123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068 |
- // SPDX-License-Identifier: GPL-2.0
- /*
- * Copyright (c) Microsoft Corporation.
- *
- * Author:
- * Jake Oshins <[email protected]>
- *
- * This driver acts as a paravirtual front-end for PCI Express root buses.
- * When a PCI Express function (either an entire device or an SR-IOV
- * Virtual Function) is being passed through to the VM, this driver exposes
- * a new bus to the guest VM. This is modeled as a root PCI bus because
- * no bridges are being exposed to the VM. In fact, with a "Generation 2"
- * VM within Hyper-V, there may seem to be no PCI bus at all in the VM
- * until a device as been exposed using this driver.
- *
- * Each root PCI bus has its own PCI domain, which is called "Segment" in
- * the PCI Firmware Specifications. Thus while each device passed through
- * to the VM using this front-end will appear at "device 0", the domain will
- * be unique. Typically, each bus will have one PCI function on it, though
- * this driver does support more than one.
- *
- * In order to map the interrupts from the device through to the guest VM,
- * this driver also implements an IRQ Domain, which handles interrupts (either
- * MSI or MSI-X) associated with the functions on the bus. As interrupts are
- * set up, torn down, or reaffined, this driver communicates with the
- * underlying hypervisor to adjust the mappings in the I/O MMU so that each
- * interrupt will be delivered to the correct virtual processor at the right
- * vector. This driver does not support level-triggered (line-based)
- * interrupts, and will report that the Interrupt Line register in the
- * function's configuration space is zero.
- *
- * The rest of this driver mostly maps PCI concepts onto underlying Hyper-V
- * facilities. For instance, the configuration space of a function exposed
- * by Hyper-V is mapped into a single page of memory space, and the
- * read and write handlers for config space must be aware of this mechanism.
- * Similarly, device setup and teardown involves messages sent to and from
- * the PCI back-end driver in Hyper-V.
- */
- #include <linux/kernel.h>
- #include <linux/module.h>
- #include <linux/pci.h>
- #include <linux/pci-ecam.h>
- #include <linux/delay.h>
- #include <linux/semaphore.h>
- #include <linux/irq.h>
- #include <linux/msi.h>
- #include <linux/hyperv.h>
- #include <linux/refcount.h>
- #include <linux/irqdomain.h>
- #include <linux/acpi.h>
- #include <asm/mshyperv.h>
- /*
- * Protocol versions. The low word is the minor version, the high word the
- * major version.
- */
- #define PCI_MAKE_VERSION(major, minor) ((u32)(((major) << 16) | (minor)))
- #define PCI_MAJOR_VERSION(version) ((u32)(version) >> 16)
- #define PCI_MINOR_VERSION(version) ((u32)(version) & 0xff)
- enum pci_protocol_version_t {
- PCI_PROTOCOL_VERSION_1_1 = PCI_MAKE_VERSION(1, 1), /* Win10 */
- PCI_PROTOCOL_VERSION_1_2 = PCI_MAKE_VERSION(1, 2), /* RS1 */
- PCI_PROTOCOL_VERSION_1_3 = PCI_MAKE_VERSION(1, 3), /* Vibranium */
- PCI_PROTOCOL_VERSION_1_4 = PCI_MAKE_VERSION(1, 4), /* WS2022 */
- };
- #define CPU_AFFINITY_ALL -1ULL
- /*
- * Supported protocol versions in the order of probing - highest go
- * first.
- */
- static enum pci_protocol_version_t pci_protocol_versions[] = {
- PCI_PROTOCOL_VERSION_1_4,
- PCI_PROTOCOL_VERSION_1_3,
- PCI_PROTOCOL_VERSION_1_2,
- PCI_PROTOCOL_VERSION_1_1,
- };
- #define PCI_CONFIG_MMIO_LENGTH 0x2000
- #define CFG_PAGE_OFFSET 0x1000
- #define CFG_PAGE_SIZE (PCI_CONFIG_MMIO_LENGTH - CFG_PAGE_OFFSET)
- #define MAX_SUPPORTED_MSI_MESSAGES 0x400
- #define STATUS_REVISION_MISMATCH 0xC0000059
- /* space for 32bit serial number as string */
- #define SLOT_NAME_SIZE 11
- /*
- * Size of requestor for VMbus; the value is based on the observation
- * that having more than one request outstanding is 'rare', and so 64
- * should be generous in ensuring that we don't ever run out.
- */
- #define HV_PCI_RQSTOR_SIZE 64
- /*
- * Message Types
- */
- enum pci_message_type {
- /*
- * Version 1.1
- */
- PCI_MESSAGE_BASE = 0x42490000,
- PCI_BUS_RELATIONS = PCI_MESSAGE_BASE + 0,
- PCI_QUERY_BUS_RELATIONS = PCI_MESSAGE_BASE + 1,
- PCI_POWER_STATE_CHANGE = PCI_MESSAGE_BASE + 4,
- PCI_QUERY_RESOURCE_REQUIREMENTS = PCI_MESSAGE_BASE + 5,
- PCI_QUERY_RESOURCE_RESOURCES = PCI_MESSAGE_BASE + 6,
- PCI_BUS_D0ENTRY = PCI_MESSAGE_BASE + 7,
- PCI_BUS_D0EXIT = PCI_MESSAGE_BASE + 8,
- PCI_READ_BLOCK = PCI_MESSAGE_BASE + 9,
- PCI_WRITE_BLOCK = PCI_MESSAGE_BASE + 0xA,
- PCI_EJECT = PCI_MESSAGE_BASE + 0xB,
- PCI_QUERY_STOP = PCI_MESSAGE_BASE + 0xC,
- PCI_REENABLE = PCI_MESSAGE_BASE + 0xD,
- PCI_QUERY_STOP_FAILED = PCI_MESSAGE_BASE + 0xE,
- PCI_EJECTION_COMPLETE = PCI_MESSAGE_BASE + 0xF,
- PCI_RESOURCES_ASSIGNED = PCI_MESSAGE_BASE + 0x10,
- PCI_RESOURCES_RELEASED = PCI_MESSAGE_BASE + 0x11,
- PCI_INVALIDATE_BLOCK = PCI_MESSAGE_BASE + 0x12,
- PCI_QUERY_PROTOCOL_VERSION = PCI_MESSAGE_BASE + 0x13,
- PCI_CREATE_INTERRUPT_MESSAGE = PCI_MESSAGE_BASE + 0x14,
- PCI_DELETE_INTERRUPT_MESSAGE = PCI_MESSAGE_BASE + 0x15,
- PCI_RESOURCES_ASSIGNED2 = PCI_MESSAGE_BASE + 0x16,
- PCI_CREATE_INTERRUPT_MESSAGE2 = PCI_MESSAGE_BASE + 0x17,
- PCI_DELETE_INTERRUPT_MESSAGE2 = PCI_MESSAGE_BASE + 0x18, /* unused */
- PCI_BUS_RELATIONS2 = PCI_MESSAGE_BASE + 0x19,
- PCI_RESOURCES_ASSIGNED3 = PCI_MESSAGE_BASE + 0x1A,
- PCI_CREATE_INTERRUPT_MESSAGE3 = PCI_MESSAGE_BASE + 0x1B,
- PCI_MESSAGE_MAXIMUM
- };
- /*
- * Structures defining the virtual PCI Express protocol.
- */
- union pci_version {
- struct {
- u16 minor_version;
- u16 major_version;
- } parts;
- u32 version;
- } __packed;
- /*
- * Function numbers are 8-bits wide on Express, as interpreted through ARI,
- * which is all this driver does. This representation is the one used in
- * Windows, which is what is expected when sending this back and forth with
- * the Hyper-V parent partition.
- */
- union win_slot_encoding {
- struct {
- u32 dev:5;
- u32 func:3;
- u32 reserved:24;
- } bits;
- u32 slot;
- } __packed;
- /*
- * Pretty much as defined in the PCI Specifications.
- */
- struct pci_function_description {
- u16 v_id; /* vendor ID */
- u16 d_id; /* device ID */
- u8 rev;
- u8 prog_intf;
- u8 subclass;
- u8 base_class;
- u32 subsystem_id;
- union win_slot_encoding win_slot;
- u32 ser; /* serial number */
- } __packed;
- enum pci_device_description_flags {
- HV_PCI_DEVICE_FLAG_NONE = 0x0,
- HV_PCI_DEVICE_FLAG_NUMA_AFFINITY = 0x1,
- };
- struct pci_function_description2 {
- u16 v_id; /* vendor ID */
- u16 d_id; /* device ID */
- u8 rev;
- u8 prog_intf;
- u8 subclass;
- u8 base_class;
- u32 subsystem_id;
- union win_slot_encoding win_slot;
- u32 ser; /* serial number */
- u32 flags;
- u16 virtual_numa_node;
- u16 reserved;
- } __packed;
- /**
- * struct hv_msi_desc
- * @vector: IDT entry
- * @delivery_mode: As defined in Intel's Programmer's
- * Reference Manual, Volume 3, Chapter 8.
- * @vector_count: Number of contiguous entries in the
- * Interrupt Descriptor Table that are
- * occupied by this Message-Signaled
- * Interrupt. For "MSI", as first defined
- * in PCI 2.2, this can be between 1 and
- * 32. For "MSI-X," as first defined in PCI
- * 3.0, this must be 1, as each MSI-X table
- * entry would have its own descriptor.
- * @reserved: Empty space
- * @cpu_mask: All the target virtual processors.
- */
- struct hv_msi_desc {
- u8 vector;
- u8 delivery_mode;
- u16 vector_count;
- u32 reserved;
- u64 cpu_mask;
- } __packed;
- /**
- * struct hv_msi_desc2 - 1.2 version of hv_msi_desc
- * @vector: IDT entry
- * @delivery_mode: As defined in Intel's Programmer's
- * Reference Manual, Volume 3, Chapter 8.
- * @vector_count: Number of contiguous entries in the
- * Interrupt Descriptor Table that are
- * occupied by this Message-Signaled
- * Interrupt. For "MSI", as first defined
- * in PCI 2.2, this can be between 1 and
- * 32. For "MSI-X," as first defined in PCI
- * 3.0, this must be 1, as each MSI-X table
- * entry would have its own descriptor.
- * @processor_count: number of bits enabled in array.
- * @processor_array: All the target virtual processors.
- */
- struct hv_msi_desc2 {
- u8 vector;
- u8 delivery_mode;
- u16 vector_count;
- u16 processor_count;
- u16 processor_array[32];
- } __packed;
- /*
- * struct hv_msi_desc3 - 1.3 version of hv_msi_desc
- * Everything is the same as in 'hv_msi_desc2' except that the size of the
- * 'vector' field is larger to support bigger vector values. For ex: LPI
- * vectors on ARM.
- */
- struct hv_msi_desc3 {
- u32 vector;
- u8 delivery_mode;
- u8 reserved;
- u16 vector_count;
- u16 processor_count;
- u16 processor_array[32];
- } __packed;
- /**
- * struct tran_int_desc
- * @reserved: unused, padding
- * @vector_count: same as in hv_msi_desc
- * @data: This is the "data payload" value that is
- * written by the device when it generates
- * a message-signaled interrupt, either MSI
- * or MSI-X.
- * @address: This is the address to which the data
- * payload is written on interrupt
- * generation.
- */
- struct tran_int_desc {
- u16 reserved;
- u16 vector_count;
- u32 data;
- u64 address;
- } __packed;
- /*
- * A generic message format for virtual PCI.
- * Specific message formats are defined later in the file.
- */
- struct pci_message {
- u32 type;
- } __packed;
- struct pci_child_message {
- struct pci_message message_type;
- union win_slot_encoding wslot;
- } __packed;
- struct pci_incoming_message {
- struct vmpacket_descriptor hdr;
- struct pci_message message_type;
- } __packed;
- struct pci_response {
- struct vmpacket_descriptor hdr;
- s32 status; /* negative values are failures */
- } __packed;
- struct pci_packet {
- void (*completion_func)(void *context, struct pci_response *resp,
- int resp_packet_size);
- void *compl_ctxt;
- struct pci_message message[];
- };
- /*
- * Specific message types supporting the PCI protocol.
- */
- /*
- * Version negotiation message. Sent from the guest to the host.
- * The guest is free to try different versions until the host
- * accepts the version.
- *
- * pci_version: The protocol version requested.
- * is_last_attempt: If TRUE, this is the last version guest will request.
- * reservedz: Reserved field, set to zero.
- */
- struct pci_version_request {
- struct pci_message message_type;
- u32 protocol_version;
- } __packed;
- /*
- * Bus D0 Entry. This is sent from the guest to the host when the virtual
- * bus (PCI Express port) is ready for action.
- */
- struct pci_bus_d0_entry {
- struct pci_message message_type;
- u32 reserved;
- u64 mmio_base;
- } __packed;
- struct pci_bus_relations {
- struct pci_incoming_message incoming;
- u32 device_count;
- struct pci_function_description func[];
- } __packed;
- struct pci_bus_relations2 {
- struct pci_incoming_message incoming;
- u32 device_count;
- struct pci_function_description2 func[];
- } __packed;
- struct pci_q_res_req_response {
- struct vmpacket_descriptor hdr;
- s32 status; /* negative values are failures */
- u32 probed_bar[PCI_STD_NUM_BARS];
- } __packed;
- struct pci_set_power {
- struct pci_message message_type;
- union win_slot_encoding wslot;
- u32 power_state; /* In Windows terms */
- u32 reserved;
- } __packed;
- struct pci_set_power_response {
- struct vmpacket_descriptor hdr;
- s32 status; /* negative values are failures */
- union win_slot_encoding wslot;
- u32 resultant_state; /* In Windows terms */
- u32 reserved;
- } __packed;
- struct pci_resources_assigned {
- struct pci_message message_type;
- union win_slot_encoding wslot;
- u8 memory_range[0x14][6]; /* not used here */
- u32 msi_descriptors;
- u32 reserved[4];
- } __packed;
- struct pci_resources_assigned2 {
- struct pci_message message_type;
- union win_slot_encoding wslot;
- u8 memory_range[0x14][6]; /* not used here */
- u32 msi_descriptor_count;
- u8 reserved[70];
- } __packed;
- struct pci_create_interrupt {
- struct pci_message message_type;
- union win_slot_encoding wslot;
- struct hv_msi_desc int_desc;
- } __packed;
- struct pci_create_int_response {
- struct pci_response response;
- u32 reserved;
- struct tran_int_desc int_desc;
- } __packed;
- struct pci_create_interrupt2 {
- struct pci_message message_type;
- union win_slot_encoding wslot;
- struct hv_msi_desc2 int_desc;
- } __packed;
- struct pci_create_interrupt3 {
- struct pci_message message_type;
- union win_slot_encoding wslot;
- struct hv_msi_desc3 int_desc;
- } __packed;
- struct pci_delete_interrupt {
- struct pci_message message_type;
- union win_slot_encoding wslot;
- struct tran_int_desc int_desc;
- } __packed;
- /*
- * Note: the VM must pass a valid block id, wslot and bytes_requested.
- */
- struct pci_read_block {
- struct pci_message message_type;
- u32 block_id;
- union win_slot_encoding wslot;
- u32 bytes_requested;
- } __packed;
- struct pci_read_block_response {
- struct vmpacket_descriptor hdr;
- u32 status;
- u8 bytes[HV_CONFIG_BLOCK_SIZE_MAX];
- } __packed;
- /*
- * Note: the VM must pass a valid block id, wslot and byte_count.
- */
- struct pci_write_block {
- struct pci_message message_type;
- u32 block_id;
- union win_slot_encoding wslot;
- u32 byte_count;
- u8 bytes[HV_CONFIG_BLOCK_SIZE_MAX];
- } __packed;
- struct pci_dev_inval_block {
- struct pci_incoming_message incoming;
- union win_slot_encoding wslot;
- u64 block_mask;
- } __packed;
- struct pci_dev_incoming {
- struct pci_incoming_message incoming;
- union win_slot_encoding wslot;
- } __packed;
- struct pci_eject_response {
- struct pci_message message_type;
- union win_slot_encoding wslot;
- u32 status;
- } __packed;
- static int pci_ring_size = (4 * PAGE_SIZE);
- /*
- * Driver specific state.
- */
- enum hv_pcibus_state {
- hv_pcibus_init = 0,
- hv_pcibus_probed,
- hv_pcibus_installed,
- hv_pcibus_removing,
- hv_pcibus_maximum
- };
- struct hv_pcibus_device {
- #ifdef CONFIG_X86
- struct pci_sysdata sysdata;
- #elif defined(CONFIG_ARM64)
- struct pci_config_window sysdata;
- #endif
- struct pci_host_bridge *bridge;
- struct fwnode_handle *fwnode;
- /* Protocol version negotiated with the host */
- enum pci_protocol_version_t protocol_version;
- struct mutex state_lock;
- enum hv_pcibus_state state;
- struct hv_device *hdev;
- resource_size_t low_mmio_space;
- resource_size_t high_mmio_space;
- struct resource *mem_config;
- struct resource *low_mmio_res;
- struct resource *high_mmio_res;
- struct completion *survey_event;
- struct pci_bus *pci_bus;
- spinlock_t config_lock; /* Avoid two threads writing index page */
- spinlock_t device_list_lock; /* Protect lists below */
- void __iomem *cfg_addr;
- struct list_head children;
- struct list_head dr_list;
- struct msi_domain_info msi_info;
- struct irq_domain *irq_domain;
- spinlock_t retarget_msi_interrupt_lock;
- struct workqueue_struct *wq;
- /* Highest slot of child device with resources allocated */
- int wslot_res_allocated;
- /* hypercall arg, must not cross page boundary */
- struct hv_retarget_device_interrupt retarget_msi_interrupt_params;
- /*
- * Don't put anything here: retarget_msi_interrupt_params must be last
- */
- };
- /*
- * Tracks "Device Relations" messages from the host, which must be both
- * processed in order and deferred so that they don't run in the context
- * of the incoming packet callback.
