]>
Commit | Line | Data |
---|---|---|
7328c8f4 | 1 | // SPDX-License-Identifier: GPL-2.0 |
db3c33c6 | 2 | /* |
df62ab5e | 3 | * PCI Express I/O Virtualization (IOV) support |
db3c33c6 | 4 | * Address Translation Service 1.0 |
c320b976 | 5 | * Page Request Interface added by Joerg Roedel <[email protected]> |
086ac11f | 6 | * PASID support added by Joerg Roedel <[email protected]> |
df62ab5e BH |
7 | * |
8 | * Copyright (C) 2009 Intel Corporation, Yu Zhao <[email protected]> | |
9 | * Copyright (C) 2011 Advanced Micro Devices, | |
db3c33c6 JR |
10 | */ |
11 | ||
e0701bd0 | 12 | #include <linux/bitfield.h> |
363c75db | 13 | #include <linux/export.h> |
db3c33c6 JR |
14 | #include <linux/pci-ats.h> |
15 | #include <linux/pci.h> | |
8c451945 | 16 | #include <linux/slab.h> |
db3c33c6 JR |
17 | |
18 | #include "pci.h" | |
19 | ||
afdd596c | 20 | void pci_ats_init(struct pci_dev *dev) |
db3c33c6 JR |
21 | { |
22 | int pos; | |
db3c33c6 | 23 | |
cef74409 GK |
24 | if (pci_ats_disabled()) |
25 | return; | |
26 | ||
db3c33c6 JR |
27 | pos = pci_find_ext_capability(dev, PCI_EXT_CAP_ID_ATS); |
28 | if (!pos) | |
edc90fee | 29 | return; |
db3c33c6 | 30 | |
d544d75a | 31 | dev->ats_cap = pos; |
db3c33c6 JR |
32 | } |
33 | ||
52137674 JPB |
34 | /** |
35 | * pci_ats_supported - check if the device can use ATS | |
36 | * @dev: the PCI device | |
37 | * | |
38 | * Returns true if the device supports ATS and is allowed to use it, false | |
39 | * otherwise. | |
40 | */ | |
41 | bool pci_ats_supported(struct pci_dev *dev) | |
42 | { | |
43 | if (!dev->ats_cap) | |
44 | return false; | |
45 | ||
46 | return (dev->untrusted == 0); | |
47 | } | |
48 | EXPORT_SYMBOL_GPL(pci_ats_supported); | |
49 | ||
6c17c7d5 JG |
50 | /** |
51 | * pci_prepare_ats - Setup the PS for ATS | |
52 | * @dev: the PCI device | |
53 | * @ps: the IOMMU page shift | |
54 | * | |
55 | * This must be done by the IOMMU driver on the PF before any VFs are created to | |
56 | * ensure that the VF can have ATS enabled. | |
57 | * | |
58 | * Returns 0 on success, or negative on failure. | |
59 | */ | |
60 | int pci_prepare_ats(struct pci_dev *dev, int ps) | |
61 | { | |
62 | u16 ctrl; | |
63 | ||
64 | if (!pci_ats_supported(dev)) | |
65 | return -EINVAL; | |
66 | ||
67 | if (WARN_ON(dev->ats_enabled)) | |
68 | return -EBUSY; | |
69 | ||
70 | if (ps < PCI_ATS_MIN_STU) | |
71 | return -EINVAL; | |
72 | ||
73 | if (dev->is_virtfn) | |
74 | return 0; | |
75 | ||
76 | dev->ats_stu = ps; | |
77 | ctrl = PCI_ATS_CTRL_STU(dev->ats_stu - PCI_ATS_MIN_STU); | |
78 | pci_write_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, ctrl); | |
79 | return 0; | |
80 | } | |
81 | EXPORT_SYMBOL_GPL(pci_prepare_ats); | |
82 | ||
db3c33c6 JR |
83 | /** |
84 | * pci_enable_ats - enable the ATS capability | |
85 | * @dev: the PCI device | |
86 | * @ps: the IOMMU page shift | |
87 | * | |
88 | * Returns 0 on success, or negative on failure. | |
89 | */ | |
90 | int pci_enable_ats(struct pci_dev *dev, int ps) | |
91 | { | |
db3c33c6 | 92 | u16 ctrl; |
c39127db | 93 | struct pci_dev *pdev; |
db3c33c6 | 94 | |
52137674 | 95 | if (!pci_ats_supported(dev)) |
edc90fee BH |
96 | return -EINVAL; |
