1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* 3 * Copyright IBM Corporation 2001, 2005, 2006 4 * Copyright Dave Engebretsen & Todd Inglett 2001 5 * Copyright Linas Vepstas 2005, 2006 6 * Copyright 2001-2012 IBM Corporation. 7 * 8 * Please address comments and feedback to Linas Vepstas <linas@austin.ibm.com> 9 */ 10 11 #include <linux/delay.h> 12 #include <linux/sched.h> 13 #include <linux/init.h> 14 #include <linux/list.h> 15 #include <linux/pci.h> 16 #include <linux/iommu.h> 17 #include <linux/proc_fs.h> 18 #include <linux/rbtree.h> 19 #include <linux/reboot.h> 20 #include <linux/seq_file.h> 21 #include <linux/spinlock.h> 22 #include <linux/export.h> 23 #include <linux/of.h> 24 #include <linux/debugfs.h> 25 26 #include <linux/atomic.h> 27 #include <asm/eeh.h> 28 #include <asm/eeh_event.h> 29 #include <asm/io.h> 30 #include <asm/iommu.h> 31 #include <asm/machdep.h> 32 #include <asm/ppc-pci.h> 33 #include <asm/rtas.h> 34 #include <asm/pte-walk.h> 35 36 37 /** Overview: 38 * EEH, or "Enhanced Error Handling" is a PCI bridge technology for 39 * dealing with PCI bus errors that can't be dealt with within the 40 * usual PCI framework, except by check-stopping the CPU. Systems 41 * that are designed for high-availability/reliability cannot afford 42 * to crash due to a "mere" PCI error, thus the need for EEH. 43 * An EEH-capable bridge operates by converting a detected error 44 * into a "slot freeze", taking the PCI adapter off-line, making 45 * the slot behave, from the OS'es point of view, as if the slot 46 * were "empty": all reads return 0xff's and all writes are silently 47 * ignored. EEH slot isolation events can be triggered by parity 48 * errors on the address or data busses (e.g. during posted writes), 49 * which in turn might be caused by low voltage on the bus, dust, 50 * vibration, humidity, radioactivity or plain-old failed hardware. 51 * 52 * Note, however, that one of the leading causes of EEH slot 53 * freeze events are buggy device drivers, buggy device microcode, 54 * or buggy device hardware. This is because any attempt by the 55 * device to bus-master data to a memory address that is not 56 * assigned to the device will trigger a slot freeze. (The idea 57 * is to prevent devices-gone-wild from corrupting system memory). 58 * Buggy hardware/drivers will have a miserable time co-existing 59 * with EEH. 60 * 61 * Ideally, a PCI device driver, when suspecting that an isolation 62 * event has occurred (e.g. by reading 0xff's), will then ask EEH 63 * whether this is the case, and then take appropriate steps to 64 * reset the PCI slot, the PCI device, and then resume operations. 65 * However, until that day, the checking is done here, with the 66 * eeh_check_failure() routine embedded in the MMIO macros. If 67 * the slot is found to be isolated, an "EEH Event" is synthesized 68 * and sent out for processing. 69 */ 70 71 /* If a device driver keeps reading an MMIO register in an interrupt 72 * handler after a slot isolation event, it might be broken. 73 * This sets the threshold for how many read attempts we allow 74 * before printing an error message. 75 */ 76 #define EEH_MAX_FAILS 2100000 77 78 /* Time to wait for a PCI slot to report status, in milliseconds */ 79 #define PCI_BUS_RESET_WAIT_MSEC (5*60*1000) 80 81 /* 82 * EEH probe mode support, which is part of the flags, 83 * is to support multiple platforms for EEH. Some platforms 84 * like pSeries do PCI emunation based on device tree. 85 * However, other platforms like powernv probe PCI devices 86 * from hardware. The flag is used to distinguish that. 87 * In addition, struct eeh_ops::probe would be invoked for 88 * particular OF node or PCI device so that the corresponding 89 * PE would be created there. 90 */ 91 int eeh_subsystem_flags; 92 EXPORT_SYMBOL(eeh_subsystem_flags); 93 94 /* 95 * EEH allowed maximal frozen times. If one particular PE's 96 * frozen count in last hour exceeds this limit, the PE will 97 * be forced to be offline permanently. 98 */ 99 u32 eeh_max_freezes = 5; 100 101 /* 102 * Controls whether a recovery event should be scheduled when an 103 * isolated device is discovered. This is only really useful for 104 * debugging problems with the EEH core. 105 */ 106 bool eeh_debugfs_no_recover; 107 108 /* Platform dependent EEH operations */ 109 struct eeh_ops *eeh_ops = NULL; 110 111 /* Lock to avoid races due to multiple reports of an error */ 112 DEFINE_RAW_SPINLOCK(confirm_error_lock); 113 EXPORT_SYMBOL_GPL(confirm_error_lock); 114 115 /* Lock to protect passed flags */ 116 static DEFINE_MUTEX(eeh_dev_mutex); 117 118 /* Buffer for reporting pci register dumps. Its here in BSS, and 119 * not dynamically alloced, so that it ends up in RMO where RTAS 120 * can access it. 121 */ 122 #define EEH_PCI_REGS_LOG_LEN 8192 123 static unsigned char pci_regs_buf[EEH_PCI_REGS_LOG_LEN]; 124 125 /* 126 * The struct is used to maintain the EEH global statistic 127 * information. Besides, the EEH global statistics will be 128 * exported to user space through procfs 129 */ 130 struct eeh_stats { 131 u64 no_device; /* PCI device not found */ 132 u64 no_dn; /* OF node not found */ 133 u64 no_cfg_addr; /* Config address not found */ 134 u64 ignored_check; /* EEH check skipped */ 135 u64 total_mmio_ffs; /* Total EEH checks */ 136 u64 false_positives; /* Unnecessary EEH checks */ 137 u64 slot_resets; /* PE reset */ 138 }; 139 140 static struct eeh_stats eeh_stats; 141 142 static int __init eeh_setup(char *str) 143 { 144 if (!strcmp(str, "off")) 145 eeh_add_flag(EEH_FORCE_DISABLED); 146 else if (!strcmp(str, "early_log")) 147 eeh_add_flag(EEH_EARLY_DUMP_LOG); 148 149 return 1; 150 } 151 __setup("eeh=", eeh_setup); 152 153 void eeh_show_enabled(void) 154 { 155 if (eeh_has_flag(EEH_FORCE_DISABLED)) 156 pr_info("EEH: Recovery disabled by kernel parameter.\n"); 157 else if (eeh_has_flag(EEH_ENABLED)) 158 pr_info("EEH: Capable adapter found: recovery enabled.\n"); 159 else 160 pr_info("EEH: No capable adapters found: recovery disabled.\n"); 161 } 162 163 /* 164 * This routine captures assorted PCI configuration space data 165 * for the indicated PCI device, and puts them into a buffer 166 * for RTAS error logging. 167 */ 168 static size_t eeh_dump_dev_log(struct eeh_dev *edev, char *buf, size_t len) 169 { 170 u32 cfg; 171 int cap, i; 172 int n = 0, l = 0; 173 char buffer[128]; 174 175 n += scnprintf(buf+n, len-n, "%04x:%02x:%02x.%01x\n", 176 edev->pe->phb->global_number, edev->bdfn >> 8, 177 PCI_SLOT(edev->bdfn), PCI_FUNC(edev->bdfn)); 178 pr_warn("EEH: of node=%04x:%02x:%02x.