of/platform: Initialise default DMA masks
[linux/fpc-iii.git] / drivers / pci / iov.c
blob0f04ae648cf14bcc590ce55b5b91a5635b02c500
1 // SPDX-License-Identifier: GPL-2.0
2 /*
3 * PCI Express I/O Virtualization (IOV) support
4 * Single Root IOV 1.0
5 * Address Translation Service 1.0
7 * Copyright (C) 2009 Intel Corporation, Yu Zhao <yu.zhao@intel.com>
8 */
10 #include <linux/pci.h>
11 #include <linux/slab.h>
12 #include <linux/mutex.h>
13 #include <linux/export.h>
14 #include <linux/string.h>
15 #include <linux/delay.h>
16 #include <linux/pci-ats.h>
17 #include "pci.h"
19 #define VIRTFN_ID_LEN 16
21 int pci_iov_virtfn_bus(struct pci_dev *dev, int vf_id)
23 if (!dev->is_physfn)
24 return -EINVAL;
25 return dev->bus->number + ((dev->devfn + dev->sriov->offset +
26 dev->sriov->stride * vf_id) >> 8);
29 int pci_iov_virtfn_devfn(struct pci_dev *dev, int vf_id)
31 if (!dev->is_physfn)
32 return -EINVAL;
33 return (dev->devfn + dev->sriov->offset +
34 dev->sriov->stride * vf_id) & 0xff;
38 * Per SR-IOV spec sec 3.3.10 and 3.3.11, First VF Offset and VF Stride may
39 * change when NumVFs changes.
41 * Update iov->offset and iov->stride when NumVFs is written.
43 static inline void pci_iov_set_numvfs(struct pci_dev *dev, int nr_virtfn)
45 struct pci_sriov *iov = dev->sriov;
47 pci_write_config_word(dev, iov->pos + PCI_SRIOV_NUM_VF, nr_virtfn);
48 pci_read_config_word(dev, iov->pos + PCI_SRIOV_VF_OFFSET, &iov->offset);
49 pci_read_config_word(dev, iov->pos + PCI_SRIOV_VF_STRIDE, &iov->stride);
53 * The PF consumes one bus number. NumVFs, First VF Offset, and VF Stride
54 * determine how many additional bus numbers will be consumed by VFs.
56 * Iterate over all valid NumVFs, validate offset and stride, and calculate
57 * the maximum number of bus numbers that could ever be required.
59 static int compute_max_vf_buses(struct pci_dev *dev)
61 struct pci_sriov *iov = dev->sriov;
62 int nr_virtfn, busnr, rc = 0;
64 for (nr_virtfn = iov->total_VFs; nr_virtfn; nr_virtfn--) {
65 pci_iov_set_numvfs(dev, nr_virtfn);
66 if (!iov->offset || (nr_virtfn > 1 && !iov->stride)) {
67 rc = -EIO;
68 goto out;
71 busnr = pci_iov_virtfn_bus(dev, nr_virtfn - 1);
72 if (busnr > iov->max_VF_buses)
73 iov->max_VF_buses = busnr;
76 out:
77 pci_iov_set_numvfs(dev, 0);
78 return rc;
81 static struct pci_bus *virtfn_add_bus(struct pci_bus *bus, int busnr)
83 struct pci_bus *child;
85 if (bus->number == busnr)
86 return bus;
88 child = pci_find_bus(pci_domain_nr(bus), busnr);
89 if (child)
90 return child;
92 child = pci_add_new_bus(bus, NULL, busnr);
93 if (!child)
94 return NULL;
96 pci_bus_insert_busn_res(child, busnr, busnr);
98 return child;
101 static void virtfn_remove_bus(struct pci_bus *physbus, struct pci_bus *virtbus)
103 if (physbus != virtbus && list_empty(&virtbus->devices))
104 pci_remove_bus(virtbus);
107 resource_size_t pci_iov_resource_size(struct pci_dev *dev, int resno)
109 if (!dev->is_physfn)
110 return 0;
112 return dev->sriov->barsz[resno - PCI_IOV_RESOURCES];
115 static void pci_read_vf_config_common(struct pci_dev *virtfn)
117 struct pci_dev *physfn = virtfn->physfn;
120 * Some config registers are the same across all associated VFs.
121 * Read them once from VF0 so we can skip reading them from the
122 * other VFs.
