xref: /kernel/linux/linux-6.6/drivers/cxl/mem.c (revision 62306a36)
162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only
262306a36Sopenharmony_ci/* Copyright(c) 2022 Intel Corporation. All rights reserved. */
362306a36Sopenharmony_ci#include <linux/debugfs.h>
462306a36Sopenharmony_ci#include <linux/device.h>
562306a36Sopenharmony_ci#include <linux/module.h>
662306a36Sopenharmony_ci#include <linux/pci.h>
762306a36Sopenharmony_ci
862306a36Sopenharmony_ci#include "cxlmem.h"
962306a36Sopenharmony_ci#include "cxlpci.h"
1062306a36Sopenharmony_ci
1162306a36Sopenharmony_ci/**
1262306a36Sopenharmony_ci * DOC: cxl mem
1362306a36Sopenharmony_ci *
1462306a36Sopenharmony_ci * CXL memory endpoint devices and switches are CXL capable devices that are
1562306a36Sopenharmony_ci * participating in CXL.mem protocol. Their functionality builds on top of the
1662306a36Sopenharmony_ci * CXL.io protocol that allows enumerating and configuring components via
1762306a36Sopenharmony_ci * standard PCI mechanisms.
1862306a36Sopenharmony_ci *
1962306a36Sopenharmony_ci * The cxl_mem driver owns kicking off the enumeration of this CXL.mem
2062306a36Sopenharmony_ci * capability. With the detection of a CXL capable endpoint, the driver will
2162306a36Sopenharmony_ci * walk up to find the platform specific port it is connected to, and determine
2262306a36Sopenharmony_ci * if there are intervening switches in the path. If there are switches, a
2362306a36Sopenharmony_ci * secondary action is to enumerate those (implemented in cxl_core). Finally the
2462306a36Sopenharmony_ci * cxl_mem driver adds the device it is bound to as a CXL endpoint-port for use
2562306a36Sopenharmony_ci * in higher level operations.
2662306a36Sopenharmony_ci */
2762306a36Sopenharmony_ci
2862306a36Sopenharmony_cistatic void enable_suspend(void *data)
2962306a36Sopenharmony_ci{
3062306a36Sopenharmony_ci	cxl_mem_active_dec();
3162306a36Sopenharmony_ci}
3262306a36Sopenharmony_ci
3362306a36Sopenharmony_cistatic void remove_debugfs(void *dentry)
3462306a36Sopenharmony_ci{
3562306a36Sopenharmony_ci	debugfs_remove_recursive(dentry);
3662306a36Sopenharmony_ci}
3762306a36Sopenharmony_ci
3862306a36Sopenharmony_cistatic int cxl_mem_dpa_show(struct seq_file *file, void *data)
3962306a36Sopenharmony_ci{
4062306a36Sopenharmony_ci	struct device *dev = file->private;
4162306a36Sopenharmony_ci	struct cxl_memdev *cxlmd = to_cxl_memdev(dev);
4262306a36Sopenharmony_ci
4362306a36Sopenharmony_ci	cxl_dpa_debug(file, cxlmd->cxlds);
4462306a36Sopenharmony_ci
4562306a36Sopenharmony_ci	return 0;
4662306a36Sopenharmony_ci}
4762306a36Sopenharmony_ci
4862306a36Sopenharmony_cistatic int devm_cxl_add_endpoint(struct device *host, struct cxl_memdev *cxlmd,
4962306a36Sopenharmony_ci				 struct cxl_dport *parent_dport)
5062306a36Sopenharmony_ci{
5162306a36Sopenharmony_ci	struct cxl_port *parent_port = parent_dport->port;
5262306a36Sopenharmony_ci	struct cxl_dev_state *cxlds = cxlmd->cxlds;
5362306a36Sopenharmony_ci	struct cxl_port *endpoint, *iter, *down;
5462306a36Sopenharmony_ci	int rc;
5562306a36Sopenharmony_ci
5662306a36Sopenharmony_ci	/*
5762306a36Sopenharmony_ci	 * Now that the path to the root is established record all the
5862306a36Sopenharmony_ci	 * intervening ports in the chain.