%01x\n", 179 edev->pe->phb->global_number, edev->bdfn >> 8, 180 PCI_SLOT(edev->bdfn), PCI_FUNC(edev->bdfn)); 181 182 eeh_ops->read_config(edev, PCI_VENDOR_ID, 4, &cfg); 183 n += scnprintf(buf+n, len-n, "dev/vend:%08x\n", cfg); 184 pr_warn("EEH: PCI device/vendor: %08x\n", cfg); 185 186 eeh_ops->read_config(edev, PCI_COMMAND, 4, &cfg); 187 n += scnprintf(buf+n, len-n, "cmd/stat:%x\n", cfg); 188 pr_warn("EEH: PCI cmd/status register: %08x\n", cfg); 189 190 /* Gather bridge-specific registers */ 191 if (edev->mode & EEH_DEV_BRIDGE) { 192 eeh_ops->read_config(edev, PCI_SEC_STATUS, 2, &cfg); 193 n += scnprintf(buf+n, len-n, "sec stat:%x\n", cfg); 194 pr_warn("EEH: Bridge secondary status: %04x\n", cfg); 195 196 eeh_ops->read_config(edev, PCI_BRIDGE_CONTROL, 2, &cfg); 197 n += scnprintf(buf+n, len-n, "brdg ctl:%x\n", cfg); 198 pr_warn("EEH: Bridge control: %04x\n", cfg); 199 } 200 201 /* Dump out the PCI-X command and status regs */ 202 cap = edev->pcix_cap; 203 if (cap) { 204 eeh_ops->read_config(edev, cap, 4, &cfg); 205 n += scnprintf(buf+n, len-n, "pcix-cmd:%x\n", cfg); 206 pr_warn("EEH: PCI-X cmd: %08x\n", cfg); 207 208 eeh_ops->read_config(edev, cap+4, 4, &cfg); 209 n += scnprintf(buf+n, len-n, "pcix-stat:%x\n", cfg); 210 pr_warn("EEH: PCI-X status: %08x\n", cfg); 211 } 212 213 /* If PCI-E capable, dump PCI-E cap 10 */ 214 cap = edev->pcie_cap; 215 if (cap) { 216 n += scnprintf(buf+n, len-n, "pci-e cap10:\n"); 217 pr_warn("EEH: PCI-E capabilities and status follow:\n"); 218 219 for (i=0; i<=8; i++) { 220 eeh_ops->read_config(edev, cap+4*i, 4, &cfg); 221 n += scnprintf(buf+n, len-n, "%02x:%x\n", 4*i, cfg); 222 223 if ((i % 4) == 0) { 224 if (i != 0) 225 pr_warn("%s\n", buffer); 226 227 l = scnprintf(buffer, sizeof(buffer), 228 "EEH: PCI-E %02x: %08x ", 229 4*i, cfg); 230 } else { 231 l += scnprintf(buffer+l, sizeof(buffer)-l, 232 "%08x ", cfg); 233 } 234 235 } 236 237 pr_warn("%s\n", buffer); 238 } 239 240 /* If AER capable, dump it */ 241 cap = edev->aer_cap; 242 if (cap) { 243 n += scnprintf(buf+n, len-n, "pci-e AER:\n"); 244 pr_warn("EEH: PCI-E AER capability register set follows:\n"); 245 246 for (i=0; i<=13; i++) { 247 eeh_ops->read_config(edev, cap+4*i, 4, &cfg); 248 n += scnprintf(buf+n, len-n, "%02x:%x\n", 4*i, cfg); 249 250 if ((i % 4) == 0) { 251 if (i != 0) 252 pr_warn("%s\n", buffer); 253 254 l = scnprintf(buffer, sizeof(buffer), 255 "EEH: PCI-E AER %02x: %08x ", 256 4*i, cfg); 257 } else { 258 l += scnprintf(buffer+l, sizeof(buffer)-l, 259 "%08x ", cfg); 260 } 261 } 262 263 pr_warn("%s\n", buffer); 264 } 265 266 return n; 267 } 268 269 static void *eeh_dump_pe_log(struct eeh_pe *pe, void *flag) 270 { 271 struct eeh_dev *edev, *tmp; 272 size_t *plen = flag; 273 274 eeh_pe_for_each_dev(pe, edev, tmp) 275 *plen += eeh_dump_dev_log(edev, pci_regs_buf + *plen, 276 EEH_PCI_REGS_LOG_LEN - *plen); 277 278 return NULL; 279 } 280 281 /** 282 * eeh_slot_error_detail - Generate combined log including driver log and error log 283 * @pe: EEH PE 284 * @severity: temporary or permanent error log 285 * 286 * This routine should be called to generate the combined log, which 287 * is comprised of driver log and error log. The driver log is figured 288 * out from the config space of the corresponding PCI device, while 289 * the error log is fetched through platform dependent function call. 290 */ 291 void eeh_slot_error_detail(struct eeh_pe *pe, int severity) 292 { 293 size_t loglen = 0; 294 295 /* 296 * When the PHB is fenced or dead, it's pointless to collect 297 * the data from PCI config space because it should return 298 * 0xFF's. For ER, we still retrieve the data from the PCI 299 * config space. 300 * 301 * For pHyp, we have to enable IO for log retrieval. Otherwise, 302 * 0xFF's is always returned from PCI config space. 303 * 304 * When the @severity is EEH_LOG_PERM, the PE is going to be 305 * removed. Prior to that, the drivers for devices included in 306 * the PE will be closed. The drivers rely on working IO path 307 * to bring the devices to quiet state. Otherwise, PCI traffic 308 * from those devices after they are removed is like to cause 309 * another unexpected EEH error. 310 */ 311 if (!(pe->type & EEH_PE_PHB)) { 312 if (eeh_has_flag(EEH_ENABLE_IO_FOR_LOG) || 313 severity == EEH_LOG_PERM) 314 eeh_pci_enable(pe, EEH_OPT_THAW_MMIO); 315 316 /* 317 * The config space of some PCI devices can't be accessed 318 * when their PEs are in frozen state. Otherwise, fenced 319 * PHB might be seen. Those PEs are identified with flag 320 * EEH_PE_CFG_RESTRICTED, indicating EEH_PE_CFG_BLOCKED 321 * is set automatically when the PE is put to EEH_PE_ISOLATED. 322 * 323 * Restoring BARs possibly triggers PCI config access in 324 * (OPAL) firmware and then causes fenced PHB. If the 325 * PCI config is blocked with flag EEH_PE_CFG_BLOCKED, it's 326 * pointless to restore BARs and dump config space. 327 */ 328 eeh_ops->configure_bridge(pe); 329 if (!(pe->state & EEH_PE_CFG_BLOCKED)) { 330 eeh_pe_restore_bars(pe); 331 332 pci_regs_buf[0] = 0; 333 eeh_pe_traverse(pe, eeh_dump_pe_log, &loglen); 334 } 335 } 336 337 eeh_ops->get_log(pe, severity, pci_regs_buf, loglen); 338 } 339 340 /** 341 * eeh_token_to_phys - Convert EEH address token to phys address 342 * @token: I/O token, should be address in the form 0xA.... 343 * 344 * This routine should be called to convert virtual I/O address 345 * to physical one. 346 */ 347 static inline unsigned long eeh_token_to_phys(unsigned long token) 348 { 349 return ppc_find_vmap_phys(token); 350 } 351 352 /* 353 * On PowerNV platform, we might already have fenced PHB there. 354 * For that case, it's meaningless to recover frozen PE. Intead, 355 * We have to handle fenced PHB firstly. 356 */ 357 static int eeh_phb_check_failure(struct eeh_pe *pe) 358 { 359 struct eeh_pe *phb_pe; 360 unsigned long flags; 361 int ret; 362 363 if (!eeh_has_flag(EEH_PROBE_MODE_DEV)) 364 return -EPERM; 365 366 /* Find the PHB PE */ 367 phb_pe = eeh_phb_pe_get(pe->phb); 368 if (!phb_pe) { 369 pr_warn("%s Can't find PE for PHB#%x\n", 370 __func__, pe->phb->global_number); 371 return -EEXIST; 372 } 373 374 /* If the PHB has been in problematic state */ 375 eeh_serialize_lock(&flags); 376 if (phb_pe->state & EEH_PE_ISOLATED) { 377 ret = 0; 378 goto out; 379 } 380 381 /* Check PHB state */ 382 ret = eeh_ops->get_state(phb_pe, NULL); 383 if ((ret < 0) || 384 (ret == EEH_STATE_NOT_SUPPORT) || eeh_state_active(ret)) { 385 ret = 0; 386 goto out; 387 } 388 389 /* Isolate the PHB and send event */ 390 eeh_pe_mark_isolated(phb_pe); 391 eeh_serialize_unlock(flags); 392 393 pr_debug("EEH: PHB#%x failure detected, location: %s\n", 394 phb_pe->phb->global_number, eeh_pe_loc_get(phb_pe)); 395 eeh_send_failure_event(phb_pe); 396 return 1; 397 out: 398 eeh_serialize_unlock(flags); 399 return ret; 400 } 401 402 static inline const char *eeh_driver_name(struct pci_dev *pdev) 403 { 404 if (pdev) 405 return dev_driver_string(&pdev->dev); 406 407 return "<null>"; 408 } 409 410 /** 411 * eeh_dev_check_failure - Check if all 1's data is due to EEH slot freeze 412 * @edev: eeh device 413 * 414 * Check for an EEH failure for the given device node. Call this 415 * routine if the result of a read was all 0xff's and you want to 416 * find out if this is due to an EEH slot freeze. This routine 417 * will query firmware for the EEH status. 418 * 419 * Returns 0 if there has not been an EEH error; otherwise returns 420 * a non-zero value and queues up a slot isolation event notification. 421 * 422 * It is safe to call this routine in an interrupt context. 