124 * PCIe r4.0, sec 9.3.4.1, technically doesn't require all VFs to
125 * have the same Revision ID and Subsystem ID, but we assume they
126 * do.
128 pci_read_config_dword(virtfn, PCI_CLASS_REVISION,
129 &physfn->sriov->class);
130 pci_read_config_byte(virtfn, PCI_HEADER_TYPE,
131 &physfn->sriov->hdr_type);
132 pci_read_config_word(virtfn, PCI_SUBSYSTEM_VENDOR_ID,
133 &physfn->sriov->subsystem_vendor);
134 pci_read_config_word(virtfn, PCI_SUBSYSTEM_ID,
135 &physfn->sriov->subsystem_device);
138 int pci_iov_add_virtfn(struct pci_dev *dev, int id)
140 int i;
141 int rc = -ENOMEM;
142 u64 size;
143 char buf[VIRTFN_ID_LEN];
144 struct pci_dev *virtfn;
145 struct resource *res;
146 struct pci_sriov *iov = dev->sriov;
147 struct pci_bus *bus;
149 bus = virtfn_add_bus(dev->bus, pci_iov_virtfn_bus(dev, id));
150 if (!bus)
151 goto failed;
153 virtfn = pci_alloc_dev(bus);
154 if (!virtfn)
155 goto failed0;
157 virtfn->devfn = pci_iov_virtfn_devfn(dev, id);
158 virtfn->vendor = dev->vendor;
159 virtfn->device = iov->vf_device;
160 virtfn->is_virtfn = 1;
161 virtfn->physfn = pci_dev_get(dev);
163 if (id == 0)
164 pci_read_vf_config_common(virtfn);
166 rc = pci_setup_device(virtfn);
167 if (rc)
168 goto failed1;
170 virtfn->dev.parent = dev->dev.parent;
171 virtfn->multifunction = 0;
173 for (i = 0; i < PCI_SRIOV_NUM_BARS; i++) {
174 res = &dev->resource[i + PCI_IOV_RESOURCES];
175 if (!res->parent)
176 continue;
177 virtfn->resource[i].name = pci_name(virtfn);
178 virtfn->resource[i].flags = res->flags;
179 size = pci_iov_resource_size(dev, i + PCI_IOV_RESOURCES);
180 virtfn->resource[i].start = res->start + size * id;
181 virtfn->resource[i].end = virtfn->resource[i].start + size - 1;
182 rc = request_resource(res, &virtfn->resource[i]);
183 BUG_ON(rc);
186 pci_device_add(virtfn, virtfn->bus);
188 sprintf(buf, "virtfn%u", id);
189 rc = sysfs_create_link(&dev->dev.kobj, &virtfn->dev.kobj, buf);
190 if (rc)
191 goto failed2;
192 rc = sysfs_create_link(&virtfn->dev.kobj, &dev->dev.kobj, "physfn");
193 if (rc)
194 goto failed3;
196 kobject_uevent(&virtfn->dev.kobj, KOBJ_CHANGE);
198 pci_bus_add_device(virtfn);
200 return 0;
202 failed3:
203 sysfs_remove_link(&dev->dev.kobj, buf);
204 failed2:
205 pci_stop_and_remove_bus_device(virtfn);
206 failed1:
207 pci_dev_put(dev);
208 failed0:
209 virtfn_remove_bus(dev->bus, bus);
210 failed:
212 return rc;
215 void pci_iov_remove_virtfn(struct pci_dev *dev, int id)
217 char buf[VIRTFN_ID_LEN];
218 struct pci_dev *virtfn;
220 virtfn = pci_get_domain_bus_and_slot(pci_domain_nr(dev->bus),
221 pci_iov_virtfn_bus(dev, id),
222 pci_iov_virtfn_devfn(dev, id));
223 if (!virtfn)
224 return;
226 sprintf(buf, "virtfn%u", id);
227 sysfs_remove_link(&dev->dev.kobj, buf);
229 * pci_stop_dev() could have been called for this virtfn already,
230 * so the directory for the virtfn may have been removed before.
231 * Double check to avoid spurious sysfs warnings.
