xref: /linux/drivers/pci/iov.c (revision 4b132aacb0768ac1e652cf517097ea6f237214b9)
1 // SPDX-License-Identifier: GPL-2.0
2 /*
3  * PCI Express I/O Virtualization (IOV) support
4  *   Single Root IOV 1.0
5  *   Address Translation Service 1.0
6  *
7  * Copyright (C) 2009 Intel Corporation, Yu Zhao <yu.zhao@intel.com>
8  */
9 
10 #include <linux/pci.h>
11 #include <linux/slab.h>
12 #include <linux/export.h>
13 #include <linux/string.h>
14 #include <linux/delay.h>
15 #include "pci.h"
16 
17 #define VIRTFN_ID_LEN	17	/* "virtfn%u\0" for 2^32 - 1 */
18 
19 int pci_iov_virtfn_bus(struct pci_dev *dev, int vf_id)
20 {
21 	if (!dev->is_physfn)
22 		return -EINVAL;
23 	return dev->bus->number + ((dev->devfn + dev->sriov->offset +
24 				    dev->sriov->stride * vf_id) >> 8);
25 }
26 
27 int pci_iov_virtfn_devfn(struct pci_dev *dev, int vf_id)
28 {
29 	if (!dev->is_physfn)
30 		return -EINVAL;
31 	return (dev->devfn + dev->sriov->offset +
32 		dev->sriov->stride * vf_id) & 0xff;
33 }
34 EXPORT_SYMBOL_GPL(pci_iov_virtfn_devfn);
35 
36 int pci_iov_vf_id(struct pci_dev *dev)
37 {
38 	struct pci_dev *pf;
39 
40 	if (!dev->is_virtfn)
41 		return -EINVAL;
42 
43 	pf = pci_physfn(dev);
44 	return (pci_dev_id(dev) - (pci_dev_id(pf) + pf->sriov->offset)) /
45 	       pf->sriov->stride;
46 }
47 EXPORT_SYMBOL_GPL(pci_iov_vf_id);
48 
49 /**
50  * pci_iov_get_pf_drvdata - Return the drvdata of a PF
51  * @dev: VF pci_dev
52  * @pf_driver: Device driver required to own the PF
53  *
54  * This must be called from a context that ensures that a VF driver is attached.
55  * The value returned is invalid once the VF driver completes its remove()
56  * callback.
57  *
58  * Locking is achieved by the driver core. A VF driver cannot be probed until
59  * pci_enable_sriov() is called and pci_disable_sriov() does not return until
60  * all VF drivers have completed their remove().
61  *
62  * The PF driver must call pci_disable_sriov() before it begins to destroy the
63  * drvdata.
64  */
65 void *pci_iov_get_pf_drvdata(struct pci_dev *dev, struct pci_driver *pf_driver)
66 {
67 	struct pci_dev *pf_dev;
68 
69 	if (!dev->is_virtfn)
70 		return ERR_PTR(-EINVAL);
71 	pf_dev = dev->physfn;
72 	if (pf_dev->driver != pf_driver)
73 		return ERR_PTR(-EINVAL);
74 	return pci_get_drvdata(pf_dev);
75 }
76 EXPORT_SYMBOL_GPL(pci_iov_get_pf_drvdata);
77 
78 /*
79  * Per SR-IOV spec sec 3.3.10 and 3.3.11, First VF Offset and VF Stride may
80  * change when NumVFs changes.
81  *
82  * Update iov->offset and iov->stride when NumVFs is written.
83  */
84 static inline void pci_iov_set_numvfs(struct pci_dev *dev, int nr_virtfn)
85 {
86 	struct pci_sriov *iov = dev->sriov;
87 
88 	pci_write_config_word(dev, iov->pos + PCI_SRIOV_NUM_VF, nr_virtfn);
89 	pci_read_config_word(dev, iov->pos + PCI_SRIOV_VF_OFFSET, &iov->offset);
90 	pci_read_config_word(dev, iov->pos + PCI_SRIOV_VF_STRIDE, &iov->stride);
91 }
92 
93 /*
94  * The PF consumes one bus number.  NumVFs, First VF Offset, and VF Stride
95  * determine how many additional bus numbers will be consumed by VFs.
96  *
97  * Iterate over all valid NumVFs, validate offset and stride, and calculate
98  * the maximum number of bus numbers that could ever be required.
99  */
100 static int compute_max_vf_buses(struct pci_dev *dev)
101 {
102 	struct pci_sriov *iov = dev->sriov;
103 	int nr_virtfn, busnr, rc = 0;
104 
105 	for (nr_virtfn = iov->total_VFs; nr_virtfn; nr_virtfn--) {
106 		pci_iov_set_numvfs(dev, nr_virtfn);
107 		if (!iov->offset || (nr_virtfn > 1 && !iov->stride)) {
108 			rc = -EIO;
109 			goto out;
110 		}
111 
112 		busnr = pci_iov_virtfn_bus(dev, nr_virtfn - 1);
113 		if (busnr > iov->max_VF_buses)
114 			iov->max_VF_buses = busnr;
115 	}
116 
117 out:
118 	pci_iov_set_numvfs(dev, 0);
119 	return rc;
120 }
121 
122 static struct pci_bus *virtfn_add_bus(struct pci_bus *bus, int busnr)
123 {
124 	struct pci_bus *child;
125 
126 	if (bus->number == busnr)
127 		return bus;
128 
129 	child = pci_find_bus(pci_domain_nr(bus), busnr);
130 	if (child)
131 		return child;
132 
133 	child = pci_add_new_bus(bus, NULL, busnr);
134 	if (!child)
135 		return NULL;
136 
137 	pci_bus_insert_busn_res(child, busnr, busnr);
138 
139 	return child;
140 }
141 
142 static void virtfn_remove_bus(struct pci_bus *physbus, struct pci_bus *virtbus)
143 {
144 	if (physbus != virtbus && list_empty(&virtbus->devices))
145 		pci_remove_bus(virtbus);
146 }
147 
148 resource_size_t pci_iov_resource_size(struct pci_dev *dev, int resno)
149 {
150 	if (!dev->is_physfn)
151 		return 0;
152 
153 	return dev->sriov->barsz[resno - PCI_IOV_RESOURCES];
154 }
155 
156 static void pci_read_vf_config_common(struct pci_dev *virtfn)
157 {
158 	struct pci_dev *physfn = virtfn->physfn;
159 
160 	/*
161 	 * Some config registers are the same across all associated VFs.
