2018-01-27 01:45:16 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
2018-03-10 06:36:33 +08:00
|
|
|
* PCI Message Signaled Interrupt (MSI)
|
2005-04-17 06:20:36 +08:00
|
|
|
*
|
|
|
|
* Copyright (C) 2003-2004 Intel
|
|
|
|
* Copyright (C) Tom Long Nguyen (tom.l.nguyen@intel.com)
|
2016-07-12 17:20:17 +08:00
|
|
|
* Copyright (C) 2016 Christoph Hellwig.
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
2006-10-04 17:16:41 +08:00
|
|
|
#include <linux/err.h>
|
2011-05-27 21:37:25 +08:00
|
|
|
#include <linux/export.h>
|
2021-12-07 06:27:44 +08:00
|
|
|
#include <linux/irq.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2021-12-07 06:27:47 +08:00
|
|
|
#include "../pci.h"
|
2021-12-07 06:27:52 +08:00
|
|
|
#include "msi.h"
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2022-11-11 21:55:01 +08:00
|
|
|
int pci_msi_enable = 1;
|
2014-10-27 10:44:36 +08:00
|
|
|
int pci_msi_ignore_mask;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
/**
|
|
|
|
* pci_msi_supported - check whether MSI may be enabled on a device
|
|
|
|
* @dev: pointer to the pci_dev data structure of MSI device function
|
|
|
|
* @nvec: how many MSIs have been requested?
|
|
|
|
*
|
|
|
|
* Look at global flags, the device itself, and its parent buses
|
|
|
|
* to determine if MSI/-X are supported for the device. If MSI/-X is
|
|
|
|
* supported return 1, else return 0.
|
|
|
|
**/
|
|
|
|
static int pci_msi_supported(struct pci_dev *dev, int nvec)
|
|
|
|
{
|
|
|
|
struct pci_bus *bus;
|
|
|
|
|
|
|
|
/* MSI must be globally enabled and supported by the device */
|
|
|
|
if (!pci_msi_enable)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (!dev || dev->no_msi)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* You can't ask to have 0 or less MSIs configured.
|
|
|
|
* a) it's stupid ..
|
|
|
|
* b) the list manipulation code assumes nvec >= 1.
|
|
|
|
*/
|
|
|
|
if (nvec < 1)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Any bridge which does NOT route MSI transactions from its
|
|
|
|
* secondary bus to its primary bus must set NO_MSI flag on
|
|
|
|
* the secondary pci_bus.
|
|
|
|
*
|
|
|
|
* The NO_MSI flag can either be set directly by:
|
|
|
|
* - arch-specific PCI host bus controller drivers (deprecated)
|
|
|
|
* - quirks for specific PCI bridges
|
|
|
|
*
|
|
|
|
* or indirectly by platform-specific PCI host bridge drivers by
|
|
|
|
* advertising the 'msi_domain' property, which results in
|
|
|
|
* the NO_MSI flag when no MSI domain is found for this bridge
|
|
|
|
* at probe time.
|
|
|
|
*/
|
|
|
|
for (bus = dev->bus; bus; bus = bus->parent)
|
|
|
|
if (bus->bus_flags & PCI_BUS_FLAGS_NO_MSI)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void pcim_msi_release(void *pcidev)
|
|
|
|
{
|
|
|
|
struct pci_dev *dev = pcidev;
|
|
|
|
|
|
|
|
dev->is_msi_managed = false;
|
|
|
|
pci_free_irq_vectors(dev);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Needs to be separate from pcim_release to prevent an ordering problem
|
|
|
|
* vs. msi_device_data_release() in the MSI core code.
|
|
|
|
*/
|
|
|
|
static int pcim_setup_msi_release(struct pci_dev *dev)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!pci_is_managed(dev) || dev->is_msi_managed)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
ret = devm_add_action(&dev->dev, pcim_msi_release, dev);
|
|
|
|
if (!ret)
|
|
|
|
dev->is_msi_managed = true;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Ordering vs. devres: msi device data has to be installed first so that
|
|
|
|
* pcim_msi_release() is invoked before it on device release.
|
|
|
|
*/
|
|
|
|
static int pci_setup_msi_context(struct pci_dev *dev)
|
|
|
|
{
|
|
|
|
int ret = msi_setup_device_data(&dev->dev);
|
|
|
|
|
|
|
|
if (!ret)
|
|
|
|
ret = pcim_setup_msi_release(dev);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Helper functions for mask/unmask and MSI message handling
|
|
|
|
*/
|
|
|
|
|
2022-11-11 21:54:43 +08:00
|
|
|
void pci_msi_update_mask(struct msi_desc *desc, u32 clear, u32 set)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2021-12-07 06:27:56 +08:00
|
|
|
raw_spinlock_t *lock = &to_pci_dev(desc->dev)->msi_lock;
|
2021-07-30 05:51:47 +08:00
|
|
|
unsigned long flags;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2021-12-07 06:27:39 +08:00
|
|
|
if (!desc->pci.msi_attrib.can_mask)
|
2021-11-04 07:27:29 +08:00
|
|
|
return;
|
|
|
|
|
2021-07-30 05:51:47 +08:00
|
|
|
raw_spin_lock_irqsave(lock, flags);
|
2021-12-07 06:27:39 +08:00
|
|
|
desc->pci.msi_mask &= ~clear;
|
|
|
|
desc->pci.msi_mask |= set;
|
|
|
|
pci_write_config_dword(msi_desc_to_pci_dev(desc), desc->pci.mask_pos,
|
|
|
|
desc->pci.msi_mask);
|
2021-07-30 05:51:47 +08:00
|
|
|
raw_spin_unlock_irqrestore(lock, flags);
|
PCI MSI: Fix restoration of MSI/MSI-X mask states in suspend/resume
There are 2 problems on mask states in suspend/resume.
[1]:
It is better to restore the mask states of MSI/MSI-X to initial states
(MSI is unmasked, MSI-X is masked) when we release the device.
The pci_msi_shutdown() does the restoration of mask states for MSI,
while the msi_free_irqs() does it for MSI-X. In other words, in the
"disable" path both of MSI and MSI-X are handled, but in the "shutdown"
path only MSI is handled.
MSI:
pci_disable_msi()
=> pci_msi_shutdown()
[ mask states for MSI restored ]
=> msi_set_enable(dev, pos, 0);
=> msi_free_irqs()
MSI-X:
pci_disable_msix()
=> pci_msix_shutdown()
=> msix_set_enable(dev, 0);
=> msix_free_all_irqs
=> msi_free_irqs()
[ mask states for MSI-X restored ]
This patch moves the masking for MSI-X from msi_free_irqs() to
pci_msix_shutdown().
This change has some positive side effects:
- It prevents OS from touching mask states before reading preserved
bits in the register, which can be happen if msi_free_irqs() is
called from error path in msix_capability_init().
- It also prevents touching the register after turning off MSI-X in
"disable" path, which can be a problem on some devices.
[2]:
We have cache of the mask state in msi_desc, which is automatically
updated when msi/msix_mask_irq() is called. This cached states are
used for the resume.
But since what need to be restored in the resume is the states before
the shutdown on the suspend, calling msi/msix_mask_irq() from
pci_msi/msix_shutdown() is not appropriate.
This patch introduces __msi/msix_mask_irq() that do mask as same
as msi/msix_mask_irq() but does not update cached state, for use
in pci_msi/msix_shutdown().
