2 * Jailhouse, a Linux-based partitioning hypervisor
4 * Copyright (c) Siemens AG, 2014, 2015
7 * Ivan Kolchin <ivan.kolchin@siemens.com>
8 * Jan Kiszka <jan.kiszka@siemens.com>
10 * This work is licensed under the terms of the GNU GPL, version 2. See
11 * the COPYING file in the top-level directory.
14 #include <jailhouse/control.h>
15 #include <jailhouse/mmio.h>
16 #include <jailhouse/pci.h>
17 #include <jailhouse/printk.h>
18 #include <jailhouse/utils.h>
20 #define MSIX_VECTOR_CTRL_DWORD 3
22 #define for_each_configured_pci_device(dev, cell) \
23 for ((dev) = (cell)->pci_devices; \
24 (dev) - (cell)->pci_devices < (cell)->config->num_pci_devices; \
27 #define for_each_pci_cap(cap, dev, counter) \
28 for ((cap) = jailhouse_cell_pci_caps((dev)->cell->config) + \
29 (dev)->info->caps_start, (counter) = 0; \
30 (counter) < (dev)->info->num_caps; \
33 /* entry for PCI config space access control */
34 struct pci_cfg_control {
39 } type; /* Access type */
40 u32 mask; /* Bit set: access type applies; bit cleared: deny access */
43 /* --- Access control for writing to PCI config space registers --- */
44 /* Type 1: Endpoints */
45 static const struct pci_cfg_control endpoint_write[PCI_CONFIG_HEADER_SIZE] = {
46 [0x04/4] = {PCI_CONFIG_ALLOW, 0xffffffff}, /* Command, Status */
47 [0x0c/4] = {PCI_CONFIG_ALLOW, 0xff00ffff}, /* BIST, Lat., Cacheline */
48 [0x30/4] = {PCI_CONFIG_RDONLY, 0xffffffff}, /* ROM BAR */
49 [0x3c/4] = {PCI_CONFIG_ALLOW, 0x000000ff}, /* Int Line */
53 * Note: Ignore limit/base reprogramming attempts because the root cell will
54 * perform them on bus rescans. */
55 static const struct pci_cfg_control bridge_write[PCI_CONFIG_HEADER_SIZE] = {
56 [0x04/4] = {PCI_CONFIG_ALLOW, 0xffffffff}, /* Command, Status */
57 [0x0c/4] = {PCI_CONFIG_ALLOW, 0xff00ffff}, /* BIST, Lat., Cacheline */
58 [0x1c/4] = {PCI_CONFIG_RDONLY, 0x0000ffff}, /* I/O Limit & Base */
59 [0x20/4 ... /* Memory Limit/Base, Prefetch Memory Limit/Base, */
60 0x30/4] = {PCI_CONFIG_RDONLY, 0xffffffff}, /* I/O Limit & Base */
61 [0x3c/4] = {PCI_CONFIG_ALLOW, 0xffff00ff}, /* Int Line, Bridge Ctrl */
64 static void *pci_space;
65 static u64 mmcfg_start, mmcfg_end;
68 static void *pci_get_device_mmcfg_base(u16 bdf)
70 return pci_space + ((unsigned long)bdf << 12);
74 * Read from PCI config space.
75 * @param bdf 16-bit bus/device/function ID of target.
76 * @param address Config space access address.
77 * @param size Access size (1, 2 or 4 bytes).
81 * @see pci_write_config
83 u32 pci_read_config(u16 bdf, u16 address, unsigned int size)
85 void *mmcfg_addr = pci_get_device_mmcfg_base(bdf) + address;
87 if (!pci_space || PCI_BUS(bdf) > end_bus)
88 return arch_pci_read_config(bdf, address, size);
91 return mmio_read8(mmcfg_addr);
93 return mmio_read16(mmcfg_addr);
95 return mmio_read32(mmcfg_addr);
99 * Write to PCI config space.
100 * @param bdf 16-bit bus/device/function ID of target.
101 * @param address Config space access address.
102 * @param value Value to be written.
103 * @param size Access size (1, 2 or 4 bytes).
105 * @see pci_read_config
107 void pci_write_config(u16 bdf, u16 address, u32 value, unsigned int size)
109 void *mmcfg_addr = pci_get_device_mmcfg_base(bdf) + address;
111 if (!pci_space || PCI_BUS(bdf) > end_bus)
112 return arch_pci_write_config(bdf, address, value, size);
115 mmio_write8(mmcfg_addr, value);
117 mmio_write16(mmcfg_addr, value);
119 mmio_write32(mmcfg_addr, value);
123 * Look up device owned by a cell.