162 	 * Read them once from VF0 so we can skip reading them from the
163 	 * other VFs.
164 	 *
165 	 * PCIe r4.0, sec 9.3.4.1, technically doesn't require all VFs to
166 	 * have the same Revision ID and Subsystem ID, but we assume they
167 	 * do.
168 	 */
169 	pci_read_config_dword(virtfn, PCI_CLASS_REVISION,
170 			      &physfn->sriov->class);
171 	pci_read_config_byte(virtfn, PCI_HEADER_TYPE,
172 			     &physfn->sriov->hdr_type);
173 	pci_read_config_word(virtfn, PCI_SUBSYSTEM_VENDOR_ID,
174 			     &physfn->sriov->subsystem_vendor);
175 	pci_read_config_word(virtfn, PCI_SUBSYSTEM_ID,
176 			     &physfn->sriov->subsystem_device);
177 }
178 
179 int pci_iov_sysfs_link(struct pci_dev *dev,
180 		struct pci_dev *virtfn, int id)
181 {
182 	char buf[VIRTFN_ID_LEN];
183 	int rc;
184 
185 	sprintf(buf, "virtfn%u", id);
186 	rc = sysfs_create_link(&dev->dev.kobj, &virtfn->dev.kobj, buf);
187 	if (rc)
188 		goto failed;
189 	rc = sysfs_create_link(&virtfn->dev.kobj, &dev->dev.kobj, "physfn");
190 	if (rc)
191 		goto failed1;
192 
193 	kobject_uevent(&virtfn->dev.kobj, KOBJ_CHANGE);
194 
195 	return 0;
196 
197 failed1:
198 	sysfs_remove_link(&dev->dev.kobj, buf);
199 failed:
200 	return rc;
201 }
202 
203 #ifdef CONFIG_PCI_MSI
204 static ssize_t sriov_vf_total_msix_show(struct device *dev,
205 					struct device_attribute *attr,
206 					char *buf)
207 {
208 	struct pci_dev *pdev = to_pci_dev(dev);
209 	u32 vf_total_msix = 0;
210 
211 	device_lock(dev);
212 	if (!pdev->driver || !pdev->driver->sriov_get_vf_total_msix)
213 		goto unlock;
214 
215 	vf_total_msix = pdev->driver->sriov_get_vf_total_msix(pdev);
216 unlock:
217 	device_unlock(dev);
218 	return sysfs_emit(buf, "%u\n", vf_total_msix);
219 }
220 static DEVICE_ATTR_RO(sriov_vf_total_msix);
221 
222 static ssize_t sriov_vf_msix_count_store(struct device *dev,
223 					 struct device_attribute *attr,
224 					 const char *buf, size_t count)
225 {
226 	struct pci_dev *vf_dev = to_pci_dev(dev);
227 	struct pci_dev *pdev = pci_physfn(vf_dev);
228 	int val, ret = 0;
229 
230 	if (kstrtoint(buf, 0, &val) < 0)
231 		return -EINVAL;
232 
233 	if (val < 0)
234 		return -EINVAL;
235 
236 	device_lock(&pdev->dev);
237 	if (!pdev->driver || !pdev->driver->sriov_set_msix_vec_count) {
238 		ret = -EOPNOTSUPP;
239 		goto err_pdev;
240 	}
241 
242 	device_lock(&vf_dev->dev);
243 	if (vf_dev->driver) {
244 		/*
245 		 * A driver is already attached to this VF and has configured
246 		 * itself based on the current MSI-X vector count. Changing
247 		 * the vector size could mess up the driver, so block it.
248 		 */
249 		ret = -EBUSY;
250 		goto err_dev;
251 	}
252 
253 	ret = pdev->driver->sriov_set_msix_vec_count(vf_dev, val);
254 
255 err_dev:
256 	device_unlock(&vf_dev->dev);
257 err_pdev:
258 	device_unlock(&pdev->dev);
259 	return ret ? : count;
260 }
261 static DEVICE_ATTR_WO(sriov_vf_msix_count);
262 #endif
263 
264 static struct attribute *sriov_vf_dev_attrs[] = {
265 #ifdef CONFIG_PCI_MSI
266 	&dev_attr_sriov_vf_msix_count.attr,
267 #endif
268 	NULL,
269 };
270 
271 static umode_t sriov_vf_attrs_are_visible(struct kobject *kobj,
272 					  struct attribute *a, int n)
273 {
274 	struct device *dev = kobj_to_dev(kobj);
275 	struct pci_dev *pdev = to_pci_dev(dev);
276 
277 	if (!pdev->is_virtfn)
278 		return 0;
279 
280 	return a->mode;
281 }
282 
283 const struct attribute_group sriov_vf_dev_attr_group = {
284 	.attrs = sriov_vf_dev_attrs,
285 	.is_visible = sriov_vf_attrs_are_visible,
286 };
287 
