162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 262306a36Sopenharmony_ci/* Copyright(c) 2022 Intel Corporation. All rights reserved. */ 362306a36Sopenharmony_ci#include <linux/debugfs.h> 462306a36Sopenharmony_ci#include <linux/device.h> 562306a36Sopenharmony_ci#include <linux/module.h> 662306a36Sopenharmony_ci#include <linux/pci.h> 762306a36Sopenharmony_ci 862306a36Sopenharmony_ci#include "cxlmem.h" 962306a36Sopenharmony_ci#include "cxlpci.h" 1062306a36Sopenharmony_ci 1162306a36Sopenharmony_ci/** 1262306a36Sopenharmony_ci * DOC: cxl mem 1362306a36Sopenharmony_ci * 1462306a36Sopenharmony_ci * CXL memory endpoint devices and switches are CXL capable devices that are 1562306a36Sopenharmony_ci * participating in CXL.mem protocol. Their functionality builds on top of the 1662306a36Sopenharmony_ci * CXL.io protocol that allows enumerating and configuring components via 1762306a36Sopenharmony_ci * standard PCI mechanisms. 1862306a36Sopenharmony_ci * 1962306a36Sopenharmony_ci * The cxl_mem driver owns kicking off the enumeration of this CXL.mem 2062306a36Sopenharmony_ci * capability. With the detection of a CXL capable endpoint, the driver will 2162306a36Sopenharmony_ci * walk up to find the platform specific port it is connected to, and determine 2262306a36Sopenharmony_ci * if there are intervening switches in the path. If there are switches, a 2362306a36Sopenharmony_ci * secondary action is to enumerate those (implemented in cxl_core). Finally the 2462306a36Sopenharmony_ci * cxl_mem driver adds the device it is bound to as a CXL endpoint-port for use 2562306a36Sopenharmony_ci * in higher level operations. 2662306a36Sopenharmony_ci */ 2762306a36Sopenharmony_ci 2862306a36Sopenharmony_cistatic void enable_suspend(void *data) 2962306a36Sopenharmony_ci{ 3062306a36Sopenharmony_ci cxl_mem_active_dec(); 3162306a36Sopenharmony_ci} 3262306a36Sopenharmony_ci 3362306a36Sopenharmony_cistatic void remove_debugfs(void *dentry) 3462306a36Sopenharmony_ci{ 3562306a36Sopenharmony_ci debugfs_remove_recursive(dentry); 3662306a36Sopenharmony_ci} 3762306a36Sopenharmony_ci 3862306a36Sopenharmony_cistatic int cxl_mem_dpa_show(struct seq_file *file, void *data) 3962306a36Sopenharmony_ci{ 4062306a36Sopenharmony_ci struct device *dev = file->private; 4162306a36Sopenharmony_ci struct cxl_memdev *cxlmd = to_cxl_memdev(dev); 4262306a36Sopenharmony_ci 4362306a36Sopenharmony_ci cxl_dpa_debug(file, cxlmd->cxlds); 4462306a36Sopenharmony_ci 4562306a36Sopenharmony_ci return 0; 4662306a36Sopenharmony_ci} 4762306a36Sopenharmony_ci 4862306a36Sopenharmony_cistatic int devm_cxl_add_endpoint(struct device *host, struct cxl_memdev *cxlmd, 4962306a36Sopenharmony_ci struct cxl_dport *parent_dport) 5062306a36Sopenharmony_ci{ 5162306a36Sopenharmony_ci struct cxl_port *parent_port = parent_dport->port; 5262306a36Sopenharmony_ci struct cxl_dev_state *cxlds = cxlmd->cxlds; 5362306a36Sopenharmony_ci struct cxl_port *endpoint, *iter, *down; 5462306a36Sopenharmony_ci int rc; 5562306a36Sopenharmony_ci 5662306a36Sopenharmony_ci /* 5762306a36Sopenharmony_ci * Now that the path to the root is established record all the 5862306a36Sopenharmony_ci * intervening ports in the chain. 