124 * @param[in] cell Owning cell.
125 * @param bdf 16-bit bus/device/function ID.
127 * @return Pointer to owned PCI device or NULL.
129 struct pci_device *pci_get_assigned_device(const struct cell *cell, u16 bdf)
131 const struct jailhouse_pci_device *dev_info =
132 jailhouse_cell_pci_devices(cell->config);
135 /* We iterate over the static device information to increase cache
137 for (n = 0; n < cell->config->num_pci_devices; n++)
138 if (dev_info[n].bdf == bdf)
139 return cell->pci_devices[n].cell ?
140 &cell->pci_devices[n] : NULL;
146 * Look up capability at given config space address.
147 * @param device The device to be accessed.
148 * @param address Config space access address.
150 * @return Corresponding capability structure or NULL if none found.
154 static const struct jailhouse_pci_capability *
155 pci_find_capability(struct pci_device *device, u16 address)
157 const struct jailhouse_pci_capability *cap =
158 jailhouse_cell_pci_caps(device->cell->config) +
159 device->info->caps_start;
162 for (n = 0; n < device->info->num_caps; n++, cap++)
163 if (cap->start <= address && cap->start + cap->len > address)
170 * Moderate config space read access.
171 * @param device The device to be accessed. If NULL, access will be
172 * emulated, returning a value of -1.
173 * @param address Config space address.
174 * @param size Access size (1, 2 or 4 bytes).
175 * @param value Pointer to buffer to receive the emulated value if
176 * PCI_ACCESS_DONE is returned.
178 * @return PCI_ACCESS_PERFORM or PCI_ACCESS_DONE.
180 * @see pci_cfg_write_moderate
182 enum pci_access pci_cfg_read_moderate(struct pci_device *device, u16 address,
183 unsigned int size, u32 *value)
185 const struct jailhouse_pci_capability *cap;
186 unsigned int bar_no, cap_offs;
190 return PCI_ACCESS_DONE;
193 /* Emulate BARs for physical and virtual devices */
194 if (device->info->type != JAILHOUSE_PCI_TYPE_BRIDGE) {
195 /* Emulate BAR access, always returning the shadow value. */
196 if (address >= PCI_CFG_BAR && address <= PCI_CFG_BAR_END) {
197 bar_no = (address - PCI_CFG_BAR) / 4;
198 *value = device->bar[bar_no] >> ((address % 4) * 8);
199 return PCI_ACCESS_DONE;
202 /* We do not expose ROMs. */
203 if (address >= PCI_CFG_ROMBAR && address < PCI_CFG_CAPS) {
205 return PCI_ACCESS_DONE;
209 if (device->info->type == JAILHOUSE_PCI_TYPE_IVSHMEM)
210 return pci_ivshmem_cfg_read(device, address, value);
212 if (address < PCI_CONFIG_HEADER_SIZE)
213 return PCI_ACCESS_PERFORM;
215 cap = pci_find_capability(device, address);
217 return PCI_ACCESS_PERFORM;
219 cap_offs = address - cap->start;
220 if (cap->id == PCI_CAP_MSI && cap_offs >= 4 &&
221 (cap_offs < 10 || (device->info->msi_64bits && cap_offs < 14))) {
222 *value = device->msi_registers.raw[cap_offs / 4] >>
223 ((cap_offs % 4) * 8);
224 return PCI_ACCESS_DONE;
227 return PCI_ACCESS_PERFORM;
230 static int pci_update_msix(struct pci_device *device,
231 const struct jailhouse_pci_capability *cap)
236 for (n = 0; n < device->info->num_msix_vectors; n++) {
237 result = arch_pci_update_msix_vector(device, n);
245 * Moderate config space write access.
246 * @param device The device to be accessed. If NULL, access will be
248 * @param address Config space address.
249 * @param size Access size (1, 2 or 4 bytes).
250 * @param value Value to be written.
252 * @return PCI_ACCESS_REJECT, PCI_ACCESS_PERFORM or PCI_ACCESS_DONE.
