pci.c 73 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843
  1. /*
  2. * PCI Bus Services, see include/linux/pci.h for further explanation.
  3. *
  4. * Copyright 1993 -- 1997 Drew Eckhardt, Frederic Potter,
  5. * David Mosberger-Tang
  6. *
  7. * Copyright 1997 -- 2000 Martin Mares <mj@ucw.cz>
  8. */
  9. #include <linux/kernel.h>
  10. #include <linux/delay.h>
  11. #include <linux/init.h>
  12. #include <linux/pci.h>
  13. #include <linux/pm.h>
  14. #include <linux/module.h>
  15. #include <linux/spinlock.h>
  16. #include <linux/string.h>
  17. #include <linux/log2.h>
  18. #include <linux/pci-aspm.h>
  19. #include <linux/pm_wakeup.h>
  20. #include <linux/interrupt.h>
  21. #include <asm/dma.h> /* isa_dma_bridge_buggy */
  22. #include <linux/device.h>
  23. #include <asm/setup.h>
  24. #include "pci.h"
  25. const char *pci_power_names[] = {
  26. "error", "D0", "D1", "D2", "D3hot", "D3cold", "unknown",
  27. };
  28. EXPORT_SYMBOL_GPL(pci_power_names);
  29. unsigned int pci_pm_d3_delay = PCI_PM_D3_WAIT;
  30. #ifdef CONFIG_PCI_DOMAINS
  31. int pci_domains_supported = 1;
  32. #endif
  33. #define DEFAULT_CARDBUS_IO_SIZE (256)
  34. #define DEFAULT_CARDBUS_MEM_SIZE (64*1024*1024)
  35. /* pci=cbmemsize=nnM,cbiosize=nn can override this */
  36. unsigned long pci_cardbus_io_size = DEFAULT_CARDBUS_IO_SIZE;
  37. unsigned long pci_cardbus_mem_size = DEFAULT_CARDBUS_MEM_SIZE;
  38. #define DEFAULT_HOTPLUG_IO_SIZE (256)
  39. #define DEFAULT_HOTPLUG_MEM_SIZE (2*1024*1024)
  40. /* pci=hpmemsize=nnM,hpiosize=nn can override this */
  41. unsigned long pci_hotplug_io_size = DEFAULT_HOTPLUG_IO_SIZE;
  42. unsigned long pci_hotplug_mem_size = DEFAULT_HOTPLUG_MEM_SIZE;
  43. /*
  44. * The default CLS is used if arch didn't set CLS explicitly and not
  45. * all pci devices agree on the same value. Arch can override either
  46. * the dfl or actual value as it sees fit. Don't forget this is
  47. * measured in 32-bit words, not bytes.
  48. */
  49. u8 pci_dfl_cache_line_size __devinitdata = L1_CACHE_BYTES >> 2;
  50. u8 pci_cache_line_size;
  51. /**
  52. * pci_bus_max_busnr - returns maximum PCI bus number of given bus' children
  53. * @bus: pointer to PCI bus structure to search
  54. *
  55. * Given a PCI bus, returns the highest PCI bus number present in the set
  56. * including the given PCI bus and its list of child PCI buses.
  57. */
  58. unsigned char pci_bus_max_busnr(struct pci_bus* bus)
  59. {
  60. struct list_head *tmp;
  61. unsigned char max, n;
  62. max = bus->subordinate;
  63. list_for_each(tmp, &bus->children) {
  64. n = pci_bus_max_busnr(pci_bus_b(tmp));
  65. if(n > max)
  66. max = n;
  67. }
  68. return max;
  69. }
  70. EXPORT_SYMBOL_GPL(pci_bus_max_busnr);
  71. #ifdef CONFIG_HAS_IOMEM
  72. void __iomem *pci_ioremap_bar(struct pci_dev *pdev, int bar)
  73. {
  74. /*
  75. * Make sure the BAR is actually a memory resource, not an IO resource
  76. */
  77. if (!(pci_resource_flags(pdev, bar) & IORESOURCE_MEM)) {
  78. WARN_ON(1);
  79. return NULL;
  80. }
  81. return ioremap_nocache(pci_resource_start(pdev, bar),
  82. pci_resource_len(pdev, bar));
  83. }
  84. EXPORT_SYMBOL_GPL(pci_ioremap_bar);
  85. #endif
  86. #if 0
  87. /**
  88. * pci_max_busnr - returns maximum PCI bus number
  89. *
  90. * Returns the highest PCI bus number present in the system global list of
  91. * PCI buses.
  92. */
  93. unsigned char __devinit
  94. pci_max_busnr(void)
  95. {
  96. struct pci_bus *bus = NULL;
  97. unsigned char max, n;
  98. max = 0;
  99. while ((bus = pci_find_next_bus(bus)) != NULL) {
  100. n = pci_bus_max_busnr(bus);
  101. if(n > max)
  102. max = n;
  103. }
  104. return max;
  105. }
  106. #endif /* 0 */
  107. #define PCI_FIND_CAP_TTL 48
  108. static int __pci_find_next_cap_ttl(struct pci_bus *bus, unsigned int devfn,
  109. u8 pos, int cap, int *ttl)
  110. {
  111. u8 id;
  112. while ((*ttl)--) {
  113. pci_bus_read_config_byte(bus, devfn, pos, &pos);
  114. if (pos < 0x40)
  115. break;
  116. pos &= ~3;
  117. pci_bus_read_config_byte(bus, devfn, pos + PCI_CAP_LIST_ID,
  118. &id);
  119. if (id == 0xff)
  120. break;
  121. if (id == cap)
  122. return pos;
  123. pos += PCI_CAP_LIST_NEXT;
  124. }
  125. return 0;
  126. }
  127. static int __pci_find_next_cap(struct pci_bus *bus, unsigned int devfn,
  128. u8 pos, int cap)
  129. {
  130. int ttl = PCI_FIND_CAP_TTL;
  131. return __pci_find_next_cap_ttl(bus, devfn, pos, cap, &ttl);
  132. }
  133. int pci_find_next_capability(struct pci_dev *dev, u8 pos, int cap)
  134. {
  135. return __pci_find_next_cap(dev->bus, dev->devfn,
  136. pos + PCI_CAP_LIST_NEXT, cap);
  137. }
  138. EXPORT_SYMBOL_GPL(pci_find_next_capability);
  139. static int __pci_bus_find_cap_start(struct pci_bus *bus,
  140. unsigned int devfn, u8 hdr_type)
  141. {
  142. u16 status;
  143. pci_bus_read_config_word(bus, devfn, PCI_STATUS, &status);
  144. if (!(status & PCI_STATUS_CAP_LIST))
  145. return 0;
  146. switch (hdr_type) {
  147. case PCI_HEADER_TYPE_NORMAL:
  148. case PCI_HEADER_TYPE_BRIDGE:
  149. return PCI_CAPABILITY_LIST;
  150. case PCI_HEADER_TYPE_CARDBUS:
  151. return PCI_CB_CAPABILITY_LIST;
  152. default:
  153. return 0;
  154. }
  155. return 0;
  156. }
  157. /**
  158. * pci_find_capability - query for devices' capabilities
  159. * @dev: PCI device to query
  160. * @cap: capability code
  161. *
  162. * Tell if a device supports a given PCI capability.
  163. * Returns the address of the requested capability structure within the
  164. * device's PCI configuration space or 0 in case the device does not
  165. * support it. Possible values for @cap:
  166. *
  167. * %PCI_CAP_ID_PM Power Management
  168. * %PCI_CAP_ID_AGP Accelerated Graphics Port
  169. * %PCI_CAP_ID_VPD Vital Product Data
  170. * %PCI_CAP_ID_SLOTID Slot Identification
  171. * %PCI_CAP_ID_MSI Message Signalled Interrupts
  172. * %PCI_CAP_ID_CHSWP CompactPCI HotSwap
  173. * %PCI_CAP_ID_PCIX PCI-X
  174. * %PCI_CAP_ID_EXP PCI Express
  175. */
  176. int pci_find_capability(struct pci_dev *dev, int cap)
  177. {
  178. int pos;
  179. pos = __pci_bus_find_cap_start(dev->bus, dev->devfn, dev->hdr_type);
  180. if (pos)
  181. pos = __pci_find_next_cap(dev->bus, dev->devfn, pos, cap);
  182. return pos;
  183. }
  184. /**
  185. * pci_bus_find_capability - query for devices' capabilities
  186. * @bus: the PCI bus to query
  187. * @devfn: PCI device to query
  188. * @cap: capability code
  189. *
  190. * Like pci_find_capability() but works for pci devices that do not have a
  191. * pci_dev structure set up yet.
  192. *
  193. * Returns the address of the requested capability structure within the
  194. * device's PCI configuration space or 0 in case the device does not
  195. * support it.
  196. */
  197. int pci_bus_find_capability(struct pci_bus *bus, unsigned int devfn, int cap)
  198. {
  199. int pos;
  200. u8 hdr_type;
  201. pci_bus_read_config_byte(bus, devfn, PCI_HEADER_TYPE, &hdr_type);
  202. pos = __pci_bus_find_cap_start(bus, devfn, hdr_type & 0x7f);
  203. if (pos)
  204. pos = __pci_find_next_cap(bus, devfn, pos, cap);
  205. return pos;
  206. }
  207. /**
  208. * pci_find_ext_capability - Find an extended capability
  209. * @dev: PCI device to query
  210. * @cap: capability code
  211. *
  212. * Returns the address of the requested extended capability structure
  213. * within the device's PCI configuration space or 0 if the device does
  214. * not support it. Possible values for @cap:
  215. *
  216. * %PCI_EXT_CAP_ID_ERR Advanced Error Reporting
  217. * %PCI_EXT_CAP_ID_VC Virtual Channel
  218. * %PCI_EXT_CAP_ID_DSN Device Serial Number
  219. * %PCI_EXT_CAP_ID_PWR Power Budgeting
  220. */
  221. int pci_find_ext_capability(struct pci_dev *dev, int cap)
  222. {
  223. u32 header;
  224. int ttl;
  225. int pos = PCI_CFG_SPACE_SIZE;
  226. /* minimum 8 bytes per capability */
  227. ttl = (PCI_CFG_SPACE_EXP_SIZE - PCI_CFG_SPACE_SIZE) / 8;
  228. if (dev->cfg_size <= PCI_CFG_SPACE_SIZE)
  229. return 0;
  230. if (pci_read_config_dword(dev, pos, &header) != PCIBIOS_SUCCESSFUL)
  231. return 0;
  232. /*
  233. * If we have no capabilities, this is indicated by cap ID,
  234. * cap version and next pointer all being 0.
  235. */
  236. if (header == 0)
  237. return 0;
  238. while (ttl-- > 0) {
  239. if (PCI_EXT_CAP_ID(header) == cap)
  240. return pos;
  241. pos = PCI_EXT_CAP_NEXT(header);
  242. if (pos < PCI_CFG_SPACE_SIZE)
  243. break;
  244. if (pci_read_config_dword(dev, pos, &header) != PCIBIOS_SUCCESSFUL)
  245. break;
  246. }
  247. return 0;
  248. }
  249. EXPORT_SYMBOL_GPL(pci_find_ext_capability);
  250. static int __pci_find_next_ht_cap(struct pci_dev *dev, int pos, int ht_cap)
  251. {
  252. int rc, ttl = PCI_FIND_CAP_TTL;
  253. u8 cap, mask;
  254. if (ht_cap == HT_CAPTYPE_SLAVE || ht_cap == HT_CAPTYPE_HOST)
  255. mask = HT_3BIT_CAP_MASK;
  256. else
  257. mask = HT_5BIT_CAP_MASK;
  258. pos = __pci_find_next_cap_ttl(dev->bus, dev->devfn, pos,
  259. PCI_CAP_ID_HT, &ttl);
  260. while (pos) {
  261. rc = pci_read_config_byte(dev, pos + 3, &cap);
  262. if (rc != PCIBIOS_SUCCESSFUL)
  263. return 0;
  264. if ((cap & mask) == ht_cap)
  265. return pos;
  266. pos = __pci_find_next_cap_ttl(dev->bus, dev->devfn,
  267. pos + PCI_CAP_LIST_NEXT,
  268. PCI_CAP_ID_HT, &ttl);
  269. }
  270. return 0;
  271. }
  272. /**
  273. * pci_find_next_ht_capability - query a device's Hypertransport capabilities
  274. * @dev: PCI device to query
  275. * @pos: Position from which to continue searching
  276. * @ht_cap: Hypertransport capability code
  277. *
  278. * To be used in conjunction with pci_find_ht_capability() to search for
  279. * all capabilities matching @ht_cap. @pos should always be a value returned
  280. * from pci_find_ht_capability().
  281. *
  282. * NB. To be 100% safe against broken PCI devices, the caller should take
  283. * steps to avoid an infinite loop.
  284. */
  285. int pci_find_next_ht_capability(struct pci_dev *dev, int pos, int ht_cap)
  286. {
  287. return __pci_find_next_ht_cap(dev, pos + PCI_CAP_LIST_NEXT, ht_cap);
  288. }
  289. EXPORT_SYMBOL_GPL(pci_find_next_ht_capability);
  290. /**
  291. * pci_find_ht_capability - query a device's Hypertransport capabilities
  292. * @dev: PCI device to query
  293. * @ht_cap: Hypertransport capability code
  294. *
  295. * Tell if a device supports a given Hypertransport capability.
  296. * Returns an address within the device's PCI configuration space
  297. * or 0 in case the device does not support the request capability.
  298. * The address points to the PCI capability, of type PCI_CAP_ID_HT,
  299. * which has a Hypertransport capability matching @ht_cap.
