From patchwork Mon Jun 9 16:34:17 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Frank Li X-Patchwork-Id: 894961 Received: from AM0PR83CU005.outbound.protection.outlook.com (mail-westeuropeazon11010033.outbound.protection.outlook.com [52.101.69.33]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5399E21D3D9; Mon, 9 Jun 2025 16:35:00 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=52.101.69.33 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1749486902; cv=fail; b=Z2pwF/ktlIgIqDGujdwyCqCTkFdaAE9tMd1031vs6Emf5u1WVXcTtjzaWrGYEsdjLAJPD9Re4exsLIJGX+KgMJ9g+TKENVVxn+7YJyT+B8SGhKhxkCxM5mwVaw4i05mlVjNacggkeAWivh3ME5Qy/zJTY1I2IIn8eDGSHzhm4JI= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1749486902; c=relaxed/simple; bh=GZxnLuC67KA9+f1ZFFupamn6BH671XQaImre37vE7/Q=; h=From:Date:Subject:Content-Type:Message-Id:References:In-Reply-To: To:Cc:MIME-Version; b=V/yeyKRJOQ2GRaI7W65K3EtG0gvtIn7mjb/UMbiSrAtCdDbcn13VmkY4wsGvCQ5uaD6KGaqIfAAwJCBGmr1uAGlKuOq/1kWziUkuzGxaBnU6+mMfJBZRnPztJJpLepw+NiczLz3D4Tmx2WQc84AfYQrXep5IEdm26cyptzCSKrA= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=nxp.com; spf=pass smtp.mailfrom=nxp.com; dkim=pass (2048-bit key) header.d=nxp.com header.i=@nxp.com header.b=RXxUYk/K; arc=fail smtp.client-ip=52.101.69.33 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=nxp.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=nxp.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=nxp.com header.i=@nxp.com header.b="RXxUYk/K" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=jl6NT3bVVkz2VMxNdYF8zKVgO+vZC2HQ2jJP7ni1P9hcnjoDKYXvbEAQ64VyChju+/VlUHv7URQgCdFiW22woha8lZNa4dqN0SkJ7ptksP4mGhw8nOWXwQ5SuVJXR6KeN7VPnRIQelDK5slIw7pmQPPIHwa+i9Xrlg/wAVixiDwnnC6gDA1D6u5mXeCpUIBNzqqVNikFRDYvSWVe8r88dtAt9RmC7kdTvaTbTzAHr8Oi0v29Sg3Mq7eudef4duLUDh30ND1LHw/9HX90tatgRgs/CSrXjosKrMkJ6OHU3PDNTO/+zSOhYm47XFNs4FWv425OnzOo1X6FwC3kxFTtlw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=kKlGqegoRweF1++Jqh2S5594pr64Kj2EekHsAJSq3y8=; b=VXsWR+AAewlgVIwNEJ5V7kDTjPzKtBzSnRCTeuiOaCA14xBNY4cejc7NoWQFdTzpsGD39mz1qpbzELAmGE6Ba/FkFWA0ttmJ+CqYRDgWRVQ5VtJWIIhlQZSJIpkFD0l5mdwz8OIL7GYVOHU28EjVbs57u/5fI6x3Tmh3iP1nrd8FqBkRmn+d29rHZsev3bm7NquHEI+m8cg1clPcfH1Sz30ioU4Cymd53AysD7bRHK9YizRzRoKx7IKDRnro2F4IT6cS0JsiDOmfNAk5EyrevcWGZqEedPOiszP3FxOogQtTywmWCywCrx3Hdww19kdgRq4Z0V1o35PYrslQN7XBoQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kKlGqegoRweF1++Jqh2S5594pr64Kj2EekHsAJSq3y8=; b=RXxUYk/K2mKYcD3LqtGfToiSDtJdss71/qC30ecVbHEVdqtV5ru6jXZKcw3CaZnXphg5IWsIokl4vFeGOqwIVtDFtJsEP5mslqTnyXo93JfX2p8ci1VJa4bgVYdj/NMW2YHRklS7ADLxWCSrFh+K4UjtQTzwGixmtUP8aMmXDNQPpV1YChD9qwpfvAR+Z2QTed2buUwAzEej3MKpf/d92TikbDFQsmRL8DsWqZ8ZtSThK/s8xMPnKFPe3+cUxvUubC8hLHh+HZU53RBdyDpNmZ5CDIS2bUZHVMEcZuxyHdVdFGPA6sdI3f/3Idkx5huuwg7pdJv5utdwPr/aW4VrHQ== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; Received: from PAXPR04MB9642.eurprd04.prod.outlook.com (2603:10a6:102:240::14) by DB9PR04MB9751.eurprd04.prod.outlook.com (2603:10a6:10:4ce::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8813.25; Mon, 9 Jun 2025 16:34:58 +0000 Received: from PAXPR04MB9642.eurprd04.prod.outlook.com ([fe80::9126:a61e:341d:4b06]) by PAXPR04MB9642.eurprd04.prod.outlook.com ([fe80::9126:a61e:341d:4b06%7]) with mapi id 15.20.8813.024; Mon, 9 Jun 2025 16:34:58 +0000 From: Frank Li Date: Mon, 09 Jun 2025 12:34:17 -0400 Subject: [PATCH v19 05/10] PCI: endpoint: pci-epf-test: Add doorbell test support Message-Id: <20250609-ep-msi-v19-5-77362eaa48fa@nxp.com> References: <20250609-ep-msi-v19-0-77362eaa48fa@nxp.com> In-Reply-To: <20250609-ep-msi-v19-0-77362eaa48fa@nxp.com> To: Kishon Vijay Abraham I , "Rafael J. Wysocki" , Thomas Gleixner , Anup Patel , Kishon Vijay Abraham I , Marc Zyngier , Greg Kroah-Hartman , "Rafael J. Wysocki" , Danilo Krummrich , Kishon Vijay Abraham I , Bjorn Helgaas , Arnd Bergmann , Shuah Khan , Richard Zhu , Lucas Stach , Lorenzo Pieralisi , Rob Herring , Shawn Guo , Sascha Hauer , Pengutronix Kernel Team , Fabio Estevam , Krzysztof Kozlowski , Conor Dooley , Manivannan Sadhasivam , =?utf-8?q?Krzysztof_Wilczy=C5=84ski?= Cc: Niklas Cassel , dlemoal@kernel.org, jdmason@kudzu.us, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-pci@vger.kernel.org, linux-kselftest@vger.kernel.org, imx@lists.linux.dev, devicetree@vger.kernel.org, Frank Li X-Mailer: b4 0.13-dev-e586c X-Developer-Signature: v=1; a=ed25519-sha256; t=1749486867; l=8739; i=Frank.Li@nxp.com; s=20240130; h=from:subject:message-id; bh=GZxnLuC67KA9+f1ZFFupamn6BH671XQaImre37vE7/Q=; b=Jb6LEzik+KYNB19zeEljCPCu3Cp8Rfwhn+4+3+NA1ypVf1ik0/G1VhzTOcf5fXOR2FPO+YHHa pSEIwjtnpN8Aad8klEs+nQjMpRDwmAU3tl7s+zYdzkRqfUACSctquv+ X-Developer-Key: i=Frank.Li@nxp.com; a=ed25519; pk=I0L1sDUfPxpAkRvPKy7MdauTuSENRq+DnA+G4qcS94Q= X-ClientProxiedBy: AS4P192CA0010.EURP192.PROD.OUTLOOK.COM (2603:10a6:20b:5da::17) To PAXPR04MB9642.eurprd04.prod.outlook.com (2603:10a6:102:240::14) Precedence: bulk X-Mailing-List: linux-kselftest@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: PAXPR04MB9642:EE_|DB9PR04MB9751:EE_ X-MS-Office365-Filtering-Correlation-Id: 4d80a9f4-5fdf-4e19-c79b-08dda7739295 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|1800799024|376014|7416014|366016|52116014|921020|38350700014; X-Microsoft-Antispam-Message-Info: =?utf-8?q?RMO9FhoTW8fQ0QoGg4cFhj6FZ4Fkc3w?