1 // SPDX-License-Identifier: GPL-2.0 2 /* 3 * Copyright (C) 2014 Intel Corp. 4 * Author: Jiang Liu <jiang.liu@linux.intel.com> 5 * 6 * This file is licensed under GPLv2. 7 * 8 * This file contains common code to support Message Signaled Interrupts for 9 * PCI compatible and non PCI compatible devices. 10 */ 11 #include <linux/types.h> 12 #include <linux/device.h> 13 #include <linux/irq.h> 14 #include <linux/irqdomain.h> 15 #include <linux/msi.h> 16 #include <linux/slab.h> 17 #include <linux/sysfs.h> 18 #include <linux/pci.h> 19 20 #include "internals.h" 21 22 /** 23 * struct msi_ctrl - MSI internal management control structure 24 * @domid: ID of the domain on which management operations should be done 25 * @first: First (hardware) slot index to operate on 26 * @last: Last (hardware) slot index to operate on 27 * @nirqs: The number of Linux interrupts to allocate. Can be larger 28 * than the range due to PCI/multi-MSI. 29 */ 30 struct msi_ctrl { 31 unsigned int domid; 32 unsigned int first; 33 unsigned int last; 34 unsigned int nirqs; 35 }; 36 37 /* Invalid Xarray index which is outside of any searchable range */ 38 #define MSI_XA_MAX_INDEX (ULONG_MAX - 1) 39 /* The maximum domain size */ 40 #define MSI_XA_DOMAIN_SIZE (MSI_MAX_INDEX + 1) 41 42 static void msi_domain_free_locked(struct device *dev, struct msi_ctrl *ctrl); 43 static unsigned int msi_domain_get_hwsize(struct device *dev, unsigned int domid); 44 static inline int msi_sysfs_create_group(struct device *dev); 45 46 47 /** 48 * msi_alloc_desc - Allocate an initialized msi_desc 49 * @dev: Pointer to the device for which this is allocated 50 * @nvec: The number of vectors used in this entry 51 * @affinity: Optional pointer to an affinity mask array size of @nvec 52 * 53 * If @affinity is not %NULL then an affinity array[@nvec] is allocated 54 * and the affinity masks and flags from @affinity are copied. 55 * 56 * Return: pointer to allocated &msi_desc on success or %NULL on failure 57 */ 58 static struct msi_desc *msi_alloc_desc(struct device *dev, int nvec, 59 const struct irq_affinity_desc *affinity) 60 { 61 struct msi_desc *desc = kzalloc(sizeof(*desc), GFP_KERNEL); 62 63 if (!desc) 64 return NULL; 65 66 desc->dev = dev; 67 desc->nvec_used = nvec; 68 if (affinity) { 69 desc->affinity = kmemdup(affinity, nvec * sizeof(*desc->affinity), GFP_KERNEL); 70 if (!desc->affinity) { 71 kfree(desc); 72 return NULL; 73 } 74 } 75 return desc; 76 } 77 78 static void msi_free_desc(struct msi_desc *desc) 79 { 80 kfree(desc->affinity); 81 kfree(desc); 82 } 83 84 static int msi_insert_desc(struct device *dev, struct msi_desc *desc, 85 unsigned int domid, unsigned int index) 86 { 87 struct msi_device_data *md = dev->msi.data; 88 struct xarray *xa = &md->__domains[domid].store; 89 unsigned int hwsize; 90 int ret; 91 92 hwsize = msi_domain_get_hwsize(dev, domid); 93 94 if (index == MSI_ANY_INDEX) { 95 struct xa_limit limit = { .min = 0, .max = hwsize - 1 }; 96 unsigned int index; 97 98 /* Let the xarray allocate a free index within the limit */ 99 ret = xa_alloc(xa, &index, desc, limit, GFP_KERNEL); 100 if (ret) 101 goto fail; 102 103 desc->msi_index = index; 104 return 0; 105 } else { 106 if (index >= hwsize) { 107 ret = -ERANGE; 108 goto fail; 109 } 110 111 desc->msi_index = index; 112 ret = xa_insert(xa, index, desc, GFP_KERNEL); 113 if (ret) 114 goto fail; 115 return 0; 116 } 117 fail: 118 msi_free_desc(desc); 119 return ret; 120 } 121 122 /** 123 * msi_domain_insert_msi_desc - Allocate and initialize a MSI descriptor and 124 * insert it at @init_desc->msi_index 125 * 126 * @dev: Pointer to the device for which the descriptor is allocated 127 * @domid: The id of the interrupt domain to which the desriptor is added 128 * @init_desc: Pointer to an MSI descriptor to initialize the new descriptor 129 * 130 * Return: 0 on success or an appropriate failure code. 131 */ 132 int msi_domain_insert_msi_desc(struct device *dev, unsigned int domid, 133 struct msi_desc *init_desc) 134 { 135 struct msi_desc *desc; 136 137 lockdep_assert_held(&dev->msi.data->mutex); 138 139 desc = msi_alloc_desc(dev, init_desc->nvec_used, init_desc->affinity); 140 if (!desc) 141 return -ENOMEM; 142 143 /* Copy type specific data to the new descriptor. */ 144 desc->pci = init_desc->pci; 145 146 return msi_insert_desc(dev, desc, domid, init_desc->msi_index); 147 } 148 149 static bool msi_desc_match(struct msi_desc *desc, enum msi_desc_filter filter) 150 { 151 switch (filter) { 152 case MSI_DESC_ALL: 153 return true; 154 case MSI_DESC_NOTASSOCIATED: 155 return !desc->irq; 156 case MSI_DESC_ASSOCIATED: 157 return !!desc->irq; 158 } 159 WARN_ON_ONCE(1); 160 return false; 161 } 162 163 static bool msi_ctrl_valid(struct device *dev, struct msi_ctrl *ctrl) 164 { 165 unsigned int hwsize; 166 167 if (WARN_ON_ONCE(ctrl->domid >= MSI_MAX_DEVICE_IRQDOMAINS || 168 (dev->msi.domain && 169 !dev->msi.data->__domains[ctrl->domid].domain))) 170 return false; 171 172 hwsize = msi_domain_get_hwsize(dev, ctrl->domid); 173 if (WARN_ON_ONCE(ctrl->first > ctrl->last || 174 ctrl->first >= hwsize || 175 ctrl->last >= hwsize)) 176 return false; 177 return true; 178 } 179 180 static void msi_domain_free_descs(struct device *dev, struct msi_ctrl *ctrl) 181 { 182 struct msi_desc *desc; 183 struct xarray *xa; 184 unsigned long idx; 185 186 lockdep_assert_held(&dev->msi.data->mutex); 187 188 if (!msi_ctrl_valid(dev, ctrl)) 189 return; 190 191 xa = &dev->msi.data->__domains[ctrl->domid].store; 192 xa_for_each_range(xa, idx, desc, ctrl->first, ctrl->last) { 193 xa_erase(xa, idx); 194 195 /* Leak the descriptor when it is still referenced */ 196 if (WARN_ON_ONCE(msi_desc_match(desc, MSI_DESC_ASSOCIATED))) 197 continue; 198 msi_free_desc(desc); 199 } 200 } 201 202 /** 203 * msi_domain_free_msi_descs_range - Free a range of MSI descriptors of a device in an irqdomain 204 * @dev: Device for which to free the descriptors 205 * @domid: Id of the domain to operate on 206 * @first: Index to start freeing from (inclusive) 207 * @last: Last index to be freed (inclusive) 208 */ 209 void msi_domain_free_msi_descs_range(struct device *dev, unsigned int domid, 210 unsigned int first, unsigned int last) 211 { 212 struct msi_ctrl ctrl = { 213 .domid = domid, 214 .first = first, 215 .last = last, 216 }; 217 218 msi_domain_free_descs(dev, &ctrl); 219 } 220 221 /** 222 * msi_domain_add_simple_msi_descs - Allocate and initialize MSI descriptors 223 * @dev: Pointer to the device for which the descriptors are allocated 224 * @ctrl: Allocation control struct 225 * 226 * Return: 0 on success or an appropriate failure code. 227 */ 228 static int msi_domain_add_simple_msi_descs(struct device *dev, struct msi_ctrl *ctrl) 229 { 230 struct msi_desc *desc; 231 unsigned int idx; 232 int ret; 233 234 lockdep_assert_held(&dev->msi.data->mutex); 235 236 if (!msi_ctrl_valid(dev, ctrl)) 237 return -EINVAL; 238 239 for (idx = ctrl->first; idx <= ctrl->last; idx++) { 240 desc = msi_alloc_desc(dev, 