- */
- struct hv_dr_work {
- struct work_struct wrk;
- struct hv_pcibus_device *bus;
- };
- struct hv_pcidev_description {
- u16 v_id; /* vendor ID */
- u16 d_id; /* device ID */
- u8 rev;
- u8 prog_intf;
- u8 subclass;
- u8 base_class;
- u32 subsystem_id;
- union win_slot_encoding win_slot;
- u32 ser; /* serial number */
- u32 flags;
- u16 virtual_numa_node;
- };
- struct hv_dr_state {
- struct list_head list_entry;
- u32 device_count;
- struct hv_pcidev_description func[];
- };
- struct hv_pci_dev {
- /* List protected by pci_rescan_remove_lock */
- struct list_head list_entry;
- refcount_t refs;
- struct pci_slot *pci_slot;
- struct hv_pcidev_description desc;
- bool reported_missing;
- struct hv_pcibus_device *hbus;
- struct work_struct wrk;
- void (*block_invalidate)(void *context, u64 block_mask);
- void *invalidate_context;
- /*
- * What would be observed if one wrote 0xFFFFFFFF to a BAR and then
- * read it back, for each of the BAR offsets within config space.
- */
- u32 probed_bar[PCI_STD_NUM_BARS];
- };
- struct hv_pci_compl {
- struct completion host_event;
- s32 completion_status;
- };
- static void hv_pci_onchannelcallback(void *context);
- #ifdef CONFIG_X86
- #define DELIVERY_MODE APIC_DELIVERY_MODE_FIXED
- #define FLOW_HANDLER handle_edge_irq
- #define FLOW_NAME "edge"
- static int hv_pci_irqchip_init(void)
- {
- return 0;
- }
- static struct irq_domain *hv_pci_get_root_domain(void)
- {
- return x86_vector_domain;
- }
- static unsigned int hv_msi_get_int_vector(struct irq_data *data)
- {
- struct irq_cfg *cfg = irqd_cfg(data);
- return cfg->vector;
- }
- static int hv_msi_prepare(struct irq_domain *domain, struct device *dev,
- int nvec, msi_alloc_info_t *info)
- {
- int ret = pci_msi_prepare(domain, dev, nvec, info);
- /*
- * By using the interrupt remapper in the hypervisor IOMMU, contiguous
- * CPU vectors is not needed for multi-MSI
- */
- if (info->type == X86_IRQ_ALLOC_TYPE_PCI_MSI)
- info->flags &= ~X86_IRQ_ALLOC_CONTIGUOUS_VECTORS;
- return ret;
- }
- /**
- * hv_arch_irq_unmask() - "Unmask" the IRQ by setting its current
- * affinity.
- * @data: Describes the IRQ
- *
- * Build new a destination for the MSI and make a hypercall to
- * update the Interrupt Redirection Table. "Device Logical ID"
- * is built out of this PCI bus's instance GUID and the function
- * number of the device.
- */
- static void hv_arch_irq_unmask(struct irq_data *data)
- {
- struct msi_desc *msi_desc = irq_data_get_msi_desc(data);
- struct hv_retarget_device_interrupt *params;
- struct tran_int_desc *int_desc;
- struct hv_pcibus_device *hbus;
- const struct cpumask *dest;
- cpumask_var_t tmp;
- struct pci_bus *pbus;
- struct pci_dev *pdev;
- unsigned long flags;
- u32 var_size = 0;
- int cpu, nr_bank;
- u64 res;
- dest = irq_data_get_effective_affinity_mask(data);
- pdev = msi_desc_to_pci_dev(msi_desc);
- pbus = pdev->bus;
- hbus = container_of(pbus->sysdata, struct hv_pcibus_device, sysdata);
- int_desc = data->chip_data;
- if (!int_desc) {
- dev_warn(&hbus->hdev->device, "%s() can not unmask irq %u\n",
- __func__, data->irq);
- return;
- }
- spin_lock_irqsave(&hbus->retarget_msi_interrupt_lock, flags);
- params = &hbus->retarget_msi_interrupt_params;
- memset(params, 0, sizeof(*params));
- params->partition_id = HV_PARTITION_ID_SELF;
- params->int_entry.source = HV_INTERRUPT_SOURCE_MSI;
- params->int_entry.msi_entry.address.as_uint32 = int_desc->address & 0xffffffff;
- params->int_entry.msi_entry.data.as_uint32 = int_desc->data;
- params->device_id = (hbus->hdev->dev_instance.b[5] << 24) |
- (hbus->hdev->dev_instance.b[4] << 16) |
- (hbus->hdev->dev_instance.b[7] << 8) |
- (hbus->hdev->dev_instance.b[6] & 0xf8) |
- PCI_FUNC(pdev->devfn);
- params->int_target.vector = hv_msi_get_int_vector(data);
- /*
- * Honoring apic->delivery_mode set to APIC_DELIVERY_MODE_FIXED by
- * setting the HV_DEVICE_INTERRUPT_TARGET_MULTICAST flag results in a
- * spurious interrupt storm. Not doing so does not seem to have a
- * negative effect (yet?).
- */
- if (hbus->protocol_version >= PCI_PROTOCOL_VERSION_1_2) {
- /*
- * PCI_PROTOCOL_VERSION_1_2 supports the VP_SET version of the
- * HVCALL_RETARGET_INTERRUPT hypercall, which also coincides
- * with >64 VP support.
- * ms_hyperv.hints & HV_X64_EX_PROCESSOR_MASKS_RECOMMENDED
- * is not sufficient for this hypercall.
- */
- params->int_target.flags |=
- HV_DEVICE_INTERRUPT_TARGET_PROCESSOR_SET;
- if (!alloc_cpumask_var(&tmp, GFP_ATOMIC)) {
- res = 1;
- goto exit_unlock;
- }
- cpumask_and(tmp, dest, cpu_online_mask);
- nr_bank = cpumask_to_vpset(¶ms->int_target.vp_set, tmp);
- free_cpumask_var(tmp);
- if (nr_bank <= 0) {
- res = 1;
- goto exit_unlock;
- }
- /*
- * var-sized hypercall, var-size starts after vp_mask (thus
- * vp_set.format does not count, but vp_set.valid_bank_mask
- * does).
- */
- var_size = 1 + nr_bank;
- } else {
- for_each_cpu_and(cpu, dest, cpu_online_mask) {
- params->int_target.vp_mask |=
- (1ULL << hv_cpu_number_to_vp_number(cpu));
- }
- }
- res = hv_do_hypercall(HVCALL_RETARGET_INTERRUPT | (var_size << 17),
- params, NULL);
- exit_unlock:
- spin_unlock_irqrestore(&hbus->retarget_msi_interrupt_lock, flags);
- /*
- * During hibernation, when a CPU is offlined, the kernel tries
- * to move the interrupt to the remaining CPUs that haven't
- * been offlined yet. In this case, the below hv_do_hypercall()
- * always fails since the vmbus channel has been closed:
- * refer to cpu_disable_common() -> fixup_irqs() ->
- * irq_migrate_all_off_this_cpu() -> migrate_one_irq().
- *
- * Suppress the error message for hibernation because the failure
- * during hibernation does not matter (at this time all the devices
- * have been frozen). Note: the correct affinity info is still updated
- * into the irqdata data structure in migrate_one_irq() ->
- * irq_do_set_affinity() -> hv_set_affinity(), so later when the VM
- * resumes, hv_pci_restore_msi_state() is able to correctly restore
- * the interrupt with the correct affinity.
- */
- if (!hv_result_success(res) && hbus->state != hv_pcibus_removing)
- dev_err(&hbus->hdev->device,
- "%s() failed: %#llx", __func__, res);
- }
- #elif defined(CONFIG_ARM64)
- /*
- * SPI vectors to use for vPCI; arch SPIs range is [32, 1019], but leaving a bit
- * of room at the start to allow for SPIs to be specified through ACPI and
- * starting with a power of two to satisfy power of 2 multi-MSI requirement.
- */
- #define HV_PCI_MSI_SPI_START 64
- #define HV_PCI_MSI_SPI_NR (1020 - HV_PCI_MSI_SPI_START)
- #define DELIVERY_MODE 0
- #define FLOW_HANDLER NULL
- #define FLOW_NAME NULL
- #define hv_msi_prepare NULL
- struct hv_pci_chip_data {
- DECLARE_BITMAP(spi_map, HV_PCI_MSI_SPI_NR);
- struct mutex map_lock;
- };
- /* Hyper-V vPCI MSI GIC IRQ domain */
- static struct irq_domain *hv_msi_gic_irq_domain;
- /* Hyper-V PCI MSI IRQ chip */
- static struct irq_chip hv_arm64_msi_irq_chip = {
- .name = "MSI",
- .irq_set_affinity = irq_chip_set_affinity_parent,
- .irq_eoi = irq_chip_eoi_parent,
- .irq_mask = irq_chip_mask_parent,
- .irq_unmask = irq_chip_unmask_parent
- };
- static unsigned int hv_msi_get_int_vector(struct irq_data *irqd)
- {
- return irqd->parent_data->hwirq;
- }
- /*
- * @nr_bm_irqs: Indicates the number of IRQs that were allocated from
- * the bitmap.
- * @nr_dom_irqs: Indicates the number of IRQs that were allocated from
- * the parent domain.
- */
- static void hv_pci_vec_irq_free(struct irq_domain *domain,
- unsigned int virq,
- unsigned int nr_bm_irqs,
- unsigned int nr_dom_irqs)
- {
- struct hv_pci_chip_data *chip_data = domain->host_data;
- struct irq_data *d = irq_domain_get_irq_data(domain, virq);
- int first = d->hwirq - HV_PCI_MSI_SPI_START;
- int i;
- mutex_lock(&chip_data->map_lock);
- bitmap_release_region(chip_data->spi_map,
- first,
- get_count_order(nr_bm_irqs));
- mutex_unlock(&chip_data->map_lock);
- for (i = 0; i < nr_dom_irqs; i++) {
- if (i)
- d = irq_domain_get_irq_data(domain, virq + i);
- irq_domain_reset_irq_data(d);
- }
- irq_domain_free_irqs_parent(domain, virq, nr_dom_irqs);
- }
- static void hv_pci_vec_irq_domain_free(struct irq_domain *domain,
- unsigned int virq,
- unsigned int nr_irqs)
- {
- hv_pci_vec_irq_free(domain, virq, nr_irqs, nr_irqs);
- }
- static int hv_pci_vec_alloc_device_irq(struct irq_domain *domain,
- unsigned int nr_irqs,
- irq_hw_number_t *hwirq)
- {
- struct hv_pci_chip_data *chip_data = domain->host_data;
- int index;
- /* Find and allocate region from the SPI bitmap */
- mutex_lock(&chip_data->map_lock);
- index = bitmap_find_free_region(chip_data->spi_map,
- HV_PCI_MSI_SPI_NR,
- get_count_order(nr_irqs));
- mutex_unlock(&chip_data->map_lock);
- if (index < 0)
- return -ENOSPC;
- *hwirq = index + HV_PCI_MSI_SPI_START;
- return 0;
- }
- static int hv_pci_vec_irq_gic_domain_alloc(struct irq_domain *domain,
- unsigned int virq,
- irq_hw_number_t hwirq)
- {
- struct irq_fwspec fwspec;
- struct irq_data *d;
- int ret;
- fwspec.fwnode = domain->parent->fwnode;
- fwspec.param_count = 2;
- fwspec.param[0] = hwirq;
- fwspec.param[1] = IRQ_TYPE_EDGE_RISING;
- ret = irq_domain_alloc_irqs_parent(domain, virq, 1, &fwspec);
- if (ret)
- return ret;
- /*
- * Since the interrupt specifier is not coming from ACPI or DT, the
- * trigger type will need to be set explicitly. Otherwise, it will be
- * set to whatever is in the GIC configuration.
- */
- d = irq_domain_get_irq_data(domain->parent, virq);
- return d->chip->irq_set_type(d, IRQ_TYPE_EDGE_RISING);
- }
- static int hv_pci_vec_irq_domain_alloc(struct irq_domain *domain,
- unsigned int virq, unsigned int nr_irqs,
- void *args)
- {
- irq_hw_number_t hwirq;
- unsigned int i;
- int ret;
- ret = hv_pci_vec_alloc_device_irq(domain, nr_irqs, &hwirq);
- if (ret)
- return ret;
- for (i = 0; i < nr_irqs; i++) {
- ret = hv_pci_vec_irq_gic_domain_alloc(domain, virq + i,
- hwirq + i);
- if (ret) {
- hv_pci_vec_irq_free(domain, virq, nr_irqs, i);
- return ret;
- }
- irq_domain_set_hwirq_and_chip(domain, virq + i,
- hwirq + i,
- &hv_arm64_msi_irq_chip,
- domain->host_data);
- pr_debug("pID:%d vID:%u\n", (int)(hwirq + i), virq + i);
- }
- return 0;
- }
- /*
- * Pick the first cpu as the irq affinity that can be temporarily used for
- * composing MSI from the hypervisor. GIC will eventually set the right
- * affinity for the irq and the 'unmask' will retarget the interrupt to that
- * cpu.
- */
- static int hv_pci_vec_irq_domain_activate(struct irq_domain *domain,
- struct irq_data *irqd, bool reserve)
- {
- int cpu = cpumask_first(cpu_present_mask);
- irq_data_update_effective_affinity(irqd, cpumask_of(cpu));
- return 0;
- }
- static const struct irq_domain_ops hv_pci_domain_ops = {
- .alloc = hv_pci_vec_irq_domain_alloc,
- .free = hv_pci_vec_irq_domain_free,
- .activate = hv_pci_vec_irq_domain_activate,
- };
- static int hv_pci_irqchip_init(void)
- {
- static struct hv_pci_chip_data *chip_data;
- struct fwnode_handle *fn = NULL;
- int ret = -ENOMEM;
- chip_data = kzalloc(sizeof(*chip_data), GFP_KERNEL);
- if (!chip_data)
- return ret;
- mutex_init(&chip_data->map_lock);
- fn = irq_domain_alloc_named_fwnode("hv_vpci_arm64");
- if (!fn)
- goto free_chip;
- /*
- * IRQ domain once enabled, should not be removed since there is no
- * way to ensure that all the corresponding devices are also gone and
- * no interrupts will be generated.
- */
- hv_msi_gic_irq_domain = acpi_irq_create_hierarchy(0, HV_PCI_MSI_SPI_NR,
- fn, &hv_pci_domain_ops,
- chip_data);
- if (!hv_msi_gic_irq_domain) {
- pr_err("Failed to create Hyper-V arm64 vPCI MSI IRQ domain\n");
- goto free_chip;
- }
- return 0;
- free_chip:
- kfree(chip_data);
- if (fn)
- irq_domain_free_fwnode(fn);
- return ret;
- }
- static struct irq_domain *hv_pci_get_root_domain(void)
- {
- return hv_msi_gic_irq_domain;
- }
- /*
- * SPIs are used for interrupts of PCI devices and SPIs is managed via GICD
- * registers which Hyper-V already supports, so no hypercall needed.
- */
- static void hv_arch_irq_unmask(struct irq_data *data) { }
- #endif /* CONFIG_ARM64 */
- /**
- * hv_pci_generic_compl() - Invoked for a completion packet
- * @context: Set up by the sender of the packet.
- * @resp: The response packet
- * @resp_packet_size: Size in bytes of the packet
- *
- * This function is used to trigger an event and report status
- * for any message for which the completion packet contains a
- * status and nothing else.
- */
- static void hv_pci_generic_compl(void *context, struct pci_response *resp,
- int resp_packet_size)
- {
- struct hv_pci_compl *comp_pkt = context;
- comp_pkt->completion_status = resp->status;
- complete(&comp_pkt->host_event);
- }
- static struct hv_pci_dev *get_pcichild_wslot(struct hv_pcibus_device *hbus,
- u32 wslot);
- static void get_pcichild(struct hv_pci_dev *hpdev)
- {
- refcount_inc(&hpdev->refs);
- }
- static void put_pcichild(struct hv_pci_dev *hpdev)
- {
- if (refcount_dec_and_test(&hpdev->refs))
- kfree(hpdev);
- }
- /*
- * There is no good way to get notified from vmbus_onoffer_rescind(),
- * so let's use polling here, since this is not a hot path.
- */
- static int wait_for_response(struct hv_device *hdev,
- struct completion *comp)
- {
- while (true) {
- if (hdev->channel->rescind) {
- dev_warn_once(&hdev->device, "The device is gone.\n");
- return -ENODEV;
- }
- if (wait_for_completion_timeout(comp, HZ / 10))
- break;
- }
- return 0;
- }
- /**
- * devfn_to_wslot() - Convert from Linux PCI slot to Windows
- * @devfn: The Linux representation of PCI slot
- *
- * Windows uses a slightly different representation of PCI slot.