[updated: get rid of msi/msix_mask_irq_nocache() (proposed by Matthew Wilcox)]
Reviewed-by: Matthew Wilcox <willy@linux.intel.com>
Signed-off-by: Hidetoshi Seto <seto.hidetoshi@jp.fujitsu.com>
Signed-off-by: Jesse Barnes <jbarnes@virtuousgeek.org>
2009-06-24 11:08:09 +08:00
|
|
|
}
|
|
|
|
|
2014-11-23 18:55:58 +08:00
|
|
|
/**
|
2019-05-30 21:05:58 +08:00
|
|
|
* pci_msi_mask_irq - Generic IRQ chip callback to mask PCI/MSI interrupts
|
2014-11-23 18:55:58 +08:00
|
|
|
* @data: pointer to irqdata associated to that interrupt
|
|
|
|
*/
|
|
|
|
void pci_msi_mask_irq(struct irq_data *data)
|
2009-03-17 20:54:09 +08:00
|
|
|
{
|
2021-07-30 05:51:58 +08:00
|
|
|
struct msi_desc *desc = irq_data_get_msi_desc(data);
|
|
|
|
|
|
|
|
__pci_msi_mask_desc(desc, BIT(data->irq - desc->irq));
|
2009-03-17 20:54:09 +08:00
|
|
|
}
|
2015-12-11 01:52:59 +08:00
|
|
|
EXPORT_SYMBOL_GPL(pci_msi_mask_irq);
|
2009-03-17 20:54:09 +08:00
|
|
|
|
2014-11-23 18:55:58 +08:00
|
|
|
/**
|
2019-05-30 21:05:58 +08:00
|
|
|
* pci_msi_unmask_irq - Generic IRQ chip callback to unmask PCI/MSI interrupts
|
2014-11-23 18:55:58 +08:00
|
|
|
* @data: pointer to irqdata associated to that interrupt
|
|
|
|
*/
|
|
|
|
void pci_msi_unmask_irq(struct irq_data *data)
|
2009-03-17 20:54:09 +08:00
|
|
|
{
|
2021-07-30 05:51:58 +08:00
|
|
|
struct msi_desc *desc = irq_data_get_msi_desc(data);
|
|
|
|
|
|
|
|
__pci_msi_unmask_desc(desc, BIT(data->irq - desc->irq));
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2015-12-11 01:52:59 +08:00
|
|
|
EXPORT_SYMBOL_GPL(pci_msi_unmask_irq);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-11-09 23:10:33 +08:00
|
|
|
void __pci_read_msi_msg(struct msi_desc *entry, struct msi_msg *msg)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2015-07-09 16:00:43 +08:00
|
|
|
struct pci_dev *dev = msi_desc_to_pci_dev(entry);
|
|
|
|
|
|
|
|
BUG_ON(dev->current_state != PCI_D0);
|
2010-07-23 21:56:28 +08:00
|
|
|
|
2021-12-07 06:27:39 +08:00
|
|
|
if (entry->pci.msi_attrib.is_msix) {
|
2016-07-12 17:20:14 +08:00
|
|
|
void __iomem *base = pci_msix_desc_addr(entry);
|
2010-07-23 21:56:28 +08:00
|
|
|
|
2021-12-07 06:27:39 +08:00
|
|
|
if (WARN_ON_ONCE(entry->pci.msi_attrib.is_virtual))
|
2019-05-24 06:30:51 +08:00
|
|
|
return;
|
|
|
|
|
2010-07-23 21:56:28 +08:00
|
|
|
msg->address_lo = readl(base + PCI_MSIX_ENTRY_LOWER_ADDR);
|
|
|
|
msg->address_hi = readl(base + PCI_MSIX_ENTRY_UPPER_ADDR);
|
|
|
|
msg->data = readl(base + PCI_MSIX_ENTRY_DATA);
|
|
|
|
} else {
|
2013-04-18 07:34:36 +08:00
|
|
|
int pos = dev->msi_cap;
|
2010-07-23 21:56:28 +08:00
|
|
|
u16 data;
|
|
|
|
|
2013-04-18 07:39:57 +08:00
|
|
|
pci_read_config_dword(dev, pos + PCI_MSI_ADDRESS_LO,
|
|
|
|
&msg->address_lo);
|
2021-12-07 06:27:39 +08:00
|
|
|
if (entry->pci.msi_attrib.is_64) {
|
2013-04-18 07:39:57 +08:00
|
|
|
pci_read_config_dword(dev, pos + PCI_MSI_ADDRESS_HI,
|
|
|
|
&msg->address_hi);
|
2013-04-18 07:41:13 +08:00
|
|
|
pci_read_config_word(dev, pos + PCI_MSI_DATA_64, &data);
|
2010-07-23 21:56:28 +08:00
|
|
|
} else {
|
|
|
|
msg->address_hi = 0;
|
2013-04-18 07:41:13 +08:00
|
|
|
pci_read_config_word(dev, pos + PCI_MSI_DATA_32, &data);
|
2010-07-23 21:56:28 +08:00
|
|
|
}
|
|
|
|
msg->data = data;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-11-25 07:26:00 +08:00
|
|
|
static inline void pci_write_msg_msi(struct pci_dev *dev, struct msi_desc *desc,
|
|
|
|
struct msi_msg *msg)
|
|
|
|
{
|
|
|
|
int pos = dev->msi_cap;
|
|
|
|
u16 msgctl;
|
|
|
|
|
|
|
|
pci_read_config_word(dev, pos + PCI_MSI_FLAGS, &msgctl);
|
|
|
|
msgctl &= ~PCI_MSI_FLAGS_QSIZE;
|
|
|
|
msgctl |= desc->pci.msi_attrib.multiple << 4;
|
|
|
|
pci_write_config_word(dev, pos + PCI_MSI_FLAGS, msgctl);
|
|
|
|
|
|
|
|
pci_write_config_dword(dev, pos + PCI_MSI_ADDRESS_LO, msg->address_lo);
|
|
|
|
if (desc->pci.msi_attrib.is_64) {
|
|
|
|
pci_write_config_dword(dev, pos + PCI_MSI_ADDRESS_HI, msg->address_hi);
|
|
|
|
pci_write_config_word(dev, pos + PCI_MSI_DATA_64, msg->data);
|
|
|
|
} else {
|
|
|
|
pci_write_config_word(dev, pos + PCI_MSI_DATA_32, msg->data);
|
|
|
|
}
|
|
|
|
/* Ensure that the writes are visible in the device */
|
|
|
|
pci_read_config_word(dev, pos + PCI_MSI_FLAGS, &msgctl);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void pci_write_msg_msix(struct msi_desc *desc, struct msi_msg *msg)
|
|
|
|
{
|
|
|
|
void __iomem *base = pci_msix_desc_addr(desc);
|
|
|
|
u32 ctrl = desc->pci.msix_ctrl;
|
|
|
|
bool unmasked = !(ctrl & PCI_MSIX_ENTRY_CTRL_MASKBIT);
|
|
|
|
|
|
|
|
if (desc->pci.msi_attrib.is_virtual)
|
|
|
|
return;
|
|
|
|
/*
|
|
|
|
* The specification mandates that the entry is masked
|
|
|
|
* when the message is modified:
|
|
|
|
*
|
|
|
|
* "If software changes the Address or Data value of an
|
|
|
|
* entry while the entry is unmasked, the result is
|
|
|
|
* undefined."