= =?utf-8?q?cIsZUMKiFbffGhDUUBTi30ou5L4T+qKXE21wnqGC72SMckjG7Rlx0ab2p92OmAvQM?= =?utf-8?q?B9cXlrOHyp9UNjl9TT6xQu1TlhTpU/HjU4qi4dJnFgin8/kwC+gtCwCb86yk3Rq3s?= =?utf-8?q?FrDi+R/JcK6LvAicgkpDdoUNRAUOVhwJ+yWOyhLrdByvKD99C5fz703NJT2Hl1tiX?= =?utf-8?q?XJwReMj47N5bKnTC9iCyT0y4adspQiT64Yew4NgtdwLradAPHE3Fkw/YhSuGudHyU?= =?utf-8?q?YpPAHPrUvSuTXAw9X4eeiZjS/jRQDhHdEuiHXAH8Jvo4HL0g+YmHCrLtJmv4c+QcF?= =?utf-8?q?qhalBxMUp9OTFAg67VMU4tk8LzKtk87jZ/PPMNAvPvaLyrSsyNTXKe3TlP2+ILwop?= =?utf-8?q?GH9gmgznraIzE8YfqgS/KbvZf+NEdSxYAyK1UkEPW3Ss93IUBb8/5eKrVOrun5ViY?= =?utf-8?q?kNOm7uAWB9ijMWhWKnGc5OsgBQuvJKoRWx6iWu+Vq/QGScwcd6petWbpQ+ufsUCtW?= =?utf-8?q?SvLnx20s7gsdtCRjm/Pn19p4jTisTb5TSCHEvXsxOjT1hwJmJQ38Z8Niw/t9KEnGp?= =?utf-8?q?qS55gV4Ix0ilydI1/81jvbUE/Tnvt4Z1DFpDCgL+uqjeH9sqe4U1/Eh/3tuPR+wcg?= =?utf-8?q?GclwfMvlxDxRlvnV0w1daCcQSDLUzYO59tTYWvhwvZzcE3IG0STkM5izn9Uof7ktJ?= =?utf-8?q?/qIYSZuuX+S3oczja/aQoRh7TRyH0THFGVD8DXsfl9Hmyrzy/zF/jUY+eB099m4RT?= =?utf-8?q?MfI8YeWzBmz1lWBKYASCUh9p4SrlWqZqghzaz/lxX0lKgMdKC5ZoEMSHqzuR8eyku?= =?utf-8?q?InjkkWUWDIrld3FlxdEeTb4Hhe7N4t9/KmAVEGWNJue3+iLacTuTSsnkvn0e5fISi?= =?utf-8?q?aig8bDqGxuSBL03LtmdujBNk2gxppQ/85696Cawi/Fgue5O5Ztdz1UGC4KF6k2rvJ?= =?utf-8?q?ovt0NQelyd0RCzPMqsL188gVZB9u2tINKn2s7EeliP6Z6phsNfEdWdvM00szvhKO+?= =?utf-8?q?sHd/HcW8zmjNqJ3kGi+olTRKLhKBEsyNJ6AJNgWGe+EAnxr/BxtNfI1mWDbV2TC2S?= =?utf-8?q?LOWoGYv9ab2m4EHYjYxCTreZa8OX2VIrH7CdFhn6ZsIR0pbV+9/IaFKba92f14u+b?= =?utf-8?q?WNaREktZB1D69Qdqgq3CFlRvD0OIGHkuExTpoRegDL+h38xnUUrOZrmCz8KH+UiBa?= =?utf-8?q?zYFKDJrYNje1XAurd50e2zi6zI7rSV4Kxx/IKE+IYu/tiJVtRSYg/UP95vbVmyxID?= =?utf-8?q?W/cKHwpLsXjknT604ThHt/KwxJpEb3KFkDtahuE7gyrJGah9Y4y+mRzs2zXMRdnbM?= =?utf-8?q?pukX91hWc/XIwusgjzkMtbB7RchITxkD12CdrxzaM5f31CzcH8uVIEnJD85tugBeu?= =?utf-8?q?jXvC27ISa+04vHt/oVZ7LkcCqAJHiSxK2Vb1BfPYey7teXeYU+/0aw=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PAXPR04MB9642.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230040)(1800799024)(376014)(7416014)(366016)(52116014)(921020)(38350700014); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?mMNbf8Lq4Ur96EgG7ZhSAK8jgSfM?= =?utf-8?q?R0hM0M/9BfwjabHENfgNivKp4VdTNeEe6WMfe8DnyyqcBgQeCgDW3C1p/ySgX6RRI?= =?utf-8?q?31Lricir31PVMoEsAiQwTpYdXbfA1zLvLu/pvSeao1LaY1RkAT+GZe5dvCpvNo2Vi?= =?utf-8?q?AXmcNHWd2QamNuLiwV09/sZEfPUm5GvCaQGXMJPRYjGONmx6BtMTKVyw4T4RH+EZx?