1942 lines
50 KiB
C
1942 lines
50 KiB
C
// SPDX-License-Identifier: GPL-2.0-or-later
|
|
/*
|
|
* Copyright IBM Corporation 2001, 2005, 2006
|
|
* Copyright Dave Engebretsen & Todd Inglett 2001
|
|
* Copyright Linas Vepstas 2005, 2006
|
|
* Copyright 2001-2012 IBM Corporation.
|
|
*
|
|
* Please address comments and feedback to Linas Vepstas <linas@austin.ibm.com>
|
|
*/
|
|
|
|
#include <linux/delay.h>
|
|
#include <linux/sched.h>
|
|
#include <linux/init.h>
|
|
#include <linux/list.h>
|
|
#include <linux/pci.h>
|
|
#include <linux/iommu.h>
|
|
#include <linux/proc_fs.h>
|
|
#include <linux/rbtree.h>
|
|
#include <linux/reboot.h>
|
|
#include <linux/seq_file.h>
|
|
#include <linux/spinlock.h>
|
|
#include <linux/export.h>
|
|
#include <linux/of.h>
|
|
#include <linux/debugfs.h>
|
|
|
|
#include <linux/atomic.h>
|
|
#include <asm/eeh.h>
|
|
#include <asm/eeh_event.h>
|
|
#include <asm/io.h>
|
|
#include <asm/iommu.h>
|
|
#include <asm/machdep.h>
|
|
#include <asm/ppc-pci.h>
|
|
#include <asm/rtas.h>
|
|
#include <asm/pte-walk.h>
|
|
|
|
|
|
/** Overview:
|
|
* EEH, or "Enhanced Error Handling" is a PCI bridge technology for
|
|
* dealing with PCI bus errors that can't be dealt with within the
|
|
* usual PCI framework, except by check-stopping the CPU. Systems
|
|
* that are designed for high-availability/reliability cannot afford
|
|
* to crash due to a "mere" PCI error, thus the need for EEH.
|
|
* An EEH-capable bridge operates by converting a detected error
|
|
* into a "slot freeze", taking the PCI adapter off-line, making
|
|
* the slot behave, from the OS'es point of view, as if the slot
|
|
* were "empty": all reads return 0xff's and all writes are silently
|
|
* ignored. EEH slot isolation events can be triggered by parity
|
|
* errors on the address or data busses (e.g. during posted writes),
|
|
* which in turn might be caused by low voltage on the bus, dust,
|
|
* vibration, humidity, radioactivity or plain-old failed hardware.
|
|
*
|
|
* Note, however, that one of the leading causes of EEH slot
|
|
* freeze events are buggy device drivers, buggy device microcode,
|
|
* or buggy device hardware. This is because any attempt by the
|
|
* device to bus-master data to a memory address that is not
|
|
* assigned to the device will trigger a slot freeze. (The idea
|
|
* is to prevent devices-gone-wild from corrupting system memory).
|
|
* Buggy hardware/drivers will have a miserable time co-existing
|
|
* with EEH.
|
|
*
|
|
* Ideally, a PCI device driver, when suspecting that an isolation
|
|
* event has occurred (e.g. by reading 0xff's), will then ask EEH
|
|
* whether this is the case, and then take appropriate steps to
|
|
* reset the PCI slot, the PCI device, and then resume operations.
|
|
* However, until that day, the checking is done here, with the
|
|
* eeh_check_failure() routine embedded in the MMIO macros. If
|
|
* the slot is found to be isolated, an "EEH Event" is synthesized
|
|
* and sent out for processing.
|
|
*/
|
|
|
|
/* If a device driver keeps reading an MMIO register in an interrupt
|
|
* handler after a slot isolation event, it might be broken.
|
|
* This sets the threshold for how many read attempts we allow
|
|
* before printing an error message.
|
|
*/
|
|
#define EEH_MAX_FAILS 2100000
|
|
|
|
/* Time to wait for a PCI slot to report status, in milliseconds */
|
|
#define PCI_BUS_RESET_WAIT_MSEC (5*60*1000)
|
|
|
|
/*
|
|
* EEH probe mode support, which is part of the flags,
|
|
* is to support multiple platforms for EEH. Some platforms
|
|
* like pSeries do PCI emunation based on device tree.