254 * @see pci_cfg_read_moderate
256 enum pci_access pci_cfg_write_moderate(struct pci_device *device, u16 address,
257 unsigned int size, u32 value)
259 const struct jailhouse_pci_capability *cap;
260 /* initialize list to work around wrong compiler warning */
261 unsigned int bias_shift = (address % 4) * 8;
262 u32 mask = BYTE_MASK(size) << bias_shift;
263 struct pci_cfg_control cfg_control;
264 unsigned int bar_no, cap_offs;
267 return PCI_ACCESS_REJECT;
269 value <<= bias_shift;
271 /* Emulate BARs for physical and virtual devices */
272 if (device->info->type != JAILHOUSE_PCI_TYPE_BRIDGE &&
273 address >= PCI_CFG_BAR && address <= PCI_CFG_BAR_END) {
274 bar_no = (address - PCI_CFG_BAR) / 4;
275 mask &= device->info->bar_mask[bar_no];
276 device->bar[bar_no] &= ~mask;
277 device->bar[bar_no] |= value & mask;
278 return PCI_ACCESS_DONE;
281 if (address < PCI_CONFIG_HEADER_SIZE) {
282 if (device->info->type == JAILHOUSE_PCI_TYPE_BRIDGE)
283 cfg_control = bridge_write[address / 4];
284 else /* physical or virtual device */
285 cfg_control = endpoint_write[address / 4];
287 if ((cfg_control.mask & mask) != mask)
288 return PCI_ACCESS_REJECT;
290 switch (cfg_control.type) {
291 case PCI_CONFIG_ALLOW:
292 if (device->info->type == JAILHOUSE_PCI_TYPE_IVSHMEM)
293 return pci_ivshmem_cfg_write(device,
294 address / 4, mask, value);
295 return PCI_ACCESS_PERFORM;
296 case PCI_CONFIG_RDONLY:
297 return PCI_ACCESS_DONE;
299 return PCI_ACCESS_REJECT;
303 if (device->info->type == JAILHOUSE_PCI_TYPE_IVSHMEM)
304 return pci_ivshmem_cfg_write(device, address / 4, mask, value);
306 cap = pci_find_capability(device, address);
307 if (!cap || !(cap->flags & JAILHOUSE_PCICAPS_WRITE))
308 return PCI_ACCESS_REJECT;
310 cap_offs = address - cap->start;
311 if (cap->id == PCI_CAP_MSI &&
312 (cap_offs < 10 || (device->info->msi_64bits && cap_offs < 14))) {
313 device->msi_registers.raw[cap_offs / 4] &= ~mask;
314 device->msi_registers.raw[cap_offs / 4] |= value;
316 if (arch_pci_update_msi(device, cap) < 0)
317 return PCI_ACCESS_REJECT;
320 * Address and data words are emulated, the control word is
324 return PCI_ACCESS_DONE;
325 } else if (cap->id == PCI_CAP_MSIX && cap_offs < 4) {
326 device->msix_registers.raw &= ~mask;
327 device->msix_registers.raw |= value;
329 if (pci_update_msix(device, cap) < 0)
330 return PCI_ACCESS_REJECT;
333 return PCI_ACCESS_PERFORM;
337 * Initialization of PCI subsystem.
339 * @return 0 on success, negative error code otherwise.
343 unsigned int mmcfg_size;
346 err = pci_cell_init(&root_cell);
350 mmcfg_start = system_config->platform_info.x86.mmconfig_base;
351 if (mmcfg_start == 0)
354 end_bus = system_config->platform_info.x86.mmconfig_end_bus;
355 mmcfg_size = (end_bus + 1) * 256 * 4096;
356 mmcfg_end = mmcfg_start + mmcfg_size - 4;
358 pci_space = page_alloc(&remap_pool, mmcfg_size / PAGE_SIZE);
360 return trace_error(-ENOMEM);
362 return paging_create(&hv_paging_structs, mmcfg_start, mmcfg_size,
363 (unsigned long)pci_space,
364 PAGE_DEFAULT_FLAGS | PAGE_FLAG_DEVICE,
365 PAGING_NON_COHERENT);
368 static int pci_msix_access_handler(const struct cell *cell, bool is_write,
369 u64 addr, u32 *value)
371 unsigned int dword = (addr % sizeof(union pci_msix_vector)) >> 2;
372 struct pci_device *device = cell->msix_device_list;
377 if (addr >= device->info->msix_address &&
378 addr < device->info->msix_address +
379 device->info->msix_region_size)
381 device = device->next_msix_device;
386 /* access must be DWORD-aligned */
390 offs = addr - device->info->msix_address;
391 index = offs / sizeof(union pci_msix_vector);
395 * The PBA may share a page with the MSI-X table. Writing to
396 * PBA entries is undefined. We declare it as invalid.
