
145 u16 ctrl;
147 if (!dev->ats_enabled)
148 return;
150 ctrl = PCI_ATS_CTRL_ENABLE;
151 if (!dev->is_virtfn)
152 ctrl |= PCI_ATS_CTRL_STU(dev->ats_stu - PCI_ATS_MIN_STU);
153 pci_write_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, ctrl);
157 * pci_ats_queue_depth - query the ATS Invalidate Queue Depth
158 * @dev: the PCI device
160 * Returns the queue depth on success, or negative on failure.
162 * The ATS spec uses 0 in the Invalidate Queue Depth field to
163 * indicate that the function can accept 32 Invalidate Request.
164 * But here we use the `real' values (i.e. 1~32) for the Queue
165 * Depth; and 0 indicates the function shares the Queue with
166 * other functions (doesn't exclusively own a Queue).
168 int pci_ats_queue_depth(struct pci_dev *dev)
170 u16 cap;
172 if (!dev->ats_cap)
173 return -EINVAL;
175 if (dev->is_virtfn)
176 return 0;
178 pci_read_config_word(dev, dev->ats_cap + PCI_ATS_CAP, &cap);
179 return PCI_ATS_CAP_QDEP(cap) ? PCI_ATS_CAP_QDEP(cap) : PCI_ATS_MAX_QDEP;
183 * pci_ats_page_aligned - Return Page Aligned Request bit status.
184 * @pdev: the PCI device
186 * Returns 1, if the Untranslated Addresses generated by the device
187 * are always aligned or 0 otherwise.
189 * Per PCIe spec r4.0, sec 10.5.1.2, if the Page Aligned Request bit
190 * is set, it indicates the Untranslated Addresses generated by the
191 * device are always aligned to a 4096 byte boundary.
193 int pci_ats_page_aligned(struct pci_dev *pdev)
195 u16 cap;
197 if (!pdev->ats_cap)
198 return 0;
200 pci_read_config_word(pdev, pdev->ats_cap + PCI_ATS_CAP, &cap);
202 if (cap & PCI_ATS_CAP_PAGE_ALIGNED)
203 return 1;
205 return 0;
208 #ifdef CONFIG_PCI_PRI
209 void pci_pri_init(struct pci_dev *pdev)
211 u16 status;
213 pdev->pri_cap = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PRI);
215 if (!pdev->pri_cap)
216 return;
218 pci_read_config_word(pdev, pdev->pri_cap + PCI_PRI_STATUS, &status);
219 if (status & PCI_PRI_STATUS_PASID)
220 pdev->pasid_required = 1;
224 * pci_enable_pri - Enable PRI capability
225 * @pdev: PCI device structure
226 * @reqs: outstanding requests
228 * Returns 0 on success, negative value on error
230 int pci_enable_pri(struct pci_dev *pdev, u32 reqs)
232 u16 control, status;
233 u32 max_requests;
234 int pri = pdev->pri_cap;
237 * VFs must not implement the PRI Capability. If their PF
238 * implements PRI, it is shared by the VFs, so if the PF PRI is
239 * enabled, it is also enabled for the VF.