|
|
* However, other platforms like powernv probe PCI devices
|
|
* from hardware. The flag is used to distinguish that.
|
|
* In addition, struct eeh_ops::probe would be invoked for
|
|
* particular OF node or PCI device so that the corresponding
|
|
* PE would be created there.
|
|
*/
|
|
int eeh_subsystem_flags;
|
|
EXPORT_SYMBOL(eeh_subsystem_flags);
|
|
|
|
/*
|
|
* EEH allowed maximal frozen times. If one particular PE's
|
|
* frozen count in last hour exceeds this limit, the PE will
|
|
* be forced to be offline permanently.
|
|
*/
|
|
u32 eeh_max_freezes = 5;
|
|
|
|
/*
|
|
* Controls whether a recovery event should be scheduled when an
|
|
* isolated device is discovered. This is only really useful for
|
|
* debugging problems with the EEH core.
|
|
*/
|
|
bool eeh_debugfs_no_recover;
|
|
|
|
/* Platform dependent EEH operations */
|
|
struct eeh_ops *eeh_ops = NULL;
|
|
|
|
/* Lock to avoid races due to multiple reports of an error */
|
|
DEFINE_RAW_SPINLOCK(confirm_error_lock);
|
|
EXPORT_SYMBOL_GPL(confirm_error_lock);
|
|
|
|
/* Lock to protect passed flags */
|
|
static DEFINE_MUTEX(eeh_dev_mutex);
|
|
|
|
/* Buffer for reporting pci register dumps. Its here in BSS, and
|
|
* not dynamically alloced, so that it ends up in RMO where RTAS
|
|
* can access it.
|
|
*/
|
|
#define EEH_PCI_REGS_LOG_LEN 8192
|
|
static unsigned char pci_regs_buf[EEH_PCI_REGS_LOG_LEN];
|
|
|
|
/*
|
|
* The struct is used to maintain the EEH global statistic
|
|
* information. Besides, the EEH global statistics will be
|
|
* exported to user space through procfs
|
|
*/
|
|
struct eeh_stats {
|
|
u64 no_device; /* PCI device not found */
|
|
u64 no_dn; /* OF node not found */
|
|
u64 no_cfg_addr; /* Config address not found */
|
|
u64 ignored_check; /* EEH check skipped */
|
|
u64 total_mmio_ffs; /* Total EEH checks */
|
|
u64 false_positives; /* Unnecessary EEH checks */
|
|
u64 slot_resets; /* PE reset */
|
|
};
|
|
|
|
static struct eeh_stats eeh_stats;
|
|
|
|
static int __init eeh_setup(char *str)
|
|
{
|
|
if (!strcmp(str, "off"))
|
|
eeh_add_flag(EEH_FORCE_DISABLED);
|
|
else if (!strcmp(str, "early_log"))
|
|
eeh_add_flag(EEH_EARLY_DUMP_LOG);
|
|
|
|
return 1;
|
|
}
|
|
__setup("eeh=", eeh_setup);
|
|
|
|
void eeh_show_enabled(void)
|
|
{
|
|
if (eeh_has_flag(EEH_FORCE_DISABLED))
|
|
pr_info("EEH: Recovery disabled by kernel parameter.\n");
|
|
else if (eeh_has_flag(EEH_ENABLED))
|
|
pr_info("EEH: Capable adapter found: recovery enabled.\n");
|
|
else
|
|
pr_info("EEH: No capable adapters found: recovery disabled.\n");
|
|
}
|
|
|
|
/*
|
|
* This routine captures assorted PCI configuration space data
|
|
* for the indicated PCI device, and puts them into a buffer
|
|
* for RTAS error logging.