97 | ||
f7ef1340 | 98 | if (WARN_ON(dev->ats_enabled)) |
a021f301 BH |
99 | return -EBUSY; |
100 | ||
db3c33c6 JR |
101 | if (ps < PCI_ATS_MIN_STU) |
102 | return -EINVAL; | |
103 | ||
edc90fee BH |
104 | /* |
105 | * Note that enabling ATS on a VF fails unless it's already enabled | |
106 | * with the same STU on the PF. | |
107 | */ | |
108 | ctrl = PCI_ATS_CTRL_ENABLE; | |
109 | if (dev->is_virtfn) { | |
c39127db | 110 | pdev = pci_physfn(dev); |
d544d75a | 111 | if (pdev->ats_stu != ps) |
edc90fee | 112 | return -EINVAL; |
edc90fee | 113 | } else { |
d544d75a BH |
114 | dev->ats_stu = ps; |
115 | ctrl |= PCI_ATS_CTRL_STU(dev->ats_stu - PCI_ATS_MIN_STU); | |
db3c33c6 | 116 | } |
d544d75a | 117 | pci_write_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, ctrl); |
db3c33c6 | 118 | |
d544d75a | 119 | dev->ats_enabled = 1; |
db3c33c6 JR |
120 | return 0; |
121 | } | |
bb950bca | 122 | EXPORT_SYMBOL_GPL(pci_enable_ats); |
db3c33c6 JR |
123 | |
124 | /** | |
125 | * pci_disable_ats - disable the ATS capability | |
126 | * @dev: the PCI device | |
127 | */ | |
128 | void pci_disable_ats(struct pci_dev *dev) | |
129 | { | |
130 | u16 ctrl; | |
131 | ||
f7ef1340 | 132 | if (WARN_ON(!dev->ats_enabled)) |
a021f301 | 133 | return; |
db3c33c6 | 134 | |
d544d75a | 135 | pci_read_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, &ctrl); |
db3c33c6 | 136 | ctrl &= ~PCI_ATS_CTRL_ENABLE; |
d544d75a | 137 | pci_write_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, ctrl); |
db3c33c6 | 138 | |
d544d75a | 139 | dev->ats_enabled = 0; |
db3c33c6 | 140 | } |
bb950bca | 141 | EXPORT_SYMBOL_GPL(pci_disable_ats); |
db3c33c6 | 142 | |
1900ca13 HX |
143 | void pci_restore_ats_state(struct pci_dev *dev) |
144 | { | |
145 | u16 ctrl; | |
146 | ||
f7ef1340 | 147 | if (!dev->ats_enabled) |
1900ca13 | 148 | return; |
1900ca13 HX |
149 | |
150 | ctrl = PCI_ATS_CTRL_ENABLE; | |
151 | if (!dev->is_virtfn) | |
d544d75a BH |
152 | ctrl |= PCI_ATS_CTRL_STU(dev->ats_stu - PCI_ATS_MIN_STU); |
153 | pci_write_config_word(dev, dev->ats_cap + PCI_ATS_CTRL, ctrl); | |
1900ca13 | 154 | } |
1900ca13 | 155 | |
db3c33c6 JR |
156 | /** |
157 | * pci_ats_queue_depth - query the ATS Invalidate Queue Depth | |
158 | * @dev: the PCI device | |
159 | * | |
160 | * Returns the queue depth on success, or negative on failure. | |
161 | * | |
162 | * The ATS spec uses 0 in the Invalidate Queue Depth field to | |
163 | * indicate that the function can accept 32 Invalidate Request. | |
164 | * But here we use the `real' values (i.e. 1~32) for the Queue | |
165 | * Depth; and 0 indicates the function shares the Queue with | |
166 | * other functions (doesn't exclusively own a Queue). | |
167 | */ | |
168 | int pci_ats_queue_depth(struct pci_dev *dev) | |
169 | { | |
a71f938f BH |
170 | u16 cap; |
171 | ||
3c765399 BH |
172 | if (!dev->ats_cap) |
173 | return -EINVAL; | |
174 | ||
db3c33c6 JR |
175 | if (dev->is_virtfn) |
176 | return 0; | |
177 | ||
a71f938f BH |
178 | pci_read_config_word(dev, dev->ats_cap + PCI_ATS_CAP, &cap); |
179 | return PCI_ATS_CAP_QDEP(cap) ? PCI_ATS_CAP_QDEP(cap) : PCI_ATS_MAX_QDEP; | |
db3c33c6 | 180 | } |
c320b976 | 181 | |
8c938ddc KS |