= =?utf-8?q?735Ko/EunWSUUSiZw1BX1EZuX+ug96KzQH5PDqxAdb/0BZ0xnPG49YLZR6Fq5HtmK?= =?utf-8?q?GjE2u1LHvLAkS/Nx3JM0bDpelN+fU2awSFIET92XeYK8CCzIFZycfELNu6qcp0Lgu?= =?utf-8?q?ggjHp2fgR9g8BuYmR6ffEFzoWfPolipv4OZ58PnusOZ9yrxt52keoWIMEDJFLLAiw?= =?utf-8?q?fW/HSkFcwLItFvgioIi+TWR7YXcs2g6A3FwxFpgbSZqcVlUu8nmvCK4tsAaXO5qdx?= =?utf-8?q?kOxH9Q7xL+a8a2ZPH8RK916bNGH59QICllv64WzxZlNd1F4tHGC6M6smNhYF3EbvS?= =?utf-8?q?yAZpV18jrBX12KuYJcXDaJjpQ3dIqbmP9K3K3O8ANs944Fav/u2jd7bAPFeafKXNU?= =?utf-8?q?4D5UtvXVNK7wYSSK6Mmscem5aPc4KatntnldYPml/0MV21bAXRr1fBcQ32PdT4sXJ?= =?utf-8?q?ApEHuGzB1WjkBVJbHq7yQioDg9vM7zR9h+G6uGUW///NYbi2j+IPnxJcMQQDj1fwX?= =?utf-8?q?QjwAOFe5lQFkGZ8U0D/72rsSE0vDc6f+WmrcgyRfd9RacgHFAv69WFgvvA1egAkaM?= =?utf-8?q?vuTf2v81CgD5KgIBh8Yk6EuLNUh8aF63tCtBzNmlRCDROpxmZTZiseeOCZ6089t//?= =?utf-8?q?FcZW5MY+yqlQzqdIipt7jdHnwZhBU3GOkA7mzS83m+u33n3YKjPuZDc2++CXoqWM4?= =?utf-8?q?XWx2Hpgkjp+CzJzdTagxJjTOCMV7QMHkbkW+dRGDgi+ZCkl4a3XxQ1D228qihpjLw?= =?utf-8?q?1naAS6EdenTXB5VIgGl3AP+jAqp4GIhKTElN+PSVVuaaUsiZ3VxqCFilFBpLLsXV7?= =?utf-8?q?P0T1EtDeSW41et9cnXIZ0SkDUjsnvpgW7GtO79YqK0sFfuRJU0Uo4q/UB+7ewr2cm?= =?utf-8?q?+w9Ku66lWbFSCHxGbzKr0R7hdnP7qpgcAePb6kBLOMT38PT0TnG3AR5oCu9afa+gB?= =?utf-8?q?W8M38kngcuV5wDOfPyyjtrhRCNGF6OXJXFnW6mWY6vKLjCddvQbztm5HY1W3bk5Zb?= =?utf-8?q?4VE/mlpLdU2GurVBGFKs4abuCDrgxQpTzh2MZ34QY1oZlFWqRFh2+C3RjxpV9A9dV?= =?utf-8?q?DtZkN9XXJandjvCqGf2NEShyqkr+plegc2TzQVfmXhk65RF7WVc7X7hIZDDWpm9Mm?= =?utf-8?q?4FhG4OgFgggEI8vZozrQHwYLdbOCn0Z/hG+FEXrUkbtXYBhK7HLE3AeAEHo9vHiYO?= =?utf-8?q?W2BBlhyGBHnrBPB2eElJR5agniqMlSKGA1JrDv4xQziURUM2yCc1SH/1JlhSDK4sg?= =?utf-8?q?fZYTnM7pvWhMbyOnXJsn+WuZjET3+yVIVopsc2ZAyt+l/KcexL5CABzVpPw9ITUu9?= =?utf-8?q?0Daz9859GqX1?= X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-Network-Message-Id: 4d80a9f4-5fdf-4e19-c79b-08dda7739295 X-MS-Exchange-CrossTenant-AuthSource: PAXPR04MB9642.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Jun 2025 16:34:58.0436 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: woKXSKuLrRBZSuHjDun3y1i560OCL/96+pKyIvQT0Kj6LcH84Un0sY4dlvi5pFRJdd+YpMgdO+443FjDcoJEpQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR04MB9751 Add three registers: doorbell_bar, doorbell_addr, and doorbell_data. Use pci_epf_alloc_doorbell() to allocate a doorbell address space. Enable the Root Complex (RC) side driver to trigger pci-epc-test's doorbell callback handler by writing doorbell_data to the mapped doorbell_bar's address space. Set STATUS_DOORBELL_SUCCESS in the doorbell callback to indicate completion. Avoid breaking compatibility between host and endpoint, add