423 */ 424 int eeh_dev_check_failure(struct eeh_dev *edev) 425 { 426 int ret; 427 unsigned long flags; 428 struct device_node *dn; 429 struct pci_dev *dev; 430 struct eeh_pe *pe, *parent_pe; 431 int rc = 0; 432 const char *location = NULL; 433 434 eeh_stats.total_mmio_ffs++; 435 436 if (!eeh_enabled()) 437 return 0; 438 439 if (!edev) { 440 eeh_stats.no_dn++; 441 return 0; 442 } 443 dev = eeh_dev_to_pci_dev(edev); 444 pe = eeh_dev_to_pe(edev); 445 446 /* Access to IO BARs might get this far and still not want checking. */ 447 if (!pe) { 448 eeh_stats.ignored_check++; 449 eeh_edev_dbg(edev, "Ignored check\n"); 450 return 0; 451 } 452 453 /* 454 * On PowerNV platform, we might already have fenced PHB 455 * there and we need take care of that firstly. 456 */ 457 ret = eeh_phb_check_failure(pe); 458 if (ret > 0) 459 return ret; 460 461 /* 462 * If the PE isn't owned by us, we shouldn't check the 463 * state. Instead, let the owner handle it if the PE has 464 * been frozen. 465 */ 466 if (eeh_pe_passed(pe)) 467 return 0; 468 469 /* If we already have a pending isolation event for this 470 * slot, we know it's bad already, we don't need to check. 471 * Do this checking under a lock; as multiple PCI devices 472 * in one slot might report errors simultaneously, and we 473 * only want one error recovery routine running. 474 */ 475 eeh_serialize_lock(&flags); 476 rc = 1; 477 if (pe->state & EEH_PE_ISOLATED) { 478 pe->check_count++; 479 if (pe->check_count == EEH_MAX_FAILS) { 480 dn = pci_device_to_OF_node(dev); 481 if (dn) 482 location = of_get_property(dn, "ibm,loc-code", 483 NULL); 484 eeh_edev_err(edev, "%d reads ignored for recovering device at location=%s driver=%s\n", 485 pe->check_count, 486 location ? location : "unknown", 487 eeh_driver_name(dev)); 488 eeh_edev_err(edev, "Might be infinite loop in %s driver\n", 489 eeh_driver_name(dev)); 490 dump_stack(); 491 } 492 goto dn_unlock; 493 } 494 495 /* 496 * Now test for an EEH failure. This is VERY expensive. 497 * Note that the eeh_config_addr may be a parent device 498 * in the case of a device behind a bridge, or it may be 499 * function zero of a multi-function device. 500 * In any case they must share a common PHB. 501 */ 502 ret = eeh_ops->get_state(pe, NULL); 503 504 /* Note that config-io to empty slots may fail; 505 * they are empty when they don't have children. 506 * We will punt with the following conditions: Failure to get 507 * PE's state, EEH not support and Permanently unavailable 508 * state, PE is in good state. 509 * 510 * On the pSeries, after reaching the threshold, get_state might 511 * return EEH_STATE_NOT_SUPPORT. However, it's possible that the 512 * device state remains uncleared if the device is not marked 513 * pci_channel_io_perm_failure. Therefore, consider logging the 514 * event to let device removal happen. 515 * 516 */ 517 if ((ret < 0) || 518 (ret == EEH_STATE_NOT_SUPPORT && 519 dev->error_state == pci_channel_io_perm_failure) || 520 eeh_state_active(ret)) { 521 eeh_stats.false_positives++; 522 pe->false_positives++; 523 rc = 0; 524 goto dn_unlock; 525 } 526 527 /* 528 * It should be corner case that the parent PE has been 529 * put into frozen state as well. We should take care 530 * that at first. 531 */ 532 parent_pe = pe->parent; 533 while (parent_pe) { 534 /* Hit the ceiling ? */ 535 if (parent_pe->type & EEH_PE_PHB) 536 break; 537 538 /* Frozen parent PE ? */ 539 ret = eeh_ops->get_state(parent_pe, NULL); 540 if (ret > 0 && !eeh_state_active(ret)) { 541 pe = parent_pe; 542 pr_err("EEH: Failure of PHB#%x-PE#%x will be handled at parent PHB#%x-PE#%x.\n", 543 pe->phb->global_number, pe->addr, 544 pe->phb->global_number, parent_pe->addr); 545 } 546 547 /* Next parent level */ 548 parent_pe = parent_pe->parent; 549 } 550 551 eeh_stats.slot_resets++; 552 553 /* Avoid repeated reports of this failure, including problems 554 * with other functions on this device, and functions under 555 * bridges. 556 */ 557 eeh_pe_mark_isolated(pe); 558 eeh_serialize_unlock(flags); 559 560 /* Most EEH events are due to device driver bugs. Having 561 * a stack trace will help the device-driver authors figure 562 * out what happened. So print that out. 563 */ 564 pr_debug("EEH: %s: Frozen PHB#%x-PE#%x detected\n", 565 __func__, pe->phb->global_number, pe->addr); 566 eeh_send_failure_event(pe); 567 568 return 1; 569 570 dn_unlock: 571 eeh_serialize_unlock(flags); 572 return rc; 573 } 574 575 EXPORT_SYMBOL_GPL(eeh_dev_check_failure); 576 577 /** 578 * eeh_check_failure - Check if all 1's data is due to EEH slot freeze 579 * @token: I/O address 580 * 581 * Check for an EEH failure at the given I/O address. Call this 582 * routine if the result of a read was all 0xff's and you want to 583 * find out if this is due to an EEH slot freeze event. This routine 584 * will query firmware for the EEH status. 585 * 586 * Note this routine is safe to call in an interrupt context. 587 */ 588 int eeh_check_failure(const volatile void __iomem *token) 589 { 590 unsigned long addr; 591 struct eeh_dev *edev; 592 593 /* Finding the phys addr + pci device; this is pretty quick. */ 594 addr = eeh_token_to_phys((unsigned long __force) token); 595 edev = eeh_addr_cache_get_dev(addr); 596 if (!edev) { 597 eeh_stats.no_device++; 598 return 0; 599 } 600 601 return eeh_dev_check_failure(edev); 602 } 603 EXPORT_SYMBOL(eeh_check_failure); 604 605 606 /** 607 * eeh_pci_enable - Enable MMIO or DMA transfers for this slot 608 * @pe: EEH PE 609 * @function: EEH option 610 * 611 * This routine should be called to reenable frozen MMIO or DMA 612 * so that it would work correctly again. It's useful while doing 613 * recovery or log collection on the indicated device. 614 */ 615 int eeh_pci_enable(struct eeh_pe *pe, int function) 616 { 617 int active_flag, rc; 618 619 /* 620 * pHyp doesn't allow to enable IO or DMA on unfrozen PE. 621 * Also, it's pointless to enable them on unfrozen PE. So 622 * we have to check before enabling IO or DMA. 623 */ 624 switch (function) { 625 case EEH_OPT_THAW_MMIO: 626 active_flag = EEH_STATE_MMIO_ACTIVE | EEH_STATE_MMIO_ENABLED; 627 break; 628 case EEH_OPT_THAW_DMA: 629 active_flag = EEH_STATE_DMA_ACTIVE; 630 break; 631 case EEH_OPT_DISABLE: 632 case EEH_OPT_ENABLE: 633 case EEH_OPT_FREEZE_PE: 634 active_flag = 0; 635 break; 636 default: 637 pr_warn("%s: Invalid function %d\n", 638 __func__, function); 639 return -EINVAL; 640 } 641 642 /* 643 * Check if IO or DMA has been enabled before 644 * enabling them. 645 */ 646 if (active_flag) { 647 rc = eeh_ops->get_state(pe, NULL); 648 if (rc < 0) 649 return rc; 650 651 /* Needn't enable it at all */ 652 if (rc == EEH_STATE_NOT_SUPPORT) 653 return 0; 654 655 /* It's already enabled */ 656 if (rc & active_flag) 657 return 0; 658 } 659 660 661 /* Issue the request */ 662 rc = eeh_ops->set_option(pe, function); 663 if (rc) 664 pr_warn("%s: Unexpected state change %d on " 665 "PHB#%x-PE#%x, err=%d\n", 666 __func__, function, pe->phb->global_number, 667 pe->addr, rc); 668 669 /* Check if the request is finished successfully */ 670 if (active_flag) { 671 rc = eeh_wait_state(pe, PCI_BUS_RESET_WAIT_MSEC); 672 if (rc < 0) 673 