1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License, Version 1.0 only 6 * (the "License"). You may not use this file except in compliance 7 * with the License. 8 * 9 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 10 * or http://www.opensolaris.org/os/licensing. 11 * See the License for the specific language governing permissions 12 * and limitations under the License. 13 * 14 * When distributing Covered Code, include this CDDL HEADER in each 15 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 16 * If applicable, add the following below this CDDL HEADER, with the 17 * fields enclosed by brackets "[]" replaced with your own identifying 18 * information: Portions Copyright [yyyy] [name of copyright owner] 19 * 20 * CDDL HEADER END 21 */ 22 /* 23 * Copyright 2005 Sun Microsystems, Inc. All rights reserved. 24 * Use is subject to license terms. 25 */ 26 27 #pragma ident "%Z%%M% %I% %E% SMI" 28 29 #include <sys/types.h> 30 #include <sys/sunddi.h> 31 #include <sys/sunndi.h> 32 #include <sys/ddi_impldefs.h> 33 #include <sys/async.h> 34 #include <sys/membar.h> 35 #include <sys/spl.h> 36 #include <sys/iommu.h> 37 #include <sys/pci/pci_obj.h> 38 #include <sys/fm/util.h> 39 #include <sys/fm/io/pci.h> 40 #include <sys/fm/io/ddi.h> 41 #include <sys/fm/io/sun4upci.h> 42 #include <sys/fm/protocol.h> 43 #include <sys/intr.h> 44 45 /*LINTLIBRARY*/ 46 47 /* 48 * The routines below are generic sun4u PCI interfaces to support 49 * Fault Management. 50 * 51 * pci_dma_check, pci_acc_check, pci_handle_lookup are functions used 52 * to associate a captured PCI address to a particular dma/acc handle. 53 * 54 * pci_fm_acc_setup, pci_fm_init_child, pci_fm_create, 55 * pci_fm_destroy are constructors/destructors used to setup and teardown 56 * necessary resources. 57 * 58 * pci_bus_enter, pci_bus_exit are registered via busops and are used to 59 * provide exclusive access to the PCI bus. 60 * 61 * pci_err_callback is the registered callback for PCI which is called 62 * by the CPU code when it detects a UE/TO/BERR. 63 * 64 * pbm_ereport_post is used by the PBM code to generically report all 65 * PBM errors. 66 * 67 */ 68 69 /* 70 * Function called after a dma fault occurred to find out whether the 71 * fault address is associated with a driver that is able to handle faults 72 * and recover from faults. 73 */ 74 /* ARGSUSED */ 75 static int 76 pci_dma_check(dev_info_t *dip, const void *handle, const void *comp_addr, 77 const void *not_used) 78 { 79 ddi_dma_impl_t *mp = (ddi_dma_impl_t *)handle; 80 pfn_t fault_pfn = mmu_btop(*(uint64_t *)comp_addr); 81 pfn_t comp_pfn; 82 int page; 83 84 /* 85 * The driver has to set DDI_DMA_FLAGERR to recover from dma faults. 