5962306a36Sopenharmony_ci	 */
6062306a36Sopenharmony_ci	for (iter = parent_port, down = NULL; !is_cxl_root(iter);
6162306a36Sopenharmony_ci	     down = iter, iter = to_cxl_port(iter->dev.parent)) {
6262306a36Sopenharmony_ci		struct cxl_ep *ep;
6362306a36Sopenharmony_ci
6462306a36Sopenharmony_ci		ep = cxl_ep_load(iter, cxlmd);
6562306a36Sopenharmony_ci		ep->next = down;
6662306a36Sopenharmony_ci	}
6762306a36Sopenharmony_ci
6862306a36Sopenharmony_ci	endpoint = devm_cxl_add_port(host, &cxlmd->dev,
6962306a36Sopenharmony_ci				     cxlds->component_reg_phys,
7062306a36Sopenharmony_ci				     parent_dport);
7162306a36Sopenharmony_ci	if (IS_ERR(endpoint))
7262306a36Sopenharmony_ci		return PTR_ERR(endpoint);
7362306a36Sopenharmony_ci
7462306a36Sopenharmony_ci	rc = cxl_endpoint_autoremove(cxlmd, endpoint);
7562306a36Sopenharmony_ci	if (rc)
7662306a36Sopenharmony_ci		return rc;
7762306a36Sopenharmony_ci
7862306a36Sopenharmony_ci	if (!endpoint->dev.driver) {
7962306a36Sopenharmony_ci		dev_err(&cxlmd->dev, "%s failed probe\n",
8062306a36Sopenharmony_ci			dev_name(&endpoint->dev));
8162306a36Sopenharmony_ci		return -ENXIO;
8262306a36Sopenharmony_ci	}
8362306a36Sopenharmony_ci
8462306a36Sopenharmony_ci	return 0;
8562306a36Sopenharmony_ci}
8662306a36Sopenharmony_ci
8762306a36Sopenharmony_cistatic int cxl_debugfs_poison_inject(void *data, u64 dpa)
8862306a36Sopenharmony_ci{
8962306a36Sopenharmony_ci	struct cxl_memdev *cxlmd = data;
9062306a36Sopenharmony_ci
9162306a36Sopenharmony_ci	return cxl_inject_poison(cxlmd, dpa);
9262306a36Sopenharmony_ci}
9362306a36Sopenharmony_ci
9462306a36Sopenharmony_ciDEFINE_DEBUGFS_ATTRIBUTE(cxl_poison_inject_fops, NULL,
9562306a36Sopenharmony_ci			 cxl_debugfs_poison_inject, "%llx\n");
9662306a36Sopenharmony_ci
9762306a36Sopenharmony_cistatic int cxl_debugfs_poison_clear(void *data, u64 dpa)
9862306a36Sopenharmony_ci{
9962306a36Sopenharmony_ci	struct cxl_memdev *cxlmd = data;
10062306a36Sopenharmony_ci
10162306a36Sopenharmony_ci	return cxl_clear_poison(cxlmd, dpa);
10262306a36Sopenharmony_ci}
10362306a36Sopenharmony_ci
10462306a36Sopenharmony_ciDEFINE_DEBUGFS_ATTRIBUTE(cxl_poison_clear_fops, NULL,
10562306a36Sopenharmony_ci			 cxl_debugfs_poison_clear, "%llx\n");
10662306a36Sopenharmony_ci
10762306a36Sopenharmony_cistatic int cxl_mem_probe(struct device *dev)
10862306a36Sopenharmony_ci{
10962306a36Sopenharmony_ci	struct cxl_memdev *cxlmd = to_cxl_memdev(dev);
11062306a36Sopenharmony_ci	struct cxl_memdev_state *mds = to_cxl_memdev_state(cxlmd->cxlds);
11162306a36Sopenharmony_ci	struct cxl_dev_state *cxlds = cxlmd->cxlds;
11262306a36Sopenharmony_ci	struct device *endpoint_parent;
11362306a36Sopenharmony_ci	struct cxl_port *parent_port;
11462306a36Sopenharmony_ci	struct cxl_dport *dport;
11562306a36Sopenharmony_ci	struct dentry *dentry;
11662306a36Sopenharmony_ci	int rc;
11762306a36Sopenharmony_ci
11862306a36Sopenharmony_ci	if (!cxlds->media_ready)
11962306a36Sopenharmony_ci		return -EBUSY;
12062306a36Sopenharmony_ci
12162306a36Sopenharmony_ci	/*
12262306a36Sopenharmony_ci	 * Someone is trying to reattach this device after it lost its port
12362306a36Sopenharmony_ci	 * connection (an endpoint port previously registered by this memdev was
12462306a36Sopenharmony_ci	 * disabled). This racy check is ok because if the port is still gone,
12562306a36Sopenharmony_ci	 * no harm done, and if the port hierarchy comes back it will re-trigger
12662306a36Sopenharmony_ci	 * this probe. Port rescan and memdev detach work share the same
12762306a36Sopenharmony_ci	 * single-threaded workqueue.
