2 * Jailhouse, a Linux-based partitioning hypervisor
4 * Copyright (c) Siemens AG, 2014, 2015
7 * Ivan Kolchin <ivan.kolchin@siemens.com>
8 * Jan Kiszka <jan.kiszka@siemens.com>
10 * This work is licensed under the terms of the GNU GPL, version 2. See
11 * the COPYING file in the top-level directory.
14 #include <jailhouse/control.h>
15 #include <jailhouse/mmio.h>
16 #include <jailhouse/pci.h>
17 #include <jailhouse/printk.h>
18 #include <jailhouse/utils.h>
20 #define MSIX_VECTOR_CTRL_DWORD 3
22 #define for_each_configured_pci_device(dev, cell) \
23 for ((dev) = (cell)->pci_devices; \
24 (dev) - (cell)->pci_devices < (cell)->config->num_pci_devices; \
27 #define for_each_pci_cap(cap, dev, counter) \
28 for ((cap) = jailhouse_cell_pci_caps((dev)->cell->config) + \
29 (dev)->info->caps_start, (counter) = 0; \
30 (counter) < (dev)->info->num_caps; \
33 /* entry for PCI config space access control */
34 struct pci_cfg_control {
39 } type; /* Access type */
40 u32 mask; /* Bit set: access type applies; bit cleared: deny access */
43 /* --- Access control for writing to PCI config space registers --- */
44 /* Type 1: Endpoints */
45 static const struct pci_cfg_control endpoint_write[PCI_CONFIG_HEADER_SIZE] = {
46 [0x04/4] = {PCI_CONFIG_ALLOW, 0xffffffff}, /* Command, Status */
47 [0x0c/4] = {PCI_CONFIG_ALLOW, 0xff00ffff}, /* BIST, Lat., Cacheline */
48 [0x30/4] = {PCI_CONFIG_RDONLY, 0xffffffff}, /* ROM BAR */
49 [0x3c/4] = {PCI_CONFIG_ALLOW, 0x000000ff}, /* Int Line */
53 * Note: Ignore limit/base reprogramming attempts because the root cell will
54 * perform them on bus rescans. */
55 static const struct pci_cfg_control bridge_write[PCI_CONFIG_HEADER_SIZE] = {
56 [0x04/4] = {PCI_CONFIG_ALLOW, 0xffffffff}, /* Command, Status */
57 [0x0c/4] = {PCI_CONFIG_ALLOW, 0xff00ffff}, /* BIST, Lat., Cacheline */
58 [0x1c/4] = {PCI_CONFIG_RDONLY, 0x0000ffff}, /* I/O Limit & Base */
59 [0x20/4 ... /* Memory Limit/Base, Prefetch Memory Limit/Base, */
60 0x30/4] = {PCI_CONFIG_RDONLY, 0xffffffff}, /* I/O Limit & Base */
61 [0x3c/4] = {PCI_CONFIG_ALLOW, 0xffff00ff}, /* Int Line, Bridge Ctrl */
64 static void *pci_space;
65 static u64 mmcfg_start, mmcfg_end;
68 static void *pci_get_device_mmcfg_base(u16 bdf)
70 return pci_space + ((unsigned long)bdf << 12);
74 * Read from PCI config space.
75 * @param bdf 16-bit bus/device/function ID of target.
76 * @param address Config space access address.
77 * @param size Access size (1, 2 or 4 bytes).
81 * @see pci_write_config
83 u32 pci_read_config(u16 bdf, u16 address, unsigned int size)
85 void *mmcfg_addr = pci_get_device_mmcfg_base(bdf) + address;
87 if (!pci_space || PCI_BUS(bdf) > end_bus)
88 return arch_pci_read_config(bdf, address, size);
91 return mmio_read8(mmcfg_addr);
93 return mmio_read16(mmcfg_addr);
95 return mmio_read32(mmcfg_addr);
99 * Write to PCI config space.
100 * @param bdf 16-bit bus/device/function ID of target.
101 * @param address Config space access address.
102 * @param value Value to be written.
103 * @param size Access size (1, 2 or 4 bytes).
105 * @see pci_read_config
107 void pci_write_config(u16 bdf, u16 address, u32 value, unsigned int size)
109 void *mmcfg_addr = pci_get_device_mmcfg_base(bdf) + address;
111 if (!pci_space || PCI_BUS(bdf) > end_bus)
112 return arch_pci_write_config(bdf, address, value, size);
115 mmio_write8(mmcfg_addr, value);
117 mmio_write16(mmcfg_addr, value);
119 mmio_write32(mmcfg_addr, value);
123 * Look up device owned by a cell.