- *
- * Return: The Windows representation
- */
- static u32 devfn_to_wslot(int devfn)
- {
- union win_slot_encoding wslot;
- wslot.slot = 0;
- wslot.bits.dev = PCI_SLOT(devfn);
- wslot.bits.func = PCI_FUNC(devfn);
- return wslot.slot;
- }
- /**
- * wslot_to_devfn() - Convert from Windows PCI slot to Linux
- * @wslot: The Windows representation of PCI slot
- *
- * Windows uses a slightly different representation of PCI slot.
- *
- * Return: The Linux representation
- */
- static int wslot_to_devfn(u32 wslot)
- {
- union win_slot_encoding slot_no;
- slot_no.slot = wslot;
- return PCI_DEVFN(slot_no.bits.dev, slot_no.bits.func);
- }
- /*
- * PCI Configuration Space for these root PCI buses is implemented as a pair
- * of pages in memory-mapped I/O space. Writing to the first page chooses
- * the PCI function being written or read. Once the first page has been
- * written to, the following page maps in the entire configuration space of
- * the function.
- */
- /**
- * _hv_pcifront_read_config() - Internal PCI config read
- * @hpdev: The PCI driver's representation of the device
- * @where: Offset within config space
- * @size: Size of the transfer
- * @val: Pointer to the buffer receiving the data
- */
- static void _hv_pcifront_read_config(struct hv_pci_dev *hpdev, int where,
- int size, u32 *val)
- {
- unsigned long flags;
- void __iomem *addr = hpdev->hbus->cfg_addr + CFG_PAGE_OFFSET + where;
- /*
- * If the attempt is to read the IDs or the ROM BAR, simulate that.
- */
- if (where + size <= PCI_COMMAND) {
- memcpy(val, ((u8 *)&hpdev->desc.v_id) + where, size);
- } else if (where >= PCI_CLASS_REVISION && where + size <=
- PCI_CACHE_LINE_SIZE) {
- memcpy(val, ((u8 *)&hpdev->desc.rev) + where -
- PCI_CLASS_REVISION, size);
- } else if (where >= PCI_SUBSYSTEM_VENDOR_ID && where + size <=
- PCI_ROM_ADDRESS) {
- memcpy(val, (u8 *)&hpdev->desc.subsystem_id + where -
- PCI_SUBSYSTEM_VENDOR_ID, size);
- } else if (where >= PCI_ROM_ADDRESS && where + size <=
- PCI_CAPABILITY_LIST) {
- /* ROM BARs are unimplemented */
- *val = 0;
- } else if (where >= PCI_INTERRUPT_LINE && where + size <=
- PCI_INTERRUPT_PIN) {
- /*
- * Interrupt Line and Interrupt PIN are hard-wired to zero
- * because this front-end only supports message-signaled
- * interrupts.
- */
- *val = 0;
- } else if (where + size <= CFG_PAGE_SIZE) {
- spin_lock_irqsave(&hpdev->hbus->config_lock, flags);
- /* Choose the function to be read. (See comment above) */
- writel(hpdev->desc.win_slot.slot, hpdev->hbus->cfg_addr);
- /* Make sure the function was chosen before we start reading. */
- mb();
- /* Read from that function's config space. */
- switch (size) {
- case 1:
- *val = readb(addr);
- break;
- case 2:
- *val = readw(addr);
- break;
- default:
- *val = readl(addr);
- break;
- }
- /*
- * Make sure the read was done before we release the spinlock
- * allowing consecutive reads/writes.
- */
- mb();
- spin_unlock_irqrestore(&hpdev->hbus->config_lock, flags);
- } else {
- dev_err(&hpdev->hbus->hdev->device,
- "Attempt to read beyond a function's config space.\n");
- }
- }
- static u16 hv_pcifront_get_vendor_id(struct hv_pci_dev *hpdev)
- {
- u16 ret;
- unsigned long flags;
- void __iomem *addr = hpdev->hbus->cfg_addr + CFG_PAGE_OFFSET +
- PCI_VENDOR_ID;
- spin_lock_irqsave(&hpdev->hbus->config_lock, flags);
- /* Choose the function to be read. (See comment above) */
- writel(hpdev->desc.win_slot.slot, hpdev->hbus->cfg_addr);
- /* Make sure the function was chosen before we start reading. */
- mb();
- /* Read from that function's config space. */
- ret = readw(addr);
- /*
- * mb() is not required here, because the spin_unlock_irqrestore()
- * is a barrier.
- */
- spin_unlock_irqrestore(&hpdev->hbus->config_lock, flags);
- return ret;
- }
- /**
- * _hv_pcifront_write_config() - Internal PCI config write
- * @hpdev: The PCI driver's representation of the device
- * @where: Offset within config space
- * @size: Size of the transfer
- * @val: The data being transferred
- */
- static void _hv_pcifront_write_config(struct hv_pci_dev *hpdev, int where,
- int size, u32 val)
- {
- unsigned long flags;
- void __iomem *addr = hpdev->hbus->cfg_addr + CFG_PAGE_OFFSET + where;
- if (where >= PCI_SUBSYSTEM_VENDOR_ID &&
- where + size <= PCI_CAPABILITY_LIST) {
- /* SSIDs and ROM BARs are read-only */
- } else if (where >= PCI_COMMAND && where + size <= CFG_PAGE_SIZE) {
- spin_lock_irqsave(&hpdev->hbus->config_lock, flags);
- /* Choose the function to be written. (See comment above) */
- writel(hpdev->desc.win_slot.slot, hpdev->hbus->cfg_addr);
- /* Make sure the function was chosen before we start writing. */
- wmb();
- /* Write to that function's config space. */
- switch (size) {
- case 1:
- writeb(val, addr);
- break;
- case 2:
- writew(val, addr);
- break;
- default:
- writel(val, addr);
- break;
- }
- /*
- * Make sure the write was done before we release the spinlock
- * allowing consecutive reads/writes.
- */
- mb();
- spin_unlock_irqrestore(&hpdev->hbus->config_lock, flags);
- } else {
- dev_err(&hpdev->hbus->hdev->device,
- "Attempt to write beyond a function's config space.\n");
- }
- }
- /**
- * hv_pcifront_read_config() - Read configuration space
- * @bus: PCI Bus structure
- * @devfn: Device/function
- * @where: Offset from base
- * @size: Byte/word/dword
- * @val: Value to be read
- *
- * Return: PCIBIOS_SUCCESSFUL on success
- * PCIBIOS_DEVICE_NOT_FOUND on failure
- */
- static int hv_pcifront_read_config(struct pci_bus *bus, unsigned int devfn,
- int where, int size, u32 *val)
- {
- struct hv_pcibus_device *hbus =
- container_of(bus->sysdata, struct hv_pcibus_device, sysdata);
- struct hv_pci_dev *hpdev;
- hpdev = get_pcichild_wslot(hbus, devfn_to_wslot(devfn));
- if (!hpdev)
- return PCIBIOS_DEVICE_NOT_FOUND;
- _hv_pcifront_read_config(hpdev, where, size, val);
- put_pcichild(hpdev);
- return PCIBIOS_SUCCESSFUL;
- }
- /**
- * hv_pcifront_write_config() - Write configuration space
- * @bus: PCI Bus structure
- * @devfn: Device/function
- * @where: Offset from base
- * @size: Byte/word/dword
- * @val: Value to be written to device
- *
- * Return: PCIBIOS_SUCCESSFUL on success
- * PCIBIOS_DEVICE_NOT_FOUND on failure
- */
- static int hv_pcifront_write_config(struct pci_bus *bus, unsigned int devfn,
- int where, int size, u32 val)
- {
- struct hv_pcibus_device *hbus =
- container_of(bus->sysdata, struct hv_pcibus_device, sysdata);
- struct hv_pci_dev *hpdev;
- hpdev = get_pcichild_wslot(hbus, devfn_to_wslot(devfn));
- if (!hpdev)
- return PCIBIOS_DEVICE_NOT_FOUND;
- _hv_pcifront_write_config(hpdev, where, size, val);
- put_pcichild(hpdev);
- return PCIBIOS_SUCCESSFUL;
- }
- /* PCIe operations */
- static struct pci_ops hv_pcifront_ops = {
- .read = hv_pcifront_read_config,
- .write = hv_pcifront_write_config,
- };
- /*
- * Paravirtual backchannel
- *
- * Hyper-V SR-IOV provides a backchannel mechanism in software for
- * communication between a VF driver and a PF driver. These
- * "configuration blocks" are similar in concept to PCI configuration space,
- * but instead of doing reads and writes in 32-bit chunks through a very slow
- * path, packets of up to 128 bytes can be sent or received asynchronously.
- *
- * Nearly every SR-IOV device contains just such a communications channel in
- * hardware, so using this one in software is usually optional. Using the
- * software channel, however, allows driver implementers to leverage software
- * tools that fuzz the communications channel looking for vulnerabilities.
- *
- * The usage model for these packets puts the responsibility for reading or
- * writing on the VF driver. The VF driver sends a read or a write packet,
- * indicating which "block" is being referred to by number.
- *
- * If the PF driver wishes to initiate communication, it can "invalidate" one or
- * more of the first 64 blocks. This invalidation is delivered via a callback
- * supplied by the VF driver by this driver.
- *
- * No protocol is implied, except that supplied by the PF and VF drivers.
- */
- struct hv_read_config_compl {
- struct hv_pci_compl comp_pkt;
- void *buf;
- unsigned int len;
- unsigned int bytes_returned;
- };
- /**
- * hv_pci_read_config_compl() - Invoked when a response packet
- * for a read config block operation arrives.
- * @context: Identifies the read config operation
- * @resp: The response packet itself
- * @resp_packet_size: Size in bytes of the response packet
- */
- static void hv_pci_read_config_compl(void *context, struct pci_response *resp,
- int resp_packet_size)
- {
- struct hv_read_config_compl *comp = context;
- struct pci_read_block_response *read_resp =
- (struct pci_read_block_response *)resp;
- unsigned int data_len, hdr_len;
- hdr_len = offsetof(struct pci_read_block_response, bytes);
- if (resp_packet_size < hdr_len) {
- comp->comp_pkt.completion_status = -1;
- goto out;
- }
- data_len = resp_packet_size - hdr_len;
- if (data_len > 0 && read_resp->status == 0) {
- comp->bytes_returned = min(comp->len, data_len);
- memcpy(comp->buf, read_resp->bytes, comp->bytes_returned);
- } else {
- comp->bytes_returned = 0;
- }
- comp->comp_pkt.completion_status = read_resp->status;
- out:
- complete(&comp->comp_pkt.host_event);
- }
- /**
- * hv_read_config_block() - Sends a read config block request to
- * the back-end driver running in the Hyper-V parent partition.
- * @pdev: The PCI driver's representation for this device.
- * @buf: Buffer into which the config block will be copied.
- * @len: Size in bytes of buf.
- * @block_id: Identifies the config block which has been requested.
- * @bytes_returned: Size which came back from the back-end driver.
- *
- * Return: 0 on success, -errno on failure
- */
- static int hv_read_config_block(struct pci_dev *pdev, void *buf,
- unsigned int len, unsigned int block_id,
- unsigned int *bytes_returned)
- {
- struct hv_pcibus_device *hbus =
- container_of(pdev->bus->sysdata, struct hv_pcibus_device,
- sysdata);
- struct {
- struct pci_packet pkt;
- char buf[sizeof(struct pci_read_block)];
- } pkt;
- struct hv_read_config_compl comp_pkt;
- struct pci_read_block *read_blk;
- int ret;
- if (len == 0 || len > HV_CONFIG_BLOCK_SIZE_MAX)
- return -EINVAL;
- init_completion(&comp_pkt.comp_pkt.host_event);
- comp_pkt.buf = buf;
- comp_pkt.len = len;
- memset(&pkt, 0, sizeof(pkt));
- pkt.pkt.completion_func = hv_pci_read_config_compl;
- pkt.pkt.compl_ctxt = &comp_pkt;
- read_blk = (struct pci_read_block *)&pkt.pkt.message;
- read_blk->message_type.type = PCI_READ_BLOCK;
- read_blk->wslot.slot = devfn_to_wslot(pdev->devfn);
- read_blk->block_id = block_id;
- read_blk->bytes_requested = len;
- ret = vmbus_sendpacket(hbus->hdev->channel, read_blk,
- sizeof(*read_blk), (unsigned long)&pkt.pkt,
- VM_PKT_DATA_INBAND,
- VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
- if (ret)
- return ret;
- ret = wait_for_response(hbus->hdev, &comp_pkt.comp_pkt.host_event);
- if (ret)
- return ret;
- if (comp_pkt.comp_pkt.completion_status != 0 ||
- comp_pkt.bytes_returned == 0) {
- dev_err(&hbus->hdev->device,
- "Read Config Block failed: 0x%x, bytes_returned=%d\n",
- comp_pkt.comp_pkt.completion_status,
- comp_pkt.bytes_returned);
- return -EIO;
- }
- *bytes_returned = comp_pkt.bytes_returned;
- return 0;
- }
- /**
- * hv_pci_write_config_compl() - Invoked when a response packet for a write
- * config block operation arrives.
- * @context: Identifies the write config operation
- * @resp: The response packet itself
- * @resp_packet_size: Size in bytes of the response packet
- */
- static void hv_pci_write_config_compl(void *context, struct pci_response *resp,
- int resp_packet_size)
- {
- struct hv_pci_compl *comp_pkt = context;
- comp_pkt->completion_status = resp->status;
- complete(&comp_pkt->host_event);
- }
- /**
- * hv_write_config_block() - Sends a write config block request to the
- * back-end driver running in the Hyper-V parent partition.
- * @pdev: The PCI driver's representation for this device.
- * @buf: Buffer from which the config block will be copied.
- * @len: Size in bytes of buf.
- * @block_id: Identifies the config block which is being written.
- *
- * Return: 0 on success, -errno on failure
- */
- static int hv_write_config_block(struct pci_dev *pdev, void *buf,
- unsigned int len, unsigned int block_id)
- {
- struct hv_pcibus_device *hbus =
- container_of(pdev->bus->sysdata, struct hv_pcibus_device,
- sysdata);
- struct {
- struct pci_packet pkt;
- char buf[sizeof(struct pci_write_block)];
- u32 reserved;
- } pkt;
- struct hv_pci_compl comp_pkt;
- struct pci_write_block *write_blk;
- u32 pkt_size;
- int ret;
- if (len == 0 || len > HV_CONFIG_BLOCK_SIZE_MAX)
- return -EINVAL;
- init_completion(&comp_pkt.host_event);
- memset(&pkt, 0, sizeof(pkt));
- pkt.pkt.completion_func = hv_pci_write_config_compl;
- pkt.pkt.compl_ctxt = &comp_pkt;
- write_blk = (struct pci_write_block *)&pkt.pkt.message;
- write_blk->message_type.type = PCI_WRITE_BLOCK;
- write_blk->wslot.slot = devfn_to_wslot(pdev->devfn);
- write_blk->block_id = block_id;
- write_blk->byte_count = len;
- memcpy(write_blk->bytes, buf, len);
- pkt_size = offsetof(struct pci_write_block, bytes) + len;
- /*
- * This quirk is required on some hosts shipped around 2018, because
- * these hosts don't check the pkt_size correctly (new hosts have been
- * fixed since early 2019). The quirk is also safe on very old hosts
- * and new hosts, because, on them, what really matters is the length
- * specified in write_blk->byte_count.
- */
- pkt_size += sizeof(pkt.reserved);
- ret = vmbus_sendpacket(hbus->hdev->channel, write_blk, pkt_size,
- (unsigned long)&pkt.pkt, VM_PKT_DATA_INBAND,
- VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
- if (ret)
- return ret;
- ret = wait_for_response(hbus->hdev, &comp_pkt.host_event);
- if (ret)
- return ret;
- if (comp_pkt.completion_status != 0) {
- dev_err(&hbus->hdev->device,
- "Write Config Block failed: 0x%x\n",
- comp_pkt.completion_status);
- return -EIO;
- }
- return 0;
- }
- /**
- * hv_register_block_invalidate() - Invoked when a config block invalidation
- * arrives from the back-end driver.
- * @pdev: The PCI driver's representation for this device.
- * @context: Identifies the device.
- * @block_invalidate: Identifies all of the blocks being invalidated.
- *
- * Return: 0 on success, -errno on failure
- */
- static int hv_register_block_invalidate(struct pci_dev *pdev, void *context,
- void (*block_invalidate)(void *context,
- u64 block_mask))
- {
- struct hv_pcibus_device *hbus =
- container_of(pdev->bus->sysdata, struct hv_pcibus_device,
- sysdata);
- struct hv_pci_dev *hpdev;
- hpdev = get_pcichild_wslot(hbus, devfn_to_wslot(pdev->devfn));
- if (!hpdev)
- return -ENODEV;
- hpdev->block_invalidate = block_invalidate;
- hpdev->invalidate_context = context;
- put_pcichild(hpdev);
- return 0;
- }
- /* Interrupt management hooks */
- static void hv_int_desc_free(struct hv_pci_dev *hpdev,
- struct tran_int_desc *int_desc)
- {
- struct pci_delete_interrupt *int_pkt;
- struct {
- struct pci_packet pkt;
- u8 buffer[sizeof(struct pci_delete_interrupt)];
- } ctxt;
- if (!int_desc->vector_count) {
- kfree(int_desc);
- return;
- }
- memset(&ctxt, 0, sizeof(ctxt));
- int_pkt = (struct pci_delete_interrupt *)&ctxt.pkt.message;
- int_pkt->message_type.type =
- PCI_DELETE_INTERRUPT_MESSAGE;
- int_pkt->wslot.slot = hpdev->desc.win_slot.slot;
- int_pkt->int_desc = *int_desc;
- vmbus_sendpacket(hpdev->hbus->hdev->channel, int_pkt, sizeof(*int_pkt),
- 0, VM_PKT_DATA_INBAND, 0);
- kfree(int_desc);
- }
- /**
- * hv_msi_free() - Free the MSI.