233 if (virtfn->dev.kobj.sd)
234 sysfs_remove_link(&virtfn->dev.kobj, "physfn");
236 pci_stop_and_remove_bus_device(virtfn);
237 virtfn_remove_bus(dev->bus, virtfn->bus);
239 /* balance pci_get_domain_bus_and_slot() */
240 pci_dev_put(virtfn);
241 pci_dev_put(dev);
244 int __weak pcibios_sriov_enable(struct pci_dev *pdev, u16 num_vfs)
246 return 0;
249 int __weak pcibios_sriov_disable(struct pci_dev *pdev)
251 return 0;
254 static int sriov_enable(struct pci_dev *dev, int nr_virtfn)
256 int rc;
257 int i;
258 int nres;
259 u16 initial;
260 struct resource *res;
261 struct pci_dev *pdev;
262 struct pci_sriov *iov = dev->sriov;
263 int bars = 0;
264 int bus;
266 if (!nr_virtfn)
267 return 0;
269 if (iov->num_VFs)
270 return -EINVAL;
272 pci_read_config_word(dev, iov->pos + PCI_SRIOV_INITIAL_VF, &initial);
273 if (initial > iov->total_VFs ||
274 (!(iov->cap & PCI_SRIOV_CAP_VFM) && (initial != iov->total_VFs)))
275 return -EIO;
277 if (nr_virtfn < 0 || nr_virtfn > iov->total_VFs ||
278 (!(iov->cap & PCI_SRIOV_CAP_VFM) && (nr_virtfn > initial)))
279 return -EINVAL;
281 nres = 0;
282 for (i = 0; i < PCI_SRIOV_NUM_BARS; i++) {
283 bars |= (1 << (i + PCI_IOV_RESOURCES));
284 res = &dev->resource[i + PCI_IOV_RESOURCES];
285 if (res->parent)
286 nres++;
288 if (nres != iov->nres) {
289 pci_err(dev, "not enough MMIO resources for SR-IOV\n");
290 return -ENOMEM;
293 bus = pci_iov_virtfn_bus(dev, nr_virtfn - 1);
294 if (bus > dev->bus->busn_res.end) {
295 pci_err(dev, "can't enable %d VFs (bus %02x out of range of %pR)\n",
296 nr_virtfn, bus, &dev->bus->busn_res);
297 return -ENOMEM;
300 if (pci_enable_resources(dev, bars)) {
301 pci_err(dev, "SR-IOV: IOV BARS not allocated\n");
302 return -ENOMEM;
305 if (iov->link != dev->devfn) {
306 pdev = pci_get_slot(dev->bus, iov->link);
307 if (!pdev)
308 return -ENODEV;
310 if (!pdev->is_physfn) {
311 pci_dev_put(pdev);
312 return -ENOSYS;
315 rc = sysfs_create_link(&dev->dev.kobj,
316 &pdev->dev.kobj, "dep_link");
317 pci_dev_put(pdev);
318 if (rc)
319 return rc;
322 iov->initial_VFs = initial;
323 if (nr_virtfn < initial)
324 initial = nr_virtfn;
326 rc = pcibios_sriov_enable(dev, initial);
327 if (rc) {
328 pci_err(dev, "failure %d from pcibios_sriov_enable()\n", rc);
329 goto err_pcibios;
332 pci_iov_set_numvfs(dev, nr_virtfn);
333 iov->ctrl |= PCI_SRIOV_CTRL_VFE | PCI_SRIOV_CTRL_MSE;
334 pci_cfg_access_lock(dev);
335 pci_write_config_word(dev, iov->pos + PCI_SRIOV_CTRL, iov->ctrl);
336 msleep(100);
337 pci_cfg_access_unlock(dev);
339 for (i = 0; i < initial; i++) {