86 */ 87 ASSERT(mp); 88 89 for (page = 0; page < mp->dmai_ndvmapages; page++) { 90 comp_pfn = PCI_GET_MP_PFN(mp, page); 91 if (fault_pfn == comp_pfn) 92 return (DDI_FM_NONFATAL); 93 } 94 95 return (DDI_FM_UNKNOWN); 96 } 97 98 /* 99 * Function used to check if a given access handle owns the failing address. 100 * Called by ndi_fmc_error, when we detect a PIO error. 101 */ 102 /* ARGSUSED */ 103 static int 104 pci_acc_check(dev_info_t *dip, const void *handle, const void *comp_addr, 105 const void *not_used) 106 { 107 pfn_t pfn, fault_pfn; 108 ddi_acc_hdl_t *hp; 109 110 hp = impl_acc_hdl_get((ddi_acc_handle_t)handle); 111 112 ASSERT(hp); 113 114 pfn = hp->ah_pfn; 115 fault_pfn = mmu_btop(*(uint64_t *)comp_addr); 116 if (fault_pfn >= pfn && fault_pfn < (pfn + hp->ah_pnum)) 117 return (DDI_FM_NONFATAL); 118 119 return (DDI_FM_UNKNOWN); 120 } 121 122 /* 123 * Function used by PCI error handlers to check if captured address is stored 124 * in the DMA or ACC handle caches. 125 */ 126 int 127 pci_handle_lookup(dev_info_t *dip, int type, uint64_t fme_ena, void *afar) 128 { 129 int status = DDI_FM_UNKNOWN; 130 pci_t *pci_p = get_pci_soft_state(ddi_get_instance(dip)); 131 132 if (type == DMA_HANDLE && DDI_FM_DMA_ERR_CAP(pci_p->pci_fm_cap)) 133 status = ndi_fmc_error(dip, NULL, type, pci_dma_check, 134 fme_ena, afar); 135 else if (DDI_FM_ACC_ERR_CAP(pci_p->pci_fm_cap)) 136 status = ndi_fmc_error(dip, NULL, type, pci_acc_check, 137 fme_ena, afar); 138 139 return (status); 140 } 141 142 /* 143 * Function used to setup access functions depending on level of desired 144 * protection. 145 */ 146 void 147 pci_fm_acc_setup(ddi_map_req_t *mp, dev_info_t *rdip) 148 { 149 uchar_t fflag; 150 ddi_acc_hdl_t *hp; 151 ddi_acc_impl_t *ap; 152 153 hp = mp->map_handlep; 154 ap = (ddi_acc_impl_t *)hp->ah_platform_private; 155 fflag = ap->ahi_common.ah_acc.devacc_attr_access; 156 157 if (mp->map_op == DDI_MO_MAP_LOCKED) { 158 ndi_fmc_insert(rdip, ACC_HANDLE, (void *)hp, NULL); 159 switch (fflag) { 160 case DDI_FLAGERR_ACC: 161 ap->ahi_get8 = i_ddi_prot_get8; 162 ap->ahi_get16 = i_ddi_prot_get16; 163 ap->ahi_get32 = i_ddi_prot_get32; 164 ap->ahi_get64 = i_ddi_prot_get64; 165 ap->ahi_put8 = i_ddi_prot_put8; 166 ap->ahi_put16 = i_ddi_prot_put16; 167 ap->ahi_put32 = i_ddi_prot_put32; 168 ap->ahi_put64 = i_ddi_prot_put64; 169 ap->ahi_rep_get8 = i_ddi_prot_rep_get8; 170 ap->ahi_rep_get16 = i_ddi_prot_rep_get16; 171 ap->ahi_rep_get32 = i_ddi_prot_rep_get32; 172 ap->ahi_rep_get64 = i_ddi_prot_rep_get64; 173 ap->ahi_rep_put8 = i_ddi_prot_rep_put8; 174 ap->ahi_rep_put16 = i_ddi_prot_rep_put16; 175 ap->ahi_rep_put32 = i_ddi_prot_rep_put32; 176 ap->ahi_rep_put64 = i_ddi_prot_rep_put64; 177 break; 178 case DDI_CAUTIOUS_ACC : 179 ap->ahi_get8 = i_ddi_caut_get8; 180 ap->ahi_get16 = i_ddi_caut_get16; 181 ap->ahi_get32 = i_ddi_caut_get32; 182 ap->ahi_get64 = i_ddi_caut_get64; 183 ap->ahi_put8 = i_ddi_caut_put8; 184 ap->ahi_put16 = i_ddi_caut_put16; 