288 int pci_iov_add_virtfn(struct pci_dev *dev, int id)
289 {
290 	int i;
291 	int rc = -ENOMEM;
292 	u64 size;
293 	struct pci_dev *virtfn;
294 	struct resource *res;
295 	struct pci_sriov *iov = dev->sriov;
296 	struct pci_bus *bus;
297 
298 	bus = virtfn_add_bus(dev->bus, pci_iov_virtfn_bus(dev, id));
299 	if (!bus)
300 		goto failed;
301 
302 	virtfn = pci_alloc_dev(bus);
303 	if (!virtfn)
304 		goto failed0;
305 
306 	virtfn->devfn = pci_iov_virtfn_devfn(dev, id);
307 	virtfn->vendor = dev->vendor;
308 	virtfn->device = iov->vf_device;
309 	virtfn->is_virtfn = 1;
310 	virtfn->physfn = pci_dev_get(dev);
311 	virtfn->no_command_memory = 1;
312 
313 	if (id == 0)
314 		pci_read_vf_config_common(virtfn);
315 
316 	rc = pci_setup_device(virtfn);
317 	if (rc)
318 		goto failed1;
319 
320 	virtfn->dev.parent = dev->dev.parent;
321 	virtfn->multifunction = 0;
322 
323 	for (i = 0; i < PCI_SRIOV_NUM_BARS; i++) {
324 		res = &dev->resource[i + PCI_IOV_RESOURCES];
325 		if (!res->parent)
326 			continue;
327 		virtfn->resource[i].name = pci_name(virtfn);
328 		virtfn->resource[i].flags = res->flags;
329 		size = pci_iov_resource_size(dev, i + PCI_IOV_RESOURCES);
330 		virtfn->resource[i].start = res->start + size * id;
331 		virtfn->resource[i].end = virtfn->resource[i].start + size - 1;
332 		rc = request_resource(res, &virtfn->resource[i]);
333 		BUG_ON(rc);
334 	}
335 
336 	pci_device_add(virtfn, virtfn->bus);
337 	rc = pci_iov_sysfs_link(dev, virtfn, id);
338 	if (rc)
339 		goto failed1;
340 
341 	pci_bus_add_device(virtfn);
342 
343 	return 0;
344 
345 failed1:
346 	pci_stop_and_remove_bus_device(virtfn);
347 	pci_dev_put(dev);
348 failed0:
349 	virtfn_remove_bus(dev->bus, bus);
350 failed:
351 
352 	return rc;
353 }
354 
355 void pci_iov_remove_virtfn(struct pci_dev *dev, int id)
356 {
357 	char buf[VIRTFN_ID_LEN];
358 	struct pci_dev *virtfn;
359 
360 	virtfn = pci_get_domain_bus_and_slot(pci_domain_nr(dev->bus),
361 					     pci_iov_virtfn_bus(dev, id),
362 					     pci_iov_virtfn_devfn(dev, id));
363 	if (!virtfn)
364 		return;
365 
366 	sprintf(buf, "virtfn%u", id);
367 	sysfs_remove_link(&dev->dev.kobj, buf);
368 	/*
369 	 * pci_stop_dev() could have been called for this virtfn already,
370 	 * so the directory for the virtfn may have been removed before.
371 	 * Double check to avoid spurious sysfs warnings.
372 	 */
373 	if (virtfn->dev.kobj.sd)
374 		sysfs_remove_link(&virtfn->dev.kobj, "physfn");
375 
376 	pci_stop_and_remove_bus_device(virtfn);
377 	virtfn_remove_bus(dev->bus, virtfn->bus);
378 
379 	/* balance pci_get_domain_bus_and_slot() */
380 	pci_dev_put(virtfn);
381 	pci_dev_put(dev);
382 }
383 
384 static ssize_t sriov_totalvfs_show(struct device *dev,
385 				   struct device_attribute *attr,
386 				   char *buf)
387 {
388 	struct pci_dev *pdev = to_pci_dev(dev);
389 
390 	return sysfs_emit(buf, "%u\n", pci_sriov_get_totalvfs(pdev));
391 }
392 
393 static ssize_t sriov_numvfs_show(struct device *dev,
394 				 struct device_attribute *attr,
395 				 char *buf)
396 {
397 	struct pci_dev *pdev = to_pci_dev(dev);
398 	u16 num_vfs;
399 
400 	/* Serialize vs sriov_numvfs_store() so readers see valid num_VFs */
401 	device_lock(&pdev->dev);
402 	num_vfs = pdev->sriov->num_VFs;
403 	device_unlock(&pdev->dev);
404 
405 	return sysfs_emit(buf, "%u\n", num_vfs);
406 }
407 
408 /*
409  * num_vfs > 0; number of VFs to enable
410  * num_vfs = 0; disable all VFs
411  *
412  * Note: SRIOV spec does not allow partial VF
413  *	 disable, so it's all or none.
