xref: /linux/arch/powerpc/kernel/eeh.c (revision 5f5c9952b33cb4e8d25c70ef29f7a45cd26b6a9b)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  * Copyright IBM Corporation 2001, 2005, 2006
4  * Copyright Dave Engebretsen & Todd Inglett 2001
5  * Copyright Linas Vepstas 2005, 2006
6  * Copyright 2001-2012 IBM Corporation.
7  *
8  * Please address comments and feedback to Linas Vepstas <linas@austin.ibm.com>
9  */
10 
11 #include <linux/delay.h>
12 #include <linux/sched.h>
13 #include <linux/init.h>
14 #include <linux/list.h>
15 #include <linux/pci.h>
16 #include <linux/iommu.h>
17 #include <linux/proc_fs.h>
18 #include <linux/rbtree.h>
19 #include <linux/reboot.h>
20 #include <linux/seq_file.h>
21 #include <linux/spinlock.h>
22 #include <linux/export.h>
23 #include <linux/of.h>
24 #include <linux/debugfs.h>
25 
26 #include <linux/atomic.h>
27 #include <asm/eeh.h>
28 #include <asm/eeh_event.h>
29 #include <asm/io.h>
30 #include <asm/iommu.h>
31 #include <asm/machdep.h>
32 #include <asm/ppc-pci.h>
33 #include <asm/rtas.h>
34 #include <asm/pte-walk.h>
35 
36 
37 /** Overview:
38  *  EEH, or "Enhanced Error Handling" is a PCI bridge technology for
39  *  dealing with PCI bus errors that can't be dealt with within the
40  *  usual PCI framework, except by check-stopping the CPU.  Systems
41  *  that are designed for high-availability/reliability cannot afford
42  *  to crash due to a "mere" PCI error, thus the need for EEH.
43  *  An EEH-capable bridge operates by converting a detected error
44  *  into a "slot freeze", taking the PCI adapter off-line, making
45  *  the slot behave, from the OS'es point of view, as if the slot
46  *  were "empty": all reads return 0xff's and all writes are silently
47  *  ignored.  EEH slot isolation events can be triggered by parity
48  *  errors on the address or data busses (e.g. during posted writes),
49  *  which in turn might be caused by low voltage on the bus, dust,
50  *  vibration, humidity, radioactivity or plain-old failed hardware.
51  *
52  *  Note, however, that one of the leading causes of EEH slot
53  *  freeze events are buggy device drivers, buggy device microcode,
54  *  or buggy device hardware.  This is because any attempt by the
55  *  device to bus-master data to a memory address that is not
56  *  assigned to the device will trigger a slot freeze.   (The idea
57  *  is to prevent devices-gone-wild from corrupting system memory).
58  *  Buggy hardware/drivers will have a miserable time co-existing
59  *  with EEH.
60  *
61  *  Ideally, a PCI device driver, when suspecting that an isolation
62  *  event has occurred (e.g. by reading 0xff's), will then ask EEH
63  *  whether this is the case, and then take appropriate steps to
64  *  reset the PCI slot, the PCI device, and then resume operations.
65  *  However, until that day,  the checking is done here, with the
66  *  eeh_check_failure() routine embedded in the MMIO macros.  If
67  *  the slot is found to be isolated, an "EEH Event" is synthesized
68  *  and sent out for processing.
69  */
70 
71 /* If a device driver keeps reading an MMIO register in an interrupt
72  * handler after a slot isolation event, it might be broken.
73  * This sets the threshold for how many read attempts we allow
74  * before printing an error message.
75  */
76 #define EEH_MAX_FAILS	2100000
77 
78 /* Time to wait for a PCI slot to report status, in milliseconds */
79 #define PCI_BUS_RESET_WAIT_MSEC (5*60*1000)
80 
81 /*
82  * EEH probe mode support, which is part of the flags,
83  * is to support multiple platforms for EEH. Some platforms
84  * like pSeries do PCI emunation based on device tree.
85  * However, other platforms like powernv probe PCI devices
86  * from hardware. The flag is used to distinguish that.
87  * In addition, struct eeh_ops::probe would be invoked for
88  * particular OF node or PCI device so that the corresponding
89  * PE would be created there.
90  */
91 int eeh_subsystem_flags;
92 EXPORT_SYMBOL(eeh_subsystem_flags);
93 
94 /*
95  * EEH allowed maximal frozen times. If one particular PE's
96  * frozen count in last hour exceeds this limit, the PE will
97  * be forced to be offline permanently.
98  */
99 u32 eeh_max_freezes = 5;
100 
101 /*
102  * Controls whether a recovery event should be scheduled when an
103  * isolated device is discovered. This is only really useful for
104  * debugging problems with the EEH core.
105  */
106 bool eeh_debugfs_no_recover;
107 
108 /* Platform dependent EEH operations */
109 struct eeh_ops *eeh_ops = NULL;
110 
111 /* Lock to avoid races due to multiple reports of an error */
112 DEFINE_RAW_SPINLOCK(confirm_error_lock);
113 EXPORT_SYMBOL_GPL(confirm_error_lock);
114 
115 /* Lock to protect passed flags */
116 static DEFINE_MUTEX(eeh_dev_mutex);
117 
118 /* Buffer for reporting pci register dumps. Its here in BSS, and
119  * not dynamically alloced, so that it ends up in RMO where RTAS
120  * can access it.
121  */
122 #define EEH_PCI_REGS_LOG_LEN 8192
123 static unsigned char pci_regs_buf[EEH_PCI_REGS_LOG_LEN];
124 
125 /*
126  * The struct is used to maintain the EEH global statistic
127  * information. Besides, the EEH global statistics will be
128  * exported to user space through procfs
129  */
130 struct eeh_stats {
131 	u64 no_device;		/* PCI device not found		*/
132 	u64 no_dn;		/* OF node not found		*/
133 	u64 no_cfg_addr;	/* Config address not found	*/
134 	u64 ignored_check;	/* EEH check skipped		*/
135 	u64 total_mmio_ffs;	/* Total EEH checks		*/
136 	u64 false_positives;	/* Unnecessary EEH checks	*/
137 	u64 slot_resets;	/* PE reset			*/
138 };
139 
140 static struct eeh_stats eeh_stats;
141 
eeh_setup(char * str)142 static int __init eeh_setup(char *str)
143 {
144 	if (!strcmp(str, "off"))
145 		eeh_add_flag(EEH_FORCE_DISABLED);
146 	else if (!strcmp(str, "early_log"))
147 		eeh_add_flag(EEH_EARLY_DUMP_LOG);
148 
149 	return 1;
150 }
151 __setup("eeh=", eeh_setup);
152 
eeh_show_enabled(void)153 void eeh_show_enabled(void)
154 {
155 	if (eeh_has_flag(EEH_FORCE_DISABLED))
156 		pr_info("EEH: Recovery disabled by kernel parameter.\n");
157 	else if (eeh_has_flag(EEH_ENABLED))
158 		pr_info("EEH: Capable adapter found: recovery enabled.\n");
159 	else
160 		pr_info("EEH: No capable adapters found: recovery disabled.\n");
161 }
162 
163 /*
164  * This routine captures assorted PCI configuration space data
165  * for the indicated PCI device, and puts them into a buffer
166  * for RTAS error logging.