124 * @param[in] cell Owning cell.
125 * @param bdf 16-bit bus/device/function ID.
127 * @return Pointer to owned PCI device or NULL.
129 struct pci_device *pci_get_assigned_device(const struct cell *cell, u16 bdf)
131 const struct jailhouse_pci_device *dev_info =
132 jailhouse_cell_pci_devices(cell->config);
135 /* We iterate over the static device information to increase cache
137 for (n = 0; n < cell->config->num_pci_devices; n++)
138 if (dev_info[n].bdf == bdf)
139 return cell->pci_devices[n].cell ?
140 &cell->pci_devices[n] : NULL;
146 * Look up capability at given config space address.
147 * @param device The device to be accessed.
148 * @param address Config space access address.
150 * @return Corresponding capability structure or NULL if none found.
154 static const struct jailhouse_pci_capability *
155 pci_find_capability(struct pci_device *device, u16 address)
157 const struct jailhouse_pci_capability *cap =
158 jailhouse_cell_pci_caps(device->cell->config) +
159 device->info->caps_start;
162 for (n = 0; n < device->info->num_caps; n++, cap++)
163 if (cap->start <= address && cap->start + cap->len > address)
170 * Moderate config space read access.
171 * @param device The device to be accessed. If NULL, access will be
172 * emulated, returning a value of -1.
173 * @param address Config space address.
174 * @param size Access size (1, 2 or 4 bytes).
175 * @param value Pointer to buffer to receive the emulated value if
176 * PCI_ACCESS_DONE is returned.
178 * @return PCI_ACCESS_PERFORM or PCI_ACCESS_DONE.
180 * @see pci_cfg_write_moderate
182 enum pci_access pci_cfg_read_moderate(struct pci_device *device, u16 address,
183 unsigned int size, u32 *value)
185 const struct jailhouse_pci_capability *cap;
186 unsigned int bar_no, cap_offs;
190 return PCI_ACCESS_DONE;
193 if (device->info->type == JAILHOUSE_PCI_TYPE_IVSHMEM)
194 return pci_ivshmem_cfg_read(device, address, size, value);
196 /* Emulate BARs for physical devices */
197 if (device->info->type == JAILHOUSE_PCI_TYPE_DEVICE) {
198 /* Emulate BAR access, always returning the shadow value. */
199 if (address >= PCI_CFG_BAR && address <= PCI_CFG_BAR_END) {
200 bar_no = (address - PCI_CFG_BAR) / 4;
201 *value = device->bar[bar_no] >> ((address % 4) * 8);
202 return PCI_ACCESS_DONE;
205 /* We do not expose ROMs. */
206 if (address >= PCI_CFG_ROMBAR && address < PCI_CFG_CAPS) {
208 return PCI_ACCESS_DONE;
212 if (address < PCI_CONFIG_HEADER_SIZE)
213 return PCI_ACCESS_PERFORM;
215 cap = pci_find_capability(device, address);
217 return PCI_ACCESS_PERFORM;
219 cap_offs = address - cap->start;
220 if (cap->id == PCI_CAP_MSI && cap_offs >= 4 &&
221 (cap_offs < 10 || (device->info->msi_64bits && cap_offs < 14))) {
222 *value = device->msi_registers.raw[cap_offs / 4] >>
223 ((cap_offs % 4) * 8);
224 return PCI_ACCESS_DONE;
227 return PCI_ACCESS_PERFORM;
230 static int pci_update_msix(struct pci_device *device,
231 const struct jailhouse_pci_capability *cap)
236 for (n = 0; n < device->info->num_msix_vectors; n++) {
237 result = arch_pci_update_msix_vector(device, n);
245 * Moderate config space write access.
246 * @param device The device to be accessed. If NULL, access will be
248 * @param address Config space address.
249 * @param size Access size (1, 2 or 4 bytes).
250 * @param value Value to be written.
252 * @return PCI_ACCESS_REJECT, PCI_ACCESS_PERFORM or PCI_ACCESS_DONE.