414  */
415 static ssize_t sriov_numvfs_store(struct device *dev,
416 				  struct device_attribute *attr,
417 				  const char *buf, size_t count)
418 {
419 	struct pci_dev *pdev = to_pci_dev(dev);
420 	int ret = 0;
421 	u16 num_vfs;
422 
423 	if (kstrtou16(buf, 0, &num_vfs) < 0)
424 		return -EINVAL;
425 
426 	if (num_vfs > pci_sriov_get_totalvfs(pdev))
427 		return -ERANGE;
428 
429 	device_lock(&pdev->dev);
430 
431 	if (num_vfs == pdev->sriov->num_VFs)
432 		goto exit;
433 
434 	/* is PF driver loaded */
435 	if (!pdev->driver) {
436 		pci_info(pdev, "no driver bound to device; cannot configure SR-IOV\n");
437 		ret = -ENOENT;
438 		goto exit;
439 	}
440 
441 	/* is PF driver loaded w/callback */
442 	if (!pdev->driver->sriov_configure) {
443 		pci_info(pdev, "driver does not support SR-IOV configuration via sysfs\n");
444 		ret = -ENOENT;
445 		goto exit;
446 	}
447 
448 	if (num_vfs == 0) {
449 		/* disable VFs */
450 		ret = pdev->driver->sriov_configure(pdev, 0);
451 		goto exit;
452 	}
453 
454 	/* enable VFs */
455 	if (pdev->sriov->num_VFs) {
456 		pci_warn(pdev, "%d VFs already enabled. Disable before enabling %d VFs\n",
457 			 pdev->sriov->num_VFs, num_vfs);
458 		ret = -EBUSY;
459 		goto exit;
460 	}
461 
462 	ret = pdev->driver->sriov_configure(pdev, num_vfs);
463 	if (ret < 0)
464 		goto exit;
465 
466 	if (ret != num_vfs)
467 		pci_warn(pdev, "%d VFs requested; only %d enabled\n",
468 			 num_vfs, ret);
469 
470 exit:
471 	device_unlock(&pdev->dev);
472 
473 	if (ret < 0)
474 		return ret;
475 
476 	return count;
477 }
478 
479 static ssize_t sriov_offset_show(struct device *dev,
480 				 struct device_attribute *attr,
481 				 char *buf)
482 {
483 	struct pci_dev *pdev = to_pci_dev(dev);
484 
485 	return sysfs_emit(buf, "%u\n", pdev->sriov->offset);
486 }
487 
488 static ssize_t sriov_stride_show(struct device *dev,
489 				 struct device_attribute *attr,
490 				 char *buf)
491 {
492 	struct pci_dev *pdev = to_pci_dev(dev);
493 
494 	return sysfs_emit(buf, "%u\n", pdev->sriov->stride);
495 }
496 
497 static ssize_t sriov_vf_device_show(struct device *dev,
498 				    struct device_attribute *attr,
499 				    char *buf)
500 {
501 	struct pci_dev *pdev = to_pci_dev(dev);
502 
503 	return sysfs_emit(buf, "%x\n", pdev->sriov->vf_device);
504 }
505 
506 static ssize_t sriov_drivers_autoprobe_show(struct device *dev,
507 					    struct device_attribute *attr,
508 					    char *buf)
509 {
510 	struct pci_dev *pdev = to_pci_dev(dev);
511 
512 	return sysfs_emit(buf, "%u\n", pdev->sriov->drivers_autoprobe);
513 }
514 
515 static ssize_t sriov_drivers_autoprobe_store(struct device *dev,
516 					     struct device_attribute *attr,
517 					     const char *buf, size_t count)
518 {
519 	struct pci_dev *pdev = to_pci_dev(dev);
520 	bool drivers_autoprobe;
521 
522 	if (kstrtobool(buf, &drivers_autoprobe) < 0)
523 		return -EINVAL;
524 
525 	pdev->sriov->drivers_autoprobe = drivers_autoprobe;
526 
527 	return count;
528 }
529 
530 static DEVICE_ATTR_RO(sriov_totalvfs);
531 static DEVICE_ATTR_RW(sriov_numvfs);
532 static DEVICE_ATTR_RO(sriov_offset);
533 static DEVICE_ATTR_RO(sriov_stride);
534 static DEVICE_ATTR_RO(sriov_vf_device);
535 static DEVICE_ATTR_RW(sriov_drivers_autoprobe);
536 
537 static struct attribute *sriov_pf_dev_attrs[] = {
538 	&dev_attr_sriov_totalvfs.attr,
539 	&dev_attr_sriov_numvfs.attr,
540 	&dev_attr_sriov_offset.attr,
541 	&dev_attr_sriov_stride.attr,
542 	&dev_attr_sriov_vf_device.attr,
543 	&dev_attr_sriov_drivers_autoprobe.attr,
544 #ifdef CONFIG_PCI_MSI
545 	&dev_attr_sriov_vf_total_msix.attr,
546 #endif
547 	NULL,
548 };
549 
550 static umode_t sriov_pf_attrs_are_visible(struct kobject *kobj,
551 					  struct attribute *a, int n)
552 {
553 	struct device *dev = kobj_to_dev(kobj);
554 
555 	if (!dev_is_pf(dev))
556 		return 0;
557 
558 	return a->mode;
559 }
560 
561 const struct attribute_group sriov_pf_dev_attr_group = {
562 	.attrs = sriov_pf_dev_attrs,
563 	.is_visible = sriov_pf_attrs_are_visible,
564 };
565 
566 int __weak pcibios_sriov_enable(struct pci_dev *pdev, u16 num_vfs)
567 {
568 	return 0;
569 }
570 
571 int __weak pcibios_sriov_disable(struct pci_dev *pdev)
572 {
573 	return 0;
574 }
575 
576 static int sriov_add_vfs(struct pci_dev *dev, u16 num_vfs)
577 {
578 	unsigned int i;
579 	int rc;
580 
581 	if (dev->no_vf_scan)
582 		return 0;
583 
584 	for (i = 0; i < num_vfs; i++) {
585 		rc = pci_iov_add_virtfn(dev, i);
586 		if (rc)
587 			goto failed;
588 	}
589 	return 0;
590 failed:
591 	while (i--)
592 		pci_iov_remove_virtfn(dev, i);
593 
594 	return rc;
595 }
596 
597 static int sriov_enable(struct pci_dev *dev, int nr_virtfn)
598 {
599 	int rc;
600 	int i;
601 	int nres;
602 	u16 initial;
603 	struct resource *res;
604 	struct pci_dev *pdev;
605 	struct pci_sriov *iov = dev->sriov;
606 	int bars = 0;
607 	int bus;
608 
609 	if (!nr_virtfn)
610 		return 0;
611 
612 	if (iov->num_VFs)