- * @domain: The interrupt domain pointer
- * @info: Extra MSI-related context
- * @irq: Identifies the IRQ.
- *
- * The Hyper-V parent partition and hypervisor are tracking the
- * messages that are in use, keeping the interrupt redirection
- * table up to date. This callback sends a message that frees
- * the IRT entry and related tracking nonsense.
- */
- static void hv_msi_free(struct irq_domain *domain, struct msi_domain_info *info,
- unsigned int irq)
- {
- struct hv_pcibus_device *hbus;
- struct hv_pci_dev *hpdev;
- struct pci_dev *pdev;
- struct tran_int_desc *int_desc;
- struct irq_data *irq_data = irq_domain_get_irq_data(domain, irq);
- struct msi_desc *msi = irq_data_get_msi_desc(irq_data);
- pdev = msi_desc_to_pci_dev(msi);
- hbus = info->data;
- int_desc = irq_data_get_irq_chip_data(irq_data);
- if (!int_desc)
- return;
- irq_data->chip_data = NULL;
- hpdev = get_pcichild_wslot(hbus, devfn_to_wslot(pdev->devfn));
- if (!hpdev) {
- kfree(int_desc);
- return;
- }
- hv_int_desc_free(hpdev, int_desc);
- put_pcichild(hpdev);
- }
- static void hv_irq_mask(struct irq_data *data)
- {
- pci_msi_mask_irq(data);
- if (data->parent_data->chip->irq_mask)
- irq_chip_mask_parent(data);
- }
- static void hv_irq_unmask(struct irq_data *data)
- {
- hv_arch_irq_unmask(data);
- if (data->parent_data->chip->irq_unmask)
- irq_chip_unmask_parent(data);
- pci_msi_unmask_irq(data);
- }
- struct compose_comp_ctxt {
- struct hv_pci_compl comp_pkt;
- struct tran_int_desc int_desc;
- };
- static void hv_pci_compose_compl(void *context, struct pci_response *resp,
- int resp_packet_size)
- {
- struct compose_comp_ctxt *comp_pkt = context;
- struct pci_create_int_response *int_resp =
- (struct pci_create_int_response *)resp;
- if (resp_packet_size < sizeof(*int_resp)) {
- comp_pkt->comp_pkt.completion_status = -1;
- goto out;
- }
- comp_pkt->comp_pkt.completion_status = resp->status;
- comp_pkt->int_desc = int_resp->int_desc;
- out:
- complete(&comp_pkt->comp_pkt.host_event);
- }
- static u32 hv_compose_msi_req_v1(
- struct pci_create_interrupt *int_pkt,
- u32 slot, u8 vector, u16 vector_count)
- {
- int_pkt->message_type.type = PCI_CREATE_INTERRUPT_MESSAGE;
- int_pkt->wslot.slot = slot;
- int_pkt->int_desc.vector = vector;
- int_pkt->int_desc.vector_count = vector_count;
- int_pkt->int_desc.delivery_mode = DELIVERY_MODE;
- /*
- * Create MSI w/ dummy vCPU set, overwritten by subsequent retarget in
- * hv_irq_unmask().
- */
- int_pkt->int_desc.cpu_mask = CPU_AFFINITY_ALL;
- return sizeof(*int_pkt);
- }
- /*
- * The vCPU selected by hv_compose_multi_msi_req_get_cpu() and
- * hv_compose_msi_req_get_cpu() is a "dummy" vCPU because the final vCPU to be
- * interrupted is specified later in hv_irq_unmask() and communicated to Hyper-V
- * via the HVCALL_RETARGET_INTERRUPT hypercall. But the choice of dummy vCPU is
- * not irrelevant because Hyper-V chooses the physical CPU to handle the
- * interrupts based on the vCPU specified in message sent to the vPCI VSP in
- * hv_compose_msi_msg(). Hyper-V's choice of pCPU is not visible to the guest,
- * but assigning too many vPCI device interrupts to the same pCPU can cause a
- * performance bottleneck. So we spread out the dummy vCPUs to influence Hyper-V
- * to spread out the pCPUs that it selects.
- *
- * For the single-MSI and MSI-X cases, it's OK for hv_compose_msi_req_get_cpu()
- * to always return the same dummy vCPU, because a second call to
- * hv_compose_msi_msg() contains the "real" vCPU, causing Hyper-V to choose a
- * new pCPU for the interrupt. But for the multi-MSI case, the second call to
- * hv_compose_msi_msg() exits without sending a message to the vPCI VSP, so the
- * original dummy vCPU is used. This dummy vCPU must be round-robin'ed so that
- * the pCPUs are spread out. All interrupts for a multi-MSI device end up using
- * the same pCPU, even though the vCPUs will be spread out by later calls
- * to hv_irq_unmask(), but that is the best we can do now.
- *
- * With Hyper-V in Nov 2022, the HVCALL_RETARGET_INTERRUPT hypercall does *not*
- * cause Hyper-V to reselect the pCPU based on the specified vCPU. Such an
- * enhancement is planned for a future version. With that enhancement, the
- * dummy vCPU selection won't matter, and interrupts for the same multi-MSI
- * device will be spread across multiple pCPUs.
- */
- /*
- * Create MSI w/ dummy vCPU set targeting just one vCPU, overwritten
- * by subsequent retarget in hv_irq_unmask().
- */
- static int hv_compose_msi_req_get_cpu(const struct cpumask *affinity)
- {
- return cpumask_first_and(affinity, cpu_online_mask);
- }
- /*
- * Make sure the dummy vCPU values for multi-MSI don't all point to vCPU0.
- */
- static int hv_compose_multi_msi_req_get_cpu(void)
- {
- static DEFINE_SPINLOCK(multi_msi_cpu_lock);
- /* -1 means starting with CPU 0 */
- static int cpu_next = -1;
- unsigned long flags;
- int cpu;
- spin_lock_irqsave(&multi_msi_cpu_lock, flags);
- cpu_next = cpumask_next_wrap(cpu_next, cpu_online_mask, nr_cpu_ids,
- false);
- cpu = cpu_next;
- spin_unlock_irqrestore(&multi_msi_cpu_lock, flags);
- return cpu;
- }
- static u32 hv_compose_msi_req_v2(
- struct pci_create_interrupt2 *int_pkt, int cpu,
- u32 slot, u8 vector, u16 vector_count)
- {
- int_pkt->message_type.type = PCI_CREATE_INTERRUPT_MESSAGE2;
- int_pkt->wslot.slot = slot;
- int_pkt->int_desc.vector = vector;
- int_pkt->int_desc.vector_count = vector_count;
- int_pkt->int_desc.delivery_mode = DELIVERY_MODE;
- int_pkt->int_desc.processor_array[0] =
- hv_cpu_number_to_vp_number(cpu);
- int_pkt->int_desc.processor_count = 1;
- return sizeof(*int_pkt);
- }
- static u32 hv_compose_msi_req_v3(
- struct pci_create_interrupt3 *int_pkt, int cpu,
- u32 slot, u32 vector, u16 vector_count)
- {
- int_pkt->message_type.type = PCI_CREATE_INTERRUPT_MESSAGE3;
- int_pkt->wslot.slot = slot;
- int_pkt->int_desc.vector = vector;
- int_pkt->int_desc.reserved = 0;
- int_pkt->int_desc.vector_count = vector_count;
- int_pkt->int_desc.delivery_mode = DELIVERY_MODE;
- int_pkt->int_desc.processor_array[0] =
- hv_cpu_number_to_vp_number(cpu);
- int_pkt->int_desc.processor_count = 1;
- return sizeof(*int_pkt);
- }
- /**
- * hv_compose_msi_msg() - Supplies a valid MSI address/data
- * @data: Everything about this MSI
- * @msg: Buffer that is filled in by this function
- *
- * This function unpacks the IRQ looking for target CPU set, IDT
- * vector and mode and sends a message to the parent partition
- * asking for a mapping for that tuple in this partition. The
- * response supplies a data value and address to which that data
- * should be written to trigger that interrupt.
- */
- static void hv_compose_msi_msg(struct irq_data *data, struct msi_msg *msg)
- {
- struct hv_pcibus_device *hbus;
- struct vmbus_channel *channel;
- struct hv_pci_dev *hpdev;
- struct pci_bus *pbus;
- struct pci_dev *pdev;
- const struct cpumask *dest;
- struct compose_comp_ctxt comp;
- struct tran_int_desc *int_desc;
- struct msi_desc *msi_desc;
- /*
- * vector_count should be u16: see hv_msi_desc, hv_msi_desc2
- * and hv_msi_desc3. vector must be u32: see hv_msi_desc3.
- */
- u16 vector_count;
- u32 vector;
- struct {
- struct pci_packet pci_pkt;
- union {
- struct pci_create_interrupt v1;
- struct pci_create_interrupt2 v2;
- struct pci_create_interrupt3 v3;
- } int_pkts;
- } __packed ctxt;
- bool multi_msi;
- u64 trans_id;
- u32 size;
- int ret;
- int cpu;
- msi_desc = irq_data_get_msi_desc(data);
- multi_msi = !msi_desc->pci.msi_attrib.is_msix &&
- msi_desc->nvec_used > 1;
- /* Reuse the previous allocation */
- if (data->chip_data && multi_msi) {
- int_desc = data->chip_data;
- msg->address_hi = int_desc->address >> 32;
- msg->address_lo = int_desc->address & 0xffffffff;
- msg->data = int_desc->data;
- return;
- }
- pdev = msi_desc_to_pci_dev(msi_desc);
- dest = irq_data_get_effective_affinity_mask(data);
- pbus = pdev->bus;
- hbus = container_of(pbus->sysdata, struct hv_pcibus_device, sysdata);
- channel = hbus->hdev->channel;
- hpdev = get_pcichild_wslot(hbus, devfn_to_wslot(pdev->devfn));
- if (!hpdev)
- goto return_null_message;
- /* Free any previous message that might have already been composed. */
- if (data->chip_data && !multi_msi) {
- int_desc = data->chip_data;
- data->chip_data = NULL;
- hv_int_desc_free(hpdev, int_desc);
- }
- int_desc = kzalloc(sizeof(*int_desc), GFP_ATOMIC);
- if (!int_desc)
- goto drop_reference;
- if (multi_msi) {
- /*
- * If this is not the first MSI of Multi MSI, we already have
- * a mapping. Can exit early.
- */
- if (msi_desc->irq != data->irq) {
- data->chip_data = int_desc;
- int_desc->address = msi_desc->msg.address_lo |
- (u64)msi_desc->msg.address_hi << 32;
- int_desc->data = msi_desc->msg.data +
- (data->irq - msi_desc->irq);
- msg->address_hi = msi_desc->msg.address_hi;
- msg->address_lo = msi_desc->msg.address_lo;
- msg->data = int_desc->data;
- put_pcichild(hpdev);
- return;
- }
- /*
- * The vector we select here is a dummy value. The correct
- * value gets sent to the hypervisor in unmask(). This needs
- * to be aligned with the count, and also not zero. Multi-msi
- * is powers of 2 up to 32, so 32 will always work here.
- */
- vector = 32;
- vector_count = msi_desc->nvec_used;
- cpu = hv_compose_multi_msi_req_get_cpu();
- } else {
- vector = hv_msi_get_int_vector(data);
- vector_count = 1;
- cpu = hv_compose_msi_req_get_cpu(dest);
- }
- /*
- * hv_compose_msi_req_v1 and v2 are for x86 only, meaning 'vector'
- * can't exceed u8. Cast 'vector' down to u8 for v1/v2 explicitly
- * for better readability.
- */
- memset(&ctxt, 0, sizeof(ctxt));
- init_completion(&comp.comp_pkt.host_event);
- ctxt.pci_pkt.completion_func = hv_pci_compose_compl;
- ctxt.pci_pkt.compl_ctxt = ∁
- switch (hbus->protocol_version) {
- case PCI_PROTOCOL_VERSION_1_1:
- size = hv_compose_msi_req_v1(&ctxt.int_pkts.v1,
- hpdev->desc.win_slot.slot,
- (u8)vector,
- vector_count);
- break;
- case PCI_PROTOCOL_VERSION_1_2:
- case PCI_PROTOCOL_VERSION_1_3:
- size = hv_compose_msi_req_v2(&ctxt.int_pkts.v2,
- cpu,
- hpdev->desc.win_slot.slot,
- (u8)vector,
- vector_count);
- break;
- case PCI_PROTOCOL_VERSION_1_4:
- size = hv_compose_msi_req_v3(&ctxt.int_pkts.v3,
- cpu,
- hpdev->desc.win_slot.slot,
- vector,
- vector_count);
- break;
- default:
- /* As we only negotiate protocol versions known to this driver,
- * this path should never hit. However, this is it not a hot
- * path so we print a message to aid future updates.
- */
- dev_err(&hbus->hdev->device,
- "Unexpected vPCI protocol, update driver.");
- goto free_int_desc;
- }
- ret = vmbus_sendpacket_getid(hpdev->hbus->hdev->channel, &ctxt.int_pkts,
- size, (unsigned long)&ctxt.pci_pkt,
- &trans_id, VM_PKT_DATA_INBAND,
- VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
- if (ret) {
- dev_err(&hbus->hdev->device,
- "Sending request for interrupt failed: 0x%x",
- comp.comp_pkt.completion_status);
- goto free_int_desc;
- }
- /*
- * Prevents hv_pci_onchannelcallback() from running concurrently
- * in the tasklet.
- */
- tasklet_disable_in_atomic(&channel->callback_event);
- /*
- * Since this function is called with IRQ locks held, can't
- * do normal wait for completion; instead poll.
- */
- while (!try_wait_for_completion(&comp.comp_pkt.host_event)) {
- unsigned long flags;
- /* 0xFFFF means an invalid PCI VENDOR ID. */
- if (hv_pcifront_get_vendor_id(hpdev) == 0xFFFF) {
- dev_err_once(&hbus->hdev->device,
- "the device has gone\n");
- goto enable_tasklet;
- }
- /*
- * Make sure that the ring buffer data structure doesn't get
- * freed while we dereference the ring buffer pointer. Test
- * for the channel's onchannel_callback being NULL within a
- * sched_lock critical section. See also the inline comments
- * in vmbus_reset_channel_cb().
- */
- spin_lock_irqsave(&channel->sched_lock, flags);
- if (unlikely(channel->onchannel_callback == NULL)) {
- spin_unlock_irqrestore(&channel->sched_lock, flags);
- goto enable_tasklet;
- }
- hv_pci_onchannelcallback(hbus);
- spin_unlock_irqrestore(&channel->sched_lock, flags);
- udelay(100);
- }
- tasklet_enable(&channel->callback_event);
- if (comp.comp_pkt.completion_status < 0) {
- dev_err(&hbus->hdev->device,
- "Request for interrupt failed: 0x%x",
- comp.comp_pkt.completion_status);
- goto free_int_desc;
- }
- /*
- * Record the assignment so that this can be unwound later. Using
- * irq_set_chip_data() here would be appropriate, but the lock it takes
- * is already held.
- */
- *int_desc = comp.int_desc;
- data->chip_data = int_desc;
- /* Pass up the result. */
- msg->address_hi = comp.int_desc.address >> 32;
- msg->address_lo = comp.int_desc.address & 0xffffffff;
- msg->data = comp.int_desc.data;
- put_pcichild(hpdev);
- return;
- enable_tasklet:
- tasklet_enable(&channel->callback_event);
- /*
- * The completion packet on the stack becomes invalid after 'return';
- * remove the ID from the VMbus requestor if the identifier is still
- * mapped to/associated with the packet. (The identifier could have
- * been 're-used', i.e., already removed and (re-)mapped.)
- *
- * Cf. hv_pci_onchannelcallback().
- */
- vmbus_request_addr_match(channel, trans_id, (unsigned long)&ctxt.pci_pkt);
- free_int_desc:
- kfree(int_desc);
- drop_reference:
- put_pcichild(hpdev);
- return_null_message:
- msg->address_hi = 0;
- msg->address_lo = 0;
- msg->data = 0;
- }
- /* HW Interrupt Chip Descriptor */
- static struct irq_chip hv_msi_irq_chip = {
- .name = "Hyper-V PCIe MSI",
- .irq_compose_msi_msg = hv_compose_msi_msg,
- .irq_set_affinity = irq_chip_set_affinity_parent,
- #ifdef CONFIG_X86
- .irq_ack = irq_chip_ack_parent,
- #elif defined(CONFIG_ARM64)
- .irq_eoi = irq_chip_eoi_parent,
- #endif
- .irq_mask = hv_irq_mask,
- .irq_unmask = hv_irq_unmask,
- };
- static struct msi_domain_ops hv_msi_ops = {
- .msi_prepare = hv_msi_prepare,
- .msi_free = hv_msi_free,
- };
- /**
- * hv_pcie_init_irq_domain() - Initialize IRQ domain
- * @hbus: The root PCI bus
- *
- * This function creates an IRQ domain which will be used for
- * interrupts from devices that have been passed through. These
- * devices only support MSI and MSI-X, not line-based interrupts
- * or simulations of line-based interrupts through PCIe's
- * fabric-layer messages. Because interrupts are remapped, we
- * can support multi-message MSI here.