167  */
eeh_dump_dev_log(struct eeh_dev * edev,char * buf,size_t len)168 static size_t eeh_dump_dev_log(struct eeh_dev *edev, char *buf, size_t len)
169 {
170 	u32 cfg;
171 	int cap, i;
172 	int n = 0, l = 0;
173 	char buffer[128];
174 
175 	n += scnprintf(buf+n, len-n, "%04x:%02x:%02x.%01x\n",
176 			edev->pe->phb->global_number, edev->bdfn >> 8,
177 			PCI_SLOT(edev->bdfn), PCI_FUNC(edev->bdfn));
178 	pr_warn("EEH: of node=%04x:%02x:%02x.%01x\n",
179 		edev->pe->phb->global_number, edev->bdfn >> 8,
180 		PCI_SLOT(edev->bdfn), PCI_FUNC(edev->bdfn));
181 
182 	eeh_ops->read_config(edev, PCI_VENDOR_ID, 4, &cfg);
183 	n += scnprintf(buf+n, len-n, "dev/vend:%08x\n", cfg);
184 	pr_warn("EEH: PCI device/vendor: %08x\n", cfg);
185 
186 	eeh_ops->read_config(edev, PCI_COMMAND, 4, &cfg);
187 	n += scnprintf(buf+n, len-n, "cmd/stat:%x\n", cfg);
188 	pr_warn("EEH: PCI cmd/status register: %08x\n", cfg);
189 
190 	/* Gather bridge-specific registers */
191 	if (edev->mode & EEH_DEV_BRIDGE) {
192 		eeh_ops->read_config(edev, PCI_SEC_STATUS, 2, &cfg);
193 		n += scnprintf(buf+n, len-n, "sec stat:%x\n", cfg);
194 		pr_warn("EEH: Bridge secondary status: %04x\n", cfg);
195 
196 		eeh_ops->read_config(edev, PCI_BRIDGE_CONTROL, 2, &cfg);
197 		n += scnprintf(buf+n, len-n, "brdg ctl:%x\n", cfg);
198 		pr_warn("EEH: Bridge control: %04x\n", cfg);
199 	}
200 
201 	/* Dump out the PCI-X command and status regs */
202 	cap = edev->pcix_cap;
203 	if (cap) {
204 		eeh_ops->read_config(edev, cap, 4, &cfg);
205 		n += scnprintf(buf+n, len-n, "pcix-cmd:%x\n", cfg);
206 		pr_warn("EEH: PCI-X cmd: %08x\n", cfg);
207 
208 		eeh_ops->read_config(edev, cap+4, 4, &cfg);
209 		n += scnprintf(buf+n, len-n, "pcix-stat:%x\n", cfg);
210 		pr_warn("EEH: PCI-X status: %08x\n", cfg);
211 	}
212 
213 	/* If PCI-E capable, dump PCI-E cap 10 */
214 	cap = edev->pcie_cap;
215 	if (cap) {
216 		n += scnprintf(buf+n, len-n, "pci-e cap10:\n");
217 		pr_warn("EEH: PCI-E capabilities and status follow:\n");
218 
219 		for (i=0; i<=8; i++) {
220 			eeh_ops->read_config(edev, cap+4*i, 4, &cfg);
221 			n += scnprintf(buf+n, len-n, "%02x:%x\n", 4*i, cfg);
222 
223 			if ((i % 4) == 0) {
224 				if (i != 0)
225 					pr_warn("%s\n", buffer);
226 
227 				l = scnprintf(buffer, sizeof(buffer),
228 					      "EEH: PCI-E %02x: %08x ",
229 					      4*i, cfg);
230 			} else {
231 				l += scnprintf(buffer+l, sizeof(buffer)-l,
232 					       "%08x ", cfg);
233 			}
234 
235 		}
236 
237 		pr_warn("%s\n", buffer);
238 	}
239 
240 	/* If AER capable, dump it */
241 	cap = edev->aer_cap;
242 	if (cap) {
243 		n += scnprintf(buf+n, len-n, "pci-e AER:\n");
244 		pr_warn("EEH: PCI-E AER capability register set follows:\n");
245 
246 		for (i=0; i<=13; i++) {
247 			eeh_ops->read_config(edev, cap+4*i, 4, &cfg);
248 			n += scnprintf(buf+n, len-n, "%02x:%x\n", 4*i, cfg);
249 
250 			if ((i % 4) == 0) {
251 				if (i != 0)
252 					pr_warn("%s\n", buffer);
253 
254 				l = scnprintf(buffer, sizeof(buffer),
255 					      "EEH: PCI-E AER %02x: %08x ",
256 					      4*i, cfg);
257 			} else {
258 				l += scnprintf(buffer+l, sizeof(buffer)-l,
259 					       "%08x ", cfg);
260 			}
261 		}
262 
263 		pr_warn("%s\n", buffer);
264 	}
265 
266 	return n;
267 }
268 
eeh_dump_pe_log(struct eeh_pe * pe,void * flag)269 static void *eeh_dump_pe_log(struct eeh_pe *pe, void *flag)
270 {
271 	struct eeh_dev *edev, *tmp;
272 	size_t *plen = flag;
273 
274 	eeh_pe_for_each_dev(pe, edev, tmp)
275 		*plen += eeh_dump_dev_log(edev, pci_regs_buf + *plen,
276 					  EEH_PCI_REGS_LOG_LEN - *plen);
277 
278 	return NULL;
279 }
280 
281 /**
282  * eeh_slot_error_detail - Generate combined log including driver log and error log
283  * @pe: EEH PE
284  * @severity: temporary or permanent error log
285  *
286  * This routine should be called to generate the combined log, which
287  * is comprised of driver log and error log. The driver log is figured
288  * out from the config space of the corresponding PCI device, while
289  * the error log is fetched through platform dependent function call.
290  */
eeh_slot_error_detail(struct eeh_pe * pe,int severity)291 void eeh_slot_error_detail(struct eeh_pe *pe, int severity)
292 {
293 	size_t loglen = 0;
294 
295 	/*
296 	 * When the PHB is fenced or dead, it's pointless to collect
297 	 * the data from PCI config space because it should return
298 	 * 0xFF's. For ER, we still retrieve the data from the PCI
299 	 * config space.
300 	 *
301 	 * For pHyp, we have to enable IO for log retrieval. Otherwise,
302 	 * 0xFF's is always returned from PCI config space.
303 	 *
304 	 * When the @severity is EEH_LOG_PERM, the PE is going to be
305 	 * removed. Prior to that, the drivers for devices included in
306 	 * the PE will be closed. The drivers rely on working IO path
307 	 * to bring the devices to quiet state. Otherwise, PCI traffic
308 	 * from those devices after they are removed is like to cause
309 	 * another unexpected EEH error.
310 	 */
311 	if (!(pe->type & EEH_PE_PHB)) {
312 		if (eeh_has_flag(EEH_ENABLE_IO_FOR_LOG) ||
313 		    severity == EEH_LOG_PERM)
314 			eeh_pci_enable(pe, EEH_OPT_THAW_MMIO);
315 
316 		/*
317 		 * The config space of some PCI devices can't be accessed
318 		 * when their PEs are in frozen state. Otherwise, fenced
319 		 * PHB might be seen. Those PEs are identified with flag
320 		 * EEH_PE_CFG_RESTRICTED, indicating EEH_PE_CFG_BLOCKED
321 		 * is set automatically when the PE is put to EEH_PE_ISOLATED.
322 		 *
323 		 * Restoring BARs possibly triggers PCI config access in
324 		 * (OPAL) firmware and then causes fenced PHB. If the
325 		 * PCI config is blocked with flag EEH_PE_CFG_BLOCKED, it's
326 		 * pointless to restore BARs and dump config space.
327 		 */
328 		eeh_ops->configure_bridge(pe);
329 		if (!(pe->state & EEH_PE_CFG_BLOCKED)) {
330 			eeh_pe_restore_bars(pe);
331 
332 			pci_regs_buf[0] = 0;
333 			eeh_pe_traverse(pe, eeh_dump_pe_log, &loglen);
334 		}
335 	}
336 
337 	eeh_ops->get_log(pe, severity, pci_regs_buf, loglen);
338 }
339 
340 /**
341  * eeh_token_to_phys - Convert EEH address token to phys address
342  * @token: I/O token, should be address in the form 0xA....
343  *
344  * This routine should be called to convert virtual I/O address
345  * to physical one.
346  */
eeh_token_to_phys(unsigned long token)347 static inline unsigned long eeh_token_to_phys(unsigned long token)
348 {
349 	return ppc_find_vmap_phys(token);
350 }
351 
352 /*
353  * On PowerNV platform, we might already have fenced PHB there.
354  * For that case, it's meaningless to recover frozen PE. Intead,
355  * We have to handle fenced PHB firstly.
356  */
eeh_phb_check_failure(struct eeh_pe * pe)357 static int eeh_phb_check_failure(struct eeh_pe *pe)
358 {
359 	struct eeh_pe *phb_pe;
360 	unsigned long flags;
361 	int ret;
362 
363 	if (!eeh_has_flag(EEH_PROBE_MODE_DEV))
364 		return -EPERM;
365 
366 	/* Find the PHB PE */
367 	phb_pe = eeh_phb_pe_get(pe->phb);
368 	if (!phb_pe) {
369 		pr_warn("%s Can't find PE for PHB#%x\n",
370 			__func__, pe->phb->global_number);
371 		return -EEXIST;
372 	}
373 
374 	/* If the PHB has been in problematic state */
375 	eeh_serialize_lock(&flags);
376 	if (phb_pe->state & EEH_PE_ISOLATED) {
377 		ret = 0;
378 		goto out;
379 	}
380 
381 	/* Check PHB state */
382 	ret = eeh_ops->get_state(phb_pe, NULL);
383 	if ((ret < 0) ||
384 	    (ret == EEH_STATE_NOT_SUPPORT) || eeh_state_active(ret)) {
385 		ret = 0;
386 		goto out;
387 	}
388 
389 	/* Isolate the PHB and send event */
390 	eeh_pe_mark_isolated(phb_pe);
391 	eeh_serialize_unlock(flags);
392 
393 	pr_debug("EEH: PHB#%x failure detected, location: %s\n",
394 		phb_pe->phb->global_number, eeh_pe_loc_get(phb_pe));
395 	eeh_send_failure_event(phb_pe);
396 	return 1;
397 out:
398 	eeh_serialize_unlock(flags);
399 	return ret;
400 }
401 
eeh_driver_name(struct pci_dev * pdev)402 static inline const char *eeh_driver_name(struct pci_dev *pdev)
403 {
404 	if (pdev)
405 		return dev_driver_string(&pdev->dev);
406 
407 	return "<null>";
408 }
409 
410 /**
411  * eeh_dev_check_failure - Check if all 1's data is due to EEH slot freeze
412  * @edev: eeh device
413  *
414  * Check for an EEH failure for the given device node.  Call this
415  * routine if the result of a read was all 0xff's and you want to
416  * find out if this is due to an EEH slot freeze.  This routine
417  * will query firmware for the EEH status.
418  *
419  * Returns 0 if there has not been an EEH error; otherwise returns
420  * a non-zero value and queues up a slot isolation event notification.
421  *
422  * It is safe to call this routine in an interrupt context.
423  */
eeh_dev_check_failure(struct eeh_dev * edev)424 int eeh_dev_check_failure(struct eeh_dev *edev)
425 {
426 	int ret;
427 	unsigned long flags;
428 	struct device_node *dn;
429 	struct pci_dev *dev;
430 	struct eeh_pe *pe, *parent_pe;
431 	int rc = 0;
432 	const char *location = NULL;
433 
434 	eeh_stats.total_mmio_ffs++;
435 
436 	if (!eeh_enabled())
437 		return 0;
438 
439 	if (!edev) {
440 		eeh_stats.no_dn++;
441 		return 0;
442 	}
443 	dev = eeh_dev_to_pci_dev(edev);
444 	pe = eeh_dev_to_pe(edev);
445 
446 	/* Access to IO BARs might get this far and still not want checking. */
447 	if (!pe) {
448 		eeh_stats.ignored_check++;
449 		eeh_edev_dbg(edev, "Ignored check\n");
450 		return 0;
451 	}
452 
453 	/*
454 	 * On PowerNV platform, we might already have fenced PHB
455 	 * there and we need take care of that firstly.
456 	 */
457 	ret = eeh_phb_check_failure(pe);
458 	if (ret > 0)
459 		return ret;
460 
461 	/*
462 	 * If the PE isn't owned by us, we shouldn't check the
463 	 * state. Instead, let the owner handle it if the PE has
464 	 * been frozen.