613 		return -EINVAL;
614 
615 	pci_read_config_word(dev, iov->pos + PCI_SRIOV_INITIAL_VF, &initial);
616 	if (initial > iov->total_VFs ||
617 	    (!(iov->cap & PCI_SRIOV_CAP_VFM) && (initial != iov->total_VFs)))
618 		return -EIO;
619 
620 	if (nr_virtfn < 0 || nr_virtfn > iov->total_VFs ||
621 	    (!(iov->cap & PCI_SRIOV_CAP_VFM) && (nr_virtfn > initial)))
622 		return -EINVAL;
623 
624 	nres = 0;
625 	for (i = 0; i < PCI_SRIOV_NUM_BARS; i++) {
626 		bars |= (1 << (i + PCI_IOV_RESOURCES));
627 		res = &dev->resource[i + PCI_IOV_RESOURCES];
628 		if (res->parent)
629 			nres++;
630 	}
631 	if (nres != iov->nres) {
632 		pci_err(dev, "not enough MMIO resources for SR-IOV\n");
633 		return -ENOMEM;
634 	}
635 
636 	bus = pci_iov_virtfn_bus(dev, nr_virtfn - 1);
637 	if (bus > dev->bus->busn_res.end) {
638 		pci_err(dev, "can't enable %d VFs (bus %02x out of range of %pR)\n",
639 			nr_virtfn, bus, &dev->bus->busn_res);
640 		return -ENOMEM;
641 	}
642 
643 	if (pci_enable_resources(dev, bars)) {
644 		pci_err(dev, "SR-IOV: IOV BARS not allocated\n");
645 		return -ENOMEM;
646 	}
647 
648 	if (iov->link != dev->devfn) {
649 		pdev = pci_get_slot(dev->bus, iov->link);
650 		if (!pdev)
651 			return -ENODEV;
652 
653 		if (!pdev->is_physfn) {
654 			pci_dev_put(pdev);
655 			return -ENOSYS;
656 		}
657 
658 		rc = sysfs_create_link(&dev->dev.kobj,
659 					&pdev->dev.kobj, "dep_link");
660 		pci_dev_put(pdev);
661 		if (rc)
662 			return rc;
663 	}
664 
665 	iov->initial_VFs = initial;
666 	if (nr_virtfn < initial)
667 		initial = nr_virtfn;
668 
669 	rc = pcibios_sriov_enable(dev, initial);
670 	if (rc) {
671 		pci_err(dev, "failure %d from pcibios_sriov_enable()\n", rc);
672 		goto err_pcibios;
673 	}
674 
675 	pci_iov_set_numvfs(dev, nr_virtfn);
676 	iov->ctrl |= PCI_SRIOV_CTRL_VFE | PCI_SRIOV_CTRL_MSE;
677 	pci_cfg_access_lock(dev);
678 	pci_write_config_word(dev, iov->pos + PCI_SRIOV_CTRL, iov->ctrl);
679 	msleep(100);
680 	pci_cfg_access_unlock(dev);
681 
682 	rc = sriov_add_vfs(dev, initial);
683 	if (rc)
684 		goto err_pcibios;
685 
686 	kobject_uevent(&dev->dev.kobj, KOBJ_CHANGE);
687 	iov->num_VFs = nr_virtfn;
688 
689 	return 0;
690 
691 err_pcibios:
692 	iov->ctrl &= ~(PCI_SRIOV_CTRL_VFE | PCI_SRIOV_CTRL_MSE);
693 	pci_cfg_access_lock(dev);
694 	pci_write_config_word(dev, iov->pos + PCI_SRIOV_CTRL, iov->ctrl);
695 	ssleep(1);
696 	pci_cfg_access_unlock(dev);
697 
698 	pcibios_sriov_disable(dev);
699 
700 	if (iov->link != dev->devfn)
701 		sysfs_remove_link(&dev->dev.kobj, "dep_link");
702 
703 	pci_iov_set_numvfs(dev, 0);
704 	return rc;
705 }
706 
707 static void sriov_del_vfs(struct pci_dev *dev)
708 {
709 	struct pci_sriov *iov = dev->sriov;
710 	int i;
711 
712 	for (i = 0; i < iov->num_VFs; i++)
713 		pci_iov_remove_virtfn(dev, i);
714 }
715 
716 static void sriov_disable(struct pci_dev *dev)
717 {
718 	struct pci_sriov *iov = dev->sriov;
719 
720 	if (!iov->num_VFs)
721 		return;
722 
723 	sriov_del_vfs(dev);
724 	iov->ctrl &= ~(PCI_SRIOV_CTRL_VFE | PCI_SRIOV_CTRL_MSE);
725 	pci_cfg_access_lock(dev);
726 	pci_write_config_word(dev, iov->pos + PCI_SRIOV_CTRL, iov->ctrl);
727 	ssleep(1);
728 	pci_cfg_access_unlock(dev);
729 
730 	pcibios_sriov_disable(dev);
731 
732 	if (iov->link != dev->devfn)
733 		sysfs_remove_link(&dev->dev.kobj, "dep_link");
734 
735 	iov->num_VFs = 0;
736 	pci_iov_set_numvfs(dev, 0);
737 }
738 
739 static int sriov_init(struct pci_dev *dev, int pos)
740 {
741 	int i, bar64;
742 	int rc;
743 	int nres;
744 	u32 pgsz;
745 	u16 ctrl, total;
746 	struct pci_sriov *iov;
747 	struct resource *res;
748 	const char *res_name;
749 	struct pci_dev *pdev;
750 
751 	pci_read_config_word(dev, pos + PCI_SRIOV_CTRL, &ctrl);
752 	if (ctrl & PCI_SRIOV_CTRL_VFE) {
753 		pci_write_config_word(dev, pos + PCI_SRIOV_CTRL, 0);
754 		ssleep(1);
755 	}
756 
757 	ctrl = 0;
758 	list_for_each_entry(pdev, &dev->bus->devices, bus_list)
759 		if (pdev->is_physfn)
760 			goto found;
761 
762 	pdev = NULL;
763 	if (pci_ari_enabled(dev->bus))
764 		ctrl |= PCI_SRIOV_CTRL_ARI;
765 
766 found:
767 	pci_write_config_word(dev, pos + PCI_SRIOV_CTRL, ctrl);
768 
769 	pci_read_config_word(dev, pos + PCI_SRIOV_TOTAL_VF, &total);
770 	if (!total)
771 		return 0;
772 
773 	pci_read_config_dword(dev, pos + PCI_SRIOV_SUP_PGSIZE, &pgsz);
774 	i = PAGE_SHIFT > 12 ? PAGE_SHIFT - 12 : 0;
775 	pgsz &= ~((1 << i) - 1);
776 	if (!pgsz)
777 		return -EIO;
778 
779 	pgsz &= ~(pgsz - 1);
780 	pci_write_config_dword(dev, pos + PCI_SRIOV_SYS_PGSIZE, pgsz);
781 
782 	iov = kzalloc(sizeof(*iov), GFP_KERNEL);
783 	if (!iov)
784 		return -ENOMEM;
785 
786 	nres = 0;
787 	for (i = 0; i < PCI_SRIOV_NUM_BARS; i++) {
788 		res = &dev->resource[i + PCI_IOV_RESOURCES];
789 		res_name = pci_resource_name(dev, i + PCI_IOV_RESOURCES);
790 
791 		/*
792 		 * If it is already FIXED, don't change it, something
793 		 * (perhaps EA or header fixups) wants it this way.
