From patchwork Tue Feb 11 19:22:02 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Frank Li X-Patchwork-Id: 864277 Received: from DU2PR03CU002.outbound.protection.outlook.com (mail-northeuropeazon11012029.outbound.protection.outlook.com [52.101.66.29]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0B0072638BA; Tue, 11 Feb 2025 19:23:21 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=52.101.66.29 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739301804; cv=fail; b=gMUVq0FbqKbbYaFK+9EWA8r6UEy2vNNn6sogwWjn8+mw2gvxB4TEp+bs+e8wF6CieWmMkPCTa9UpG8ulbPSVrLNDTu14j+io95/9EtGmHrsw5R6c9BdH6Oi5XF9OyfWvtWymg2C6OiPTqBd72tD+Q6tjQKlo0WPJUP7QH9iG7mM= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739301804; c=relaxed/simple; bh=bgNlybeoMFuURulRJUhsd9c06PZ8kncQBsW1pHAX+h4=; h=From:Date:Subject:Content-Type:Message-Id:References:In-Reply-To: To:Cc:MIME-Version; b=i0oci/tOOUJ0O7oTawAI8TbufSW5djd4eQ1/b1IzW/2TID0JFnFALzH/s8o+LBAddGu/CCKwR1szgSCHIveyHHKutLFlVQ0iIH07D5uhocW4T8J1bZ8zQj3jVhSnl2iZaQvqLRSTJSQcwhMZ/cwH3rr4tq8at7N/CTJwbcwdUBk= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=nxp.com; spf=pass smtp.mailfrom=nxp.com; dkim=pass (2048-bit key) header.d=nxp.com header.i=@nxp.com header.b=NnAvQPfA; arc=fail smtp.client-ip=52.101.66.29 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=nxp.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=nxp.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=nxp.com header.i=@nxp.com header.b="NnAvQPfA" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=TfvlUlWEW+adjkphl7LOxb+JV6tYB8vpIwhoLEXc8dFvgwzM+YbIawsYa76faYmCpQpf4weTGTn9YxLKTF5Nn3LFdoWHLj3zjIqVbcQbibjw03A4jcrQ3wSqruh+N9lRMaYG1ZnlDkhCC68GD9xq0BjXyDtBVlYkqLw26xMSjolKGu/YUyTtOv/iKUF+vP8xAmV/wm/kHGBlo1TlQ7WSTqQakeINxyColFQM/N+czugMV2hXFMlwsb35WCIvWP/tnsYUjoYzLsSlFqNrgJHZCriICczE6wd3b9Qr6zn4TawEyikC8SSfqPcf7Txiq9rK3DsqfY4sHEdjirHufRW2Qg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=9bg6MJ//Lho3Yr/1pvuCw3zXJKiAbbSTzIbMzly1KWQ=; b=beAd2aKuCsLuM/yZf+Aa6KcNMUU1CkaCqrivixkGfqt5RWQCM1J7dUHnUwaR4P1BQMzfRW1hq8dg/stQ1H8pTdHaZ/oSXycJ3KaIb0gQhpq8wCPYzaoNI6/l2nyc0zyXdh5/msrfbmW5pEAUlxAes3ybEfNlcP/4mG9eAA0RPLFMyvErzXZq4Hr12MRh3L0Apeo9g0kjg3UNurWg5xFzYSiq2ZEYldIzVu2yt4flR2I294jTQEfOsNfIB+TyPJs0s7nBH5gXF3e3ZJYohp361d7rwFfQEdBzUAGeVYkJ9yLkg52gQPYBYTdc9OHTYpcb0mXtpICPRE3h6dCFmGUzvw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9bg6MJ//Lho3Yr/1pvuCw3zXJKiAbbSTzIbMzly1KWQ=; b=NnAvQPfAtcOZFhKnGBuNGcFxm5CnFEhOUWWv2u05/ynq04ZOJjJwogQaH5DZysf41uilDKKOTyBgvpFLVkjVV/puefeDTS7Mz0MCtESZcHQqkTvELHXEbNGhsZPVjI/8nJ1OEGE/tfRn+m9G07vLd3/myaZR1tEFce637V4vIVgQTDcmqXQqXnggQaq3kUmj37cOaFWnLN2hL2EZH5QekvgrYxdFrDJFLPtpLsZEaxrcbauXDnnecxv2s4yQOo6fcB2eszIo9kfVaCBLffJ2hbTe5VMQyIKyP9Ea3Dm4JPyYzR0xZ5LulWf3mDgt3WuYAfmmqM3NNvIV9mKXesE54A== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from