|
|
*/
|
|
static size_t eeh_dump_dev_log(struct eeh_dev *edev, char *buf, size_t len)
|
|
{
|
|
u32 cfg;
|
|
int cap, i;
|
|
int n = 0, l = 0;
|
|
char buffer[128];
|
|
|
|
n += scnprintf(buf+n, len-n, "%04x:%02x:%02x.%01x\n",
|
|
edev->pe->phb->global_number, edev->bdfn >> 8,
|
|
PCI_SLOT(edev->bdfn), PCI_FUNC(edev->bdfn));
|
|
pr_warn("EEH: of node=%04x:%02x:%02x.%01x\n",
|
|
edev->pe->phb->global_number, edev->bdfn >> 8,
|
|
PCI_SLOT(edev->bdfn), PCI_FUNC(edev->bdfn));
|
|
|
|
eeh_ops->read_config(edev, PCI_VENDOR_ID, 4, &cfg);
|
|
n += scnprintf(buf+n, len-n, "dev/vend:%08x\n", cfg);
|
|
pr_warn("EEH: PCI device/vendor: %08x\n", cfg);
|
|
|
|
eeh_ops->read_config(edev, PCI_COMMAND, 4, &cfg);
|
|
n += scnprintf(buf+n, len-n, "cmd/stat:%x\n", cfg);
|
|
pr_warn("EEH: PCI cmd/status register: %08x\n", cfg);
|
|
|
|
/* Gather bridge-specific registers */
|
|
if (edev->mode & EEH_DEV_BRIDGE) {
|
|
eeh_ops->read_config(edev, PCI_SEC_STATUS, 2, &cfg);
|
|
n += scnprintf(buf+n, len-n, "sec stat:%x\n", cfg);
|
|
pr_warn("EEH: Bridge secondary status: %04x\n", cfg);
|
|
|
|
eeh_ops->read_config(edev, PCI_BRIDGE_CONTROL, 2, &cfg);
|
|
n += scnprintf(buf+n, len-n, "brdg ctl:%x\n", cfg);
|
|
pr_warn("EEH: Bridge control: %04x\n", cfg);
|
|
}
|
|
|
|
/* Dump out the PCI-X command and status regs */
|
|
cap = edev->pcix_cap;
|
|
if (cap) {
|
|
eeh_ops->read_config(edev, cap, 4, &cfg);
|
|
n += scnprintf(buf+n, len-n, "pcix-cmd:%x\n", cfg);
|
|
pr_warn("EEH: PCI-X cmd: %08x\n", cfg);
|
|
|
|
eeh_ops->read_config(edev, cap+4, 4, &cfg);
|
|
n += scnprintf(buf+n, len-n, "pcix-stat:%x\n", cfg);
|
|
pr_warn("EEH: PCI-X status: %08x\n", cfg);
|
|
}
|
|
|
|
/* If PCI-E capable, dump PCI-E cap 10 */
|
|
cap = edev->pcie_cap;
|
|
if (cap) {
|
|
n += scnprintf(buf+n, len-n, "pci-e cap10:\n");
|
|
pr_warn("EEH: PCI-E capabilities and status follow:\n");
|
|
|
|
for (i=0; i<=8; i++) {
|
|
eeh_ops->read_config(edev, cap+4*i, 4, &cfg);
|
|
n += scnprintf(buf+n, len-n, "%02x:%x\n", 4*i, cfg);
|
|
|
|
if ((i % 4) == 0) {
|
|
if (i != 0)
|
|
pr_warn("%s\n", buffer);
|
|
|
|
l = scnprintf(buffer, sizeof(buffer),
|
|
"EEH: PCI-E %02x: %08x ",
|
|
4*i, cfg);
|
|
} else {
|
|
l += scnprintf(buffer+l, sizeof(buffer)-l,
|
|
"%08x ", cfg);
|
|
}
|
|
|
|
}
|
|
|
|
pr_warn("%s\n", buffer);
|
|
}
|
|
|
|
/* If AER capable, dump it */
|
|
cap = edev->aer_cap;
|
|
if (cap) {
|
|
n += scnprintf(buf+n, len-n, "pci-e AER:\n");
|
|
pr_warn("EEH: PCI-E AER capability register set follows:\n");
|
|
|
|
for (i=0; i<=13; i++) {
|
|
eeh_ops->read_config(edev, cap+4*i, 4, &cfg);
|
|
n += scnprintf(buf+n, len-n, "%02x:%x\n", 4*i, cfg);
|
|
|
|
if ((i % 4) == 0) {
|
|
if (i != 0)
|
|
pr_warn("%s\n", buffer);
|
|
|
|
l = scnprintf(buffer, sizeof(buffer),
|
|
"EEH: PCI-E AER %02x: %08x ",
|
|
4*i, cfg);
|
|
} else {
|
|