794 		 */
795 		if (res->flags & IORESOURCE_PCI_FIXED)
796 			bar64 = (res->flags & IORESOURCE_MEM_64) ? 1 : 0;
797 		else
798 			bar64 = __pci_read_base(dev, pci_bar_unknown, res,
799 						pos + PCI_SRIOV_BAR + i * 4);
800 		if (!res->flags)
801 			continue;
802 		if (resource_size(res) & (PAGE_SIZE - 1)) {
803 			rc = -EIO;
804 			goto failed;
805 		}
806 		iov->barsz[i] = resource_size(res);
807 		res->end = res->start + resource_size(res) * total - 1;
808 		pci_info(dev, "%s %pR: contains BAR %d for %d VFs\n",
809 			 res_name, res, i, total);
810 		i += bar64;
811 		nres++;
812 	}
813 
814 	iov->pos = pos;
815 	iov->nres = nres;
816 	iov->ctrl = ctrl;
817 	iov->total_VFs = total;
818 	iov->driver_max_VFs = total;
819 	pci_read_config_word(dev, pos + PCI_SRIOV_VF_DID, &iov->vf_device);
820 	iov->pgsz = pgsz;
821 	iov->self = dev;
822 	iov->drivers_autoprobe = true;
823 	pci_read_config_dword(dev, pos + PCI_SRIOV_CAP, &iov->cap);
824 	pci_read_config_byte(dev, pos + PCI_SRIOV_FUNC_LINK, &iov->link);
825 	if (pci_pcie_type(dev) == PCI_EXP_TYPE_RC_END)
826 		iov->link = PCI_DEVFN(PCI_SLOT(dev->devfn), iov->link);
827 
828 	if (pdev)
829 		iov->dev = pci_dev_get(pdev);
830 	else
831 		iov->dev = dev;
832 
833 	dev->sriov = iov;
834 	dev->is_physfn = 1;
835 	rc = compute_max_vf_buses(dev);
836 	if (rc)
837 		goto fail_max_buses;
838 
839 	return 0;
840 
841 fail_max_buses:
842 	dev->sriov = NULL;
843 	dev->is_physfn = 0;
844 failed:
845 	for (i = 0; i < PCI_SRIOV_NUM_BARS; i++) {
846 		res = &dev->resource[i + PCI_IOV_RESOURCES];
847 		res->flags = 0;
848 	}
849 
850 	kfree(iov);
851 	return rc;
852 }
853 
854 static void sriov_release(struct pci_dev *dev)
855 {
856 	BUG_ON(dev->sriov->num_VFs);
857 
858 	if (dev != dev->sriov->dev)
859 		pci_dev_put(dev->sriov->dev);
860 
861 	kfree(dev->sriov);
862 	dev->sriov = NULL;
863 }
864 
865 static void sriov_restore_state(struct pci_dev *dev)
866 {
867 	int i;
868 	u16 ctrl;
869 	struct pci_sriov *iov = dev->sriov;
870 
871 	pci_read_config_word(dev, iov->pos + PCI_SRIOV_CTRL, &ctrl);
872 	if (ctrl & PCI_SRIOV_CTRL_VFE)
873 		return;
874 
875 	/*
876 	 * Restore PCI_SRIOV_CTRL_ARI before pci_iov_set_numvfs() because
877 	 * it reads offset & stride, which depend on PCI_SRIOV_CTRL_ARI.
878 	 */
879 	ctrl &= ~PCI_SRIOV_CTRL_ARI;
880 	ctrl |= iov->ctrl & PCI_SRIOV_CTRL_ARI;
881 	pci_write_config_word(dev, iov->pos + PCI_SRIOV_CTRL, ctrl);
882 
883 	for (i = 0; i < PCI_SRIOV_NUM_BARS; i++)
884 		pci_update_resource(dev, i + PCI_IOV_RESOURCES);
885 
886 	pci_write_config_dword(dev, iov->pos + PCI_SRIOV_SYS_PGSIZE, iov->pgsz);
887 	pci_iov_set_numvfs(dev, iov->num_VFs);
888 	pci_write_config_word(dev, iov->pos + PCI_SRIOV_CTRL, iov->ctrl);
889 	if (iov->ctrl & PCI_SRIOV_CTRL_VFE)
890 		msleep(100);
891 }
892 
893 /**
894  * pci_iov_init - initialize the IOV capability
895  * @dev: the PCI device
896  *
897  * Returns 0 on success, or negative on failure.