  300. */
  301. int pci_find_ht_capability(struct pci_dev *dev, int ht_cap)
  302. {
  303. int pos;
  304. pos = __pci_bus_find_cap_start(dev->bus, dev->devfn, dev->hdr_type);
  305. if (pos)
  306. pos = __pci_find_next_ht_cap(dev, pos, ht_cap);
  307. return pos;
  308. }
  309. EXPORT_SYMBOL_GPL(pci_find_ht_capability);
  310. /**
  311. * pci_find_parent_resource - return resource region of parent bus of given region
  312. * @dev: PCI device structure contains resources to be searched
  313. * @res: child resource record for which parent is sought
  314. *
  315. * For given resource region of given device, return the resource
  316. * region of parent bus the given region is contained in or where
  317. * it should be allocated from.
  318. */
  319. struct resource *
  320. pci_find_parent_resource(const struct pci_dev *dev, struct resource *res)
  321. {
  322. const struct pci_bus *bus = dev->bus;
  323. int i;
  324. struct resource *best = NULL;
  325. for(i = 0; i < PCI_BUS_NUM_RESOURCES; i++) {
  326. struct resource *r = bus->resource[i];
  327. if (!r)
  328. continue;
  329. if (res->start && !(res->start >= r->start && res->end <= r->end))
  330. continue; /* Not contained */
  331. if ((res->flags ^ r->flags) & (IORESOURCE_IO | IORESOURCE_MEM))
  332. continue; /* Wrong type */
  333. if (!((res->flags ^ r->flags) & IORESOURCE_PREFETCH))
  334. return r; /* Exact match */
  335. /* We can't insert a non-prefetch resource inside a prefetchable parent .. */
  336. if (r->flags & IORESOURCE_PREFETCH)
  337. continue;
  338. /* .. but we can put a prefetchable resource inside a non-prefetchable one */
  339. if (!best)
  340. best = r;
  341. }
  342. return best;
  343. }
  344. /**
  345. * pci_restore_bars - restore a devices BAR values (e.g. after wake-up)
  346. * @dev: PCI device to have its BARs restored
  347. *
  348. * Restore the BAR values for a given device, so as to make it
  349. * accessible by its driver.
  350. */
  351. static void
  352. pci_restore_bars(struct pci_dev *dev)
  353. {
  354. int i;
  355. for (i = 0; i < PCI_BRIDGE_RESOURCES; i++)
  356. pci_update_resource(dev, i);
  357. }
  358. static struct pci_platform_pm_ops *pci_platform_pm;
  359. int pci_set_platform_pm(struct pci_platform_pm_ops *ops)
  360. {
  361. if (!ops->is_manageable || !ops->set_state || !ops->choose_state
  362. || !ops->sleep_wake || !ops->can_wakeup)
  363. return -EINVAL;
  364. pci_platform_pm = ops;
  365. return 0;
  366. }
  367. static inline bool platform_pci_power_manageable(struct pci_dev *dev)
  368. {
  369. return pci_platform_pm ? pci_platform_pm->is_manageable(dev) : false;
  370. }
  371. static inline int platform_pci_set_power_state(struct pci_dev *dev,
  372. pci_power_t t)
  373. {
  374. return pci_platform_pm ? pci_platform_pm->set_state(dev, t) : -ENOSYS;
  375. }
  376. static inline pci_power_t platform_pci_choose_state(struct pci_dev *dev)
  377. {
  378. return pci_platform_pm ?
  379. pci_platform_pm->choose_state(dev) : PCI_POWER_ERROR;
  380. }
  381. static inline bool platform_pci_can_wakeup(struct pci_dev *dev)
  382. {
  383. return pci_platform_pm ? pci_platform_pm->can_wakeup(dev) : false;
  384. }
  385. static inline int platform_pci_sleep_wake(struct pci_dev *dev, bool enable)
  386. {
  387. return pci_platform_pm ?
  388. pci_platform_pm->sleep_wake(dev, enable) : -ENODEV;
  389. }
  390. /**
  391. * pci_raw_set_power_state - Use PCI PM registers to set the power state of
  392. * given PCI device
  393. * @dev: PCI device to handle.
  394. * @state: PCI power state (D0, D1, D2, D3hot) to put the device into.
  395. *
  396. * RETURN VALUE:
  397. * -EINVAL if the requested state is invalid.
  398. * -EIO if device does not support PCI PM or its PM capabilities register has a
  399. * wrong version, or device doesn't support the requested state.
  400. * 0 if device already is in the requested state.
  401. * 0 if device's power state has been successfully changed.
  402. */
  403. static int pci_raw_set_power_state(struct pci_dev *dev, pci_power_t state)
  404. {
  405. u16 pmcsr;
  406. bool need_restore = false;
  407. /* Check if we're already there */
  408. if (dev->current_state == state)
  409. return 0;
  410. if (!dev->pm_cap)
  411. return -EIO;
  412. if (state < PCI_D0 || state > PCI_D3hot)
  413. return -EINVAL;
  414. /* Validate current state:
  415. * Can enter D0 from any state, but if we can only go deeper
  416. * to sleep if we're already in a low power state
  417. */
  418. if (state != PCI_D0 && dev->current_state <= PCI_D3cold
  419. && dev->current_state > state) {
  420. dev_err(&dev->dev, "invalid power transition "
  421. "(from state %d to %d)\n", dev->current_state, state);
  422. return -EINVAL;
  423. }
  424. /* check if this device supports the desired state */
  425. if ((state == PCI_D1 && !dev->d1_support)
  426. || (state == PCI_D2 && !dev->d2_support))
  427. return -EIO;
  428. pci_read_config_word(dev, dev->pm_cap + PCI_PM_CTRL, &pmcsr);
  429. /* If we're (effectively) in D3, force entire word to 0.
  430. * This doesn't affect PME_Status, disables PME_En, and
  431. * sets PowerState to 0.
  432. */
  433. switch (dev->current_state) {
  434. case PCI_D0:
  435. case PCI_D1:
  436. case PCI_D2:
  437. pmcsr &= ~PCI_PM_CTRL_STATE_MASK;
  438. pmcsr |= state;
  439. break;
  440. case PCI_D3hot:
  441. case PCI_D3cold:
  442. case PCI_UNKNOWN: /* Boot-up */
  443. if ((pmcsr & PCI_PM_CTRL_STATE_MASK) == PCI_D3hot
  444. && !(pmcsr & PCI_PM_CTRL_NO_SOFT_RESET))
  445. need_restore = true;
  446. /* Fall-through: force to D0 */
  447. default:
  448. pmcsr = 0;
  449. break;
  450. }
  451. /* enter specified state */
  452. pci_write_config_word(dev, dev->pm_cap + PCI_PM_CTRL, pmcsr);
  453. /* Mandatory power management transition delays */
  454. /* see PCI PM 1.1 5.6.1 table 18 */
  455. if (state == PCI_D3hot || dev->current_state == PCI_D3hot)
  456. msleep(pci_pm_d3_delay);
  457. else if (state == PCI_D2 || dev->current_state == PCI_D2)
  458. udelay(PCI_PM_D2_DELAY);
  459. pci_read_config_word(dev, dev->pm_cap + PCI_PM_CTRL, &pmcsr);
  460. dev->current_state = (pmcsr & PCI_PM_CTRL_STATE_MASK);
  461. if (dev->current_state != state && printk_ratelimit())
  462. dev_info(&dev->dev, "Refused to change power state, "
  463. "currently in D%d\n", dev->current_state);
  464. /* According to section 5.4.1 of the "PCI BUS POWER MANAGEMENT
  465. * INTERFACE SPECIFICATION, REV. 1.2", a device transitioning
  466. * from D3hot to D0 _may_ perform an internal reset, thereby
  467. * going to "D0 Uninitialized" rather than "D0 Initialized".
  468. * For example, at least some versions of the 3c905B and the
  469. * 3c556B exhibit this behaviour.
  470. *
  471. * At least some laptop BIOSen (e.g. the Thinkpad T21) leave
  472. * devices in a D3hot state at boot. Consequently, we need to
  473. * restore at least the BARs so that the device will be
  474. * accessible to its driver.
  475. */
  476. if (need_restore)
  477. pci_restore_bars(dev);
  478. if (dev->bus->self)
  479. pcie_aspm_pm_state_change(dev->bus->self);
  480. return 0;
  481. }
  482. /**
  483. * pci_update_current_state - Read PCI power state of given device from its
  484. * PCI PM registers and cache it
  485. * @dev: PCI device to handle.
  486. * @state: State to cache in case the device doesn't have the PM capability
  487. */
  488. void pci_update_current_state(struct pci_dev *dev, pci_power_t state)
  489. {
  490. if (dev->pm_cap) {
  491. u16 pmcsr;
  492. pci_read_config_word(dev, dev->pm_cap + PCI_PM_CTRL, &pmcsr);
  493. dev->current_state = (pmcsr & PCI_PM_CTRL_STATE_MASK);
  494. } else {
  495. dev->current_state = state;
  496. }
  497. }
  498. /**
  499. * pci_platform_power_transition - Use platform to change device power state
  500. * @dev: PCI device to handle.
  501. * @state: State to put the device into.
  502. */
  503. static int pci_platform_power_transition(struct pci_dev *dev, pci_power_t state)
  504. {
  505. int error;
  506. if (platform_pci_power_manageable(dev)) {
  507. error = platform_pci_set_power_state(dev, state);
  508. if (!error)
  509. pci_update_current_state(dev, state);
  510. } else {
  511. error = -ENODEV;
  512. /* Fall back to PCI_D0 if native PM is not supported */
  513. if (!dev->pm_cap)
  514. dev->current_state = PCI_D0;
  515. }
  516. return error;
  517. }
  518. /**
  519. * __pci_start_power_transition - Start power transition of a PCI device
  520. * @dev: PCI device to handle.
  521. * @state: State to put the device into.
  522. */
  523. static void __pci_start_power_transition(struct pci_dev *dev, pci_power_t state)
  524. {
  525. if (state == PCI_D0)
  526. pci_platform_power_transition(dev, PCI_D0);
  527. }
  528. /**
  529. * __pci_complete_power_transition - Complete power transition of a PCI device
  530. * @dev: PCI device to handle.
  531. * @state: State to put the device into.
  532. *
  533. * This function should not be called directly by device drivers.
  534. */
  535. int __pci_complete_power_transition(struct pci_dev *dev, pci_power_t state)
  536. {
  537. return state > PCI_D0 ?
  538. pci_platform_power_transition(dev, state) : -EINVAL;
  539. }
  540. EXPORT_SYMBOL_GPL(__pci_complete_power_transition);
  541. /**
  542. * pci_set_power_state - Set the power state of a PCI device
  543. * @dev: PCI device to handle.
  544. * @state: PCI power state (D0, D1, D2, D3hot) to put the device into.
  545. *
  546. * Transition a device to a new power state, using the platform firmware and/or
  547. * the device's PCI PM registers.
  548. *
  549. * RETURN VALUE:
  550. * -EINVAL if the requested state is invalid.
  551. * -EIO if device does not support PCI PM or its PM capabilities register has a
  552. * wrong version, or device doesn't support the requested state.
  553. * 0 if device already is in the requested state.
  554. * 0 if device's power state has been successfully changed.
  555. */
  556. int pci_set_power_state(struct pci_dev *dev, pci_power_t state)
  557. {
  558. int error;
  559. /* bound the state we're entering */
  560. if (state > PCI_D3hot)
  561. state = PCI_D3hot;
  562. else if (state < PCI_D0)
  563. state = PCI_D0;
  564. else if ((state == PCI_D1 || state == PCI_D2) && pci_no_d1d2(dev))
  565. /*
  566. * If the device or the parent bridge do not support PCI PM,
  567. * ignore the request if we're doing anything other than putting
  568. * it into D0 (which would only happen on boot).
  569. */
  570. return 0;
  571. /* Check if we're already there */
  572. if (dev->current_state == state)
  573. return 0;
  574. __pci_start_power_transition(dev, state);
  575. /* This device is quirked not to be put into D3, so
  576. don't put it in D3 */
  577. if (state == PCI_D3hot && (dev->dev_flags & PCI_DEV_FLAGS_NO_D3))
  578. return 0;
  579. error = pci_raw_set_power_state(dev, state);
  580. if (!__pci_complete_power_transition(dev, state))
  581. error = 0;
  582. return error;
  583. }
  584. /**
  585. * pci_choose_state - Choose the power state of a PCI device
  586. * @dev: PCI device to be suspended
  587. * @state: target sleep state for the whole system. This is the value
  588. * that is passed to suspend() function.
  589. *
  590. * Returns PCI power state suitable for given device and given system
  591. * message.