- *
- * Return: '0' on success and error value on failure
- */
- static int hv_pcie_init_irq_domain(struct hv_pcibus_device *hbus)
- {
- hbus->msi_info.chip = &hv_msi_irq_chip;
- hbus->msi_info.ops = &hv_msi_ops;
- hbus->msi_info.flags = (MSI_FLAG_USE_DEF_DOM_OPS |
- MSI_FLAG_USE_DEF_CHIP_OPS | MSI_FLAG_MULTI_PCI_MSI |
- MSI_FLAG_PCI_MSIX);
- hbus->msi_info.handler = FLOW_HANDLER;
- hbus->msi_info.handler_name = FLOW_NAME;
- hbus->msi_info.data = hbus;
- hbus->irq_domain = pci_msi_create_irq_domain(hbus->fwnode,
- &hbus->msi_info,
- hv_pci_get_root_domain());
- if (!hbus->irq_domain) {
- dev_err(&hbus->hdev->device,
- "Failed to build an MSI IRQ domain\n");
- return -ENODEV;
- }
- dev_set_msi_domain(&hbus->bridge->dev, hbus->irq_domain);
- return 0;
- }
- /**
- * get_bar_size() - Get the address space consumed by a BAR
- * @bar_val: Value that a BAR returned after -1 was written
- * to it.
- *
- * This function returns the size of the BAR, rounded up to 1
- * page. It has to be rounded up because the hypervisor's page
- * table entry that maps the BAR into the VM can't specify an
- * offset within a page. The invariant is that the hypervisor
- * must place any BARs of smaller than page length at the
- * beginning of a page.
- *
- * Return: Size in bytes of the consumed MMIO space.
- */
- static u64 get_bar_size(u64 bar_val)
- {
- return round_up((1 + ~(bar_val & PCI_BASE_ADDRESS_MEM_MASK)),
- PAGE_SIZE);
- }
- /**
- * survey_child_resources() - Total all MMIO requirements
- * @hbus: Root PCI bus, as understood by this driver
- */
- static void survey_child_resources(struct hv_pcibus_device *hbus)
- {
- struct hv_pci_dev *hpdev;
- resource_size_t bar_size = 0;
- unsigned long flags;
- struct completion *event;
- u64 bar_val;
- int i;
- /* If nobody is waiting on the answer, don't compute it. */
- event = xchg(&hbus->survey_event, NULL);
- if (!event)
- return;
- /* If the answer has already been computed, go with it. */
- if (hbus->low_mmio_space || hbus->high_mmio_space) {
- complete(event);
- return;
- }
- spin_lock_irqsave(&hbus->device_list_lock, flags);
- /*
- * Due to an interesting quirk of the PCI spec, all memory regions
- * for a child device are a power of 2 in size and aligned in memory,
- * so it's sufficient to just add them up without tracking alignment.
- */
- list_for_each_entry(hpdev, &hbus->children, list_entry) {
- for (i = 0; i < PCI_STD_NUM_BARS; i++) {
- if (hpdev->probed_bar[i] & PCI_BASE_ADDRESS_SPACE_IO)
- dev_err(&hbus->hdev->device,
- "There's an I/O BAR in this list!\n");
- if (hpdev->probed_bar[i] != 0) {
- /*
- * A probed BAR has all the upper bits set that
- * can be changed.
- */
- bar_val = hpdev->probed_bar[i];
- if (bar_val & PCI_BASE_ADDRESS_MEM_TYPE_64)
- bar_val |=
- ((u64)hpdev->probed_bar[++i] << 32);
- else
- bar_val |= 0xffffffff00000000ULL;
- bar_size = get_bar_size(bar_val);
- if (bar_val & PCI_BASE_ADDRESS_MEM_TYPE_64)
- hbus->high_mmio_space += bar_size;
- else
- hbus->low_mmio_space += bar_size;
- }
- }
- }
- spin_unlock_irqrestore(&hbus->device_list_lock, flags);
- complete(event);
- }
- /**
- * prepopulate_bars() - Fill in BARs with defaults
- * @hbus: Root PCI bus, as understood by this driver
- *
- * The core PCI driver code seems much, much happier if the BARs
- * for a device have values upon first scan. So fill them in.
- * The algorithm below works down from large sizes to small,
- * attempting to pack the assignments optimally. The assumption,
- * enforced in other parts of the code, is that the beginning of
- * the memory-mapped I/O space will be aligned on the largest
- * BAR size.
- */
- static void prepopulate_bars(struct hv_pcibus_device *hbus)
- {
- resource_size_t high_size = 0;
- resource_size_t low_size = 0;
- resource_size_t high_base = 0;
- resource_size_t low_base = 0;
- resource_size_t bar_size;
- struct hv_pci_dev *hpdev;
- unsigned long flags;
- u64 bar_val;
- u32 command;
- bool high;
- int i;
- if (hbus->low_mmio_space) {
- low_size = 1ULL << (63 - __builtin_clzll(hbus->low_mmio_space));
- low_base = hbus->low_mmio_res->start;
- }
- if (hbus->high_mmio_space) {
- high_size = 1ULL <<
- (63 - __builtin_clzll(hbus->high_mmio_space));
- high_base = hbus->high_mmio_res->start;
- }
- spin_lock_irqsave(&hbus->device_list_lock, flags);
- /*
- * Clear the memory enable bit, in case it's already set. This occurs
- * in the suspend path of hibernation, where the device is suspended,
- * resumed and suspended again: see hibernation_snapshot() and
- * hibernation_platform_enter().
- *
- * If the memory enable bit is already set, Hyper-V silently ignores
- * the below BAR updates, and the related PCI device driver can not
- * work, because reading from the device register(s) always returns
- * 0xFFFFFFFF (PCI_ERROR_RESPONSE).
- */
- list_for_each_entry(hpdev, &hbus->children, list_entry) {
- _hv_pcifront_read_config(hpdev, PCI_COMMAND, 2, &command);
- command &= ~PCI_COMMAND_MEMORY;
- _hv_pcifront_write_config(hpdev, PCI_COMMAND, 2, command);
- }
- /* Pick addresses for the BARs. */
- do {
- list_for_each_entry(hpdev, &hbus->children, list_entry) {
- for (i = 0; i < PCI_STD_NUM_BARS; i++) {
- bar_val = hpdev->probed_bar[i];
- if (bar_val == 0)
- continue;
- high = bar_val & PCI_BASE_ADDRESS_MEM_TYPE_64;
- if (high) {
- bar_val |=
- ((u64)hpdev->probed_bar[i + 1]
- << 32);
- } else {
- bar_val |= 0xffffffffULL << 32;
- }
- bar_size = get_bar_size(bar_val);
- if (high) {
- if (high_size != bar_size) {
- i++;
- continue;
- }
- _hv_pcifront_write_config(hpdev,
- PCI_BASE_ADDRESS_0 + (4 * i),
- 4,
- (u32)(high_base & 0xffffff00));
- i++;
- _hv_pcifront_write_config(hpdev,
- PCI_BASE_ADDRESS_0 + (4 * i),
- 4, (u32)(high_base >> 32));
- high_base += bar_size;
- } else {
- if (low_size != bar_size)
- continue;
- _hv_pcifront_write_config(hpdev,
- PCI_BASE_ADDRESS_0 + (4 * i),
- 4,
- (u32)(low_base & 0xffffff00));
- low_base += bar_size;
- }
- }
- if (high_size <= 1 && low_size <= 1) {
- /*
- * No need to set the PCI_COMMAND_MEMORY bit as
- * the core PCI driver doesn't require the bit
- * to be pre-set. Actually here we intentionally
- * keep the bit off so that the PCI BAR probing
- * in the core PCI driver doesn't cause Hyper-V
- * to unnecessarily unmap/map the virtual BARs
- * from/to the physical BARs multiple times.
- * This reduces the VM boot time significantly
- * if the BAR sizes are huge.
- */
- break;
- }
- }
- high_size >>= 1;
- low_size >>= 1;
- } while (high_size || low_size);
- spin_unlock_irqrestore(&hbus->device_list_lock, flags);
- }
- /*
- * Assign entries in sysfs pci slot directory.
- *
- * Note that this function does not need to lock the children list
- * because it is called from pci_devices_present_work which
- * is serialized with hv_eject_device_work because they are on the
- * same ordered workqueue. Therefore hbus->children list will not change
- * even when pci_create_slot sleeps.
- */
- static void hv_pci_assign_slots(struct hv_pcibus_device *hbus)
- {
- struct hv_pci_dev *hpdev;
- char name[SLOT_NAME_SIZE];
- int slot_nr;
- list_for_each_entry(hpdev, &hbus->children, list_entry) {
- if (hpdev->pci_slot)
- continue;
- slot_nr = PCI_SLOT(wslot_to_devfn(hpdev->desc.win_slot.slot));
- snprintf(name, SLOT_NAME_SIZE, "%u", hpdev->desc.ser);
- hpdev->pci_slot = pci_create_slot(hbus->bridge->bus, slot_nr,
- name, NULL);
- if (IS_ERR(hpdev->pci_slot)) {
- pr_warn("pci_create slot %s failed\n", name);
- hpdev->pci_slot = NULL;
- }
- }
- }
- /*
- * Remove entries in sysfs pci slot directory.
- */
- static void hv_pci_remove_slots(struct hv_pcibus_device *hbus)
- {
- struct hv_pci_dev *hpdev;
- list_for_each_entry(hpdev, &hbus->children, list_entry) {
- if (!hpdev->pci_slot)
- continue;
- pci_destroy_slot(hpdev->pci_slot);
- hpdev->pci_slot = NULL;
- }
- }
- /*
- * Set NUMA node for the devices on the bus
- */
- static void hv_pci_assign_numa_node(struct hv_pcibus_device *hbus)
- {
- struct pci_dev *dev;
- struct pci_bus *bus = hbus->bridge->bus;
- struct hv_pci_dev *hv_dev;
- list_for_each_entry(dev, &bus->devices, bus_list) {
- hv_dev = get_pcichild_wslot(hbus, devfn_to_wslot(dev->devfn));
- if (!hv_dev)
- continue;
- if (hv_dev->desc.flags & HV_PCI_DEVICE_FLAG_NUMA_AFFINITY &&
- hv_dev->desc.virtual_numa_node < num_possible_nodes())
- /*
- * The kernel may boot with some NUMA nodes offline
- * (e.g. in a KDUMP kernel) or with NUMA disabled via
- * "numa=off". In those cases, adjust the host provided
- * NUMA node to a valid NUMA node used by the kernel.
- */
- set_dev_node(&dev->dev,
- numa_map_to_online_node(
- hv_dev->desc.virtual_numa_node));
- put_pcichild(hv_dev);
- }
- }
- /**
- * create_root_hv_pci_bus() - Expose a new root PCI bus
- * @hbus: Root PCI bus, as understood by this driver
- *
- * Return: 0 on success, -errno on failure
- */
- static int create_root_hv_pci_bus(struct hv_pcibus_device *hbus)
- {
- int error;
- struct pci_host_bridge *bridge = hbus->bridge;
- bridge->dev.parent = &hbus->hdev->device;
- bridge->sysdata = &hbus->sysdata;
- bridge->ops = &hv_pcifront_ops;
- error = pci_scan_root_bus_bridge(bridge);
- if (error)
- return error;
- pci_lock_rescan_remove();
- hv_pci_assign_numa_node(hbus);
- pci_bus_assign_resources(bridge->bus);
- hv_pci_assign_slots(hbus);
- pci_bus_add_devices(bridge->bus);
- pci_unlock_rescan_remove();
- hbus->state = hv_pcibus_installed;
- return 0;
- }
- struct q_res_req_compl {
- struct completion host_event;
- struct hv_pci_dev *hpdev;
- };
- /**
- * q_resource_requirements() - Query Resource Requirements
- * @context: The completion context.
- * @resp: The response that came from the host.
- * @resp_packet_size: The size in bytes of resp.
- *
- * This function is invoked on completion of a Query Resource
- * Requirements packet.
- */
- static void q_resource_requirements(void *context, struct pci_response *resp,
- int resp_packet_size)
- {
- struct q_res_req_compl *completion = context;
- struct pci_q_res_req_response *q_res_req =
- (struct pci_q_res_req_response *)resp;
- s32 status;
- int i;
- status = (resp_packet_size < sizeof(*q_res_req)) ? -1 : resp->status;
- if (status < 0) {
- dev_err(&completion->hpdev->hbus->hdev->device,
- "query resource requirements failed: %x\n",
- status);
- } else {
- for (i = 0; i < PCI_STD_NUM_BARS; i++) {
- completion->hpdev->probed_bar[i] =
- q_res_req->probed_bar[i];
- }
- }
- complete(&completion->host_event);
- }
- /**
- * new_pcichild_device() - Create a new child device
- * @hbus: The internal struct tracking this root PCI bus.
- * @desc: The information supplied so far from the host
- * about the device.
- *
- * This function creates the tracking structure for a new child
- * device and kicks off the process of figuring out what it is.
- *
- * Return: Pointer to the new tracking struct
- */
- static struct hv_pci_dev *new_pcichild_device(struct hv_pcibus_device *hbus,
- struct hv_pcidev_description *desc)
- {
- struct hv_pci_dev *hpdev;
- struct pci_child_message *res_req;
- struct q_res_req_compl comp_pkt;
- struct {
- struct pci_packet init_packet;
- u8 buffer[sizeof(struct pci_child_message)];
- } pkt;
- unsigned long flags;
- int ret;
- hpdev = kzalloc(sizeof(*hpdev), GFP_KERNEL);
- if (!hpdev)
- return NULL;
- hpdev->hbus = hbus;
- memset(&pkt, 0, sizeof(pkt));
- init_completion(&comp_pkt.host_event);
- comp_pkt.hpdev = hpdev;
- pkt.init_packet.compl_ctxt = &comp_pkt;
- pkt.init_packet.completion_func = q_resource_requirements;
- res_req = (struct pci_child_message *)&pkt.init_packet.message;
- res_req->message_type.type = PCI_QUERY_RESOURCE_REQUIREMENTS;
- res_req->wslot.slot = desc->win_slot.slot;
- ret = vmbus_sendpacket(hbus->hdev->channel, res_req,
- sizeof(struct pci_child_message),
- (unsigned long)&pkt.init_packet,
- VM_PKT_DATA_INBAND,
- VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
- if (ret)
- goto error;
- if (wait_for_response(hbus->hdev, &comp_pkt.host_event))
- goto error;
- hpdev->desc = *desc;
- refcount_set(&hpdev->refs, 1);
- get_pcichild(hpdev);
- spin_lock_irqsave(&hbus->device_list_lock, flags);
- list_add_tail(&hpdev->list_entry, &hbus->children);
- spin_unlock_irqrestore(&hbus->device_list_lock, flags);
- return hpdev;
- error:
- kfree(hpdev);
- return NULL;
- }
- /**
- * get_pcichild_wslot() - Find device from slot
- * @hbus: Root PCI bus, as understood by this driver
- * @wslot: Location on the bus
- *
- * This function looks up a PCI device and returns the internal
- * representation of it. It acquires a reference on it, so that
- * the device won't be deleted while somebody is using it. The
- * caller is responsible for calling put_pcichild() to release
- * this reference.
- *
- * Return: Internal representation of a PCI device
- */
- static struct hv_pci_dev *get_pcichild_wslot(struct hv_pcibus_device *hbus,
- u32 wslot)
- {
- unsigned long flags;
- struct hv_pci_dev *iter, *hpdev = NULL;
- spin_lock_irqsave(&hbus->device_list_lock, flags);
- list_for_each_entry(iter, &hbus->children, list_entry) {
- if (iter->desc.win_slot.slot == wslot) {
- hpdev = iter;
- get_pcichild(hpdev);
- break;
- }
- }
- spin_unlock_irqrestore(&hbus->device_list_lock, flags);
- return hpdev;
- }
- /**
- * pci_devices_present_work() - Handle new list of child devices
- * @work: Work struct embedded in struct hv_dr_work
- *
- * "Bus Relations" is the Windows term for "children of this
- * bus." The terminology is preserved here for people trying to
- * debug the interaction between Hyper-V and Linux. This
- * function is called when the parent partition reports a list
- * of functions that should be observed under this PCI Express
- * port (bus).
- *
- * This function updates the list, and must tolerate being
- * called multiple times with the same information. The typical
- * number of child devices is one, with very atypical cases
- * involving three or four, so the algorithms used here can be
- * simple and inefficient.
- *
- * It must also treat the omission of a previously observed device as
- * notification that the device no longer exists.
- *
- * Note that this function is serialized with hv_eject_device_work(),
- * because both are pushed to the ordered workqueue hbus->wq.