new command COMMAND_ENABLE_DOORBELL and COMMAND_DISABLE_DOORBELL. Host side need send COMMAND_ENABLE_DOORBELL to map one bar's inbound address to MSI space. the command COMMAND_DISABLE_DOORBELL to recovery original inbound address mapping. Host side new driver Host side old driver EP: new driver S F EP: old driver F F S: If EP side support MSI, 'pci_endpoint_test -f pcie_ep_doorbell' return success. If EP side doesn't support MSI, the same to 'F'. F: 'pci_endpoint_test -f pcie_ep_doorbell' return failure, other case as usual. Tested-by: Niklas Cassel Signed-off-by: Frank Li --- change from v15 to v16 - use le32 for doorbell_* register and use cpu_to_le32() and le32_to_cpu() when use it. change from v14 to v15 - none Change from v9 to v14 - update commit message by use pci_endpoint_test -f pcie_ep_doorbell Change from v8 to v9 - move pci_epf_alloc_doorbell() into pci_epf_{enable/disable}_doorbell(). - remove doorbell_done in commit message. - rename pci_epf_{enable/disable}_doorbell() to pci_epf_test_{enable/disable}_doorbell() to align corrent code style. Change from v7 to v8 - rename to pci_epf_align_inbound_addr_lo_hi() Change from v6 to v7 - use help function pci_epf_align_addr_lo_hi() Change from v5 to v6 - rename doorbell_addr to doorbell_offset Chagne from v4 to v5 - Add doorbell free at unbind function. - Move msi irq handler to here to more complex user case, such as differece doorbell can use difference handler function. - Add Niklas's code to handle fixed bar's case. If need add your signed-off tag or co-developer tag, please let me know. change from v3 to v4 - remove revid requirement - Add command COMMAND_ENABLE_DOORBELL and COMMAND_DISABLE_DOORBELL. - call pci_epc_set_bar() to map inbound address to MSI space only at COMMAND_ENABLE_DOORBELL. --- drivers/pci/endpoint/functions/pci-epf-test.c | 142 ++++++++++++++++++++++++++ 1 file changed, 142 insertions(+) diff --git a/drivers/pci/endpoint/functions/pci-epf-test.c b/drivers/pci/endpoint/functions/pci-epf-test.c index 50eb4106369f4..b9cb1ab218f2b 100644 --- a/drivers/pci/endpoint/functions/pci-epf-test.c +++ b/drivers/pci/endpoint/functions/pci-epf-test.c @@ -11,12 +11,14 @@ #include #include #include +#include #include #include #include #include #include +#include #include #define IRQ_TYPE_INTX 0 @@ -29,6 +31,8 @@ #define COMMAND_READ BIT(3) #define COMMAND_WRITE BIT(4) #define COMMAND_COPY BIT(5) +#define COMMAND_ENABLE_DOORBELL BIT(6) +#define COMMAND_DISABLE_DOORBELL BIT(7) #define STATUS_READ_SUCCESS BIT(0) #define