241 if (pdev->is_virtfn) {
242 if (pci_physfn(pdev)->pri_enabled)
243 return 0;
244 return -EINVAL;
247 if (WARN_ON(pdev->pri_enabled))
248 return -EBUSY;
250 if (!pri)
251 return -EINVAL;
253 pci_read_config_word(pdev, pri + PCI_PRI_STATUS, &status);
254 if (!(status & PCI_PRI_STATUS_STOPPED))
255 return -EBUSY;
257 pci_read_config_dword(pdev, pri + PCI_PRI_MAX_REQ, &max_requests);
258 reqs = min(max_requests, reqs);
259 pdev->pri_reqs_alloc = reqs;
260 pci_write_config_dword(pdev, pri + PCI_PRI_ALLOC_REQ, reqs);
262 control = PCI_PRI_CTRL_ENABLE;
263 pci_write_config_word(pdev, pri + PCI_PRI_CTRL, control);
265 pdev->pri_enabled = 1;
267 return 0;
271 * pci_disable_pri - Disable PRI capability
272 * @pdev: PCI device structure
274 * Only clears the enabled-bit, regardless of its former value
276 void pci_disable_pri(struct pci_dev *pdev)
278 u16 control;
279 int pri = pdev->pri_cap;
281 /* VFs share the PF PRI */
282 if (pdev->is_virtfn)
283 return;
285 if (WARN_ON(!pdev->pri_enabled))
286 return;
288 if (!pri)
289 return;
291 pci_read_config_word(pdev, pri + PCI_PRI_CTRL, &control);
292 control &= ~PCI_PRI_CTRL_ENABLE;
293 pci_write_config_word(pdev, pri + PCI_PRI_CTRL, control);
295 pdev->pri_enabled = 0;
297 EXPORT_SYMBOL_GPL(pci_disable_pri);
300 * pci_restore_pri_state - Restore PRI
301 * @pdev: PCI device structure
303 void pci_restore_pri_state(struct pci_dev *pdev)
305 u16 control = PCI_PRI_CTRL_ENABLE;
306 u32 reqs = pdev->pri_reqs_alloc;
307 int pri = pdev->pri_cap;
309 if (pdev->is_virtfn)
310 return;
312 if (!pdev->pri_enabled)
313 return;
315 if (!pri)
316 return;
318 pci_write_config_dword(pdev, pri + PCI_PRI_ALLOC_REQ, reqs);
319 pci_write_config_word(pdev, pri + PCI_PRI_CTRL, control);
323 * pci_reset_pri - Resets device's PRI state
324 * @pdev: PCI device structure
326 * The PRI capability must be disabled before this function is called.
327 * Returns 0 on success, negative value on error.
329 int pci_reset_pri(struct pci_dev *pdev)
331 u16 control;
332 int pri = pdev->pri_cap;
334 if (pdev->is_virtfn)
335 return 0;
337 if (WARN_ON(pdev->pri_enabled))
338 return -EBUSY;
340 if (!pri)
341 return -EINVAL;
343 control = PCI_PRI_CTRL_RESET;
344 pci_write_config_word(pdev, pri + PCI_PRI_CTRL, control);
346 return 0;
350 * pci_prg_resp_pasid_required - Return PRG Response PASID Required bit
351 * status.
352 * @pdev: PCI device structure
354 * Returns 1 if PASID is required in PRG Response Message, 0 otherwise.
356 int pci_prg_resp_pasid_required(struct pci_dev *pdev)
358 if (pdev->is_virtfn)
359 pdev = pci_physfn(pdev);
361 return pdev->pasid_required;
365 * pci_pri_supported - Check if PRI is supported.
366 * @pdev: PCI device structure
368 * Returns true if PRI capability is present, false otherwise.
370 bool pci_pri_supported(struct pci_dev *pdev)
372 /* VFs share the PF PRI */
373 if (pci_physfn(pdev)->pri_cap)
374 return true;
375 return false;
377 EXPORT_SYMBOL_GPL(pci_pri_supported);
378 #endif /* CONFIG_PCI_PRI */
380 #ifdef CONFIG_PCI_PASID
381 void pci_pasid_init(struct pci_dev *pdev)
383 pdev->pasid_cap = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PASID);
387 * pci_enable_pasid - Enable the PASID capability
388 * @pdev: PCI device structure
389 * @features: Features to enable
391 * Returns 0 on success, negative value on error. This function checks
392 * whether the features are actually supported by the device and returns
393 * an error if not.
395 int pci_enable_pasid(struct pci_dev *pdev, int features)
397 u16 control, supported;
398 int pasid = pdev->pasid_cap;
401 * VFs must not implement the PASID Capability, but if a PF
402 * supports PASID, its VFs share the PF PASID configuration.