5962306a36Sopenharmony_ci */ 6062306a36Sopenharmony_ci for (iter = parent_port, down = NULL; !is_cxl_root(iter); 6162306a36Sopenharmony_ci down = iter, iter = to_cxl_port(iter->dev.parent)) { 6262306a36Sopenharmony_ci struct cxl_ep *ep; 6362306a36Sopenharmony_ci 6462306a36Sopenharmony_ci ep = cxl_ep_load(iter, cxlmd); 6562306a36Sopenharmony_ci ep->next = down; 6662306a36Sopenharmony_ci } 6762306a36Sopenharmony_ci 6862306a36Sopenharmony_ci endpoint = devm_cxl_add_port(host, &cxlmd->dev, 6962306a36Sopenharmony_ci cxlds->component_reg_phys, 7062306a36Sopenharmony_ci parent_dport); 7162306a36Sopenharmony_ci if (IS_ERR(endpoint)) 7262306a36Sopenharmony_ci return PTR_ERR(endpoint); 7362306a36Sopenharmony_ci 7462306a36Sopenharmony_ci rc = cxl_endpoint_autoremove(cxlmd, endpoint); 7562306a36Sopenharmony_ci if (rc) 7662306a36Sopenharmony_ci return rc; 7762306a36Sopenharmony_ci 7862306a36Sopenharmony_ci if (!endpoint->dev.driver) { 7962306a36Sopenharmony_ci dev_err(&cxlmd->dev, "%s failed probe\n", 8062306a36Sopenharmony_ci dev_name(&endpoint->dev)); 8162306a36Sopenharmony_ci return -ENXIO; 8262306a36Sopenharmony_ci } 8362306a36Sopenharmony_ci 8462306a36Sopenharmony_ci return 0; 8562306a36Sopenharmony_ci} 8662306a36Sopenharmony_ci 8762306a36Sopenharmony_cistatic int cxl_debugfs_poison_inject(void *data, u64 dpa) 8862306a36Sopenharmony_ci{ 8962306a36Sopenharmony_ci struct cxl_memdev *cxlmd = data; 9062306a36Sopenharmony_ci 9162306a36Sopenharmony_ci return cxl_inject_poison(cxlmd, dpa); 9262306a36Sopenharmony_ci} 9362306a36Sopenharmony_ci 9462306a36Sopenharmony_ciDEFINE_DEBUGFS_ATTRIBUTE(cxl_poison_inject_fops, NULL, 9562306a36Sopenharmony_ci cxl_debugfs_poison_inject, "%llx\n"); 9662306a36Sopenharmony_ci 9762306a36Sopenharmony_cistatic int cxl_debugfs_poison_clear(void *data, u64 dpa) 9862306a36Sopenharmony_ci{ 9962306a36Sopenharmony_ci struct cxl_memdev *cxlmd = data; 10062306a36Sopenharmony_ci 10162306a36Sopenharmony_ci return cxl_clear_poison(cxlmd, dpa); 10262306a36Sopenharmony_ci} 10362306a36Sopenharmony_ci 10462306a36Sopenharmony_ciDEFINE_DEBUGFS_ATTRIBUTE(cxl_poison_clear_fops, NULL, 10562306a36Sopenharmony_ci cxl_debugfs_poison_clear, "%llx\n"); 10662306a36Sopenharmony_ci 10762306a36Sopenharmony_cistatic int cxl_mem_probe(struct device *dev) 10862306a36Sopenharmony_ci{ 10962306a36Sopenharmony_ci struct cxl_memdev *cxlmd = to_cxl_memdev(dev); 11062306a36Sopenharmony_ci struct cxl_memdev_state *mds = to_cxl_memdev_state(cxlmd->cxlds); 11162306a36Sopenharmony_ci struct cxl_dev_state *cxlds = cxlmd->cxlds; 11262306a36Sopenharmony_ci struct device *endpoint_parent; 11362306a36Sopenharmony_ci struct cxl_port *parent_port; 11462306a36Sopenharmony_ci struct cxl_dport *dport; 11562306a36Sopenharmony_ci struct dentry *dentry; 11662306a36Sopenharmony_ci int rc; 11762306a36Sopenharmony_ci 11862306a36Sopenharmony_ci if (!cxlds->media_ready) 11962306a36Sopenharmony_ci return -EBUSY; 12062306a36Sopenharmony_ci 12162306a36Sopenharmony_ci /* 12262306a36Sopenharmony_ci * Someone is trying to reattach this device after it lost its port 12362306a36Sopenharmony_ci * connection (an endpoint port previously registered by this memdev was 12462306a36Sopenharmony_ci * disabled). This racy check is ok because if the port is still gone, 12562306a36Sopenharmony_ci * no harm done, and if the port hierarchy comes back it will re-trigger 12662306a36Sopenharmony_ci * this probe. Port rescan and memdev detach work share the same 12762306a36Sopenharmony_ci * single-threaded workqueue. 