340 rc = pci_iov_add_virtfn(dev, i);
341 if (rc)
342 goto failed;
345 kobject_uevent(&dev->dev.kobj, KOBJ_CHANGE);
346 iov->num_VFs = nr_virtfn;
348 return 0;
350 failed:
351 while (i--)
352 pci_iov_remove_virtfn(dev, i);
354 err_pcibios:
355 iov->ctrl &= ~(PCI_SRIOV_CTRL_VFE | PCI_SRIOV_CTRL_MSE);
356 pci_cfg_access_lock(dev);
357 pci_write_config_word(dev, iov->pos + PCI_SRIOV_CTRL, iov->ctrl);
358 ssleep(1);
359 pci_cfg_access_unlock(dev);
361 pcibios_sriov_disable(dev);
363 if (iov->link != dev->devfn)
364 sysfs_remove_link(&dev->dev.kobj, "dep_link");
366 pci_iov_set_numvfs(dev, 0);
367 return rc;
370 static void sriov_disable(struct pci_dev *dev)
372 int i;
373 struct pci_sriov *iov = dev->sriov;
375 if (!iov->num_VFs)
376 return;
378 for (i = 0; i < iov->num_VFs; i++)
379 pci_iov_remove_virtfn(dev, i);
381 iov->ctrl &= ~(PCI_SRIOV_CTRL_VFE | PCI_SRIOV_CTRL_MSE);
382 pci_cfg_access_lock(dev);
383 pci_write_config_word(dev, iov->pos + PCI_SRIOV_CTRL, iov->ctrl);
384 ssleep(1);
385 pci_cfg_access_unlock(dev);
387 pcibios_sriov_disable(dev);
389 if (iov->link != dev->devfn)
390 sysfs_remove_link(&dev->dev.kobj, "dep_link");
392 iov->num_VFs = 0;
393 pci_iov_set_numvfs(dev, 0);
396 static int sriov_init(struct pci_dev *dev, int pos)
398 int i, bar64;
399 int rc;
400 int nres;
401 u32 pgsz;
402 u16 ctrl, total;
403 struct pci_sriov *iov;
404 struct resource *res;
405 struct pci_dev *pdev;
407 pci_read_config_word(dev, pos + PCI_SRIOV_CTRL, &ctrl);
408 if (ctrl & PCI_SRIOV_CTRL_VFE) {
409 pci_write_config_word(dev, pos + PCI_SRIOV_CTRL, 0);
410 ssleep(1);
413 ctrl = 0;
414 list_for_each_entry(pdev, &dev->bus->devices, bus_list)
415 if (pdev->is_physfn)
416 goto found;
418 pdev = NULL;
419 if (pci_ari_enabled(dev->bus))
420 ctrl |= PCI_SRIOV_CTRL_ARI;
422 found:
423 pci_write_config_word(dev, pos + PCI_SRIOV_CTRL, ctrl);
425 pci_read_config_word(dev, pos + PCI_SRIOV_TOTAL_VF, &total);
426 if (!total)
427 return 0;
429 pci_read_config_dword(dev, pos + PCI_SRIOV_SUP_PGSIZE, &pgsz);
430 i = PAGE_SHIFT > 12 ? PAGE_SHIFT - 12 : 0;
431 pgsz &= ~((1 << i) - 1);
432 if (!pgsz)
433 return -EIO;
435 pgsz &= ~(pgsz - 1);
436 pci_write_config_dword(dev, pos + PCI_SRIOV_SYS_PGSIZE, pgsz);
438 iov = kzalloc(sizeof(*iov), GFP_KERNEL);
439 if (!iov)
440 return -ENOMEM;
442 nres = 0;
443 for (i = 0; i < PCI_SRIOV_NUM_BARS; i++) {
444 res = &dev->resource[i + PCI_IOV_RESOURCES];
446 * If it is already FIXED, don't change it, something
447 * (perhaps EA or header fixups) wants it this way.