185 ap->ahi_put32 = i_ddi_caut_put32; 186 ap->ahi_put64 = i_ddi_caut_put64; 187 ap->ahi_rep_get8 = i_ddi_caut_rep_get8; 188 ap->ahi_rep_get16 = i_ddi_caut_rep_get16; 189 ap->ahi_rep_get32 = i_ddi_caut_rep_get32; 190 ap->ahi_rep_get64 = i_ddi_caut_rep_get64; 191 ap->ahi_rep_put8 = i_ddi_caut_rep_put8; 192 ap->ahi_rep_put16 = i_ddi_caut_rep_put16; 193 ap->ahi_rep_put32 = i_ddi_caut_rep_put32; 194 ap->ahi_rep_put64 = i_ddi_caut_rep_put64; 195 break; 196 default: 197 break; 198 } 199 } else if (mp->map_op == DDI_MO_UNMAP) { 200 ndi_fmc_remove(rdip, ACC_HANDLE, (void *)hp); 201 } 202 } 203 204 /* 205 * Function used to initialize FMA for our children nodes. Called 206 * through pci busops when child node calls ddi_fm_init. 207 */ 208 /* ARGSUSED */ 209 int 210 pci_fm_init_child(dev_info_t *dip, dev_info_t *tdip, int cap, 211 ddi_iblock_cookie_t *ibc) 212 { 213 pci_t *pci_p = get_pci_soft_state(ddi_get_instance(dip)); 214 215 ASSERT(ibc != NULL); 216 *ibc = pci_p->pci_pbm_p->pbm_iblock_cookie; 217 218 return (pci_p->pci_fm_cap); 219 } 220 221 /* 222 * Lock accesses to the pci bus, to be able to protect against bus errors. 223 */ 224 void 225 pci_bus_enter(dev_info_t *dip, ddi_acc_handle_t handle) 226 { 227 pci_t *pci_p = get_pci_soft_state(ddi_get_instance(dip)); 228 pbm_t *pbm_p = pci_p->pci_pbm_p; 229 230 membar_sync(); 231 232 mutex_enter(&pbm_p->pbm_pokefault_mutex); 233 pbm_p->pbm_excl_handle = handle; 234 } 235 236 /* 237 * Unlock access to bus and clear errors before exiting. 238 */ 239 /* ARGSUSED */ 240 void 241 pci_bus_exit(dev_info_t *dip, ddi_acc_handle_t handle) 242 { 243 pci_t *pci_p = get_pci_soft_state(ddi_get_instance(dip)); 244 pbm_t *pbm_p = pci_p->pci_pbm_p; 245 ddi_fm_error_t derr; 246 247 ASSERT(MUTEX_HELD(&pbm_p->pbm_pokefault_mutex)); 248 249 membar_sync(); 250 251 mutex_enter(&pci_p->pci_common_p->pci_fm_mutex); 252 ddi_fm_acc_err_get(pbm_p->pbm_excl_handle, &derr, DDI_FME_VERSION); 253 254 if (derr.fme_status == DDI_FM_OK) { 255 if (pci_check_error(pci_p) != 0) { 256 (void) pci_pbm_err_handler(pci_p->pci_dip, &derr, 257 (const void *)pci_p, PCI_BUS_EXIT_CALL); 258 } 259 } 260 mutex_exit(&pci_p->pci_common_p->pci_fm_mutex); 261 262 pbm_p->pbm_excl_handle = NULL; 263 mutex_exit(&pbm_p->pbm_pokefault_mutex); 264 } 265 266 /* 267 * PCI error callback which is registered with our parent to call 268 * for PCI logging when the CPU traps due to BERR/TO/UE. 269 */ 270 int 271 pci_err_callback(dev_info_t *dip, ddi_fm_error_t *derr, 272 const void *impl_data) 273 { 274 pci_t *pci_p = (pci_t *)impl_data; 275 pci_common_t *cmn_p = pci_p->pci_common_p; 276 ecc_t *ecc_p = cmn_p->pci_common_ecc_p; 277 ecc_errstate_t ecc_err; 278 int fatal = 0; 279 int nonfatal = 0; 280 int unknown = 0; 281 int ret = DDI_FM_OK; 282 283 bzero(&ecc_err, sizeof (ecc_err)); 284 