1, NULL); 241 if (!desc) 242 goto fail_mem; 243 ret = msi_insert_desc(dev, desc, ctrl->domid, idx); 244 if (ret) 245 goto fail; 246 } 247 return 0; 248 249 fail_mem: 250 ret = -ENOMEM; 251 fail: 252 msi_domain_free_descs(dev, ctrl); 253 return ret; 254 } 255 256 void __get_cached_msi_msg(struct msi_desc *entry, struct msi_msg *msg) 257 { 258 *msg = entry->msg; 259 } 260 261 void get_cached_msi_msg(unsigned int irq, struct msi_msg *msg) 262 { 263 struct msi_desc *entry = irq_get_msi_desc(irq); 264 265 __get_cached_msi_msg(entry, msg); 266 } 267 EXPORT_SYMBOL_GPL(get_cached_msi_msg); 268 269 static void msi_device_data_release(struct device *dev, void *res) 270 { 271 struct msi_device_data *md = res; 272 int i; 273 274 for (i = 0; i < MSI_MAX_DEVICE_IRQDOMAINS; i++) { 275 msi_remove_device_irq_domain(dev, i); 276 WARN_ON_ONCE(!xa_empty(&md->__domains[i].store)); 277 xa_destroy(&md->__domains[i].store); 278 } 279 dev->msi.data = NULL; 280 } 281 282 /** 283 * msi_setup_device_data - Setup MSI device data 284 * @dev: Device for which MSI device data should be set up 285 * 286 * Return: 0 on success, appropriate error code otherwise 287 * 288 * This can be called more than once for @dev. If the MSI device data is 289 * already allocated the call succeeds. The allocated memory is 290 * automatically released when the device is destroyed. 291 */ 292 int msi_setup_device_data(struct device *dev) 293 { 294 struct msi_device_data *md; 295 int ret, i; 296 297 if (dev->msi.data) 298 return 0; 299 300 md = devres_alloc(msi_device_data_release, sizeof(*md), GFP_KERNEL); 301 if (!md) 302 return -ENOMEM; 303 304 ret = msi_sysfs_create_group(dev); 305 if (ret) { 306 devres_free(md); 307 return ret; 308 } 309 310 for (i = 0; i < MSI_MAX_DEVICE_IRQDOMAINS; i++) 311 xa_init_flags(&md->__domains[i].store, XA_FLAGS_ALLOC); 312 313 /* 314 * If @dev::msi::domain is set and is a global MSI domain, copy the 315 * pointer into the domain array so all code can operate on domain 316 * ids. The NULL pointer check is required to keep the legacy 317 * architecture specific PCI/MSI support working. 318 */ 319 if (dev->msi.domain && !irq_domain_is_msi_parent(dev->msi.domain)) 320 md->__domains[MSI_DEFAULT_DOMAIN].domain = dev->msi.domain; 321 322 mutex_init(&md->mutex); 323 dev->msi.data = md; 324 devres_add(dev, md); 325 return 0; 326 } 327 328 /** 329 * msi_lock_descs - Lock the MSI descriptor storage of a device 330 * @dev: Device to operate on 331 */ 332 void msi_lock_descs(struct device *dev) 333 { 334 mutex_lock(&dev->msi.data->mutex); 335 } 336 EXPORT_SYMBOL_GPL(msi_lock_descs); 337 338 /** 339 * msi_unlock_descs - Unlock the MSI descriptor storage of a device 340 * @dev: Device to operate on 341 */ 342 void msi_unlock_descs(struct device *dev) 343 { 344 /* Invalidate the index which was cached by the iterator */ 345 dev->msi.data->__iter_idx = MSI_XA_MAX_INDEX; 346 mutex_unlock(&dev->msi.data->mutex); 347 } 348 EXPORT_SYMBOL_GPL(msi_unlock_descs); 349 350 static struct msi_desc *msi_find_desc(struct msi_device_data *md, unsigned int domid, 351 enum msi_desc_filter filter) 352 { 353 struct xarray *xa = &md->__domains[domid].store; 354 struct msi_desc *desc; 355 356 xa_for_each_start(xa, md->__iter_idx, desc, md->__iter_idx) { 357 if (msi_desc_match(desc, filter)) 358 return desc; 359 } 360 md->__iter_idx = MSI_XA_MAX_INDEX; 361 return NULL; 362 } 363 364 /** 365 * msi_domain_first_desc - Get the first MSI descriptor of an irqdomain associated to a device 366 * @dev: Device to operate on 367 * @domid: The id of the interrupt domain which should be walked. 368 * @filter: Descriptor state filter 369 * 370 * Must be called with the MSI descriptor mutex held, i.e. msi_lock_descs() 371 * must be invoked before the call. 372 * 373 * Return: Pointer to the first MSI descriptor matching the search 374 * criteria, NULL if none found. 375 */ 376 struct msi_desc *msi_domain_first_desc(struct device *dev, unsigned int domid, 377 enum msi_desc_filter filter) 378 { 379 struct msi_device_data *md = dev->msi.data; 380 381 if (WARN_ON_ONCE(!md || domid >= MSI_MAX_DEVICE_IRQDOMAINS)) 382 return NULL; 383 384 lockdep_assert_held(&md->mutex); 385 386 md->__iter_idx = 0; 387 return msi_find_desc(md, domid, filter); 388 } 389 EXPORT_SYMBOL_GPL(msi_domain_first_desc); 390 391 /** 392 * msi_next_desc - Get the next MSI descriptor of a device 393 * @dev: Device to operate on 394 * @domid: The id of the interrupt domain which should be walked. 395 * @filter: Descriptor state filter 396 * 397 * The first invocation of msi_next_desc() has to be preceeded by a 398 * successful invocation of __msi_first_desc(). Consecutive invocations are 399 * only valid if the previous one was successful. All these operations have 400 * to be done within the same MSI mutex held region. 401 * 402 * Return: Pointer to the next MSI descriptor matching the search 403 * criteria, NULL if none found. 404 */ 405 struct msi_desc *msi_next_desc(struct device *dev, unsigned int domid, 406 enum msi_desc_filter filter) 407 { 408 struct msi_device_data *md = dev->msi.data; 409 410 if (WARN_ON_ONCE(!md || domid >= MSI_MAX_DEVICE_IRQDOMAINS)) 411 return NULL; 412 413 lockdep_assert_held(&md->mutex); 414 415 if (md->__iter_idx >= (unsigned long)MSI_MAX_INDEX) 416 return NULL; 417 418 md->__iter_idx++; 419 return msi_find_desc(md, domid, filter); 420 } 421 EXPORT_SYMBOL_GPL(msi_next_desc); 422 423 /** 424 * msi_domain_get_virq - Lookup the Linux interrupt number for a MSI index on a interrupt domain 425 * @dev: Device to operate on 426 * @domid: Domain ID of the interrupt domain associated to the device 427 * @index: MSI interrupt index to look for (0-based) 428 * 429 * Return: The Linux interrupt number on success (> 0), 0 if not found 430 */ 431 unsigned int msi_domain_get_virq(struct device *dev, unsigned int domid, unsigned int index) 432 { 433 struct msi_desc *desc; 434 unsigned int ret = 0; 435 bool pcimsi = false; 436 struct xarray *xa; 437 438 if (!dev->msi.data) 439 return 0; 440 441 if (WARN_ON_ONCE(index > MSI_MAX_INDEX || domid >= MSI_MAX_DEVICE_IRQDOMAINS)) 442 return 0; 443 444 /* This check is only valid for the PCI default MSI domain */ 445 if (dev_is_pci(dev) && domid == MSI_DEFAULT_DOMAIN) 446 pcimsi = to_pci_dev(dev)->msi_enabled; 447 448 msi_lock_descs(dev); 449 xa = &dev->msi.data->__domains[domid].store; 450 desc = xa_load(xa, pcimsi ? 0 : index); 451 if (desc && desc->irq) { 452 /* 453 * PCI-MSI has only one descriptor for multiple interrupts. 454 * PCI-MSIX and platform MSI use a descriptor per 455 * interrupt. 