254 * @see pci_cfg_read_moderate
256 enum pci_access pci_cfg_write_moderate(struct pci_device *device, u16 address,
257 unsigned int size, u32 value)
259 const struct jailhouse_pci_capability *cap;
260 /* initialize list to work around wrong compiler warning */
261 unsigned int bias_shift = (address % 4) * 8;
262 u32 mask = BYTE_MASK(size) << bias_shift;
263 struct pci_cfg_control cfg_control;
264 unsigned int bar_no, cap_offs;
267 return PCI_ACCESS_REJECT;
269 value <<= bias_shift;
271 if (device->info->type == JAILHOUSE_PCI_TYPE_IVSHMEM)
272 return pci_ivshmem_cfg_write(device, address / 4, mask, value);
274 /* Emulate BARs for physical devices */
275 if (device->info->type == JAILHOUSE_PCI_TYPE_DEVICE &&
276 address >= PCI_CFG_BAR && address <= PCI_CFG_BAR_END) {
277 bar_no = (address - PCI_CFG_BAR) / 4;
278 mask &= device->info->bar_mask[bar_no];
279 device->bar[bar_no] &= ~mask;
280 device->bar[bar_no] |= value & mask;
281 return PCI_ACCESS_DONE;
284 if (address < PCI_CONFIG_HEADER_SIZE) {
285 if (device->info->type == JAILHOUSE_PCI_TYPE_BRIDGE)
286 cfg_control = bridge_write[address / 4];
287 else /* physical device */
288 cfg_control = endpoint_write[address / 4];
290 if ((cfg_control.mask & mask) != mask)
291 return PCI_ACCESS_REJECT;
293 switch (cfg_control.type) {
294 case PCI_CONFIG_ALLOW:
295 return PCI_ACCESS_PERFORM;
296 case PCI_CONFIG_RDONLY:
297 return PCI_ACCESS_DONE;
299 return PCI_ACCESS_REJECT;
303 cap = pci_find_capability(device, address);
304 if (!cap || !(cap->flags & JAILHOUSE_PCICAPS_WRITE))
305 return PCI_ACCESS_REJECT;
307 cap_offs = address - cap->start;
308 if (cap->id == PCI_CAP_MSI &&
309 (cap_offs < 10 || (device->info->msi_64bits && cap_offs < 14))) {
310 device->msi_registers.raw[cap_offs / 4] &= ~mask;
311 device->msi_registers.raw[cap_offs / 4] |= value;
313 if (arch_pci_update_msi(device, cap) < 0)
314 return PCI_ACCESS_REJECT;
317 * Address and data words are emulated, the control word is
321 return PCI_ACCESS_DONE;
322 } else if (cap->id == PCI_CAP_MSIX && cap_offs < 4) {
323 device->msix_registers.raw &= ~mask;
324 device->msix_registers.raw |= value;
326 if (pci_update_msix(device, cap) < 0)
327 return PCI_ACCESS_REJECT;
330 return PCI_ACCESS_PERFORM;
334 * Initialization of PCI subsystem.
336 * @return 0 on success, negative error code otherwise.
340 unsigned int mmcfg_size;
343 err = pci_cell_init(&root_cell);
347 mmcfg_start = system_config->platform_info.x86.mmconfig_base;
348 if (mmcfg_start == 0)
351 end_bus = system_config->platform_info.x86.mmconfig_end_bus;
352 mmcfg_size = (end_bus + 1) * 256 * 4096;
353 mmcfg_end = mmcfg_start + mmcfg_size - 4;
355 pci_space = page_alloc(&remap_pool, mmcfg_size / PAGE_SIZE);
357 return trace_error(-ENOMEM);
359 return paging_create(&hv_paging_structs, mmcfg_start, mmcfg_size,
360 (unsigned long)pci_space,
361 PAGE_DEFAULT_FLAGS | PAGE_FLAG_DEVICE,
362 PAGING_NON_COHERENT);
365 static int pci_msix_access_handler(const struct cell *cell, bool is_write,
366 u64 addr, u32 *value)
368 unsigned int dword = (addr % sizeof(union pci_msix_vector)) >> 2;
369 struct pci_device *device = cell->msix_device_list;
374 if (addr >= device->info->msix_address &&
375 addr < device->info->msix_address +
376 device->info->msix_region_size)
378 device = device->next_msix_device;
383 /* access must be DWORD-aligned */
387 offs = addr - device->info->msix_address;
388 index = offs / sizeof(union pci_msix_vector);
392 * The PBA may share a page with the MSI-X table. Writing to
393 * PBA entries is undefined. We declare it as invalid.