mutex_enter(&cmn_p->pci_fm_mutex); 285 /* 286 * Check and log ecc and pbm errors 287 */ 288 ecc_err.ecc_ii_p = ecc_p->ecc_ue; 289 ecc_err.ecc_ena = derr->fme_ena; 290 ecc_err.ecc_caller = PCI_TRAP_CALL; 291 292 if ((ret = ecc_err_handler(&ecc_err)) == DDI_FM_FATAL) 293 fatal++; 294 else if (ret == DDI_FM_NONFATAL) 295 nonfatal++; 296 else if (ret == DDI_FM_UNKNOWN) 297 unknown++; 298 299 if (pci_check_error(pci_p) != 0) { 300 int err = pci_pbm_err_handler(pci_p->pci_dip, derr, 301 (const void *)pci_p, PCI_TRAP_CALL); 302 if (err == DDI_FM_FATAL) 303 fatal++; 304 else if (err == DDI_FM_NONFATAL) 305 nonfatal++; 306 else if (err == DDI_FM_UNKNOWN) 307 unknown++; 308 } 309 310 mutex_exit(&cmn_p->pci_fm_mutex); 311 312 if (fatal) 313 return (DDI_FM_FATAL); 314 else if (nonfatal) 315 return (DDI_FM_NONFATAL); 316 else if (unknown) 317 return (DDI_FM_UNKNOWN); 318 else 319 return (DDI_FM_OK); 320 } 321 322 /* 323 * private version of walk_devs() that can be used during panic. No 324 * sleeping or locking required. 325 */ 326 static int 327 pci_tgt_walk_devs(dev_info_t *dip, int (*f)(dev_info_t *, void *), void *arg) 328 { 329 while (dip) { 330 switch ((*f)(dip, arg)) { 331 case DDI_WALK_TERMINATE: 332 return (DDI_WALK_TERMINATE); 333 case DDI_WALK_CONTINUE: 334 if (pci_tgt_walk_devs(ddi_get_child(dip), f, 335 arg) == DDI_WALK_TERMINATE) 336 return (DDI_WALK_TERMINATE); 337 break; 338 case DDI_WALK_PRUNECHILD: 339 break; 340 } 341 dip = ddi_get_next_sibling(dip); 342 } 343 return (DDI_WALK_CONTINUE); 344 } 345 346 static int 347 pci_check_regs(dev_info_t *dip, void *arg) 348 { 349 int reglen; 350 int rn; 351 int totreg; 352 pci_regspec_t *drv_regp; 353 pci_target_err_t *tgt_err = (pci_target_err_t *)arg; 354 355 if (ddi_getlongprop(DDI_DEV_T_NONE, dip, DDI_PROP_DONTPASS, 356 "assigned-addresses", (caddr_t)&drv_regp, ®len) != DDI_SUCCESS) 357 return (DDI_WALK_CONTINUE); 358 359 totreg = reglen / sizeof (pci_regspec_t); 360 for (rn = 0; rn < totreg; rn++) { 361 if (tgt_err->tgt_pci_space == 362 PCI_REG_ADDR_G(drv_regp[rn].pci_phys_hi) && 363 (tgt_err->tgt_pci_addr >= 364 (uint64_t)drv_regp[rn].pci_phys_low + 365 ((uint64_t)drv_regp[rn].pci_phys_mid << 32)) && 366 (tgt_err->tgt_pci_addr < 367 (uint64_t)drv_regp[rn].pci_phys_low + 368 ((uint64_t)drv_regp[rn].pci_phys_mid << 32) + 369 (uint64_t)drv_regp[rn].pci_size_low + 370 ((uint64_t)drv_regp[rn].pci_size_hi << 32))) { 371 tgt_err->tgt_dip = dip; 372 kmem_free(drv_regp, reglen); 373 return (DDI_WALK_TERMINATE); 374 } 375 } 376 kmem_free(drv_regp, reglen); 377 return (DDI_WALK_CONTINUE); 378 } 379 380 static int 381 pci_check_ranges(dev_info_t *dip, void *arg) 382 { 383 uint64_t range_parent_begin; 384 uint64_t range_parent_size; 385 uint64_t range_parent_end; 386 uint32_t space_type; 387 uint32_t bus_num; 388 uint32_t range_offset; 389 pci_ranges_t *pci_ranges, *rangep; 390 pci_bus_range_t *pci_bus_rangep; 391 int pci_ranges_length; 392 int nrange; 393 pci_target_err_t *tgt_err = (pci_target_err_t *)arg; 394 int i, size; 395 396 if (strcmp(ddi_node_name(dip), "pci") != 0) 397 return (DDI_WALK_CONTINUE); 398 399 /* 400 * Get the ranges property. 