l += scnprintf(buffer+l, sizeof(buffer)-l,
|
|
"%08x ", cfg);
|
|
}
|
|
}
|
|
|
|
pr_warn("%s\n", buffer);
|
|
}
|
|
|
|
return n;
|
|
}
|
|
|
|
static void *eeh_dump_pe_log(struct eeh_pe *pe, void *flag)
|
|
{
|
|
struct eeh_dev *edev, *tmp;
|
|
size_t *plen = flag;
|
|
|
|
eeh_pe_for_each_dev(pe, edev, tmp)
|
|
*plen += eeh_dump_dev_log(edev, pci_regs_buf + *plen,
|
|
EEH_PCI_REGS_LOG_LEN - *plen);
|
|
|
|
return NULL;
|
|
}
|
|
|
|
/**
|
|
* eeh_slot_error_detail - Generate combined log including driver log and error log
|
|
* @pe: EEH PE
|
|
* @severity: temporary or permanent error log
|
|
*
|
|
* This routine should be called to generate the combined log, which
|
|
* is comprised of driver log and error log. The driver log is figured
|
|
* out from the config space of the corresponding PCI device, while
|
|
* the error log is fetched through platform dependent function call.
|
|
*/
|
|
void eeh_slot_error_detail(struct eeh_pe *pe, int severity)
|
|
{
|
|
size_t loglen = 0;
|
|
|
|
/*
|
|
* When the PHB is fenced or dead, it's pointless to collect
|
|
* the data from PCI config space because it should return
|
|
* 0xFF's. For ER, we still retrieve the data from the PCI
|
|
* config space.
|
|
*
|
|
* For pHyp, we have to enable IO for log retrieval. Otherwise,
|
|
* 0xFF's is always returned from PCI config space.
|
|
*
|
|
* When the @severity is EEH_LOG_PERM, the PE is going to be
|
|
* removed. Prior to that, the drivers for devices included in
|
|
* the PE will be closed. The drivers rely on working IO path
|
|
* to bring the devices to quiet state. Otherwise, PCI traffic
|
|
* from those devices after they are removed is like to cause
|
|
* another unexpected EEH error.
|
|
*/
|
|
if (!(pe->type & EEH_PE_PHB)) {
|
|
if (eeh_has_flag(EEH_ENABLE_IO_FOR_LOG) ||
|
|
severity == EEH_LOG_PERM)
|
|
eeh_pci_enable(pe, EEH_OPT_THAW_MMIO);
|
|
|
|
/*
|
|
* The config space of some PCI devices can't be accessed
|
|
* when their PEs are in frozen state. Otherwise, fenced
|
|
* PHB might be seen. Those PEs are identified with flag
|
|
* EEH_PE_CFG_RESTRICTED, indicating EEH_PE_CFG_BLOCKED
|
|
* is set automatically when the PE is put to EEH_PE_ISOLATED.
|
|
*
|
|
* Restoring BARs possibly triggers PCI config access in
|
|
* (OPAL) firmware and then causes fenced PHB. If the
|
|
* PCI config is blocked with flag EEH_PE_CFG_BLOCKED, it's
|
|
* pointless to restore BARs and dump config space.
|
|
*/
|
|
eeh_ops->configure_bridge(pe);
|
|
if (!(pe->state & EEH_PE_CFG_BLOCKED)) {
|
|
eeh_pe_restore_bars(pe);
|
|
|
|
pci_regs_buf[0] = 0;
|
|
eeh_pe_traverse(pe, eeh_dump_pe_log, &loglen);
|
|
}
|
|
}
|
|
|
|
eeh_ops->get_log(pe, severity, pci_regs_buf, loglen);
|
|
}
|
|
|
|
/**
|
|
* eeh_token_to_phys - Convert EEH address token to phys address
|
|
* @token: I/O token, should be address in the form 0xA....