395 if (index >= device->info->num_msix_vectors)
398 device->msix_vectors[index].raw[dword] = *value;
399 if (arch_pci_update_msix_vector(device, index) < 0)
402 if (dword == MSIX_VECTOR_CTRL_DWORD)
403 mmio_write32(&device->msix_table[index].raw[dword],
406 if (index >= device->info->num_msix_vectors ||
407 dword == MSIX_VECTOR_CTRL_DWORD)
409 mmio_read32(((void *)device->msix_table) + offs);
411 *value = device->msix_vectors[index].raw[dword];
416 panic_printk("FATAL: Invalid PCI MSI-X table/PBA access, device "
417 "%02x:%02x.%x\n", PCI_BDF_PARAMS(device->info->bdf));
422 * Handler for MMIO-accesses to PCI config space.
423 * @param cell Request issuing cell.
424 * @param is_write True if write access.
425 * @param addr Address accessed.
426 * @param value Pointer to value for reading/writing.
428 * @return 1 if handled successfully, 0 if unhandled, -1 on access error.
430 int pci_mmio_access_handler(const struct cell *cell, bool is_write,
431 u64 addr, u32 *value)
433 u32 mmcfg_offset, reg_addr;
434 struct pci_device *device;
435 enum pci_access access;
438 if (!pci_space || addr < mmcfg_start || addr > mmcfg_end) {
439 ret = pci_msix_access_handler(cell, is_write, addr, value);
441 ret = ivshmem_mmio_access_handler(cell, is_write, addr,
446 mmcfg_offset = addr - mmcfg_start;
447 reg_addr = mmcfg_offset & 0xfff;
448 /* access must be DWORD-aligned */
452 device = pci_get_assigned_device(cell, mmcfg_offset >> 12);
455 access = pci_cfg_write_moderate(device, reg_addr, 4, *value);
456 if (access == PCI_ACCESS_REJECT)
458 if (access == PCI_ACCESS_PERFORM)
459 mmio_write32(pci_space + mmcfg_offset, *value);
461 access = pci_cfg_read_moderate(device, reg_addr, 4, value);
462 if (access == PCI_ACCESS_PERFORM)
463 *value = mmio_read32(pci_space + mmcfg_offset);
469 panic_printk("FATAL: Invalid PCI MMCONFIG write, device %02x:%02x.%x, "
470 "reg: %\n", PCI_BDF_PARAMS(mmcfg_offset >> 12), reg_addr);
476 * Retrieve number of enabled MSI vector of a device.
477 * @param device The device to be examined.
479 * @return number of vectors.
481 unsigned int pci_enabled_msi_vectors(struct pci_device *device)
483 return device->msi_registers.msg32.enable ?
484 1 << device->msi_registers.msg32.mme : 0;
487 static void pci_save_msi(struct pci_device *device,
488 const struct jailhouse_pci_capability *cap)
490 u16 bdf = device->info->bdf;
493 for (n = 0; n < (device->info->msi_64bits ? 4 : 3); n++)
494 device->msi_registers.raw[n] =
495 pci_read_config(bdf, cap->start + n * 4, 4);
498 static void pci_restore_msi(struct pci_device *device,
499 const struct jailhouse_pci_capability *cap)
503 for (n = 1; n < (device->info->msi_64bits ? 4 : 3); n++)
504 pci_write_config(device->info->bdf, cap->start + n * 4,
505 device->msi_registers.raw[n], 4);
508 static void pci_suppress_msix(struct pci_device *device,
509 const struct jailhouse_pci_capability *cap,
512 union pci_msix_registers regs = device->msix_registers;
516 pci_write_config(device->info->bdf, cap->start, regs.raw, 4);
519 static void pci_save_msix(struct pci_device *device,
520 const struct jailhouse_pci_capability *cap)
524 device->msix_registers.raw =
525 pci_read_config(device->info->bdf, cap->start, 4);
527 for (n = 0; n < device->info->num_msix_vectors; n++)
528 for (r = 0; r < 4; r++)
529 device->msix_vectors[n].raw[r] =
530 mmio_read32(&device->msix_table[n].raw[r]);
533 static void pci_restore_msix(struct pci_device *device,
534 const struct jailhouse_pci_capability *cap)
538 for (n = 0; n < device->info->num_msix_vectors; n++)
539 /* only restore address/data, control is write-through */
540 for (r = 0; r < 3; r++)
541 mmio_write32(&device->msix_table[n].raw[r],
542 device->msix_vectors[n].raw[r]);
543 pci_suppress_msix(device, cap, false);
547 * Prepare the handover of PCI devices to Jailhouse or back to Linux.