- */
- static void pci_devices_present_work(struct work_struct *work)
- {
- u32 child_no;
- bool found;
- struct hv_pcidev_description *new_desc;
- struct hv_pci_dev *hpdev;
- struct hv_pcibus_device *hbus;
- struct list_head removed;
- struct hv_dr_work *dr_wrk;
- struct hv_dr_state *dr = NULL;
- unsigned long flags;
- dr_wrk = container_of(work, struct hv_dr_work, wrk);
- hbus = dr_wrk->bus;
- kfree(dr_wrk);
- INIT_LIST_HEAD(&removed);
- /* Pull this off the queue and process it if it was the last one. */
- spin_lock_irqsave(&hbus->device_list_lock, flags);
- while (!list_empty(&hbus->dr_list)) {
- dr = list_first_entry(&hbus->dr_list, struct hv_dr_state,
- list_entry);
- list_del(&dr->list_entry);
- /* Throw this away if the list still has stuff in it. */
- if (!list_empty(&hbus->dr_list)) {
- kfree(dr);
- continue;
- }
- }
- spin_unlock_irqrestore(&hbus->device_list_lock, flags);
- if (!dr)
- return;
- mutex_lock(&hbus->state_lock);
- /* First, mark all existing children as reported missing. */
- spin_lock_irqsave(&hbus->device_list_lock, flags);
- list_for_each_entry(hpdev, &hbus->children, list_entry) {
- hpdev->reported_missing = true;
- }
- spin_unlock_irqrestore(&hbus->device_list_lock, flags);
- /* Next, add back any reported devices. */
- for (child_no = 0; child_no < dr->device_count; child_no++) {
- found = false;
- new_desc = &dr->func[child_no];
- spin_lock_irqsave(&hbus->device_list_lock, flags);
- list_for_each_entry(hpdev, &hbus->children, list_entry) {
- if ((hpdev->desc.win_slot.slot == new_desc->win_slot.slot) &&
- (hpdev->desc.v_id == new_desc->v_id) &&
- (hpdev->desc.d_id == new_desc->d_id) &&
- (hpdev->desc.ser == new_desc->ser)) {
- hpdev->reported_missing = false;
- found = true;
- }
- }
- spin_unlock_irqrestore(&hbus->device_list_lock, flags);
- if (!found) {
- hpdev = new_pcichild_device(hbus, new_desc);
- if (!hpdev)
- dev_err(&hbus->hdev->device,
- "couldn't record a child device.\n");
- }
- }
- /* Move missing children to a list on the stack. */
- spin_lock_irqsave(&hbus->device_list_lock, flags);
- do {
- found = false;
- list_for_each_entry(hpdev, &hbus->children, list_entry) {
- if (hpdev->reported_missing) {
- found = true;
- put_pcichild(hpdev);
- list_move_tail(&hpdev->list_entry, &removed);
- break;
- }
- }
- } while (found);
- spin_unlock_irqrestore(&hbus->device_list_lock, flags);
- /* Delete everything that should no longer exist. */
- while (!list_empty(&removed)) {
- hpdev = list_first_entry(&removed, struct hv_pci_dev,
- list_entry);
- list_del(&hpdev->list_entry);
- if (hpdev->pci_slot)
- pci_destroy_slot(hpdev->pci_slot);
- put_pcichild(hpdev);
- }
- switch (hbus->state) {
- case hv_pcibus_installed:
- /*
- * Tell the core to rescan bus
- * because there may have been changes.
- */
- pci_lock_rescan_remove();
- pci_scan_child_bus(hbus->bridge->bus);
- hv_pci_assign_numa_node(hbus);
- hv_pci_assign_slots(hbus);
- pci_unlock_rescan_remove();
- break;
- case hv_pcibus_init:
- case hv_pcibus_probed:
- survey_child_resources(hbus);
- break;
- default:
- break;
- }
- mutex_unlock(&hbus->state_lock);
- kfree(dr);
- }
- /**
- * hv_pci_start_relations_work() - Queue work to start device discovery
- * @hbus: Root PCI bus, as understood by this driver
- * @dr: The list of children returned from host
- *
- * Return: 0 on success, -errno on failure
- */
- static int hv_pci_start_relations_work(struct hv_pcibus_device *hbus,
- struct hv_dr_state *dr)
- {
- struct hv_dr_work *dr_wrk;
- unsigned long flags;
- bool pending_dr;
- if (hbus->state == hv_pcibus_removing) {
- dev_info(&hbus->hdev->device,
- "PCI VMBus BUS_RELATIONS: ignored\n");
- return -ENOENT;
- }
- dr_wrk = kzalloc(sizeof(*dr_wrk), GFP_NOWAIT);
- if (!dr_wrk)
- return -ENOMEM;
- INIT_WORK(&dr_wrk->wrk, pci_devices_present_work);
- dr_wrk->bus = hbus;
- spin_lock_irqsave(&hbus->device_list_lock, flags);
- /*
- * If pending_dr is true, we have already queued a work,
- * which will see the new dr. Otherwise, we need to
- * queue a new work.
- */
- pending_dr = !list_empty(&hbus->dr_list);
- list_add_tail(&dr->list_entry, &hbus->dr_list);
- spin_unlock_irqrestore(&hbus->device_list_lock, flags);
- if (pending_dr)
- kfree(dr_wrk);
- else
- queue_work(hbus->wq, &dr_wrk->wrk);
- return 0;
- }
- /**
- * hv_pci_devices_present() - Handle list of new children
- * @hbus: Root PCI bus, as understood by this driver
- * @relations: Packet from host listing children
- *
- * Process a new list of devices on the bus. The list of devices is
- * discovered by VSP and sent to us via VSP message PCI_BUS_RELATIONS,
- * whenever a new list of devices for this bus appears.
- */
- static void hv_pci_devices_present(struct hv_pcibus_device *hbus,
- struct pci_bus_relations *relations)
- {
- struct hv_dr_state *dr;
- int i;
- dr = kzalloc(struct_size(dr, func, relations->device_count),
- GFP_NOWAIT);
- if (!dr)
- return;
- dr->device_count = relations->device_count;
- for (i = 0; i < dr->device_count; i++) {
- dr->func[i].v_id = relations->func[i].v_id;
- dr->func[i].d_id = relations->func[i].d_id;
- dr->func[i].rev = relations->func[i].rev;
- dr->func[i].prog_intf = relations->func[i].prog_intf;
- dr->func[i].subclass = relations->func[i].subclass;
- dr->func[i].base_class = relations->func[i].base_class;
- dr->func[i].subsystem_id = relations->func[i].subsystem_id;
- dr->func[i].win_slot = relations->func[i].win_slot;
- dr->func[i].ser = relations->func[i].ser;
- }
- if (hv_pci_start_relations_work(hbus, dr))
- kfree(dr);
- }
- /**
- * hv_pci_devices_present2() - Handle list of new children
- * @hbus: Root PCI bus, as understood by this driver
- * @relations: Packet from host listing children
- *
- * This function is the v2 version of hv_pci_devices_present()
- */
- static void hv_pci_devices_present2(struct hv_pcibus_device *hbus,
- struct pci_bus_relations2 *relations)
- {
- struct hv_dr_state *dr;
- int i;
- dr = kzalloc(struct_size(dr, func, relations->device_count),
- GFP_NOWAIT);
- if (!dr)
- return;
- dr->device_count = relations->device_count;
- for (i = 0; i < dr->device_count; i++) {
- dr->func[i].v_id = relations->func[i].v_id;
- dr->func[i].d_id = relations->func[i].d_id;
- dr->func[i].rev = relations->func[i].rev;
- dr->func[i].prog_intf = relations->func[i].prog_intf;
- dr->func[i].subclass = relations->func[i].subclass;
- dr->func[i].base_class = relations->func[i].base_class;
- dr->func[i].subsystem_id = relations->func[i].subsystem_id;
- dr->func[i].win_slot = relations->func[i].win_slot;
- dr->func[i].ser = relations->func[i].ser;
- dr->func[i].flags = relations->func[i].flags;
- dr->func[i].virtual_numa_node =
- relations->func[i].virtual_numa_node;
- }
- if (hv_pci_start_relations_work(hbus, dr))
- kfree(dr);
- }
- /**
- * hv_eject_device_work() - Asynchronously handles ejection
- * @work: Work struct embedded in internal device struct
- *
- * This function handles ejecting a device. Windows will
- * attempt to gracefully eject a device, waiting 60 seconds to
- * hear back from the guest OS that this completed successfully.
- * If this timer expires, the device will be forcibly removed.
- */
- static void hv_eject_device_work(struct work_struct *work)
- {
- struct pci_eject_response *ejct_pkt;
- struct hv_pcibus_device *hbus;
- struct hv_pci_dev *hpdev;
- struct pci_dev *pdev;
- unsigned long flags;
- int wslot;
- struct {
- struct pci_packet pkt;
- u8 buffer[sizeof(struct pci_eject_response)];
- } ctxt;
- hpdev = container_of(work, struct hv_pci_dev, wrk);
- hbus = hpdev->hbus;
- mutex_lock(&hbus->state_lock);
- /*
- * Ejection can come before or after the PCI bus has been set up, so
- * attempt to find it and tear down the bus state, if it exists. This
- * must be done without constructs like pci_domain_nr(hbus->bridge->bus)
- * because hbus->bridge->bus may not exist yet.
- */
- wslot = wslot_to_devfn(hpdev->desc.win_slot.slot);
- pdev = pci_get_domain_bus_and_slot(hbus->bridge->domain_nr, 0, wslot);
- if (pdev) {
- pci_lock_rescan_remove();
- pci_stop_and_remove_bus_device(pdev);
- pci_dev_put(pdev);
- pci_unlock_rescan_remove();
- }
- spin_lock_irqsave(&hbus->device_list_lock, flags);
- list_del(&hpdev->list_entry);
- spin_unlock_irqrestore(&hbus->device_list_lock, flags);
- if (hpdev->pci_slot)
- pci_destroy_slot(hpdev->pci_slot);
- memset(&ctxt, 0, sizeof(ctxt));
- ejct_pkt = (struct pci_eject_response *)&ctxt.pkt.message;
- ejct_pkt->message_type.type = PCI_EJECTION_COMPLETE;
- ejct_pkt->wslot.slot = hpdev->desc.win_slot.slot;
- vmbus_sendpacket(hbus->hdev->channel, ejct_pkt,
- sizeof(*ejct_pkt), 0,
- VM_PKT_DATA_INBAND, 0);
- /* For the get_pcichild() in hv_pci_eject_device() */
- put_pcichild(hpdev);
- /* For the two refs got in new_pcichild_device() */
- put_pcichild(hpdev);
- put_pcichild(hpdev);
- /* hpdev has been freed. Do not use it any more. */
- mutex_unlock(&hbus->state_lock);
- }
- /**
- * hv_pci_eject_device() - Handles device ejection
- * @hpdev: Internal device tracking struct
- *
- * This function is invoked when an ejection packet arrives. It
- * just schedules work so that we don't re-enter the packet
- * delivery code handling the ejection.
- */
- static void hv_pci_eject_device(struct hv_pci_dev *hpdev)
- {
- struct hv_pcibus_device *hbus = hpdev->hbus;
- struct hv_device *hdev = hbus->hdev;
- if (hbus->state == hv_pcibus_removing) {
- dev_info(&hdev->device, "PCI VMBus EJECT: ignored\n");
- return;
- }
- get_pcichild(hpdev);
- INIT_WORK(&hpdev->wrk, hv_eject_device_work);
- queue_work(hbus->wq, &hpdev->wrk);
- }
- /**
- * hv_pci_onchannelcallback() - Handles incoming packets
- * @context: Internal bus tracking struct
- *
- * This function is invoked whenever the host sends a packet to
- * this channel (which is private to this root PCI bus).
- */
- static void hv_pci_onchannelcallback(void *context)
- {
- const int packet_size = 0x100;
- int ret;
- struct hv_pcibus_device *hbus = context;
- struct vmbus_channel *chan = hbus->hdev->channel;
- u32 bytes_recvd;
- u64 req_id, req_addr;
- struct vmpacket_descriptor *desc;
- unsigned char *buffer;
- int bufferlen = packet_size;
- struct pci_packet *comp_packet;
- struct pci_response *response;
- struct pci_incoming_message *new_message;
- struct pci_bus_relations *bus_rel;
- struct pci_bus_relations2 *bus_rel2;
- struct pci_dev_inval_block *inval;
- struct pci_dev_incoming *dev_message;
- struct hv_pci_dev *hpdev;
- unsigned long flags;
- buffer = kmalloc(bufferlen, GFP_ATOMIC);
- if (!buffer)
- return;
- while (1) {
- ret = vmbus_recvpacket_raw(chan, buffer, bufferlen,
- &bytes_recvd, &req_id);
- if (ret == -ENOBUFS) {
- kfree(buffer);
- /* Handle large packet */
- bufferlen = bytes_recvd;
- buffer = kmalloc(bytes_recvd, GFP_ATOMIC);
- if (!buffer)
- return;
- continue;
- }
- /* Zero length indicates there are no more packets. */
- if (ret || !bytes_recvd)
- break;
- /*
- * All incoming packets must be at least as large as a
- * response.
- */
- if (bytes_recvd <= sizeof(struct pci_response))
- continue;
- desc = (struct vmpacket_descriptor *)buffer;
- switch (desc->type) {
- case VM_PKT_COMP:
- lock_requestor(chan, flags);
- req_addr = __vmbus_request_addr_match(chan, req_id,
- VMBUS_RQST_ADDR_ANY);
- if (req_addr == VMBUS_RQST_ERROR) {
- unlock_requestor(chan, flags);
- dev_err(&hbus->hdev->device,
- "Invalid transaction ID %llx\n",
- req_id);
- break;
- }
- comp_packet = (struct pci_packet *)req_addr;
- response = (struct pci_response *)buffer;
- /*
- * Call ->completion_func() within the critical section to make
- * sure that the packet pointer is still valid during the call:
- * here 'valid' means that there's a task still waiting for the
- * completion, and that the packet data is still on the waiting
- * task's stack. Cf. hv_compose_msi_msg().
- */
- comp_packet->completion_func(comp_packet->compl_ctxt,
- response,
- bytes_recvd);
- unlock_requestor(chan, flags);
- break;
- case VM_PKT_DATA_INBAND:
- new_message = (struct pci_incoming_message *)buffer;
- switch (new_message->message_type.type) {
- case PCI_BUS_RELATIONS:
- bus_rel = (struct pci_bus_relations *)buffer;
- if (bytes_recvd < sizeof(*bus_rel) ||
- bytes_recvd <
- struct_size(bus_rel, func,
- bus_rel->device_count)) {
- dev_err(&hbus->hdev->device,
- "bus relations too small\n");
- break;
- }
- hv_pci_devices_present(hbus, bus_rel);
- break;
- case PCI_BUS_RELATIONS2:
- bus_rel2 = (struct pci_bus_relations2 *)buffer;
- if (bytes_recvd < sizeof(*bus_rel2) ||
- bytes_recvd <
- struct_size(bus_rel2, func,
- bus_rel2->device_count)) {
- dev_err(&hbus->hdev->device,
- "bus relations v2 too small\n");
- break;
- }
- hv_pci_devices_present2(hbus, bus_rel2);
- break;
- case PCI_EJECT:
- dev_message = (struct pci_dev_incoming *)buffer;
- if (bytes_recvd < sizeof(*dev_message)) {
- dev_err(&hbus->hdev->device,
- "eject message too small\n");
- break;
- }
- hpdev = get_pcichild_wslot(hbus,
- dev_message->wslot.slot);
- if (hpdev) {
- hv_pci_eject_device(hpdev);
- put_pcichild(hpdev);
- }
- break;
- case PCI_INVALIDATE_BLOCK:
- inval = (struct pci_dev_inval_block *)buffer;
- if (bytes_recvd < sizeof(*inval)) {
- dev_err(&hbus->hdev->device,
- "invalidate message too small\n");
- break;
- }
- hpdev = get_pcichild_wslot(hbus,
- inval->wslot.slot);
- if (hpdev) {
- if (hpdev->block_invalidate) {
- hpdev->block_invalidate(
- hpdev->invalidate_context,
- inval->block_mask);
- }
- put_pcichild(hpdev);
- }
- break;
- default:
- dev_warn(&hbus->hdev->device,
- "Unimplemented protocol message %x\n",
- new_message->message_type.type);
- break;
- }
- break;
- default:
- dev_err(&hbus->hdev->device,
- "unhandled packet type %d, tid %llx len %d\n",
- desc->type, req_id, bytes_recvd);
- break;
- }
- }
- kfree(buffer);
- }
- /**
- * hv_pci_protocol_negotiation() - Set up protocol
- * @hdev: VMBus's tracking struct for this root PCI bus.
- * @version: Array of supported channel protocol versions in
- * the order of probing - highest go first.
- * @num_version: Number of elements in the version array.
- *
- * This driver is intended to support running on Windows 10
- * (server) and later versions. It will not run on earlier
- * versions, as they assume that many of the operations which
- * Linux needs accomplished with a spinlock held were done via
- * asynchronous messaging via VMBus. Windows 10 increases the
- * surface area of PCI emulation so that these actions can take
- * place by suspending a virtual processor for their duration.
- *
- * This function negotiates the channel protocol version,
- * failing if the host doesn't support the necessary protocol
- * level.
- */
- static int hv_pci_protocol_negotiation(struct hv_device *hdev,
- enum pci_protocol_version_t version[],
- int num_version)
- {
- struct hv_pcibus_device *hbus = hv_get_drvdata(hdev);
- struct pci_version_request *version_req;
- struct hv_pci_compl comp_pkt;
- struct pci_packet *pkt;
- int ret;
- int i;
- /*
- * Initiate the handshake with the host and negotiate
- * a version that the host can support. We start with the
- * highest version number and go down if the host cannot
- * support it.