12862306a36Sopenharmony_ci	 */
12962306a36Sopenharmony_ci	if (work_pending(&cxlmd->detach_work))
13062306a36Sopenharmony_ci		return -EBUSY;
13162306a36Sopenharmony_ci
13262306a36Sopenharmony_ci	dentry = cxl_debugfs_create_dir(dev_name(dev));
13362306a36Sopenharmony_ci	debugfs_create_devm_seqfile(dev, "dpamem", dentry, cxl_mem_dpa_show);
13462306a36Sopenharmony_ci
13562306a36Sopenharmony_ci	if (test_bit(CXL_POISON_ENABLED_INJECT, mds->poison.enabled_cmds))
13662306a36Sopenharmony_ci		debugfs_create_file("inject_poison", 0200, dentry, cxlmd,
13762306a36Sopenharmony_ci				    &cxl_poison_inject_fops);
13862306a36Sopenharmony_ci	if (test_bit(CXL_POISON_ENABLED_CLEAR, mds->poison.enabled_cmds))
13962306a36Sopenharmony_ci		debugfs_create_file("clear_poison", 0200, dentry, cxlmd,
14062306a36Sopenharmony_ci				    &cxl_poison_clear_fops);
14162306a36Sopenharmony_ci
14262306a36Sopenharmony_ci	rc = devm_add_action_or_reset(dev, remove_debugfs, dentry);
14362306a36Sopenharmony_ci	if (rc)
14462306a36Sopenharmony_ci		return rc;
14562306a36Sopenharmony_ci
14662306a36Sopenharmony_ci	rc = devm_cxl_enumerate_ports(cxlmd);
14762306a36Sopenharmony_ci	if (rc)
14862306a36Sopenharmony_ci		return rc;
14962306a36Sopenharmony_ci
15062306a36Sopenharmony_ci	parent_port = cxl_mem_find_port(cxlmd, &dport);
15162306a36Sopenharmony_ci	if (!parent_port) {
15262306a36Sopenharmony_ci		dev_err(dev, "CXL port topology not found\n");
15362306a36Sopenharmony_ci		return -ENXIO;
15462306a36Sopenharmony_ci	}
15562306a36Sopenharmony_ci
15662306a36Sopenharmony_ci	if (dport->rch)
15762306a36Sopenharmony_ci		endpoint_parent = parent_port->uport_dev;
15862306a36Sopenharmony_ci	else
15962306a36Sopenharmony_ci		endpoint_parent = &parent_port->dev;
16062306a36Sopenharmony_ci
16162306a36Sopenharmony_ci	device_lock(endpoint_parent);
16262306a36Sopenharmony_ci	if (!endpoint_parent->driver) {
16362306a36Sopenharmony_ci		dev_err(dev, "CXL port topology %s not enabled\n",
16462306a36Sopenharmony_ci			dev_name(endpoint_parent));
16562306a36Sopenharmony_ci		rc = -ENXIO;
16662306a36Sopenharmony_ci		goto unlock;
16762306a36Sopenharmony_ci	}
16862306a36Sopenharmony_ci
16962306a36Sopenharmony_ci	rc = devm_cxl_add_endpoint(endpoint_parent, cxlmd, dport);
17062306a36Sopenharmony_ciunlock:
17162306a36Sopenharmony_ci	device_unlock(endpoint_parent);
17262306a36Sopenharmony_ci	put_device(&parent_port->dev);
17362306a36Sopenharmony_ci	if (rc)
17462306a36Sopenharmony_ci		return rc;
17562306a36Sopenharmony_ci
17662306a36Sopenharmony_ci	if (resource_size(&cxlds->pmem_res) && IS_ENABLED(CONFIG_CXL_PMEM)) {
17762306a36Sopenharmony_ci		rc = devm_cxl_add_nvdimm(cxlmd);
17862306a36Sopenharmony_ci		if (rc == -ENODEV)
17962306a36Sopenharmony_ci			dev_info(dev, "PMEM disabled by platform\n");
18062306a36Sopenharmony_ci		else
18162306a36Sopenharmony_ci			return rc;
18262306a36Sopenharmony_ci	}
18362306a36Sopenharmony_ci
18462306a36Sopenharmony_ci	/*
18562306a36Sopenharmony_ci	 * The kernel may be operating out of CXL memory on this device,
18662306a36Sopenharmony_ci	 * there is no spec defined way to determine whether this device
18762306a36Sopenharmony_ci	 * preserves contents over suspend, and there is no simple way
18862306a36Sopenharmony_ci	 * to arrange for the suspend image to avoid CXL memory which
18962306a36Sopenharmony_ci	 * would setup a circular dependency between PCI resume and save
19062306a36Sopenharmony_ci	 * state restoration.
19162306a36Sopenharmony_ci	 *
19262306a36Sopenharmony_ci	 * TODO: support suspend when all the regions this device is
19362306a36Sopenharmony_ci	 * hosting are locked and covered by the system address map,
19462306a36Sopenharmony_ci	 * i.e. platform firmware owns restoring the HDM configuration
19562306a36Sopenharmony_ci	 * that it locked.