return rc; 674 675 if (rc & active_flag) 676 return 0; 677 678 return -EIO; 679 } 680 681 return rc; 682 } 683 684 static void eeh_disable_and_save_dev_state(struct eeh_dev *edev, 685 void *userdata) 686 { 687 struct pci_dev *pdev = eeh_dev_to_pci_dev(edev); 688 struct pci_dev *dev = userdata; 689 690 /* 691 * The caller should have disabled and saved the 692 * state for the specified device 693 */ 694 if (!pdev || pdev == dev) 695 return; 696 697 /* Ensure we have D0 power state */ 698 pci_set_power_state(pdev, PCI_D0); 699 700 /* Save device state */ 701 pci_save_state(pdev); 702 703 /* 704 * Disable device to avoid any DMA traffic and 705 * interrupt from the device 706 */ 707 pci_write_config_word(pdev, PCI_COMMAND, PCI_COMMAND_INTX_DISABLE); 708 } 709 710 static void eeh_restore_dev_state(struct eeh_dev *edev, void *userdata) 711 { 712 struct pci_dev *pdev = eeh_dev_to_pci_dev(edev); 713 struct pci_dev *dev = userdata; 714 715 if (!pdev) 716 return; 717 718 /* Apply customization from firmware */ 719 if (eeh_ops->restore_config) 720 eeh_ops->restore_config(edev); 721 722 /* The caller should restore state for the specified device */ 723 if (pdev != dev) 724 pci_restore_state(pdev); 725 } 726 727 /** 728 * pcibios_set_pcie_reset_state - Set PCI-E reset state 729 * @dev: pci device struct 730 * @state: reset state to enter 731 * 732 * Return value: 733 * 0 if success 734 */ 735 int pcibios_set_pcie_reset_state(struct pci_dev *dev, enum pcie_reset_state state) 736 { 737 struct eeh_dev *edev = pci_dev_to_eeh_dev(dev); 738 struct eeh_pe *pe = eeh_dev_to_pe(edev); 739 740 if (!pe) { 741 pr_err("%s: No PE found on PCI device %s\n", 742 __func__, pci_name(dev)); 743 return -EINVAL; 744 } 745 746 switch (state) { 747 case pcie_deassert_reset: 748 eeh_ops->reset(pe, EEH_RESET_DEACTIVATE); 749 eeh_unfreeze_pe(pe); 750 if (!(pe->type & EEH_PE_VF)) 751 eeh_pe_state_clear(pe, EEH_PE_CFG_BLOCKED, true); 752 eeh_pe_dev_traverse(pe, eeh_restore_dev_state, dev); 753 eeh_pe_state_clear(pe, EEH_PE_ISOLATED, true); 754 break; 755 case pcie_hot_reset: 756 eeh_pe_mark_isolated(pe); 757 eeh_pe_state_clear(pe, EEH_PE_CFG_BLOCKED, true); 758 eeh_ops->set_option(pe, EEH_OPT_FREEZE_PE); 759 eeh_pe_dev_traverse(pe, eeh_disable_and_save_dev_state, dev); 760 if (!(pe->type & EEH_PE_VF)) 761 eeh_pe_state_mark(pe, EEH_PE_CFG_BLOCKED); 762 eeh_ops->reset(pe, EEH_RESET_HOT); 763 break; 764 case pcie_warm_reset: 765 eeh_pe_mark_isolated(pe); 766 eeh_pe_state_clear(pe, EEH_PE_CFG_BLOCKED, true); 767 eeh_ops->set_option(pe, EEH_OPT_FREEZE_PE); 768 eeh_pe_dev_traverse(pe, eeh_disable_and_save_dev_state, dev); 769 if (!(pe->type & EEH_PE_VF)) 770 eeh_pe_state_mark(pe, EEH_PE_CFG_BLOCKED); 771 eeh_ops->reset(pe, EEH_RESET_FUNDAMENTAL); 772 break; 773 default: 774 eeh_pe_state_clear(pe, EEH_PE_ISOLATED | EEH_PE_CFG_BLOCKED, true); 775 return -EINVAL; 776 } 777 778 return 0; 779 } 780 781 /** 782 * eeh_set_dev_freset - Check the required reset for the indicated device 783 * @edev: EEH device 784 * @flag: return value 785 * 786 * Each device might have its preferred reset type: fundamental or 787 * hot reset. The routine is used to collected the information for 788 * the indicated device and its children so that the bunch of the 789 * devices could be reset properly. 790 */ 791 static void eeh_set_dev_freset(struct eeh_dev *edev, void *flag) 792 { 793 struct pci_dev *dev; 794 unsigned int *freset = (unsigned int *)flag; 795 796 dev = eeh_dev_to_pci_dev(edev); 797 if (dev) 798 *freset |= dev->needs_freset; 799 } 800 801 static void eeh_pe_refreeze_passed(struct eeh_pe *root) 802 { 803 struct eeh_pe *pe; 804 int state; 805 806 eeh_for_each_pe(root, pe) { 807 if (eeh_pe_passed(pe)) { 808 state = eeh_ops->get_state(pe, NULL); 809 if (state & 810 (EEH_STATE_MMIO_ACTIVE | EEH_STATE_MMIO_ENABLED)) { 811 pr_info("EEH: Passed-through PE PHB#%x-PE#%x was thawed by reset, re-freezing for safety.\n", 812 pe->phb->global_number, pe->addr); 813 eeh_pe_set_option(pe, EEH_OPT_FREEZE_PE); 814 } 815 } 816 } 817 } 818 819 /** 820 * eeh_pe_reset_full - Complete a full reset process on the indicated PE 821 * @pe: EEH PE 822 * @include_passed: include passed-through devices? 823 * 824 * This function executes a full reset procedure on a PE, including setting 825 * the appropriate flags, performing a fundamental or hot reset, and then 826 * deactivating the reset status. It is designed to be used within the EEH 827 * subsystem, as opposed to eeh_pe_reset which is exported to drivers and 828 * only performs a single operation at a time. 829 * 830 * This function will attempt to reset a PE three times before failing. 831 */ 832 int eeh_pe_reset_full(struct eeh_pe *pe, bool include_passed) 833 { 834 int reset_state = (EEH_PE_RESET | EEH_PE_CFG_BLOCKED); 835 int type = EEH_RESET_HOT; 836 unsigned int freset = 0; 837 int i, state = 0, ret; 838 839 /* 840 * Determine the type of reset to perform - hot or fundamental. 841 * Hot reset is the default operation, unless any device under the 842 * PE requires a fundamental reset. 843 */ 844 eeh_pe_dev_traverse(pe, eeh_set_dev_freset, &freset); 845 846 if (freset) 847 type = EEH_RESET_FUNDAMENTAL; 848 849 /* Mark the PE as in reset state and block config space accesses */ 850 eeh_pe_state_mark(pe, reset_state); 851 852 /* Make three attempts at resetting the bus */ 853 for (i = 0; i < 3; i++) { 854 ret = eeh_pe_reset(pe, type, include_passed); 855 if (!ret) 856 ret = eeh_pe_reset(pe, EEH_RESET_DEACTIVATE, 857 include_passed); 858 if (ret) { 859 ret = -EIO; 860 pr_warn("EEH: Failure %d resetting PHB#%x-PE#%x (attempt %d)\n\n", 861 state, pe->phb->global_number, pe->addr, i + 1); 862 continue; 863 } 864 if (i) 865 pr_warn("EEH: PHB#%x-PE#%x: Successful reset (attempt %d)\n", 866 pe->phb->global_number, pe->addr, i + 1); 867 868 /* Wait until the PE is in a functioning state */ 869 state = eeh_wait_state(pe, PCI_BUS_RESET_WAIT_MSEC); 870 if (state < 0) { 871 pr_warn("EEH: Unrecoverable slot failure on PHB#%x-PE#%x", 872 pe->phb->global_number, pe->addr); 873 ret = -ENOTRECOVERABLE; 874 break; 875 } 876 if (eeh_state_active(state)) 877 break; 878 else 879 pr_warn("EEH: PHB#%x-PE#%x: Slot inactive after reset: 0x%x (attempt %d)\n", 880 pe->phb->global_number, pe->addr, state, i + 1); 881 } 882 883 /* Resetting the PE may have unfrozen child PEs. If those PEs have been 884 * (potentially) passed through to a guest, re-freeze them: 885 */ 886 if (!include_passed) 887 eeh_pe_refreeze_passed(pe); 888 889 eeh_pe_state_clear(pe, reset_state, true); 890 return ret; 891 } 892 893 /** 894 * eeh_save_bars - Save device bars 895 * @edev: PCI device associated EEH device 896 * 897 * Save the values of the device bars. Unlike the restore 898 * routine, this routine is *not* recursive. This is because 899 * PCI devices are added individually; but, for the restore, 900 * an entire slot is reset at a time. 901 */ 902 void eeh_save_bars(struct eeh_dev *edev) 903 { 904 int i; 905 906 if (!edev) 907 return; 908 909 for (i = 0; i < 16; i++) 910 eeh_ops->read_config(edev, i * 4, 4, &edev->config_space[i]); 911 912 /* 913 * For PCI bridges including root port, we need enable bus 914 * master explicitly. Otherwise, it can't fetch IODA table 915 * entries correctly. So we cache the bit in advance so that 916 * we can restore it after reset, either PHB range or PE range. 