182 | /** |
183 | * pci_ats_page_aligned - Return Page Aligned Request bit status. | |
184 | * @pdev: the PCI device | |
185 | * | |
186 | * Returns 1, if the Untranslated Addresses generated by the device | |
187 | * are always aligned or 0 otherwise. | |
188 | * | |
189 | * Per PCIe spec r4.0, sec 10.5.1.2, if the Page Aligned Request bit | |
190 | * is set, it indicates the Untranslated Addresses generated by the | |
191 | * device are always aligned to a 4096 byte boundary. | |
192 | */ | |
193 | int pci_ats_page_aligned(struct pci_dev *pdev) | |
194 | { | |
195 | u16 cap; | |
196 | ||
197 | if (!pdev->ats_cap) | |
198 | return 0; | |
199 | ||
200 | pci_read_config_word(pdev, pdev->ats_cap + PCI_ATS_CAP, &cap); | |
201 | ||
202 | if (cap & PCI_ATS_CAP_PAGE_ALIGNED) | |
203 | return 1; | |
204 | ||
205 | return 0; | |
206 | } | |
8c938ddc | 207 | |
c320b976 | 208 | #ifdef CONFIG_PCI_PRI |
c065190b KS |
209 | void pci_pri_init(struct pci_dev *pdev) |
210 | { | |
e5adf79a BH |
211 | u16 status; |
212 | ||
c065190b | 213 | pdev->pri_cap = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PRI); |
e5adf79a BH |
214 | |
215 | if (!pdev->pri_cap) | |
216 | return; | |
217 | ||
218 | pci_read_config_word(pdev, pdev->pri_cap + PCI_PRI_STATUS, &status); | |
219 | if (status & PCI_PRI_STATUS_PASID) | |
220 | pdev->pasid_required = 1; | |
c065190b KS |
221 | } |
222 | ||
c320b976 JR |
223 | /** |
224 | * pci_enable_pri - Enable PRI capability | |
9b41d19a KK |
225 | * @pdev: PCI device structure |
226 | * @reqs: outstanding requests | |
c320b976 JR |
227 | * |
228 | * Returns 0 on success, negative value on error | |
229 | */ | |
230 | int pci_enable_pri(struct pci_dev *pdev, u32 reqs) | |
231 | { | |
232 | u16 control, status; | |
233 | u32 max_requests; | |
c065190b | 234 | int pri = pdev->pri_cap; |
c320b976 | 235 | |
9bf49e36 KS |
236 | /* |
237 | * VFs must not implement the PRI Capability. If their PF | |
238 | * implements PRI, it is shared by the VFs, so if the PF PRI is | |
239 | * enabled, it is also enabled for the VF. | |
240 | */ | |
241 | if (pdev->is_virtfn) { | |
242 | if (pci_physfn(pdev)->pri_enabled) | |
243 | return 0; | |
244 | return -EINVAL; | |
245 | } | |
246 | ||
a4f4fa68 JPB |
247 | if (WARN_ON(pdev->pri_enabled)) |
248 | return -EBUSY; | |
249 | ||
c065190b | 250 | if (!pri) |
c320b976 JR |
251 | return -EINVAL; |
252 | ||
c065190b | 253 | pci_read_config_word(pdev, pri + PCI_PRI_STATUS, &status); |
4ebeb1ec | 254 | if (!(status & PCI_PRI_STATUS_STOPPED)) |
c320b976 JR |
255 | return -EBUSY; |
256 | ||
c065190b | 257 | pci_read_config_dword(pdev, pri + PCI_PRI_MAX_REQ, &max_requests); |
c320b976 | 258 | reqs = min(max_requests, reqs); |
4ebeb1ec | 259 | pdev->pri_reqs_alloc = reqs; |
c065190b | 260 | pci_write_config_dword(pdev, pri + PCI_PRI_ALLOC_REQ, reqs); |
c320b976 | 261 | |
4ebeb1ec | 262 | control = PCI_PRI_CTRL_ENABLE; |
c065190b | 263 | pci_write_config_word(pdev, pri + PCI_PRI_CTRL, control); |
c320b976 | 264 | |
a4f4fa68 JPB |
265 | pdev->pri_enabled = 1; |
266 | ||
c320b976 JR |
267 | return 0; |
268 | } | |
c320b976 JR |
269 | |
270 | /** | |
271 | * pci_disable_pri - Disable PRI capability | |