449 if (res->flags & IORESOURCE_PCI_FIXED)
450 bar64 = (res->flags & IORESOURCE_MEM_64) ? 1 : 0;
451 else
452 bar64 = __pci_read_base(dev, pci_bar_unknown, res,
453 pos + PCI_SRIOV_BAR + i * 4);
454 if (!res->flags)
455 continue;
456 if (resource_size(res) & (PAGE_SIZE - 1)) {
457 rc = -EIO;
458 goto failed;
460 iov->barsz[i] = resource_size(res);
461 res->end = res->start + resource_size(res) * total - 1;
462 pci_info(dev, "VF(n) BAR%d space: %pR (contains BAR%d for %d VFs)\n",
463 i, res, i, total);
464 i += bar64;
465 nres++;
468 iov->pos = pos;
469 iov->nres = nres;
470 iov->ctrl = ctrl;
471 iov->total_VFs = total;
472 iov->driver_max_VFs = total;
473 pci_read_config_word(dev, pos + PCI_SRIOV_VF_DID, &iov->vf_device);
474 iov->pgsz = pgsz;
475 iov->self = dev;
476 iov->drivers_autoprobe = true;
477 pci_read_config_dword(dev, pos + PCI_SRIOV_CAP, &iov->cap);
478 pci_read_config_byte(dev, pos + PCI_SRIOV_FUNC_LINK, &iov->link);
479 if (pci_pcie_type(dev) == PCI_EXP_TYPE_RC_END)
480 iov->link = PCI_DEVFN(PCI_SLOT(dev->devfn), iov->link);
482 if (pdev)
483 iov->dev = pci_dev_get(pdev);
484 else
485 iov->dev = dev;
487 dev->sriov = iov;
488 dev->is_physfn = 1;
489 rc = compute_max_vf_buses(dev);
490 if (rc)
491 goto fail_max_buses;
493 return 0;
495 fail_max_buses:
496 dev->sriov = NULL;
497 dev->is_physfn = 0;
498 failed:
499 for (i = 0; i < PCI_SRIOV_NUM_BARS; i++) {
500 res = &dev->resource[i + PCI_IOV_RESOURCES];
501 res->flags = 0;
504 kfree(iov);
505 return rc;
508 static void sriov_release(struct pci_dev *dev)
510 BUG_ON(dev->sriov->num_VFs);
512 if (dev != dev->sriov->dev)
513 pci_dev_put(dev->sriov->dev);
515 kfree(dev->sriov);
516 dev->sriov = NULL;
519 static void sriov_restore_state(struct pci_dev *dev)
521 int i;
522 u16 ctrl;
523 struct pci_sriov *iov = dev->sriov;
525 pci_read_config_word(dev, iov->pos + PCI_SRIOV_CTRL, &ctrl);
526 if (ctrl & PCI_SRIOV_CTRL_VFE)
527 return;
530 * Restore PCI_SRIOV_CTRL_ARI before pci_iov_set_numvfs() because
531 * it reads offset & stride, which depend on PCI_SRIOV_CTRL_ARI.
533 ctrl &= ~PCI_SRIOV_CTRL_ARI;
534 ctrl |= iov->ctrl & PCI_SRIOV_CTRL_ARI;
535 pci_write_config_word(dev, iov->pos + PCI_SRIOV_CTRL, ctrl);
537 for (i = PCI_IOV_RESOURCES; i <= PCI_IOV_RESOURCE_END; i++)
538 pci_update_resource(dev, i);
540 pci_write_config_dword(dev, iov->pos + PCI_SRIOV_SYS_PGSIZE, iov->pgsz);
541 pci_iov_set_numvfs(dev, iov->num_VFs);
542 pci_write_config_word(dev, iov->pos + PCI_SRIOV_CTRL, iov->ctrl);
543 if (iov->ctrl & PCI_SRIOV_CTRL_VFE)
544 msleep(100);
548 * pci_iov_init - initialize the IOV capability
549 * @dev: the PCI device
551 * Returns 0 on success, or negative on failure.
553 int pci_iov_init(struct pci_dev *dev)
555 int pos;
557 if (!pci_is_pcie(dev))
558 return -ENODEV;
560 pos = pci_find_ext_capability(dev, PCI_EXT_CAP_ID_SRIOV);
561 if (pos)
562 return sriov_init(dev, pos);
564 return -ENODEV;
568 * pci_iov_release - release resources used by the IOV capability
569 * @dev: the PCI device
571 void pci_iov_release(struct pci_dev *dev)
573 if (dev->is_physfn)
574 sriov_release(dev);
578 * pci_iov_remove - clean up SR-IOV state after PF driver is detached
579 * @dev: the PCI device
581 void pci_iov_remove(struct pci_dev *dev)
583 struct pci_sriov *iov = dev->sriov;
585 if (!dev->is_physfn)
586 return;
588 iov->driver_max_VFs = iov->total_VFs;
589 if (iov->num_VFs)
590 pci_warn(dev, "driver left SR-IOV enabled after remove\n");
594 * pci_iov_update_resource - update a VF BAR
595 * @dev: the PCI device
596 * @resno: the resource number
598 * Update a VF BAR in the SR-IOV capability of a PF.
600 void pci_iov_update_resource(struct pci_dev *dev, int resno)
602 struct pci_sriov *iov = dev->is_physfn ? dev->sriov : NULL;
603 struct resource *res = dev->resource + resno;
604 int vf_bar = resno - PCI_IOV_RESOURCES;
605 struct pci_bus_region region;
606 u16 cmd;
607 u32 new;
608 int reg;
611 * The generic pci_restore_bars() path calls this for all devices,
612 * including VFs and non-SR-IOV devices. If this is not a PF, we
613 * have nothing to do.