456 */ 457 if (pcimsi) { 458 if (index < desc->nvec_used) 459 ret = desc->irq + index; 460 } else { 461 ret = desc->irq; 462 } 463 } 464 465 msi_unlock_descs(dev); 466 return ret; 467 } 468 EXPORT_SYMBOL_GPL(msi_domain_get_virq); 469 470 #ifdef CONFIG_SYSFS 471 static struct attribute *msi_dev_attrs[] = { 472 NULL 473 }; 474 475 static const struct attribute_group msi_irqs_group = { 476 .name = "msi_irqs", 477 .attrs = msi_dev_attrs, 478 }; 479 480 static inline int msi_sysfs_create_group(struct device *dev) 481 { 482 return devm_device_add_group(dev, &msi_irqs_group); 483 } 484 485 static ssize_t msi_mode_show(struct device *dev, struct device_attribute *attr, 486 char *buf) 487 { 488 /* MSI vs. MSIX is per device not per interrupt */ 489 bool is_msix = dev_is_pci(dev) ? to_pci_dev(dev)->msix_enabled : false; 490 491 return sysfs_emit(buf, "%s\n", is_msix ? "msix" : "msi"); 492 } 493 494 static void msi_sysfs_remove_desc(struct device *dev, struct msi_desc *desc) 495 { 496 struct device_attribute *attrs = desc->sysfs_attrs; 497 int i; 498 499 if (!attrs) 500 return; 501 502 desc->sysfs_attrs = NULL; 503 for (i = 0; i < desc->nvec_used; i++) { 504 if (attrs[i].show) 505 sysfs_remove_file_from_group(&dev->kobj, &attrs[i].attr, msi_irqs_group.name); 506 kfree(attrs[i].attr.name); 507 } 508 kfree(attrs); 509 } 510 511 static int msi_sysfs_populate_desc(struct device *dev, struct msi_desc *desc) 512 { 513 struct device_attribute *attrs; 514 int ret, i; 515 516 attrs = kcalloc(desc->nvec_used, sizeof(*attrs), GFP_KERNEL); 517 if (!attrs) 518 return -ENOMEM; 519 520 desc->sysfs_attrs = attrs; 521 for (i = 0; i < desc->nvec_used; i++) { 522 sysfs_attr_init(&attrs[i].attr); 523 attrs[i].attr.name = kasprintf(GFP_KERNEL, "%d", desc->irq + i); 524 if (!attrs[i].attr.name) { 525 ret = -ENOMEM; 526 goto fail; 527 } 528 529 attrs[i].attr.mode = 0444; 530 attrs[i].show = msi_mode_show; 531 532 ret = sysfs_add_file_to_group(&dev->kobj, &attrs[i].attr, msi_irqs_group.name); 533 if (ret) { 534 attrs[i].show = NULL; 535 goto fail; 536 } 537 } 538 return 0; 539 540 fail: 541 msi_sysfs_remove_desc(dev, desc); 542 return ret; 543 } 544 545 #if defined(CONFIG_PCI_MSI_ARCH_FALLBACKS) || defined(CONFIG_PCI_XEN) 546 /** 547 * msi_device_populate_sysfs - Populate msi_irqs sysfs entries for a device 548 * @dev: The device (PCI, platform etc) which will get sysfs entries 549 */ 550 int msi_device_populate_sysfs(struct device *dev) 551 { 552 struct msi_desc *desc; 553 int ret; 554 555 msi_for_each_desc(desc, dev, MSI_DESC_ASSOCIATED) { 556 if (desc->sysfs_attrs) 557 continue; 558 ret = msi_sysfs_populate_desc(dev, desc); 559 if (ret) 560 return ret; 561 } 562 return 0; 563 } 564 565 /** 566 * msi_device_destroy_sysfs - Destroy msi_irqs sysfs entries for a device 567 * @dev: The device (PCI, platform etc) for which to remove 568 * sysfs entries 569 */ 570 void msi_device_destroy_sysfs(struct device *dev) 571 { 572 struct msi_desc *desc; 573 574 msi_for_each_desc(desc, dev, MSI_DESC_ALL) 575 msi_sysfs_remove_desc(dev, desc); 576 } 577 #endif /* CONFIG_PCI_MSI_ARCH_FALLBACK || CONFIG_PCI_XEN */ 578 #else /* CONFIG_SYSFS */ 579 static inline int msi_sysfs_create_group(struct device *dev) { return 0; } 580 static inline int msi_sysfs_populate_desc(struct device *dev, struct msi_desc *desc) { return 0; } 581 static inline void msi_sysfs_remove_desc(struct device *dev, struct msi_desc *desc) { } 582 #endif /* !CONFIG_SYSFS */ 583 584 static struct irq_domain *msi_get_device_domain(struct device *dev, unsigned int domid) 585 { 586 struct irq_domain *domain; 587 588 lockdep_assert_held(&dev->msi.data->mutex); 589 590 if (WARN_ON_ONCE(domid >= MSI_MAX_DEVICE_IRQDOMAINS)) 591 return NULL; 592 593 domain = dev->msi.data->__domains[domid].domain; 594 if (!domain) 595 return NULL; 596 597 if (WARN_ON_ONCE(irq_domain_is_msi_parent(domain))) 598 return NULL; 599 600 return domain; 601 } 602 603 static unsigned int msi_domain_get_hwsize(struct device *dev, unsigned int domid) 604 { 605 struct msi_domain_info *info; 606 struct irq_domain *domain; 607 608 domain = msi_get_device_domain(dev, domid); 609 if (domain) { 610 info = domain->host_data; 611 return info->hwsize; 612 } 613 /* No domain, default to MSI_XA_DOMAIN_SIZE */ 614 return MSI_XA_DOMAIN_SIZE; 615 } 616 617 static inline void irq_chip_write_msi_msg(struct irq_data *data, 618 struct msi_msg *msg) 619 { 620 data->chip->irq_write_msi_msg(data, msg); 621 } 622 623 static void msi_check_level(struct irq_domain *domain, struct msi_msg *msg) 624 { 625 struct msi_domain_info *info = domain->host_data; 626 627 /* 628 * If the MSI provider has messed with the second message and 629 * not advertized that it is level-capable, signal the breakage. 630 */ 631 WARN_ON(!((info->flags & MSI_FLAG_LEVEL_CAPABLE) && 632 (info->chip->flags & IRQCHIP_SUPPORTS_LEVEL_MSI)) && 633 (msg[1].address_lo || msg[1].address_hi || msg[1].data)); 634 } 635 636 /** 637 * msi_domain_set_affinity - Generic affinity setter function for MSI domains 638 * @irq_data: The irq data associated to the interrupt 639 * @mask: The affinity mask to set 640 * @force: Flag to enforce setting (disable online checks) 641 * 642 * Intended to be used by MSI interrupt controllers which are 643 * implemented with hierarchical domains. 644 * 645 * Return: IRQ_SET_MASK_* result code 646 */ 647 int msi_domain_set_affinity(struct irq_data *irq_data, 648 const struct cpumask *mask, bool force) 649 { 650 struct irq_data *parent = irq_data->parent_data; 651 struct msi_msg msg[2] = { [1] = { }, }; 652 int ret; 653 654 ret = parent->chip->irq_set_affinity(parent, mask, force); 655 if (ret >= 0 && ret != IRQ_SET_MASK_OK_DONE) { 656 BUG_ON(irq_chip_compose_msi_msg(irq_data, msg)); 657 msi_check_level(irq_data->domain, msg); 658 irq_chip_write_msi_msg(irq_data, msg); 659 } 660 661 return ret; 662 } 663 664 static int msi_domain_activate(struct irq_domain *domain, 665 struct irq_data *irq_data, bool early) 666 { 667 struct msi_msg msg[2] = { [1] = { }, }; 668 669 BUG_ON(irq_chip_compose_msi_msg(irq_data, msg)); 670 msi_check_level(irq_data->domain, msg); 671 irq_chip_write_msi_msg(irq_data, msg); 672 return 0; 673 } 674 675 static void msi_domain_deactivate(struct irq_domain *domain, 676 struct irq_data *irq_data) 677 { 678 struct msi_msg msg[2]; 679 680 memset(msg, 0, sizeof(msg)); 681 irq_chip_write_msi_msg(irq_data, msg); 682 } 683 684 static int msi_domain_alloc(struct irq_domain *domain, unsigned int virq, 685 unsigned int nr_irqs, void *arg) 686 { 687 struct msi_domain_info *info = domain->host_data; 688 struct msi_domain_ops *ops = info->ops; 689 irq_hw_number_t hwirq = ops->get_hwirq(info, arg); 690 int i, ret; 691 692 if (irq_find_mapping(domain, hwirq) > 0) 693 return -EEXIST; 694 695 if (domain->parent) { 696 ret = irq_domain_alloc_irqs_parent(domain, virq, nr_irqs, arg); 697 if (ret < 0) 698 return ret; 699 } 700 701 for (i = 0; i < nr_irqs; i++) { 702 ret = ops->msi_init(domain, info, virq + i, hwirq + i, arg); 703 if (ret < 0) { 704 if (ops->msi_free) { 705 for (i--; i > 0; i--) 706 ops->msi_free(domain, info, virq + i); 707 } 708 irq_domain_free_irqs_top(domain, virq, nr_irqs); 709 return ret; 710 } 711 } 712 713 return 0; 714 } 715 716 static void msi_domain_free(struct irq_domain *domain, unsigned int virq, 717 unsigned int nr_irqs) 718 { 719 struct msi_domain_info *info = domain->host_data; 720 int i; 721 722 if (info->ops->msi_free) { 723 for (i = 0; i < nr_irqs; i++) 724 info->ops->msi_free(domain, info, virq + i); 725 } 726 irq_domain_free_irqs_top(domain, virq, nr_irqs); 727 } 728 729 static int msi_domain_translate(struct irq_domain *domain, struct irq_fwspec *fwspec, 730 irq_hw_number_t *hwirq, unsigned int *type) 731 { 732 struct msi_domain_info *info = domain->host_data; 733 734 /* 735 * This will catch allocations through the regular irqdomain path except 736 * for MSI domains which really support this, e.g. MBIGEN. 