917 */ 918 if (edev->mode & EEH_DEV_BRIDGE) 919 edev->config_space[1] |= PCI_COMMAND_MASTER; 920 } 921 922 static int eeh_reboot_notifier(struct notifier_block *nb, 923 unsigned long action, void *unused) 924 { 925 eeh_clear_flag(EEH_ENABLED); 926 return NOTIFY_DONE; 927 } 928 929 static struct notifier_block eeh_reboot_nb = { 930 .notifier_call = eeh_reboot_notifier, 931 }; 932 933 static int eeh_device_notifier(struct notifier_block *nb, 934 unsigned long action, void *data) 935 { 936 struct device *dev = data; 937 938 switch (action) { 939 /* 940 * Note: It's not possible to perform EEH device addition (i.e. 941 * {pseries,pnv}_pcibios_bus_add_device()) here because it depends on 942 * the device's resources, which have not yet been set up. 943 */ 944 case BUS_NOTIFY_DEL_DEVICE: 945 eeh_remove_device(to_pci_dev(dev)); 946 break; 947 default: 948 break; 949 } 950 return NOTIFY_DONE; 951 } 952 953 static struct notifier_block eeh_device_nb = { 954 .notifier_call = eeh_device_notifier, 955 }; 956 957 /** 958 * eeh_init - System wide EEH initialization 959 * @ops: struct to trace EEH operation callback functions 960 * 961 * It's the platform's job to call this from an arch_initcall(). 962 */ 963 int eeh_init(struct eeh_ops *ops) 964 { 965 struct pci_controller *hose, *tmp; 966 int ret = 0; 967 968 /* the platform should only initialise EEH once */ 969 if (WARN_ON(eeh_ops)) 970 return -EEXIST; 971 if (WARN_ON(!ops)) 972 return -ENOENT; 973 eeh_ops = ops; 974 975 /* Register reboot notifier */ 976 ret = register_reboot_notifier(&eeh_reboot_nb); 977 if (ret) { 978 pr_warn("%s: Failed to register reboot notifier (%d)\n", 979 __func__, ret); 980 return ret; 981 } 982 983 ret = bus_register_notifier(&pci_bus_type, &eeh_device_nb); 984 if (ret) { 985 pr_warn("%s: Failed to register bus notifier (%d)\n", 986 __func__, ret); 987 return ret; 988 } 989 990 /* Initialize PHB PEs */ 991 list_for_each_entry_safe(hose, tmp, &hose_list, list_node) 992 eeh_phb_pe_create(hose); 993 994 eeh_addr_cache_init(); 995 996 /* Initialize EEH event */ 997 return eeh_event_init(); 998 } 999 1000 /** 1001 * eeh_probe_device() - Perform EEH initialization for the indicated pci device 1002 * @dev: pci device for which to set up EEH 1003 * 1004 * This routine must be used to complete EEH initialization for PCI 1005 * devices that were added after system boot (e.g. hotplug, dlpar). 1006 */ 1007 void eeh_probe_device(struct pci_dev *dev) 1008 { 1009 struct eeh_dev *edev; 1010 1011 pr_debug("EEH: Adding device %s\n", pci_name(dev)); 1012 1013 /* 1014 * pci_dev_to_eeh_dev() can only work if eeh_probe_dev() was 1015 * already called for this device. 1016 */ 1017 if (WARN_ON_ONCE(pci_dev_to_eeh_dev(dev))) { 1018 pci_dbg(dev, "Already bound to an eeh_dev!\n"); 1019 return; 1020 } 1021 1022 edev = eeh_ops->probe(dev); 1023 if (!edev) { 1024 pr_debug("EEH: Adding device failed\n"); 1025 return; 1026 } 1027 1028 /* 1029 * FIXME: We rely on pcibios_release_device() to remove the 1030 * existing EEH state. The release function is only called if 1031 * the pci_dev's refcount drops to zero so if something is 1032 * keeping a ref to a device (e.g. a filesystem) we need to 1033 * remove the old EEH state. 1034 * 1035 * FIXME: HEY MA, LOOK AT ME, NO LOCKING! 1036 */ 1037 if (edev->pdev && edev->pdev != dev) { 1038 eeh_pe_tree_remove(edev); 1039 eeh_addr_cache_rmv_dev(edev->pdev); 1040 eeh_sysfs_remove_device(edev->pdev); 1041 1042 /* 1043 * We definitely should have the PCI device removed 1044 * though it wasn't correctly. So we needn't call 1045 * into error handler afterwards. 1046 */ 1047 edev->mode |= EEH_DEV_NO_HANDLER; 1048 } 1049 1050 /* bind the pdev and the edev together */ 1051 edev->pdev = dev; 1052 dev->dev.archdata.edev = edev; 1053 eeh_addr_cache_insert_dev(dev); 1054 eeh_sysfs_add_device(dev); 1055 } 1056 1057 /** 1058 * eeh_remove_device - Undo EEH setup for the indicated pci device 1059 * @dev: pci device to be removed 1060 * 1061 * This routine should be called when a device is removed from 1062 * a running system (e.g. by hotplug or dlpar). It unregisters 1063 * the PCI device from the EEH subsystem. I/O errors affecting 1064 * this device will no longer be detected after this call; thus, 1065 * i/o errors affecting this slot may leave this device unusable. 1066 */ 1067 void eeh_remove_device(struct pci_dev *dev) 1068 { 1069 struct eeh_dev *edev; 1070 1071 if (!dev || !eeh_enabled()) 1072 return; 1073 edev = pci_dev_to_eeh_dev(dev); 1074 1075 /* Unregister the device with the EEH/PCI address search system */ 1076 dev_dbg(&dev->dev, "EEH: Removing device\n"); 1077 1078 if (!edev || !edev->pdev || !edev->pe) { 1079 dev_dbg(&dev->dev, "EEH: Device not referenced!\n"); 1080 return; 1081 } 1082 1083 /* 1084 * During the hotplug for EEH error recovery, we need the EEH 1085 * device attached to the parent PE in order for BAR restore 1086 * a bit later. So we keep it for BAR restore and remove it 1087 * from the parent PE during the BAR resotre. 1088 */ 1089 edev->pdev = NULL; 1090 1091 /* 1092 * eeh_sysfs_remove_device() uses pci_dev_to_eeh_dev() so we need to 1093 * remove the sysfs files before clearing dev.archdata.edev 1094 */ 1095 if (edev->mode & EEH_DEV_SYSFS) 1096 eeh_sysfs_remove_device(dev); 1097 1098 /* 1099 * We're removing from the PCI subsystem, that means 1100 * the PCI device driver can't support EEH or not 1101 * well. So we rely on hotplug completely to do recovery 1102 * for the specific PCI device. 1103 */ 1104 edev->mode |= EEH_DEV_NO_HANDLER; 1105 1106 eeh_addr_cache_rmv_dev(dev); 1107 1108 /* 1109 * The flag "in_error" is used to trace EEH devices for VFs 1110 * in error state or not. It's set in eeh_report_error(). If 1111 * it's not set, eeh_report_{reset,resume}() won't be called 1112 * for the VF EEH device. 1113 */ 1114 edev->in_error = false; 1115 dev->dev.archdata.edev = NULL; 1116 if (!