615 if (!iov)
616 return;
618 pci_read_config_word(dev, iov->pos + PCI_SRIOV_CTRL, &cmd);
619 if ((cmd & PCI_SRIOV_CTRL_VFE) && (cmd & PCI_SRIOV_CTRL_MSE)) {
620 dev_WARN(&dev->dev, "can't update enabled VF BAR%d %pR\n",
621 vf_bar, res);
622 return;
626 * Ignore unimplemented BARs, unused resource slots for 64-bit
627 * BARs, and non-movable resources, e.g., those described via
628 * Enhanced Allocation.
630 if (!res->flags)
631 return;
633 if (res->flags & IORESOURCE_UNSET)
634 return;
636 if (res->flags & IORESOURCE_PCI_FIXED)
637 return;
639 pcibios_resource_to_bus(dev->bus, &region, res);
640 new = region.start;
641 new |= res->flags & ~PCI_BASE_ADDRESS_MEM_MASK;
643 reg = iov->pos + PCI_SRIOV_BAR + 4 * vf_bar;
644 pci_write_config_dword(dev, reg, new);
645 if (res->flags & IORESOURCE_MEM_64) {
646 new = region.start >> 16 >> 16;
647 pci_write_config_dword(dev, reg + 4, new);
651 resource_size_t __weak pcibios_iov_resource_alignment(struct pci_dev *dev,
652 int resno)
654 return pci_iov_resource_size(dev, resno);
658 * pci_sriov_resource_alignment - get resource alignment for VF BAR
659 * @dev: the PCI device
660 * @resno: the resource number
662 * Returns the alignment of the VF BAR found in the SR-IOV capability.
663 * This is not the same as the resource size which is defined as
664 * the VF BAR size multiplied by the number of VFs. The alignment
665 * is just the VF BAR size.
667 resource_size_t pci_sriov_resource_alignment(struct pci_dev *dev, int resno)
669 return pcibios_iov_resource_alignment(dev, resno);
673 * pci_restore_iov_state - restore the state of the IOV capability
674 * @dev: the PCI device
676 void pci_restore_iov_state(struct pci_dev *dev)
678 if (dev->is_physfn)
679 sriov_restore_state(dev);
683 * pci_vf_drivers_autoprobe - set PF property drivers_autoprobe for VFs
684 * @dev: the PCI device
685 * @auto_probe: set VF drivers auto probe flag
687 void pci_vf_drivers_autoprobe(struct pci_dev *dev, bool auto_probe)
689 if (dev->is_physfn)
690 dev->sriov->drivers_autoprobe = auto_probe;
694 * pci_iov_bus_range - find bus range used by Virtual Function
695 * @bus: the PCI bus
697 * Returns max number of buses (exclude current one) used by Virtual
698 * Functions.
700 int pci_iov_bus_range(struct pci_bus *bus)
702 int max = 0;
703 struct pci_dev *dev;
705 list_for_each_entry(dev, &bus->devices, bus_list) {
706 if (!dev->is_physfn)
707 continue;
708 if (dev->sriov->max_VF_buses > max)
709 max = dev->sriov->max_VF_buses;
712 return max ? max - bus->number : 0;
716 * pci_enable_sriov - enable the SR-IOV capability
717 * @dev: the PCI device
718 * @nr_virtfn: number of virtual functions to enable
720 * Returns 0 on success, or negative on failure.
722 int pci_enable_sriov(struct pci_dev *dev, int nr_virtfn)
724 might_sleep();
726 if (!dev->is_physfn)
727 return -ENOSYS;
729 return sriov_enable(dev, nr_virtfn);
731 EXPORT_SYMBOL_GPL(pci_enable_sriov);
734 * pci_disable_sriov - disable the SR-IOV capability
735 * @dev: the PCI device
737 void pci_disable_sriov(struct pci_dev *dev)
739 might_sleep();
741 if (!dev->is_physfn)
742 return;
744 sriov_disable(dev);
746 EXPORT_SYMBOL_GPL(pci_disable_sriov);
749 * pci_num_vf - return number of VFs associated with a PF device_release_driver
750 * @dev: the PCI device
752 * Returns number of VFs, or 0 if SR-IOV is not enabled.