  592. */
  593. pci_power_t pci_choose_state(struct pci_dev *dev, pm_message_t state)
  594. {
  595. pci_power_t ret;
  596. if (!pci_find_capability(dev, PCI_CAP_ID_PM))
  597. return PCI_D0;
  598. ret = platform_pci_choose_state(dev);
  599. if (ret != PCI_POWER_ERROR)
  600. return ret;
  601. switch (state.event) {
  602. case PM_EVENT_ON:
  603. return PCI_D0;
  604. case PM_EVENT_FREEZE:
  605. case PM_EVENT_PRETHAW:
  606. /* REVISIT both freeze and pre-thaw "should" use D0 */
  607. case PM_EVENT_SUSPEND:
  608. case PM_EVENT_HIBERNATE:
  609. return PCI_D3hot;
  610. default:
  611. dev_info(&dev->dev, "unrecognized suspend event %d\n",
  612. state.event);
  613. BUG();
  614. }
  615. return PCI_D0;
  616. }
  617. EXPORT_SYMBOL(pci_choose_state);
  618. #define PCI_EXP_SAVE_REGS 7
  619. #define pcie_cap_has_devctl(type, flags) 1
  620. #define pcie_cap_has_lnkctl(type, flags) \
  621. ((flags & PCI_EXP_FLAGS_VERS) > 1 || \
  622. (type == PCI_EXP_TYPE_ROOT_PORT || \
  623. type == PCI_EXP_TYPE_ENDPOINT || \
  624. type == PCI_EXP_TYPE_LEG_END))
  625. #define pcie_cap_has_sltctl(type, flags) \
  626. ((flags & PCI_EXP_FLAGS_VERS) > 1 || \
  627. ((type == PCI_EXP_TYPE_ROOT_PORT) || \
  628. (type == PCI_EXP_TYPE_DOWNSTREAM && \
  629. (flags & PCI_EXP_FLAGS_SLOT))))
  630. #define pcie_cap_has_rtctl(type, flags) \
  631. ((flags & PCI_EXP_FLAGS_VERS) > 1 || \
  632. (type == PCI_EXP_TYPE_ROOT_PORT || \
  633. type == PCI_EXP_TYPE_RC_EC))
  634. #define pcie_cap_has_devctl2(type, flags) \
  635. ((flags & PCI_EXP_FLAGS_VERS) > 1)
  636. #define pcie_cap_has_lnkctl2(type, flags) \
  637. ((flags & PCI_EXP_FLAGS_VERS) > 1)
  638. #define pcie_cap_has_sltctl2(type, flags) \
  639. ((flags & PCI_EXP_FLAGS_VERS) > 1)
  640. static int pci_save_pcie_state(struct pci_dev *dev)
  641. {
  642. int pos, i = 0;
  643. struct pci_cap_saved_state *save_state;
  644. u16 *cap;
  645. u16 flags;
  646. pos = pci_pcie_cap(dev);
  647. if (!pos)
  648. return 0;
  649. save_state = pci_find_saved_cap(dev, PCI_CAP_ID_EXP);
  650. if (!save_state) {
  651. dev_err(&dev->dev, "buffer not found in %s\n", __func__);
  652. return -ENOMEM;
  653. }
  654. cap = (u16 *)&save_state->data[0];
  655. pci_read_config_word(dev, pos + PCI_EXP_FLAGS, &flags);
  656. if (pcie_cap_has_devctl(dev->pcie_type, flags))
  657. pci_read_config_word(dev, pos + PCI_EXP_DEVCTL, &cap[i++]);
  658. if (pcie_cap_has_lnkctl(dev->pcie_type, flags))
  659. pci_read_config_word(dev, pos + PCI_EXP_LNKCTL, &cap[i++]);
  660. if (pcie_cap_has_sltctl(dev->pcie_type, flags))
  661. pci_read_config_word(dev, pos + PCI_EXP_SLTCTL, &cap[i++]);
  662. if (pcie_cap_has_rtctl(dev->pcie_type, flags))
  663. pci_read_config_word(dev, pos + PCI_EXP_RTCTL, &cap[i++]);
  664. if (pcie_cap_has_devctl2(dev->pcie_type, flags))
  665. pci_read_config_word(dev, pos + PCI_EXP_DEVCTL2, &cap[i++]);
  666. if (pcie_cap_has_lnkctl2(dev->pcie_type, flags))
  667. pci_read_config_word(dev, pos + PCI_EXP_LNKCTL2, &cap[i++]);
  668. if (pcie_cap_has_sltctl2(dev->pcie_type, flags))
  669. pci_read_config_word(dev, pos + PCI_EXP_SLTCTL2, &cap[i++]);
  670. return 0;
  671. }
  672. static void pci_restore_pcie_state(struct pci_dev *dev)
  673. {
  674. int i = 0, pos;
  675. struct pci_cap_saved_state *save_state;
  676. u16 *cap;
  677. u16 flags;
  678. save_state = pci_find_saved_cap(dev, PCI_CAP_ID_EXP);
  679. pos = pci_find_capability(dev, PCI_CAP_ID_EXP);
  680. if (!save_state || pos <= 0)
  681. return;
  682. cap = (u16 *)&save_state->data[0];
  683. pci_read_config_word(dev, pos + PCI_EXP_FLAGS, &flags);
  684. if (pcie_cap_has_devctl(dev->pcie_type, flags))
  685. pci_write_config_word(dev, pos + PCI_EXP_DEVCTL, cap[i++]);
  686. if (pcie_cap_has_lnkctl(dev->pcie_type, flags))
  687. pci_write_config_word(dev, pos + PCI_EXP_LNKCTL, cap[i++]);
  688. if (pcie_cap_has_sltctl(dev->pcie_type, flags))
  689. pci_write_config_word(dev, pos + PCI_EXP_SLTCTL, cap[i++]);
  690. if (pcie_cap_has_rtctl(dev->pcie_type, flags))
  691. pci_write_config_word(dev, pos + PCI_EXP_RTCTL, cap[i++]);
  692. if (pcie_cap_has_devctl2(dev->pcie_type, flags))
  693. pci_write_config_word(dev, pos + PCI_EXP_DEVCTL2, cap[i++]);
  694. if (pcie_cap_has_lnkctl2(dev->pcie_type, flags))
  695. pci_write_config_word(dev, pos + PCI_EXP_LNKCTL2, cap[i++]);
  696. if (pcie_cap_has_sltctl2(dev->pcie_type, flags))
  697. pci_write_config_word(dev, pos + PCI_EXP_SLTCTL2, cap[i++]);
  698. }
  699. static int pci_save_pcix_state(struct pci_dev *dev)
  700. {
  701. int pos;
  702. struct pci_cap_saved_state *save_state;
  703. pos = pci_find_capability(dev, PCI_CAP_ID_PCIX);
  704. if (pos <= 0)
  705. return 0;
  706. save_state = pci_find_saved_cap(dev, PCI_CAP_ID_PCIX);
  707. if (!save_state) {
  708. dev_err(&dev->dev, "buffer not found in %s\n", __func__);
  709. return -ENOMEM;
  710. }
  711. pci_read_config_word(dev, pos + PCI_X_CMD, (u16 *)save_state->data);
  712. return 0;
  713. }
  714. static void pci_restore_pcix_state(struct pci_dev *dev)
  715. {
  716. int i = 0, pos;
  717. struct pci_cap_saved_state *save_state;
  718. u16 *cap;
  719. save_state = pci_find_saved_cap(dev, PCI_CAP_ID_PCIX);
  720. pos = pci_find_capability(dev, PCI_CAP_ID_PCIX);
  721. if (!save_state || pos <= 0)
  722. return;
  723. cap = (u16 *)&save_state->data[0];
  724. pci_write_config_word(dev, pos + PCI_X_CMD, cap[i++]);
  725. }
  726. /**
  727. * pci_save_state - save the PCI configuration space of a device before suspending
  728. * @dev: - PCI device that we're dealing with
  729. */
  730. int
  731. pci_save_state(struct pci_dev *dev)
  732. {
  733. int i;
  734. /* XXX: 100% dword access ok here? */
  735. for (i = 0; i < 16; i++)
  736. pci_read_config_dword(dev, i * 4,&dev->saved_config_space[i]);
  737. dev->state_saved = true;
  738. if ((i = pci_save_pcie_state(dev)) != 0)
  739. return i;
  740. if ((i = pci_save_pcix_state(dev)) != 0)
  741. return i;
  742. return 0;
  743. }
  744. /**
  745. * pci_restore_state - Restore the saved state of a PCI device
  746. * @dev: - PCI device that we're dealing with
  747. */
  748. int
  749. pci_restore_state(struct pci_dev *dev)
  750. {
  751. int i;
  752. u32 val;
  753. if (!dev->state_saved)
  754. return 0;
  755. /* PCI Express register must be restored first */
  756. pci_restore_pcie_state(dev);
  757. /*
  758. * The Base Address register should be programmed before the command
  759. * register(s)
  760. */
  761. for (i = 15; i >= 0; i--) {
  762. pci_read_config_dword(dev, i * 4, &val);
  763. if (val != dev->saved_config_space[i]) {
  764. dev_printk(KERN_DEBUG, &dev->dev, "restoring config "
  765. "space at offset %#x (was %#x, writing %#x)\n",
  766. i, val, (int)dev->saved_config_space[i]);
  767. pci_write_config_dword(dev,i * 4,
  768. dev->saved_config_space[i]);
  769. }
  770. }
  771. pci_restore_pcix_state(dev);
  772. pci_restore_msi_state(dev);
  773. pci_restore_iov_state(dev);
  774. dev->state_saved = false;
  775. return 0;
  776. }
  777. static int do_pci_enable_device(struct pci_dev *dev, int bars)
  778. {
  779. int err;
  780. err = pci_set_power_state(dev, PCI_D0);
  781. if (err < 0 && err != -EIO)
  782. return err;
  783. err = pcibios_enable_device(dev, bars);
  784. if (err < 0)
  785. return err;
  786. pci_fixup_device(pci_fixup_enable, dev);
  787. return 0;
  788. }
  789. /**
  790. * pci_reenable_device - Resume abandoned device
  791. * @dev: PCI device to be resumed
  792. *
  793. * Note this function is a backend of pci_default_resume and is not supposed
  794. * to be called by normal code, write proper resume handler and use it instead.
  795. */
  796. int pci_reenable_device(struct pci_dev *dev)
  797. {
  798. if (pci_is_enabled(dev))
  799. return do_pci_enable_device(dev, (1 << PCI_NUM_RESOURCES) - 1);
  800. return 0;
  801. }
  802. static int __pci_enable_device_flags(struct pci_dev *dev,
  803. resource_size_t flags)
  804. {
  805. int err;
  806. int i, bars = 0;
  807. if (atomic_add_return(1, &dev->enable_cnt) > 1)
  808. return 0; /* already enabled */
  809. for (i = 0; i < DEVICE_COUNT_RESOURCE; i++)
  810. if (dev->resource[i].flags & flags)
  811. bars |= (1 << i);
  812. err = do_pci_enable_device(dev, bars);
  813. if (err < 0)
  814. atomic_dec(&dev->enable_cnt);
  815. return err;
  816. }
  817. /**
  818. * pci_enable_device_io - Initialize a device for use with IO space
  819. * @dev: PCI device to be initialized
  820. *
  821. * Initialize device before it's used by a driver. Ask low-level code
  822. * to enable I/O resources. Wake up the device if it was suspended.
  823. * Beware, this function can fail.
  824. */
  825. int pci_enable_device_io(struct pci_dev *dev)
  826. {
  827. return __pci_enable_device_flags(dev, IORESOURCE_IO);
  828. }
  829. /**
  830. * pci_enable_device_mem - Initialize a device for use with Memory space
  831. * @dev: PCI device to be initialized
  832. *
  833. * Initialize device before it's used by a driver. Ask low-level code
  834. * to enable Memory resources. Wake up the device if it was suspended.
  835. * Beware, this function can fail.
  836. */
  837. int pci_enable_device_mem(struct pci_dev *dev)
  838. {
  839. return __pci_enable_device_flags(dev, IORESOURCE_MEM);
  840. }
  841. /**
  842. * pci_enable_device - Initialize device before it's used by a driver.
  843. * @dev: PCI device to be initialized
  844. *
  845. * Initialize device before it's used by a driver. Ask low-level code
  846. * to enable I/O and memory. Wake up the device if it was suspended.
  847. * Beware, this function can fail.
  848. *
  849. * Note we don't actually enable the device many times if we call
  850. * this function repeatedly (we just increment the count).
  851. */
  852. int pci_enable_device(struct pci_dev *dev)
  853. {
  854. return __pci_enable_device_flags(dev, IORESOURCE_MEM | IORESOURCE_IO);
  855. }
  856. /*
  857. * Managed PCI resources. This manages device on/off, intx/msi/msix
  858. * on/off and BAR regions. pci_dev itself records msi/msix status, so
  859. * there's no need to track it separately. pci_devres is initialized
  860. * when a device is enabled using managed PCI device enable interface.
  861. */
  862. struct pci_devres {
  863. unsigned int enabled:1;
  864. unsigned int pinned:1;
  865. unsigned int orig_intx:1;
  866. unsigned int restore_intx:1;
  867. u32 region_mask;
  868. };
  869. static void pcim_release(struct device *gendev, void *res)
  870. {
  871. struct pci_dev *dev = container_of(gendev, struct pci_dev, dev);
  872. struct pci_devres *this = res;
  873. int i;
  874. if (dev->msi_enabled)
  875. pci_disable_msi(dev);
  876. if (dev->msix_enabled)
  877. pci_disable_msix(dev);
  878. for (i = 0; i < DEVICE_COUNT_RESOURCE; i++)
  879. if (this->region_mask & (1 << i))
  880. pci_release_region(dev, i);
  881. if (this->restore_intx)
  882. pci_intx(dev, this->orig_intx);
  883. if (this->enabled && !this->pinned)
  884. pci_disable_device(dev);
  885. }
  886. static struct pci_devres * get_pci_dr(struct pci_dev *pdev)
  887. {
  888. struct pci_devres *dr, *new_dr;
  889. dr = devres_find(&pdev->dev, pcim_release, NULL, NULL);
  890. if (dr)
  891. return dr;
  892. new_dr = devres_alloc(pcim_release, sizeof(*new_dr), GFP_KERNEL);
  893. if (!new_dr)
  894. return NULL;
  895. return devres_get(&pdev->dev, new_dr, NULL, NULL);
  896. }
  897. static struct pci_devres * find_pci_dr(struct pci_dev *pdev)
  898. {
  899. if (pci_is_managed(pdev))
  900. return devres_find(&pdev->dev, pcim_release, NULL, NULL);
  901. return NULL;
  902. }
  903. /**
  904. * pcim_enable_device - Managed pci_enable_device()
  905. * @pdev: PCI device to be initialized
  906. *
  907. * Managed pci_enable_device().