STATUS_READ_FAIL BIT(1) @@ -39,6 +43,11 @@ #define STATUS_IRQ_RAISED BIT(6) #define STATUS_SRC_ADDR_INVALID BIT(7) #define STATUS_DST_ADDR_INVALID BIT(8) +#define STATUS_DOORBELL_SUCCESS BIT(9) +#define STATUS_DOORBELL_ENABLE_SUCCESS BIT(10) +#define STATUS_DOORBELL_ENABLE_FAIL BIT(11) +#define STATUS_DOORBELL_DISABLE_SUCCESS BIT(12) +#define STATUS_DOORBELL_DISABLE_FAIL BIT(13) #define FLAG_USE_DMA BIT(0) @@ -66,6 +75,7 @@ struct pci_epf_test { bool dma_supported; bool dma_private; const struct pci_epc_features *epc_features; + struct pci_epf_bar db_bar; }; struct pci_epf_test_reg { @@ -80,6 +90,9 @@ struct pci_epf_test_reg { __le32 irq_number; __le32 flags; __le32 caps; + __le32 doorbell_bar; + __le32 doorbell_offset; + __le32 doorbell_data; } __packed; static struct pci_epf_header test_header = { @@ -667,6 +680,126 @@ static void pci_epf_test_raise_irq(struct pci_epf_test *epf_test, } } +static irqreturn_t pci_epf_test_doorbell_handler(int irq, void *data) +{ + struct pci_epf_test *epf_test = data; + enum pci_barno test_reg_bar = epf_test->test_reg_bar; + struct pci_epf_test_reg *reg = epf_test->reg[test_reg_bar]; + u32 status = le32_to_cpu(reg->status); + + status |= STATUS_DOORBELL_SUCCESS; + reg->status = cpu_to_le32(status); + pci_epf_test_raise_irq(epf_test, reg); + + return IRQ_HANDLED; +} + +static void pci_epf_test_doorbell_cleanup(struct pci_epf_test *epf_test) +{ + struct pci_epf_test_reg *reg = epf_test->reg[epf_test->test_reg_bar]; + struct pci_epf *epf = epf_test->epf; + + if (le32_to_cpu(reg->doorbell_bar) > 0) { + free_irq(epf->db_msg[0].virq, epf_test); + reg->doorbell_bar = cpu_to_le32(NO_BAR); + } + + if (epf->db_msg) + pci_epf_free_doorbell(epf); +} + +static void pci_epf_test_enable_doorbell(struct pci_epf_test *epf_test, + struct pci_epf_test_reg *reg) +{ + u32 status = le32_to_cpu(reg->status); + struct pci_epf *epf = epf_test->epf; + struct pci_epc *epc = epf->epc; + struct msi_msg *msg; + enum pci_barno bar; + size_t offset; + int ret; + + ret = pci_epf_alloc_doorbell(epf, 1); + if (ret) { + status |= STATUS_DOORBELL_ENABLE_FAIL; + goto set_status; + } + + msg = &epf->db_msg[0].msg; + bar = pci_epc_get_next_free_bar(epf_test->epc_features, epf_test->test_reg_bar + 1); + if (bar < BAR_0 || bar == epf_test->test_reg_bar || !epf->db_msg) { + status |= STATUS_DOORBELL_ENABLE_FAIL; + goto set_status; + } + + ret = request_irq(epf->db_msg[0].virq, pci_epf_test_doorbell_handler, 0, + "pci-test-doorbell", epf_test); + if (ret) { + dev_err(&epf->dev, + "Failed