898  */
899 int pci_iov_init(struct pci_dev *dev)
900 {
901 	int pos;
902 
903 	if (!pci_is_pcie(dev))
904 		return -ENODEV;
905 
906 	pos = pci_find_ext_capability(dev, PCI_EXT_CAP_ID_SRIOV);
907 	if (pos)
908 		return sriov_init(dev, pos);
909 
910 	return -ENODEV;
911 }
912 
913 /**
914  * pci_iov_release - release resources used by the IOV capability
915  * @dev: the PCI device
916  */
917 void pci_iov_release(struct pci_dev *dev)
918 {
919 	if (dev->is_physfn)
920 		sriov_release(dev);
921 }
922 
923 /**
924  * pci_iov_remove - clean up SR-IOV state after PF driver is detached
925  * @dev: the PCI device
926  */
927 void pci_iov_remove(struct pci_dev *dev)
928 {
929 	struct pci_sriov *iov = dev->sriov;
930 
931 	if (!dev->is_physfn)
932 		return;
933 
934 	iov->driver_max_VFs = iov->total_VFs;
935 	if (iov->num_VFs)
936 		pci_warn(dev, "driver left SR-IOV enabled after remove\n");
937 }
938 
939 /**
940  * pci_iov_update_resource - update a VF BAR
941  * @dev: the PCI device
942  * @resno: the resource number
943  *
944  * Update a VF BAR in the SR-IOV capability of a PF.
945  */
946 void pci_iov_update_resource(struct pci_dev *dev, int resno)
947 {
948 	struct pci_sriov *iov = dev->is_physfn ? dev->sriov : NULL;
949 	struct resource *res = dev->resource + resno;
950 	int vf_bar = resno - PCI_IOV_RESOURCES;
951 	struct pci_bus_region region;
952 	u16 cmd;
953 	u32 new;
954 	int reg;
955 
956 	/*
957 	 * The generic pci_restore_bars() path calls this for all devices,
958 	 * including VFs and non-SR-IOV devices.  If this is not a PF, we
959 	 * have nothing to do.
960 	 */
961 	if (!iov)
962 		return;
963 
964 	pci_read_config_word(dev, iov->pos + PCI_SRIOV_CTRL, &cmd);
965 	if ((cmd & PCI_SRIOV_CTRL_VFE) && (cmd & PCI_SRIOV_CTRL_MSE)) {
966 		dev_WARN(&dev->dev, "can't update enabled VF BAR%d %pR\n",
967 			 vf_bar, res);
968 		return;
969 	}
970 
971 	/*
972 	 * Ignore unimplemented BARs, unused resource slots for 64-bit
973 	 * BARs, and non-movable resources, e.g., those described via
974 	 * Enhanced Allocation.
975 	 */
976 	if (!res->flags)
977 		return;
978 
979 	if (res->flags & IORESOURCE_UNSET)
980 		return;
981 
982 	if (res->flags & IORESOURCE_PCI_FIXED)
983 		return;
984 
985 	pcibios_resource_to_bus(dev->bus, &region, res);
986 	new = region.start;
987 	new |= res->flags & ~PCI_BASE_ADDRESS_MEM_MASK;
988 
989 	reg = iov->pos + PCI_SRIOV_BAR + 4 * vf_bar;
990 	pci_write_config_dword(dev, reg, new);
991 	if (res->flags & IORESOURCE_MEM_64) {
992 		new = region.start >> 16 >> 16;
993 		pci_write_config_dword(dev, reg + 4, new);
994 	}
995 }
996 
997 resource_size_t __weak pcibios_iov_resource_alignment(struct pci_dev *dev,
998 						      int resno)
999 {
1000 	return pci_iov_resource_size(dev, resno);
1001 }
1002 
1003 /**
1004  * pci_sriov_resource_alignment - get resource alignment for VF BAR
1005  * @dev: the PCI device
1006  * @resno: the resource number
1007  *
1008  * Returns the alignment of the VF BAR found in the SR-IOV capability.
1009  * This is not the same as the resource size which is defined as
1010  * the VF BAR size multiplied by the number of VFs.  The alignment
1011  * is just the VF BAR size.
1012  */
1013 resource_size_t pci_sriov_resource_alignment(struct pci_dev *dev, int resno)
1014 {
1015 	return pcibios_iov_resource_alignment(dev, resno);
1016 }
1017 
1018 /**
1019  * pci_restore_iov_state - restore the state of the IOV capability
1020  * @dev: the PCI device
1021  */
1022 void pci_restore_iov_state(struct pci_dev *dev)
1023 {
1024 	if (dev->is_physfn)
1025 		sriov_restore_state(dev);
1026 }
1027 
1028 /**
1029  * pci_vf_drivers_autoprobe - set PF property drivers_autoprobe for VFs
1030  * @dev: the PCI device
1031  * @auto_probe: set VF drivers auto probe flag
1032  */
1033 void pci_vf_drivers_autoprobe(struct pci_dev *dev, bool auto_probe)
1034 {
1035 	if (dev->is_physfn)
1036 		dev->sriov->drivers_autoprobe = auto_probe;
1037 }
1038 
1039 /**
1040  * pci_iov_bus_range - find bus range used by Virtual Function
1041  * @bus: the PCI bus
1042  *
1043  * Returns max number of buses (exclude current one) used by Virtual
1044  * Functions.
1045  */
1046 int pci_iov_bus_range(struct pci_bus *bus)
1047 {
1048 	int max = 0;
1049 	struct pci_dev *dev;
1050 
1051 	list_for_each_entry(dev, &bus->devices, bus_list) {
1052 		if (!dev->is_physfn)
1053 			continue;
1054 		if (dev->sriov->max_VF_buses > max)
1055 			max = dev->sriov->max_VF_buses;
1056 	}
1057 
1058 	return max ? max - bus->number : 0;
1059 }
1060 
1061 /**
1062  * pci_enable_sriov - enable the SR-IOV capability
1063  * @dev: the PCI device
1064  * @nr_virtfn: number of virtual functions to enable
1065  *
1066  * Returns 0 on success, or negative on failure.