12862306a36Sopenharmony_ci */ 12962306a36Sopenharmony_ci if (work_pending(&cxlmd->detach_work)) 13062306a36Sopenharmony_ci return -EBUSY; 13162306a36Sopenharmony_ci 13262306a36Sopenharmony_ci dentry = cxl_debugfs_create_dir(dev_name(dev)); 13362306a36Sopenharmony_ci debugfs_create_devm_seqfile(dev, "dpamem", dentry, cxl_mem_dpa_show); 13462306a36Sopenharmony_ci 13562306a36Sopenharmony_ci if (test_bit(CXL_POISON_ENABLED_INJECT, mds->poison.enabled_cmds)) 13662306a36Sopenharmony_ci debugfs_create_file("inject_poison", 0200, dentry, cxlmd, 13762306a36Sopenharmony_ci &cxl_poison_inject_fops); 13862306a36Sopenharmony_ci if (test_bit(CXL_POISON_ENABLED_CLEAR, mds->poison.enabled_cmds)) 13962306a36Sopenharmony_ci debugfs_create_file("clear_poison", 0200, dentry, cxlmd, 14062306a36Sopenharmony_ci &cxl_poison_clear_fops); 14162306a36Sopenharmony_ci 14262306a36Sopenharmony_ci rc = devm_add_action_or_reset(dev, remove_debugfs, dentry); 14362306a36Sopenharmony_ci if (rc) 14462306a36Sopenharmony_ci return rc; 14562306a36Sopenharmony_ci 14662306a36Sopenharmony_ci rc = devm_cxl_enumerate_ports(cxlmd); 14762306a36Sopenharmony_ci if (rc) 14862306a36Sopenharmony_ci return rc; 14962306a36Sopenharmony_ci 15062306a36Sopenharmony_ci parent_port = cxl_mem_find_port(cxlmd, &dport); 15162306a36Sopenharmony_ci if (!parent_port) { 15262306a36Sopenharmony_ci dev_err(dev, "CXL port topology not found\n"); 15362306a36Sopenharmony_ci return -ENXIO; 15462306a36Sopenharmony_ci } 15562306a36Sopenharmony_ci 15662306a36Sopenharmony_ci if (dport->rch) 15762306a36Sopenharmony_ci endpoint_parent = parent_port->uport_dev; 15862306a36Sopenharmony_ci else 15962306a36Sopenharmony_ci endpoint_parent = &parent_port->dev; 16062306a36Sopenharmony_ci 16162306a36Sopenharmony_ci device_lock(endpoint_parent); 16262306a36Sopenharmony_ci if (!endpoint_parent->driver) { 16362306a36Sopenharmony_ci dev_err(dev, "CXL port topology %s not enabled\n", 16462306a36Sopenharmony_ci dev_name(endpoint_parent)); 16562306a36Sopenharmony_ci rc = -ENXIO; 16662306a36Sopenharmony_ci goto unlock; 16762306a36Sopenharmony_ci } 16862306a36Sopenharmony_ci 16962306a36Sopenharmony_ci rc = devm_cxl_add_endpoint(endpoint_parent, cxlmd, dport); 17062306a36Sopenharmony_ciunlock: 17162306a36Sopenharmony_ci device_unlock(endpoint_parent); 17262306a36Sopenharmony_ci put_device(&parent_port->dev); 17362306a36Sopenharmony_ci if (rc) 17462306a36Sopenharmony_ci return rc; 17562306a36Sopenharmony_ci 17662306a36Sopenharmony_ci if (resource_size(&cxlds->pmem_res) && IS_ENABLED(CONFIG_CXL_PMEM)) { 17762306a36Sopenharmony_ci rc = devm_cxl_add_nvdimm(cxlmd); 17862306a36Sopenharmony_ci if (rc == -ENODEV) 17962306a36Sopenharmony_ci dev_info(dev, "PMEM disabled by platform\n"); 18062306a36Sopenharmony_ci else 18162306a36Sopenharmony_ci return rc; 18262306a36Sopenharmony_ci } 18362306a36Sopenharmony_ci 18462306a36Sopenharmony_ci /* 18562306a36Sopenharmony_ci * The kernel may be operating out of CXL memory on this device, 18662306a36Sopenharmony_ci * there is no spec defined way to determine whether this device 18762306a36Sopenharmony_ci * preserves contents over suspend, and there is no simple way 18862306a36Sopenharmony_ci * to arrange for the suspend image to avoid CXL memory which 18962306a36Sopenharmony_ci * would setup a circular dependency between PCI resume and save 19062306a36Sopenharmony_ci * state restoration. 