465 	 */
466 	if (eeh_pe_passed(pe))
467 		return 0;
468 
469 	/* If we already have a pending isolation event for this
470 	 * slot, we know it's bad already, we don't need to check.
471 	 * Do this checking under a lock; as multiple PCI devices
472 	 * in one slot might report errors simultaneously, and we
473 	 * only want one error recovery routine running.
474 	 */
475 	eeh_serialize_lock(&flags);
476 	rc = 1;
477 	if (pe->state & EEH_PE_ISOLATED) {
478 		pe->check_count++;
479 		if (pe->check_count == EEH_MAX_FAILS) {
480 			dn = pci_device_to_OF_node(dev);
481 			if (dn)
482 				location = of_get_property(dn, "ibm,loc-code",
483 						NULL);
484 			eeh_edev_err(edev, "%d reads ignored for recovering device at location=%s driver=%s\n",
485 				pe->check_count,
486 				location ? location : "unknown",
487 				eeh_driver_name(dev));
488 			eeh_edev_err(edev, "Might be infinite loop in %s driver\n",
489 				eeh_driver_name(dev));
490 			dump_stack();
491 		}
492 		goto dn_unlock;
493 	}
494 
495 	/*
496 	 * Now test for an EEH failure.  This is VERY expensive.
497 	 * Note that the eeh_config_addr may be a parent device
498 	 * in the case of a device behind a bridge, or it may be
499 	 * function zero of a multi-function device.
500 	 * In any case they must share a common PHB.
501 	 */
502 	ret = eeh_ops->get_state(pe, NULL);
503 
504 	/* Note that config-io to empty slots may fail;
505 	 * they are empty when they don't have children.
506 	 * We will punt with the following conditions: Failure to get
507 	 * PE's state, EEH not support and Permanently unavailable
508 	 * state, PE is in good state.
509 	 *
510 	 * On the pSeries, after reaching the threshold, get_state might
511 	 * return EEH_STATE_NOT_SUPPORT. However, it's possible that the
512 	 * device state remains uncleared if the device is not marked
513 	 * pci_channel_io_perm_failure. Therefore, consider logging the
514 	 * event to let device removal happen.
515 	 *
516 	 */
517 	if ((ret < 0) ||
518 	    (ret == EEH_STATE_NOT_SUPPORT &&
519 	     dev->error_state == pci_channel_io_perm_failure) ||
520 	    eeh_state_active(ret)) {
521 		eeh_stats.false_positives++;
522 		pe->false_positives++;
523 		rc = 0;
524 		goto dn_unlock;
525 	}
526 
527 	/*
528 	 * It should be corner case that the parent PE has been
529 	 * put into frozen state as well. We should take care
530 	 * that at first.
531 	 */
532 	parent_pe = pe->parent;
533 	while (parent_pe) {
534 		/* Hit the ceiling ? */
535 		if (parent_pe->type & EEH_PE_PHB)
536 			break;
537 
538 		/* Frozen parent PE ? */
539 		ret = eeh_ops->get_state(parent_pe, NULL);
540 		if (ret > 0 && !eeh_state_active(ret)) {
541 			pe = parent_pe;
542 			pr_err("EEH: Failure of PHB#%x-PE#%x will be handled at parent PHB#%x-PE#%x.\n",
543 			       pe->phb->global_number, pe->addr,
544 			       pe->phb->global_number, parent_pe->addr);
545 		}
546 
547 		/* Next parent level */
548 		parent_pe = parent_pe->parent;
549 	}
550 
551 	eeh_stats.slot_resets++;
552 
553 	/* Avoid repeated reports of this failure, including problems
554 	 * with other functions on this device, and functions under
555 	 * bridges.
556 	 */
557 	eeh_pe_mark_isolated(pe);
558 	eeh_serialize_unlock(flags);
559 
560 	/* Most EEH events are due to device driver bugs.  Having
561 	 * a stack trace will help the device-driver authors figure
562 	 * out what happened.  So print that out.
563 	 */
564 	pr_debug("EEH: %s: Frozen PHB#%x-PE#%x detected\n",
565 		__func__, pe->phb->global_number, pe->addr);
566 	eeh_send_failure_event(pe);
567 
568 	return 1;
569 
570 dn_unlock:
571 	eeh_serialize_unlock(flags);
572 	return rc;
573 }
574 
575 EXPORT_SYMBOL_GPL(eeh_dev_check_failure);
576 
577 /**
578  * eeh_check_failure - Check if all 1's data is due to EEH slot freeze
579  * @token: I/O address
580  *
581  * Check for an EEH failure at the given I/O address. Call this
582  * routine if the result of a read was all 0xff's and you want to
583  * find out if this is due to an EEH slot freeze event. This routine
584  * will query firmware for the EEH status.
585  *
586  * Note this routine is safe to call in an interrupt context.
587  */
eeh_check_failure(const volatile void __iomem * token)588 int eeh_check_failure(const volatile void __iomem *token)
589 {
590 	unsigned long addr;
591 	struct eeh_dev *edev;
592 
593 	/* Finding the phys addr + pci device; this is pretty quick. */
594 	addr = eeh_token_to_phys((unsigned long __force) token);
595 	edev = eeh_addr_cache_get_dev(addr);
596 	if (!edev) {
597 		eeh_stats.no_device++;
598 		return 0;
599 	}
600 
601 	return eeh_dev_check_failure(edev);
602 }
603 EXPORT_SYMBOL(eeh_check_failure);
604 
605 
606 /**
607  * eeh_pci_enable - Enable MMIO or DMA transfers for this slot
608  * @pe: EEH PE
609  * @function: EEH option
610  *
611  * This routine should be called to reenable frozen MMIO or DMA
612  * so that it would work correctly again. It's useful while doing
613  * recovery or log collection on the indicated device.
614  */
eeh_pci_enable(struct eeh_pe * pe,int function)615 int eeh_pci_enable(struct eeh_pe *pe, int function)
616 {
617 	int active_flag, rc;
618 
619 	/*
620 	 * pHyp doesn't allow to enable IO or DMA on unfrozen PE.
621 	 * Also, it's pointless to enable them on unfrozen PE. So
622 	 * we have to check before enabling IO or DMA.
623 	 */
624 	switch (function) {
625 	case EEH_OPT_THAW_MMIO:
626 		active_flag = EEH_STATE_MMIO_ACTIVE | EEH_STATE_MMIO_ENABLED;
627 		break;
628 	case EEH_OPT_THAW_DMA:
629 		active_flag = EEH_STATE_DMA_ACTIVE;
630 		break;
631 	case EEH_OPT_DISABLE:
632 	case EEH_OPT_ENABLE:
633 	case EEH_OPT_FREEZE_PE:
634 		active_flag = 0;
635 		break;
636 	default:
637 		pr_warn("%s: Invalid function %d\n",
638 			__func__, function);
639 		return -EINVAL;
640 	}
641 
642 	/*
643 	 * Check if IO or DMA has been enabled before
644 	 * enabling them.
645 	 */
646 	if (active_flag) {
647 		rc = eeh_ops->get_state(pe, NULL);
648 		if (rc < 0)
649 			return rc;
650 
651 		/* Needn't enable it at all */
652 		if (rc == EEH_STATE_NOT_SUPPORT)
653 			return 0;
654 
655 		/* It's already enabled */
656 		if (rc & active_flag)
657 			return 0;
658 	}
659 
660 
661 	/* Issue the request */
662 	rc = eeh_ops->set_option(pe, function);
663 	if (rc)
664 		pr_warn("%s: Unexpected state change %d on "
665 			"PHB#%x-PE#%x, err=%d\n",
666 			__func__, function, pe->phb->global_number,
667 			pe->addr, rc);
668 
669 	/* Check if the request is finished successfully */
670 	if (active_flag) {
671 		rc = eeh_wait_state(pe, PCI_BUS_RESET_WAIT_MSEC);
672 		if (rc < 0)
673 			return rc;
674 
675 		if (rc & active_flag)
676 			return 0;
677 
678 		return -EIO;
679 	}
680 
681 	return rc;
682 }
683 
eeh_disable_and_save_dev_state(struct eeh_dev * edev,void * userdata)684 static void eeh_disable_and_save_dev_state(struct eeh_dev *edev,
685 					    void *userdata)
686 {
687 	struct pci_dev *pdev = eeh_dev_to_pci_dev(edev);
688 	struct pci_dev *dev = userdata;
689 
690 	/*
691 	 * The caller should have disabled and saved the
692 	 * state for the specified device
693 	 */
694 	if (!pdev || pdev == dev)
695 		return;
696 
697 	/* Ensure we have D0 power state */
698 	pci_set_power_state(pdev, PCI_D0);
699 
700 	/* Save device state */
701 	pci_save_state(pdev);
702 
703 	/*
704 	 * Disable device to avoid any DMA traffic and
705 	 * interrupt from the device
706 	 */
707 	pci_write_config_word(pdev, PCI_COMMAND, PCI_COMMAND_INTX_DISABLE);
708 }
709 
eeh_restore_dev_state(struct eeh_dev * edev,void * userdata)710 static void eeh_restore_dev_state(struct eeh_dev *edev, void *userdata)
711 {
712 	struct pci_dev *pdev = eeh_dev_to_pci_dev(edev);
713 	struct pci_dev *dev = userdata;
714 
715 	if (!pdev)
716 		return;
717 
718 	/* Apply customization from firmware */
719 	if (eeh_ops->restore_config)
720 		eeh_ops->restore_config(edev);
721 
722 	/* The caller should restore state for the specified device */
723 	if (pdev != dev)
724 		pci_restore_state(pdev);
725 }
726 
727 /**
728  * pcibios_set_pcie_reset_state - Set PCI-E reset state
729  * @dev: pci device struct
730  * @state: reset state to enter
731  *
732  * Return value:
733  * 	0 if success
734  */
pcibios_set_pcie_reset_state(struct pci_dev * dev,enum pcie_reset_state state)735 int pcibios_set_pcie_reset_state(struct pci_dev *dev, enum pcie_reset_state state)
736 {
737 	struct eeh_dev *edev = pci_dev_to_eeh_dev(dev);
738 	struct eeh_pe *pe = eeh_dev_to_pe(edev);
739 
740 	if (!pe) {
741 		pr_err("%s: No PE found on PCI device %s\n",
742 			__func__, pci_name(dev));
743 		return -EINVAL;
744 	}
745 
746 	switch (state) {
747 	case pcie_deassert_reset:
748 		eeh_ops->reset(pe, EEH_RESET_DEACTIVATE);
749 		eeh_unfreeze_pe(pe);
750 		if (!(pe->type & EEH_PE_VF))
751 			eeh_pe_state_clear(pe, EEH_PE_CFG_BLOCKED, true);
752 		eeh_pe_dev_traverse(pe, eeh_restore_dev_state, dev);
753 		eeh_pe_state_clear(pe, EEH_PE_ISOLATED, true);
754 		break;
755 	case pcie_hot_reset:
756 		eeh_pe_mark_isolated(pe);
757 		eeh_pe_state_clear(pe, EEH_PE_CFG_BLOCKED, true);
758 		eeh_ops->set_option(pe, EEH_OPT_FREEZE_PE);
759 		eeh_pe_dev_traverse(pe, eeh_disable_and_save_dev_state, dev);
760 		if (!(pe->type & EEH_PE_VF))
761 			eeh_pe_state_mark(pe, EEH_PE_CFG_BLOCKED);
762 		eeh_ops->reset(pe, EEH_RESET_HOT);
763 		break;
764 	case pcie_warm_reset:
765 		eeh_pe_mark_isolated(pe);
766 		eeh_pe_state_clear(pe, EEH_PE_CFG_BLOCKED, true);
767 		eeh_ops->set_option(pe, EEH_OPT_FREEZE_PE);
768 		eeh_pe_dev_traverse(pe, eeh_disable_and_save_dev_state, dev);
769 		if (!(pe->type & EEH_PE_VF))
770 			eeh_pe_state_mark(pe, EEH_PE_CFG_BLOCKED);
771 		eeh_ops->reset(pe, EEH_RESET_FUNDAMENTAL);
772 		break;
773 	default:
774 		eeh_pe_state_clear(pe, EEH_PE_ISOLATED | EEH_PE_CFG_BLOCKED, true);
775 		return -EINVAL;
776 	}
777 
778 	return 0;
779 }
780 
781 /**
782  * eeh_set_dev_freset - Check the required reset for the indicated device
783  * @edev: EEH device
784  * @flag: return value
785  *
786  * Each device might have its preferred reset type: fundamental or
787  * hot reset. The routine is used to collected the information for
788  * the indicated device and its children so that the bunch of the
789  * devices could be reset properly.