737 */ 738 if (!info->ops->msi_translate) 739 return -ENOTSUPP; 740 return info->ops->msi_translate(domain, fwspec, hwirq, type); 741 } 742 743 static const struct irq_domain_ops msi_domain_ops = { 744 .alloc = msi_domain_alloc, 745 .free = msi_domain_free, 746 .activate = msi_domain_activate, 747 .deactivate = msi_domain_deactivate, 748 .translate = msi_domain_translate, 749 }; 750 751 static irq_hw_number_t msi_domain_ops_get_hwirq(struct msi_domain_info *info, 752 msi_alloc_info_t *arg) 753 { 754 return arg->hwirq; 755 } 756 757 static int msi_domain_ops_prepare(struct irq_domain *domain, struct device *dev, 758 int nvec, msi_alloc_info_t *arg) 759 { 760 memset(arg, 0, sizeof(*arg)); 761 return 0; 762 } 763 764 static void msi_domain_ops_set_desc(msi_alloc_info_t *arg, 765 struct msi_desc *desc) 766 { 767 arg->desc = desc; 768 } 769 770 static int msi_domain_ops_init(struct irq_domain *domain, 771 struct msi_domain_info *info, 772 unsigned int virq, irq_hw_number_t hwirq, 773 msi_alloc_info_t *arg) 774 { 775 irq_domain_set_hwirq_and_chip(domain, virq, hwirq, info->chip, 776 info->chip_data); 777 if (info->handler && info->handler_name) { 778 __irq_set_handler(virq, info->handler, 0, info->handler_name); 779 if (info->handler_data) 780 irq_set_handler_data(virq, info->handler_data); 781 } 782 return 0; 783 } 784 785 static struct msi_domain_ops msi_domain_ops_default = { 786 .get_hwirq = msi_domain_ops_get_hwirq, 787 .msi_init = msi_domain_ops_init, 788 .msi_prepare = msi_domain_ops_prepare, 789 .set_desc = msi_domain_ops_set_desc, 790 }; 791 792 static void msi_domain_update_dom_ops(struct msi_domain_info *info) 793 { 794 struct msi_domain_ops *ops = info->ops; 795 796 if (ops == NULL) { 797 info->ops = &msi_domain_ops_default; 798 return; 799 } 800 801 if (!(info->flags & MSI_FLAG_USE_DEF_DOM_OPS)) 802 return; 803 804 if (ops->get_hwirq == NULL) 805 ops->get_hwirq = msi_domain_ops_default.get_hwirq; 806 if (ops->msi_init == NULL) 807 ops->msi_init = msi_domain_ops_default.msi_init; 808 if (ops->msi_prepare == NULL) 809 ops->msi_prepare = msi_domain_ops_default.msi_prepare; 810 if (ops->set_desc == NULL) 811 ops->set_desc = msi_domain_ops_default.set_desc; 812 } 813 814 static void msi_domain_update_chip_ops(struct msi_domain_info *info) 815 { 816 struct irq_chip *chip = info->chip; 817 818 BUG_ON(!chip || !chip->irq_mask || !chip->irq_unmask); 819 if (!chip->irq_set_affinity) 820 chip->irq_set_affinity = msi_domain_set_affinity; 821 } 822 823 static struct irq_domain *__msi_create_irq_domain(struct fwnode_handle *fwnode, 824 struct msi_domain_info *info, 825 unsigned int flags, 826 struct irq_domain *parent) 827 { 828 struct irq_domain *domain; 829 830 if (info->hwsize > MSI_XA_DOMAIN_SIZE) 831 return NULL; 832 833 /* 834 * Hardware size 0 is valid for backwards compatibility and for 835 * domains which are not backed by a hardware table. Grant the 836 * maximum index space. 837 */ 838 if (!info->hwsize) 839 info->hwsize = MSI_XA_DOMAIN_SIZE; 840 841 msi_domain_update_dom_ops(info); 842 if (info->flags & MSI_FLAG_USE_DEF_CHIP_OPS) 843 msi_domain_update_chip_ops(info); 844 845 domain = irq_domain_create_hierarchy(parent, flags | IRQ_DOMAIN_FLAG_MSI, 0, 846 fwnode, &msi_domain_ops, info); 847 848 if (domain) { 849 irq_domain_update_bus_token(domain, info->bus_token); 850 if (info->flags & MSI_FLAG_PARENT_PM_DEV) 851 domain->pm_dev = parent->pm_dev; 852 } 853 854 return domain; 855 } 856 857 /** 858 * msi_create_irq_domain - Create an MSI interrupt domain 859 * @fwnode: Optional fwnode of the interrupt controller 860 * @info: MSI domain info 861 * @parent: Parent irq domain 862 * 863 * Return: pointer to the created &struct irq_domain or %NULL on failure 864 */ 865 struct irq_domain *msi_create_irq_domain(struct fwnode_handle *fwnode, 866 struct msi_domain_info *info, 867 struct irq_domain *parent) 868 { 869 return __msi_create_irq_domain(fwnode, info, 0, parent); 870 } 871 872 /** 873 * msi_parent_init_dev_msi_info - Delegate initialization of device MSI info down 874 * in the domain hierarchy 875 * @dev: The device for which the domain should be created 876 * @domain: The domain in the hierarchy this op is being called on 877 * @msi_parent_domain: The IRQ_DOMAIN_FLAG_MSI_PARENT domain for the child to 878 * be created 879 * @msi_child_info: The MSI domain info of the IRQ_DOMAIN_FLAG_MSI_DEVICE 880 * domain to be created 881 * 882 * Return: true on success, false otherwise 883 * 884 * This is the most complex problem of per device MSI domains and the 885 * underlying interrupt domain hierarchy: 886 * 887 * The device domain to be initialized requests the broadest feature set 888 * possible and the underlying domain hierarchy puts restrictions on it. 889 * 890 * That's trivial for a simple parent->child relationship, but it gets 891 * interesting with an intermediate domain: root->parent->child. The 892 * intermediate 'parent' can expand the capabilities which the 'root' 893 * domain is providing. So that creates a classic hen and egg problem: 894 * Which entity is doing the restrictions/expansions? 895 * 896 * One solution is to let the root domain handle the initialization that's 897 * why there is the @domain and the @msi_parent_domain pointer. 898 */ 899 bool msi_parent_init_dev_msi_info(struct device *dev, struct irq_domain *domain, 900 struct irq_domain *msi_parent_domain, 901 struct msi_domain_info *msi_child_info) 902 { 903 struct irq_domain *parent = domain->parent; 904 905 if (WARN_ON_ONCE(!parent || !parent->msi_parent_ops || 906 !parent->msi_parent_ops->init_dev_msi_info)) 907 return false; 908 909 return parent->msi_parent_ops->init_dev_msi_info(dev, parent, msi_parent_domain, 910 msi_child_info); 911 } 912 913 /** 914 * msi_create_device_irq_domain - Create a device MSI interrupt domain 915 * @dev: Pointer to the device 916 * @domid: Domain id 917 * @template: MSI domain info bundle used as template 918 * @hwsize: Maximum number of MSI table entries (0 if unknown or unlimited) 919 * @domain_data: Optional pointer to domain specific data which is set in 920 * msi_domain_info::data 921 * @chip_data: Optional pointer to chip specific data which is set in 922 * msi_domain_info::chip_data 923 * 924 * Return: True on success, false otherwise 925 * 926 * There is no firmware node required for this interface because the per 927 * device domains are software constructs which are actually closer to the 928 * hardware reality than any firmware can describe them. 929 * 930 * The domain name and the irq chip name for a MSI device domain are 931 * composed by: "$(PREFIX)$(CHIPNAME)-$(DEVNAME)" 932 * 933 * $PREFIX: Optional prefix provided by the underlying MSI parent domain 934 * via msi_parent_ops::prefix. If that pointer is NULL the prefix 935 * is empty. 