  908. */
  909. int pcim_enable_device(struct pci_dev *pdev)
  910. {
  911. struct pci_devres *dr;
  912. int rc;
  913. dr = get_pci_dr(pdev);
  914. if (unlikely(!dr))
  915. return -ENOMEM;
  916. if (dr->enabled)
  917. return 0;
  918. rc = pci_enable_device(pdev);
  919. if (!rc) {
  920. pdev->is_managed = 1;
  921. dr->enabled = 1;
  922. }
  923. return rc;
  924. }
  925. /**
  926. * pcim_pin_device - Pin managed PCI device
  927. * @pdev: PCI device to pin
  928. *
  929. * Pin managed PCI device @pdev. Pinned device won't be disabled on
  930. * driver detach. @pdev must have been enabled with
  931. * pcim_enable_device().
  932. */
  933. void pcim_pin_device(struct pci_dev *pdev)
  934. {
  935. struct pci_devres *dr;
  936. dr = find_pci_dr(pdev);
  937. WARN_ON(!dr || !dr->enabled);
  938. if (dr)
  939. dr->pinned = 1;
  940. }
  941. /**
  942. * pcibios_disable_device - disable arch specific PCI resources for device dev
  943. * @dev: the PCI device to disable
  944. *
  945. * Disables architecture specific PCI resources for the device. This
  946. * is the default implementation. Architecture implementations can
  947. * override this.
  948. */
  949. void __attribute__ ((weak)) pcibios_disable_device (struct pci_dev *dev) {}
  950. static void do_pci_disable_device(struct pci_dev *dev)
  951. {
  952. u16 pci_command;
  953. pci_read_config_word(dev, PCI_COMMAND, &pci_command);
  954. if (pci_command & PCI_COMMAND_MASTER) {
  955. pci_command &= ~PCI_COMMAND_MASTER;
  956. pci_write_config_word(dev, PCI_COMMAND, pci_command);
  957. }
  958. pcibios_disable_device(dev);
  959. }
  960. /**
  961. * pci_disable_enabled_device - Disable device without updating enable_cnt
  962. * @dev: PCI device to disable
  963. *
  964. * NOTE: This function is a backend of PCI power management routines and is
  965. * not supposed to be called drivers.
  966. */
  967. void pci_disable_enabled_device(struct pci_dev *dev)
  968. {
  969. if (pci_is_enabled(dev))
  970. do_pci_disable_device(dev);
  971. }
  972. /**
  973. * pci_disable_device - Disable PCI device after use
  974. * @dev: PCI device to be disabled
  975. *
  976. * Signal to the system that the PCI device is not in use by the system
  977. * anymore. This only involves disabling PCI bus-mastering, if active.
  978. *
  979. * Note we don't actually disable the device until all callers of
  980. * pci_device_enable() have called pci_device_disable().
  981. */
  982. void
  983. pci_disable_device(struct pci_dev *dev)
  984. {
  985. struct pci_devres *dr;
  986. dr = find_pci_dr(dev);
  987. if (dr)
  988. dr->enabled = 0;
  989. if (atomic_sub_return(1, &dev->enable_cnt) != 0)
  990. return;
  991. do_pci_disable_device(dev);
  992. dev->is_busmaster = 0;
  993. }
  994. /**
  995. * pcibios_set_pcie_reset_state - set reset state for device dev
  996. * @dev: the PCI-E device reset
  997. * @state: Reset state to enter into
  998. *
  999. *
  1000. * Sets the PCI-E reset state for the device. This is the default
  1001. * implementation. Architecture implementations can override this.
  1002. */
  1003. int __attribute__ ((weak)) pcibios_set_pcie_reset_state(struct pci_dev *dev,
  1004. enum pcie_reset_state state)
  1005. {
  1006. return -EINVAL;
  1007. }
  1008. /**
  1009. * pci_set_pcie_reset_state - set reset state for device dev
  1010. * @dev: the PCI-E device reset
  1011. * @state: Reset state to enter into
  1012. *
  1013. *
  1014. * Sets the PCI reset state for the device.
  1015. */
  1016. int pci_set_pcie_reset_state(struct pci_dev *dev, enum pcie_reset_state state)
  1017. {
  1018. return pcibios_set_pcie_reset_state(dev, state);
  1019. }
  1020. /**
  1021. * pci_pme_capable - check the capability of PCI device to generate PME#
  1022. * @dev: PCI device to handle.
  1023. * @state: PCI state from which device will issue PME#.
  1024. */
  1025. bool pci_pme_capable(struct pci_dev *dev, pci_power_t state)
  1026. {
  1027. if (!dev->pm_cap)
  1028. return false;
  1029. return !!(dev->pme_support & (1 << state));
  1030. }
  1031. /**
  1032. * pci_pme_active - enable or disable PCI device's PME# function
  1033. * @dev: PCI device to handle.
  1034. * @enable: 'true' to enable PME# generation; 'false' to disable it.
  1035. *
  1036. * The caller must verify that the device is capable of generating PME# before
  1037. * calling this function with @enable equal to 'true'.
  1038. */
  1039. void pci_pme_active(struct pci_dev *dev, bool enable)
  1040. {
  1041. u16 pmcsr;
  1042. if (!dev->pm_cap)
  1043. return;
  1044. pci_read_config_word(dev, dev->pm_cap + PCI_PM_CTRL, &pmcsr);
  1045. /* Clear PME_Status by writing 1 to it and enable PME# */
  1046. pmcsr |= PCI_PM_CTRL_PME_STATUS | PCI_PM_CTRL_PME_ENABLE;
  1047. if (!enable)
  1048. pmcsr &= ~PCI_PM_CTRL_PME_ENABLE;
  1049. pci_write_config_word(dev, dev->pm_cap + PCI_PM_CTRL, pmcsr);
  1050. dev_printk(KERN_DEBUG, &dev->dev, "PME# %s\n",
  1051. enable ? "enabled" : "disabled");
  1052. }
  1053. /**
  1054. * pci_enable_wake - enable PCI device as wakeup event source
  1055. * @dev: PCI device affected
  1056. * @state: PCI state from which device will issue wakeup events
  1057. * @enable: True to enable event generation; false to disable
  1058. *
  1059. * This enables the device as a wakeup event source, or disables it.
  1060. * When such events involves platform-specific hooks, those hooks are
  1061. * called automatically by this routine.
  1062. *
  1063. * Devices with legacy power management (no standard PCI PM capabilities)
  1064. * always require such platform hooks.
  1065. *
  1066. * RETURN VALUE:
  1067. * 0 is returned on success
  1068. * -EINVAL is returned if device is not supposed to wake up the system
  1069. * Error code depending on the platform is returned if both the platform and
  1070. * the native mechanism fail to enable the generation of wake-up events
  1071. */
  1072. int pci_enable_wake(struct pci_dev *dev, pci_power_t state, bool enable)
  1073. {
  1074. int ret = 0;
  1075. if (enable && !device_may_wakeup(&dev->dev))
  1076. return -EINVAL;
  1077. /* Don't do the same thing twice in a row for one device. */
  1078. if (!!enable == !!dev->wakeup_prepared)
  1079. return 0;
  1080. /*
  1081. * According to "PCI System Architecture" 4th ed. by Tom Shanley & Don
  1082. * Anderson we should be doing PME# wake enable followed by ACPI wake
  1083. * enable. To disable wake-up we call the platform first, for symmetry.
  1084. */
  1085. if (enable) {
  1086. int error;
  1087. if (pci_pme_capable(dev, state))
  1088. pci_pme_active(dev, true);
  1089. else
  1090. ret = 1;
  1091. error = platform_pci_sleep_wake(dev, true);
  1092. if (ret)
  1093. ret = error;
  1094. if (!ret)
  1095. dev->wakeup_prepared = true;
  1096. } else {
  1097. platform_pci_sleep_wake(dev, false);
  1098. pci_pme_active(dev, false);
  1099. dev->wakeup_prepared = false;
  1100. }
  1101. return ret;
  1102. }
  1103. /**
  1104. * pci_wake_from_d3 - enable/disable device to wake up from D3_hot or D3_cold
  1105. * @dev: PCI device to prepare
  1106. * @enable: True to enable wake-up event generation; false to disable
  1107. *
  1108. * Many drivers want the device to wake up the system from D3_hot or D3_cold
  1109. * and this function allows them to set that up cleanly - pci_enable_wake()
  1110. * should not be called twice in a row to enable wake-up due to PCI PM vs ACPI
  1111. * ordering constraints.
  1112. *
  1113. * This function only returns error code if the device is not capable of
  1114. * generating PME# from both D3_hot and D3_cold, and the platform is unable to
  1115. * enable wake-up power for it.
  1116. */
  1117. int pci_wake_from_d3(struct pci_dev *dev, bool enable)
  1118. {
  1119. return pci_pme_capable(dev, PCI_D3cold) ?
  1120. pci_enable_wake(dev, PCI_D3cold, enable) :
  1121. pci_enable_wake(dev, PCI_D3hot, enable);
  1122. }
  1123. /**
  1124. * pci_target_state - find an appropriate low power state for a given PCI dev
  1125. * @dev: PCI device
  1126. *
  1127. * Use underlying platform code to find a supported low power state for @dev.
  1128. * If the platform can't manage @dev, return the deepest state from which it
  1129. * can generate wake events, based on any available PME info.
  1130. */
  1131. pci_power_t pci_target_state(struct pci_dev *dev)
  1132. {
  1133. pci_power_t target_state = PCI_D3hot;
  1134. if (platform_pci_power_manageable(dev)) {
  1135. /*
  1136. * Call the platform to choose the target state of the device
  1137. * and enable wake-up from this state if supported.
  1138. */
  1139. pci_power_t state = platform_pci_choose_state(dev);
  1140. switch (state) {
  1141. case PCI_POWER_ERROR:
  1142. case PCI_UNKNOWN:
  1143. break;
  1144. case PCI_D1:
  1145. case PCI_D2:
  1146. if (pci_no_d1d2(dev))
  1147. break;
  1148. default:
  1149. target_state = state;
  1150. }
  1151. } else if (!dev->pm_cap) {
  1152. target_state = PCI_D0;
  1153. } else if (device_may_wakeup(&dev->dev)) {
  1154. /*
  1155. * Find the deepest state from which the device can generate
  1156. * wake-up events, make it the target state and enable device
  1157. * to generate PME#.
  1158. */
  1159. if (dev->pme_support) {
  1160. while (target_state
  1161. && !(dev->pme_support & (1 << target_state)))
  1162. target_state--;
  1163. }
  1164. }
  1165. return target_state;
  1166. }
  1167. /**
  1168. * pci_prepare_to_sleep - prepare PCI device for system-wide transition into a sleep state
  1169. * @dev: Device to handle.
  1170. *
  1171. * Choose the power state appropriate for the device depending on whether
  1172. * it can wake up the system and/or is power manageable by the platform
  1173. * (PCI_D3hot is the default) and put the device into that state.
  1174. */
  1175. int pci_prepare_to_sleep(struct pci_dev *dev)
  1176. {
  1177. pci_power_t target_state = pci_target_state(dev);
  1178. int error;
  1179. if (target_state == PCI_POWER_ERROR)
  1180. return -EIO;
  1181. pci_enable_wake(dev, target_state, device_may_wakeup(&dev->dev));
  1182. error = pci_set_power_state(dev, target_state);
  1183. if (error)
  1184. pci_enable_wake(dev, target_state, false);
  1185. return error;
  1186. }
  1187. /**
  1188. * pci_back_from_sleep - turn PCI device on during system-wide transition into working state
  1189. * @dev: Device to handle.
  1190. *
  1191. * Disable device's sytem wake-up capability and put it into D0.
  1192. */
  1193. int pci_back_from_sleep(struct pci_dev *dev)
  1194. {
  1195. pci_enable_wake(dev, PCI_D0, false);
  1196. return pci_set_power_state(dev, PCI_D0);
  1197. }
  1198. /**
  1199. * pci_pm_init - Initialize PM functions of given PCI device
  1200. * @dev: PCI device to handle.
  1201. */
  1202. void pci_pm_init(struct pci_dev *dev)
  1203. {
  1204. int pm;
  1205. u16 pmc;
  1206. dev->wakeup_prepared = false;
  1207. dev->pm_cap = 0;
  1208. /* find PCI PM capability in list */
  1209. pm = pci_find_capability(dev, PCI_CAP_ID_PM);
  1210. if (!pm)
  1211. return;
  1212. /* Check device's ability to generate PME# */
  1213. pci_read_config_word(dev, pm + PCI_PM_PMC, &pmc);
  1214. if ((pmc & PCI_PM_CAP_VER_MASK) > 3) {
  1215. dev_err(&dev->dev, "unsupported PM cap regs version (%u)\n",
  1216. pmc & PCI_PM_CAP_VER_MASK);
  1217. return;
  1218. }
  1219. dev->pm_cap = pm;
  1220. dev->d1_support = false;
  1221. dev->d2_support = false;
  1222. if (!pci_no_d1d2(dev)) {
  1223. if (pmc & PCI_PM_CAP_D1)
  1224. dev->d1_support = true;
  1225. if (pmc & PCI_PM_CAP_D2)
  1226. dev->d2_support = true;
  1227. if (dev->d1_support || dev->d2_support)
  1228. dev_printk(KERN_DEBUG, &dev->dev, "supports%s%s\n",
  1229. dev->d1_support ? " D1" : "",
  1230. dev->d2_support ? " D2" : "");
  1231. }
  1232. pmc &= PCI_PM_CAP_PME_MASK;
  1233. if (pmc) {
  1234. dev_printk(KERN_DEBUG, &dev->dev,
  1235. "PME# supported from%s%s%s%s%s\n",
  1236. (pmc & PCI_PM_CAP_PME_D0) ? " D0" : "",
  1237. (pmc & PCI_PM_CAP_PME_D1) ? " D1" : "",
  1238. (pmc & PCI_PM_CAP_PME_D2) ? " D2" : "",
  1239. (pmc & PCI_PM_CAP_PME_D3) ? " D3hot" : "",
  1240. (pmc & PCI_PM_CAP_PME_D3cold) ? " D3cold" : "");
  1241. dev->pme_support = pmc >> PCI_PM_CAP_PME_SHIFT;
  1242. /*
  1243. * Make device's PM flags reflect the wake-up capability, but
  1244. * let the user space enable it to wake up the system as needed.