790  */
eeh_set_dev_freset(struct eeh_dev * edev,void * flag)791 static void eeh_set_dev_freset(struct eeh_dev *edev, void *flag)
792 {
793 	struct pci_dev *dev;
794 	unsigned int *freset = (unsigned int *)flag;
795 
796 	dev = eeh_dev_to_pci_dev(edev);
797 	if (dev)
798 		*freset |= dev->needs_freset;
799 }
800 
eeh_pe_refreeze_passed(struct eeh_pe * root)801 static void eeh_pe_refreeze_passed(struct eeh_pe *root)
802 {
803 	struct eeh_pe *pe;
804 	int state;
805 
806 	eeh_for_each_pe(root, pe) {
807 		if (eeh_pe_passed(pe)) {
808 			state = eeh_ops->get_state(pe, NULL);
809 			if (state &
810 			   (EEH_STATE_MMIO_ACTIVE | EEH_STATE_MMIO_ENABLED)) {
811 				pr_info("EEH: Passed-through PE PHB#%x-PE#%x was thawed by reset, re-freezing for safety.\n",
812 					pe->phb->global_number, pe->addr);
813 				eeh_pe_set_option(pe, EEH_OPT_FREEZE_PE);
814 			}
815 		}
816 	}
817 }
818 
819 /**
820  * eeh_pe_reset_full - Complete a full reset process on the indicated PE
821  * @pe: EEH PE
822  * @include_passed: include passed-through devices?
823  *
824  * This function executes a full reset procedure on a PE, including setting
825  * the appropriate flags, performing a fundamental or hot reset, and then
826  * deactivating the reset status.  It is designed to be used within the EEH
827  * subsystem, as opposed to eeh_pe_reset which is exported to drivers and
828  * only performs a single operation at a time.
829  *
830  * This function will attempt to reset a PE three times before failing.
831  */
eeh_pe_reset_full(struct eeh_pe * pe,bool include_passed)832 int eeh_pe_reset_full(struct eeh_pe *pe, bool include_passed)
833 {
834 	int reset_state = (EEH_PE_RESET | EEH_PE_CFG_BLOCKED);
835 	int type = EEH_RESET_HOT;
836 	unsigned int freset = 0;
837 	int i, state = 0, ret;
838 
839 	/*
840 	 * Determine the type of reset to perform - hot or fundamental.
841 	 * Hot reset is the default operation, unless any device under the
842 	 * PE requires a fundamental reset.
843 	 */
844 	eeh_pe_dev_traverse(pe, eeh_set_dev_freset, &freset);
845 
846 	if (freset)
847 		type = EEH_RESET_FUNDAMENTAL;
848 
849 	/* Mark the PE as in reset state and block config space accesses */
850 	eeh_pe_state_mark(pe, reset_state);
851 
852 	/* Make three attempts at resetting the bus */
853 	for (i = 0; i < 3; i++) {
854 		ret = eeh_pe_reset(pe, type, include_passed);
855 		if (!ret)
856 			ret = eeh_pe_reset(pe, EEH_RESET_DEACTIVATE,
857 					   include_passed);
858 		if (ret) {
859 			ret = -EIO;
860 			pr_warn("EEH: Failure %d resetting PHB#%x-PE#%x (attempt %d)\n\n",
861 				state, pe->phb->global_number, pe->addr, i + 1);
862 			continue;
863 		}
864 		if (i)
865 			pr_warn("EEH: PHB#%x-PE#%x: Successful reset (attempt %d)\n",
866 				pe->phb->global_number, pe->addr, i + 1);
867 
868 		/* Wait until the PE is in a functioning state */
869 		state = eeh_wait_state(pe, PCI_BUS_RESET_WAIT_MSEC);
870 		if (state < 0) {
871 			pr_warn("EEH: Unrecoverable slot failure on PHB#%x-PE#%x",
872 				pe->phb->global_number, pe->addr);
873 			ret = -ENOTRECOVERABLE;
874 			break;
875 		}
876 		if (eeh_state_active(state))
877 			break;
878 		else
879 			pr_warn("EEH: PHB#%x-PE#%x: Slot inactive after reset: 0x%x (attempt %d)\n",
880 				pe->phb->global_number, pe->addr, state, i + 1);
881 	}
882 
883 	/* Resetting the PE may have unfrozen child PEs. If those PEs have been
884 	 * (potentially) passed through to a guest, re-freeze them:
885 	 */
886 	if (!include_passed)
887 		eeh_pe_refreeze_passed(pe);
888 
889 	eeh_pe_state_clear(pe, reset_state, true);
890 	return ret;
891 }
892 
893 /**
894  * eeh_save_bars - Save device bars
895  * @edev: PCI device associated EEH device
896  *
897  * Save the values of the device bars. Unlike the restore
898  * routine, this routine is *not* recursive. This is because
899  * PCI devices are added individually; but, for the restore,
900  * an entire slot is reset at a time.
901  */
eeh_save_bars(struct eeh_dev * edev)902 void eeh_save_bars(struct eeh_dev *edev)
903 {
904 	int i;
905 
906 	if (!edev)
907 		return;
908 
909 	for (i = 0; i < 16; i++)
910 		eeh_ops->read_config(edev, i * 4, 4, &edev->config_space[i]);
911 
912 	/*
913 	 * For PCI bridges including root port, we need enable bus
914 	 * master explicitly. Otherwise, it can't fetch IODA table
915 	 * entries correctly. So we cache the bit in advance so that
916 	 * we can restore it after reset, either PHB range or PE range.
917 	 */
918 	if (edev->mode & EEH_DEV_BRIDGE)
919 		edev->config_space[1] |= PCI_COMMAND_MASTER;
920 }
921 
eeh_reboot_notifier(struct notifier_block * nb,unsigned long action,void * unused)922 static int eeh_reboot_notifier(struct notifier_block *nb,
923 			       unsigned long action, void *unused)
924 {
925 	eeh_clear_flag(EEH_ENABLED);
926 	return NOTIFY_DONE;
927 }
928 
929 static struct notifier_block eeh_reboot_nb = {
930 	.notifier_call = eeh_reboot_notifier,
931 };
932 
eeh_device_notifier(struct notifier_block * nb,unsigned long action,void * data)933 static int eeh_device_notifier(struct notifier_block *nb,
934 			       unsigned long action, void *data)
935 {
936 	struct device *dev = data;
937 
938 	switch (action) {
939 	/*
940 	 * Note: It's not possible to perform EEH device addition (i.e.
941 	 * {pseries,pnv}_pcibios_bus_add_device()) here because it depends on
942 	 * the device's resources, which have not yet been set up.
943 	 */
944 	case BUS_NOTIFY_DEL_DEVICE:
945 		eeh_remove_device(to_pci_dev(dev));
946 		break;
947 	default:
948 		break;
949 	}
950 	return NOTIFY_DONE;
951 }
952 
953 static struct notifier_block eeh_device_nb = {
954 	.notifier_call = eeh_device_notifier,
955 };
956 
957 /**
958  * eeh_init - System wide EEH initialization
959  * @ops: struct to trace EEH operation callback functions
960  *
961  * It's the platform's job to call this from an arch_initcall().