PAXPR04MB9642.eurprd04.prod.outlook.com (2603:10a6:102:240::14) by VI0PR04MB10291.eurprd04.prod.outlook.com (2603:10a6:800:245::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8422.16; Tue, 11 Feb 2025 19:23:19 +0000 Received: from PAXPR04MB9642.eurprd04.prod.outlook.com ([fe80::9126:a61e:341d:4b06]) by PAXPR04MB9642.eurprd04.prod.outlook.com ([fe80::9126:a61e:341d:4b06%6]) with mapi id 15.20.8422.012; Tue, 11 Feb 2025 19:23:19 +0000 From: Frank Li Date: Tue, 11 Feb 2025 14:22:02 -0500 Subject: [PATCH v15 09/15] PCI: endpoint: pci-epf-test: Add doorbell test support Message-Id: <20250211-ep-msi-v15-9-bcacc1f2b1a9@nxp.com> References: <20250211-ep-msi-v15-0-bcacc1f2b1a9@nxp.com> In-Reply-To: <20250211-ep-msi-v15-0-bcacc1f2b1a9@nxp.com> To: Kishon Vijay Abraham I , "Rafael J. Wysocki" , Thomas Gleixner , Anup Patel , Kishon Vijay Abraham I , Marc Zyngier , Greg Kroah-Hartman , "Rafael J. Wysocki" , Danilo Krummrich , Manivannan Sadhasivam , =?utf-8?q?Krzysz?= =?utf-8?q?tof_Wilczy=C5=84ski?= , Kishon Vijay Abraham I , Bjorn Helgaas , Arnd Bergmann , Shuah Khan , Richard Zhu , Lucas Stach , Lorenzo Pieralisi , Rob Herring , Shawn Guo , Sascha Hauer , Pengutronix Kernel Team , Fabio Estevam , Krzysztof Kozlowski , Conor Dooley Cc: Niklas Cassel , dlemoal@kernel.org, jdmason@kudzu.us, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-pci@vger.kernel.org, linux-kselftest@vger.kernel.org, imx@lists.linux.dev, devicetree@vger.kernel.org, Frank Li X-Mailer: b4 0.13-dev-e586c X-Developer-Signature: v=1; a=ed25519-sha256; t=1739301723; l=8258; i=Frank.Li@nxp.com; s=20240130; h=from:subject:message-id; bh=bgNlybeoMFuURulRJUhsd9c06PZ8kncQBsW1pHAX+h4=; b=EQMaHT/Fziby3MMkGzAqAS79NpcVcNFe8xDwwkz9LFzeKKQJ5mKCePU77uyjo1bgnZQi8CtIK YcFoXLXBXDFCi+iXvIFfm2cJUwl3vLkk91Z5baT0xfOmF//87wkVsAf X-Developer-Key: i=Frank.Li@nxp.com; a=ed25519; pk=I0L1sDUfPxpAkRvPKy7MdauTuSENRq+DnA+G4qcS94Q= X-ClientProxiedBy: SJ0PR13CA0231.namprd13.prod.outlook.com (2603:10b6:a03:2c1::26) To PAXPR04MB9642.eurprd04.prod.outlook.com (2603:10a6:102:240::14) Precedence: bulk X-Mailing-List: linux-kselftest@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: PAXPR04MB9642:EE_|VI0PR04MB10291:EE_ X-MS-Office365-Filtering-Correlation-Id: 05a3bf08-fdff-4bcd-af2f-08dd4ad18aeb X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|7416014|376014|366016|1800799024|52116014|38350700014|921020; X-Microsoft-Antispam-Message-Info: =?utf-8?q?FkO8LlfCOfFiPCwfxMt+CveHSDpQ7QS?= =?utf-8?q?BAzQtSHRMdXE0+kruX6pcOEn41uhMkWXSmxCjwxv7EcdhJHl0LAMw/qAW/cXt6Yy0?= =?utf-8?q?tshJIRkhpdN56kkHNp3MXJ1wFZZo2+PAKnbztbYMVlKMLyycsm9ndgtspDtNdXRV5?= =?utf-8?q?uapU9bOIDmaw0hqaY3IUEq/oWF3xnbN+No7A7M/0A1I7sa9/0g1gw71czz9qeHcpB?= =?utf-8?q?G6aIYDlPF5smaTEidkKH5B12dy7jcw1zoyyPgU/8kYVhRBSDKXKCqNPAm7dJvdex4?= =?utf-8?q?dLsIvSxmayLwlcNLILL3RPAp4LRQRVmZsZ6fJkbi/D959ru2l6iuOaDa11XrxacO1?= =?utf-8?q?luAV5xKmj7HQWEH7+QlQsXxu+QiHyzzIcu/uJ6KySNfZcHoJiuzsMbZgT4gZ38+dU?= =?utf-8?q?1d0wcgRxiqTV2QBUA3FeAqJpqyrmsRJhWDyDu63MPMCNx2Yy7Z9xaVGyP+BNZ3jUV?= =?utf-8?q?sR12NUIUcV2pvHkOpYRzd8xpa+dFAU+IK+B58djwbaCPin+ewqxYFL2kwbITV3MSr?= =?utf-8?q?pduwQpi6EJEUJCnqIqu/EdoeFEBzP2E4F5C6Qwp7yLhlsJkh9MZ4ozNABiY0xUWwB?= =?utf-8?q?HslXny7Xw6BqBl5bsndzwPGILncJieMGUmhd1nosBm+RA9+tO03IIOfVQm3oRKUye?= =?utf-8?q?4GGuJGNMrWjw4bO0a1VlhDS9Iik68FZgU9hC9yyfZk6ehVRLRfAkMWMb0mq3VSchd?= =?utf-8?q?PkPwU5tVmPYjUtX5wqnN2GTBvvGuC4lOGyYyQ1ul4omvWPole+Bv1O1oTaNF0z19c?= =?utf-8?q?apSftum6xxvJaZqAVek3D7mvuG9uMnBIu3R3ZVJe+RqeWDgvjXjUsRVUSsHWm11Yv?= =?utf-8?q?ui6QjOYfgqBjc+/chJX5k5J8E2kWk5WFIVGdxpZbMGIMNVwFAxPlE/l8pFwCJ17GF?= =?utf-8?q?qdHUk1q9AblDl/IGlrvWYu9u40HvHEdV0JmqqHqVYd38lN05Jcb9+SKwebfTTmitO?= =?utf-8?q?6dehK06FTnBX6x1sRp9Zh3a4+4J+e9VbLlXE4rulFkVmIefuj52ylWBZlJx/BJjzp?= =?utf-8?q?qJeA3qF0JeEMSuaK7mGx/EwuVqpEertJmaYoHkD9qJOEtb4p9Ql6GR35YWjm17mVK?= =?utf-8?q?6ZIHsVQAYVExhA2pcqfnJc+oUzSElsnTmTnSDeMvsT6OCAwo8q6e8nEFuYpFkkF7c?= =?utf-8?q?mIX0J5yKOoaV98WP9w/fxfhr/nzFSbVIWQEXCCKIf8/okoyJORtxQWsB2AENIEDV2?= =?utf-8?q?iT9Qm0+m/Mb0AXGlDLtUn+5jqOsr0l1g2FmroEyKogebbYFwkPJrCjLu7u5lsLjmu?= =?utf-8?q?N0mijQNusvh2RAaof2jtlbeM4tqBMu+Uixo2ayk7i9glMw4uUS5kJOMVY3kta23lP?= =?utf-8?q?C3iAeZKzn8lCvIgT42wM0iPAEGbq9dgo7Hv6YzxKO/SEyEHV/cMk3WtWjUnCzF80B?= =?utf-8?q?SX7ALVUY7mGypQe9cZx52cEiac76Y1fmg=3D=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PAXPR04MB9642.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230040)(7416014)(376014)(366016)(1800799024)(52116014)(38350700014)(921020); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?ubdg7nn1i1j4b3DGZJW2csPA5syL?= =?utf-8?q?JLHZm0vJezD52KRWwAAfJOK30oMu+qHFYql3qb+sAVbbaB5fi+BBocC/h5Cb214kA?