|
|
|
|
*/
|
|
|
|
if (unmasked)
|
|
|
|
pci_msix_write_vector_ctrl(desc, ctrl | PCI_MSIX_ENTRY_CTRL_MASKBIT);
|
|
|
|
|
|
|
|
writel(msg->address_lo, base + PCI_MSIX_ENTRY_LOWER_ADDR);
|
|
|
|
writel(msg->address_hi, base + PCI_MSIX_ENTRY_UPPER_ADDR);
|
|
|
|
writel(msg->data, base + PCI_MSIX_ENTRY_DATA);
|
|
|
|
|
|
|
|
if (unmasked)
|
|
|
|
pci_msix_write_vector_ctrl(desc, ctrl);
|
|
|
|
|
|
|
|
/* Ensure that the writes are visible in the device */
|
|
|
|
readl(base + PCI_MSIX_ENTRY_DATA);
|
|
|
|
}
|
|
|
|
|
2014-11-09 23:10:34 +08:00
|
|
|
void __pci_write_msi_msg(struct msi_desc *entry, struct msi_msg *msg)
|
2008-12-06 10:58:34 +08:00
|
|
|
{
|
2015-07-09 16:00:43 +08:00
|
|
|
struct pci_dev *dev = msi_desc_to_pci_dev(entry);
|
|
|
|
|
2017-03-30 11:49:11 +08:00
|
|
|
if (dev->current_state != PCI_D0 || pci_dev_is_disconnected(dev)) {
|
2010-06-18 03:16:36 +08:00
|
|
|
/* Don't touch the hardware now */
|
2021-12-07 06:27:39 +08:00
|
|
|
} else if (entry->pci.msi_attrib.is_msix) {
|
2022-11-25 07:26:00 +08:00
|
|
|
pci_write_msg_msix(entry, msg);
|
2009-03-17 20:54:06 +08:00
|
|
|
} else {
|
2022-11-25 07:26:00 +08:00
|
|
|
pci_write_msg_msi(dev, entry, msg);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2019-05-24 06:30:51 +08:00
|
|
|
|
2007-03-09 04:04:57 +08:00
|
|
|
entry->msg = *msg;
|
2019-05-24 06:30:51 +08:00
|
|
|
|
|
|
|
if (entry->write_msi_msg)
|
|
|
|
entry->write_msi_msg(entry, entry->write_msi_msg_data);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2006-10-04 17:16:33 +08:00
|
|
|
|
2014-11-09 23:10:34 +08:00
|
|
|
void pci_write_msi_msg(unsigned int irq, struct msi_msg *msg)
|
2008-12-06 10:58:34 +08:00
|
|
|
{
|
2011-03-28 23:49:12 +08:00
|
|
|
struct msi_desc *entry = irq_get_msi_desc(irq);
|
2008-12-06 10:58:34 +08:00
|
|
|
|
2014-11-09 23:10:34 +08:00
|
|
|
__pci_write_msi_msg(entry, msg);
|
2008-12-06 10:58:34 +08:00
|
|
|
}
|
2014-11-09 23:10:34 +08:00
|
|
|
EXPORT_SYMBOL_GPL(pci_write_msi_msg);
|
2008-12-06 10:58:34 +08:00
|
|
|
|
2009-08-06 10:32:51 +08:00
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
/* PCI/MSI specific functionality */
|
2007-01-18 12:50:05 +08:00
|
|
|
|
2007-10-25 16:16:30 +08:00
|
|
|
static void pci_intx_for_msi(struct pci_dev *dev, int enable)
|
|
|
|
{
|
|
|
|
if (!(dev->dev_flags & PCI_DEV_FLAGS_MSI_INTX_DISABLE_BUG))
|
|
|
|
pci_intx(dev, enable);
|
|
|
|
}
|
|
|
|
|
2020-12-04 02:51:09 +08:00
|
|
|
static void pci_msi_set_enable(struct pci_dev *dev, int enable)
|
|
|
|
{
|
|
|
|
u16 control;
|
|
|
|
|
|
|
|
pci_read_config_word(dev, dev->msi_cap + PCI_MSI_FLAGS, &control);
|
|
|
|
control &= ~PCI_MSI_FLAGS_ENABLE;
|
|
|
|
if (enable)
|
|
|
|
control |= PCI_MSI_FLAGS_ENABLE;
|
|
|
|
pci_write_config_word(dev, dev->msi_cap + PCI_MSI_FLAGS, control);
|
|
|
|
}
|
|
|
|
|
2021-12-07 06:51:15 +08:00
|
|
|
static int msi_setup_msi_desc(struct pci_dev *dev, int nvec,
|
|
|
|
struct irq_affinity_desc *masks)
|
2014-07-08 10:07:23 +08:00
|
|
|
{
|
2021-12-07 06:51:15 +08:00
|
|
|
struct msi_desc desc;
|
2016-09-14 22:18:49 +08:00
|
|
|
u16 control;
|
|
|
|
|
2014-07-08 10:07:23 +08:00
|
|
|
/* MSI Entry Initialization */
|
2021-12-07 06:51:15 +08:00
|
|
|
memset(&desc, 0, sizeof(desc));
|
2014-07-08 10:07:23 +08:00
|
|
|
|
|
|
|
pci_read_config_word(dev, dev->msi_cap + PCI_MSI_FLAGS, &control);
|
2021-11-05 02:01:29 +08:00
|
|
|
/* Lies, damned lies, and MSIs */
|
|
|
|
if (dev->dev_flags & PCI_DEV_FLAGS_HAS_MSI_MASKING)
|
|
|
|
control |= PCI_MSI_FLAGS_MASKBIT;
|
2021-12-07 06:51:15 +08:00
|
|
|
/* Respect XEN's mask disabling */
|
|
|
|
if (pci_msi_ignore_mask)
|
|
|
|
control &= ~PCI_MSI_FLAGS_MASKBIT;
|
2014-07-08 10:07:23 +08:00
|
|
|
|
2021-12-07 06:51:15 +08:00
|
|
|
desc.nvec_used = nvec;
|
|
|
|
desc.pci.msi_attrib.is_64 = !!(control & PCI_MSI_FLAGS_64BIT);
|
|
|
|
desc.pci.msi_attrib.can_mask = !!(control & PCI_MSI_FLAGS_MASKBIT);
|
|
|
|
desc.pci.msi_attrib.default_irq = dev->irq;
|
|
|
|
desc.pci.msi_attrib.multi_cap = (control & PCI_MSI_FLAGS_QMASK) >> 1;
|
|
|
|
desc.pci.msi_attrib.multiple = ilog2(__roundup_pow_of_two(nvec));
|
|
|
|
desc.affinity = masks;
|
2014-07-08 10:07:23 +08:00
|
|
|
|
|
|
|
if (control & PCI_MSI_FLAGS_64BIT)
|
2021-12-07 06:51:15 +08:00
|
|
|
desc.pci.mask_pos = dev->msi_cap + PCI_MSI_MASK_64;
|
2014-07-08 10:07:23 +08:00
|
|
|
else
|
2021-12-07 06:51:15 +08:00
|
|
|
desc.pci.mask_pos = dev->msi_cap + PCI_MSI_MASK_32;
|
2014-07-08 10:07:23 +08:00
|
|
|
|
|
|
|
/* Save the initial mask status */
|
2021-12-07 06:51:15 +08:00
|
|
|
if (desc.pci.msi_attrib.can_mask)
|
|
|
|
pci_read_config_dword(dev, desc.pci.mask_pos, &desc.pci.msi_mask);
|
2014-07-08 10:07:23 +08:00
|
|
|
|
2022-11-25 07:24:27 +08:00
|
|
|
return msi_insert_msi_desc(&dev->dev, &desc);
|
2014-07-08 10:07:23 +08:00
|
|
|
}
|
|
|
|
|
2014-10-03 13:13:24 +08:00
|
|
|
static int msi_verify_entries(struct pci_dev *dev)
|
|
|
|
{
|
|
|
|
struct msi_desc *entry;
|
|
|
|
|
2021-07-30 05:51:52 +08:00
|
|
|
if (!dev->no_64bit_msi)
|
|
|
|
return 0;
|
|
|
|
|
2021-12-07 06:51:18 +08:00
|
|
|
msi_for_each_desc(entry, &dev->dev, MSI_DESC_ALL) {
|
2021-07-30 05:51:52 +08:00
|
|
|
if (entry->msg.address_hi) {
|
2020-12-04 02:51:10 +08:00
|
|
|
pci_err(dev, "arch assigned 64-bit MSI address %#x%08x but device only supports 32 bits\n",
|
|
|
|
entry->msg.address_hi, entry->msg.address_lo);
|
2021-12-07 06:51:18 +08:00
|
|
|
break;
|
2020-12-04 02:51:10 +08:00
|
|
|
}
|
2014-10-03 13:13:24 +08:00
|
|
|
}
|
2021-12-07 06:51:18 +08:00
|
|
|
return !entry ? 0 : -EIO;
|
2014-10-03 13:13:24 +08:00
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
|
|
|
* msi_capability_init - configure device's MSI capability structure
|
|
|
|
* @dev: pointer to the pci_dev data structure of MSI device function
|
2009-03-17 20:54:10 +08:00
|
|
|
* @nvec: number of interrupts to allocate
|
2019-05-30 21:05:58 +08:00
|
|
|
* @affd: description of automatic IRQ affinity assignments (may be %NULL)
|
2005-04-17 06:20:36 +08:00
|
|
|
*
|
2009-03-17 20:54:10 +08:00
|
|
|
* Setup the MSI capability structure of the device with the requested
|
|
|
|
* number of interrupts. A return value of zero indicates the successful
|
2019-05-30 21:05:58 +08:00
|
|
|
* setup of an entry with the new MSI IRQ. A negative return value indicates
|
2009-03-17 20:54:10 +08:00
|
|
|
* an error, and a positive return value indicates the number of interrupts
|
|
|
|
* which could have been allocated.
|
|
|
|
*/
|
2016-11-09 09:15:04 +08:00
|
|
|
static int msi_capability_init(struct pci_dev *dev, int nvec,
|
genirq/affinity: Add new callback for (re)calculating interrupt sets
The interrupt affinity spreading mechanism supports to spread out
affinities for one or more interrupt sets. A interrupt set contains one or
more interrupts. Each set is mapped to a specific functionality of a
device, e.g. general I/O queues and read I/O queus of multiqueue block
devices.