(edev->pe->state & EEH_PE_KEEP)) 1117 eeh_pe_tree_remove(edev); 1118 else 1119 edev->mode |= EEH_DEV_DISCONNECTED; 1120 } 1121 1122 int eeh_unfreeze_pe(struct eeh_pe *pe) 1123 { 1124 int ret; 1125 1126 ret = eeh_pci_enable(pe, EEH_OPT_THAW_MMIO); 1127 if (ret) { 1128 pr_warn("%s: Failure %d enabling IO on PHB#%x-PE#%x\n", 1129 __func__, ret, pe->phb->global_number, pe->addr); 1130 return ret; 1131 } 1132 1133 ret = eeh_pci_enable(pe, EEH_OPT_THAW_DMA); 1134 if (ret) { 1135 pr_warn("%s: Failure %d enabling DMA on PHB#%x-PE#%x\n", 1136 __func__, ret, pe->phb->global_number, pe->addr); 1137 return ret; 1138 } 1139 1140 return ret; 1141 } 1142 1143 1144 static struct pci_device_id eeh_reset_ids[] = { 1145 { PCI_DEVICE(0x19a2, 0x0710) }, /* Emulex, BE */ 1146 { PCI_DEVICE(0x10df, 0xe220) }, /* Emulex, Lancer */ 1147 { PCI_DEVICE(0x14e4, 0x1657) }, /* Broadcom BCM5719 */ 1148 { 0 } 1149 }; 1150 1151 static int eeh_pe_change_owner(struct eeh_pe *pe) 1152 { 1153 struct eeh_dev *edev, *tmp; 1154 struct pci_dev *pdev; 1155 struct pci_device_id *id; 1156 int ret; 1157 1158 /* Check PE state */ 1159 ret = eeh_ops->get_state(pe, NULL); 1160 if (ret < 0 || ret == EEH_STATE_NOT_SUPPORT) 1161 return 0; 1162 1163 /* Unfrozen PE, nothing to do */ 1164 if (eeh_state_active(ret)) 1165 return 0; 1166 1167 /* Frozen PE, check if it needs PE level reset */ 1168 eeh_pe_for_each_dev(pe, edev, tmp) { 1169 pdev = eeh_dev_to_pci_dev(edev); 1170 if (!pdev) 1171 continue; 1172 1173 for (id = &eeh_reset_ids[0]; id->vendor != 0; id++) { 1174 if (id->vendor != PCI_ANY_ID && 1175 id->vendor != pdev->vendor) 1176 continue; 1177 if (id->device != PCI_ANY_ID && 1178 id->device != pdev->device) 1179 continue; 1180 if (id->subvendor != PCI_ANY_ID && 1181 id->subvendor != pdev->subsystem_vendor) 1182 continue; 1183 if (id->subdevice != PCI_ANY_ID && 1184 id->subdevice != pdev->subsystem_device) 1185 continue; 1186 1187 return eeh_pe_reset_and_recover(pe); 1188 } 1189 } 1190 1191 ret = eeh_unfreeze_pe(pe); 1192 if (!ret) 1193 eeh_pe_state_clear(pe, EEH_PE_ISOLATED, true); 1194 return ret; 1195 } 1196 1197 /** 1198 * eeh_dev_open - Increase count of pass through devices for PE 1199 * @pdev: PCI device 1200 * 1201 * Increase count of passed through devices for the indicated 1202 * PE. In the result, the EEH errors detected on the PE won't be 1203 * reported. The PE owner will be responsible for detection 1204 * and recovery. 1205 */ 1206 int eeh_dev_open(struct pci_dev *pdev) 1207 { 1208 struct eeh_dev *edev; 1209 int ret = -ENODEV; 1210 1211 guard(mutex)(&eeh_dev_mutex); 1212 1213 /* No PCI device ? */ 1214 if (!pdev) 1215 return ret; 1216 1217 /* No EEH device or PE ? */ 1218 edev = pci_dev_to_eeh_dev(pdev); 1219 if (!edev || !edev->pe) 1220 return ret; 1221 1222 /* 1223 * The PE might have been put into frozen state, but we 1224 * didn't detect that yet. The passed through PCI devices 1225 * in frozen PE won't work properly. Clear the frozen state 1226 * in advance. 1227 */ 1228 ret = eeh_pe_change_owner(edev->pe); 1229 if (ret) 1230 return ret; 1231 1232 /* Increase PE's pass through count */ 1233 atomic_inc(&edev->pe->pass_dev_cnt); 1234 1235 return 0; 1236 } 1237 EXPORT_SYMBOL_GPL(eeh_dev_open); 1238 1239 /** 1240 * eeh_dev_release - Decrease count of pass through devices for PE 1241 * @pdev: PCI device 1242 * 1243 * Decrease count of pass through devices for the indicated PE. If 1244 * there is no passed through device in PE, the EEH errors detected 1245 * on the PE will be reported and handled as usual. 1246 */ 1247 void eeh_dev_release(struct pci_dev *pdev) 1248 { 1249 struct eeh_dev *edev; 1250 1251 guard(mutex)(&eeh_dev_mutex); 1252 1253 /* No PCI device ? */ 1254 if (!pdev) 1255 return; 1256 1257 /* No EEH device ? */ 1258 edev = pci_dev_to_eeh_dev(pdev); 1259 if (!edev || !edev->pe || !eeh_pe_passed(edev->pe)) 1260 return; 1261 1262 /* Decrease PE's pass through count */ 1263 WARN_ON(atomic_dec_if_positive(&edev->pe->pass_dev_cnt) < 0); 1264 eeh_pe_change_owner(edev->pe); 1265 } 1266 EXPORT_SYMBOL(eeh_dev_release); 1267 1268 #ifdef CONFIG_IOMMU_API 1269 1270 /** 1271 * eeh_iommu_group_to_pe - Convert IOMMU group to EEH PE 1272 * @group: IOMMU group 1273 * 1274 * The routine is called to convert IOMMU group to EEH PE. 1275 */ 1276 struct eeh_pe *eeh_iommu_group_to_pe(struct iommu_group *group) 1277 { 1278 struct pci_dev *pdev = NULL; 1279 struct eeh_dev *edev; 1280 int ret; 1281 1282 /* No IOMMU group ? */ 1283 if (!group) 1284 return NULL; 1285 1286 ret = iommu_group_for_each_dev(group, &pdev, dev_has_iommu_table); 1287 if (!ret || !pdev) 1288 return NULL; 1289 1290 /* No EEH device or PE ? */ 1291 edev = pci_dev_to_eeh_dev(pdev); 1292 if (!edev || !edev->pe) 1293 return NULL; 1294 1295 return edev->pe; 1296 } 1297 EXPORT_SYMBOL_GPL(eeh_iommu_group_to_pe); 1298 1299 #endif /* CONFIG_IOMMU_API */ 1300 1301 /** 1302 * eeh_pe_set_option - Set options for the indicated PE 1303 * @pe: EEH PE 1304 * @option: requested option 1305 * 1306 * The routine is called to enable or disable EEH functionality 1307 * on the indicated PE, to enable IO or DMA for the frozen PE. 1308 */ 1309 int eeh_pe_set_option(struct eeh_pe *pe, int option) 1310 { 1311 int ret = 0; 1312 1313 /* Invalid PE ? */ 1314 if (!pe) 1315 return -ENODEV; 1316 1317 /* 1318 * EEH functionality could possibly be disabled, just 1319 * return error for the case. And the EEH functionality 1320 * isn't expected to be disabled on one specific PE. 1321 */ 1322 switch (option) { 1323 case EEH_OPT_ENABLE: 1324 if (eeh_enabled()) { 1325 ret = eeh_pe_change_owner(pe); 1326 break; 1327 } 1328 ret = -EIO; 1329 break; 1330 case EEH_OPT_DISABLE: 1331 break; 1332 case EEH_OPT_THAW_MMIO: 1333 case EEH_OPT_THAW_DMA: 1334 case EEH_OPT_FREEZE_PE: 1335 if (!eeh_ops || !eeh_ops->set_option) { 1336 ret = -ENOENT; 1337 break; 1338 } 1339 1340 ret = eeh_pci_enable(pe, option); 1341 break; 1342 default: 1343 pr_debug("%s: Option %d out of range (%d, %d)\n", 1344 __func__, option, EEH_OPT_DISABLE, EEH_OPT_THAW_DMA); 1345 ret = -EINVAL; 1346 } 1347 1348 return ret; 1349 } 1350 EXPORT_SYMBOL_GPL(eeh_pe_set_option); 1351 1352 /** 1353 * eeh_pe_get_state - Retrieve PE's state 1354 * @pe: EEH PE 1355 * 1356 * Retrieve the PE's state, which includes 3 aspects: enabled 1357 * DMA, enabled IO and asserted reset. 1358 */ 1359 int eeh_pe_get_state(struct eeh_pe *pe) 1360 { 1361 int result, ret = 0; 1362 bool rst_active, dma_en, mmio_en; 1363 1364 /* Existing PE ? */ 1365 if (!pe) 1366 return -ENODEV; 1367 1368 if (!eeh_ops || !eeh_ops->get_state) 1369 return -ENOENT; 1370 1371 /* 1372 * If the parent PE is owned by the host kernel and is undergoing 1373 * error recovery, we should return the PE state as temporarily 1374 * unavailable so that the error recovery on the guest is suspended 1375 * until the recovery completes on the host. 1376 */ 1377 if (pe->parent && 1378 !(pe->state & EEH_PE_REMOVED) && 1379 (pe->parent->state & (EEH_PE_ISOLATED | EEH_PE_RECOVERING))) 1380 return EEH_PE_STATE_UNAVAIL; 1381 1382 result = eeh_ops->get_state(pe, NULL); 1383 rst_active = !!(result & EEH_STATE_RESET_ACTIVE); 1384 dma_en = !!(result & EEH_STATE_DMA_ENABLED); 1385 mmio_en = !!(result & EEH_STATE_MMIO_ENABLED); 1386 1387 if (rst_active) 1388 ret = EEH_PE_STATE_RESET; 1389 else if (dma_en && mmio_en) 1390 ret = EEH_PE_STATE_NORMAL; 1391 else if (!dma_en && !mmio_en) 1392 ret = EEH_PE_STATE_STOPPED_IO_DMA; 1393 else if (!dma_en && mmio_en) 1394 ret = EEH_PE_STATE_STOPPED_DMA; 1395 else 1396 ret = EEH_PE_STATE_UNAVAIL; 1397 1398 return ret; 1399 } 1400 EXPORT_SYMBOL_GPL(eeh_pe_get_state); 1401 1402 static int eeh_pe_reenable_devices(struct eeh_pe *pe, bool include_passed) 1403 { 1404 struct eeh_dev *edev, *tmp; 1405 struct pci_dev *pdev; 1406 int ret = 0; 1407 1408 eeh_pe_restore_bars(pe); 1409 1410 /* 1411 * Reenable PCI devices as the devices passed 1412 * through are always enabled before the reset. 