= =?utf-8?q?aMR1zPhflQRWScVh3rnacUyHXZi7JS+81MWXf1H7MeOsW/wEYKntb8TwzRzPvYIqi?= =?utf-8?q?PdTtnTt8kZi7lkKAQoqtxyyp/tKfZ4Rce8HpNQuIzrJT9SzsY+33qO1jA/7REg5kg?= =?utf-8?q?5vDqV+KdrASv2dJuO+1vdy01xG2J+C26yhI1HJP8O/5LauGWMJmmg9KrWyoFwqPPV?= =?utf-8?q?JmlXSMjf2uPKAMd5E+PO4KTDlHvitCuJg78lMHal7BduoNAruyF9+kPotAzkGgVFT?= =?utf-8?q?GNRBT4okerB9+I9taS0EjiuyE6zQNK77Uh/QIiT9ySIqfldrib/JLZLLEudrVrhxr?= =?utf-8?q?1W7DFB6JTqWDCaxmS95LkeklfDDNssB97UrvvdnGbNp/wwVMxW+WE2X1gFzPkFXyg?= =?utf-8?q?uLI5oEUj3ozVCq486P9foCMli3dBLBJlFJSMqtT2kJCnap/4MYTW58ooPZgDCH7Bu?= =?utf-8?q?tWpCW+I11o5FFBLAUqOFQDyZXrxEBSgWUaSgUvkQeVJKA8UArZudYAYHHyVXPfjN2?= =?utf-8?q?EkraTG5S/1p0hWDTpZm88uROlZcrkcsIP8gZtzeYmlqJLrjtf/YQIu2XgmMVg44oG?= =?utf-8?q?8d+FC1Vu108YhIevzQV9ZekoVAOqckVOF1bq0K8fk/KWh6C+pLXYzS5U/2W7442mV?= =?utf-8?q?vS+PmoIJLFYxXb2a8l9GKGRD2NP3PZmNzmmtW3oa32ln5f92octw/5yjhfFCp4OLj?= =?utf-8?q?zR1eMHszyJaTLm2vMEjTzhP9wNY+IrTHBiO3q2+e74T80jIwaRlPdClyyZuKcyszZ?= =?utf-8?q?Ed+YYpzAsGbwhHhoaN8fXMuApExtLLRIOYI+7VZtMv32hyf3dE2hc4Win0u0yoNc5?= =?utf-8?q?g1Y9fQxzQ4QegGTKv60E6S3GHzGt/dH11pvDxWVkkcTEVOPap21SW5r6wGKaSKW0K?= =?utf-8?q?BAahZ+7xfyXnUa/mx2OIHiIsps7Tg84YfRQ1bDztjjA3p2QH1A+ux+A1x5EM30Ypf?= =?utf-8?q?jChzpGxwKXuQn0610WXO0oizAFaH2gIx9A8OI1Ea0NaYRHlM1BymeWa6Yreza2yiR?= =?utf-8?q?JCRCA9m4cdNyBAOG+LDRlsMTI8dfCcGcMloo3aoduNdz79cydzzcRaddKzXNjHDyl?= =?utf-8?q?dafrjikbIBdFJkAFq/Rr+c4dBYRb/w3G4iumuz81wNPIi+L9/Wa6azlrZzcE+0WgP?= =?utf-8?q?XocCMfbwOYyewFO4xWev8b+7r4JCPwiKoXCpXGHrdJvkmucPLG6PFLFatkGBoWUEE?= =?utf-8?q?8jeNfMHIx4J4OBzevnkU9K59MrW8YZmTXzbBEWplUVgDRSCyLiIkzIbk+yUWy8o+z?= =?utf-8?q?MvapFF2oJEplOpXQoQ+IEHWhte0V5XQdMtWco8BZdgfWSnjsKctnNqw84LPEyhRic?= =?utf-8?q?Om4Fe2kbvZ9+v/aYRlQUWS/grdMBJsBzDq/Bj7UWTihFrQOcSTDNkWntVAg+FXKQd?= =?utf-8?q?HW4lAMpTnnM/qaSm06UXQ5dCczyl7yD/OmxPhE1GmeQrh2GGif5G30cyD0BqMX2gy?= =?utf-8?q?cSAqa+miecAE?= X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 05a3bf08-fdff-4bcd-af2f-08dd4ad18aeb X-MS-Exchange-CrossTenant-AuthSource: PAXPR04MB9642.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Feb 2025 19:23:19.7023 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: HLHexmMePDI5/0RudneOsrC4UDUwjQUh6qbJwFKW/Gmm9wYrxtBwwU+MCPeg/ESesHt3QFIl9fktIE1AJDWH/g== X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI0PR04MB10291 Add three registers: doorbell_bar, doorbell_addr, and doorbell_data. Use pci_epf_alloc_doorbell() to allocate a doorbell address space. Enable the Root Complex (RC) side