272 | * @pdev: PCI device structure | |
273 | * | |
274 | * Only clears the enabled-bit, regardless of its former value | |
275 | */ | |
276 | void pci_disable_pri(struct pci_dev *pdev) | |
277 | { | |
278 | u16 control; | |
c065190b | 279 | int pri = pdev->pri_cap; |
c320b976 | 280 | |
9bf49e36 KS |
281 | /* VFs share the PF PRI */ |
282 | if (pdev->is_virtfn) | |
283 | return; | |
284 | ||
a4f4fa68 JPB |
285 | if (WARN_ON(!pdev->pri_enabled)) |
286 | return; | |
287 | ||
c065190b | 288 | if (!pri) |
c320b976 JR |
289 | return; |
290 | ||
c065190b | 291 | pci_read_config_word(pdev, pri + PCI_PRI_CTRL, &control); |
91f57d5e | 292 | control &= ~PCI_PRI_CTRL_ENABLE; |
c065190b | 293 | pci_write_config_word(pdev, pri + PCI_PRI_CTRL, control); |
a4f4fa68 JPB |
294 | |
295 | pdev->pri_enabled = 0; | |
c320b976 JR |
296 | } |
297 | EXPORT_SYMBOL_GPL(pci_disable_pri); | |
298 | ||
4ebeb1ec CT |
299 | /** |
300 | * pci_restore_pri_state - Restore PRI | |
301 | * @pdev: PCI device structure | |
302 | */ | |
303 | void pci_restore_pri_state(struct pci_dev *pdev) | |
304 | { | |
305 | u16 control = PCI_PRI_CTRL_ENABLE; | |
306 | u32 reqs = pdev->pri_reqs_alloc; | |
c065190b | 307 | int pri = pdev->pri_cap; |
4ebeb1ec | 308 | |
9bf49e36 KS |
309 | if (pdev->is_virtfn) |
310 | return; | |
311 | ||
4ebeb1ec CT |
312 | if (!pdev->pri_enabled) |
313 | return; | |
314 | ||
c065190b | 315 | if (!pri) |
4ebeb1ec CT |
316 | return; |
317 | ||
c065190b KS |
318 | pci_write_config_dword(pdev, pri + PCI_PRI_ALLOC_REQ, reqs); |
319 | pci_write_config_word(pdev, pri + PCI_PRI_CTRL, control); | |
4ebeb1ec | 320 | } |
4ebeb1ec | 321 | |
c320b976 JR |
322 | /** |
323 | * pci_reset_pri - Resets device's PRI state | |
324 | * @pdev: PCI device structure | |
325 | * | |
326 | * The PRI capability must be disabled before this function is called. | |
327 | * Returns 0 on success, negative value on error. | |
328 | */ | |
329 | int pci_reset_pri(struct pci_dev *pdev) | |
330 | { | |
331 | u16 control; | |
c065190b | 332 | int pri = pdev->pri_cap; |
c320b976 | 333 | |
9bf49e36 KS |
334 | if (pdev->is_virtfn) |
335 | return 0; | |
336 | ||
a4f4fa68 JPB |
337 | if (WARN_ON(pdev->pri_enabled)) |
338 | return -EBUSY; | |
339 | ||
c065190b | 340 | if (!pri) |
c320b976 JR |
341 | return -EINVAL; |
342 | ||
4ebeb1ec | 343 | control = PCI_PRI_CTRL_RESET; |
c065190b | 344 | pci_write_config_word(pdev, pri + PCI_PRI_CTRL, control); |
c320b976 JR |
345 | |
346 | return 0; | |
347 | } | |
8cbb8a93 BH |
348 | |
349 | /** | |
350 | * pci_prg_resp_pasid_required - Return PRG Response PASID Required bit | |
351 | * status. | |
352 | * @pdev: PCI device structure | |
353 | * | |
354 | * Returns 1 if PASID is required in PRG Response Message, 0 otherwise. | |
355 | */ | |
356 | int pci_prg_resp_pasid_required(struct pci_dev *pdev) | |
357 | { | |
9bf49e36 KS |
358 | if (pdev->is_virtfn) |
359 | pdev = pci_physfn(pdev); | |
360 | ||
e5adf79a | 361 | return pdev->pasid_required; |
8cbb8a93 | 362 | } |
3f9a7a13 AR |
363 | |
364 | /** | |
365 | * pci_pri_supported - Check if PRI is supported. | |
366 | * @pdev: PCI device structure | |
367 | * | |