1413 */ 1414 eeh_pe_for_each_dev(pe, edev, tmp) { 1415 pdev = eeh_dev_to_pci_dev(edev); 1416 if (!pdev) 1417 continue; 1418 1419 ret = pci_reenable_device(pdev); 1420 if (ret) { 1421 pr_warn("%s: Failure %d reenabling %s\n", 1422 __func__, ret, pci_name(pdev)); 1423 return ret; 1424 } 1425 } 1426 1427 /* The PE is still in frozen state */ 1428 if (include_passed || !eeh_pe_passed(pe)) { 1429 ret = eeh_unfreeze_pe(pe); 1430 } else 1431 pr_info("EEH: Note: Leaving passthrough PHB#%x-PE#%x frozen.\n", 1432 pe->phb->global_number, pe->addr); 1433 if (!ret) 1434 eeh_pe_state_clear(pe, EEH_PE_ISOLATED, include_passed); 1435 return ret; 1436 } 1437 1438 1439 /** 1440 * eeh_pe_reset - Issue PE reset according to specified type 1441 * @pe: EEH PE 1442 * @option: reset type 1443 * @include_passed: include passed-through devices? 1444 * 1445 * The routine is called to reset the specified PE with the 1446 * indicated type, either fundamental reset or hot reset. 1447 * PE reset is the most important part for error recovery. 1448 */ 1449 int eeh_pe_reset(struct eeh_pe *pe, int option, bool include_passed) 1450 { 1451 int ret = 0; 1452 1453 /* Invalid PE ? */ 1454 if (!pe) 1455 return -ENODEV; 1456 1457 if (!eeh_ops || !eeh_ops->set_option || !eeh_ops->reset) 1458 return -ENOENT; 1459 1460 switch (option) { 1461 case EEH_RESET_DEACTIVATE: 1462 ret = eeh_ops->reset(pe, option); 1463 eeh_pe_state_clear(pe, EEH_PE_CFG_BLOCKED, include_passed); 1464 if (ret) 1465 break; 1466 1467 ret = eeh_pe_reenable_devices(pe, include_passed); 1468 break; 1469 case EEH_RESET_HOT: 1470 case EEH_RESET_FUNDAMENTAL: 1471 /* 1472 * Proactively freeze the PE to drop all MMIO access 1473 * during reset, which should be banned as it's always 1474 * cause recursive EEH error. 1475 */ 1476 eeh_ops->set_option(pe, EEH_OPT_FREEZE_PE); 1477 1478 eeh_pe_state_mark(pe, EEH_PE_CFG_BLOCKED); 1479 ret = eeh_ops->reset(pe, option); 1480 break; 1481 default: 1482 pr_debug("%s: Unsupported option %d\n", 1483 __func__, option); 1484 ret = -EINVAL; 1485 } 1486 1487 return ret; 1488 } 1489 EXPORT_SYMBOL_GPL(eeh_pe_reset); 1490 1491 /** 1492 * eeh_pe_configure - Configure PCI bridges after PE reset 1493 * @pe: EEH PE 1494 * 1495 * The routine is called to restore the PCI config space for 1496 * those PCI devices, especially PCI bridges affected by PE 1497 * reset issued previously. 1498 */ 1499 int eeh_pe_configure(struct eeh_pe *pe) 1500 { 1501 int ret = 0; 1502 1503 /* Invalid PE ? */ 1504 if (!pe) 1505 return -ENODEV; 1506 else 1507 ret = eeh_ops->configure_bridge(pe); 1508 1509 return ret; 1510 } 1511 EXPORT_SYMBOL_GPL(eeh_pe_configure); 1512 1513 /** 1514 * eeh_pe_inject_err - Injecting the specified PCI error to the indicated PE 1515 * @pe: the indicated PE 1516 * @type: error type 1517 * @func: error function 1518 * @addr: address 1519 * @mask: address mask 1520 * 1521 * The routine is called to inject the specified PCI error, which 1522 * is determined by @type and @func, to the indicated PE for 1523 * testing purpose. 1524 */ 1525 int eeh_pe_inject_err(struct eeh_pe *pe, int type, int func, 1526 unsigned long addr, unsigned long mask) 1527 { 1528 /* Invalid PE ? */ 1529 if (!pe) 1530 return -ENODEV; 1531 1532 /* Unsupported operation ? */ 1533 if (!eeh_ops || !eeh_ops->err_inject) 1534 return -ENOENT; 1535 1536 /* Check on PCI error function */ 1537 if (func < EEH_ERR_FUNC_MIN || func > EEH_ERR_FUNC_MAX) 1538 return -EINVAL; 1539 1540 return eeh_ops->err_inject(pe, type, func, addr, mask); 1541 } 1542 EXPORT_SYMBOL_GPL(eeh_pe_inject_err); 1543 1544 #ifdef CONFIG_PROC_FS 1545 static int proc_eeh_show(struct seq_file *m, void *v) 1546 { 1547 if (!eeh_enabled()) { 1548 seq_printf(m, "EEH Subsystem is globally disabled\n"); 1549 seq_printf(m, "eeh_total_mmio_ffs=%llu\n", eeh_stats.total_mmio_ffs); 1550 } else { 1551 seq_printf(m, "EEH Subsystem is enabled\n"); 1552 seq_printf(m, 1553 "no device=%llu\n" 1554 "no device node=%llu\n" 1555 "no config address=%llu\n" 1556 "check not wanted=%llu\n" 1557 "eeh_total_mmio_ffs=%llu\n" 1558 "eeh_false_positives=%llu\n" 1559 "eeh_slot_resets=%llu\n", 1560 eeh_stats.no_device, 1561 eeh_stats.no_dn, 1562 eeh_stats.no_cfg_addr, 1563 eeh_stats.ignored_check, 1564 eeh_stats.total_mmio_ffs, 1565 eeh_stats.false_positives, 1566 eeh_stats.slot_resets); 1567 } 1568 1569 return 0; 1570 } 1571 #endif /* CONFIG_PROC_FS */ 1572 1573 static int eeh_break_device(struct pci_dev *pdev) 1574 { 1575 struct resource *bar = NULL; 1576 void __iomem *mapped; 1577 u16 old, bit; 1578 int i, pos; 1579 1580 /* Do we have an MMIO BAR to disable? */ 1581 for (i = 0; i <= PCI_STD_RESOURCE_END; i++) { 1582 struct resource *r = &pdev->resource[i]; 1583 1584 if (!r->flags || !r->start) 1585 continue; 1586 if (r->flags & IORESOURCE_IO) 1587 continue; 1588 if (r->flags & IORESOURCE_UNSET) 1589 continue; 1590 1591 bar = r; 1592 break; 1593 } 1594 1595 if (!bar) { 1596 pci_err(pdev, "Unable to find Memory BAR to cause EEH with\n"); 1597 return -ENXIO; 1598 } 1599 1600 pci_err(pdev, "Going to break: %pR\n", bar); 1601 1602 if (pdev->is_virtfn) { 1603 #ifndef CONFIG_PCI_IOV 1604 return -ENXIO; 1605 #else 1606 /* 1607 * VFs don't have a per-function COMMAND register, so the best 1608 * we can do is clear the Memory Space Enable bit in the PF's 1609 * SRIOV control reg. 1610 * 1611 * Unfortunately, this requires that we have a PF (i.e doesn't 1612 * work for a passed-through VF) and it has the potential side 1613 * effect of also causing an EEH on every other VF under the 1614 * PF. Oh well. 1615 */ 1616 pdev = pdev->physfn; 1617 if (!pdev) 1618 return -ENXIO; /* passed through VFs have no PF */ 1619 1620 pos = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_SRIOV); 1621 pos += PCI_SRIOV_CTRL; 1622 bit = PCI_SRIOV_CTRL_MSE; 1623 #endif /* !CONFIG_PCI_IOV */ 1624 } else { 1625 bit = PCI_COMMAND_MEMORY; 1626 pos = PCI_COMMAND; 1627 } 1628 1629 /* 1630 * Process here is: 1631 * 1632 * 1. Disable Memory space. 1633 * 1634 * 2. Perform an MMIO to the device. This should result in an error 1635 * (CA / UR) being raised by the device which results in an EEH 1636 * PE freeze. Using the in_8() accessor skips the eeh detection hook 1637 * so the freeze hook so the EEH Detection machinery won't be 1638 * triggered here. This is to match the usual behaviour of EEH 1639 * where the HW will asynchronously freeze a PE and it's up to 1640 * the kernel to notice and deal with it. 1641 * 1642 * 3. Turn Memory space back on. This is more important for VFs 1643 * since recovery will probably fail if we don't. For normal 1644 * the COMMAND register is reset as a part of re-initialising 1645 * the device. 1646 * 1647 * Breaking stuff is the point so who cares if it's racy ;) 1648 */ 1649 pci_read_config_word(pdev, pos, &old); 1650 1651 mapped = ioremap(bar->start, PAGE_SIZE); 1652 if (!mapped) { 1653 pci_err(pdev, "Unable to map MMIO BAR %pR\n", bar); 1654 return -ENXIO; 1655 } 1656 1657 pci_write_config_word(pdev, pos, old & ~bit); 1658 in_8(mapped); 1659 pci_write_config_word(pdev, pos, old); 1660 1661 iounmap(mapped); 1662 1663 return 0; 1664 } 1665 1666 int eeh_pe_inject_mmio_error(struct pci_dev *pdev) 1667 { 1668 return eeh_break_device(pdev); 1669 } 1670 1671 #ifdef CONFIG_DEBUG_FS 1672 1673 1674 static struct pci_dev *eeh_debug_lookup_pdev(struct file *filp, 1675 const char __user *user_buf, 1676 size_t count, loff_t *ppos) 1677 { 1678 uint32_t domain, bus, dev, fn; 1679 struct pci_dev *pdev; 1680 char buf[20]; 1681 int ret; 1682 1683 memset(buf, 0, sizeof(buf)); 1684 ret = simple_write_to_buffer(buf, sizeof(buf)-1, ppos, user_buf, count); 1685 if (!ret) 1686 return ERR_PTR(-EFAULT); 1687 1688 ret = sscanf(buf, "%x:%x:%x.