401 */ 402 if (ddi_getlongprop(DDI_DEV_T_ANY, dip, DDI_PROP_DONTPASS, "ranges", 403 (caddr_t)&pci_ranges, &pci_ranges_length) != DDI_SUCCESS) { 404 return (DDI_WALK_CONTINUE); 405 } 406 nrange = pci_ranges_length / sizeof (pci_ranges_t); 407 rangep = pci_ranges; 408 pci_fix_ranges(pci_ranges, nrange); 409 410 for (i = 0; i < nrange; i++, rangep++) { 411 range_parent_begin = ((uint64_t)rangep->parent_high << 32) + 412 rangep->parent_low; 413 range_parent_size = ((uint64_t)rangep->size_high << 32) + 414 rangep->size_low; 415 range_parent_end = range_parent_begin + range_parent_size - 1; 416 417 if ((tgt_err->tgt_err_addr < range_parent_begin) || 418 (tgt_err->tgt_err_addr > range_parent_end)) { 419 /* Not in range */ 420 continue; 421 } 422 space_type = PCI_REG_ADDR_G(rangep->child_high); 423 if (space_type == PCI_REG_ADDR_G(PCI_ADDR_CONFIG)) { 424 /* Config space address - check bus range */ 425 range_offset = tgt_err->tgt_err_addr - 426 range_parent_begin; 427 bus_num = PCI_REG_BUS_G(range_offset); 428 if (ddi_getlongprop(DDI_DEV_T_ANY, dip, 429 DDI_PROP_DONTPASS, "bus-range", 430 (caddr_t)&pci_bus_rangep, &size) != DDI_SUCCESS) { 431 continue; 432 } 433 if ((bus_num < pci_bus_rangep->lo) || 434 (bus_num > pci_bus_rangep->hi)) { 435 /* 436 * Bus number not appropriate for this 437 * pci nexus. 438 */ 439 kmem_free(pci_bus_rangep, size); 440 continue; 441 } 442 kmem_free(pci_bus_rangep, size); 443 } 444 445 /* We have a match if we get here - compute pci address */ 446 tgt_err->tgt_pci_addr = tgt_err->tgt_err_addr - 447 range_parent_begin; 448 tgt_err->tgt_pci_addr += (((uint64_t)rangep->child_mid << 32) + 449 rangep->child_low); 450 tgt_err->tgt_pci_space = space_type; 451 if (panicstr) 452 pci_tgt_walk_devs(dip, pci_check_regs, (void *)tgt_err); 453 else 454 ddi_walk_devs(dip, pci_check_regs, (void *)tgt_err); 455 if (tgt_err->tgt_dip != NULL) { 456 kmem_free(pci_ranges, pci_ranges_length); 457 return (DDI_WALK_TERMINATE); 458 } 459 } 460 kmem_free(pci_ranges, pci_ranges_length); 461 return (DDI_WALK_PRUNECHILD); 462 } 463 464 /* 465 * need special version of ddi_fm_ereport_post() as the leaf driver may 466 * not be hardened. 467 */ 468 void 469 pci_tgt_ereport_post(dev_info_t *dip, const char *error_class, uint64_t ena, 470 uint8_t version, ...) 