962  */
eeh_init(struct eeh_ops * ops)963 int eeh_init(struct eeh_ops *ops)
964 {
965 	struct pci_controller *hose, *tmp;
966 	int ret = 0;
967 
968 	/* the platform should only initialise EEH once */
969 	if (WARN_ON(eeh_ops))
970 		return -EEXIST;
971 	if (WARN_ON(!ops))
972 		return -ENOENT;
973 	eeh_ops = ops;
974 
975 	/* Register reboot notifier */
976 	ret = register_reboot_notifier(&eeh_reboot_nb);
977 	if (ret) {
978 		pr_warn("%s: Failed to register reboot notifier (%d)\n",
979 			__func__, ret);
980 		return ret;
981 	}
982 
983 	ret = bus_register_notifier(&pci_bus_type, &eeh_device_nb);
984 	if (ret) {
985 		pr_warn("%s: Failed to register bus notifier (%d)\n",
986 			__func__, ret);
987 		return ret;
988 	}
989 
990 	/* Initialize PHB PEs */
991 	list_for_each_entry_safe(hose, tmp, &hose_list, list_node)
992 		eeh_phb_pe_create(hose);
993 
994 	eeh_addr_cache_init();
995 
996 	/* Initialize EEH event */
997 	return eeh_event_init();
998 }
999 
1000 /**
1001  * eeh_probe_device() - Perform EEH initialization for the indicated pci device
1002  * @dev: pci device for which to set up EEH
1003  *
1004  * This routine must be used to complete EEH initialization for PCI
1005  * devices that were added after system boot (e.g. hotplug, dlpar).
1006  */
eeh_probe_device(struct pci_dev * dev)1007 void eeh_probe_device(struct pci_dev *dev)
1008 {
1009 	struct eeh_dev *edev;
1010 
1011 	pr_debug("EEH: Adding device %s\n", pci_name(dev));
1012 
1013 	/*
1014 	 * pci_dev_to_eeh_dev() can only work if eeh_probe_dev() was
1015 	 * already called for this device.
1016 	 */
1017 	if (WARN_ON_ONCE(pci_dev_to_eeh_dev(dev))) {
1018 		pci_dbg(dev, "Already bound to an eeh_dev!\n");
1019 		return;
1020 	}
1021 
1022 	edev = eeh_ops->probe(dev);
1023 	if (!edev) {
1024 		pr_debug("EEH: Adding device failed\n");
1025 		return;
1026 	}
1027 
1028 	/*
1029 	 * FIXME: We rely on pcibios_release_device() to remove the
1030 	 * existing EEH state. The release function is only called if
1031 	 * the pci_dev's refcount drops to zero so if something is
1032 	 * keeping a ref to a device (e.g. a filesystem) we need to
1033 	 * remove the old EEH state.
1034 	 *
1035 	 * FIXME: HEY MA, LOOK AT ME, NO LOCKING!
1036 	 */
1037 	if (edev->pdev && edev->pdev != dev) {
1038 		eeh_pe_tree_remove(edev);
1039 		eeh_addr_cache_rmv_dev(edev->pdev);
1040 		eeh_sysfs_remove_device(edev->pdev);
1041 
1042 		/*
1043 		 * We definitely should have the PCI device removed
1044 		 * though it wasn't correctly. So we needn't call
1045 		 * into error handler afterwards.
1046 		 */
1047 		edev->mode |= EEH_DEV_NO_HANDLER;
1048 	}
1049 
1050 	/* bind the pdev and the edev together */
1051 	edev->pdev = dev;
1052 	dev->dev.archdata.edev = edev;
1053 	eeh_addr_cache_insert_dev(dev);
1054 	eeh_sysfs_add_device(dev);
1055 }
1056 
1057 /**
1058  * eeh_remove_device - Undo EEH setup for the indicated pci device
1059  * @dev: pci device to be removed
1060  *
1061  * This routine should be called when a device is removed from
1062  * a running system (e.g. by hotplug or dlpar).  It unregisters
1063  * the PCI device from the EEH subsystem.  I/O errors affecting
1064  * this device will no longer be detected after this call; thus,
1065  * i/o errors affecting this slot may leave this device unusable.
1066  */
eeh_remove_device(struct pci_dev * dev)1067 void eeh_remove_device(struct pci_dev *dev)
1068 {
1069 	struct eeh_dev *edev;
1070 
1071 	if (!dev || !eeh_enabled())
1072 		return;
1073 	edev = pci_dev_to_eeh_dev(dev);
1074 
1075 	/* Unregister the device with the EEH/PCI address search system */
1076 	dev_dbg(&dev->dev, "EEH: Removing device\n");
1077 
1078 	if (!edev || !edev->pdev || !edev->pe) {
1079 		dev_dbg(&dev->dev, "EEH: Device not referenced!\n");
1080 		return;
1081 	}
1082 
1083 	/*
1084 	 * During the hotplug for EEH error recovery, we need the EEH
1085 	 * device attached to the parent PE in order for BAR restore
1086 	 * a bit later. So we keep it for BAR restore and remove it
1087 	 * from the parent PE during the BAR resotre.
1088 	 */
1089 	edev->pdev = NULL;
1090 
1091 	/*
1092 	 * eeh_sysfs_remove_device() uses pci_dev_to_eeh_dev() so we need to
1093 	 * remove the sysfs files before clearing dev.archdata.edev
1094 	 */
1095 	if (edev->mode & EEH_DEV_SYSFS)
1096 		eeh_sysfs_remove_device(dev);
1097 
1098 	/*
1099 	 * We're removing from the PCI subsystem, that means
1100 	 * the PCI device driver can't support EEH or not
1101 	 * well. So we rely on hotplug completely to do recovery
1102 	 * for the specific PCI device.
1103 	 */
1104 	edev->mode |= EEH_DEV_NO_HANDLER;
1105 
1106 	eeh_addr_cache_rmv_dev(dev);
1107 
1108 	/*
1109 	 * The flag "in_error" is used to trace EEH devices for VFs
1110 	 * in error state or not. It's set in eeh_report_error(). If
1111 	 * it's not set, eeh_report_{reset,resume}() won't be called
1112 	 * for the VF EEH device.
1113 	 */
1114 	edev->in_error = false;
1115 	dev->dev.archdata.edev = NULL;
1116 	if (!(edev->pe->state & EEH_PE_KEEP))
1117 		eeh_pe_tree_remove(edev);
1118 	else
1119 		edev->mode |= EEH_DEV_DISCONNECTED;
1120 }
1121 
eeh_unfreeze_pe(struct eeh_pe * pe)1122 int eeh_unfreeze_pe(struct eeh_pe *pe)
1123 {
1124 	int ret;
1125 
1126 	ret = eeh_pci_enable(pe, EEH_OPT_THAW_MMIO);
1127 	if (ret) {
1128 		pr_warn("%s: Failure %d enabling IO on PHB#%x-PE#%x\n",
1129 			__func__, ret, pe->phb->global_number, pe->addr);
1130 		return ret;
1131 	}
1132 
1133 	ret = eeh_pci_enable(pe, EEH_OPT_THAW_DMA);
1134 	if (ret) {
1135 		pr_warn("%s: Failure %d enabling DMA on PHB#%x-PE#%x\n",
1136 			__func__, ret, pe->phb->global_number, pe->addr);
1137 		return ret;
1138 	}
1139 
1140 	return ret;
1141 }
1142 
1143 
1144 static struct pci_device_id eeh_reset_ids[] = {
1145 	{ PCI_DEVICE(0x19a2, 0x0710) },	/* Emulex, BE     */
1146 	{ PCI_DEVICE(0x10df, 0xe220) },	/* Emulex, Lancer */
1147 	{ PCI_DEVICE(0x14e4, 0x1657) }, /* Broadcom BCM5719 */
1148 	{ 0 }
1149 };
1150 
eeh_pe_change_owner(struct eeh_pe * pe)1151 static int eeh_pe_change_owner(struct eeh_pe *pe)
1152 {
1153 	struct eeh_dev *edev, *tmp;
1154 	struct pci_dev *pdev;
1155 	struct pci_device_id *id;
1156 	int ret;
1157 
1158 	/* Check PE state */
1159 	ret = eeh_ops->get_state(pe, NULL);
1160 	if (ret < 0 || ret == EEH_STATE_NOT_SUPPORT)
1161 		return 0;
1162 
1163 	/* Unfrozen PE, nothing to do */
1164 	if (eeh_state_active(ret))
1165 		return 0;
1166 
1167 	/* Frozen PE, check if it needs PE level reset */
1168 	eeh_pe_for_each_dev(pe, edev, tmp) {
1169 		pdev = eeh_dev_to_pci_dev(edev);
1170 		if (!pdev)
1171 			continue;
1172 
1173 		for (id = &eeh_reset_ids[0]; id->vendor != 0; id++) {
1174 			if (id->vendor != PCI_ANY_ID &&
1175 			    id->vendor != pdev->vendor)
1176 				continue;
1177 			if (id->device != PCI_ANY_ID &&
1178 			    id->device != pdev->device)
1179 				continue;
1180 			if (id->subvendor != PCI_ANY_ID &&
1181 			    id->subvendor != pdev->subsystem_vendor)
1182 				continue;
1183 			if (id->subdevice != PCI_ANY_ID &&
1184 			    id->subdevice != pdev->subsystem_device)
1185 				continue;
1186 
1187 			return eeh_pe_reset_and_recover(pe);
1188 		}
1189 	}
1190 
1191 	ret = eeh_unfreeze_pe(pe);
1192 	if (!ret)
1193 		eeh_pe_state_clear(pe, EEH_PE_ISOLATED, true);
1194 	return ret;
1195 }
1196 
1197 /**
1198  * eeh_dev_open - Increase count of pass through devices for PE
1199  * @pdev: PCI device
1200  *
1201  * Increase count of passed through devices for the indicated
1202  * PE. In the result, the EEH errors detected on the PE won't be
1203  * reported. The PE owner will be responsible for detection
1204  * and recovery.