754 int pci_num_vf(struct pci_dev *dev)
756 if (!dev->is_physfn)
757 return 0;
759 return dev->sriov->num_VFs;
761 EXPORT_SYMBOL_GPL(pci_num_vf);
764 * pci_vfs_assigned - returns number of VFs are assigned to a guest
765 * @dev: the PCI device
767 * Returns number of VFs belonging to this device that are assigned to a guest.
768 * If device is not a physical function returns 0.
770 int pci_vfs_assigned(struct pci_dev *dev)
772 struct pci_dev *vfdev;
773 unsigned int vfs_assigned = 0;
774 unsigned short dev_id;
776 /* only search if we are a PF */
777 if (!dev->is_physfn)
778 return 0;
781 * determine the device ID for the VFs, the vendor ID will be the
782 * same as the PF so there is no need to check for that one
784 dev_id = dev->sriov->vf_device;
786 /* loop through all the VFs to see if we own any that are assigned */
787 vfdev = pci_get_device(dev->vendor, dev_id, NULL);
788 while (vfdev) {
790 * It is considered assigned if it is a virtual function with
791 * our dev as the physical function and the assigned bit is set
793 if (vfdev->is_virtfn && (vfdev->physfn == dev) &&
794 pci_is_dev_assigned(vfdev))
795 vfs_assigned++;
797 vfdev = pci_get_device(dev->vendor, dev_id, vfdev);
800 return vfs_assigned;
802 EXPORT_SYMBOL_GPL(pci_vfs_assigned);
805 * pci_sriov_set_totalvfs -- reduce the TotalVFs available
806 * @dev: the PCI PF device
807 * @numvfs: number that should be used for TotalVFs supported
809 * Should be called from PF driver's probe routine with
810 * device's mutex held.
812 * Returns 0 if PF is an SRIOV-capable device and
813 * value of numvfs valid. If not a PF return -ENOSYS;
814 * if numvfs is invalid return -EINVAL;
815 * if VFs already enabled, return -EBUSY.
817 int pci_sriov_set_totalvfs(struct pci_dev *dev, u16 numvfs)
819 if (!dev->is_physfn)
820 return -ENOSYS;
821 if (numvfs > dev->sriov->total_VFs)
822 return -EINVAL;
824 /* Shouldn't change if VFs already enabled */
825 if (dev->sriov->ctrl & PCI_SRIOV_CTRL_VFE)
826 return -EBUSY;
827 else
828 dev->sriov->driver_max_VFs = numvfs;
830 return 0;
832 EXPORT_SYMBOL_GPL(pci_sriov_set_totalvfs);
835 * pci_sriov_get_totalvfs -- get total VFs supported on this device
836 * @dev: the PCI PF device
838 * For a PCIe device with SRIOV support, return the PCIe
839 * SRIOV capability value of TotalVFs or the value of driver_max_VFs
840 * if the driver reduced it. Otherwise 0.
842 int pci_sriov_get_totalvfs(struct pci_dev *dev)
844 if (!dev->is_physfn)
845 return 0;
847 return dev->sriov->driver_max_VFs;
849 EXPORT_SYMBOL_GPL(pci_sriov_get_totalvfs);
852 * pci_sriov_configure_simple - helper to configure SR-IOV
853 * @dev: the PCI device
854 * @nr_virtfn: number of virtual functions to enable, 0 to disable
856 * Enable or disable SR-IOV for devices that don't require any PF setup
857 * before enabling SR-IOV. Return value is negative on error, or number of
858 * VFs allocated on success.
860 int pci_sriov_configure_simple(struct pci_dev *dev, int nr_virtfn)
862 int rc;
864 might_sleep();
866 if (!dev->is_physfn)
867 return -ENODEV;
869 if (pci_vfs_assigned(dev)) {
870 pci_warn(dev, "Cannot modify SR-IOV while VFs are assigned\n");
871 return -EPERM;
874 if (nr_virtfn == 0) {
875 sriov_disable(dev);
876 return 0;
879 rc = sriov_enable(dev, nr_virtfn);
880 if (rc < 0)
881 return rc;
883 return nr_virtfn;
885 EXPORT_SYMBOL_GPL(pci_sriov_configure_simple);