398 if (index >= device->info->num_msix_vectors)
401 device->msix_vectors[index].raw[dword] = *value;
402 if (arch_pci_update_msix_vector(device, index) < 0)
405 if (dword == MSIX_VECTOR_CTRL_DWORD)
406 mmio_write32(&device->msix_table[index].raw[dword],
409 if (index >= device->info->num_msix_vectors ||
410 dword == MSIX_VECTOR_CTRL_DWORD)
412 mmio_read32(((void *)device->msix_table) + offs);
414 *value = device->msix_vectors[index].raw[dword];
419 panic_printk("FATAL: Invalid PCI MSI-X table/PBA access, device "
420 "%02x:%02x.%x\n", PCI_BDF_PARAMS(device->info->bdf));
425 * Handler for MMIO-accesses to PCI config space.
426 * @param cell Request issuing cell.
427 * @param is_write True if write access.
428 * @param addr Address accessed.
429 * @param value Pointer to value for reading/writing.
431 * @return 1 if handled successfully, 0 if unhandled, -1 on access error.
433 int pci_mmio_access_handler(const struct cell *cell, bool is_write,
434 u64 addr, u32 *value)
436 u32 mmcfg_offset, reg_addr;
437 struct pci_device *device;
438 enum pci_access access;
441 if (!pci_space || addr < mmcfg_start || addr > mmcfg_end) {
442 ret = pci_msix_access_handler(cell, is_write, addr, value);
444 ret = ivshmem_mmio_access_handler(cell, is_write, addr,
449 mmcfg_offset = addr - mmcfg_start;
450 reg_addr = mmcfg_offset & 0xfff;
451 /* access must be DWORD-aligned */
455 device = pci_get_assigned_device(cell, mmcfg_offset >> 12);
458 access = pci_cfg_write_moderate(device, reg_addr, 4, *value);
459 if (access == PCI_ACCESS_REJECT)
461 if (access == PCI_ACCESS_PERFORM)
462 mmio_write32(pci_space + mmcfg_offset, *value);
464 access = pci_cfg_read_moderate(device, reg_addr, 4, value);
465 if (access == PCI_ACCESS_PERFORM)
466 *value = mmio_read32(pci_space + mmcfg_offset);
472 panic_printk("FATAL: Invalid PCI MMCONFIG write, device %02x:%02x.%x, "
473 "reg: %\n", PCI_BDF_PARAMS(mmcfg_offset >> 12), reg_addr);
479 * Retrieve number of enabled MSI vector of a device.
480 * @param device The device to be examined.
482 * @return number of vectors.
484 unsigned int pci_enabled_msi_vectors(struct pci_device *device)
486 return device->msi_registers.msg32.enable ?
487 1 << device->msi_registers.msg32.mme : 0;
490 static void pci_save_msi(struct pci_device *device,
491 const struct jailhouse_pci_capability *cap)
493 u16 bdf = device->info->bdf;
496 for (n = 0; n < (device->info->msi_64bits ? 4 : 3); n++)
497 device->msi_registers.raw[n] =
498 pci_read_config(bdf, cap->start + n * 4, 4);
501 static void pci_restore_msi(struct pci_device *device,
502 const struct jailhouse_pci_capability *cap)
506 for (n = 1; n < (device->info->msi_64bits ? 4 : 3); n++)
507 pci_write_config(device->info->bdf, cap->start + n * 4,
508 device->msi_registers.raw[n], 4);
511 static void pci_suppress_msix(struct pci_device *device,
512 const struct jailhouse_pci_capability *cap,
515 union pci_msix_registers regs = device->msix_registers;
519 pci_write_config(device->info->bdf, cap->start, regs.raw, 4);
522 static void pci_save_msix(struct pci_device *device,
523 const struct jailhouse_pci_capability *cap)
527 device->msix_registers.raw =
528 pci_read_config(device->info->bdf, cap->start, 4);
530 for (n = 0; n < device->info->num_msix_vectors; n++)
531 for (r = 0; r < 4; r++)
532 device->msix_vectors[n].raw[r] =
533 mmio_read32(&device->msix_table[n].raw[r]);
536 static void pci_restore_msix(struct pci_device *device,
537 const struct jailhouse_pci_capability *cap)
541 for (n = 0; n < device->info->num_msix_vectors; n++)
542 /* only restore address/data, control is write-through */
543 for (r = 0; r < 3; r++)
544 mmio_write32(&device->msix_table[n].raw[r],
545 device->msix_vectors[n].raw[r]);
546 pci_suppress_msix(device, cap, false);
550 * Prepare the handover of PCI devices to Jailhouse or back to Linux.