1205  */
eeh_dev_open(struct pci_dev * pdev)1206 int eeh_dev_open(struct pci_dev *pdev)
1207 {
1208 	struct eeh_dev *edev;
1209 	int ret = -ENODEV;
1210 
1211 	guard(mutex)(&eeh_dev_mutex);
1212 
1213 	/* No PCI device ? */
1214 	if (!pdev)
1215 		return ret;
1216 
1217 	/* No EEH device or PE ? */
1218 	edev = pci_dev_to_eeh_dev(pdev);
1219 	if (!edev || !edev->pe)
1220 		return ret;
1221 
1222 	/*
1223 	 * The PE might have been put into frozen state, but we
1224 	 * didn't detect that yet. The passed through PCI devices
1225 	 * in frozen PE won't work properly. Clear the frozen state
1226 	 * in advance.
1227 	 */
1228 	ret = eeh_pe_change_owner(edev->pe);
1229 	if (ret)
1230 		return ret;
1231 
1232 	/* Increase PE's pass through count */
1233 	atomic_inc(&edev->pe->pass_dev_cnt);
1234 
1235 	return 0;
1236 }
1237 EXPORT_SYMBOL_GPL(eeh_dev_open);
1238 
1239 /**
1240  * eeh_dev_release - Decrease count of pass through devices for PE
1241  * @pdev: PCI device
1242  *
1243  * Decrease count of pass through devices for the indicated PE. If
1244  * there is no passed through device in PE, the EEH errors detected
1245  * on the PE will be reported and handled as usual.
1246  */
eeh_dev_release(struct pci_dev * pdev)1247 void eeh_dev_release(struct pci_dev *pdev)
1248 {
1249 	struct eeh_dev *edev;
1250 
1251 	guard(mutex)(&eeh_dev_mutex);
1252 
1253 	/* No PCI device ? */
1254 	if (!pdev)
1255 		return;
1256 
1257 	/* No EEH device ? */
1258 	edev = pci_dev_to_eeh_dev(pdev);
1259 	if (!edev || !edev->pe || !eeh_pe_passed(edev->pe))
1260 		return;
1261 
1262 	/* Decrease PE's pass through count */
1263 	WARN_ON(atomic_dec_if_positive(&edev->pe->pass_dev_cnt) < 0);
1264 	eeh_pe_change_owner(edev->pe);
1265 }
1266 EXPORT_SYMBOL(eeh_dev_release);
1267 
1268 #ifdef CONFIG_IOMMU_API
1269 
1270 /**
1271  * eeh_iommu_group_to_pe - Convert IOMMU group to EEH PE
1272  * @group: IOMMU group
1273  *
1274  * The routine is called to convert IOMMU group to EEH PE.
1275  */
eeh_iommu_group_to_pe(struct iommu_group * group)1276 struct eeh_pe *eeh_iommu_group_to_pe(struct iommu_group *group)
1277 {
1278 	struct pci_dev *pdev = NULL;
1279 	struct eeh_dev *edev;
1280 	int ret;
1281 
1282 	/* No IOMMU group ? */
1283 	if (!group)
1284 		return NULL;
1285 
1286 	ret = iommu_group_for_each_dev(group, &pdev, dev_has_iommu_table);
1287 	if (!ret || !pdev)
1288 		return NULL;
1289 
1290 	/* No EEH device or PE ? */
1291 	edev = pci_dev_to_eeh_dev(pdev);
1292 	if (!edev || !edev->pe)
1293 		return NULL;
1294 
1295 	return edev->pe;
1296 }
1297 EXPORT_SYMBOL_GPL(eeh_iommu_group_to_pe);
1298 
1299 #endif /* CONFIG_IOMMU_API */
1300 
1301 /**
1302  * eeh_pe_set_option - Set options for the indicated PE
1303  * @pe: EEH PE
1304  * @option: requested option
1305  *
1306  * The routine is called to enable or disable EEH functionality
1307  * on the indicated PE, to enable IO or DMA for the frozen PE.
1308  */
eeh_pe_set_option(struct eeh_pe * pe,int option)1309 int eeh_pe_set_option(struct eeh_pe *pe, int option)
1310 {
1311 	int ret = 0;
1312 
1313 	/* Invalid PE ? */
1314 	if (!pe)
1315 		return -ENODEV;
1316 
1317 	/*
1318 	 * EEH functionality could possibly be disabled, just
1319 	 * return error for the case. And the EEH functionality
1320 	 * isn't expected to be disabled on one specific PE.
1321 	 */
1322 	switch (option) {
1323 	case EEH_OPT_ENABLE:
1324 		if (eeh_enabled()) {
1325 			ret = eeh_pe_change_owner(pe);
1326 			break;
1327 		}
1328 		ret = -EIO;
1329 		break;
1330 	case EEH_OPT_DISABLE:
1331 		break;
1332 	case EEH_OPT_THAW_MMIO:
1333 	case EEH_OPT_THAW_DMA:
1334 	case EEH_OPT_FREEZE_PE:
1335 		if (!eeh_ops || !eeh_ops->set_option) {
1336 			ret = -ENOENT;
1337 			break;
1338 		}
1339 
1340 		ret = eeh_pci_enable(pe, option);
1341 		break;
1342 	default:
1343 		pr_debug("%s: Option %d out of range (%d, %d)\n",
1344 			__func__, option, EEH_OPT_DISABLE, EEH_OPT_THAW_DMA);
1345 		ret = -EINVAL;
1346 	}
1347 
1348 	return ret;
1349 }
1350 EXPORT_SYMBOL_GPL(eeh_pe_set_option);
1351 
1352 /**
1353  * eeh_pe_get_state - Retrieve PE's state
1354  * @pe: EEH PE
1355  *
1356  * Retrieve the PE's state, which includes 3 aspects: enabled
1357  * DMA, enabled IO and asserted reset.
1358  */
eeh_pe_get_state(struct eeh_pe * pe)1359 int eeh_pe_get_state(struct eeh_pe *pe)
1360 {
1361 	int result, ret = 0;
1362 	bool rst_active, dma_en, mmio_en;
1363 
1364 	/* Existing PE ? */
1365 	if (!pe)
1366 		return -ENODEV;
1367 
1368 	if (!eeh_ops || !eeh_ops->get_state)
1369 		return -ENOENT;
1370 
1371 	/*
1372 	 * If the parent PE is owned by the host kernel and is undergoing
1373 	 * error recovery, we should return the PE state as temporarily
1374 	 * unavailable so that the error recovery on the guest is suspended
1375 	 * until the recovery completes on the host.
1376 	 */
1377 	if (pe->parent &&
1378 	    !(pe->state & EEH_PE_REMOVED) &&
1379 	    (pe->parent->state & (EEH_PE_ISOLATED | EEH_PE_RECOVERING)))
1380 		return EEH_PE_STATE_UNAVAIL;
1381 
1382 	result = eeh_ops->get_state(pe, NULL);
1383 	rst_active = !!(result & EEH_STATE_RESET_ACTIVE);
1384 	dma_en = !!(result & EEH_STATE_DMA_ENABLED);
1385 	mmio_en = !!(result & EEH_STATE_MMIO_ENABLED);
1386 
1387 	if (rst_active)
1388 		ret = EEH_PE_STATE_RESET;
1389 	else if (dma_en && mmio_en)
1390 		ret = EEH_PE_STATE_NORMAL;
1391 	else if (!dma_en && !mmio_en)
1392 		ret = EEH_PE_STATE_STOPPED_IO_DMA;
1393 	else if (!dma_en && mmio_en)
1394 		ret = EEH_PE_STATE_STOPPED_DMA;
1395 	else
1396 		ret = EEH_PE_STATE_UNAVAIL;
1397 
1398 	return ret;
1399 }
1400 EXPORT_SYMBOL_GPL(eeh_pe_get_state);
1401 
eeh_pe_reenable_devices(struct eeh_pe * pe,bool include_passed)1402 static int eeh_pe_reenable_devices(struct eeh_pe *pe, bool include_passed)
1403 {
1404 	struct eeh_dev *edev, *tmp;
1405 	struct pci_dev *pdev;
1406 	int ret = 0;
1407 
1408 	eeh_pe_restore_bars(pe);
1409 
1410 	/*
1411 	 * Reenable PCI devices as the devices passed
1412 	 * through are always enabled before the reset.
1413 	 */
1414 	eeh_pe_for_each_dev(pe, edev, tmp) {
1415 		pdev = eeh_dev_to_pci_dev(edev);
1416 		if (!pdev)
1417 			continue;
1418 
1419 		ret = pci_reenable_device(pdev);
1420 		if (ret) {
1421 			pr_warn("%s: Failure %d reenabling %s\n",
1422 				__func__, ret, pci_name(pdev));
1423 			return ret;
1424 		}
1425 	}
1426 
1427 	/* The PE is still in frozen state */
1428 	if (include_passed || !eeh_pe_passed(pe)) {
1429 		ret = eeh_unfreeze_pe(pe);
1430 	} else
1431 		pr_info("EEH: Note: Leaving passthrough PHB#%x-PE#%x frozen.\n",
1432 			pe->phb->global_number, pe->addr);
1433 	if (!ret)
1434 		eeh_pe_state_clear(pe, EEH_PE_ISOLATED, include_passed);
1435 	return ret;
1436 }
1437 
1438 
1439 /**
1440  * eeh_pe_reset - Issue PE reset according to specified type
1441  * @pe: EEH PE
1442  * @option: reset type
1443  * @include_passed: include passed-through devices?
1444  *
1445  * The routine is called to reset the specified PE with the
1446  * indicated type, either fundamental reset or hot reset.
1447  * PE reset is the most important part for error recovery.