19162306a36Sopenharmony_ci * 19262306a36Sopenharmony_ci * TODO: support suspend when all the regions this device is 19362306a36Sopenharmony_ci * hosting are locked and covered by the system address map, 19462306a36Sopenharmony_ci * i.e. platform firmware owns restoring the HDM configuration 19562306a36Sopenharmony_ci * that it locked. 19662306a36Sopenharmony_ci */ 19762306a36Sopenharmony_ci cxl_mem_active_inc(); 19862306a36Sopenharmony_ci return devm_add_action_or_reset(dev, enable_suspend, NULL); 19962306a36Sopenharmony_ci} 20062306a36Sopenharmony_ci 20162306a36Sopenharmony_cistatic ssize_t trigger_poison_list_store(struct device *dev, 20262306a36Sopenharmony_ci struct device_attribute *attr, 20362306a36Sopenharmony_ci const char *buf, size_t len) 20462306a36Sopenharmony_ci{ 20562306a36Sopenharmony_ci bool trigger; 20662306a36Sopenharmony_ci int rc; 20762306a36Sopenharmony_ci 20862306a36Sopenharmony_ci if (kstrtobool(buf, &trigger) || !trigger) 20962306a36Sopenharmony_ci return -EINVAL; 21062306a36Sopenharmony_ci 21162306a36Sopenharmony_ci rc = cxl_trigger_poison_list(to_cxl_memdev(dev)); 21262306a36Sopenharmony_ci 21362306a36Sopenharmony_ci return rc ? rc : len; 21462306a36Sopenharmony_ci} 21562306a36Sopenharmony_cistatic DEVICE_ATTR_WO(trigger_poison_list); 21662306a36Sopenharmony_ci 21762306a36Sopenharmony_cistatic umode_t cxl_mem_visible(struct kobject *kobj, struct attribute *a, int n) 21862306a36Sopenharmony_ci{ 21962306a36Sopenharmony_ci if (a == &dev_attr_trigger_poison_list.attr) { 22062306a36Sopenharmony_ci struct device *dev = kobj_to_dev(kobj); 22162306a36Sopenharmony_ci struct cxl_memdev *cxlmd = to_cxl_memdev(dev); 22262306a36Sopenharmony_ci struct cxl_memdev_state *mds = 22362306a36Sopenharmony_ci to_cxl_memdev_state(cxlmd->cxlds); 22462306a36Sopenharmony_ci 22562306a36Sopenharmony_ci if (!test_bit(CXL_POISON_ENABLED_LIST, 22662306a36Sopenharmony_ci mds->poison.enabled_cmds)) 22762306a36Sopenharmony_ci return 0; 22862306a36Sopenharmony_ci } 22962306a36Sopenharmony_ci return a->mode; 23062306a36Sopenharmony_ci} 23162306a36Sopenharmony_ci 23262306a36Sopenharmony_cistatic struct attribute *cxl_mem_attrs[] = { 23362306a36Sopenharmony_ci &dev_attr_trigger_poison_list.attr, 23462306a36Sopenharmony_ci NULL 23562306a36Sopenharmony_ci}; 23662306a36Sopenharmony_ci 23762306a36Sopenharmony_cistatic struct attribute_group cxl_mem_group = { 23862306a36Sopenharmony_ci .attrs = cxl_mem_attrs, 23962306a36Sopenharmony_ci .is_visible = cxl_mem_visible, 24062306a36Sopenharmony_ci}; 24162306a36Sopenharmony_ci 24262306a36Sopenharmony_ci__ATTRIBUTE_GROUPS(cxl_mem); 24362306a36Sopenharmony_ci 24462306a36Sopenharmony_cistatic struct cxl_driver cxl_mem_driver = { 24562306a36Sopenharmony_ci .name = "cxl_mem", 24662306a36Sopenharmony_ci .probe = cxl_mem_probe, 24762306a36Sopenharmony_ci .id = CXL_DEVICE_MEMORY_EXPANDER, 24862306a36Sopenharmony_ci .drv = { 24962306a36Sopenharmony_ci .dev_groups = cxl_mem_groups, 25062306a36Sopenharmony_ci }, 25162306a36Sopenharmony_ci}; 25262306a36Sopenharmony_ci 25362306a36Sopenharmony_cimodule_cxl_driver(cxl_mem_driver); 25462306a36Sopenharmony_ci 25562306a36Sopenharmony_ciMODULE_LICENSE("GPL v2"); 25662306a36Sopenharmony_ciMODULE_IMPORT_NS(CXL); 25762306a36Sopenharmony_ciMODULE_ALIAS_CXL(CXL_DEVICE_MEMORY_EXPANDER); 25862306a36Sopenharmony_ci/* 25962306a36Sopenharmony_ci * create_endpoint() wants to validate port driver attach immediately after 26062306a36Sopenharmony_ci * endpoint registration. 26162306a36Sopenharmony_ci */ 26262306a36Sopenharmony_ciMODULE_SOFTDEP("pre: cxl_port"); 263