471 { 472 char *name; 473 char device_path[MAXPATHLEN]; 474 char ddi_error_class[FM_MAX_CLASS]; 475 nvlist_t *ereport, *detector; 476 nv_alloc_t *nva; 477 errorq_elem_t *eqep; 478 va_list ap; 479 480 if (panicstr) { 481 eqep = errorq_reserve(ereport_errorq); 482 if (eqep == NULL) 483 return; 484 ereport = errorq_elem_nvl(ereport_errorq, eqep); 485 nva = errorq_elem_nva(ereport_errorq, eqep); 486 detector = fm_nvlist_create(nva); 487 } else { 488 ereport = fm_nvlist_create(NULL); 489 detector = fm_nvlist_create(NULL); 490 } 491 492 (void) ddi_pathname(dip, device_path); 493 fm_fmri_dev_set(detector, FM_DEV_SCHEME_VERSION, NULL, 494 device_path, NULL); 495 (void) snprintf(ddi_error_class, FM_MAX_CLASS, "%s.%s", 496 DDI_IO_CLASS, error_class); 497 fm_ereport_set(ereport, version, ddi_error_class, ena, detector, NULL); 498 499 va_start(ap, version); 500 name = va_arg(ap, char *); 501 (void) i_fm_payload_set(ereport, name, ap); 502 va_end(ap); 503 504 if (panicstr) { 505 errorq_commit(ereport_errorq, eqep, ERRORQ_SYNC); 506 } else { 507 (void) fm_ereport_post(ereport, EVCH_TRYHARD); 508 fm_nvlist_destroy(ereport, FM_NVA_FREE); 509 fm_nvlist_destroy(detector, FM_NVA_FREE); 510 } 511 } 512 513 /* 514 * Function used to drain pci_target_queue, either during panic or after softint 515 * is generated, to generate target device ereports based on captured physical 516 * addresss 517 */ 518 static void 519 pci_target_drain(void *private_p, pci_target_err_t *tgt_err) 520 { 521 char buf[FM_MAX_CLASS]; 522 523 /* 524 * The following assumes that all pci_pci bridge devices 525 * are configured as transparant. Find the top-level pci 526 * nexus which has tgt_err_addr in one of its ranges, converting this 527 * to a pci address in the process. Then starting at this node do 528 * another tree walk to find a device with the pci address we've 529 * found within range of one of it's assigned-addresses properties. 530 */ 531 tgt_err->tgt_dip = NULL; 532 if (panicstr) 533 pci_tgt_walk_devs(ddi_root_node(), pci_check_ranges, 534 (void *)tgt_err); 535 else 536 ddi_walk_devs(ddi_root_node(), pci_check_ranges, 537 (void *)tgt_err); 538 if (tgt_err->tgt_dip == NULL) 539 return; 540 541 (void) snprintf(buf, FM_MAX_CLASS, "%s.%s", tgt_err->tgt_bridge_type, 542 tgt_err->tgt_err_class); 543 pci_tgt_ereport_post(tgt_err->tgt_dip, buf, tgt_err->tgt_err_ena, 0, 544 PCI_PA, DATA_TYPE_UINT64, tgt_err->tgt_err_addr, NULL); 545 } 546 547 void 548 pci_fm_create(pci_t *pci_p) 549 { 550 pci_common_t *cmn_p = pci_p->pci_common_p; 551 552 /* 553 * PCI detected ECC errorq, to schedule async handling 554 * of ECC errors and logging. 555 * The errorq is created here but destroyed when _fini is called 556 * for the pci module. 557 */ 558 if (pci_ecc_queue == NULL) { 559 pci_ecc_queue = errorq_create("pci_ecc_queue", 560 (errorq_func_t)ecc_err_drain, 561 (void *)NULL, 562 ECC_MAX_ERRS, sizeof (ecc_errstate_t), 563 PIL_2, ERRORQ_VITAL); 564 if (pci_ecc_queue == NULL) 565 panic("failed to create required system error queue"); 566 } 567 568 /* 569 * PCI target errorq, to schedule async handling of generation of 570 * target device ereports based on captured physical address. 