1448  */
eeh_pe_reset(struct eeh_pe * pe,int option,bool include_passed)1449 int eeh_pe_reset(struct eeh_pe *pe, int option, bool include_passed)
1450 {
1451 	int ret = 0;
1452 
1453 	/* Invalid PE ? */
1454 	if (!pe)
1455 		return -ENODEV;
1456 
1457 	if (!eeh_ops || !eeh_ops->set_option || !eeh_ops->reset)
1458 		return -ENOENT;
1459 
1460 	switch (option) {
1461 	case EEH_RESET_DEACTIVATE:
1462 		ret = eeh_ops->reset(pe, option);
1463 		eeh_pe_state_clear(pe, EEH_PE_CFG_BLOCKED, include_passed);
1464 		if (ret)
1465 			break;
1466 
1467 		ret = eeh_pe_reenable_devices(pe, include_passed);
1468 		break;
1469 	case EEH_RESET_HOT:
1470 	case EEH_RESET_FUNDAMENTAL:
1471 		/*
1472 		 * Proactively freeze the PE to drop all MMIO access
1473 		 * during reset, which should be banned as it's always
1474 		 * cause recursive EEH error.
1475 		 */
1476 		eeh_ops->set_option(pe, EEH_OPT_FREEZE_PE);
1477 
1478 		eeh_pe_state_mark(pe, EEH_PE_CFG_BLOCKED);
1479 		ret = eeh_ops->reset(pe, option);
1480 		break;
1481 	default:
1482 		pr_debug("%s: Unsupported option %d\n",
1483 			__func__, option);
1484 		ret = -EINVAL;
1485 	}
1486 
1487 	return ret;
1488 }
1489 EXPORT_SYMBOL_GPL(eeh_pe_reset);
1490 
1491 /**
1492  * eeh_pe_configure - Configure PCI bridges after PE reset
1493  * @pe: EEH PE
1494  *
1495  * The routine is called to restore the PCI config space for
1496  * those PCI devices, especially PCI bridges affected by PE
1497  * reset issued previously.
1498  */
eeh_pe_configure(struct eeh_pe * pe)1499 int eeh_pe_configure(struct eeh_pe *pe)
1500 {
1501 	int ret = 0;
1502 
1503 	/* Invalid PE ? */
1504 	if (!pe)
1505 		return -ENODEV;
1506 	else
1507 		ret = eeh_ops->configure_bridge(pe);
1508 
1509 	return ret;
1510 }
1511 EXPORT_SYMBOL_GPL(eeh_pe_configure);
1512 
1513 /**
1514  * eeh_pe_inject_err - Injecting the specified PCI error to the indicated PE
1515  * @pe: the indicated PE
1516  * @type: error type
1517  * @func: error function
1518  * @addr: address
1519  * @mask: address mask
1520  *
1521  * The routine is called to inject the specified PCI error, which
1522  * is determined by @type and @func, to the indicated PE for
1523  * testing purpose.
1524  */
eeh_pe_inject_err(struct eeh_pe * pe,int type,int func,unsigned long addr,unsigned long mask)1525 int eeh_pe_inject_err(struct eeh_pe *pe, int type, int func,
1526 		      unsigned long addr, unsigned long mask)
1527 {
1528 	/* Invalid PE ? */
1529 	if (!pe)
1530 		return -ENODEV;
1531 
1532 	/* Unsupported operation ? */
1533 	if (!eeh_ops || !eeh_ops->err_inject)
1534 		return -ENOENT;
1535 
1536 	/* Check on PCI error function */
1537 	if (func < EEH_ERR_FUNC_MIN || func > EEH_ERR_FUNC_MAX)
1538 		return -EINVAL;
1539 
1540 	return eeh_ops->err_inject(pe, type, func, addr, mask);
1541 }
1542 EXPORT_SYMBOL_GPL(eeh_pe_inject_err);
1543 
1544 #ifdef CONFIG_PROC_FS
proc_eeh_show(struct seq_file * m,void * v)1545 static int proc_eeh_show(struct seq_file *m, void *v)
1546 {
1547 	if (!eeh_enabled()) {
1548 		seq_printf(m, "EEH Subsystem is globally disabled\n");
1549 		seq_printf(m, "eeh_total_mmio_ffs=%llu\n", eeh_stats.total_mmio_ffs);
1550 	} else {
1551 		seq_printf(m, "EEH Subsystem is enabled\n");
1552 		seq_printf(m,
1553 				"no device=%llu\n"
1554 				"no device node=%llu\n"
1555 				"no config address=%llu\n"
1556 				"check not wanted=%llu\n"
1557 				"eeh_total_mmio_ffs=%llu\n"
1558 				"eeh_false_positives=%llu\n"
1559 				"eeh_slot_resets=%llu\n",
1560 				eeh_stats.no_device,
1561 				eeh_stats.no_dn,
1562 				eeh_stats.no_cfg_addr,
1563 				eeh_stats.ignored_check,
1564 				eeh_stats.total_mmio_ffs,
1565 				eeh_stats.false_positives,
1566 				eeh_stats.slot_resets);
1567 	}
1568 
1569 	return 0;
1570 }
1571 #endif /* CONFIG_PROC_FS */
1572 
eeh_break_device(struct pci_dev * pdev)1573 static int eeh_break_device(struct pci_dev *pdev)
1574 {
1575 	struct resource *bar = NULL;
1576 	void __iomem *mapped;
1577 	u16 old, bit;
1578 	int i, pos;
1579 
1580 	/* Do we have an MMIO BAR to disable? */
1581 	for (i = 0; i <= PCI_STD_RESOURCE_END; i++) {
1582 		struct resource *r = &pdev->resource[i];
1583 
1584 		if (!r->flags || !r->start)
1585 			continue;
1586 		if (r->flags & IORESOURCE_IO)
1587 			continue;
1588 		if (r->flags & IORESOURCE_UNSET)
1589 			continue;
1590 
1591 		bar = r;
1592 		break;
1593 	}
1594 
1595 	if (!bar) {
1596 		pci_err(pdev, "Unable to find Memory BAR to cause EEH with\n");
1597 		return -ENXIO;
1598 	}
1599 
1600 	pci_err(pdev, "Going to break: %pR\n", bar);
1601 
1602 	if (pdev->is_virtfn) {
1603 #ifndef CONFIG_PCI_IOV
1604 		return -ENXIO;
1605 #else
1606 		/*
1607 		 * VFs don't have a per-function COMMAND register, so the best
1608 		 * we can do is clear the Memory Space Enable bit in the PF's
1609 		 * SRIOV control reg.
1610 		 *
1611 		 * Unfortunately, this requires that we have a PF (i.e doesn't
1612 		 * work for a passed-through VF) and it has the potential side
1613 		 * effect of also causing an EEH on every other VF under the
1614 		 * PF. Oh well.
1615 		 */
1616 		pdev = pdev->physfn;
1617 		if (!pdev)
1618 			return -ENXIO; /* passed through VFs have no PF */
1619 
1620 		pos  = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_SRIOV);
1621 		pos += PCI_SRIOV_CTRL;
1622 		bit  = PCI_SRIOV_CTRL_MSE;
1623 #endif /* !CONFIG_PCI_IOV */
1624 	} else {
1625 		bit = PCI_COMMAND_MEMORY;
1626 		pos = PCI_COMMAND;
1627 	}
1628 
1629 	/*
1630 	 * Process here is:
1631 	 *
1632 	 * 1. Disable Memory space.
1633 	 *
1634 	 * 2. Perform an MMIO to the device. This should result in an error
1635 	 *    (CA  / UR) being raised by the device which results in an EEH
1636 	 *    PE freeze. Using the in_8() accessor skips the eeh detection hook
1637 	 *    so the freeze hook so the EEH Detection machinery won't be
1638 	 *    triggered here. This is to match the usual behaviour of EEH
1639 	 *    where the HW will asynchronously freeze a PE and it's up to
1640 	 *    the kernel to notice and deal with it.
1641 	 *
1642 	 * 3. Turn Memory space back on. This is more important for VFs
1643 	 *    since recovery will probably fail if we don't. For normal
1644 	 *    the COMMAND register is reset as a part of re-initialising
1645 	 *    the device.