552 void pci_prepare_handover(void)
554 const struct jailhouse_pci_capability *cap;
555 struct pci_device *device;
558 if (!root_cell.pci_devices)
561 for_each_configured_pci_device(device, &root_cell) {
563 for_each_pci_cap(cap, device, n)
564 if (cap->id == PCI_CAP_MSI)
565 arch_pci_suppress_msi(device, cap);
566 else if (cap->id == PCI_CAP_MSIX)
567 pci_suppress_msix(device, cap, true);
571 static int pci_add_virtual_device(struct cell *cell, struct pci_device *device)
574 device->next_virtual_device = cell->virtual_device_list;
575 cell->virtual_device_list = device;
579 static int pci_add_physical_device(struct cell *cell, struct pci_device *device)
581 unsigned int n, size = device->info->msix_region_size;
584 printk("Adding PCI device %02x:%02x.%x to cell \"%s\"\n",
585 PCI_BDF_PARAMS(device->info->bdf), cell->config->name);
587 for (n = 0; n < PCI_NUM_BARS; n ++)
588 device->bar[n] = pci_read_config(device->info->bdf,
589 PCI_CFG_BAR + n * 4, 4);
591 err = arch_pci_add_physical_device(cell, device);
593 if (!err && device->info->msix_address) {
594 device->msix_table = page_alloc(&remap_pool, size / PAGE_SIZE);
595 if (!device->msix_table) {
596 err = trace_error(-ENOMEM);
597 goto error_remove_dev;
600 err = paging_create(&hv_paging_structs,
601 device->info->msix_address, size,
602 (unsigned long)device->msix_table,
603 PAGE_DEFAULT_FLAGS | PAGE_FLAG_DEVICE,
604 PAGING_NON_COHERENT);
606 goto error_page_free;
608 device->next_msix_device = cell->msix_device_list;
609 cell->msix_device_list = device;
614 page_free(&remap_pool, device->msix_table, size / PAGE_SIZE);
616 arch_pci_remove_physical_device(device);
620 static void pci_remove_virtual_device(struct pci_device *device)
622 struct pci_device *prev = device->cell->virtual_device_list;
624 if (prev == device) {
625 device->cell->virtual_device_list = device->next_virtual_device;
627 while (prev->next_virtual_device != device)
628 prev = prev->next_virtual_device;
629 prev->next_virtual_device = device->next_virtual_device;
633 static void pci_remove_physical_device(struct pci_device *device)
635 unsigned int size = device->info->msix_region_size;
636 struct pci_device *prev_msix_device;
638 printk("Removing PCI device %02x:%02x.%x from cell \"%s\"\n",
639 PCI_BDF_PARAMS(device->info->bdf), device->cell->config->name);
640 arch_pci_remove_physical_device(device);
641 pci_write_config(device->info->bdf, PCI_CFG_COMMAND,
642 PCI_CMD_INTX_OFF, 2);
644 if (!device->msix_table)
647 /* cannot fail, destruction of same size as construction */
648 paging_destroy(&hv_paging_structs, (unsigned long)device->msix_table,
649 size, PAGING_NON_COHERENT);
650 page_free(&remap_pool, device->msix_table, size / PAGE_SIZE);
652 prev_msix_device = device->cell->msix_device_list;
653 if (prev_msix_device == device) {
654 device->cell->msix_device_list = device->next_msix_device;
656 while (prev_msix_device->next_msix_device != device)
657 prev_msix_device = prev_msix_device->next_msix_device;
658 prev_msix_device->next_msix_device = device->next_msix_device;
663 * Perform PCI-specific initialization for a new cell.
664 * @param cell Cell to be initialized.
666 * @return 0 on success, negative error code otherwise.
670 int pci_cell_init(struct cell *cell)
672 unsigned int devlist_pages = PAGES(cell->config->num_pci_devices *
673 sizeof(struct pci_device));
674 const struct jailhouse_pci_device *dev_infos =
675 jailhouse_cell_pci_devices(cell->config);
676 const struct jailhouse_pci_capability *cap;
677 struct pci_device *device, *root_device;
678 unsigned int ndev, ncap;
681 cell->pci_devices = page_alloc(&mem_pool, devlist_pages);
682 if (!cell->pci_devices)
686 * We order device states in the same way as the static information
687 * so that we can use the index of the latter to find the former. For
688 * the other way around and for obtaining the owner cell, we use more
689 * handy pointers. The cell pointer also encodes active ownership.