368 | * Returns true if PRI capability is present, false otherwise. | |
369 | */ | |
370 | bool pci_pri_supported(struct pci_dev *pdev) | |
371 | { | |
372 | /* VFs share the PF PRI */ | |
373 | if (pci_physfn(pdev)->pri_cap) | |
374 | return true; | |
375 | return false; | |
376 | } | |
377 | EXPORT_SYMBOL_GPL(pci_pri_supported); | |
c320b976 | 378 | #endif /* CONFIG_PCI_PRI */ |
086ac11f JR |
379 | |
380 | #ifdef CONFIG_PCI_PASID | |
751035b8 KS |
381 | void pci_pasid_init(struct pci_dev *pdev) |
382 | { | |
383 | pdev->pasid_cap = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PASID); | |
384 | } | |
385 | ||
086ac11f JR |
386 | /** |
387 | * pci_enable_pasid - Enable the PASID capability | |
388 | * @pdev: PCI device structure | |
389 | * @features: Features to enable | |
390 | * | |
391 | * Returns 0 on success, negative value on error. This function checks | |
392 | * whether the features are actually supported by the device and returns | |
393 | * an error if not. | |
394 | */ | |
395 | int pci_enable_pasid(struct pci_dev *pdev, int features) | |
396 | { | |
397 | u16 control, supported; | |
751035b8 | 398 | int pasid = pdev->pasid_cap; |
086ac11f | 399 | |
2b0ae7cc KS |
400 | /* |
401 | * VFs must not implement the PASID Capability, but if a PF | |
402 | * supports PASID, its VFs share the PF PASID configuration. | |
403 | */ | |
404 | if (pdev->is_virtfn) { | |
405 | if (pci_physfn(pdev)->pasid_enabled) | |
406 | return 0; | |
407 | return -EINVAL; | |
408 | } | |
409 | ||
a4f4fa68 JPB |
410 | if (WARN_ON(pdev->pasid_enabled)) |
411 | return -EBUSY; | |
412 | ||
e5321ae1 | 413 | if (!pdev->eetlp_prefix_max && !pdev->pasid_no_tlp) |
7ce3f912 SK |
414 | return -EINVAL; |
415 | ||
751035b8 | 416 | if (!pasid) |
086ac11f JR |
417 | return -EINVAL; |
418 | ||
201007ef LB |
419 | if (!pci_acs_path_enabled(pdev, NULL, PCI_ACS_RR | PCI_ACS_UF)) |
420 | return -EINVAL; | |
421 | ||
751035b8 | 422 | pci_read_config_word(pdev, pasid + PCI_PASID_CAP, &supported); |
91f57d5e | 423 | supported &= PCI_PASID_CAP_EXEC | PCI_PASID_CAP_PRIV; |
086ac11f JR |
424 | |
425 | /* User wants to enable anything unsupported? */ | |
426 | if ((supported & features) != features) | |
427 | return -EINVAL; | |
428 | ||
91f57d5e | 429 | control = PCI_PASID_CTRL_ENABLE | features; |
4ebeb1ec | 430 | pdev->pasid_features = features; |
086ac11f | 431 | |
751035b8 | 432 | pci_write_config_word(pdev, pasid + PCI_PASID_CTRL, control); |
086ac11f | 433 | |
a4f4fa68 JPB |
434 | pdev->pasid_enabled = 1; |
435 | ||
086ac11f JR |
436 | return 0; |
437 | } | |
7682ce2b | 438 | EXPORT_SYMBOL_GPL(pci_enable_pasid); |
086ac11f JR |
439 | |
440 | /** | |
441 | * pci_disable_pasid - Disable the PASID capability | |
442 | * @pdev: PCI device structure | |
086ac11f JR |
443 | */ |
444 | void pci_disable_pasid(struct pci_dev *pdev) | |
445 | { | |
446 | u16 control = 0; | |
751035b8 | 447 | int pasid = pdev->pasid_cap; |
086ac11f | 448 | |
2b0ae7cc KS |
449 | /* VFs share the PF PASID configuration */ |
450 | if (pdev->is_virtfn) | |
451 | return; | |
452 | ||
a4f4fa68 JPB |
453 | if (WARN_ON(!pdev->pasid_enabled)) |
454 | return; | |
455 | ||