1646 	 *
1647 	 * Breaking stuff is the point so who cares if it's racy ;)
1648 	 */
1649 	pci_read_config_word(pdev, pos, &old);
1650 
1651 	mapped = ioremap(bar->start, PAGE_SIZE);
1652 	if (!mapped) {
1653 		pci_err(pdev, "Unable to map MMIO BAR %pR\n", bar);
1654 		return -ENXIO;
1655 	}
1656 
1657 	pci_write_config_word(pdev, pos, old & ~bit);
1658 	in_8(mapped);
1659 	pci_write_config_word(pdev, pos, old);
1660 
1661 	iounmap(mapped);
1662 
1663 	return 0;
1664 }
1665 
eeh_pe_inject_mmio_error(struct pci_dev * pdev)1666 int eeh_pe_inject_mmio_error(struct pci_dev *pdev)
1667 {
1668 	return eeh_break_device(pdev);
1669 }
1670 
1671 #ifdef CONFIG_DEBUG_FS
1672 
1673 
eeh_debug_lookup_pdev(struct file * filp,const char __user * user_buf,size_t count,loff_t * ppos)1674 static struct pci_dev *eeh_debug_lookup_pdev(struct file *filp,
1675 					     const char __user *user_buf,
1676 					     size_t count, loff_t *ppos)
1677 {
1678 	uint32_t domain, bus, dev, fn;
1679 	struct pci_dev *pdev;
1680 	char buf[20];
1681 	int ret;
1682 
1683 	memset(buf, 0, sizeof(buf));
1684 	ret = simple_write_to_buffer(buf, sizeof(buf)-1, ppos, user_buf, count);
1685 	if (!ret)
1686 		return ERR_PTR(-EFAULT);
1687 
1688 	ret = sscanf(buf, "%x:%x:%x.%x", &domain, &bus, &dev, &fn);
1689 	if (ret != 4) {
1690 		pr_err("%s: expected 4 args, got %d\n", __func__, ret);
1691 		return ERR_PTR(-EINVAL);
1692 	}
1693 
1694 	pdev = pci_get_domain_bus_and_slot(domain, bus, (dev << 3) | fn);
1695 	if (!pdev)
1696 		return ERR_PTR(-ENODEV);
1697 
1698 	return pdev;
1699 }
1700 
eeh_enable_dbgfs_set(void * data,u64 val)1701 static int eeh_enable_dbgfs_set(void *data, u64 val)
1702 {
1703 	if (val)
1704 		eeh_clear_flag(EEH_FORCE_DISABLED);
1705 	else
1706 		eeh_add_flag(EEH_FORCE_DISABLED);
1707 
1708 	return 0;
1709 }
1710 
eeh_enable_dbgfs_get(void * data,u64 * val)1711 static int eeh_enable_dbgfs_get(void *data, u64 *val)
1712 {
1713 	if (eeh_enabled())
1714 		*val = 0x1ul;
1715 	else
1716 		*val = 0x0ul;
1717 	return 0;
1718 }
1719 
1720 DEFINE_DEBUGFS_ATTRIBUTE(eeh_enable_dbgfs_ops, eeh_enable_dbgfs_get,
1721 			 eeh_enable_dbgfs_set, "0x%llx\n");
1722 
eeh_force_recover_write(struct file * filp,const char __user * user_buf,size_t count,loff_t * ppos)1723 static ssize_t eeh_force_recover_write(struct file *filp,
1724 				const char __user *user_buf,
1725 				size_t count, loff_t *ppos)
1726 {
1727 	struct pci_controller *hose;
1728 	uint32_t phbid, pe_no;
1729 	struct eeh_pe *pe;
1730 	char buf[20];
1731 	int ret;
1732 
1733 	ret = simple_write_to_buffer(buf, sizeof(buf), ppos, user_buf, count);
1734 	if (!ret)
1735 		return -EFAULT;
1736 
1737 	/*
1738 	 * When PE is NULL the event is a "special" event. Rather than
1739 	 * recovering a specific PE it forces the EEH core to scan for failed
1740 	 * PHBs and recovers each. This needs to be done before any device
1741 	 * recoveries can occur.
1742 	 */
1743 	if (!strncmp(buf, "hwcheck", 7)) {
1744 		__eeh_send_failure_event(NULL);
1745 		return count;
1746 	}
1747 
1748 	ret = sscanf(buf, "%x:%x", &phbid, &pe_no);
1749 	if (ret != 2)
1750 		return -EINVAL;
1751 
1752 	hose = pci_find_controller_for_domain(phbid);
1753 	if (!hose)
1754 		return -ENODEV;
1755 
1756 	/* Retrieve PE */
1757 	pe = eeh_pe_get(hose, pe_no);
1758 	if (!pe)
1759 		return -ENODEV;
1760 
1761 	/*
1762 	 * We don't do any state checking here since the detection
1763 	 * process is async to the recovery process. The recovery
1764 	 * thread *should* not break even if we schedule a recovery
1765 	 * from an odd state (e.g. PE removed, or recovery of a
1766 	 * non-isolated PE)
1767 	 */
1768 	__eeh_send_failure_event(pe);
1769 
1770 	return ret < 0 ? ret : count;
1771 }
1772 
1773 static const struct file_operations eeh_force_recover_fops = {
1774 	.open	= simple_open,
1775 	.write	= eeh_force_recover_write,
1776 };
1777 
eeh_debugfs_dev_usage(struct file * filp,char __user * user_buf,size_t count,loff_t * ppos)1778 static ssize_t eeh_debugfs_dev_usage(struct file *filp,
1779 				char __user *user_buf,
1780 				size_t count, loff_t *ppos)
1781 {
1782 	static const char usage[] = "input format: <domain>:<bus>:<dev>.<fn>\n";
1783 
1784 	return simple_read_from_buffer(user_buf, count, ppos,
1785 				       usage, sizeof(usage) - 1);
1786 }
1787 
eeh_dev_check_write(struct file * filp,const char __user * user_buf,size_t count,loff_t * ppos)1788 static ssize_t eeh_dev_check_write(struct file *filp,
1789 				const char __user *user_buf,
1790 				size_t count, loff_t *ppos)
1791 {
1792 	struct pci_dev *pdev;
1793 	struct eeh_dev *edev;
1794 	int ret;
1795 
1796 	pdev = eeh_debug_lookup_pdev(filp, user_buf, count, ppos);
1797 	if (IS_ERR(pdev))
1798 		return PTR_ERR(pdev);
1799 
1800 	edev = pci_dev_to_eeh_dev(pdev);
1801 	if (!edev) {
1802 		pci_err(pdev, "No eeh_dev for this device!\n");
1803 		pci_dev_put(pdev);
1804 		return -ENODEV;
1805 	}
1806 
1807 	ret = eeh_dev_check_failure(edev);
1808 	pci_info(pdev, "eeh_dev_check_failure(%s) = %d\n",
1809 			pci_name(pdev), ret);
1810 
1811 	pci_dev_put(pdev);
1812 
1813 	return count;
1814 }
1815 
1816 static const struct file_operations eeh_dev_check_fops = {
1817 	.open	= simple_open,
1818 	.write	= eeh_dev_check_write,
1819 	.read   = eeh_debugfs_dev_usage,
1820 };
1821 
eeh_dev_break_write(struct file * filp,const char __user * user_buf,size_t count,loff_t * ppos)1822 static ssize_t eeh_dev_break_write(struct file *filp,
1823 				const char __user *user_buf,
1824 				size_t count, loff_t *ppos)
1825 {
1826 	struct pci_dev *pdev;
1827 	int ret;
1828 
1829 	pdev = eeh_debug_lookup_pdev(filp, user_buf, count, ppos);
1830 	if (IS_ERR(pdev))
1831 		return PTR_ERR(pdev);
1832 
1833 	ret = eeh_break_device(pdev);
1834 	pci_dev_put(pdev);
1835 
1836 	if (ret < 0)
1837 		return ret;
1838 
1839 	return count;
1840 }
1841 
1842 static const struct file_operations eeh_dev_break_fops = {
1843 	.open	= simple_open,
1844 	.write	= eeh_dev_break_write,
1845 	.read   = eeh_debugfs_dev_usage,
1846 };
1847 
eeh_dev_can_recover(struct file * filp,const char __user * user_buf,size_t count,loff_t * ppos)1848 static ssize_t eeh_dev_can_recover(struct file *filp,
1849 				   const char __user *user_buf,
1850 				   size_t count, loff_t *ppos)
1851 {
1852 	struct pci_driver *drv;
1853 	struct pci_dev *pdev;
1854 	size_t ret;
1855 
1856 	pdev = eeh_debug_lookup_pdev(filp, user_buf, count, ppos);
1857 	if (IS_ERR(pdev))
1858 		return PTR_ERR(pdev);
1859 
1860 	/*
1861 	 * In order for error recovery to work the driver needs to implement
1862 	 * .error_detected(), so it can quiesce IO to the device, and
1863 	 * .slot_reset() so it can re-initialise the device after a reset.
1864 	 *
1865 	 * Ideally they'd implement .resume() too, but some drivers which
1866 	 * we need to support (notably IPR) don't so I guess we can tolerate
1867 	 * that.
1868 	 *
1869 	 * .mmio_enabled() is mostly there as a work-around for devices which
1870 	 * take forever to re-init after a hot reset. Implementing that is
1871 	 * strictly optional.
1872 	 */
1873 	drv = pci_dev_driver(pdev);
1874 	if (drv &&
1875 	    drv->err_handler &&
1876 	    drv->err_handler->error_detected &&
1877 	    drv->err_handler->slot_reset) {
1878 		ret = count;
1879 	} else {
1880 		ret = -EOPNOTSUPP;
1881 	}
1882 
1883 	pci_dev_put(pdev);
1884 
1885 	return ret;
1886 }
1887 
1888 static const struct file_operations eeh_dev_can_recover_fops = {
1889 	.open	= simple_open,
1890 	.write	= eeh_dev_can_recover,
1891 	.read   = eeh_debugfs_dev_usage,
1892 };
1893 
1894 #endif
1895 
eeh_init_proc(void)1896 static int __init eeh_init_proc(void)
1897 {
1898 	if (machine_is(pseries) || machine_is(powernv)) {
1899 		proc_create_single("powerpc/eeh", 0, NULL, proc_eeh_show);
1900 #ifdef CONFIG_DEBUG_FS
1901 		debugfs_create_file_unsafe("eeh_enable", 0600,
1902 					   arch_debugfs_dir, NULL,
1903 					   &eeh_enable_dbgfs_ops);
1904 		debugfs_create_u32("eeh_max_freezes", 0600,
1905 				arch_debugfs_dir, &eeh_max_freezes);
1906 		debugfs_create_bool("eeh_disable_recovery", 0600,
1907 				arch_debugfs_dir,
1908 				&eeh_debugfs_no_recover);
1909 		debugfs_create_file_unsafe("eeh_dev_check", 0600,
1910 				arch_debugfs_dir, NULL,
1911 				&eeh_dev_check_fops);
1912 		debugfs_create_file_unsafe("eeh_dev_break", 0600,
1913 				arch_debugfs_dir, NULL,
1914 				&eeh_dev_break_fops);
1915 		debugfs_create_file_unsafe("eeh_force_recover", 0600,
1916 				arch_debugfs_dir, NULL,
1917 				&eeh_force_recover_fops);
1918 		debugfs_create_file_unsafe("eeh_dev_can_recover", 0600,
1919 				arch_debugfs_dir, NULL,
1920 				&eeh_dev_can_recover_fops);
1921 		eeh_cache_debugfs_init();
1922 #endif
1923 	}
1924 
1925 	return 0;
1926 }
1927 __initcall(eeh_init_proc);
1928