549 void pci_prepare_handover(void)
551 const struct jailhouse_pci_capability *cap;
552 struct pci_device *device;
555 if (!root_cell.pci_devices)
558 for_each_configured_pci_device(device, &root_cell) {
560 for_each_pci_cap(cap, device, n)
561 if (cap->id == PCI_CAP_MSI)
562 arch_pci_suppress_msi(device, cap);
563 else if (cap->id == PCI_CAP_MSIX)
564 pci_suppress_msix(device, cap, true);
568 static int pci_add_virtual_device(struct cell *cell, struct pci_device *device)
571 device->next_virtual_device = cell->virtual_device_list;
572 cell->virtual_device_list = device;
576 static int pci_add_physical_device(struct cell *cell, struct pci_device *device)
578 unsigned int n, size = device->info->msix_region_size;
581 printk("Adding PCI device %02x:%02x.%x to cell \"%s\"\n",
582 PCI_BDF_PARAMS(device->info->bdf), cell->config->name);
584 for (n = 0; n < PCI_NUM_BARS; n ++)
585 device->bar[n] = pci_read_config(device->info->bdf,
586 PCI_CFG_BAR + n * 4, 4);
588 err = arch_pci_add_physical_device(cell, device);
590 if (!err && device->info->msix_address) {
591 device->msix_table = page_alloc(&remap_pool, size / PAGE_SIZE);
592 if (!device->msix_table) {
593 err = trace_error(-ENOMEM);
594 goto error_remove_dev;
597 err = paging_create(&hv_paging_structs,
598 device->info->msix_address, size,
599 (unsigned long)device->msix_table,
600 PAGE_DEFAULT_FLAGS | PAGE_FLAG_DEVICE,
601 PAGING_NON_COHERENT);
603 goto error_page_free;
605 device->next_msix_device = cell->msix_device_list;
606 cell->msix_device_list = device;
611 page_free(&remap_pool, device->msix_table, size / PAGE_SIZE);
613 arch_pci_remove_physical_device(device);
617 static void pci_remove_virtual_device(struct pci_device *device)
619 struct pci_device *prev = device->cell->virtual_device_list;
621 if (prev == device) {
622 device->cell->virtual_device_list = device->next_virtual_device;
624 while (prev->next_virtual_device != device)
625 prev = prev->next_virtual_device;
626 prev->next_virtual_device = device->next_virtual_device;
630 static void pci_remove_physical_device(struct pci_device *device)
632 unsigned int size = device->info->msix_region_size;
633 struct pci_device *prev_msix_device;
635 printk("Removing PCI device %02x:%02x.%x from cell \"%s\"\n",
636 PCI_BDF_PARAMS(device->info->bdf), device->cell->config->name);
637 arch_pci_remove_physical_device(device);
638 pci_write_config(device->info->bdf, PCI_CFG_COMMAND,
639 PCI_CMD_INTX_OFF, 2);
641 if (!device->msix_table)
644 /* cannot fail, destruction of same size as construction */
645 paging_destroy(&hv_paging_structs, (unsigned long)device->msix_table,
646 size, PAGING_NON_COHERENT);
647 page_free(&remap_pool, device->msix_table, size / PAGE_SIZE);
649 prev_msix_device = device->cell->msix_device_list;
650 if (prev_msix_device == device) {
651 device->cell->msix_device_list = device->next_msix_device;
653 while (prev_msix_device->next_msix_device != device)
654 prev_msix_device = prev_msix_device->next_msix_device;
655 prev_msix_device->next_msix_device = device->next_msix_device;
660 * Perform PCI-specific initialization for a new cell.
661 * @param cell Cell to be initialized.
663 * @return 0 on success, negative error code otherwise.
667 int pci_cell_init(struct cell *cell)
669 unsigned int devlist_pages = PAGES(cell->config->num_pci_devices *
670 sizeof(struct pci_device));
671 const struct jailhouse_pci_device *dev_infos =
672 jailhouse_cell_pci_devices(cell->config);
673 const struct jailhouse_pci_capability *cap;
674 struct pci_device *device, *root_device;
675 unsigned int ndev, ncap;
678 cell->pci_devices = page_alloc(&mem_pool, devlist_pages);
679 if (!cell->pci_devices)
683 * We order device states in the same way as the static information
684 * so that we can use the index of the latter to find the former. For
685 * the other way around and for obtaining the owner cell, we use more
686 * handy pointers. The cell pointer also encodes active ownership.