- */
- pkt = kzalloc(sizeof(*pkt) + sizeof(*version_req), GFP_KERNEL);
- if (!pkt)
- return -ENOMEM;
- init_completion(&comp_pkt.host_event);
- pkt->completion_func = hv_pci_generic_compl;
- pkt->compl_ctxt = &comp_pkt;
- version_req = (struct pci_version_request *)&pkt->message;
- version_req->message_type.type = PCI_QUERY_PROTOCOL_VERSION;
- for (i = 0; i < num_version; i++) {
- version_req->protocol_version = version[i];
- ret = vmbus_sendpacket(hdev->channel, version_req,
- sizeof(struct pci_version_request),
- (unsigned long)pkt, VM_PKT_DATA_INBAND,
- VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
- if (!ret)
- ret = wait_for_response(hdev, &comp_pkt.host_event);
- if (ret) {
- dev_err(&hdev->device,
- "PCI Pass-through VSP failed to request version: %d",
- ret);
- goto exit;
- }
- if (comp_pkt.completion_status >= 0) {
- hbus->protocol_version = version[i];
- dev_info(&hdev->device,
- "PCI VMBus probing: Using version %#x\n",
- hbus->protocol_version);
- goto exit;
- }
- if (comp_pkt.completion_status != STATUS_REVISION_MISMATCH) {
- dev_err(&hdev->device,
- "PCI Pass-through VSP failed version request: %#x",
- comp_pkt.completion_status);
- ret = -EPROTO;
- goto exit;
- }
- reinit_completion(&comp_pkt.host_event);
- }
- dev_err(&hdev->device,
- "PCI pass-through VSP failed to find supported version");
- ret = -EPROTO;
- exit:
- kfree(pkt);
- return ret;
- }
- /**
- * hv_pci_free_bridge_windows() - Release memory regions for the
- * bus
- * @hbus: Root PCI bus, as understood by this driver
- */
- static void hv_pci_free_bridge_windows(struct hv_pcibus_device *hbus)
- {
- /*
- * Set the resources back to the way they looked when they
- * were allocated by setting IORESOURCE_BUSY again.
- */
- if (hbus->low_mmio_space && hbus->low_mmio_res) {
- hbus->low_mmio_res->flags |= IORESOURCE_BUSY;
- vmbus_free_mmio(hbus->low_mmio_res->start,
- resource_size(hbus->low_mmio_res));
- }
- if (hbus->high_mmio_space && hbus->high_mmio_res) {
- hbus->high_mmio_res->flags |= IORESOURCE_BUSY;
- vmbus_free_mmio(hbus->high_mmio_res->start,
- resource_size(hbus->high_mmio_res));
- }
- }
- /**
- * hv_pci_allocate_bridge_windows() - Allocate memory regions
- * for the bus
- * @hbus: Root PCI bus, as understood by this driver
- *
- * This function calls vmbus_allocate_mmio(), which is itself a
- * bit of a compromise. Ideally, we might change the pnp layer
- * in the kernel such that it comprehends either PCI devices
- * which are "grandchildren of ACPI," with some intermediate bus
- * node (in this case, VMBus) or change it such that it
- * understands VMBus. The pnp layer, however, has been declared
- * deprecated, and not subject to change.
- *
- * The workaround, implemented here, is to ask VMBus to allocate
- * MMIO space for this bus. VMBus itself knows which ranges are
- * appropriate by looking at its own ACPI objects. Then, after
- * these ranges are claimed, they're modified to look like they
- * would have looked if the ACPI and pnp code had allocated
- * bridge windows. These descriptors have to exist in this form
- * in order to satisfy the code which will get invoked when the
- * endpoint PCI function driver calls request_mem_region() or
- * request_mem_region_exclusive().
- *
- * Return: 0 on success, -errno on failure
- */
- static int hv_pci_allocate_bridge_windows(struct hv_pcibus_device *hbus)
- {
- resource_size_t align;
- int ret;
- if (hbus->low_mmio_space) {
- align = 1ULL << (63 - __builtin_clzll(hbus->low_mmio_space));
- ret = vmbus_allocate_mmio(&hbus->low_mmio_res, hbus->hdev, 0,
- (u64)(u32)0xffffffff,
- hbus->low_mmio_space,
- align, false);
- if (ret) {
- dev_err(&hbus->hdev->device,
- "Need %#llx of low MMIO space. Consider reconfiguring the VM.\n",
- hbus->low_mmio_space);
- return ret;
- }
- /* Modify this resource to become a bridge window. */
- hbus->low_mmio_res->flags |= IORESOURCE_WINDOW;
- hbus->low_mmio_res->flags &= ~IORESOURCE_BUSY;
- pci_add_resource(&hbus->bridge->windows, hbus->low_mmio_res);
- }
- if (hbus->high_mmio_space) {
- align = 1ULL << (63 - __builtin_clzll(hbus->high_mmio_space));
- ret = vmbus_allocate_mmio(&hbus->high_mmio_res, hbus->hdev,
- 0x100000000, -1,
- hbus->high_mmio_space, align,
- false);
- if (ret) {
- dev_err(&hbus->hdev->device,
- "Need %#llx of high MMIO space. Consider reconfiguring the VM.\n",
- hbus->high_mmio_space);
- goto release_low_mmio;
- }
- /* Modify this resource to become a bridge window. */
- hbus->high_mmio_res->flags |= IORESOURCE_WINDOW;
- hbus->high_mmio_res->flags &= ~IORESOURCE_BUSY;
- pci_add_resource(&hbus->bridge->windows, hbus->high_mmio_res);
- }
- return 0;
- release_low_mmio:
- if (hbus->low_mmio_res) {
- vmbus_free_mmio(hbus->low_mmio_res->start,
- resource_size(hbus->low_mmio_res));
- }
- return ret;
- }
- /**
- * hv_allocate_config_window() - Find MMIO space for PCI Config
- * @hbus: Root PCI bus, as understood by this driver
- *
- * This function claims memory-mapped I/O space for accessing
- * configuration space for the functions on this bus.
- *
- * Return: 0 on success, -errno on failure
- */
- static int hv_allocate_config_window(struct hv_pcibus_device *hbus)
- {
- int ret;
- /*
- * Set up a region of MMIO space to use for accessing configuration
- * space.
- */
- ret = vmbus_allocate_mmio(&hbus->mem_config, hbus->hdev, 0, -1,
- PCI_CONFIG_MMIO_LENGTH, 0x1000, false);
- if (ret)
- return ret;
- /*
- * vmbus_allocate_mmio() gets used for allocating both device endpoint
- * resource claims (those which cannot be overlapped) and the ranges
- * which are valid for the children of this bus, which are intended
- * to be overlapped by those children. Set the flag on this claim
- * meaning that this region can't be overlapped.
- */
- hbus->mem_config->flags |= IORESOURCE_BUSY;
- return 0;
- }
- static void hv_free_config_window(struct hv_pcibus_device *hbus)
- {
- vmbus_free_mmio(hbus->mem_config->start, PCI_CONFIG_MMIO_LENGTH);
- }
- static int hv_pci_bus_exit(struct hv_device *hdev, bool keep_devs);
- /**
- * hv_pci_enter_d0() - Bring the "bus" into the D0 power state
- * @hdev: VMBus's tracking struct for this root PCI bus
- *
- * Return: 0 on success, -errno on failure
- */
- static int hv_pci_enter_d0(struct hv_device *hdev)
- {
- struct hv_pcibus_device *hbus = hv_get_drvdata(hdev);
- struct pci_bus_d0_entry *d0_entry;
- struct hv_pci_compl comp_pkt;
- struct pci_packet *pkt;
- bool retry = true;
- int ret;
- enter_d0_retry:
- /*
- * Tell the host that the bus is ready to use, and moved into the
- * powered-on state. This includes telling the host which region
- * of memory-mapped I/O space has been chosen for configuration space
- * access.
- */
- pkt = kzalloc(sizeof(*pkt) + sizeof(*d0_entry), GFP_KERNEL);
- if (!pkt)
- return -ENOMEM;
- init_completion(&comp_pkt.host_event);
- pkt->completion_func = hv_pci_generic_compl;
- pkt->compl_ctxt = &comp_pkt;
- d0_entry = (struct pci_bus_d0_entry *)&pkt->message;
- d0_entry->message_type.type = PCI_BUS_D0ENTRY;
- d0_entry->mmio_base = hbus->mem_config->start;
- ret = vmbus_sendpacket(hdev->channel, d0_entry, sizeof(*d0_entry),
- (unsigned long)pkt, VM_PKT_DATA_INBAND,
- VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
- if (!ret)
- ret = wait_for_response(hdev, &comp_pkt.host_event);
- if (ret)
- goto exit;
- /*
- * In certain case (Kdump) the pci device of interest was
- * not cleanly shut down and resource is still held on host
- * side, the host could return invalid device status.
- * We need to explicitly request host to release the resource
- * and try to enter D0 again.
- */
- if (comp_pkt.completion_status < 0 && retry) {
- retry = false;
- dev_err(&hdev->device, "Retrying D0 Entry\n");
- /*
- * Hv_pci_bus_exit() calls hv_send_resource_released()
- * to free up resources of its child devices.
- * In the kdump kernel we need to set the
- * wslot_res_allocated to 255 so it scans all child
- * devices to release resources allocated in the
- * normal kernel before panic happened.
- */
- hbus->wslot_res_allocated = 255;
- ret = hv_pci_bus_exit(hdev, true);
- if (ret == 0) {
- kfree(pkt);
- goto enter_d0_retry;
- }
- dev_err(&hdev->device,
- "Retrying D0 failed with ret %d\n", ret);
- }
- if (comp_pkt.completion_status < 0) {
- dev_err(&hdev->device,
- "PCI Pass-through VSP failed D0 Entry with status %x\n",
- comp_pkt.completion_status);
- ret = -EPROTO;
- goto exit;
- }
- ret = 0;
- exit:
- kfree(pkt);
- return ret;
- }
- /**
- * hv_pci_query_relations() - Ask host to send list of child
- * devices
- * @hdev: VMBus's tracking struct for this root PCI bus
- *
- * Return: 0 on success, -errno on failure
- */
- static int hv_pci_query_relations(struct hv_device *hdev)
- {
- struct hv_pcibus_device *hbus = hv_get_drvdata(hdev);
- struct pci_message message;
- struct completion comp;
- int ret;
- /* Ask the host to send along the list of child devices */
- init_completion(&comp);
- if (cmpxchg(&hbus->survey_event, NULL, &comp))
- return -ENOTEMPTY;
- memset(&message, 0, sizeof(message));
- message.type = PCI_QUERY_BUS_RELATIONS;
- ret = vmbus_sendpacket(hdev->channel, &message, sizeof(message),
- 0, VM_PKT_DATA_INBAND, 0);
- if (!ret)
- ret = wait_for_response(hdev, &comp);
- /*
- * In the case of fast device addition/removal, it's possible that
- * vmbus_sendpacket() or wait_for_response() returns -ENODEV but we
- * already got a PCI_BUS_RELATIONS* message from the host and the
- * channel callback already scheduled a work to hbus->wq, which can be
- * running pci_devices_present_work() -> survey_child_resources() ->
- * complete(&hbus->survey_event), even after hv_pci_query_relations()
- * exits and the stack variable 'comp' is no longer valid; as a result,
- * a hang or a page fault may happen when the complete() calls
- * raw_spin_lock_irqsave(). Flush hbus->wq before we exit from
- * hv_pci_query_relations() to avoid the issues. Note: if 'ret' is
- * -ENODEV, there can't be any more work item scheduled to hbus->wq
- * after the flush_workqueue(): see vmbus_onoffer_rescind() ->
- * vmbus_reset_channel_cb(), vmbus_rescind_cleanup() ->
- * channel->rescind = true.
- */
- flush_workqueue(hbus->wq);
- return ret;
- }
- /**
- * hv_send_resources_allocated() - Report local resource choices
- * @hdev: VMBus's tracking struct for this root PCI bus
- *
- * The host OS is expecting to be sent a request as a message
- * which contains all the resources that the device will use.
- * The response contains those same resources, "translated"
- * which is to say, the values which should be used by the
- * hardware, when it delivers an interrupt. (MMIO resources are
- * used in local terms.) This is nice for Windows, and lines up
- * with the FDO/PDO split, which doesn't exist in Linux. Linux
- * is deeply expecting to scan an emulated PCI configuration
- * space. So this message is sent here only to drive the state
- * machine on the host forward.
- *
- * Return: 0 on success, -errno on failure
- */
- static int hv_send_resources_allocated(struct hv_device *hdev)
- {
- struct hv_pcibus_device *hbus = hv_get_drvdata(hdev);
- struct pci_resources_assigned *res_assigned;
- struct pci_resources_assigned2 *res_assigned2;
- struct hv_pci_compl comp_pkt;
- struct hv_pci_dev *hpdev;
- struct pci_packet *pkt;
- size_t size_res;
- int wslot;
- int ret;
- size_res = (hbus->protocol_version < PCI_PROTOCOL_VERSION_1_2)
- ? sizeof(*res_assigned) : sizeof(*res_assigned2);
- pkt = kmalloc(sizeof(*pkt) + size_res, GFP_KERNEL);
- if (!pkt)
- return -ENOMEM;
- ret = 0;
- for (wslot = 0; wslot < 256; wslot++) {
- hpdev = get_pcichild_wslot(hbus, wslot);
- if (!hpdev)
- continue;
- memset(pkt, 0, sizeof(*pkt) + size_res);
- init_completion(&comp_pkt.host_event);
- pkt->completion_func = hv_pci_generic_compl;
- pkt->compl_ctxt = &comp_pkt;
- if (hbus->protocol_version < PCI_PROTOCOL_VERSION_1_2) {
- res_assigned =
- (struct pci_resources_assigned *)&pkt->message;
- res_assigned->message_type.type =
- PCI_RESOURCES_ASSIGNED;
- res_assigned->wslot.slot = hpdev->desc.win_slot.slot;
- } else {
- res_assigned2 =
- (struct pci_resources_assigned2 *)&pkt->message;
- res_assigned2->message_type.type =
- PCI_RESOURCES_ASSIGNED2;
- res_assigned2->wslot.slot = hpdev->desc.win_slot.slot;
- }
- put_pcichild(hpdev);
- ret = vmbus_sendpacket(hdev->channel, &pkt->message,
- size_res, (unsigned long)pkt,
- VM_PKT_DATA_INBAND,
- VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
- if (!ret)
- ret = wait_for_response(hdev, &comp_pkt.host_event);
- if (ret)
- break;
- if (comp_pkt.completion_status < 0) {
- ret = -EPROTO;
- dev_err(&hdev->device,
- "resource allocated returned 0x%x",
- comp_pkt.completion_status);
- break;
- }
- hbus->wslot_res_allocated = wslot;
- }
- kfree(pkt);
- return ret;
- }
- /**
- * hv_send_resources_released() - Report local resources
- * released
- * @hdev: VMBus's tracking struct for this root PCI bus
- *
- * Return: 0 on success, -errno on failure
- */
- static int hv_send_resources_released(struct hv_device *hdev)
- {
- struct hv_pcibus_device *hbus = hv_get_drvdata(hdev);
- struct pci_child_message pkt;
- struct hv_pci_dev *hpdev;
- int wslot;
- int ret;
- for (wslot = hbus->wslot_res_allocated; wslot >= 0; wslot--) {
- hpdev = get_pcichild_wslot(hbus, wslot);
- if (!hpdev)
- continue;
- memset(&pkt, 0, sizeof(pkt));
- pkt.message_type.type = PCI_RESOURCES_RELEASED;
- pkt.wslot.slot = hpdev->desc.win_slot.slot;
- put_pcichild(hpdev);
- ret = vmbus_sendpacket(hdev->channel, &pkt, sizeof(pkt), 0,
- VM_PKT_DATA_INBAND, 0);
- if (ret)
- return ret;
- hbus->wslot_res_allocated = wslot - 1;
- }
- hbus->wslot_res_allocated = -1;
- return 0;
- }
- #define HVPCI_DOM_MAP_SIZE (64 * 1024)
- static DECLARE_BITMAP(hvpci_dom_map, HVPCI_DOM_MAP_SIZE);
- /*
- * PCI domain number 0 is used by emulated devices on Gen1 VMs, so define 0
- * as invalid for passthrough PCI devices of this driver.
- */
- #define HVPCI_DOM_INVALID 0
- /**
- * hv_get_dom_num() - Get a valid PCI domain number
- * Check if the PCI domain number is in use, and return another number if
- * it is in use.
- *
- * @dom: Requested domain number
- *
- * return: domain number on success, HVPCI_DOM_INVALID on failure
- */
- static u16 hv_get_dom_num(u16 dom)
- {
- unsigned int i;
- if (test_and_set_bit(dom, hvpci_dom_map) == 0)
- return dom;
- for_each_clear_bit(i, hvpci_dom_map, HVPCI_DOM_MAP_SIZE) {
- if (test_and_set_bit(i, hvpci_dom_map) == 0)
- return i;
- }
- return HVPCI_DOM_INVALID;
- }
- /**
- * hv_put_dom_num() - Mark the PCI domain number as free
- * @dom: Domain number to be freed
- */
- static void hv_put_dom_num(u16 dom)
- {
- clear_bit(dom, hvpci_dom_map);
- }
- /**
- * hv_pci_probe() - New VMBus channel probe, for a root PCI bus
- * @hdev: VMBus's tracking struct for this root PCI bus
- * @dev_id: Identifies the device itself
- *
- * Return: 0 on success, -errno on failure
- */
- static int hv_pci_probe(struct hv_device *hdev,
- const struct hv_vmbus_device_id *dev_id)
- {
- struct pci_host_bridge *bridge;
- struct hv_pcibus_device *hbus;
- u16 dom_req, dom;
- char *name;
- int ret;
- /*
- * hv_pcibus_device contains the hypercall arguments for retargeting in
- * hv_irq_unmask(). Those must not cross a page boundary.