  1245. */
  1246. device_set_wakeup_capable(&dev->dev, true);
  1247. device_set_wakeup_enable(&dev->dev, false);
  1248. /* Disable the PME# generation functionality */
  1249. pci_pme_active(dev, false);
  1250. } else {
  1251. dev->pme_support = 0;
  1252. }
  1253. }
  1254. /**
  1255. * platform_pci_wakeup_init - init platform wakeup if present
  1256. * @dev: PCI device
  1257. *
  1258. * Some devices don't have PCI PM caps but can still generate wakeup
  1259. * events through platform methods (like ACPI events). If @dev supports
  1260. * platform wakeup events, set the device flag to indicate as much. This
  1261. * may be redundant if the device also supports PCI PM caps, but double
  1262. * initialization should be safe in that case.
  1263. */
  1264. void platform_pci_wakeup_init(struct pci_dev *dev)
  1265. {
  1266. if (!platform_pci_can_wakeup(dev))
  1267. return;
  1268. device_set_wakeup_capable(&dev->dev, true);
  1269. device_set_wakeup_enable(&dev->dev, false);
  1270. platform_pci_sleep_wake(dev, false);
  1271. }
  1272. /**
  1273. * pci_add_save_buffer - allocate buffer for saving given capability registers
  1274. * @dev: the PCI device
  1275. * @cap: the capability to allocate the buffer for
  1276. * @size: requested size of the buffer
  1277. */
  1278. static int pci_add_cap_save_buffer(
  1279. struct pci_dev *dev, char cap, unsigned int size)
  1280. {
  1281. int pos;
  1282. struct pci_cap_saved_state *save_state;
  1283. pos = pci_find_capability(dev, cap);
  1284. if (pos <= 0)
  1285. return 0;
  1286. save_state = kzalloc(sizeof(*save_state) + size, GFP_KERNEL);
  1287. if (!save_state)
  1288. return -ENOMEM;
  1289. save_state->cap_nr = cap;
  1290. pci_add_saved_cap(dev, save_state);
  1291. return 0;
  1292. }
  1293. /**
  1294. * pci_allocate_cap_save_buffers - allocate buffers for saving capabilities
  1295. * @dev: the PCI device
  1296. */
  1297. void pci_allocate_cap_save_buffers(struct pci_dev *dev)
  1298. {
  1299. int error;
  1300. error = pci_add_cap_save_buffer(dev, PCI_CAP_ID_EXP,
  1301. PCI_EXP_SAVE_REGS * sizeof(u16));
  1302. if (error)
  1303. dev_err(&dev->dev,
  1304. "unable to preallocate PCI Express save buffer\n");
  1305. error = pci_add_cap_save_buffer(dev, PCI_CAP_ID_PCIX, sizeof(u16));
  1306. if (error)
  1307. dev_err(&dev->dev,
  1308. "unable to preallocate PCI-X save buffer\n");
  1309. }
  1310. /**
  1311. * pci_enable_ari - enable ARI forwarding if hardware support it
  1312. * @dev: the PCI device
  1313. */
  1314. void pci_enable_ari(struct pci_dev *dev)
  1315. {
  1316. int pos;
  1317. u32 cap;
  1318. u16 ctrl;
  1319. struct pci_dev *bridge;
  1320. if (!dev->is_pcie || dev->devfn)
  1321. return;
  1322. pos = pci_find_ext_capability(dev, PCI_EXT_CAP_ID_ARI);
  1323. if (!pos)
  1324. return;
  1325. bridge = dev->bus->self;
  1326. if (!bridge || !bridge->is_pcie)
  1327. return;
  1328. pos = pci_pcie_cap(bridge);
  1329. if (!pos)
  1330. return;
  1331. pci_read_config_dword(bridge, pos + PCI_EXP_DEVCAP2, &cap);
  1332. if (!(cap & PCI_EXP_DEVCAP2_ARI))
  1333. return;
  1334. pci_read_config_word(bridge, pos + PCI_EXP_DEVCTL2, &ctrl);
  1335. ctrl |= PCI_EXP_DEVCTL2_ARI;
  1336. pci_write_config_word(bridge, pos + PCI_EXP_DEVCTL2, ctrl);
  1337. bridge->ari_enabled = 1;
  1338. }
  1339. /**
  1340. * pci_enable_acs - enable ACS if hardware support it
  1341. * @dev: the PCI device
  1342. */
  1343. void pci_enable_acs(struct pci_dev *dev)
  1344. {
  1345. int pos;
  1346. u16 cap;
  1347. u16 ctrl;
  1348. if (!dev->is_pcie)
  1349. return;
  1350. pos = pci_find_ext_capability(dev, PCI_EXT_CAP_ID_ACS);
  1351. if (!pos)
  1352. return;
  1353. pci_read_config_word(dev, pos + PCI_ACS_CAP, &cap);
  1354. pci_read_config_word(dev, pos + PCI_ACS_CTRL, &ctrl);
  1355. /* Source Validation */
  1356. ctrl |= (cap & PCI_ACS_SV);
  1357. /* P2P Request Redirect */
  1358. ctrl |= (cap & PCI_ACS_RR);
  1359. /* P2P Completion Redirect */
  1360. ctrl |= (cap & PCI_ACS_CR);
  1361. /* Upstream Forwarding */
  1362. ctrl |= (cap & PCI_ACS_UF);
  1363. pci_write_config_word(dev, pos + PCI_ACS_CTRL, ctrl);
  1364. }
  1365. /**
  1366. * pci_swizzle_interrupt_pin - swizzle INTx for device behind bridge
  1367. * @dev: the PCI device
  1368. * @pin: the INTx pin (1=INTA, 2=INTB, 3=INTD, 4=INTD)
  1369. *
  1370. * Perform INTx swizzling for a device behind one level of bridge. This is
  1371. * required by section 9.1 of the PCI-to-PCI bridge specification for devices
  1372. * behind bridges on add-in cards. For devices with ARI enabled, the slot
  1373. * number is always 0 (see the Implementation Note in section 2.2.8.1 of
  1374. * the PCI Express Base Specification, Revision 2.1)
  1375. */
  1376. u8 pci_swizzle_interrupt_pin(struct pci_dev *dev, u8 pin)
  1377. {
  1378. int slot;
  1379. if (pci_ari_enabled(dev->bus))
  1380. slot = 0;
  1381. else
  1382. slot = PCI_SLOT(dev->devfn);
  1383. return (((pin - 1) + slot) % 4) + 1;
  1384. }
  1385. int
  1386. pci_get_interrupt_pin(struct pci_dev *dev, struct pci_dev **bridge)
  1387. {
  1388. u8 pin;
  1389. pin = dev->pin;
  1390. if (!pin)
  1391. return -1;
  1392. while (!pci_is_root_bus(dev->bus)) {
  1393. pin = pci_swizzle_interrupt_pin(dev, pin);
  1394. dev = dev->bus->self;
  1395. }
  1396. *bridge = dev;
  1397. return pin;
  1398. }
  1399. /**
  1400. * pci_common_swizzle - swizzle INTx all the way to root bridge
  1401. * @dev: the PCI device
  1402. * @pinp: pointer to the INTx pin value (1=INTA, 2=INTB, 3=INTD, 4=INTD)
  1403. *
  1404. * Perform INTx swizzling for a device. This traverses through all PCI-to-PCI
  1405. * bridges all the way up to a PCI root bus.
  1406. */
  1407. u8 pci_common_swizzle(struct pci_dev *dev, u8 *pinp)
  1408. {
  1409. u8 pin = *pinp;
  1410. while (!pci_is_root_bus(dev->bus)) {
  1411. pin = pci_swizzle_interrupt_pin(dev, pin);
  1412. dev = dev->bus->self;
  1413. }
  1414. *pinp = pin;
  1415. return PCI_SLOT(dev->devfn);
  1416. }
  1417. /**
  1418. * pci_release_region - Release a PCI bar
  1419. * @pdev: PCI device whose resources were previously reserved by pci_request_region
  1420. * @bar: BAR to release
  1421. *
  1422. * Releases the PCI I/O and memory resources previously reserved by a
  1423. * successful call to pci_request_region. Call this function only
  1424. * after all use of the PCI regions has ceased.
  1425. */
  1426. void pci_release_region(struct pci_dev *pdev, int bar)
  1427. {
  1428. struct pci_devres *dr;
  1429. if (pci_resource_len(pdev, bar) == 0)
  1430. return;
  1431. if (pci_resource_flags(pdev, bar) & IORESOURCE_IO)
  1432. release_region(pci_resource_start(pdev, bar),
  1433. pci_resource_len(pdev, bar));
  1434. else if (pci_resource_flags(pdev, bar) & IORESOURCE_MEM)
  1435. release_mem_region(pci_resource_start(pdev, bar),
  1436. pci_resource_len(pdev, bar));
  1437. dr = find_pci_dr(pdev);
  1438. if (dr)
  1439. dr->region_mask &= ~(1 << bar);
  1440. }
  1441. /**
  1442. * __pci_request_region - Reserved PCI I/O and memory resource
  1443. * @pdev: PCI device whose resources are to be reserved
  1444. * @bar: BAR to be reserved
  1445. * @res_name: Name to be associated with resource.
  1446. * @exclusive: whether the region access is exclusive or not
  1447. *
  1448. * Mark the PCI region associated with PCI device @pdev BR @bar as
  1449. * being reserved by owner @res_name. Do not access any
  1450. * address inside the PCI regions unless this call returns
  1451. * successfully.
  1452. *
  1453. * If @exclusive is set, then the region is marked so that userspace
  1454. * is explicitly not allowed to map the resource via /dev/mem or
  1455. * sysfs MMIO access.
  1456. *
  1457. * Returns 0 on success, or %EBUSY on error. A warning
  1458. * message is also printed on failure.
  1459. */
  1460. static int __pci_request_region(struct pci_dev *pdev, int bar, const char *res_name,
  1461. int exclusive)
  1462. {
  1463. struct pci_devres *dr;
  1464. if (pci_resource_len(pdev, bar) == 0)
  1465. return 0;
  1466. if (pci_resource_flags(pdev, bar) & IORESOURCE_IO) {
  1467. if (!request_region(pci_resource_start(pdev, bar),
  1468. pci_resource_len(pdev, bar), res_name))
  1469. goto err_out;
  1470. }
  1471. else if (pci_resource_flags(pdev, bar) & IORESOURCE_MEM) {
  1472. if (!__request_mem_region(pci_resource_start(pdev, bar),
  1473. pci_resource_len(pdev, bar), res_name,
  1474. exclusive))
  1475. goto err_out;
  1476. }
  1477. dr = find_pci_dr(pdev);
  1478. if (dr)
  1479. dr->region_mask |= 1 << bar;
  1480. return 0;
  1481. err_out:
  1482. dev_warn(&pdev->dev, "BAR %d: can't reserve %pR\n", bar,
  1483. &pdev->resource[bar]);
  1484. return -EBUSY;
  1485. }
  1486. /**
  1487. * pci_request_region - Reserve PCI I/O and memory resource
  1488. * @pdev: PCI device whose resources are to be reserved
  1489. * @bar: BAR to be reserved
  1490. * @res_name: Name to be associated with resource
  1491. *
  1492. * Mark the PCI region associated with PCI device @pdev BAR @bar as
  1493. * being reserved by owner @res_name. Do not access any
  1494. * address inside the PCI regions unless this call returns
  1495. * successfully.
  1496. *
  1497. * Returns 0 on success, or %EBUSY on error. A warning
  1498. * message is also printed on failure.
  1499. */
  1500. int pci_request_region(struct pci_dev *pdev, int bar, const char *res_name)
  1501. {
  1502. return __pci_request_region(pdev, bar, res_name, 0);
  1503. }
  1504. /**
  1505. * pci_request_region_exclusive - Reserved PCI I/O and memory resource
  1506. * @pdev: PCI device whose resources are to be reserved
  1507. * @bar: BAR to be reserved
  1508. * @res_name: Name to be associated with resource.
  1509. *
  1510. * Mark the PCI region associated with PCI device @pdev BR @bar as
  1511. * being reserved by owner @res_name. Do not access any
  1512. * address inside the PCI regions unless this call returns
  1513. * successfully.
  1514. *
  1515. * Returns 0 on success, or %EBUSY on error. A warning
  1516. * message is also printed on failure.
  1517. *
  1518. * The key difference that _exclusive makes it that userspace is
  1519. * explicitly not allowed to map the resource via /dev/mem or
  1520. * sysfs.
  1521. */
  1522. int pci_request_region_exclusive(struct pci_dev *pdev, int bar, const char *res_name)
  1523. {
  1524. return __pci_request_region(pdev, bar, res_name, IORESOURCE_EXCLUSIVE);
  1525. }
  1526. /**
  1527. * pci_release_selected_regions - Release selected PCI I/O and memory resources
  1528. * @pdev: PCI device whose resources were previously reserved
  1529. * @bars: Bitmask of BARs to be released
  1530. *
  1531. * Release selected PCI I/O and memory resources previously reserved.
  1532. * Call this function only after all use of the PCI regions has ceased.