936 * $CHIPNAME: The name of the irq_chip in @template 937 * $DEVNAME: The name of the device 938 * 939 * This results in understandable chip names and hardware interrupt numbers 940 * in e.g. /proc/interrupts 941 * 942 * PCI-MSI-0000:00:1c.0 0-edge Parent domain has no prefix 943 * IR-PCI-MSI-0000:00:1c.4 0-edge Same with interrupt remapping prefix 'IR-' 944 * 945 * IR-PCI-MSIX-0000:3d:00.0 0-edge Hardware interrupt numbers reflect 946 * IR-PCI-MSIX-0000:3d:00.0 1-edge the real MSI-X index on that device 947 * IR-PCI-MSIX-0000:3d:00.0 2-edge 948 * 949 * On IMS domains the hardware interrupt number is either a table entry 950 * index or a purely software managed index but it is guaranteed to be 951 * unique. 952 * 953 * The domain pointer is stored in @dev::msi::data::__irqdomains[]. All 954 * subsequent operations on the domain depend on the domain id. 955 * 956 * The domain is automatically freed when the device is removed via devres 957 * in the context of @dev::msi::data freeing, but it can also be 958 * independently removed via @msi_remove_device_irq_domain(). 959 */ 960 bool msi_create_device_irq_domain(struct device *dev, unsigned int domid, 961 const struct msi_domain_template *template, 962 unsigned int hwsize, void *domain_data, 963 void *chip_data) 964 { 965 struct irq_domain *domain, *parent = dev->msi.domain; 966 struct fwnode_handle *fwnode, *fwnalloced = NULL; 967 struct msi_domain_template *bundle; 968 const struct msi_parent_ops *pops; 969 970 if (!irq_domain_is_msi_parent(parent)) 971 return false; 972 973 if (domid >= MSI_MAX_DEVICE_IRQDOMAINS) 974 return false; 975 976 bundle = kmemdup(template, sizeof(*bundle), GFP_KERNEL); 977 if (!bundle) 978 return false; 979 980 bundle->info.hwsize = hwsize; 981 bundle->info.chip = &bundle->chip; 982 bundle->info.ops = &bundle->ops; 983 bundle->info.data = domain_data; 984 bundle->info.chip_data = chip_data; 985 986 pops = parent->msi_parent_ops; 987 snprintf(bundle->name, sizeof(bundle->name), "%s%s-%s", 988 pops->prefix ? : "", bundle->chip.name, dev_name(dev)); 989 bundle->chip.name = bundle->name; 990 991 /* 992 * Using the device firmware node is required for wire to MSI 993 * device domains so that the existing firmware results in a domain 994 * match. 995 * All other device domains like PCI/MSI use the named firmware 996 * node as they are not guaranteed to have a fwnode. They are never 997 * looked up and always handled in the context of the device. 998 */ 999 if (bundle->info.flags & MSI_FLAG_USE_DEV_FWNODE) 1000 fwnode = dev->fwnode; 1001 else 1002 fwnode = fwnalloced = irq_domain_alloc_named_fwnode(bundle->name); 1003 1004 if (!fwnode) 1005 goto free_bundle; 1006 1007 if (msi_setup_device_data(dev)) 1008 goto free_fwnode; 1009 1010 msi_lock_descs(dev); 1011 1012 if (WARN_ON_ONCE(msi_get_device_domain(dev, domid))) 1013 goto fail; 1014 1015 if (!pops->init_dev_msi_info(dev, parent, parent, &bundle->info)) 1016 goto fail; 1017 1018 domain = __msi_create_irq_domain(fwnode, &bundle->info, IRQ_DOMAIN_FLAG_MSI_DEVICE, parent); 1019 if (!domain) 1020 goto fail; 1021 1022 domain->dev = dev; 1023 dev->msi.data->__domains[domid].domain = domain; 1024 msi_unlock_descs(dev); 1025 return true; 1026 1027 fail: 1028 msi_unlock_descs(dev); 1029 free_fwnode: 1030 irq_domain_free_fwnode(fwnalloced); 1031 free_bundle: 1032 kfree(bundle); 1033 return false; 1034 } 1035 1036 /** 1037 * msi_remove_device_irq_domain - Free a device MSI interrupt domain 1038 * @dev: Pointer to the device 1039 * @domid: Domain id 1040 */ 1041 void msi_remove_device_irq_domain(struct device *dev, unsigned int domid) 1042 { 1043 struct fwnode_handle *fwnode = NULL; 1044 struct msi_domain_info *info; 1045 struct irq_domain *domain; 1046 1047 msi_lock_descs(dev); 1048 1049 domain = msi_get_device_domain(dev, domid); 1050 1051 if (!domain || !irq_domain_is_msi_device(domain)) 1052 goto unlock; 1053 1054 dev->msi.data->__domains[domid].domain = NULL; 1055 info = domain->host_data; 1056 if (irq_domain_is_msi_device(domain)) 1057 fwnode = domain->fwnode; 1058 irq_domain_remove(domain); 1059 irq_domain_free_fwnode(fwnode); 1060 kfree(container_of(info, struct msi_domain_template, info)); 1061 1062 unlock: 1063 msi_unlock_descs(dev); 1064 } 1065 1066 /** 1067 * msi_match_device_irq_domain - Match a device irq domain against a bus token 1068 * @dev: Pointer to the device 1069 * @domid: Domain id 1070 * @bus_token: Bus token to match against the domain bus token 1071 * 1072 * Return: True if device domain exists and bus tokens match. 1073 */ 1074 bool msi_match_device_irq_domain(struct device *dev, unsigned int domid, 1075 enum irq_domain_bus_token bus_token) 1076 { 1077 struct msi_domain_info *info; 1078 struct irq_domain *domain; 1079 bool ret = false; 1080 1081 msi_lock_descs(dev); 1082 domain = msi_get_device_domain(dev, domid); 1083 if (domain && irq_domain_is_msi_device(domain)) { 1084 info = domain->host_data; 1085 ret = info->bus_token == bus_token; 1086 } 1087 msi_unlock_descs(dev); 1088 return ret; 1089 } 1090 1091 int msi_domain_prepare_irqs(struct irq_domain *domain, struct device *dev, 1092 int nvec, msi_alloc_info_t *arg) 1093 { 1094 struct msi_domain_info *info = domain->host_data; 1095 struct msi_domain_ops *ops = info->ops; 1096 1097 return ops->msi_prepare(domain, dev, nvec, arg); 1098 } 1099 1100 int msi_domain_populate_irqs(struct irq_domain *domain, struct device *dev, 1101 int virq_base, int nvec, msi_alloc_info_t *arg) 1102 { 1103 struct msi_domain_info *info = domain->host_data; 1104 struct msi_domain_ops *ops = info->ops; 1105 struct msi_ctrl ctrl = { 1106 .domid = MSI_DEFAULT_DOMAIN, 1107 .first = virq_base, 1108 .last = virq_base + nvec - 1, 1109 }; 1110 struct msi_desc *desc; 1111 struct xarray *xa; 1112 int ret, virq; 1113 1114 msi_lock_descs(dev); 1115 1116 if (!msi_ctrl_valid(dev, &ctrl)) { 1117 ret = -EINVAL; 1118 goto unlock; 1119 } 1120 1121 ret = msi_domain_add_simple_msi_descs(dev, &ctrl); 1122 if (ret) 1123 goto unlock; 1124 1125 xa = &dev->msi.data->__domains[ctrl.domid].store; 1126 1127 for (virq = virq_base; virq < virq_base + nvec; virq++) { 1128 desc = xa_load(xa, virq); 1129 desc->irq = virq; 1130 1131 ops->set_desc(arg, desc); 1132 ret = irq_domain_alloc_irqs_hierarchy(domain, virq, 1, arg); 1133 if (ret) 1134 goto fail; 1135 1136 irq_set_msi_desc(virq, desc); 1137 } 1138 msi_unlock_descs(dev); 1139 return 0; 1140 1141 fail: 1142 for (--virq; virq >= virq_base; virq--) { 1143 msi_domain_depopulate_descs(dev, virq, 1); 1144 irq_domain_free_irqs_common(domain, virq, 1); 1145 } 1146 msi_domain_free_descs(dev, &ctrl); 1147 unlock: 1148 msi_unlock_descs(dev); 1149 return ret; 1150 } 1151 1152 void msi_domain_depopulate_descs(struct device *dev, int virq_base, int nvec) 1153 { 1154 struct msi_ctrl ctrl = { 1155 .domid = MSI_DEFAULT_DOMAIN, 1156 .first = virq_base, 1157 .last = virq_base + nvec - 1, 1158 }; 1159 struct msi_desc *desc; 1160 struct xarray *xa; 1161 unsigned long idx; 1162 1163 if (!msi_ctrl_valid(dev, &ctrl)) 1164 return; 1165 1166 xa = &dev->msi.data->__domains[ctrl.domid].store; 1167 xa_for_each_range(xa, idx, desc, ctrl.first, ctrl.last) 1168 desc->irq = 0; 1169 } 1170 1171 /* 1172 * Carefully check whether the device can use reservation mode. If 1173 * reservation mode is enabled then the early activation will assign a 1174 * dummy vector to the device. If the PCI/MSI device does not support 1175 * masking of the entry then this can result in spurious interrupts when 1176 * the device driver is not absolutely careful. But even then a malfunction 1177 * of the hardware could result in a spurious interrupt on the dummy vector 1178 * and render the device unusable. If the entry can be masked then the core 1179 * logic will prevent the spurious interrupt and reservation mode can be 1180 * used. For now reservation mode is restricted to PCI/MSI. 1181 */ 1182 static bool msi_check_reservation_mode(struct irq_domain *domain, 1183 struct msi_domain_info *info, 1184 struct device *dev) 1185 { 1186 struct msi_desc *desc; 1187 1188 switch(domain->bus_token) { 1189 case DOMAIN_BUS_PCI_MSI: 1190 case DOMAIN_BUS_PCI_DEVICE_MSI: 1191 case DOMAIN_BUS_PCI_DEVICE_MSIX: 1192 case DOMAIN_BUS_VMD_MSI: 1193 break; 1194 default: 1195 return false; 1196 } 1197 1198 if (!(info->flags & MSI_FLAG_MUST_REACTIVATE)) 1199 return false; 1200 1201 if (IS_ENABLED(CONFIG_PCI_MSI) && pci_msi_ignore_mask) 1202 return false; 1203 1204 /* 1205 * Checking the first MSI descriptor is sufficient. MSIX supports 1206 * masking and MSI does so when the can_mask attribute is set. 1207 */ 1208 desc = msi_first_desc(dev, MSI_DESC_ALL); 1209 return desc->pci.msi_attrib.is_msix || desc->pci.msi_attrib.can_mask; 1210 } 1211 1212 static int msi_handle_pci_fail(struct irq_domain *domain, struct msi_desc *desc, 1213 int allocated) 1214 { 1215 switch(domain->bus_token) { 1216 case DOMAIN_BUS_PCI_MSI: 1217 case DOMAIN_BUS_PCI_DEVICE_MSI: 1218 case DOMAIN_BUS_PCI_DEVICE_MSIX: 1219 case DOMAIN_BUS_VMD_MSI: 1220 if (IS_ENABLED(CONFIG_PCI_MSI)) 1221 break; 1222 fallthrough; 1223 default: 1224 return -ENOSPC; 1225 } 1226 1227 /* Let a failed PCI multi MSI allocation retry */ 1228 if (desc->nvec_used > 1) 1229 return 1; 1230 1231 /* If there was a successful allocation let the caller know */ 1232 return allocated ? allocated : -ENOSPC; 1233 } 1234 1235 #define VIRQ_CAN_RESERVE 0x01 1236 #define VIRQ_ACTIVATE 0x02 1237 1238 static int msi_init_virq(struct irq_domain *domain, int virq, unsigned int vflags) 1239 { 1240 struct irq_data *irqd = irq_domain_get_irq_data(domain, virq); 1241 int ret; 1242 1243 if (!(vflags & VIRQ_CAN_RESERVE)) { 1244 irqd_clr_can_reserve(irqd); 1245 1246 /* 1247 * If the interrupt is managed but no CPU is available to 1248 * service it, shut it down until better times. Note that 1249 * we only do this on the !RESERVE path as x86 (the only 1250 * architecture using this flag) deals with this in a 1251 * different way by using a catch-all vector. 1252 */ 1253 if ((vflags & VIRQ_ACTIVATE) && 1254 irqd_affinity_is_managed(irqd) && 1255 !cpumask_intersects(irq_data_get_affinity_mask(irqd), 1256 cpu_online_mask)) { 1257 irqd_set_managed_shutdown(irqd); 1258 return 0; 1259 } 1260 } 1261 1262 if (!(vflags & VIRQ_ACTIVATE)) 1263 return 0; 1264 1265 ret = irq_domain_activate_irq(irqd, vflags & VIRQ_CAN_RESERVE); 1266 if (ret) 1267 return ret; 1268 /* 1269 * If the interrupt uses reservation mode, clear the activated bit 1270 * so request_irq() will assign the final vector. 1271 */ 1272 if (vflags & VIRQ_CAN_RESERVE) 1273 irqd_clr_activated(irqd); 1274 return 0; 1275 } 1276 1277 static int __msi_domain_alloc_irqs(struct device *dev, struct irq_domain *domain, 1278 struct msi_ctrl *ctrl) 1279 { 1280 struct xarray *xa = &dev->msi.data->__domains[ctrl->domid].store; 1281 struct msi_domain_info *info = domain->host_data; 1282 struct msi_domain_ops *ops = info->ops; 1283 unsigned int vflags = 0, allocated = 0; 1284 msi_alloc_info_t arg = { }; 1285 struct msi_desc *desc; 1286 unsigned long idx; 1287 int i, ret, virq; 1288 1289 ret = msi_domain_prepare_irqs(domain, dev, ctrl->nirqs, &arg); 1290 if (ret) 1291 return ret; 1292 1293 /* 1294 * This flag is set by the PCI layer as we need to activate 1295 * the MSI entries before the PCI layer enables MSI in the 1296 * card. Otherwise the card latches a random msi message. 1297 */ 1298 if (info->flags & MSI_FLAG_ACTIVATE_EARLY) 1299 vflags |= VIRQ_ACTIVATE; 1300 1301 /* 1302 * Interrupt can use a reserved vector and will not occupy 1303 * a real device vector until the interrupt is requested. 1304 */ 1305 if (msi_check_reservation_mode(domain, info, dev)) 1306 vflags |= VIRQ_CAN_RESERVE; 1307 1308 xa_for_each_range(xa, idx, desc, ctrl->first, ctrl->last) { 1309 if (!msi_desc_match(desc, MSI_DESC_NOTASSOCIATED)) 1310 continue; 1311 1312 /* This should return -ECONFUSED... */ 1313 if (WARN_ON_ONCE(allocated >= ctrl->nirqs)) 1314 return -EINVAL; 1315 1316 if (ops->prepare_desc) 1317 ops->prepare_desc(domain, &arg, desc); 1318 1319 ops->set_desc(&arg, desc); 1320 1321 virq = __irq_domain_alloc_irqs(domain, -1, desc->nvec_used, 1322 dev_to_node(dev), &arg, false, 1323 desc->affinity); 1324 if (virq < 0) 1325 return msi_handle_pci_fail(domain, desc, allocated); 1326 1327 for (i = 0; i < desc->nvec_used; i++) { 1328 irq_set_msi_desc_off(virq, i, desc); 1329 irq_debugfs_copy_devname(virq + i, dev); 1330 ret = msi_init_virq(domain, virq + i, vflags); 1331 if (ret) 1332 return ret; 1333 } 1334 if (info->flags & MSI_FLAG_DEV_SYSFS) { 1335 ret = msi_sysfs_populate_desc(dev, desc); 1336 if (ret) 1337 return ret; 1338 } 1339 allocated++; 1340 } 1341 return 0; 1342 } 1343 1344 static int msi_domain_alloc_simple_msi_descs(struct device *dev, 1345 struct msi_domain_info *info, 1346 struct msi_ctrl *ctrl) 1347 { 1348 if (!