571 * The errorq is created here but destroyed when _fini is called 572 * for the pci module. 573 */ 574 if (pci_target_queue == NULL) { 575 pci_target_queue = errorq_create("pci_target_queue", 576 (errorq_func_t)pci_target_drain, 577 (void *)NULL, 578 TARGET_MAX_ERRS, sizeof (pci_target_err_t), 579 PIL_2, ERRORQ_VITAL); 580 if (pci_target_queue == NULL) 581 panic("failed to create required system error queue"); 582 } 583 584 /* 585 * Initialize FMA support 586 * The axq workaround prevents fault management of access errors 587 */ 588 if (pci_p->pci_pbm_p->pbm_pio_limit == 0) 589 pci_p->pci_fm_cap = DDI_FM_EREPORT_CAPABLE | 590 DDI_FM_ACCCHK_CAPABLE | DDI_FM_DMACHK_CAPABLE | 591 DDI_FM_ERRCB_CAPABLE; 592 else 593 pci_p->pci_fm_cap = DDI_FM_EREPORT_CAPABLE | 594 DDI_FM_DMACHK_CAPABLE | DDI_FM_ERRCB_CAPABLE; 595 /* 596 * Call parent to get it's capablity 597 */ 598 ddi_fm_init(pci_p->pci_dip, &pci_p->pci_fm_cap, 599 &pci_p->pci_fm_ibc); 600 /* 601 * Need to be ereport and error handler cabable 602 */ 603 ASSERT((pci_p->pci_fm_cap & DDI_FM_ERRCB_CAPABLE) && 604 (pci_p->pci_fm_cap & DDI_FM_EREPORT_CAPABLE)); 605 /* 606 * Initialize error handling mutex. 607 */ 608 if (cmn_p->pci_common_refcnt == 0) { 609 mutex_init(&cmn_p->pci_fm_mutex, NULL, MUTEX_DRIVER, 610 (void *)pci_p->pci_fm_ibc); 611 } 612 613 /* 614 * Register error callback with our parent. 615 */ 616 ddi_fm_handler_register(pci_p->pci_dip, pci_err_callback, 617 pci_p); 618 619 } 620 621 void 622 pci_fm_destroy(pci_t *pci_p) 623 { 624 pci_common_t *cmn_p = pci_p->pci_common_p; 625 626 /* schizo non-shared objects */ 627 ddi_fm_handler_unregister(pci_p->pci_dip); 628 ddi_fm_fini(pci_p->pci_dip); 629 630 if (cmn_p->pci_common_refcnt != 0) 631 return; 632 633 mutex_destroy(&cmn_p->pci_fm_mutex); 634 } 635 636 /* 637 * Function used to post PCI block module specific ereports. 638 */ 639 void 640 pbm_ereport_post(dev_info_t *dip, uint64_t ena, pbm_errstate_t *pbm_err) 641 { 642 char buf[FM_MAX_CLASS]; 643 644 (void) snprintf(buf, FM_MAX_CLASS, "%s.%s", 645 pbm_err->pbm_bridge_type, pbm_err->pbm_err_class); 646 647 ena = ena ? ena : fm_ena_generate(0, FM_ENA_FMT1); 648 649 ddi_fm_ereport_post(dip, buf, ena, DDI_NOSLEEP, 650 FM_VERSION, DATA_TYPE_UINT8, 0, 651 PCI_CONFIG_STATUS, DATA_TYPE_UINT16, pbm_err->pbm_pci.pci_cfg_stat, 652 PCI_CONFIG_COMMAND, DATA_TYPE_UINT16, pbm_err->pbm_pci.pci_cfg_comm, 653 PCI_PBM_CSR, DATA_TYPE_UINT64, pbm_err->pbm_ctl_stat, 654 PCI_PBM_AFSR, DATA_TYPE_UINT64, pbm_err->pbm_afsr, 655 PCI_PBM_AFAR, DATA_TYPE_UINT64, pbm_err->pbm_afar, 656 PCI_PBM_SLOT, DATA_TYPE_UINT64, pbm_err->pbm_err_sl, 657 PCI_PBM_VALOG, DATA_TYPE_UINT64, pbm_err->pbm_va_log, 658 NULL); 659 } 660