  1533. */
  1534. void pci_release_selected_regions(struct pci_dev *pdev, int bars)
  1535. {
  1536. int i;
  1537. for (i = 0; i < 6; i++)
  1538. if (bars & (1 << i))
  1539. pci_release_region(pdev, i);
  1540. }
  1541. int __pci_request_selected_regions(struct pci_dev *pdev, int bars,
  1542. const char *res_name, int excl)
  1543. {
  1544. int i;
  1545. for (i = 0; i < 6; i++)
  1546. if (bars & (1 << i))
  1547. if (__pci_request_region(pdev, i, res_name, excl))
  1548. goto err_out;
  1549. return 0;
  1550. err_out:
  1551. while(--i >= 0)
  1552. if (bars & (1 << i))
  1553. pci_release_region(pdev, i);
  1554. return -EBUSY;
  1555. }
  1556. /**
  1557. * pci_request_selected_regions - Reserve selected PCI I/O and memory resources
  1558. * @pdev: PCI device whose resources are to be reserved
  1559. * @bars: Bitmask of BARs to be requested
  1560. * @res_name: Name to be associated with resource
  1561. */
  1562. int pci_request_selected_regions(struct pci_dev *pdev, int bars,
  1563. const char *res_name)
  1564. {
  1565. return __pci_request_selected_regions(pdev, bars, res_name, 0);
  1566. }
  1567. int pci_request_selected_regions_exclusive(struct pci_dev *pdev,
  1568. int bars, const char *res_name)
  1569. {
  1570. return __pci_request_selected_regions(pdev, bars, res_name,
  1571. IORESOURCE_EXCLUSIVE);
  1572. }
  1573. /**
  1574. * pci_release_regions - Release reserved PCI I/O and memory resources
  1575. * @pdev: PCI device whose resources were previously reserved by pci_request_regions
  1576. *
  1577. * Releases all PCI I/O and memory resources previously reserved by a
  1578. * successful call to pci_request_regions. Call this function only
  1579. * after all use of the PCI regions has ceased.
  1580. */
  1581. void pci_release_regions(struct pci_dev *pdev)
  1582. {
  1583. pci_release_selected_regions(pdev, (1 << 6) - 1);
  1584. }
  1585. /**
  1586. * pci_request_regions - Reserved PCI I/O and memory resources
  1587. * @pdev: PCI device whose resources are to be reserved
  1588. * @res_name: Name to be associated with resource.
  1589. *
  1590. * Mark all PCI regions associated with PCI device @pdev as
  1591. * being reserved by owner @res_name. Do not access any
  1592. * address inside the PCI regions unless this call returns
  1593. * successfully.
  1594. *
  1595. * Returns 0 on success, or %EBUSY on error. A warning
  1596. * message is also printed on failure.
  1597. */
  1598. int pci_request_regions(struct pci_dev *pdev, const char *res_name)
  1599. {
  1600. return pci_request_selected_regions(pdev, ((1 << 6) - 1), res_name);
  1601. }
  1602. /**
  1603. * pci_request_regions_exclusive - Reserved PCI I/O and memory resources
  1604. * @pdev: PCI device whose resources are to be reserved
  1605. * @res_name: Name to be associated with resource.
  1606. *
  1607. * Mark all PCI regions associated with PCI device @pdev as
  1608. * being reserved by owner @res_name. Do not access any
  1609. * address inside the PCI regions unless this call returns
  1610. * successfully.
  1611. *
  1612. * pci_request_regions_exclusive() will mark the region so that
  1613. * /dev/mem and the sysfs MMIO access will not be allowed.
  1614. *
  1615. * Returns 0 on success, or %EBUSY on error. A warning
  1616. * message is also printed on failure.
  1617. */
  1618. int pci_request_regions_exclusive(struct pci_dev *pdev, const char *res_name)
  1619. {
  1620. return pci_request_selected_regions_exclusive(pdev,
  1621. ((1 << 6) - 1), res_name);
  1622. }
  1623. static void __pci_set_master(struct pci_dev *dev, bool enable)
  1624. {
  1625. u16 old_cmd, cmd;
  1626. pci_read_config_word(dev, PCI_COMMAND, &old_cmd);
  1627. if (enable)
  1628. cmd = old_cmd | PCI_COMMAND_MASTER;
  1629. else
  1630. cmd = old_cmd & ~PCI_COMMAND_MASTER;
  1631. if (cmd != old_cmd) {
  1632. dev_dbg(&dev->dev, "%s bus mastering\n",
  1633. enable ? "enabling" : "disabling");
  1634. pci_write_config_word(dev, PCI_COMMAND, cmd);
  1635. }
  1636. dev->is_busmaster = enable;
  1637. }
  1638. /**
  1639. * pci_set_master - enables bus-mastering for device dev
  1640. * @dev: the PCI device to enable
  1641. *
  1642. * Enables bus-mastering on the device and calls pcibios_set_master()
  1643. * to do the needed arch specific settings.
  1644. */
  1645. void pci_set_master(struct pci_dev *dev)
  1646. {
  1647. __pci_set_master(dev, true);
  1648. pcibios_set_master(dev);
  1649. }
  1650. /**
  1651. * pci_clear_master - disables bus-mastering for device dev
  1652. * @dev: the PCI device to disable
  1653. */
  1654. void pci_clear_master(struct pci_dev *dev)
  1655. {
  1656. __pci_set_master(dev, false);
  1657. }
  1658. /**
  1659. * pci_set_cacheline_size - ensure the CACHE_LINE_SIZE register is programmed
  1660. * @dev: the PCI device for which MWI is to be enabled
  1661. *
  1662. * Helper function for pci_set_mwi.
  1663. * Originally copied from drivers/net/acenic.c.
  1664. * Copyright 1998-2001 by Jes Sorensen, <jes@trained-monkey.org>.
  1665. *
  1666. * RETURNS: An appropriate -ERRNO error value on error, or zero for success.
  1667. */
  1668. int pci_set_cacheline_size(struct pci_dev *dev)
  1669. {
  1670. u8 cacheline_size;
  1671. if (!pci_cache_line_size)
  1672. return -EINVAL;
  1673. /* Validate current setting: the PCI_CACHE_LINE_SIZE must be
  1674. equal to or multiple of the right value. */
  1675. pci_read_config_byte(dev, PCI_CACHE_LINE_SIZE, &cacheline_size);
  1676. if (cacheline_size >= pci_cache_line_size &&
  1677. (cacheline_size % pci_cache_line_size) == 0)
  1678. return 0;
  1679. /* Write the correct value. */
  1680. pci_write_config_byte(dev, PCI_CACHE_LINE_SIZE, pci_cache_line_size);
  1681. /* Read it back. */
  1682. pci_read_config_byte(dev, PCI_CACHE_LINE_SIZE, &cacheline_size);
  1683. if (cacheline_size == pci_cache_line_size)
  1684. return 0;
  1685. dev_printk(KERN_DEBUG, &dev->dev, "cache line size of %d is not "
  1686. "supported\n", pci_cache_line_size << 2);
  1687. return -EINVAL;
  1688. }
  1689. EXPORT_SYMBOL_GPL(pci_set_cacheline_size);
  1690. #ifdef PCI_DISABLE_MWI
  1691. int pci_set_mwi(struct pci_dev *dev)
  1692. {
  1693. return 0;
  1694. }
  1695. int pci_try_set_mwi(struct pci_dev *dev)
  1696. {
  1697. return 0;
  1698. }
  1699. void pci_clear_mwi(struct pci_dev *dev)
  1700. {
  1701. }
  1702. #else
  1703. /**
  1704. * pci_set_mwi - enables memory-write-invalidate PCI transaction
  1705. * @dev: the PCI device for which MWI is enabled
  1706. *
  1707. * Enables the Memory-Write-Invalidate transaction in %PCI_COMMAND.
  1708. *
  1709. * RETURNS: An appropriate -ERRNO error value on error, or zero for success.
  1710. */
  1711. int
  1712. pci_set_mwi(struct pci_dev *dev)
  1713. {
  1714. int rc;
  1715. u16 cmd;
  1716. rc = pci_set_cacheline_size(dev);
  1717. if (rc)
  1718. return rc;
  1719. pci_read_config_word(dev, PCI_COMMAND, &cmd);
  1720. if (! (cmd & PCI_COMMAND_INVALIDATE)) {
  1721. dev_dbg(&dev->dev, "enabling Mem-Wr-Inval\n");
  1722. cmd |= PCI_COMMAND_INVALIDATE;
  1723. pci_write_config_word(dev, PCI_COMMAND, cmd);
  1724. }
  1725. return 0;
  1726. }
  1727. /**
  1728. * pci_try_set_mwi - enables memory-write-invalidate PCI transaction
  1729. * @dev: the PCI device for which MWI is enabled
  1730. *
  1731. * Enables the Memory-Write-Invalidate transaction in %PCI_COMMAND.
  1732. * Callers are not required to check the return value.
  1733. *
  1734. * RETURNS: An appropriate -ERRNO error value on error, or zero for success.
  1735. */
  1736. int pci_try_set_mwi(struct pci_dev *dev)
  1737. {
  1738. int rc = pci_set_mwi(dev);
  1739. return rc;
  1740. }
  1741. /**
  1742. * pci_clear_mwi - disables Memory-Write-Invalidate for device dev
  1743. * @dev: the PCI device to disable
  1744. *
  1745. * Disables PCI Memory-Write-Invalidate transaction on the device
  1746. */
  1747. void
  1748. pci_clear_mwi(struct pci_dev *dev)
  1749. {
  1750. u16 cmd;
  1751. pci_read_config_word(dev, PCI_COMMAND, &cmd);
  1752. if (cmd & PCI_COMMAND_INVALIDATE) {
  1753. cmd &= ~PCI_COMMAND_INVALIDATE;
  1754. pci_write_config_word(dev, PCI_COMMAND, cmd);
  1755. }
  1756. }
  1757. #endif /* ! PCI_DISABLE_MWI */
  1758. /**
  1759. * pci_intx - enables/disables PCI INTx for device dev
  1760. * @pdev: the PCI device to operate on
  1761. * @enable: boolean: whether to enable or disable PCI INTx
  1762. *
  1763. * Enables/disables PCI INTx for device dev
  1764. */
  1765. void
  1766. pci_intx(struct pci_dev *pdev, int enable)
  1767. {
  1768. u16 pci_command, new;
  1769. pci_read_config_word(pdev, PCI_COMMAND, &pci_command);
  1770. if (enable) {
  1771. new = pci_command & ~PCI_COMMAND_INTX_DISABLE;
  1772. } else {
  1773. new = pci_command | PCI_COMMAND_INTX_DISABLE;
  1774. }
  1775. if (new != pci_command) {
  1776. struct pci_devres *dr;
  1777. pci_write_config_word(pdev, PCI_COMMAND, new);
  1778. dr = find_pci_dr(pdev);
  1779. if (dr && !dr->restore_intx) {
  1780. dr->restore_intx = 1;
  1781. dr->orig_intx = !enable;
  1782. }
  1783. }
  1784. }
  1785. /**
  1786. * pci_msi_off - disables any msi or msix capabilities
  1787. * @dev: the PCI device to operate on
  1788. *
  1789. * If you want to use msi see pci_enable_msi and friends.
  1790. * This is a lower level primitive that allows us to disable
  1791. * msi operation at the device level.