|
|
*
|
|
* This routine should be called to convert virtual I/O address
|
|
* to physical one.
|
|
*/
|
|
static inline unsigned long eeh_token_to_phys(unsigned long token)
|
|
{
|
|
return ppc_find_vmap_phys(token);
|
|
}
|
|
|
|
/*
|
|
* On PowerNV platform, we might already have fenced PHB there.
|
|
* For that case, it's meaningless to recover frozen PE. Intead,
|
|
* We have to handle fenced PHB firstly.
|
|
*/
|
|
static int eeh_phb_check_failure(struct eeh_pe *pe)
|
|
{
|
|
struct eeh_pe *phb_pe;
|
|
unsigned long flags;
|
|
int ret;
|
|
|
|
if (!eeh_has_flag(EEH_PROBE_MODE_DEV))
|
|
return -EPERM;
|
|
|
|
/* Find the PHB PE */
|
|
phb_pe = eeh_phb_pe_get(pe->phb);
|
|
if (!phb_pe) {
|
|
pr_warn("%s Can't find PE for PHB#%x\n",
|
|
__func__, pe->phb->global_number);
|
|
return -EEXIST;
|
|
}
|
|
|
|
/* If the PHB has been in problematic state */
|
|
eeh_serialize_lock(&flags);
|
|
if (phb_pe->state & EEH_PE_ISOLATED) {
|
|
ret = 0;
|
|
goto out;
|
|
}
|
|
|
|
/* Check PHB state */
|
|
ret = eeh_ops->get_state(phb_pe, NULL);
|
|
if ((ret < 0) ||
|
|
(ret == EEH_STATE_NOT_SUPPORT) || eeh_state_active(ret)) {
|
|
ret = 0;
|
|
goto out;
|
|
}
|
|
|
|
/* Isolate the PHB and send event */
|
|
eeh_pe_mark_isolated(phb_pe);
|
|
eeh_serialize_unlock(flags);
|
|
|
|
pr_debug("EEH: PHB#%x failure detected, location: %s\n",
|
|
phb_pe->phb->global_number, eeh_pe_loc_get(phb_pe));
|
|
eeh_send_failure_event(phb_pe);
|
|
return 1;
|
|
out:
|
|
eeh_serialize_unlock(flags);
|
|
return ret;
|
|
}
|
|
|
|
static inline const char *eeh_driver_name(struct pci_dev *pdev)
|
|
{
|
|
if (pdev)
|
|
return dev_driver_string(&pdev->dev);
|
|
|
|
return "<null>";
|
|
}
|
|
|
|
/**
|
|
* eeh_dev_check_failure - Check if all 1's data is due to EEH slot freeze
|
|
* @edev: eeh device
|
|
*
|
|
* Check for an EEH failure for the given device node. Call this
|
|
* routine if the result of a read was all 0xff's and you want to
|
|
* find out if this is due to an EEH slot freeze. This routine
|
|
* will query firmware for the EEH status.
|
|
*
|
|
* Returns 0 if there has not been an EEH error; otherwise returns
|
|
* a non-zero value and queues up a slot isolation event notification.
|
|
*
|
|
* It is safe to call this routine in an interrupt context.
|
|
*/
|
|
int eeh_dev_check_failure(struct eeh_dev *edev)
|
|
{
|
|
int ret;
|
|
unsigned long flags;
|
|
struct device_node *dn;
|
|
struct pci_dev *dev;
|
|
struct eeh_pe *pe, *parent_pe;
|
|
int rc = 0;
|
|
const char *location = NULL;
|
|
|
|
eeh_stats.total_mmio_ffs++;
|
|
|
|
if (!eeh_enabled())
|
|
return 0;
|
|
|
|
if (!edev) {
|
|
eeh_stats.no_dn++;
|
|
return 0;
|
|
}
|
|
dev = eeh_dev_to_pci_dev(edev);
|
|
pe = eeh_dev_to_pe(edev);
|
|
|
|
/* Access to IO BARs might get this far and still not want checking. */
|
|
if (!pe) {
|
|
eeh_stats.ignored_check++;
|
|
eeh_edev_dbg(edev, "Ignored check\n");
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* On PowerNV platform, we might already have fenced PHB
|
|
* there and we need take care of that firstly.