The number of interrupts per set is defined by the driver. It depends on
the total number of available interrupts for the device, which is
determined by the PCI capabilites and the availability of underlying CPU
resources, and the number of queues which the device provides and the
driver wants to instantiate.
The driver passes initial configuration for the interrupt allocation via a
pointer to struct irq_affinity.
Right now the allocation mechanism is complex as it requires to have a loop
in the driver to determine the maximum number of interrupts which are
provided by the PCI capabilities and the underlying CPU resources. This
loop would have to be replicated in every driver which wants to utilize
this mechanism. That's unwanted code duplication and error prone.
In order to move this into generic facilities it is required to have a
mechanism, which allows the recalculation of the interrupt sets and their
size, in the core code. As the core code does not have any knowledge about the
underlying device, a driver specific callback is required in struct
irq_affinity, which can be invoked by the core code. The callback gets the
number of available interupts as an argument, so the driver can calculate the
corresponding number and size of interrupt sets.
At the moment the struct irq_affinity pointer which is handed in from the
driver and passed through to several core functions is marked 'const', but for
the callback to be able to modify the data in the struct it's required to
remove the 'const' qualifier.
Add the optional callback to struct irq_affinity, which allows drivers to
recalculate the number and size of interrupt sets and remove the 'const'
qualifier.
For simple invocations, which do not supply a callback, a default callback
is installed, which just sets nr_sets to 1 and transfers the number of
spreadable vectors to the set_size array at index 0.
This is for now guarded by a check for nr_sets != 0 to keep the NVME driver
working until it is converted to the callback mechanism.
To make sure that the driver configuration is correct under all circumstances
the callback is invoked even when there are no interrupts for queues left,
i.e. the pre/post requirements already exhaust the numner of available
interrupts.
At the PCI layer irq_create_affinity_masks() has to be invoked even for the
case where the legacy interrupt is used. That ensures that the callback is
invoked and the device driver can adjust to that situation.
[ tglx: Fixed the simple case (no sets required). Moved the sanity check
for nr_sets after the invocation of the callback so it catches
broken drivers. Fixed the kernel doc comments for struct
irq_affinity and de-'This patch'-ed the changelog ]
Signed-off-by: Ming Lei <ming.lei@redhat.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Acked-by: Marc Zyngier <marc.zyngier@arm.com>
Cc: Christoph Hellwig <hch@lst.de>
Cc: Bjorn Helgaas <helgaas@kernel.org>
Cc: Jens Axboe <axboe@kernel.dk>
Cc: linux-block@vger.kernel.org
Cc: Sagi Grimberg <sagi@grimberg.me>
Cc: linux-nvme@lists.infradead.org
Cc: linux-pci@vger.kernel.org
Cc: Keith Busch <keith.busch@intel.com>
Cc: Sumit Saxena <sumit.saxena@broadcom.com>
Cc: Kashyap Desai <kashyap.desai@broadcom.com>
Cc: Shivasharan Srikanteshwara <shivasharan.srikanteshwara@broadcom.com>
Link: https://lkml.kernel.org/r/20190216172228.512444498@linutronix.de
2019-02-17 01:13:09 +08:00
|
|
|
struct irq_affinity *affd)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2021-12-07 06:51:13 +08:00
|
|
|
struct irq_affinity_desc *masks = NULL;
|
2005-04-17 06:20:36 +08:00
|
|
|
struct msi_desc *entry;
|
2013-04-05 00:54:32 +08:00
|
|
|
int ret;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2022-11-11 21:55:09 +08:00
|
|
|
/* Reject multi-MSI early on irq domain enabled architectures */
|
|
|
|
if (nvec > 1 && !pci_msi_domain_supports(dev, MSI_FLAG_MULTI_PCI_MSI, ALLOW_LEGACY))
|
|
|
|
return 1;
|
|
|
|
|
2021-12-11 06:18:44 +08:00
|
|
|
/*
|
|
|
|
* Disable MSI during setup in the hardware, but mark it enabled
|
|
|
|
* so that setup code can evaluate it.
|
|
|
|
*/
|
|
|
|
pci_msi_set_enable(dev, 0);
|
|
|
|
dev->msi_enabled = 1;
|
2009-06-16 20:31:45 +08:00
|
|
|
|
2021-12-07 06:51:13 +08:00
|
|
|
if (affd)
|
|
|
|
masks = irq_create_affinity_masks(nvec, affd);
|
|
|
|
|
|
|
|
msi_lock_descs(&dev->dev);
|
2021-12-07 06:51:15 +08:00
|
|
|
ret = msi_setup_msi_desc(dev, nvec, masks);
|
|
|
|
if (ret)
|
2021-12-11 06:18:44 +08:00
|
|
|
goto fail;
|
2006-10-04 17:16:41 +08:00
|
|
|
|
2019-05-30 21:05:58 +08:00
|
|
|
/* All MSIs are unmasked by default; mask them all */
|
2021-12-07 06:51:18 +08:00
|
|
|
entry = msi_first_desc(&dev->dev, MSI_DESC_ALL);
|
2021-07-30 05:51:58 +08:00
|
|
|
pci_msi_mask(entry, msi_multi_mask(entry));
|
2009-03-17 20:54:09 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/* Configure MSI capability structure */
|
2014-11-15 22:24:07 +08:00
|
|
|
ret = pci_msi_setup_msi_irqs(dev, nvec, PCI_CAP_ID_MSI);
|
2021-07-30 05:51:54 +08:00
|
|
|
if (ret)
|
|
|
|
goto err;
|
2007-01-29 03:56:37 +08:00
|
|
|
|
2014-10-03 13:13:24 +08:00
|
|
|
ret = msi_verify_entries(dev);
|
2021-07-30 05:51:54 +08:00
|
|
|
if (ret)
|
|
|
|
goto err;
|
2014-10-03 13:13:24 +08:00
|
|
|
|
2019-05-30 21:05:58 +08:00
|
|
|
/* Set MSI enabled bits */
|
2007-10-25 16:16:30 +08:00
|
|
|
pci_intx_for_msi(dev, 0);
|
2015-05-07 22:52:21 +08:00
|
|
|
pci_msi_set_enable(dev, 1);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2015-07-31 03:00:08 +08:00
|
|
|
pcibios_free_irq(dev);
|
2007-04-18 17:39:21 +08:00
|
|
|
dev->irq = entry->irq;
|
2021-12-07 06:51:13 +08:00
|
|
|
goto unlock;
|
2021-07-30 05:51:54 +08:00
|
|
|
|
|
|
|
err:
|
2021-07-30 05:51:58 +08:00
|
|
|
pci_msi_unmask(entry, msi_multi_mask(entry));
|
2022-11-11 21:54:45 +08:00
|
|
|
pci_free_msi_irqs(dev);
|
2021-12-11 06:18:44 +08:00
|
|
|
fail:
|
|
|
|
dev->msi_enabled = 0;
|
2021-12-07 06:51:13 +08:00
|
|
|
unlock:
|
|
|
|
msi_unlock_descs(&dev->dev);
|
|
|
|
kfree(masks);
|
2021-07-30 05:51:54 +08:00
|
|
|
return ret;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
int __pci_enable_msi_range(struct pci_dev *dev, int minvec, int maxvec,
|
|
|
|
struct irq_affinity *affd)
|
2009-08-06 10:34:34 +08:00
|
|
|
{
|
2022-11-11 21:55:06 +08:00
|
|
|
int nvec;
|
|
|
|
int rc;
|
2009-08-06 10:34:34 +08:00
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
if (!pci_msi_supported(dev, minvec) || dev->current_state != PCI_D0)
|
|
|
|
return -EINVAL;
|
PCI: Fail MSI-X mappings if there's no space assigned to MSI-X BAR
Unlike MSI, which is configured via registers in the MSI capability in
Configuration Space, MSI-X is configured via tables in Memory Space.