19662306a36Sopenharmony_ci	 */
19762306a36Sopenharmony_ci	cxl_mem_active_inc();
19862306a36Sopenharmony_ci	return devm_add_action_or_reset(dev, enable_suspend, NULL);
19962306a36Sopenharmony_ci}
20062306a36Sopenharmony_ci
20162306a36Sopenharmony_cistatic ssize_t trigger_poison_list_store(struct device *dev,
20262306a36Sopenharmony_ci					 struct device_attribute *attr,
20362306a36Sopenharmony_ci					 const char *buf, size_t len)
20462306a36Sopenharmony_ci{
20562306a36Sopenharmony_ci	bool trigger;
20662306a36Sopenharmony_ci	int rc;
20762306a36Sopenharmony_ci
20862306a36Sopenharmony_ci	if (kstrtobool(buf, &trigger) || !trigger)
20962306a36Sopenharmony_ci		return -EINVAL;
21062306a36Sopenharmony_ci
21162306a36Sopenharmony_ci	rc = cxl_trigger_poison_list(to_cxl_memdev(dev));
21262306a36Sopenharmony_ci
21362306a36Sopenharmony_ci	return rc ? rc : len;
21462306a36Sopenharmony_ci}
21562306a36Sopenharmony_cistatic DEVICE_ATTR_WO(trigger_poison_list);
21662306a36Sopenharmony_ci
21762306a36Sopenharmony_cistatic umode_t cxl_mem_visible(struct kobject *kobj, struct attribute *a, int n)
21862306a36Sopenharmony_ci{
21962306a36Sopenharmony_ci	if (a == &dev_attr_trigger_poison_list.attr) {
22062306a36Sopenharmony_ci		struct device *dev = kobj_to_dev(kobj);
22162306a36Sopenharmony_ci		struct cxl_memdev *cxlmd = to_cxl_memdev(dev);
22262306a36Sopenharmony_ci		struct cxl_memdev_state *mds =
22362306a36Sopenharmony_ci			to_cxl_memdev_state(cxlmd->cxlds);
22462306a36Sopenharmony_ci
22562306a36Sopenharmony_ci		if (!test_bit(CXL_POISON_ENABLED_LIST,
22662306a36Sopenharmony_ci			      mds->poison.enabled_cmds))
22762306a36Sopenharmony_ci			return 0;
22862306a36Sopenharmony_ci	}
22962306a36Sopenharmony_ci	return a->mode;
23062306a36Sopenharmony_ci}
23162306a36Sopenharmony_ci
23262306a36Sopenharmony_cistatic struct attribute *cxl_mem_attrs[] = {
23362306a36Sopenharmony_ci	&dev_attr_trigger_poison_list.attr,
23462306a36Sopenharmony_ci	NULL
23562306a36Sopenharmony_ci};
23662306a36Sopenharmony_ci
23762306a36Sopenharmony_cistatic struct attribute_group cxl_mem_group = {
23862306a36Sopenharmony_ci	.attrs = cxl_mem_attrs,
23962306a36Sopenharmony_ci	.is_visible = cxl_mem_visible,
24062306a36Sopenharmony_ci};
24162306a36Sopenharmony_ci
24262306a36Sopenharmony_ci__ATTRIBUTE_GROUPS(cxl_mem);
24362306a36Sopenharmony_ci
24462306a36Sopenharmony_cistatic struct cxl_driver cxl_mem_driver = {
24562306a36Sopenharmony_ci	.name = "cxl_mem",
24662306a36Sopenharmony_ci	.probe = cxl_mem_probe,
24762306a36Sopenharmony_ci	.id = CXL_DEVICE_MEMORY_EXPANDER,
24862306a36Sopenharmony_ci	.drv = {
24962306a36Sopenharmony_ci		.dev_groups = cxl_mem_groups,
25062306a36Sopenharmony_ci	},
25162306a36Sopenharmony_ci};
25262306a36Sopenharmony_ci
25362306a36Sopenharmony_cimodule_cxl_driver(cxl_mem_driver);
25462306a36Sopenharmony_ci
25562306a36Sopenharmony_ciMODULE_LICENSE("GPL v2");
25662306a36Sopenharmony_ciMODULE_IMPORT_NS(CXL);
25762306a36Sopenharmony_ciMODULE_ALIAS_CXL(CXL_DEVICE_MEMORY_EXPANDER);
25862306a36Sopenharmony_ci/*
25962306a36Sopenharmony_ci * create_endpoint() wants to validate port driver attach immediately after
26062306a36Sopenharmony_ci * endpoint registration.
26162306a36Sopenharmony_ci */
26262306a36Sopenharmony_ciMODULE_SOFTDEP("pre: cxl_port");
263