|
|
*/
|
|
ret = eeh_phb_check_failure(pe);
|
|
if (ret > 0)
|
|
return ret;
|
|
|
|
/*
|
|
* If the PE isn't owned by us, we shouldn't check the
|
|
* state. Instead, let the owner handle it if the PE has
|
|
* been frozen.
|
|
*/
|
|
if (eeh_pe_passed(pe))
|
|
return 0;
|
|
|
|
/* If we already have a pending isolation event for this
|
|
* slot, we know it's bad already, we don't need to check.
|
|
* Do this checking under a lock; as multiple PCI devices
|
|
* in one slot might report errors simultaneously, and we
|
|
* only want one error recovery routine running.
|
|
*/
|
|
eeh_serialize_lock(&flags);
|
|
rc = 1;
|
|
if (pe->state & EEH_PE_ISOLATED) {
|
|
pe->check_count++;
|
|
if (pe->check_count == EEH_MAX_FAILS) {
|
|
dn = pci_device_to_OF_node(dev);
|
|
if (dn)
|
|
location = of_get_property(dn, "ibm,loc-code",
|
|
NULL);
|
|
eeh_edev_err(edev, "%d reads ignored for recovering device at location=%s driver=%s\n",
|
|
pe->check_count,
|
|
location ? location : "unknown",
|
|
eeh_driver_name(dev));
|
|
eeh_edev_err(edev, "Might be infinite loop in %s driver\n",
|
|
eeh_driver_name(dev));
|
|
dump_stack();
|
|
}
|
|
goto dn_unlock;
|
|
}
|
|
|
|
/*
|
|
* Now test for an EEH failure. This is VERY expensive.
|
|
* Note that the eeh_config_addr may be a parent device
|
|
* in the case of a device behind a bridge, or it may be
|
|
* function zero of a multi-function device.
|
|
* In any case they must share a common PHB.
|
|
*/
|
|
ret = eeh_ops->get_state(pe, NULL);
|
|
|
|
/* Note that config-io to empty slots may fail;
|
|
* they are empty when they don't have children.
|
|
* We will punt with the following conditions: Failure to get
|
|
* PE's state, EEH not support and Permanently unavailable
|
|
* state, PE is in good state.
|
|
*/
|
|
if ((ret < 0) ||
|
|
(ret == EEH_STATE_NOT_SUPPORT) || eeh_state_active(ret)) {
|
|
eeh_stats.false_positives++;
|
|
pe->false_positives++;
|
|
rc = 0;
|
|
goto dn_unlock;
|
|
}
|
|
|
|
/*
|
|
* It should be corner case that the parent PE has been
|
|
* put into frozen state as well. We should take care
|
|
* that at first.
|
|
*/
|
|
parent_pe = pe->parent;
|
|
while (parent_pe) {
|
|
/* Hit the ceiling ? */
|
|
if (parent_pe->type & EEH_PE_PHB)
|
|
break;
|
|
|
|
/* Frozen parent PE ? */
|
|
ret = eeh_ops->get_state(parent_pe, NULL);
|
|
if (ret > 0 && !eeh_state_active(ret)) {
|
|
pe = parent_pe;
|
|
pr_err("EEH: Failure of PHB#%x-PE#%x will be handled at parent PHB#%x-PE#%x.\n",
|
|
pe->phb->global_number, pe->addr,
|
|
pe->phb->global_number, parent_pe->addr);
|
|
}
|
|
|
|
/* Next parent level */
|
|
parent_pe = parent_pe->parent;
|
|
}
|
|
|
|
eeh_stats.slot_resets++;
|
|
|
|
/* Avoid repeated reports of this failure, including problems
|
|
* with other functions on this device, and functions under
|
|
* bridges.