691 for (ndev = 0; ndev < cell->config->num_pci_devices; ndev++) {
692 if (dev_infos[ndev].num_msix_vectors > PCI_MAX_MSIX_VECTORS) {
693 err = trace_error(-ERANGE);
697 device = &cell->pci_devices[ndev];
698 device->info = &dev_infos[ndev];
700 if (device->info->type == JAILHOUSE_PCI_TYPE_IVSHMEM) {
701 err = pci_ivshmem_init(cell, device);
704 err = pci_add_virtual_device(cell, device);
710 root_device = pci_get_assigned_device(&root_cell,
711 dev_infos[ndev].bdf);
713 pci_remove_physical_device(root_device);
714 root_device->cell = NULL;
717 err = pci_add_physical_device(cell, device);
723 for_each_pci_cap(cap, device, ncap)
724 if (cap->id == PCI_CAP_MSI)
725 pci_save_msi(device, cap);
726 else if (cap->id == PCI_CAP_MSIX)
727 pci_save_msix(device, cap);
730 if (cell == &root_cell)
731 pci_prepare_handover();
739 static void pci_return_device_to_root_cell(struct pci_device *device)
741 struct pci_device *root_device;
743 for_each_configured_pci_device(root_device, &root_cell)
744 if (root_device->info->domain == device->info->domain &&
745 root_device->info->bdf == device->info->bdf) {
746 if (pci_add_physical_device(&root_cell,
748 printk("WARNING: Failed to re-assign PCI "
749 "device to root cell\n");
751 root_device->cell = &root_cell;
757 * Perform PCI-specific cleanup for a cell under destruction.
758 * @param cell Cell to be destructed.
762 void pci_cell_exit(struct cell *cell)
764 unsigned int devlist_pages = PAGES(cell->config->num_pci_devices *
765 sizeof(struct pci_device));
766 struct pci_device *device;
769 * Do not destroy the root cell. We will shut down the complete
770 * hypervisor instead.
772 if (cell == &root_cell)
775 for_each_configured_pci_device(device, cell)
777 if (device->info->type == JAILHOUSE_PCI_TYPE_IVSHMEM) {
778 pci_ivshmem_exit(device);
779 pci_remove_virtual_device(device);
781 pci_remove_physical_device(device);
782 pci_return_device_to_root_cell(device);
786 page_free(&mem_pool, cell->pci_devices, devlist_pages);
790 * Apply PCI-specific configuration changes.
791 * @param cell_added_removed Cell that was added or removed to/from the
794 * @see arch_config_commit
796 void pci_config_commit(struct cell *cell_added_removed)
798 const struct jailhouse_pci_capability *cap;
799 struct pci_device *device;
803 if (!cell_added_removed)
806 for_each_configured_pci_device(device, &root_cell)
808 for_each_pci_cap(cap, device, n) {
809 if (cap->id == PCI_CAP_MSI) {
810 err = arch_pci_update_msi(device, cap);
811 } else if (cap->id == PCI_CAP_MSIX) {
812 err = pci_update_msix(device, cap);
813 pci_suppress_msix(device, cap, false);
818 if (device->info->type == JAILHOUSE_PCI_TYPE_IVSHMEM) {
819 err = pci_ivshmem_update_msix(device);
829 panic_printk("FATAL: Unsupported MSI/MSI-X state, device %02x:%02x.%x",
830 PCI_BDF_PARAMS(device->info->bdf));
832 panic_printk(", cap %d\n", cap->id);
839 * Shut down the PCI layer during hypervisor deactivation.
841 void pci_shutdown(void)
843 const struct jailhouse_pci_capability *cap;
844 struct pci_device *device;
847 if (!root_cell.pci_devices)
850 for_each_configured_pci_device(device, &root_cell) {
854 for_each_pci_cap(cap, device, n)
855 if (cap->id == PCI_CAP_MSI)
856 pci_restore_msi(device, cap);
857 else if (cap->id == PCI_CAP_MSIX)
858 pci_restore_msix(device, cap);
860 if (device->cell != &root_cell)
861 pci_write_config(device->info->bdf, PCI_CFG_COMMAND,
862 PCI_CMD_INTX_OFF, 2);