751035b8 | 456 | if (!pasid) |
086ac11f JR |
457 | return; |
458 | ||
751035b8 | 459 | pci_write_config_word(pdev, pasid + PCI_PASID_CTRL, control); |
a4f4fa68 JPB |
460 | |
461 | pdev->pasid_enabled = 0; | |
086ac11f | 462 | } |
7682ce2b | 463 | EXPORT_SYMBOL_GPL(pci_disable_pasid); |
086ac11f | 464 | |
4ebeb1ec CT |
465 | /** |
466 | * pci_restore_pasid_state - Restore PASID capabilities | |
467 | * @pdev: PCI device structure | |
468 | */ | |
469 | void pci_restore_pasid_state(struct pci_dev *pdev) | |
470 | { | |
471 | u16 control; | |
751035b8 | 472 | int pasid = pdev->pasid_cap; |
4ebeb1ec | 473 | |
2b0ae7cc KS |
474 | if (pdev->is_virtfn) |
475 | return; | |
476 | ||
4ebeb1ec CT |
477 | if (!pdev->pasid_enabled) |
478 | return; | |
479 | ||
751035b8 | 480 | if (!pasid) |
4ebeb1ec CT |
481 | return; |
482 | ||
483 | control = PCI_PASID_CTRL_ENABLE | pdev->pasid_features; | |
751035b8 | 484 | pci_write_config_word(pdev, pasid + PCI_PASID_CTRL, control); |
4ebeb1ec | 485 | } |
4ebeb1ec | 486 | |
086ac11f JR |
487 | /** |
488 | * pci_pasid_features - Check which PASID features are supported | |
489 | * @pdev: PCI device structure | |
490 | * | |
5c7bdac7 BH |
491 | * Return a negative value when no PASID capability is present. |
492 | * Otherwise return a bitmask with supported features. Current | |
086ac11f | 493 | * features reported are: |
91f57d5e | 494 | * PCI_PASID_CAP_EXEC - Execute permission supported |
f7625980 | 495 | * PCI_PASID_CAP_PRIV - Privileged mode supported |
086ac11f JR |
496 | */ |
497 | int pci_pasid_features(struct pci_dev *pdev) | |
498 | { | |
499 | u16 supported; | |
2e34673b | 500 | int pasid; |
086ac11f | 501 | |
2b0ae7cc KS |
502 | if (pdev->is_virtfn) |
503 | pdev = pci_physfn(pdev); | |
504 | ||
2e34673b | 505 | pasid = pdev->pasid_cap; |
751035b8 | 506 | if (!pasid) |
086ac11f JR |
507 | return -EINVAL; |
508 | ||
751035b8 | 509 | pci_read_config_word(pdev, pasid + PCI_PASID_CAP, &supported); |
086ac11f | 510 | |
91f57d5e | 511 | supported &= PCI_PASID_CAP_EXEC | PCI_PASID_CAP_PRIV; |
086ac11f JR |
512 | |
513 | return supported; | |
514 | } | |
7682ce2b | 515 | EXPORT_SYMBOL_GPL(pci_pasid_features); |
086ac11f | 516 | |
086ac11f | 517 | /** |
43395d9e | 518 | * pci_max_pasids - Get maximum number of PASIDs supported by device |
086ac11f JR |
519 | * @pdev: PCI device structure |
520 | * | |
521 | * Returns negative value when PASID capability is not present. | |
f6b6aefe | 522 | * Otherwise it returns the number of supported PASIDs. |
086ac11f JR |
523 | */ |
524 | int pci_max_pasids(struct pci_dev *pdev) | |
525 | { | |
526 | u16 supported; | |
2e34673b | 527 | int pasid; |
086ac11f | 528 | |
2b0ae7cc KS |
529 | if (pdev->is_virtfn) |
530 | pdev = pci_physfn(pdev); | |
531 | ||
2e34673b | 532 | pasid = pdev->pasid_cap; |
751035b8 | 533 | if (!pasid) |
086ac11f JR |
534 | return -EINVAL; |
535 | ||
751035b8 | 536 | pci_read_config_word(pdev, pasid + PCI_PASID_CAP, &supported); |
086ac11f | 537 | |
e0701bd0 | 538 | return (1 << FIELD_GET(PCI_PASID_CAP_WIDTH, supported)); |
086ac11f | 539 | } |
7682ce2b | 540 | EXPORT_SYMBOL_GPL(pci_max_pasids); |
086ac11f | 541 | #endif /* CONFIG_PCI_PASID */ |