  1792. */
  1793. void pci_msi_off(struct pci_dev *dev)
  1794. {
  1795. int pos;
  1796. u16 control;
  1797. pos = pci_find_capability(dev, PCI_CAP_ID_MSI);
  1798. if (pos) {
  1799. pci_read_config_word(dev, pos + PCI_MSI_FLAGS, &control);
  1800. control &= ~PCI_MSI_FLAGS_ENABLE;
  1801. pci_write_config_word(dev, pos + PCI_MSI_FLAGS, control);
  1802. }
  1803. pos = pci_find_capability(dev, PCI_CAP_ID_MSIX);
  1804. if (pos) {
  1805. pci_read_config_word(dev, pos + PCI_MSIX_FLAGS, &control);
  1806. control &= ~PCI_MSIX_FLAGS_ENABLE;
  1807. pci_write_config_word(dev, pos + PCI_MSIX_FLAGS, control);
  1808. }
  1809. }
  1810. #ifndef HAVE_ARCH_PCI_SET_DMA_MASK
  1811. /*
  1812. * These can be overridden by arch-specific implementations
  1813. */
  1814. int
  1815. pci_set_dma_mask(struct pci_dev *dev, u64 mask)
  1816. {
  1817. if (!pci_dma_supported(dev, mask))
  1818. return -EIO;
  1819. dev->dma_mask = mask;
  1820. return 0;
  1821. }
  1822. int
  1823. pci_set_consistent_dma_mask(struct pci_dev *dev, u64 mask)
  1824. {
  1825. if (!pci_dma_supported(dev, mask))
  1826. return -EIO;
  1827. dev->dev.coherent_dma_mask = mask;
  1828. return 0;
  1829. }
  1830. #endif
  1831. #ifndef HAVE_ARCH_PCI_SET_DMA_MAX_SEGMENT_SIZE
  1832. int pci_set_dma_max_seg_size(struct pci_dev *dev, unsigned int size)
  1833. {
  1834. return dma_set_max_seg_size(&dev->dev, size);
  1835. }
  1836. EXPORT_SYMBOL(pci_set_dma_max_seg_size);
  1837. #endif
  1838. #ifndef HAVE_ARCH_PCI_SET_DMA_SEGMENT_BOUNDARY
  1839. int pci_set_dma_seg_boundary(struct pci_dev *dev, unsigned long mask)
  1840. {
  1841. return dma_set_seg_boundary(&dev->dev, mask);
  1842. }
  1843. EXPORT_SYMBOL(pci_set_dma_seg_boundary);
  1844. #endif
  1845. static int pcie_flr(struct pci_dev *dev, int probe)
  1846. {
  1847. int i;
  1848. int pos;
  1849. u32 cap;
  1850. u16 status;
  1851. pos = pci_pcie_cap(dev);
  1852. if (!pos)
  1853. return -ENOTTY;
  1854. pci_read_config_dword(dev, pos + PCI_EXP_DEVCAP, &cap);
  1855. if (!(cap & PCI_EXP_DEVCAP_FLR))
  1856. return -ENOTTY;
  1857. if (probe)
  1858. return 0;
  1859. /* Wait for Transaction Pending bit clean */
  1860. for (i = 0; i < 4; i++) {
  1861. if (i)
  1862. msleep((1 << (i - 1)) * 100);
  1863. pci_read_config_word(dev, pos + PCI_EXP_DEVSTA, &status);
  1864. if (!(status & PCI_EXP_DEVSTA_TRPND))
  1865. goto clear;
  1866. }
  1867. dev_err(&dev->dev, "transaction is not cleared; "
  1868. "proceeding with reset anyway\n");
  1869. clear:
  1870. pci_write_config_word(dev, pos + PCI_EXP_DEVCTL,
  1871. PCI_EXP_DEVCTL_BCR_FLR);
  1872. msleep(100);
  1873. return 0;
  1874. }
  1875. static int pci_af_flr(struct pci_dev *dev, int probe)
  1876. {
  1877. int i;
  1878. int pos;
  1879. u8 cap;
  1880. u8 status;
  1881. pos = pci_find_capability(dev, PCI_CAP_ID_AF);
  1882. if (!pos)
  1883. return -ENOTTY;
  1884. pci_read_config_byte(dev, pos + PCI_AF_CAP, &cap);
  1885. if (!(cap & PCI_AF_CAP_TP) || !(cap & PCI_AF_CAP_FLR))
  1886. return -ENOTTY;
  1887. if (probe)
  1888. return 0;
  1889. /* Wait for Transaction Pending bit clean */
  1890. for (i = 0; i < 4; i++) {
  1891. if (i)
  1892. msleep((1 << (i - 1)) * 100);
  1893. pci_read_config_byte(dev, pos + PCI_AF_STATUS, &status);
  1894. if (!(status & PCI_AF_STATUS_TP))
  1895. goto clear;
  1896. }
  1897. dev_err(&dev->dev, "transaction is not cleared; "
  1898. "proceeding with reset anyway\n");
  1899. clear:
  1900. pci_write_config_byte(dev, pos + PCI_AF_CTRL, PCI_AF_CTRL_FLR);
  1901. msleep(100);
  1902. return 0;
  1903. }
  1904. static int pci_pm_reset(struct pci_dev *dev, int probe)
  1905. {
  1906. u16 csr;
  1907. if (!dev->pm_cap)
  1908. return -ENOTTY;
  1909. pci_read_config_word(dev, dev->pm_cap + PCI_PM_CTRL, &csr);
  1910. if (csr & PCI_PM_CTRL_NO_SOFT_RESET)
  1911. return -ENOTTY;
  1912. if (probe)
  1913. return 0;
  1914. if (dev->current_state != PCI_D0)
  1915. return -EINVAL;
  1916. csr &= ~PCI_PM_CTRL_STATE_MASK;
  1917. csr |= PCI_D3hot;
  1918. pci_write_config_word(dev, dev->pm_cap + PCI_PM_CTRL, csr);
  1919. msleep(pci_pm_d3_delay);
  1920. csr &= ~PCI_PM_CTRL_STATE_MASK;
  1921. csr |= PCI_D0;
  1922. pci_write_config_word(dev, dev->pm_cap + PCI_PM_CTRL, csr);
  1923. msleep(pci_pm_d3_delay);
  1924. return 0;
  1925. }
  1926. static int pci_parent_bus_reset(struct pci_dev *dev, int probe)
  1927. {
  1928. u16 ctrl;
  1929. struct pci_dev *pdev;
  1930. if (pci_is_root_bus(dev->bus) || dev->subordinate || !dev->bus->self)
  1931. return -ENOTTY;
  1932. list_for_each_entry(pdev, &dev->bus->devices, bus_list)
  1933. if (pdev != dev)
  1934. return -ENOTTY;
  1935. if (probe)
  1936. return 0;
  1937. pci_read_config_word(dev->bus->self, PCI_BRIDGE_CONTROL, &ctrl);
  1938. ctrl |= PCI_BRIDGE_CTL_BUS_RESET;
  1939. pci_write_config_word(dev->bus->self, PCI_BRIDGE_CONTROL, ctrl);
  1940. msleep(100);
  1941. ctrl &= ~PCI_BRIDGE_CTL_BUS_RESET;
  1942. pci_write_config_word(dev->bus->self, PCI_BRIDGE_CONTROL, ctrl);
  1943. msleep(100);
  1944. return 0;
  1945. }
  1946. static int pci_dev_reset(struct pci_dev *dev, int probe)
  1947. {
  1948. int rc;
  1949. might_sleep();
  1950. if (!probe) {
  1951. pci_block_user_cfg_access(dev);
  1952. /* block PM suspend, driver probe, etc. */
  1953. down(&dev->dev.sem);
  1954. }
  1955. rc = pcie_flr(dev, probe);
  1956. if (rc != -ENOTTY)
  1957. goto done;
  1958. rc = pci_af_flr(dev, probe);
  1959. if (rc != -ENOTTY)
  1960. goto done;
  1961. rc = pci_pm_reset(dev, probe);
  1962. if (rc != -ENOTTY)
  1963. goto done;
  1964. rc = pci_parent_bus_reset(dev, probe);
  1965. done:
  1966. if (!probe) {
  1967. up(&dev->dev.sem);
  1968. pci_unblock_user_cfg_access(dev);
  1969. }
  1970. return rc;
  1971. }
  1972. /**
  1973. * __pci_reset_function - reset a PCI device function
  1974. * @dev: PCI device to reset
  1975. *
  1976. * Some devices allow an individual function to be reset without affecting
  1977. * other functions in the same device. The PCI device must be responsive
  1978. * to PCI config space in order to use this function.
  1979. *
  1980. * The device function is presumed to be unused when this function is called.
  1981. * Resetting the device will make the contents of PCI configuration space
  1982. * random, so any caller of this must be prepared to reinitialise the
  1983. * device including MSI, bus mastering, BARs, decoding IO and memory spaces,
  1984. * etc.
  1985. *
  1986. * Returns 0 if the device function was successfully reset or negative if the
  1987. * device doesn't support resetting a single function.
  1988. */
  1989. int __pci_reset_function(struct pci_dev *dev)
  1990. {
  1991. return pci_dev_reset(dev, 0);
  1992. }
  1993. EXPORT_SYMBOL_GPL(__pci_reset_function);
  1994. /**
  1995. * pci_probe_reset_function - check whether the device can be safely reset
  1996. * @dev: PCI device to reset
  1997. *
  1998. * Some devices allow an individual function to be reset without affecting
  1999. * other functions in the same device. The PCI device must be responsive
  2000. * to PCI config space in order to use this function.
  2001. *
  2002. * Returns 0 if the device function can be reset or negative if the
  2003. * device doesn't support resetting a single function.
  2004. */
  2005. int pci_probe_reset_function(struct pci_dev *dev)
  2006. {
  2007. return pci_dev_reset(dev, 1);
  2008. }
  2009. /**
  2010. * pci_reset_function - quiesce and reset a PCI device function
  2011. * @dev: PCI device to reset
  2012. *
  2013. * Some devices allow an individual function to be reset without affecting
  2014. * other functions in the same device. The PCI device must be responsive
  2015. * to PCI config space in order to use this function.
  2016. *
  2017. * This function does not just reset the PCI portion of a device, but
  2018. * clears all the state associated with the device. This function differs
  2019. * from __pci_reset_function in that it saves and restores device state
  2020. * over the reset.
  2021. *
  2022. * Returns 0 if the device function was successfully reset or negative if the
  2023. * device doesn't support resetting a single function.
  2024. */
  2025. int pci_reset_function(struct pci_dev *dev)
  2026. {
  2027. int rc;
  2028. rc = pci_dev_reset(dev, 1);
  2029. if (rc)
  2030. return rc;
  2031. pci_save_state(dev);
  2032. /*
  2033. * both INTx and MSI are disabled after the Interrupt Disable bit
  2034. * is set and the Bus Master bit is cleared.
  2035. */
  2036. pci_write_config_word(dev, PCI_COMMAND, PCI_COMMAND_INTX_DISABLE);
  2037. rc = pci_dev_reset(dev, 0);
  2038. pci_restore_state(dev);
  2039. return rc;
  2040. }
  2041. EXPORT_SYMBOL_GPL(pci_reset_function);
  2042. /**
  2043. * pcix_get_max_mmrbc - get PCI-X maximum designed memory read byte count
  2044. * @dev: PCI device to query
  2045. *
  2046. * Returns mmrbc: maximum designed memory read count in bytes
  2047. * or appropriate error value.
  2048. */
  2049. int pcix_get_max_mmrbc(struct pci_dev *dev)
  2050. {
  2051. int err, cap;
  2052. u32 stat;
  2053. cap = pci_find_capability(dev, PCI_CAP_ID_PCIX);
  2054. if (!cap)
  2055. return -EINVAL;
  2056. err = pci_read_config_dword(dev, cap + PCI_X_STATUS, &stat);
  2057. if (err)
  2058. return -EINVAL;
  2059. return (stat & PCI_X_STATUS_MAX_READ) >> 12;
  2060. }
  2061. EXPORT_SYMBOL(pcix_get_max_mmrbc);
  2062. /**
  2063. * pcix_get_mmrbc - get PCI-X maximum memory read byte count
  2064. * @dev: PCI device to query
  2065. *
  2066. * Returns mmrbc: maximum memory read count in bytes
  2067. * or appropriate error value.
  2068. */
  2069. int pcix_get_mmrbc(struct pci_dev *dev)
  2070. {
  2071. int ret, cap;
  2072. u32 cmd;
  2073. cap = pci_find_capability(dev, PCI_CAP_ID_PCIX);
  2074. if (!cap)
  2075. return -EINVAL;
  2076. ret = pci_read_config_dword(dev, cap + PCI_X_CMD, &cmd);
  2077. if (!ret)
  2078. ret = 512 << ((cmd & PCI_X_CMD_MAX_READ) >> 2);
  2079. return ret;
  2080. }
  2081. EXPORT_SYMBOL(pcix_get_mmrbc);
  2082. /**
  2083. * pcix_set_mmrbc - set PCI-X maximum memory read byte count
  2084. * @dev: PCI device to query
  2085. * @mmrbc: maximum memory read count in bytes
  2086. * valid values are 512, 1024, 2048, 4096
  2087. *
  2088. * If possible sets maximum memory read byte count, some bridges have erratas
  2089. * that prevent this.
  2090. */
  2091. int pcix_set_mmrbc(struct pci_dev *dev, int mmrbc)
  2092. {
  2093. int cap, err = -EINVAL;
  2094. u32 stat, cmd, v, o;
  2095. if (mmrbc < 512 || mmrbc > 4096 || !is_power_of_2(mmrbc))
  2096. goto out;
  2097. v = ffs(mmrbc) - 10;
  2098. cap = pci_find_capability(dev, PCI_CAP_ID_PCIX);
  2099. if (!cap)
  2100. goto out;
  2101. err = pci_read_config_dword(dev, cap + PCI_X_STATUS, &stat);
  2102. if (err)
  2103. goto out;
  2104. if (v > (stat & PCI_X_STATUS_MAX_READ) >> 21)
  2105. return -E2BIG;
  2106. err = pci_read_config_dword(dev, cap + PCI_X_CMD, &cmd);
  2107. if (err)
  2108. goto out;
  2109. o = (cmd & PCI_X_CMD_MAX_READ) >> 2;
  2110. if (o != v) {
  2111. if (v > o && dev->bus &&
  2112. (dev->bus->bus_flags & PCI_BUS_FLAGS_NO_MMRBC))
  2113. return -EIO;
  2114. cmd &= ~PCI_X_CMD_MAX_READ;
  2115. cmd |= v << 2;
  2116. err = pci_write_config_dword(dev, cap + PCI_X_CMD, cmd);
  2117. }
  2118. out:
  2119. return err;
  2120. }
  2121. EXPORT_SYMBOL(pcix_set_mmrbc);
  2122. /**
  2123. * pcie_get_readrq - get PCI Express read request size
  2124. * @dev: PCI device to query
  2125. *
  2126. * Returns maximum memory read request in bytes
  2127. * or appropriate error value.
  2128. */
  2129. int pcie_get_readrq(struct pci_dev *dev)
  2130. {
  2131. int ret, cap;
  2132. u16 ctl;
  2133. cap = pci_pcie_cap(dev);
  2134. if (!cap)
  2135. return -EINVAL;
  2136. ret = pci_read_config_word(dev, cap + PCI_EXP_DEVCTL, &ctl);
  2137. if (!ret)
  2138. ret = 128 << ((ctl & PCI_EXP_DEVCTL_READRQ) >> 12);
  2139. return ret;
  2140. }
  2141. EXPORT_SYMBOL(pcie_get_readrq);
  2142. /**
  2143. * pcie_set_readrq - set PCI Express maximum memory read request
  2144. * @dev: PCI device to query
  2145. * @rq: maximum memory read count in bytes
  2146. * valid values are 128, 256, 512, 1024, 2048, 4096
  2147. *
  2148. * If possible sets maximum read byte count
  2149. */
  2150. int pcie_set_readrq(struct pci_dev *dev, int rq)
  2151. {
  2152. int cap, err = -EINVAL;
  2153. u16 ctl, v;
  2154. if (rq < 128 || rq > 4096 || !is_power_of_2(rq))
  2155. goto out;
  2156. v = (ffs(rq) - 8) << 12;
  2157. cap = pci_pcie_cap(dev);
  2158. if (!cap)
  2159. goto out;
  2160. err = pci_read_config_word(dev, cap + PCI_EXP_DEVCTL, &ctl);
  2161. if (err)
  2162. goto out;
  2163. if ((ctl & PCI_EXP_DEVCTL_READRQ) != v) {
  2164. ctl &= ~PCI_EXP_DEVCTL_READRQ;
  2165. ctl |= v;
  2166. err = pci_write_config_dword(dev, cap + PCI_EXP_DEVCTL, ctl);
  2167. }
  2168. out:
  2169. return err;
  2170. }
  2171. EXPORT_SYMBOL(pcie_set_readrq);
  2172. /**
  2173. * pci_select_bars - Make BAR mask from the type of resource
  2174. * @dev: the PCI device for which BAR mask is made
  2175. * @flags: resource type mask to be selected
  2176. *
  2177. * This helper routine makes bar mask from the type of resource.