These MSI-X tables are mapped by a device BAR, and if no Memory Space
has been assigned to the BAR, MSI-X cannot be used.
Fail MSI-X setup if no space has been assigned for the BAR.
Previously, we ioremapped the MSI-X table even if the resource hadn't been
assigned. In this case, the resource address is undefined (and is often
zero), which may lead to warnings or oopses in this path:
pci_enable_msix
msix_capability_init
msix_map_region
ioremap_nocache
The PCI core sets resource flags to zero when it can't assign space for the
resource (see reset_resource()). There are also some cases where it sets
the IORESOURCE_UNSET flag, e.g., pci_reassigndev_resource_alignment(),
pci_assign_resource(), etc. So we must check for both cases.
[bhelgaas: changelog]
Reported-by: Zhang Jukuo <zhangjukuo@huawei.com>
Tested-by: Zhang Jukuo <zhangjukuo@huawei.com>
Signed-off-by: Yijing Wang <wangyijing@huawei.com>
Signed-off-by: Bjorn Helgaas <bhelgaas@google.com>
2015-01-28 09:52:17 +08:00
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
/* Check whether driver already requested MSI-X IRQs */
|
|
|
|
if (dev->msix_enabled) {
|
|
|
|
pci_info(dev, "can't enable MSI (MSI-X already enabled)\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
2009-08-06 10:34:34 +08:00
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
if (maxvec < minvec)
|
|
|
|
return -ERANGE;
|
2009-08-06 10:34:34 +08:00
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
if (WARN_ON_ONCE(dev->msi_enabled))
|
|
|
|
return -EINVAL;
|
2016-07-12 17:20:18 +08:00
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
nvec = pci_msi_vec_count(dev);
|
|
|
|
if (nvec < 0)
|
|
|
|
return nvec;
|
|
|
|
if (nvec < minvec)
|
|
|
|
return -ENOSPC;
|
2021-07-30 05:51:41 +08:00
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
if (nvec > maxvec)
|
|
|
|
nvec = maxvec;
|
2019-05-24 06:30:51 +08:00
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
rc = pci_setup_msi_context(dev);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2022-11-25 07:26:04 +08:00
|
|
|
if (!pci_setup_msi_device_domain(dev))
|
|
|
|
return -ENODEV;
|
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
for (;;) {
|
|
|
|
if (affd) {
|
|
|
|
nvec = irq_calc_affinity_vectors(minvec, nvec, affd);
|
|
|
|
if (nvec < minvec)
|
|
|
|
return -ENOSPC;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = msi_capability_init(dev, nvec, affd);
|
|
|
|
if (rc == 0)
|
|
|
|
return nvec;
|
|
|
|
|
|
|
|
if (rc < 0)
|
|
|
|
return rc;
|
|
|
|
if (rc < minvec)
|
|
|
|
return -ENOSPC;
|
|
|
|
|
|
|
|
nvec = rc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* pci_msi_vec_count - Return the number of MSI vectors a device can send
|
|
|
|
* @dev: device to report about
|
|
|
|
*
|
|
|
|
* This function returns the number of MSI vectors a device requested via
|
|
|
|
* Multiple Message Capable register. It returns a negative errno if the
|
|
|
|
* device is not capable sending MSI interrupts. Otherwise, the call succeeds
|
|
|
|
* and returns a power of two, up to a maximum of 2^5 (32), according to the
|
|
|
|
* MSI specification.
|
|
|
|
**/
|
|
|
|
int pci_msi_vec_count(struct pci_dev *dev)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
u16 msgctl;
|
|
|
|
|
|
|
|
if (!dev->msi_cap)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
pci_read_config_word(dev, dev->msi_cap + PCI_MSI_FLAGS, &msgctl);
|
|
|
|
ret = 1 << ((msgctl & PCI_MSI_FLAGS_QMASK) >> 1);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(pci_msi_vec_count);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Architecture override returns true when the PCI MSI message should be
|
|
|
|
* written by the generic restore function.
|
|
|
|
*/
|
|
|
|
bool __weak arch_restore_msi_irqs(struct pci_dev *dev)
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void __pci_restore_msi_state(struct pci_dev *dev)
|
|
|
|
{
|
|
|
|
struct msi_desc *entry;
|
|
|
|
u16 control;
|
|
|
|
|
|
|
|
if (!dev->msi_enabled)
|
|
|
|
return;
|
|
|
|
|
|
|
|
entry = irq_get_msi_desc(dev->irq);
|
|
|
|
|
|
|
|
pci_intx_for_msi(dev, 0);
|
|
|
|
pci_msi_set_enable(dev, 0);
|
|
|
|
if (arch_restore_msi_irqs(dev))
|
|
|
|
__pci_write_msi_msg(entry, &entry->msg);
|
|
|
|
|
|
|
|
pci_read_config_word(dev, dev->msi_cap + PCI_MSI_FLAGS, &control);
|
|
|
|
pci_msi_update_mask(entry, 0, 0);
|
|
|
|
control &= ~PCI_MSI_FLAGS_QSIZE;
|
|
|
|
control |= (entry->pci.msi_attrib.multiple << 4) | PCI_MSI_FLAGS_ENABLE;
|
|
|
|
pci_write_config_word(dev, dev->msi_cap + PCI_MSI_FLAGS, control);
|
|
|
|
}
|
|
|
|
|
|
|
|
void pci_msi_shutdown(struct pci_dev *dev)
|
|
|
|
{
|
|
|
|
struct msi_desc *desc;
|
|
|
|
|
|
|
|
if (!pci_msi_enable || !dev || !dev->msi_enabled)
|
|
|
|
return;
|
|
|
|
|
|
|
|
pci_msi_set_enable(dev, 0);
|
|
|
|
pci_intx_for_msi(dev, 1);
|
|
|
|
dev->msi_enabled = 0;
|
|
|
|
|
|
|
|
/* Return the device with MSI unmasked as initial states */
|
|
|
|
desc = msi_first_desc(&dev->dev, MSI_DESC_ALL);
|
|
|
|
if (!WARN_ON_ONCE(!desc))
|
|
|
|
pci_msi_unmask(desc, msi_multi_mask(desc));
|
|
|
|
|
|
|
|
/* Restore dev->irq to its default pin-assertion IRQ */
|
|
|
|
dev->irq = desc->pci.msi_attrib.default_irq;
|
|
|
|
pcibios_alloc_irq(dev);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* PCI/MSI-X specific functionality */
|
|
|
|
|
|
|
|
static void pci_msix_clear_and_set_ctrl(struct pci_dev *dev, u16 clear, u16 set)
|
|
|
|
{
|
|
|
|
u16 ctrl;
|
|
|
|
|
|
|
|
pci_read_config_word(dev, dev->msix_cap + PCI_MSIX_FLAGS, &ctrl);
|
|
|
|
ctrl &= ~clear;
|
|
|
|
ctrl |= set;
|
|
|
|
pci_write_config_word(dev, dev->msix_cap + PCI_MSIX_FLAGS, ctrl);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void __iomem *msix_map_region(struct pci_dev *dev,
|
|
|
|
unsigned int nr_entries)
|
|
|
|
{
|
|
|
|
resource_size_t phys_addr;
|
|
|
|
u32 table_offset;
|
|
|
|
unsigned long flags;
|
|
|
|
u8 bir;
|
|
|
|
|
|
|
|
pci_read_config_dword(dev, dev->msix_cap + PCI_MSIX_TABLE,
|
|
|
|
&table_offset);
|
|
|
|
bir = (u8)(table_offset & PCI_MSIX_TABLE_BIR);
|
|
|
|
flags = pci_resource_flags(dev, bir);
|
|
|
|
if (!flags || (flags & IORESOURCE_UNSET))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
table_offset &= PCI_MSIX_TABLE_OFFSET;
|
|
|
|
phys_addr = pci_resource_start(dev, bir) + table_offset;
|
|
|
|
|
|
|
|
return ioremap(phys_addr, nr_entries * PCI_MSIX_ENTRY_SIZE);
|
|
|
|
}
|
|
|
|
|
2022-11-25 07:26:21 +08:00
|
|
|
/**
|
|
|
|
* msix_prepare_msi_desc - Prepare a half initialized MSI descriptor for operation
|
|
|
|
* @dev: The PCI device for which the descriptor is prepared
|
|
|
|
* @desc: The MSI descriptor for preparation
|
|
|
|
*
|
|
|
|
* This is separate from msix_setup_msi_descs() below to handle dynamic
|
|
|
|
* allocations for MSI-X after initial enablement.