%x", &domain, &bus, &dev, &fn); 1689 if (ret != 4) { 1690 pr_err("%s: expected 4 args, got %d\n", __func__, ret); 1691 return ERR_PTR(-EINVAL); 1692 } 1693 1694 pdev = pci_get_domain_bus_and_slot(domain, bus, (dev << 3) | fn); 1695 if (!pdev) 1696 return ERR_PTR(-ENODEV); 1697 1698 return pdev; 1699 } 1700 1701 static int eeh_enable_dbgfs_set(void *data, u64 val) 1702 { 1703 if (val) 1704 eeh_clear_flag(EEH_FORCE_DISABLED); 1705 else 1706 eeh_add_flag(EEH_FORCE_DISABLED); 1707 1708 return 0; 1709 } 1710 1711 static int eeh_enable_dbgfs_get(void *data, u64 *val) 1712 { 1713 if (eeh_enabled()) 1714 *val = 0x1ul; 1715 else 1716 *val = 0x0ul; 1717 return 0; 1718 } 1719 1720 DEFINE_DEBUGFS_ATTRIBUTE(eeh_enable_dbgfs_ops, eeh_enable_dbgfs_get, 1721 eeh_enable_dbgfs_set, "0x%llx\n"); 1722 1723 static ssize_t eeh_force_recover_write(struct file *filp, 1724 const char __user *user_buf, 1725 size_t count, loff_t *ppos) 1726 { 1727 struct pci_controller *hose; 1728 uint32_t phbid, pe_no; 1729 struct eeh_pe *pe; 1730 char buf[20]; 1731 int ret; 1732 1733 ret = simple_write_to_buffer(buf, sizeof(buf), ppos, user_buf, count); 1734 if (!ret) 1735 return -EFAULT; 1736 1737 /* 1738 * When PE is NULL the event is a "special" event. Rather than 1739 * recovering a specific PE it forces the EEH core to scan for failed 1740 * PHBs and recovers each. This needs to be done before any device 1741 * recoveries can occur. 1742 */ 1743 if (!strncmp(buf, "hwcheck", 7)) { 1744 __eeh_send_failure_event(NULL); 1745 return count; 1746 } 1747 1748 ret = sscanf(buf, "%x:%x", &phbid, &pe_no); 1749 if (ret != 2) 1750 return -EINVAL; 1751 1752 hose = pci_find_controller_for_domain(phbid); 1753 if (!hose) 1754 return -ENODEV; 1755 1756 /* Retrieve PE */ 1757 pe = eeh_pe_get(hose, pe_no); 1758 if (!pe) 1759 return -ENODEV; 1760 1761 /* 1762 * We don't do any state checking here since the detection 1763 * process is async to the recovery process. The recovery 1764 * thread *should* not break even if we schedule a recovery 1765 * from an odd state (e.g. PE removed, or recovery of a 1766 * non-isolated PE) 1767 */ 1768 __eeh_send_failure_event(pe); 1769 1770 return ret < 0 ? ret : count; 1771 } 1772 1773 static const struct file_operations eeh_force_recover_fops = { 1774 .open = simple_open, 1775 .write = eeh_force_recover_write, 1776 }; 1777 1778 static ssize_t eeh_debugfs_dev_usage(struct file *filp, 1779 char __user *user_buf, 1780 size_t count, loff_t *ppos) 1781 { 1782 static const char usage[] = "input format: <domain>:<bus>:<dev>.<fn>\n"; 1783 1784 return simple_read_from_buffer(user_buf, count, ppos, 1785 usage, sizeof(usage) - 1); 1786 } 1787 1788 static ssize_t eeh_dev_check_write(struct file *filp, 1789 const char __user *user_buf, 1790 size_t count, loff_t *ppos) 1791 { 1792 struct pci_dev *pdev; 1793 struct eeh_dev *edev; 1794 int ret; 1795 1796 pdev = eeh_debug_lookup_pdev(filp, user_buf, count, ppos); 1797 if (IS_ERR(pdev)) 1798 return PTR_ERR(pdev); 1799 1800 edev = pci_dev_to_eeh_dev(pdev); 1801 if (!edev) { 1802 pci_err(pdev, "No eeh_dev for this device!\n"); 1803 pci_dev_put(pdev); 1804 return -ENODEV; 1805 } 1806 1807 ret = eeh_dev_check_failure(edev); 1808 pci_info(pdev, "eeh_dev_check_failure(%s) = %d\n", 1809 pci_name(pdev), ret); 1810 1811 pci_dev_put(pdev); 1812 1813 return count; 1814 } 1815 1816 static const struct file_operations eeh_dev_check_fops = { 1817 .open = simple_open, 1818 .write = eeh_dev_check_write, 1819 .read = eeh_debugfs_dev_usage, 1820 }; 1821 1822 static ssize_t eeh_dev_break_write(struct file *filp, 1823 const char __user *user_buf, 1824 size_t count, loff_t *ppos) 1825 { 1826 struct pci_dev *pdev; 1827 int ret; 1828 1829 pdev = eeh_debug_lookup_pdev(filp, user_buf, count, ppos); 1830 if (IS_ERR(pdev)) 1831 return PTR_ERR(pdev); 1832 1833 ret = eeh_break_device(pdev); 1834 pci_dev_put(pdev); 1835 1836 if (ret < 0) 1837 return ret; 1838 1839 return count; 1840 } 1841 1842 static const struct file_operations eeh_dev_break_fops = { 1843 .open = simple_open, 1844 .write = eeh_dev_break_write, 1845 .read = eeh_debugfs_dev_usage, 1846 }; 1847 1848 static ssize_t eeh_dev_can_recover(struct file *filp, 1849 const char __user *user_buf, 1850 size_t count, loff_t *ppos) 1851 { 1852 struct pci_driver *drv; 1853 struct pci_dev *pdev; 1854 size_t ret; 1855 1856 pdev = eeh_debug_lookup_pdev(filp, user_buf, count, ppos); 1857 if (IS_ERR(pdev)) 1858 return PTR_ERR(pdev); 1859 1860 /* 1861 * In order for error recovery to work the driver needs to implement 1862 * .error_detected(), so it can quiesce IO to the device, and 1863 * .slot_reset() so it can re-initialise the device after a reset. 1864 * 1865 * Ideally they'd implement .resume() too, but some drivers which 1866 * we need to support (notably IPR) don't so I guess we can tolerate 1867 * that. 1868 * 1869 * .mmio_enabled() is mostly there as a work-around for devices which 1870 * take forever to re-init after a hot reset. Implementing that is 1871 * strictly optional. 1872 */ 1873 drv = pci_dev_driver(pdev); 1874 if (drv && 1875 drv->err_handler && 1876 drv->err_handler->error_detected && 1877 drv->err_handler->slot_reset) { 1878 ret = count; 1879 } else { 1880 ret = -EOPNOTSUPP; 1881 } 1882 1883 pci_dev_put(pdev); 1884 1885 return ret; 1886 } 1887 1888 static const struct file_operations eeh_dev_can_recover_fops = { 1889 .open = simple_open, 1890 .write = eeh_dev_can_recover, 1891 .read = eeh_debugfs_dev_usage, 1892 }; 1893 1894 #endif 1895 1896 static int __init eeh_init_proc(void) 1897 { 1898 if (machine_is(pseries) || machine_is(powernv)) { 1899 proc_create_single("powerpc/eeh", 0, NULL, proc_eeh_show); 1900 #ifdef CONFIG_DEBUG_FS 1901 debugfs_create_file_unsafe("eeh_enable", 0600, 1902 arch_debugfs_dir, NULL, 1903 &eeh_enable_dbgfs_ops); 1904 debugfs_create_u32("eeh_max_freezes", 0600, 1905 arch_debugfs_dir, &eeh_max_freezes); 1906 debugfs_create_bool("eeh_disable_recovery", 0600, 1907 arch_debugfs_dir, 1908 &eeh_debugfs_no_recover); 1909 debugfs_create_file_unsafe("eeh_dev_check", 0600, 1910 arch_debugfs_dir, NULL, 1911 &eeh_dev_check_fops); 1912 debugfs_create_file_unsafe("eeh_dev_break", 0600, 1913 arch_debugfs_dir, NULL, 1914 &eeh_dev_break_fops); 1915 debugfs_create_file_unsafe("eeh_force_recover", 0600, 1916 arch_debugfs_dir, NULL, 1917 &eeh_force_recover_fops); 1918 debugfs_create_file_unsafe("eeh_dev_can_recover", 0600, 1919 arch_debugfs_dir, NULL, 1920 &eeh_dev_can_recover_fops); 1921 eeh_cache_debugfs_init(); 1922 #endif 1923 } 1924 1925 return 0; 1926 } 1927 __initcall(eeh_init_proc); 1928