(info->flags & MSI_FLAG_ALLOC_SIMPLE_MSI_DESCS)) 1349 return 0; 1350 1351 return msi_domain_add_simple_msi_descs(dev, ctrl); 1352 } 1353 1354 static int __msi_domain_alloc_locked(struct device *dev, struct msi_ctrl *ctrl) 1355 { 1356 struct msi_domain_info *info; 1357 struct msi_domain_ops *ops; 1358 struct irq_domain *domain; 1359 int ret; 1360 1361 if (!msi_ctrl_valid(dev, ctrl)) 1362 return -EINVAL; 1363 1364 domain = msi_get_device_domain(dev, ctrl->domid); 1365 if (!domain) 1366 return -ENODEV; 1367 1368 info = domain->host_data; 1369 1370 ret = msi_domain_alloc_simple_msi_descs(dev, info, ctrl); 1371 if (ret) 1372 return ret; 1373 1374 ops = info->ops; 1375 if (ops->domain_alloc_irqs) 1376 return ops->domain_alloc_irqs(domain, dev, ctrl->nirqs); 1377 1378 return __msi_domain_alloc_irqs(dev, domain, ctrl); 1379 } 1380 1381 static int msi_domain_alloc_locked(struct device *dev, struct msi_ctrl *ctrl) 1382 { 1383 int ret = __msi_domain_alloc_locked(dev, ctrl); 1384 1385 if (ret) 1386 msi_domain_free_locked(dev, ctrl); 1387 return ret; 1388 } 1389 1390 /** 1391 * msi_domain_alloc_irqs_range_locked - Allocate interrupts from a MSI interrupt domain 1392 * @dev: Pointer to device struct of the device for which the interrupts 1393 * are allocated 1394 * @domid: Id of the interrupt domain to operate on 1395 * @first: First index to allocate (inclusive) 1396 * @last: Last index to allocate (inclusive) 1397 * 1398 * Must be invoked from within a msi_lock_descs() / msi_unlock_descs() 1399 * pair. Use this for MSI irqdomains which implement their own descriptor 1400 * allocation/free. 1401 * 1402 * Return: %0 on success or an error code. 1403 */ 1404 int msi_domain_alloc_irqs_range_locked(struct device *dev, unsigned int domid, 1405 unsigned int first, unsigned int last) 1406 { 1407 struct msi_ctrl ctrl = { 1408 .domid = domid, 1409 .first = first, 1410 .last = last, 1411 .nirqs = last + 1 - first, 1412 }; 1413 1414 return msi_domain_alloc_locked(dev, &ctrl); 1415 } 1416 1417 /** 1418 * msi_domain_alloc_irqs_range - Allocate interrupts from a MSI interrupt domain 1419 * @dev: Pointer to device struct of the device for which the interrupts 1420 * are allocated 1421 * @domid: Id of the interrupt domain to operate on 1422 * @first: First index to allocate (inclusive) 1423 * @last: Last index to allocate (inclusive) 1424 * 1425 * Return: %0 on success or an error code. 1426 */ 1427 int msi_domain_alloc_irqs_range(struct device *dev, unsigned int domid, 1428 unsigned int first, unsigned int last) 1429 { 1430 int ret; 1431 1432 msi_lock_descs(dev); 1433 ret = msi_domain_alloc_irqs_range_locked(dev, domid, first, last); 1434 msi_unlock_descs(dev); 1435 return ret; 1436 } 1437 1438 /** 1439 * msi_domain_alloc_irqs_all_locked - Allocate all interrupts from a MSI interrupt domain 1440 * 1441 * @dev: Pointer to device struct of the device for which the interrupts 1442 * are allocated 1443 * @domid: Id of the interrupt domain to operate on 1444 * @nirqs: The number of interrupts to allocate 1445 * 1446 * This function scans all MSI descriptors of the MSI domain and allocates interrupts 1447 * for all unassigned ones. That function is to be used for MSI domain usage where 1448 * the descriptor allocation is handled at the call site, e.g. PCI/MSI[X]. 1449 * 1450 * Return: %0 on success or an error code. 1451 */ 1452 int msi_domain_alloc_irqs_all_locked(struct device *dev, unsigned int domid, int nirqs) 1453 { 1454 struct msi_ctrl ctrl = { 1455 .domid = domid, 1456 .first = 0, 1457 .last = msi_domain_get_hwsize(dev, domid) - 1, 1458 .nirqs = nirqs, 1459 }; 1460 1461 return msi_domain_alloc_locked(dev, &ctrl); 1462 } 1463 1464 static struct msi_map __msi_domain_alloc_irq_at(struct device *dev, unsigned int domid, 1465 unsigned int index, 1466 const struct irq_affinity_desc *affdesc, 1467 union msi_instance_cookie *icookie) 1468 { 1469 struct msi_ctrl ctrl = { .domid = domid, .nirqs = 1, }; 1470 struct irq_domain *domain; 1471 struct msi_map map = { }; 1472 struct msi_desc *desc; 1473 int ret; 1474 1475 domain = msi_get_device_domain(dev, domid); 1476 if (!domain) { 1477 map.index = -ENODEV; 1478 return map; 1479 } 1480 1481 desc = msi_alloc_desc(dev, 1, affdesc); 1482 if (!desc) { 1483 map.index = -ENOMEM; 1484 return map; 1485 } 1486 1487 if (icookie) 1488 desc->data.icookie = *icookie; 1489 1490 ret = msi_insert_desc(dev, desc, domid, index); 1491 if (ret) { 1492 map.index = ret; 1493 return map; 1494 } 1495 1496 ctrl.first = ctrl.last = desc->msi_index; 1497 1498 ret = __msi_domain_alloc_irqs(dev, domain, &ctrl); 1499 if (ret) { 1500 map.index = ret; 1501 msi_domain_free_locked(dev, &ctrl); 1502 } else { 1503 map.index = desc->msi_index; 1504 map.virq = desc->irq; 1505 } 1506 return map; 1507 } 1508 1509 /** 1510 * msi_domain_alloc_irq_at - Allocate an interrupt from a MSI interrupt domain at 1511 * a given index - or at the next free index 1512 * 1513 * @dev: Pointer to device struct of the device for which the interrupts 1514 * are allocated 1515 * @domid: Id of the interrupt domain to operate on 1516 * @index: Index for allocation. If @index == %MSI_ANY_INDEX the allocation 1517 * uses the next free index. 1518 * @affdesc: Optional pointer to an interrupt affinity descriptor structure 1519 * @icookie: Optional pointer to a domain specific per instance cookie. If 1520 * non-NULL the content of the cookie is stored in msi_desc::data. 1521 * Must be NULL for MSI-X allocations 1522 * 1523 * This requires a MSI interrupt domain which lets the core code manage the 1524 * MSI descriptors. 1525 * 1526 * Return: struct msi_map 1527 * 1528 * On success msi_map::index contains the allocated index number and 1529 * msi_map::virq the corresponding Linux interrupt number 1530 * 1531 * On failure msi_map::index contains the error code and msi_map::virq 1532 * is %0. 1533 */ 1534 struct msi_map msi_domain_alloc_irq_at(struct device *dev, unsigned int domid, unsigned int index, 1535 const struct irq_affinity_desc *affdesc, 1536 union msi_instance_cookie *icookie) 1537 { 1538 struct msi_map map; 1539 1540 msi_lock_descs(dev); 1541 map = __msi_domain_alloc_irq_at(dev, domid, index, affdesc, icookie); 1542 msi_unlock_descs(dev); 1543 return map; 1544 } 1545 1546 /** 1547 * msi_device_domain_alloc_wired - Allocate a "wired" interrupt on @domain 1548 * @domain: The domain to allocate on 1549 * @hwirq: The hardware interrupt number to allocate for 1550 * @type: The interrupt type 1551 * 1552 * This weirdness supports wire to MSI controllers like MBIGEN. 1553 * 1554 * @hwirq is the hardware interrupt number which is handed in from 1555 * irq_create_fwspec_mapping(). As the wire to MSI domain is sparse, but 1556 * sized in firmware, the hardware interrupt number cannot be used as MSI 1557 * index. For the underlying irq chip the MSI index is irrelevant and 1558 * all it needs is the hardware interrupt number. 