|
|
|
|
*
|
|
|
|
* Ideally the whole MSI-X setup would work that way, but there is no way to
|
|
|
|
* support this for the legacy arch_setup_msi_irqs() mechanism and for the
|
|
|
|
* fake irq domains like the x86 XEN one. Sigh...
|
|
|
|
*
|
|
|
|
* The descriptor is zeroed and only @desc::msi_index and @desc::affinity
|
|
|
|
* are set. When called from msix_setup_msi_descs() then the is_virtual
|
|
|
|
* attribute is initialized as well.
|
|
|
|
*
|
|
|
|
* Fill in the rest.
|
|
|
|
*/
|
|
|
|
void msix_prepare_msi_desc(struct pci_dev *dev, struct msi_desc *desc)
|
|
|
|
{
|
|
|
|
desc->nvec_used = 1;
|
|
|
|
desc->pci.msi_attrib.is_msix = 1;
|
|
|
|
desc->pci.msi_attrib.is_64 = 1;
|
|
|
|
desc->pci.msi_attrib.default_irq = dev->irq;
|
|
|
|
desc->pci.mask_base = dev->msix_base;
|
|
|
|
desc->pci.msi_attrib.can_mask = !pci_msi_ignore_mask &&
|
|
|
|
!desc->pci.msi_attrib.is_virtual;
|
|
|
|
|
|
|
|
if (desc->pci.msi_attrib.can_mask) {
|
|
|
|
void __iomem *addr = pci_msix_desc_addr(desc);
|
|
|
|
|
|
|
|
desc->pci.msix_ctrl = readl(addr + PCI_MSIX_ENTRY_VECTOR_CTRL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int msix_setup_msi_descs(struct pci_dev *dev, struct msix_entry *entries,
|
|
|
|
int nvec, struct irq_affinity_desc *masks)
|
2022-11-11 21:55:06 +08:00
|
|
|
{
|
|
|
|
int ret = 0, i, vec_count = pci_msix_vec_count(dev);
|
|
|
|
struct irq_affinity_desc *curmsk;
|
|
|
|
struct msi_desc desc;
|
|
|
|
|
|
|
|
memset(&desc, 0, sizeof(desc));
|
|
|
|
|
|
|
|
for (i = 0, curmsk = masks; i < nvec; i++, curmsk++) {
|
2021-12-07 06:51:15 +08:00
|
|
|
desc.msi_index = entries ? entries[i].entry : i;
|
|
|
|
desc.affinity = masks ? curmsk : NULL;
|
|
|
|
desc.pci.msi_attrib.is_virtual = desc.msi_index >= vec_count;
|
2019-05-24 06:30:51 +08:00
|
|
|
|
2022-11-25 07:26:21 +08:00
|
|
|
msix_prepare_msi_desc(dev, &desc);
|
2021-07-30 05:51:41 +08:00
|
|
|
|
2022-11-25 07:24:27 +08:00
|
|
|
ret = msi_insert_msi_desc(&dev->dev, &desc);
|
2021-12-07 06:51:15 +08:00
|
|
|
if (ret)
|
|
|
|
break;
|
2009-08-06 10:35:48 +08:00
|
|
|
}
|
2021-12-07 06:51:15 +08:00
|
|
|
return ret;
|
2009-08-06 10:35:48 +08:00
|
|
|
}
|
|
|
|
|
2021-07-30 05:51:41 +08:00
|
|
|
static void msix_update_entries(struct pci_dev *dev, struct msix_entry *entries)
|
2009-08-06 10:35:10 +08:00
|
|
|
{
|
2021-12-07 06:51:18 +08:00
|
|
|
struct msi_desc *desc;
|
2009-08-06 10:35:10 +08:00
|
|
|
|
2021-12-07 06:27:46 +08:00
|
|
|
if (entries) {
|
2021-12-07 06:51:18 +08:00
|
|
|
msi_for_each_desc(desc, &dev->dev, MSI_DESC_ALL) {
|
|
|
|
entries->vector = desc->irq;
|
2021-07-30 05:51:41 +08:00
|
|
|
entries++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-05-24 06:30:51 +08:00
|
|
|
|
2021-07-30 05:51:41 +08:00
|
|
|
static void msix_mask_all(void __iomem *base, int tsize)
|
|
|
|
{
|
|
|
|
u32 ctrl = PCI_MSIX_ENTRY_CTRL_MASKBIT;
|
|
|
|
int i;
|
2019-05-24 06:30:51 +08:00
|
|
|
|
2021-08-27 01:03:42 +08:00
|
|
|
if (pci_msi_ignore_mask)
|
|
|
|
return;
|
|
|
|
|
2021-07-30 05:51:41 +08:00
|
|
|
for (i = 0; i < tsize; i++, base += PCI_MSIX_ENTRY_SIZE)
|
|
|
|
writel(ctrl, base + PCI_MSIX_ENTRY_VECTOR_CTRL);
|
2009-08-06 10:35:10 +08:00
|
|
|
}
|
|
|
|
|
2022-11-25 07:26:21 +08:00
|
|
|
static int msix_setup_interrupts(struct pci_dev *dev, struct msix_entry *entries,
|
|
|
|
int nvec, struct irq_affinity *affd)
|
2021-12-07 06:51:13 +08:00
|
|
|
{
|
|
|
|
struct irq_affinity_desc *masks = NULL;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (affd)
|
|
|
|
masks = irq_create_affinity_masks(nvec, affd);
|
|
|
|
|
|
|
|
msi_lock_descs(&dev->dev);
|
2022-11-25 07:26:21 +08:00
|
|
|
ret = msix_setup_msi_descs(dev, entries, nvec, masks);
|
2021-12-07 06:51:13 +08:00
|
|
|
if (ret)
|
|
|
|
goto out_free;
|
|
|
|
|
|
|
|
ret = pci_msi_setup_msi_irqs(dev, nvec, PCI_CAP_ID_MSIX);
|
|
|
|
if (ret)
|
|
|
|
goto out_free;
|
|
|
|
|
|
|
|
/* Check if all MSI entries honor device restrictions */
|
|
|
|
ret = msi_verify_entries(dev);
|
|
|
|
if (ret)
|
|
|
|
goto out_free;
|
|
|
|
|
|
|
|
msix_update_entries(dev, entries);
|
|
|
|
goto out_unlock;
|
|
|
|
|
|
|
|
out_free:
|
2022-11-11 21:54:45 +08:00
|
|
|
pci_free_msi_irqs(dev);
|
2021-12-07 06:51:13 +08:00
|
|
|
out_unlock:
|
|
|
|
msi_unlock_descs(&dev->dev);
|
|
|
|
kfree(masks);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
|
|
|
* msix_capability_init - configure device's MSI-X capability
|
|
|
|
* @dev: pointer to the pci_dev data structure of MSI-X device function
|
2005-10-24 02:57:38 +08:00
|
|
|
* @entries: pointer to an array of struct msix_entry entries
|
|
|
|
* @nvec: number of @entries
|
2019-05-30 21:05:58 +08:00
|
|
|
* @affd: Optional pointer to enable automatic affinity assignment
|
2005-04-17 06:20:36 +08:00
|
|
|
*
|
2005-05-04 08:38:30 +08:00
|
|
|
* Setup the MSI-X capability structure of device function with a
|
2019-05-30 21:05:58 +08:00
|
|
|
* single MSI-X IRQ. A return of zero indicates the successful setup of
|
|
|
|
* requested MSI-X entries with allocated IRQs or non-zero for otherwise.
|
2005-04-17 06:20:36 +08:00
|
|
|
**/
|
2016-09-14 22:18:49 +08:00
|
|
|
static int msix_capability_init(struct pci_dev *dev, struct msix_entry *entries,
|
genirq/affinity: Add new callback for (re)calculating interrupt sets
The interrupt affinity spreading mechanism supports to spread out
affinities for one or more interrupt sets. A interrupt set contains one or
more interrupts. Each set is mapped to a specific functionality of a
device, e.g. general I/O queues and read I/O queus of multiqueue block
devices.