driver to trigger pci-epc-test's doorbell callback handler by writing doorbell_data to the mapped doorbell_bar's address space. Set STATUS_DOORBELL_SUCCESS in the doorbell callback to indicate completion. Avoid breaking compatibility between host and endpoint, add new command COMMAND_ENABLE_DOORBELL and COMMAND_DISABLE_DOORBELL. Host side need send COMMAND_ENABLE_DOORBELL to map one bar's inbound address to MSI space. the command COMMAND_DISABLE_DOORBELL to recovery original inbound address mapping. Host side new driver Host side old driver EP: new driver S F EP: old driver F F S: If EP side support MSI, 'pci_endpoint_test -f pcie_ep_doorbell' return success. If EP side doesn't support MSI, the same to 'F'. F: 'pci_endpoint_test -f pcie_ep_doorbell' return failure, other case as usual. Tested-by: Niklas Cassel Signed-off-by: Frank Li --- change from v14 to v15 - none Change from v9 to v14 - update commit message by use pci_endpoint_test -f pcie_ep_doorbell Change from v8 to v9 - move pci_epf_alloc_doorbell() into pci_epf_{enable/disable}_doorbell(). - remove doorbell_done in commit message. - rename pci_epf_{enable/disable}_doorbell() to pci_epf_test_{enable/disable}_doorbell() to align corrent code style. Change from v7 to v8 - rename to pci_epf_align_inbound_addr_lo_hi() Change from v6 to v7 - use help function pci_epf_align_addr_lo_hi() Change from v5 to v6 - rename doorbell_addr to doorbell_offset Chagne from v4 to v5 - Add doorbell free at unbind function. - Move msi irq handler to here to more complex user case, such as differece doorbell can use difference handler function. - Add Niklas's code to handle fixed bar's case. If need add your signed-off tag or co-developer tag, please let me know. change from v3 to v4 - remove revid requirement - Add command COMMAND_ENABLE_DOORBELL and COMMAND_DISABLE_DOORBELL. - call pci_epc_set_bar() to map inbound address to MSI space only at COMMAND_ENABLE_DOORBELL. --- drivers/pci/endpoint/functions/pci-epf-test.c | 132 ++++++++++++++++++++++++++ 1 file changed, 132 insertions(+) diff --git a/drivers/pci/endpoint/functions/pci-epf-test.c b/drivers/pci/endpoint/functions/pci-epf-test.c index b94e205ae10b9..bba1229c46f14 100644 --- a/drivers/pci/endpoint/functions/pci-epf-test.c +++ b/drivers/pci/endpoint/functions/pci-epf-test.c @@ -11,12 +11,14 @@ #include #include #include +#include #include #include #include #include #include +#include #include #define IRQ_TYPE_INTX 0 @@ -29,6 +31,8 @@ #define COMMAND_READ BIT(3) #define COMMAND_WRITE BIT(4) #define COMMAND_COPY BIT(5) +#define COMMAND_ENABLE_DOORBELL BIT(6) +#define COMMAND_DISABLE_DOORBELL BIT(7) #define STATUS_READ_SUCCESS BIT(0) #define STATUS_READ_FAIL BIT(1) @@ -39,6 +43,11 @@ #define STATUS_IRQ_RAISED BIT(6) #define STATUS_SRC_ADDR_INVALID BIT(7) #define STATUS_DST_ADDR_INVALID BIT(8) +#define STATUS_DOORBELL_SUCCESS BIT(9) +#define STATUS_DOORBELL_ENABLE_SUCCESS BIT(10) +#define STATUS_DOORBELL_ENABLE_FAIL BIT(11) +#define STATUS_DOORBELL_DISABLE_SUCCESS BIT(12) +#define STATUS_DOORBELL_DISABLE_FAIL BIT(13) #define FLAG_USE_DMA BIT(0) @@ -63,6 +72,7 @@ struct pci_epf_test { bool dma_supported; bool dma_private; const struct pci_epc_features *epc_features; + struct pci_epf_bar db_bar; }; struct pci_epf_test_reg { @@ -77,6 +87,9 @@ struct pci_epf_test_reg { u32 irq_number; u32 flags; u32 caps; + u32 doorbell_bar; + u32 doorbell_offset; + u32 doorbell_data; } __packed; static struct pci_epf_header test_header = { @@ -645,6 +658,116 @@ static void pci_epf_test_raise_irq(struct pci_epf_test *epf_test, } } +static irqreturn_t pci_epf_test_doorbell_handler(int irq, void *data) +{ + struct pci_epf_test *epf_test = data; + enum pci_barno test_reg_bar = epf_test->test_reg_bar; + struct pci_epf_test_reg *reg = epf_test->reg[test_reg_bar]; + + reg->status |= STATUS_DOORBELL_SUCCESS; + pci_epf_test_raise_irq(epf_test, reg); + + return IRQ_HANDLED; +} + +static void pci_epf_test_doorbell_cleanup(struct pci_epf_test *epf_test) +{ + struct pci_epf_test_reg *reg = epf_test->reg[epf_test->test_reg_bar]; + struct pci_epf *epf = epf_test->epf; + + if (reg->doorbell_bar > 0) { + free_irq(epf->db_msg[0].virq, epf_test); + reg->doorbell_bar = NO_BAR; + } + + if (epf->db_msg) + pci_epf_free_doorbell(epf); +} + +static void pci_epf_test_enable_doorbell(struct pci_epf_test *epf_test, + struct pci_epf_test_reg *reg) +{ + struct pci_epf *epf = epf_test->epf; + struct pci_epc *epc = epf->epc; + struct msi_msg *msg; + enum pci_barno bar; + size_t offset; + int ret; + + ret = pci_epf_alloc_doorbell(epf, 1); + if (ret) { + reg->status |= STATUS_DOORBELL_ENABLE_FAIL; + return; + } + + msg = &epf->db_msg[0].msg; + bar = pci_epc_get_next_free_bar(epf_test->epc_features, epf_test->test_reg_bar + 1); + if (bar < BAR_0 || bar == epf_test->test_reg_bar || !epf->db_msg) { + reg->status |= STATUS_DOORBELL_ENABLE_FAIL; + return; + } + + ret = request_irq(epf->db_msg[0].virq, pci_epf_test_doorbell_handler, 0, + "pci-test-doorbell", epf_test); + if (ret) { + dev_err(&epf->dev, + "Failed to request irq %d, doorbell feature is not supported\n", + epf->db_msg[0].virq); + reg->status |= STATUS_DOORBELL_ENABLE_FAIL; + pci_epf_test_doorbell_cleanup(epf_test); + return; + } + + reg->doorbell_data = msg->data; + reg->doorbell_bar = bar; + + msg = &epf->db_msg[0].msg; + ret = pci_epf_align_inbound_addr(epf, bar, ((u64)msg->address_hi << 32) | msg->address_lo, + &epf_test->db_bar.phys_addr, &offset); + + if (ret) { + reg->status |= STATUS_DOORBELL_ENABLE_FAIL; + pci_epf_test_doorbell_cleanup(epf_test); + return; + } + + reg->doorbell_offset = offset; + + epf_test->db_bar.barno = bar; + epf_test->db_bar.size = epf->bar[bar].size; + epf_test->db_bar.flags = epf->bar[bar].flags; + + ret = pci_epc_set_bar(epc, epf->func_no, epf->vfunc_no, &epf_test->db_bar); + if (ret) { + reg->status |= STATUS_DOORBELL_ENABLE_FAIL; + pci_epf_test_doorbell_cleanup(epf_test); + } else { + reg->status |= STATUS_DOORBELL_ENABLE_SUCCESS; + } +} + +static void pci_epf_test_disable_doorbell(struct pci_epf_test *epf_test, + struct pci_epf_test_reg *reg) +{ + enum pci_barno bar = reg->doorbell_bar; + struct pci_epf *epf = epf_test->epf; + struct pci_epc *epc = epf->epc; + int ret; + + if (bar < BAR_0 || bar == epf_test->test_reg_bar || !epf->db_msg) { + reg->status |= STATUS_DOORBELL_DISABLE_FAIL; + return; + } + + ret = pci_epc_set_bar(epc, epf->func_no, epf->vfunc_no, &epf->bar[bar]); + if (ret) + reg->status |= STATUS_DOORBELL_DISABLE_FAIL; + else + reg->status |= STATUS_DOORBELL_DISABLE_SUCCESS; + + pci_epf_test_doorbell_cleanup(epf_test); +} + static void pci_epf_test_cmd_handler(struct work_struct *work) { u32 command; @@ -691,6 +814,14 @@ static void pci_epf_test_cmd_handler(struct work_struct *work) pci_epf_test_copy(epf_test, reg); pci_epf_test_raise_irq(epf_test, reg); break; + case COMMAND_ENABLE_DOORBELL: + pci_epf_test_enable_doorbell(epf_test, reg); + pci_epf_test_raise_irq(epf_test, reg); + break; + case COMMAND_DISABLE_DOORBELL: + pci_epf_test_disable_doorbell(epf_test, reg); + pci_epf_test_raise_irq(epf_test, reg); + break; default: dev_err(dev, "Invalid command 0x%x\n", command); break; @@ -953,6 +1084,7 @@ static void pci_epf_test_unbind(struct pci_epf *epf) pci_epf_test_clean_dma_chan(epf_test); pci_epf_test_clear_bar(epf); } + pci_epf_test_doorbell_cleanup(epf_test); pci_epf_test_free_space(epf); }