|
|
*/
|
|
eeh_pe_mark_isolated(pe);
|
|
eeh_serialize_unlock(flags);
|
|
|
|
/* Most EEH events are due to device driver bugs. Having
|
|
* a stack trace will help the device-driver authors figure
|
|
* out what happened. So print that out.
|
|
*/
|
|
pr_debug("EEH: %s: Frozen PHB#%x-PE#%x detected\n",
|
|
__func__, pe->phb->global_number, pe->addr);
|
|
eeh_send_failure_event(pe);
|
|
|
|
return 1;
|
|
|
|
dn_unlock:
|
|
eeh_serialize_unlock(flags);
|
|
return rc;
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(eeh_dev_check_failure);
|
|
|
|
/**
|
|
* eeh_check_failure - Check if all 1's data is due to EEH slot freeze
|
|
* @token: I/O address
|
|
*
|
|
* Check for an EEH failure at the given I/O address. Call this
|
|
* routine if the result of a read was all 0xff's and you want to
|
|
* find out if this is due to an EEH slot freeze event. This routine
|
|
* will query firmware for the EEH status.
|
|
*
|
|
* Note this routine is safe to call in an interrupt context.
|
|
*/
|
|
int eeh_check_failure(const volatile void __iomem *token)
|
|
{
|
|
unsigned long addr;
|
|
struct eeh_dev *edev;
|
|
|
|
/* Finding the phys addr + pci device; this is pretty quick. */
|
|
addr = eeh_token_to_phys((unsigned long __force) token);
|
|
edev = eeh_addr_cache_get_dev(addr);
|
|
if (!edev) {
|
|
eeh_stats.no_device++;
|
|
return 0;
|
|
}
|
|
|
|
return eeh_dev_check_failure(edev);
|
|
}
|
|
EXPORT_SYMBOL(eeh_check_failure);
|
|
|
|
|
|
/**
|
|
* eeh_pci_enable - Enable MMIO or DMA transfers for this slot
|
|
* @pe: EEH PE
|
|
* @function: EEH option
|
|
*
|
|
* This routine should be called to reenable frozen MMIO or DMA
|
|
* so that it would work correctly again. It's useful while doing
|
|
* recovery or log collection on the indicated device.
|
|
*/
|
|
int eeh_pci_enable(struct eeh_pe *pe, int function)
|
|
{
|
|
int active_flag, rc;
|
|
|
|
/*
|
|
* pHyp doesn't allow to enable IO or DMA on unfrozen PE.
|
|
* Also, it's pointless to enable them on unfrozen PE. So
|
|
* we have to check before enabling IO or DMA.
|
|
*/
|
|
switch (function) {
|
|
case EEH_OPT_THAW_MMIO:
|
|
active_flag = EEH_STATE_MMIO_ACTIVE | EEH_STATE_MMIO_ENABLED;
|
|
break;
|
|
case EEH_OPT_THAW_DMA:
|
|
active_flag = EEH_STATE_DMA_ACTIVE;
|
|
break;
|
|
case EEH_OPT_DISABLE:
|
|
case EEH_OPT_ENABLE:
|
|
case EEH_OPT_FREEZE_PE:
|
|
active_flag = 0;
|
|
break;
|
|
default:
|
|
pr_warn("%s: Invalid function %d\n",
|
|
__func__, function);
|
|
return -EINVAL;
|
|
}
|
|
|
|
/*
|
|
* Check if IO or DMA has been enabled before
|
|
* enabling them.