404 if (pdev->is_virtfn) {
405 if (pci_physfn(pdev)->pasid_enabled)
406 return 0;
407 return -EINVAL;
410 if (WARN_ON(pdev->pasid_enabled))
411 return -EBUSY;
413 if (!pdev->eetlp_prefix_path && !pdev->pasid_no_tlp)
414 return -EINVAL;
416 if (!pasid)
417 return -EINVAL;
419 if (!pci_acs_path_enabled(pdev, NULL, PCI_ACS_RR | PCI_ACS_UF))
420 return -EINVAL;
422 pci_read_config_word(pdev, pasid + PCI_PASID_CAP, &supported);
423 supported &= PCI_PASID_CAP_EXEC | PCI_PASID_CAP_PRIV;
425 /* User wants to enable anything unsupported? */
426 if ((supported & features) != features)
427 return -EINVAL;
429 control = PCI_PASID_CTRL_ENABLE | features;
430 pdev->pasid_features = features;
432 pci_write_config_word(pdev, pasid + PCI_PASID_CTRL, control);
434 pdev->pasid_enabled = 1;
436 return 0;
438 EXPORT_SYMBOL_GPL(pci_enable_pasid);
441 * pci_disable_pasid - Disable the PASID capability
442 * @pdev: PCI device structure
444 void pci_disable_pasid(struct pci_dev *pdev)
446 u16 control = 0;
447 int pasid = pdev->pasid_cap;
449 /* VFs share the PF PASID configuration */
450 if (pdev->is_virtfn)
451 return;
453 if (WARN_ON(!pdev->pasid_enabled))
454 return;
456 if (!pasid)
457 return;
459 pci_write_config_word(pdev, pasid + PCI_PASID_CTRL, control);
461 pdev->pasid_enabled = 0;
463 EXPORT_SYMBOL_GPL(pci_disable_pasid);
466 * pci_restore_pasid_state - Restore PASID capabilities
467 * @pdev: PCI device structure
469 void pci_restore_pasid_state(struct pci_dev *pdev)
471 u16 control;
472 int pasid = pdev->pasid_cap;
474 if (pdev->is_virtfn)
475 return;
477 if (!pdev->pasid_enabled)
478 return;
480 if (!pasid)
481 return;
483 control = PCI_PASID_CTRL_ENABLE | pdev->pasid_features;
484 pci_write_config_word(pdev, pasid + PCI_PASID_CTRL, control);
488 * pci_pasid_features - Check which PASID features are supported
489 * @pdev: PCI device structure
491 * Return a negative value when no PASID capability is present.
492 * Otherwise return a bitmask with supported features. Current
493 * features reported are:
494 * PCI_PASID_CAP_EXEC - Execute permission supported
495 * PCI_PASID_CAP_PRIV - Privileged mode supported
497 int pci_pasid_features(struct pci_dev *pdev)
499 u16 supported;
500 int pasid;
502 if (pdev->is_virtfn)
503 pdev = pci_physfn(pdev);
505 pasid = pdev->pasid_cap;
506 if (!pasid)
507 return -EINVAL;
509 pci_read_config_word(pdev, pasid + PCI_PASID_CAP, &supported);
511 supported &= PCI_PASID_CAP_EXEC | PCI_PASID_CAP_PRIV;
513 return supported;
515 EXPORT_SYMBOL_GPL(pci_pasid_features);
518 * pci_max_pasids - Get maximum number of PASIDs supported by device
519 * @pdev: PCI device structure
521 * Returns negative value when PASID capability is not present.
522 * Otherwise it returns the number of supported PASIDs.
524 int pci_max_pasids(struct pci_dev *pdev)
526 u16 supported;
527 int pasid;
529 if (pdev->is_virtfn)
530 pdev = pci_physfn(pdev);
532 pasid = pdev->pasid_cap;
533 if (!pasid)
534 return -EINVAL;
536 pci_read_config_word(pdev, pasid + PCI_PASID_CAP, &supported);
538 return (1 << FIELD_GET(PCI_PASID_CAP_WIDTH, supported));
540 EXPORT_SYMBOL_GPL(pci_max_pasids);
541 #endif /* CONFIG_PCI_PASID */