- */
- BUILD_BUG_ON(sizeof(*hbus) > HV_HYP_PAGE_SIZE);
- bridge = devm_pci_alloc_host_bridge(&hdev->device, 0);
- if (!bridge)
- return -ENOMEM;
- /*
- * With the recent 59bb47985c1d ("mm, sl[aou]b: guarantee natural
- * alignment for kmalloc(power-of-two)"), kzalloc() is able to allocate
- * a 4KB buffer that is guaranteed to be 4KB-aligned. Here the size and
- * alignment of hbus is important because hbus's field
- * retarget_msi_interrupt_params must not cross a 4KB page boundary.
- *
- * Here we prefer kzalloc to get_zeroed_page(), because a buffer
- * allocated by the latter is not tracked and scanned by kmemleak, and
- * hence kmemleak reports the pointer contained in the hbus buffer
- * (i.e. the hpdev struct, which is created in new_pcichild_device() and
- * is tracked by hbus->children) as memory leak (false positive).
- *
- * If the kernel doesn't have 59bb47985c1d, get_zeroed_page() *must* be
- * used to allocate the hbus buffer and we can avoid the kmemleak false
- * positive by using kmemleak_alloc() and kmemleak_free() to ask
- * kmemleak to track and scan the hbus buffer.
- */
- hbus = kzalloc(HV_HYP_PAGE_SIZE, GFP_KERNEL);
- if (!hbus)
- return -ENOMEM;
- hbus->bridge = bridge;
- mutex_init(&hbus->state_lock);
- hbus->state = hv_pcibus_init;
- hbus->wslot_res_allocated = -1;
- /*
- * The PCI bus "domain" is what is called "segment" in ACPI and other
- * specs. Pull it from the instance ID, to get something usually
- * unique. In rare cases of collision, we will find out another number
- * not in use.
- *
- * Note that, since this code only runs in a Hyper-V VM, Hyper-V
- * together with this guest driver can guarantee that (1) The only
- * domain used by Gen1 VMs for something that looks like a physical
- * PCI bus (which is actually emulated by the hypervisor) is domain 0.
- * (2) There will be no overlap between domains (after fixing possible
- * collisions) in the same VM.
- */
- dom_req = hdev->dev_instance.b[5] << 8 | hdev->dev_instance.b[4];
- dom = hv_get_dom_num(dom_req);
- if (dom == HVPCI_DOM_INVALID) {
- dev_err(&hdev->device,
- "Unable to use dom# 0x%x or other numbers", dom_req);
- ret = -EINVAL;
- goto free_bus;
- }
- if (dom != dom_req)
- dev_info(&hdev->device,
- "PCI dom# 0x%x has collision, using 0x%x",
- dom_req, dom);
- hbus->bridge->domain_nr = dom;
- #ifdef CONFIG_X86
- hbus->sysdata.domain = dom;
- #elif defined(CONFIG_ARM64)
- /*
- * Set the PCI bus parent to be the corresponding VMbus
- * device. Then the VMbus device will be assigned as the
- * ACPI companion in pcibios_root_bridge_prepare() and
- * pci_dma_configure() will propagate device coherence
- * information to devices created on the bus.
- */
- hbus->sysdata.parent = hdev->device.parent;
- #endif
- hbus->hdev = hdev;
- INIT_LIST_HEAD(&hbus->children);
- INIT_LIST_HEAD(&hbus->dr_list);
- spin_lock_init(&hbus->config_lock);
- spin_lock_init(&hbus->device_list_lock);
- spin_lock_init(&hbus->retarget_msi_interrupt_lock);
- hbus->wq = alloc_ordered_workqueue("hv_pci_%x", 0,
- hbus->bridge->domain_nr);
- if (!hbus->wq) {
- ret = -ENOMEM;
- goto free_dom;
- }
- hdev->channel->next_request_id_callback = vmbus_next_request_id;
- hdev->channel->request_addr_callback = vmbus_request_addr;
- hdev->channel->rqstor_size = HV_PCI_RQSTOR_SIZE;
- ret = vmbus_open(hdev->channel, pci_ring_size, pci_ring_size, NULL, 0,
- hv_pci_onchannelcallback, hbus);
- if (ret)
- goto destroy_wq;
- hv_set_drvdata(hdev, hbus);
- ret = hv_pci_protocol_negotiation(hdev, pci_protocol_versions,
- ARRAY_SIZE(pci_protocol_versions));
- if (ret)
- goto close;
- ret = hv_allocate_config_window(hbus);
- if (ret)
- goto close;
- hbus->cfg_addr = ioremap(hbus->mem_config->start,
- PCI_CONFIG_MMIO_LENGTH);
- if (!hbus->cfg_addr) {
- dev_err(&hdev->device,
- "Unable to map a virtual address for config space\n");
- ret = -ENOMEM;
- goto free_config;
- }
- name = kasprintf(GFP_KERNEL, "%pUL", &hdev->dev_instance);
- if (!name) {
- ret = -ENOMEM;
- goto unmap;
- }
- hbus->fwnode = irq_domain_alloc_named_fwnode(name);
- kfree(name);
- if (!hbus->fwnode) {
- ret = -ENOMEM;
- goto unmap;
- }
- ret = hv_pcie_init_irq_domain(hbus);
- if (ret)
- goto free_fwnode;
- ret = hv_pci_query_relations(hdev);
- if (ret)
- goto free_irq_domain;
- mutex_lock(&hbus->state_lock);
- ret = hv_pci_enter_d0(hdev);
- if (ret)
- goto release_state_lock;
- ret = hv_pci_allocate_bridge_windows(hbus);
- if (ret)
- goto exit_d0;
- ret = hv_send_resources_allocated(hdev);
- if (ret)
- goto free_windows;
- prepopulate_bars(hbus);
- hbus->state = hv_pcibus_probed;
- ret = create_root_hv_pci_bus(hbus);
- if (ret)
- goto free_windows;
- mutex_unlock(&hbus->state_lock);
- return 0;
- free_windows:
- hv_pci_free_bridge_windows(hbus);
- exit_d0:
- (void) hv_pci_bus_exit(hdev, true);
- release_state_lock:
- mutex_unlock(&hbus->state_lock);
- free_irq_domain:
- irq_domain_remove(hbus->irq_domain);
- free_fwnode:
- irq_domain_free_fwnode(hbus->fwnode);
- unmap:
- iounmap(hbus->cfg_addr);
- free_config:
- hv_free_config_window(hbus);
- close:
- vmbus_close(hdev->channel);
- destroy_wq:
- destroy_workqueue(hbus->wq);
- free_dom:
- hv_put_dom_num(hbus->bridge->domain_nr);
- free_bus:
- kfree(hbus);
- return ret;
- }
- static int hv_pci_bus_exit(struct hv_device *hdev, bool keep_devs)
- {
- struct hv_pcibus_device *hbus = hv_get_drvdata(hdev);
- struct vmbus_channel *chan = hdev->channel;
- struct {
- struct pci_packet teardown_packet;
- u8 buffer[sizeof(struct pci_message)];
- } pkt;
- struct hv_pci_compl comp_pkt;
- struct hv_pci_dev *hpdev, *tmp;
- unsigned long flags;
- u64 trans_id;
- int ret;
- /*
- * After the host sends the RESCIND_CHANNEL message, it doesn't
- * access the per-channel ringbuffer any longer.
- */
- if (chan->rescind)
- return 0;
- if (!keep_devs) {
- struct list_head removed;
- /* Move all present children to the list on stack */
- INIT_LIST_HEAD(&removed);
- spin_lock_irqsave(&hbus->device_list_lock, flags);
- list_for_each_entry_safe(hpdev, tmp, &hbus->children, list_entry)
- list_move_tail(&hpdev->list_entry, &removed);
- spin_unlock_irqrestore(&hbus->device_list_lock, flags);
- /* Remove all children in the list */
- list_for_each_entry_safe(hpdev, tmp, &removed, list_entry) {
- list_del(&hpdev->list_entry);
- if (hpdev->pci_slot)
- pci_destroy_slot(hpdev->pci_slot);
- /* For the two refs got in new_pcichild_device() */
- put_pcichild(hpdev);
- put_pcichild(hpdev);
- }
- }
- ret = hv_send_resources_released(hdev);
- if (ret) {
- dev_err(&hdev->device,
- "Couldn't send resources released packet(s)\n");
- return ret;
- }
- memset(&pkt.teardown_packet, 0, sizeof(pkt.teardown_packet));
- init_completion(&comp_pkt.host_event);
- pkt.teardown_packet.completion_func = hv_pci_generic_compl;
- pkt.teardown_packet.compl_ctxt = &comp_pkt;
- pkt.teardown_packet.message[0].type = PCI_BUS_D0EXIT;
- ret = vmbus_sendpacket_getid(chan, &pkt.teardown_packet.message,
- sizeof(struct pci_message),
- (unsigned long)&pkt.teardown_packet,
- &trans_id, VM_PKT_DATA_INBAND,
- VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
- if (ret)
- return ret;
- if (wait_for_completion_timeout(&comp_pkt.host_event, 10 * HZ) == 0) {
- /*
- * The completion packet on the stack becomes invalid after
- * 'return'; remove the ID from the VMbus requestor if the
- * identifier is still mapped to/associated with the packet.
- *
- * Cf. hv_pci_onchannelcallback().
- */
- vmbus_request_addr_match(chan, trans_id,
- (unsigned long)&pkt.teardown_packet);
- return -ETIMEDOUT;
- }
- return 0;
- }
- /**
- * hv_pci_remove() - Remove routine for this VMBus channel
- * @hdev: VMBus's tracking struct for this root PCI bus
- *
- * Return: 0 on success, -errno on failure
- */
- static int hv_pci_remove(struct hv_device *hdev)
- {
- struct hv_pcibus_device *hbus;
- int ret;
- hbus = hv_get_drvdata(hdev);
- if (hbus->state == hv_pcibus_installed) {
- tasklet_disable(&hdev->channel->callback_event);
- hbus->state = hv_pcibus_removing;
- tasklet_enable(&hdev->channel->callback_event);
- destroy_workqueue(hbus->wq);
- hbus->wq = NULL;
- /*
- * At this point, no work is running or can be scheduled
- * on hbus-wq. We can't race with hv_pci_devices_present()
- * or hv_pci_eject_device(), it's safe to proceed.
- */
- /* Remove the bus from PCI's point of view. */
- pci_lock_rescan_remove();
- pci_stop_root_bus(hbus->bridge->bus);
- hv_pci_remove_slots(hbus);
- pci_remove_root_bus(hbus->bridge->bus);
- pci_unlock_rescan_remove();
- }
- ret = hv_pci_bus_exit(hdev, false);
- vmbus_close(hdev->channel);
- iounmap(hbus->cfg_addr);
- hv_free_config_window(hbus);
- hv_pci_free_bridge_windows(hbus);
- irq_domain_remove(hbus->irq_domain);
- irq_domain_free_fwnode(hbus->fwnode);
- hv_put_dom_num(hbus->bridge->domain_nr);
- kfree(hbus);
- return ret;
- }
- static int hv_pci_suspend(struct hv_device *hdev)
- {
- struct hv_pcibus_device *hbus = hv_get_drvdata(hdev);
- enum hv_pcibus_state old_state;
- int ret;
- /*
- * hv_pci_suspend() must make sure there are no pending work items
- * before calling vmbus_close(), since it runs in a process context
- * as a callback in dpm_suspend(). When it starts to run, the channel
- * callback hv_pci_onchannelcallback(), which runs in a tasklet
- * context, can be still running concurrently and scheduling new work
- * items onto hbus->wq in hv_pci_devices_present() and
- * hv_pci_eject_device(), and the work item handlers can access the
- * vmbus channel, which can be being closed by hv_pci_suspend(), e.g.
- * the work item handler pci_devices_present_work() ->
- * new_pcichild_device() writes to the vmbus channel.
- *
- * To eliminate the race, hv_pci_suspend() disables the channel
- * callback tasklet, sets hbus->state to hv_pcibus_removing, and
- * re-enables the tasklet. This way, when hv_pci_suspend() proceeds,
- * it knows that no new work item can be scheduled, and then it flushes
- * hbus->wq and safely closes the vmbus channel.
- */
- tasklet_disable(&hdev->channel->callback_event);
- /* Change the hbus state to prevent new work items. */
- old_state = hbus->state;
- if (hbus->state == hv_pcibus_installed)
- hbus->state = hv_pcibus_removing;
- tasklet_enable(&hdev->channel->callback_event);
- if (old_state != hv_pcibus_installed)
- return -EINVAL;
- flush_workqueue(hbus->wq);
- ret = hv_pci_bus_exit(hdev, true);
- if (ret)
- return ret;
- vmbus_close(hdev->channel);
- return 0;
- }
- static int hv_pci_restore_msi_msg(struct pci_dev *pdev, void *arg)
- {
- struct irq_data *irq_data;
- struct msi_desc *entry;
- int ret = 0;
- if (!pdev->msi_enabled && !pdev->msix_enabled)
- return 0;
- msi_lock_descs(&pdev->dev);
- msi_for_each_desc(entry, &pdev->dev, MSI_DESC_ASSOCIATED) {
- irq_data = irq_get_irq_data(entry->irq);
- if (WARN_ON_ONCE(!irq_data)) {
- ret = -EINVAL;
- break;
- }
- hv_compose_msi_msg(irq_data, &entry->msg);
- }
- msi_unlock_descs(&pdev->dev);
- return ret;
- }
- /*
- * Upon resume, pci_restore_msi_state() -> ... -> __pci_write_msi_msg()
- * directly writes the MSI/MSI-X registers via MMIO, but since Hyper-V
- * doesn't trap and emulate the MMIO accesses, here hv_compose_msi_msg()
- * must be used to ask Hyper-V to re-create the IOMMU Interrupt Remapping
- * Table entries.
- */
- static void hv_pci_restore_msi_state(struct hv_pcibus_device *hbus)
- {
- pci_walk_bus(hbus->bridge->bus, hv_pci_restore_msi_msg, NULL);
- }
- static int hv_pci_resume(struct hv_device *hdev)
- {
- struct hv_pcibus_device *hbus = hv_get_drvdata(hdev);
- enum pci_protocol_version_t version[1];
- int ret;
- hbus->state = hv_pcibus_init;
- hdev->channel->next_request_id_callback = vmbus_next_request_id;
- hdev->channel->request_addr_callback = vmbus_request_addr;
- hdev->channel->rqstor_size = HV_PCI_RQSTOR_SIZE;
- ret = vmbus_open(hdev->channel, pci_ring_size, pci_ring_size, NULL, 0,
- hv_pci_onchannelcallback, hbus);
- if (ret)
- return ret;
- /* Only use the version that was in use before hibernation. */
- version[0] = hbus->protocol_version;
- ret = hv_pci_protocol_negotiation(hdev, version, 1);
- if (ret)
- goto out;
- ret = hv_pci_query_relations(hdev);
- if (ret)
- goto out;
- mutex_lock(&hbus->state_lock);
- ret = hv_pci_enter_d0(hdev);
- if (ret)
- goto release_state_lock;
- ret = hv_send_resources_allocated(hdev);
- if (ret)
- goto release_state_lock;
- prepopulate_bars(hbus);
- hv_pci_restore_msi_state(hbus);
- hbus->state = hv_pcibus_installed;
- mutex_unlock(&hbus->state_lock);
- return 0;
- release_state_lock:
- mutex_unlock(&hbus->state_lock);
- out:
- vmbus_close(hdev->channel);
- return ret;
- }
- static const struct hv_vmbus_device_id hv_pci_id_table[] = {
- /* PCI Pass-through Class ID */
- /* 44C4F61D-4444-4400-9D52-802E27EDE19F */
- { HV_PCIE_GUID, },
- { },
- };
- MODULE_DEVICE_TABLE(vmbus, hv_pci_id_table);
- static struct hv_driver hv_pci_drv = {
- .name = "hv_pci",
- .id_table = hv_pci_id_table,
- .probe = hv_pci_probe,
- .remove = hv_pci_remove,
- .suspend = hv_pci_suspend,
- .resume = hv_pci_resume,
- };
- static void __exit exit_hv_pci_drv(void)
- {
- vmbus_driver_unregister(&hv_pci_drv);
- hvpci_block_ops.read_block = NULL;
- hvpci_block_ops.write_block = NULL;
- hvpci_block_ops.reg_blk_invalidate = NULL;
- }
- static int __init init_hv_pci_drv(void)
- {
- int ret;
- if (!hv_is_hyperv_initialized())
- return -ENODEV;
- ret = hv_pci_irqchip_init();
- if (ret)
- return ret;
- /* Set the invalid domain number's bit, so it will not be used */
- set_bit(HVPCI_DOM_INVALID, hvpci_dom_map);
- /* Initialize PCI block r/w interface */
- hvpci_block_ops.read_block = hv_read_config_block;
- hvpci_block_ops.write_block = hv_write_config_block;
- hvpci_block_ops.reg_blk_invalidate = hv_register_block_invalidate;
- return vmbus_driver_register(&hv_pci_drv);
- }
- module_init(init_hv_pci_drv);
- module_exit(exit_hv_pci_drv);
- MODULE_DESCRIPTION("Hyper-V PCI");
- MODULE_LICENSE("GPL v2");
|