1559 * 1560 * To handle this the MSI index is allocated with MSI_ANY_INDEX and the 1561 * hardware interrupt number is stored along with the type information in 1562 * msi_desc::cookie so the underlying interrupt chip and domain code can 1563 * retrieve it. 1564 * 1565 * Return: The Linux interrupt number (> 0) or an error code 1566 */ 1567 int msi_device_domain_alloc_wired(struct irq_domain *domain, unsigned int hwirq, 1568 unsigned int type) 1569 { 1570 unsigned int domid = MSI_DEFAULT_DOMAIN; 1571 union msi_instance_cookie icookie = { }; 1572 struct device *dev = domain->dev; 1573 struct msi_map map = { }; 1574 1575 if (WARN_ON_ONCE(!dev || domain->bus_token != DOMAIN_BUS_WIRED_TO_MSI)) 1576 return -EINVAL; 1577 1578 icookie.value = ((u64)type << 32) | hwirq; 1579 1580 msi_lock_descs(dev); 1581 if (WARN_ON_ONCE(msi_get_device_domain(dev, domid) != domain)) 1582 map.index = -EINVAL; 1583 else 1584 map = __msi_domain_alloc_irq_at(dev, domid, MSI_ANY_INDEX, NULL, &icookie); 1585 msi_unlock_descs(dev); 1586 1587 return map.index >= 0 ? map.virq : map.index; 1588 } 1589 1590 static void __msi_domain_free_irqs(struct device *dev, struct irq_domain *domain, 1591 struct msi_ctrl *ctrl) 1592 { 1593 struct xarray *xa = &dev->msi.data->__domains[ctrl->domid].store; 1594 struct msi_domain_info *info = domain->host_data; 1595 struct irq_data *irqd; 1596 struct msi_desc *desc; 1597 unsigned long idx; 1598 int i; 1599 1600 xa_for_each_range(xa, idx, desc, ctrl->first, ctrl->last) { 1601 /* Only handle MSI entries which have an interrupt associated */ 1602 if (!msi_desc_match(desc, MSI_DESC_ASSOCIATED)) 1603 continue; 1604 1605 /* Make sure all interrupts are deactivated */ 1606 for (i = 0; i < desc->nvec_used; i++) { 1607 irqd = irq_domain_get_irq_data(domain, desc->irq + i); 1608 if (irqd && irqd_is_activated(irqd)) 1609 irq_domain_deactivate_irq(irqd); 1610 } 1611 1612 irq_domain_free_irqs(desc->irq, desc->nvec_used); 1613 if (info->flags & MSI_FLAG_DEV_SYSFS) 1614 msi_sysfs_remove_desc(dev, desc); 1615 desc->irq = 0; 1616 } 1617 } 1618 1619 static void msi_domain_free_locked(struct device *dev, struct msi_ctrl *ctrl) 1620 { 1621 struct msi_domain_info *info; 1622 struct msi_domain_ops *ops; 1623 struct irq_domain *domain; 1624 1625 if (!msi_ctrl_valid(dev, ctrl)) 1626 return; 1627 1628 domain = msi_get_device_domain(dev, ctrl->domid); 1629 if (!domain) 1630 return; 1631 1632 info = domain->host_data; 1633 ops = info->ops; 1634 1635 if (ops->domain_free_irqs) 1636 ops->domain_free_irqs(domain, dev); 1637 else 1638 __msi_domain_free_irqs(dev, domain, ctrl); 1639 1640 if (ops->msi_post_free) 1641 ops->msi_post_free(domain, dev); 1642 1643 if (info->flags & MSI_FLAG_FREE_MSI_DESCS) 1644 msi_domain_free_descs(dev, ctrl); 1645 } 1646 1647 /** 1648 * msi_domain_free_irqs_range_locked - Free a range of interrupts from a MSI interrupt domain 1649 * associated to @dev with msi_lock held 1650 * @dev: Pointer to device struct of the device for which the interrupts 1651 * are freed 1652 * @domid: Id of the interrupt domain to operate on 1653 * @first: First index to free (inclusive) 1654 * @last: Last index to free (inclusive) 1655 */ 1656 void msi_domain_free_irqs_range_locked(struct device *dev, unsigned int domid, 1657 unsigned int first, unsigned int last) 1658 { 1659 struct msi_ctrl ctrl = { 1660 .domid = domid, 1661 .first = first, 1662 .last = last, 1663 }; 1664 msi_domain_free_locked(dev, &ctrl); 1665 } 1666 1667 /** 1668 * msi_domain_free_irqs_range - Free a range of interrupts from a MSI interrupt domain 1669 * associated to @dev 1670 * @dev: Pointer to device struct of the device for which the interrupts 1671 * are freed 1672 * @domid: Id of the interrupt domain to operate on 1673 * @first: First index to free (inclusive) 1674 * @last: Last index to free (inclusive) 1675 */ 1676 void msi_domain_free_irqs_range(struct device *dev, unsigned int domid, 1677 unsigned int first, unsigned int last) 1678 { 1679 msi_lock_descs(dev); 1680 msi_domain_free_irqs_range_locked(dev, domid, first, last); 1681 msi_unlock_descs(dev); 1682 } 1683 1684 /** 1685 * msi_domain_free_irqs_all_locked - Free all interrupts from a MSI interrupt domain 1686 * associated to a device 1687 * @dev: Pointer to device struct of the device for which the interrupts 1688 * are freed 1689 * @domid: The id of the domain to operate on 1690 * 1691 * Must be invoked from within a msi_lock_descs() / msi_unlock_descs() 1692 * pair. Use this for MSI irqdomains which implement their own vector 1693 * allocation. 1694 */ 1695 void msi_domain_free_irqs_all_locked(struct device *dev, unsigned int domid) 1696 { 1697 msi_domain_free_irqs_range_locked(dev, domid, 0, 1698 msi_domain_get_hwsize(dev, domid) - 1); 1699 } 1700 1701 /** 1702 * msi_domain_free_irqs_all - Free all interrupts from a MSI interrupt domain 1703 * associated to a device 1704 * @dev: Pointer to device struct of the device for which the interrupts 1705 * are freed 1706 * @domid: The id of the domain to operate on 1707 */ 1708 void msi_domain_free_irqs_all(struct device *dev, unsigned int domid) 1709 { 1710 msi_lock_descs(dev); 1711 msi_domain_free_irqs_all_locked(dev, domid); 1712 msi_unlock_descs(dev); 1713 } 1714 1715 /** 1716 * msi_device_domain_free_wired - Free a wired interrupt in @domain 1717 * @domain: The domain to free the interrupt on 1718 * @virq: The Linux interrupt number to free 1719 * 1720 * This is the counterpart of msi_device_domain_alloc_wired() for the 1721 * weird wired to MSI converting domains. 1722 */ 1723 void msi_device_domain_free_wired(struct irq_domain *domain, unsigned int virq) 1724 { 1725 struct msi_desc *desc = irq_get_msi_desc(virq); 1726 struct device *dev = domain->dev; 1727 1728 if (WARN_ON_ONCE(!dev || !desc || domain->bus_token != DOMAIN_BUS_WIRED_TO_MSI)) 1729 return; 1730 1731 msi_lock_descs(dev); 1732 if (!WARN_ON_ONCE(msi_get_device_domain(dev, MSI_DEFAULT_DOMAIN) != domain)) { 1733 msi_domain_free_irqs_range_locked(dev, MSI_DEFAULT_DOMAIN, desc->msi_index, 1734 desc->msi_index); 1735 } 1736 msi_unlock_descs(dev); 1737 } 1738 1739 /** 1740 * msi_get_domain_info - Get the MSI interrupt domain info for @domain 1741 * @domain: The interrupt domain to retrieve data from 1742 * 1743 * Return: the pointer to the msi_domain_info stored in @domain->host_data. 1744 */ 1745 struct msi_domain_info *msi_get_domain_info(struct irq_domain *domain) 1746 { 1747 return (struct msi_domain_info *)domain->host_data; 1748 } 1749 1750 /** 1751 * msi_device_has_isolated_msi - True if the device has isolated MSI 1752 * @dev: The device to check 1753 * 1754 * Isolated MSI means that HW modeled by an irq_domain on the path from the 1755 * initiating device to the CPU will validate that the MSI message specifies an 1756 * interrupt number that the device is authorized to trigger. This must block 1757 * devices from triggering interrupts they are not authorized to trigger. 1758 * Currently authorization means the MSI vector is one assigned to the device. 1759 * 1760 * This is interesting for securing VFIO use cases where a rouge MSI (eg created 1761 * by abusing a normal PCI MemWr DMA) must not allow the VFIO userspace to 1762 * impact outside its security domain, eg userspace triggering interrupts on 1763 * kernel drivers, a VM triggering interrupts on the hypervisor, or a VM 1764 * triggering interrupts on another VM. 1765 */ 1766 bool msi_device_has_isolated_msi(struct device *dev) 1767 { 1768 struct irq_domain *domain = dev_get_msi_domain(dev); 1769 1770 for (; domain; domain = domain->parent) 1771 if (domain->flags & IRQ_DOMAIN_FLAG_ISOLATED_MSI) 1772 return true; 1773 return arch_is_isolated_msi(); 1774 } 1775 EXPORT_SYMBOL_GPL(msi_device_has_isolated_msi); 1776