The number of interrupts per set is defined by the driver. It depends on
the total number of available interrupts for the device, which is
determined by the PCI capabilites and the availability of underlying CPU
resources, and the number of queues which the device provides and the
driver wants to instantiate.
The driver passes initial configuration for the interrupt allocation via a
pointer to struct irq_affinity.
Right now the allocation mechanism is complex as it requires to have a loop
in the driver to determine the maximum number of interrupts which are
provided by the PCI capabilities and the underlying CPU resources. This
loop would have to be replicated in every driver which wants to utilize
this mechanism. That's unwanted code duplication and error prone.
In order to move this into generic facilities it is required to have a
mechanism, which allows the recalculation of the interrupt sets and their
size, in the core code. As the core code does not have any knowledge about the
underlying device, a driver specific callback is required in struct
irq_affinity, which can be invoked by the core code. The callback gets the
number of available interupts as an argument, so the driver can calculate the
corresponding number and size of interrupt sets.
At the moment the struct irq_affinity pointer which is handed in from the
driver and passed through to several core functions is marked 'const', but for
the callback to be able to modify the data in the struct it's required to
remove the 'const' qualifier.
Add the optional callback to struct irq_affinity, which allows drivers to
recalculate the number and size of interrupt sets and remove the 'const'
qualifier.
For simple invocations, which do not supply a callback, a default callback
is installed, which just sets nr_sets to 1 and transfers the number of
spreadable vectors to the set_size array at index 0.
This is for now guarded by a check for nr_sets != 0 to keep the NVME driver
working until it is converted to the callback mechanism.
To make sure that the driver configuration is correct under all circumstances
the callback is invoked even when there are no interrupts for queues left,
i.e. the pre/post requirements already exhaust the numner of available
interrupts.
At the PCI layer irq_create_affinity_masks() has to be invoked even for the
case where the legacy interrupt is used. That ensures that the callback is
invoked and the device driver can adjust to that situation.
[ tglx: Fixed the simple case (no sets required). Moved the sanity check
for nr_sets after the invocation of the callback so it catches
broken drivers. Fixed the kernel doc comments for struct
irq_affinity and de-'This patch'-ed the changelog ]
Signed-off-by: Ming Lei <ming.lei@redhat.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Acked-by: Marc Zyngier <marc.zyngier@arm.com>
Cc: Christoph Hellwig <hch@lst.de>
Cc: Bjorn Helgaas <helgaas@kernel.org>
Cc: Jens Axboe <axboe@kernel.dk>
Cc: linux-block@vger.kernel.org
Cc: Sagi Grimberg <sagi@grimberg.me>
Cc: linux-nvme@lists.infradead.org
Cc: linux-pci@vger.kernel.org
Cc: Keith Busch <keith.busch@intel.com>
Cc: Sumit Saxena <sumit.saxena@broadcom.com>
Cc: Kashyap Desai <kashyap.desai@broadcom.com>
Cc: Shivasharan Srikanteshwara <shivasharan.srikanteshwara@broadcom.com>
Link: https://lkml.kernel.org/r/20190216172228.512444498@linutronix.de
2019-02-17 01:13:09 +08:00
|
|
|
int nvec, struct irq_affinity *affd)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2021-07-30 05:51:41 +08:00
|
|
|
int ret, tsize;
|
|
|
|
u16 control;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2021-07-30 05:51:40 +08:00
|
|
|
/*
|
|
|
|
* Some devices require MSI-X to be enabled before the MSI-X
|
|
|
|
* registers can be accessed. Mask all the vectors to prevent
|
|
|
|
* interrupts coming in before they're fully set up.
|
|
|
|
*/
|
|
|
|
pci_msix_clear_and_set_ctrl(dev, 0, PCI_MSIX_FLAGS_MASKALL |
|
|
|
|
PCI_MSIX_FLAGS_ENABLE);
|
2009-06-19 10:15:59 +08:00
|
|
|
|
2021-12-11 06:18:44 +08:00
|
|
|
/* Mark it enabled so setup functions can query it */
|
|
|
|
dev->msix_enabled = 1;
|
|
|
|
|
2014-06-19 16:29:53 +08:00
|
|
|
pci_read_config_word(dev, dev->msix_cap + PCI_MSIX_FLAGS, &control);
|
2005-04-17 06:20:36 +08:00
|
|
|
/* Request & Map MSI-X table region */
|
2021-07-30 05:51:41 +08:00
|
|
|
tsize = msix_table_size(control);
|
2022-11-25 07:26:21 +08:00
|
|
|
dev->msix_base = msix_map_region(dev, tsize);
|
|
|
|
if (!dev->msix_base) {
|
2021-07-30 05:51:40 +08:00
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out_disable;
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2022-11-25 07:26:21 +08:00
|
|
|
ret = msix_setup_interrupts(dev, entries, nvec, affd);
|
2009-08-06 10:35:48 +08:00
|
|
|
if (ret)
|
2021-12-07 06:51:13 +08:00
|
|
|
goto out_disable;
|
2009-06-19 10:15:59 +08:00
|
|
|
|
2021-12-11 06:18:44 +08:00
|
|
|
/* Disable INTX */
|
2007-10-25 16:16:30 +08:00
|
|
|
pci_intx_for_msi(dev, 0);
|
2021-12-14 19:49:32 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Ensure that all table entries are masked to prevent
|
|
|
|
* stale entries from firing in a crash kernel.
|
|
|
|
*
|
|
|
|
* Done late to deal with a broken Marvell NVME device
|
|
|
|
* which takes the MSI-X mask bits into account even
|
|
|
|
* when MSI-X is disabled, which prevents MSI delivery.
|
|
|
|
*/
|
2022-11-25 07:26:21 +08:00
|
|
|
msix_mask_all(dev->msix_base, tsize);
|
2015-05-07 22:52:21 +08:00
|
|
|
pci_msix_clear_and_set_ctrl(dev, PCI_MSIX_FLAGS_MASKALL, 0);
|
2009-05-08 21:13:33 +08:00
|
|
|
|
2015-07-31 03:00:08 +08:00
|
|
|
pcibios_free_irq(dev);
|
2005-04-17 06:20:36 +08:00
|
|
|
return 0;
|
2009-08-06 10:33:39 +08:00
|
|
|
|
2021-07-30 05:51:40 +08:00
|
|
|
out_disable:
|
2021-12-11 06:18:44 +08:00
|
|
|
dev->msix_enabled = 0;
|
2021-12-14 19:42:14 +08:00
|
|
|
pci_msix_clear_and_set_ctrl(dev, PCI_MSIX_FLAGS_MASKALL | PCI_MSIX_FLAGS_ENABLE, 0);
|
2021-07-30 05:51:40 +08:00
|
|
|
|
2009-08-06 10:33:39 +08:00
|
|
|
return ret;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2022-11-11 21:55:12 +08:00
|
|
|
static bool pci_msix_validate_entries(struct pci_dev *dev, struct msix_entry *entries,
|
|
|
|
int nvec, int hwsize)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2022-11-11 21:55:12 +08:00
|
|
|
bool nogap;
|
2007-01-29 03:42:52 +08:00
|
|
|
int i, j;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2022-11-11 21:55:07 +08:00
|
|
|
if (!entries)
|
|
|
|
return true;
|