688 for (ndev = 0; ndev < cell->config->num_pci_devices; ndev++) {
689 if (dev_infos[ndev].num_msix_vectors > PCI_MAX_MSIX_VECTORS) {
690 err = trace_error(-ERANGE);
694 device = &cell->pci_devices[ndev];
695 device->info = &dev_infos[ndev];
697 if (device->info->type == JAILHOUSE_PCI_TYPE_IVSHMEM) {
698 err = pci_ivshmem_init(cell, device);
701 err = pci_add_virtual_device(cell, device);
707 root_device = pci_get_assigned_device(&root_cell,
708 dev_infos[ndev].bdf);
710 pci_remove_physical_device(root_device);
711 root_device->cell = NULL;
714 err = pci_add_physical_device(cell, device);
720 for_each_pci_cap(cap, device, ncap)
721 if (cap->id == PCI_CAP_MSI)
722 pci_save_msi(device, cap);
723 else if (cap->id == PCI_CAP_MSIX)
724 pci_save_msix(device, cap);
727 if (cell == &root_cell)
728 pci_prepare_handover();
736 static void pci_return_device_to_root_cell(struct pci_device *device)
738 struct pci_device *root_device;
740 for_each_configured_pci_device(root_device, &root_cell)
741 if (root_device->info->domain == device->info->domain &&
742 root_device->info->bdf == device->info->bdf) {
743 if (pci_add_physical_device(&root_cell,
745 printk("WARNING: Failed to re-assign PCI "
746 "device to root cell\n");
748 root_device->cell = &root_cell;
754 * Perform PCI-specific cleanup for a cell under destruction.
755 * @param cell Cell to be destructed.
759 void pci_cell_exit(struct cell *cell)
761 unsigned int devlist_pages = PAGES(cell->config->num_pci_devices *
762 sizeof(struct pci_device));
763 struct pci_device *device;
766 * Do not destroy the root cell. We will shut down the complete
767 * hypervisor instead.
769 if (cell == &root_cell)
772 for_each_configured_pci_device(device, cell)
774 if (device->info->type == JAILHOUSE_PCI_TYPE_IVSHMEM) {
775 pci_ivshmem_exit(device);
776 pci_remove_virtual_device(device);
778 pci_remove_physical_device(device);
779 pci_return_device_to_root_cell(device);
783 page_free(&mem_pool, cell->pci_devices, devlist_pages);
787 * Apply PCI-specific configuration changes.
788 * @param cell_added_removed Cell that was added or removed to/from the
791 * @see arch_config_commit
793 void pci_config_commit(struct cell *cell_added_removed)
795 const struct jailhouse_pci_capability *cap;
796 struct pci_device *device;
800 if (!cell_added_removed)
803 for_each_configured_pci_device(device, &root_cell)
805 for_each_pci_cap(cap, device, n) {
806 if (cap->id == PCI_CAP_MSI) {
807 err = arch_pci_update_msi(device, cap);
808 } else if (cap->id == PCI_CAP_MSIX) {
809 err = pci_update_msix(device, cap);
810 pci_suppress_msix(device, cap, false);
815 if (device->info->type == JAILHOUSE_PCI_TYPE_IVSHMEM) {
816 err = pci_ivshmem_update_msix(device);
826 panic_printk("FATAL: Unsupported MSI/MSI-X state, device %02x:%02x.%x",
827 PCI_BDF_PARAMS(device->info->bdf));
829 panic_printk(", cap %d\n", cap->id);
836 * Shut down the PCI layer during hypervisor deactivation.
838 void pci_shutdown(void)
840 const struct jailhouse_pci_capability *cap;
841 struct pci_device *device;
844 if (!root_cell.pci_devices)
847 for_each_configured_pci_device(device, &root_cell) {
851 for_each_pci_cap(cap, device, n)
852 if (cap->id == PCI_CAP_MSI)
853 pci_restore_msi(device, cap);
854 else if (cap->id == PCI_CAP_MSIX)
855 pci_restore_msix(device, cap);
857 if (device->cell != &root_cell)
858 pci_write_config(device->info->bdf, PCI_CFG_COMMAND,
859 PCI_CMD_INTX_OFF, 2);