1067  */
1068 int pci_enable_sriov(struct pci_dev *dev, int nr_virtfn)
1069 {
1070 	might_sleep();
1071 
1072 	if (!dev->is_physfn)
1073 		return -ENOSYS;
1074 
1075 	return sriov_enable(dev, nr_virtfn);
1076 }
1077 EXPORT_SYMBOL_GPL(pci_enable_sriov);
1078 
1079 /**
1080  * pci_disable_sriov - disable the SR-IOV capability
1081  * @dev: the PCI device
1082  */
1083 void pci_disable_sriov(struct pci_dev *dev)
1084 {
1085 	might_sleep();
1086 
1087 	if (!dev->is_physfn)
1088 		return;
1089 
1090 	sriov_disable(dev);
1091 }
1092 EXPORT_SYMBOL_GPL(pci_disable_sriov);
1093 
1094 /**
1095  * pci_num_vf - return number of VFs associated with a PF device_release_driver
1096  * @dev: the PCI device
1097  *
1098  * Returns number of VFs, or 0 if SR-IOV is not enabled.
1099  */
1100 int pci_num_vf(struct pci_dev *dev)
1101 {
1102 	if (!dev->is_physfn)
1103 		return 0;
1104 
1105 	return dev->sriov->num_VFs;
1106 }
1107 EXPORT_SYMBOL_GPL(pci_num_vf);
1108 
1109 /**
1110  * pci_vfs_assigned - returns number of VFs are assigned to a guest
1111  * @dev: the PCI device
1112  *
1113  * Returns number of VFs belonging to this device that are assigned to a guest.
1114  * If device is not a physical function returns 0.
1115  */
1116 int pci_vfs_assigned(struct pci_dev *dev)
1117 {
1118 	struct pci_dev *vfdev;
1119 	unsigned int vfs_assigned = 0;
1120 	unsigned short dev_id;
1121 
1122 	/* only search if we are a PF */
1123 	if (!dev->is_physfn)
1124 		return 0;
1125 
1126 	/*
1127 	 * determine the device ID for the VFs, the vendor ID will be the
1128 	 * same as the PF so there is no need to check for that one
1129 	 */
1130 	dev_id = dev->sriov->vf_device;
1131 
1132 	/* loop through all the VFs to see if we own any that are assigned */
1133 	vfdev = pci_get_device(dev->vendor, dev_id, NULL);
1134 	while (vfdev) {
1135 		/*
1136 		 * It is considered assigned if it is a virtual function with
1137 		 * our dev as the physical function and the assigned bit is set
1138 		 */
1139 		if (vfdev->is_virtfn && (vfdev->physfn == dev) &&
1140 			pci_is_dev_assigned(vfdev))
1141 			vfs_assigned++;
1142 
1143 		vfdev = pci_get_device(dev->vendor, dev_id, vfdev);
1144 	}
1145 
1146 	return vfs_assigned;
1147 }
1148 EXPORT_SYMBOL_GPL(pci_vfs_assigned);
1149 
1150 /**
1151  * pci_sriov_set_totalvfs -- reduce the TotalVFs available
1152  * @dev: the PCI PF device
1153  * @numvfs: number that should be used for TotalVFs supported
1154  *
1155  * Should be called from PF driver's probe routine with
1156  * device's mutex held.
1157  *
1158  * Returns 0 if PF is an SRIOV-capable device and
1159  * value of numvfs valid. If not a PF return -ENOSYS;
1160  * if numvfs is invalid return -EINVAL;
1161  * if VFs already enabled, return -EBUSY.
1162  */
1163 int pci_sriov_set_totalvfs(struct pci_dev *dev, u16 numvfs)
1164 {
1165 	if (!dev->is_physfn)
1166 		return -ENOSYS;
1167 
1168 	if (numvfs > dev->sriov->total_VFs)
1169 		return -EINVAL;
1170 
1171 	/* Shouldn't change if VFs already enabled */
1172 	if (dev->sriov->ctrl & PCI_SRIOV_CTRL_VFE)
1173 		return -EBUSY;
1174 
1175 	dev->sriov->driver_max_VFs = numvfs;
1176 	return 0;
1177 }
1178 EXPORT_SYMBOL_GPL(pci_sriov_set_totalvfs);
1179 
1180 /**
1181  * pci_sriov_get_totalvfs -- get total VFs supported on this device
1182  * @dev: the PCI PF device
1183  *
1184  * For a PCIe device with SRIOV support, return the PCIe
1185  * SRIOV capability value of TotalVFs or the value of driver_max_VFs
1186  * if the driver reduced it.  Otherwise 0.
1187  */
1188 int pci_sriov_get_totalvfs(struct pci_dev *dev)
1189 {
1190 	if (!dev->is_physfn)
1191 		return 0;
1192 
1193 	return dev->sriov->driver_max_VFs;
1194 }
1195 EXPORT_SYMBOL_GPL(pci_sriov_get_totalvfs);
1196 
1197 /**
1198  * pci_sriov_configure_simple - helper to configure SR-IOV
1199  * @dev: the PCI device
1200  * @nr_virtfn: number of virtual functions to enable, 0 to disable
1201  *
1202  * Enable or disable SR-IOV for devices that don't require any PF setup
1203  * before enabling SR-IOV.  Return value is negative on error, or number of
1204  * VFs allocated on success.
1205  */
1206 int pci_sriov_configure_simple(struct pci_dev *dev, int nr_virtfn)
1207 {
1208 	int rc;
1209 
1210 	might_sleep();
1211 
1212 	if (!dev->is_physfn)
1213 		return -ENODEV;
1214 
1215 	if (pci_vfs_assigned(dev)) {
1216 		pci_warn(dev, "Cannot modify SR-IOV while VFs are assigned\n");
1217 		return -EPERM;
1218 	}
1219 
1220 	if (nr_virtfn == 0) {
1221 		sriov_disable(dev);
1222 		return 0;
1223 	}
1224 
1225 	rc = sriov_enable(dev, nr_virtfn);
1226 	if (rc < 0)
1227 		return rc;
1228 
1229 	return nr_virtfn;
1230 }
1231 EXPORT_SYMBOL_GPL(pci_sriov_configure_simple);
1232