2007-04-05 15:19:08 +08:00
|
|
|
|
2022-11-11 21:55:12 +08:00
|
|
|
nogap = pci_msi_domain_supports(dev, MSI_FLAG_MSIX_CONTIGUOUS, DENY_LEGACY);
|
|
|
|
|
2022-11-11 21:55:07 +08:00
|
|
|
for (i = 0; i < nvec; i++) {
|
|
|
|
/* Entry within hardware limit? */
|
|
|
|
if (entries[i].entry >= hwsize)
|
|
|
|
return false;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2022-11-11 21:55:07 +08:00
|
|
|
/* Check for duplicate entries */
|
|
|
|
for (j = i + 1; j < nvec; j++) {
|
|
|
|
if (entries[i].entry == entries[j].entry)
|
|
|
|
return false;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2022-11-11 21:55:12 +08:00
|
|
|
/* Check for unsupported gaps */
|
|
|
|
if (nogap && entries[i].entry != i)
|
|
|
|
return false;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2022-11-11 21:55:07 +08:00
|
|
|
return true;
|
2016-09-14 22:18:49 +08:00
|
|
|
}
|
|
|
|
|
2022-11-11 21:55:07 +08:00
|
|
|
int __pci_enable_msix_range(struct pci_dev *dev, struct msix_entry *entries, int minvec,
|
|
|
|
int maxvec, struct irq_affinity *affd, int flags)
|
2013-12-30 15:28:16 +08:00
|
|
|
{
|
2022-11-11 21:55:07 +08:00
|
|
|
int hwsize, rc, nvec = maxvec;
|
2014-04-14 21:28:35 +08:00
|
|
|
|
2013-12-30 15:28:16 +08:00
|
|
|
if (maxvec < minvec)
|
|
|
|
return -ERANGE;
|
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
if (dev->msi_enabled) {
|
|
|
|
pci_info(dev, "can't enable MSI-X (MSI already enabled)\n");
|
2018-09-24 22:00:41 +08:00
|
|
|
return -EINVAL;
|
2022-11-11 21:55:06 +08:00
|
|
|
}
|
2018-09-24 22:00:41 +08:00
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
if (WARN_ON_ONCE(dev->msix_enabled))
|
|
|
|
return -EINVAL;
|
2014-04-14 21:28:35 +08:00
|
|
|
|
2022-11-11 21:55:11 +08:00
|
|
|
/* Check MSI-X early on irq domain enabled architectures */
|
|
|
|
if (!pci_msi_domain_supports(dev, MSI_FLAG_PCI_MSIX, ALLOW_LEGACY))
|
|
|
|
return -ENOTSUPP;
|
|
|
|
|
2022-11-11 21:55:07 +08:00
|
|
|
if (!pci_msi_supported(dev, nvec) || dev->current_state != PCI_D0)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
hwsize = pci_msix_vec_count(dev);
|
|
|
|
if (hwsize < 0)
|
|
|
|
return hwsize;
|
|
|
|
|
2022-11-11 21:55:12 +08:00
|
|
|
if (!pci_msix_validate_entries(dev, entries, nvec, hwsize))
|
2022-11-11 21:55:07 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
2022-11-25 07:26:04 +08:00
|
|
|
if (hwsize < nvec) {
|
|
|
|
/* Keep the IRQ virtual hackery working */
|
|
|
|
if (flags & PCI_IRQ_VIRTUAL)
|
|
|
|
hwsize = nvec;
|
|
|
|
else
|
|
|
|
nvec = hwsize;
|
|
|
|
}
|
2022-11-11 21:55:07 +08:00
|
|
|
|
|
|
|
if (nvec < minvec)
|
|
|
|
return -ENOSPC;
|
|
|
|
|
2021-12-16 01:19:49 +08:00
|
|
|
rc = pci_setup_msi_context(dev);
|
2021-12-16 01:16:44 +08:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2022-11-25 07:26:04 +08:00
|
|
|
if (!pci_setup_msix_device_domain(dev, hwsize))
|
|
|
|
return -ENODEV;
|
|
|
|
|
2016-07-12 17:20:18 +08:00
|
|
|
for (;;) {
|
2016-11-09 09:15:04 +08:00
|
|
|
if (affd) {
|
2017-05-19 01:47:47 +08:00
|
|
|
nvec = irq_calc_affinity_vectors(minvec, nvec, affd);
|
2016-07-12 17:20:18 +08:00
|
|
|
if (nvec < minvec)
|
|
|
|
return -ENOSPC;
|
|
|
|
}
|
|
|
|
|
2022-11-11 21:55:07 +08:00
|
|
|
rc = msix_capability_init(dev, entries, nvec, affd);
|
2016-07-12 17:20:18 +08:00
|
|
|
if (rc == 0)
|
|
|
|
return nvec;
|
|
|
|
|
|
|
|
if (rc < 0)
|
2013-12-30 15:28:16 +08:00
|
|
|
return rc;
|
2016-07-12 17:20:18 +08:00
|
|
|
if (rc < minvec)
|
|
|
|
return -ENOSPC;
|
|
|
|
|
|
|
|
nvec = rc;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
void __pci_restore_msix_state(struct pci_dev *dev)
|
2016-07-12 17:20:18 +08:00
|
|
|
{
|
2022-11-11 21:55:06 +08:00
|
|
|
struct msi_desc *entry;
|
|
|
|
bool write_msg;
|
2016-07-12 17:20:18 +08:00
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
if (!dev->msix_enabled)
|
|
|
|
return;
|
2016-07-12 17:20:18 +08:00
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
/* route the table */
|
|
|
|
pci_intx_for_msi(dev, 0);
|
|
|
|
pci_msix_clear_and_set_ctrl(dev, 0,
|
|
|
|
PCI_MSIX_FLAGS_ENABLE | PCI_MSIX_FLAGS_MASKALL);
|
|
|
|
|
|
|
|
write_msg = arch_restore_msi_irqs(dev);
|
|
|
|
|
|
|
|
msi_lock_descs(&dev->dev);
|
|
|
|
msi_for_each_desc(entry, &dev->dev, MSI_DESC_ALL) {
|
|
|
|
if (write_msg)
|
|
|
|
__pci_write_msi_msg(entry, &entry->msg);
|
|
|
|
pci_msix_write_vector_ctrl(entry, entry->pci.msix_ctrl);
|
2022-11-11 21:54:15 +08:00
|
|
|
}
|
2022-11-11 21:55:06 +08:00
|
|
|
msi_unlock_descs(&dev->dev);
|
2022-11-11 21:54:15 +08:00
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
pci_msix_clear_and_set_ctrl(dev, PCI_MSIX_FLAGS_MASKALL, 0);
|
|
|
|
}
|
2018-09-24 22:00:41 +08:00
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
void pci_msix_shutdown(struct pci_dev *dev)
|
|
|
|
{
|
|
|
|
struct msi_desc *desc;
|
2021-12-16 01:16:44 +08:00
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
if (!pci_msi_enable || !dev || !dev->msix_enabled)
|
|
|
|
return;
|
2013-12-30 15:28:16 +08:00
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
if (pci_dev_is_disconnected(dev)) {
|
|
|
|
dev->msix_enabled = 0;
|
|
|
|
return;
|
|
|
|
}
|
2016-07-12 17:20:18 +08:00
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
/* Return the device with MSI-X masked as initial states */
|
|
|
|
msi_for_each_desc(desc, &dev->dev, MSI_DESC_ALL)
|
|
|
|
pci_msix_mask(desc);
|
2016-07-12 17:20:18 +08:00
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
pci_msix_clear_and_set_ctrl(dev, PCI_MSIX_FLAGS_ENABLE, 0);
|
|
|
|
pci_intx_for_msi(dev, 1);
|
|
|
|
dev->msix_enabled = 0;
|
|
|
|
pcibios_alloc_irq(dev);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Common interfaces */
|
|
|
|
|
|
|
|
void pci_free_msi_irqs(struct pci_dev *dev)
|
|
|
|
{
|
|
|
|
pci_msi_teardown_msi_irqs(dev);
|
|
|
|
|
|
|
|
if (dev->msix_base) {
|
|
|
|
iounmap(dev->msix_base);
|
|
|
|
dev->msix_base = NULL;
|
2016-07-12 17:20:18 +08:00
|
|
|
}
|
2013-12-30 15:28:16 +08:00
|
|
|
}
|
|
|
|
|
2022-11-11 21:55:06 +08:00
|
|
|
/* Misc. infrastructure */
|
|
|
|
|
2015-07-09 16:00:45 +08:00
|
|
|
struct pci_dev *msi_desc_to_pci_dev(struct msi_desc *desc)
|
|
|
|
{
|
|
|
|
return to_pci_dev(desc->dev);
|
|
|
|
}
|
2015-12-11 01:52:59 +08:00
|
|
|
EXPORT_SYMBOL(msi_desc_to_pci_dev);
|
2015-07-09 16:00:45 +08:00
|
|
|
|
2021-12-07 06:27:52 +08:00
|
|
|
void pci_no_msi(void)
|
2015-10-02 21:43:06 +08:00
|
|
|
{
|
2021-12-07 06:27:52 +08:00
|
|
|
pci_msi_enable = 0;
|
2015-10-02 21:43:06 +08:00
|
|
|
}
|