  2178. */
  2179. int pci_select_bars(struct pci_dev *dev, unsigned long flags)
  2180. {
  2181. int i, bars = 0;
  2182. for (i = 0; i < PCI_NUM_RESOURCES; i++)
  2183. if (pci_resource_flags(dev, i) & flags)
  2184. bars |= (1 << i);
  2185. return bars;
  2186. }
  2187. /**
  2188. * pci_resource_bar - get position of the BAR associated with a resource
  2189. * @dev: the PCI device
  2190. * @resno: the resource number
  2191. * @type: the BAR type to be filled in
  2192. *
  2193. * Returns BAR position in config space, or 0 if the BAR is invalid.
  2194. */
  2195. int pci_resource_bar(struct pci_dev *dev, int resno, enum pci_bar_type *type)
  2196. {
  2197. int reg;
  2198. if (resno < PCI_ROM_RESOURCE) {
  2199. *type = pci_bar_unknown;
  2200. return PCI_BASE_ADDRESS_0 + 4 * resno;
  2201. } else if (resno == PCI_ROM_RESOURCE) {
  2202. *type = pci_bar_mem32;
  2203. return dev->rom_base_reg;
  2204. } else if (resno < PCI_BRIDGE_RESOURCES) {
  2205. /* device specific resource */
  2206. reg = pci_iov_resource_bar(dev, resno, type);
  2207. if (reg)
  2208. return reg;
  2209. }
  2210. dev_err(&dev->dev, "BAR %d: invalid resource\n", resno);
  2211. return 0;
  2212. }
  2213. /**
  2214. * pci_set_vga_state - set VGA decode state on device and parents if requested
  2215. * @dev: the PCI device
  2216. * @decode: true = enable decoding, false = disable decoding
  2217. * @command_bits: PCI_COMMAND_IO and/or PCI_COMMAND_MEMORY
  2218. * @change_bridge: traverse ancestors and change bridges
  2219. */
  2220. int pci_set_vga_state(struct pci_dev *dev, bool decode,
  2221. unsigned int command_bits, bool change_bridge)
  2222. {
  2223. struct pci_bus *bus;
  2224. struct pci_dev *bridge;
  2225. u16 cmd;
  2226. WARN_ON(command_bits & ~(PCI_COMMAND_IO|PCI_COMMAND_MEMORY));
  2227. pci_read_config_word(dev, PCI_COMMAND, &cmd);
  2228. if (decode == true)
  2229. cmd |= command_bits;
  2230. else
  2231. cmd &= ~command_bits;
  2232. pci_write_config_word(dev, PCI_COMMAND, cmd);
  2233. if (change_bridge == false)
  2234. return 0;
  2235. bus = dev->bus;
  2236. while (bus) {
  2237. bridge = bus->self;
  2238. if (bridge) {
  2239. pci_read_config_word(bridge, PCI_BRIDGE_CONTROL,
  2240. &cmd);
  2241. if (decode == true)
  2242. cmd |= PCI_BRIDGE_CTL_VGA;
  2243. else
  2244. cmd &= ~PCI_BRIDGE_CTL_VGA;
  2245. pci_write_config_word(bridge, PCI_BRIDGE_CONTROL,
  2246. cmd);
  2247. }
  2248. bus = bus->parent;
  2249. }
  2250. return 0;
  2251. }
  2252. #define RESOURCE_ALIGNMENT_PARAM_SIZE COMMAND_LINE_SIZE
  2253. static char resource_alignment_param[RESOURCE_ALIGNMENT_PARAM_SIZE] = {0};
  2254. static DEFINE_SPINLOCK(resource_alignment_lock);
  2255. /**
  2256. * pci_specified_resource_alignment - get resource alignment specified by user.
  2257. * @dev: the PCI device to get
  2258. *
  2259. * RETURNS: Resource alignment if it is specified.
  2260. * Zero if it is not specified.
  2261. */
  2262. resource_size_t pci_specified_resource_alignment(struct pci_dev *dev)
  2263. {
  2264. int seg, bus, slot, func, align_order, count;
  2265. resource_size_t align = 0;
  2266. char *p;
  2267. spin_lock(&resource_alignment_lock);
  2268. p = resource_alignment_param;
  2269. while (*p) {
  2270. count = 0;
  2271. if (sscanf(p, "%d%n", &align_order, &count) == 1 &&
  2272. p[count] == '@') {
  2273. p += count + 1;
  2274. } else {
  2275. align_order = -1;
  2276. }
  2277. if (sscanf(p, "%x:%x:%x.%x%n",
  2278. &seg, &bus, &slot, &func, &count) != 4) {
  2279. seg = 0;
  2280. if (sscanf(p, "%x:%x.%x%n",
  2281. &bus, &slot, &func, &count) != 3) {
  2282. /* Invalid format */
  2283. printk(KERN_ERR "PCI: Can't parse resource_alignment parameter: %s\n",
  2284. p);
  2285. break;
  2286. }
  2287. }
  2288. p += count;
  2289. if (seg == pci_domain_nr(dev->bus) &&
  2290. bus == dev->bus->number &&
  2291. slot == PCI_SLOT(dev->devfn) &&
  2292. func == PCI_FUNC(dev->devfn)) {
  2293. if (align_order == -1) {
  2294. align = PAGE_SIZE;
  2295. } else {
  2296. align = 1 << align_order;
  2297. }
  2298. /* Found */
  2299. break;
  2300. }
  2301. if (*p != ';' && *p != ',') {
  2302. /* End of param or invalid format */
  2303. break;
  2304. }
  2305. p++;
  2306. }
  2307. spin_unlock(&resource_alignment_lock);
  2308. return align;
  2309. }
  2310. /**
  2311. * pci_is_reassigndev - check if specified PCI is target device to reassign
  2312. * @dev: the PCI device to check
  2313. *
  2314. * RETURNS: non-zero for PCI device is a target device to reassign,
  2315. * or zero is not.
  2316. */
  2317. int pci_is_reassigndev(struct pci_dev *dev)
  2318. {
  2319. return (pci_specified_resource_alignment(dev) != 0);
  2320. }
  2321. ssize_t pci_set_resource_alignment_param(const char *buf, size_t count)
  2322. {
  2323. if (count > RESOURCE_ALIGNMENT_PARAM_SIZE - 1)
  2324. count = RESOURCE_ALIGNMENT_PARAM_SIZE - 1;
  2325. spin_lock(&resource_alignment_lock);
  2326. strncpy(resource_alignment_param, buf, count);
  2327. resource_alignment_param[count] = '\0';
  2328. spin_unlock(&resource_alignment_lock);
  2329. return count;
  2330. }
  2331. ssize_t pci_get_resource_alignment_param(char *buf, size_t size)
  2332. {
  2333. size_t count;
  2334. spin_lock(&resource_alignment_lock);
  2335. count = snprintf(buf, size, "%s", resource_alignment_param);
  2336. spin_unlock(&resource_alignment_lock);
  2337. return count;
  2338. }
  2339. static ssize_t pci_resource_alignment_show(struct bus_type *bus, char *buf)
  2340. {
  2341. return pci_get_resource_alignment_param(buf, PAGE_SIZE);
  2342. }
  2343. static ssize_t pci_resource_alignment_store(struct bus_type *bus,
  2344. const char *buf, size_t count)
  2345. {
  2346. return pci_set_resource_alignment_param(buf, count);
  2347. }
  2348. BUS_ATTR(resource_alignment, 0644, pci_resource_alignment_show,
  2349. pci_resource_alignment_store);
  2350. static int __init pci_resource_alignment_sysfs_init(void)
  2351. {
  2352. return bus_create_file(&pci_bus_type,
  2353. &bus_attr_resource_alignment);
  2354. }
  2355. late_initcall(pci_resource_alignment_sysfs_init);
  2356. static void __devinit pci_no_domains(void)
  2357. {
  2358. #ifdef CONFIG_PCI_DOMAINS
  2359. pci_domains_supported = 0;
  2360. #endif
  2361. }
  2362. /**
  2363. * pci_ext_cfg_enabled - can we access extended PCI config space?
  2364. * @dev: The PCI device of the root bridge.
  2365. *
  2366. * Returns 1 if we can access PCI extended config space (offsets
  2367. * greater than 0xff). This is the default implementation. Architecture
  2368. * implementations can override this.
  2369. */
  2370. int __attribute__ ((weak)) pci_ext_cfg_avail(struct pci_dev *dev)
  2371. {
  2372. return 1;
  2373. }
  2374. static int __init pci_setup(char *str)
  2375. {
  2376. while (str) {
  2377. char *k = strchr(str, ',');
  2378. if (k)
  2379. *k++ = 0;
  2380. if (*str && (str = pcibios_setup(str)) && *str) {
  2381. if (!strcmp(str, "nomsi")) {
  2382. pci_no_msi();
  2383. } else if (!strcmp(str, "noaer")) {
  2384. pci_no_aer();
  2385. } else if (!strcmp(str, "nodomains")) {
  2386. pci_no_domains();
  2387. } else if (!strncmp(str, "cbiosize=", 9)) {
  2388. pci_cardbus_io_size = memparse(str + 9, &str);
  2389. } else if (!strncmp(str, "cbmemsize=", 10)) {
  2390. pci_cardbus_mem_size = memparse(str + 10, &str);
  2391. } else if (!strncmp(str, "resource_alignment=", 19)) {
  2392. pci_set_resource_alignment_param(str + 19,
  2393. strlen(str + 19));
  2394. } else if (!strncmp(str, "ecrc=", 5)) {
  2395. pcie_ecrc_get_policy(str + 5);
  2396. } else if (!strncmp(str, "hpiosize=", 9)) {
  2397. pci_hotplug_io_size = memparse(str + 9, &str);
  2398. } else if (!strncmp(str, "hpmemsize=", 10)) {
  2399. pci_hotplug_mem_size = memparse(str + 10, &str);
  2400. } else {
  2401. printk(KERN_ERR "PCI: Unknown option `%s'\n",
  2402. str);
  2403. }
  2404. }
  2405. str = k;
  2406. }
  2407. return 0;
  2408. }
  2409. early_param("pci", pci_setup);
  2410. EXPORT_SYMBOL(pci_reenable_device);
  2411. EXPORT_SYMBOL(pci_enable_device_io);
  2412. EXPORT_SYMBOL(pci_enable_device_mem);
  2413. EXPORT_SYMBOL(pci_enable_device);
  2414. EXPORT_SYMBOL(pcim_enable_device);
  2415. EXPORT_SYMBOL(pcim_pin_device);
  2416. EXPORT_SYMBOL(pci_disable_device);
  2417. EXPORT_SYMBOL(pci_find_capability);
  2418. EXPORT_SYMBOL(pci_bus_find_capability);
  2419. EXPORT_SYMBOL(pci_release_regions);
  2420. EXPORT_SYMBOL(pci_request_regions);
  2421. EXPORT_SYMBOL(pci_request_regions_exclusive);
  2422. EXPORT_SYMBOL(pci_release_region);
  2423. EXPORT_SYMBOL(pci_request_region);
  2424. EXPORT_SYMBOL(pci_request_region_exclusive);
  2425. EXPORT_SYMBOL(pci_release_selected_regions);
  2426. EXPORT_SYMBOL(pci_request_selected_regions);
  2427. EXPORT_SYMBOL(pci_request_selected_regions_exclusive);
  2428. EXPORT_SYMBOL(pci_set_master);
  2429. EXPORT_SYMBOL(pci_clear_master);
  2430. EXPORT_SYMBOL(pci_set_mwi);
  2431. EXPORT_SYMBOL(pci_try_set_mwi);
  2432. EXPORT_SYMBOL(pci_clear_mwi);
  2433. EXPORT_SYMBOL_GPL(pci_intx);
  2434. EXPORT_SYMBOL(pci_set_dma_mask);
  2435. EXPORT_SYMBOL(pci_set_consistent_dma_mask);
  2436. EXPORT_SYMBOL(pci_assign_resource);
  2437. EXPORT_SYMBOL(pci_find_parent_resource);
  2438. EXPORT_SYMBOL(pci_select_bars);
  2439. EXPORT_SYMBOL(pci_set_power_state);
  2440. EXPORT_SYMBOL(pci_save_state);
  2441. EXPORT_SYMBOL(pci_restore_state);
  2442. EXPORT_SYMBOL(pci_pme_capable);
  2443. EXPORT_SYMBOL(pci_pme_active);
  2444. EXPORT_SYMBOL(pci_enable_wake);
  2445. EXPORT_SYMBOL(pci_wake_from_d3);
  2446. EXPORT_SYMBOL(pci_target_state);
  2447. EXPORT_SYMBOL(pci_prepare_to_sleep);
  2448. EXPORT_SYMBOL(pci_back_from_sleep);
  2449. EXPORT_SYMBOL_GPL(pci_set_pcie_reset_state);