to request irq %d, doorbell feature is not supported\n", + epf->db_msg[0].virq); + status |= STATUS_DOORBELL_ENABLE_FAIL; + pci_epf_test_doorbell_cleanup(epf_test); + goto set_status; + } + + reg->doorbell_data = cpu_to_le32(msg->data); + reg->doorbell_bar = cpu_to_le32(bar); + + msg = &epf->db_msg[0].msg; + ret = pci_epf_align_inbound_addr(epf, bar, ((u64)msg->address_hi << 32) | msg->address_lo, + &epf_test->db_bar.phys_addr, &offset); + + if (ret) { + status |= STATUS_DOORBELL_ENABLE_FAIL; + pci_epf_test_doorbell_cleanup(epf_test); + goto set_status; + } + + reg->doorbell_offset = cpu_to_le32(offset); + + epf_test->db_bar.barno = bar; + epf_test->db_bar.size = epf->bar[bar].size; + epf_test->db_bar.flags = epf->bar[bar].flags; + + ret = pci_epc_set_bar(epc, epf->func_no, epf->vfunc_no, &epf_test->db_bar); + if (ret) { + status |= STATUS_DOORBELL_ENABLE_FAIL; + pci_epf_test_doorbell_cleanup(epf_test); + } else { + status |= STATUS_DOORBELL_ENABLE_SUCCESS; + } + +set_status: + reg->status = cpu_to_le32(status); +} + +static void pci_epf_test_disable_doorbell(struct pci_epf_test *epf_test, + struct pci_epf_test_reg *reg) +{ + enum pci_barno bar = le32_to_cpu(reg->doorbell_bar); + u32 status = le32_to_cpu(reg->status); + struct pci_epf *epf = epf_test->epf; + struct pci_epc *epc = epf->epc; + int ret; + + if (bar < BAR_0 || bar == epf_test->test_reg_bar || !epf->db_msg) { + status |= STATUS_DOORBELL_DISABLE_FAIL; + goto set_status; + } + + ret = pci_epc_set_bar(epc, epf->func_no, epf->vfunc_no, &epf->bar[bar]); + if (ret) + status |= STATUS_DOORBELL_DISABLE_FAIL; + else + status |= STATUS_DOORBELL_DISABLE_SUCCESS; + + pci_epf_test_doorbell_cleanup(epf_test); + +set_status: + reg->status = cpu_to_le32(status); +} + static void pci_epf_test_cmd_handler(struct work_struct *work) { u32 command; @@ -714,6 +847,14 @@ static void pci_epf_test_cmd_handler(struct work_struct *work) pci_epf_test_copy(epf_test, reg); pci_epf_test_raise_irq(epf_test, reg); break; + case COMMAND_ENABLE_DOORBELL: + pci_epf_test_enable_doorbell(epf_test, reg); + pci_epf_test_raise_irq(epf_test, reg); + break; + case COMMAND_DISABLE_DOORBELL: + pci_epf_test_disable_doorbell(epf_test, reg); + pci_epf_test_raise_irq(epf_test, reg); + break; default: dev_err(dev, "Invalid command 0x%x\n", command); break; @@ -987,6 +1128,7 @@ static void pci_epf_test_unbind(struct pci_epf *epf) pci_epf_test_clean_dma_chan(epf_test); pci_epf_test_clear_bar(epf); } + pci_epf_test_doorbell_cleanup(epf_test); pci_epf_test_free_space(epf); }