|
|
*/
|
|
if (active_flag) {
|
|
rc = eeh_ops->get_state(pe, NULL);
|
|
if (rc < 0)
|
|
return rc;
|
|
|
|
/* Needn't enable it at all */
|
|
if (rc == EEH_STATE_NOT_SUPPORT)
|
|
return 0;
|
|
|
|
/* It's already enabled */
|
|
if (rc & active_flag)
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* Issue the request */
|
|
rc = eeh_ops->set_option(pe, function);
|
|
if (rc)
|
|
pr_warn("%s: Unexpected state change %d on "
|
|
"PHB#%x-PE#%x, err=%d\n",
|
|
__func__, function, pe->phb->global_number,
|
|
pe->addr, rc);
|
|
|
|
/* Check if the request is finished successfully */
|
|
if (active_flag) {
|
|
rc = eeh_wait_state(pe, PCI_BUS_RESET_WAIT_MSEC);
|
|
if (rc < 0)
|
|
return rc;
|
|
|
|
if (rc & active_flag)
|
|
return 0;
|
|
|
|
return -EIO;
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
static void eeh_disable_and_save_dev_state(struct eeh_dev *edev,
|
|
void *userdata)
|
|
{
|
|
struct pci_dev *pdev = eeh_dev_to_pci_dev(edev);
|
|
struct pci_dev *dev = userdata;
|
|
|
|
/*
|
|
* The caller should have disabled and saved the
|
|
* state for the specified device
|
|
*/
|
|
if (!pdev || pdev == dev)
|
|
return;
|
|
|
|
/* Ensure we have D0 power state */
|
|
pci_set_power_state(pdev, PCI_D0);
|
|
|
|
/* Save device state */
|
|
pci_save_state(pdev);
|
|
|
|
/*
|
|
* Disable device to avoid any DMA traffic and
|
|
* interrupt from the device
|
|
*/
|
|
pci_write_config_word(pdev, PCI_COMMAND, PCI_COMMAND_INTX_DISABLE);
|
|
}
|
|
|
|
static void eeh_restore_dev_state(struct eeh_dev *edev, void *userdata)
|
|
{
|
|
struct pci_dev *pdev = eeh_dev_to_pci_dev(edev);
|
|
struct pci_dev *dev = userdata;
|
|
|
|
if (!pdev)
|
|
return;
|
|
|
|
/* Apply customization from firmware */
|
|
if (eeh_ops->restore_config)
|
|
eeh_ops->restore_config(edev);
|
|
|
|
/* The caller should restore state for the specified device */
|
|
if (pdev != dev)
|
|
pci_restore_state(pdev);
|
|
}
|
|
|
|
/**
|
|
* pcibios_set_pcie_reset_state - Set PCI-E reset state
|
|
* @dev: pci device struct
|
|
* @state: reset state to enter
|
|
*
|
|
* Return value:
|
|
* 0 if success
|
|
*/
|
|
int pcibios_set_pcie_reset_state(struct pci_dev *dev, enum pcie_reset_state state)
|
|
{
|
|
struct eeh_dev *edev = pci_dev_to_eeh_dev(dev);
|
|
struct eeh_pe *pe = eeh_dev_to_pe(edev);
|
|
|
|
if (!pe) {
|
|
pr_err("%s: No PE found on PCI device %s\n",
|
|
__func__, pci_name(dev));
|
|
return -EINVAL;
|
|
}
|
|
|
|
switch (state) {
|
|
case pcie_deassert_reset:
|
|
eeh_ops->reset(pe, EEH_RESET_DEACTIVATE);
|
|
eeh_unfreeze_pe(pe);
|
|
if (!(pe->type & EEH_PE_VF))
|
|
eeh_pe_state_clear(pe, EEH_PE_CFG_BLOCKED, true);
|
|
eeh_pe_dev_traverse(pe, eeh_restore_dev_state, dev);
|
|
eeh_pe_state_clear(pe, EEH_PE_ISOLATED, true);
|
|
break;
|
|
case pcie_hot_reset:
|
|
eeh_pe_mark_isolated(pe);
|
|
eeh_pe_state_clear(pe, EEH_PE_CFG_BLOCKED, true);
|
|
eeh_ops->set_option(pe, EEH_OPT_FREEZE_PE);
|
|
eeh_pe_dev_traverse(pe, eeh_disable_and_save_dev_state, dev);
|
|
if (!(pe->type & EEH_PE_VF))
|
|
eeh_pe_state_mark(pe, EEH_PE_CFG_BLOCKED);
|
|
eeh_ops->reset(pe, EEH_RESET_HOT);
|
|
break;
|
|
case pcie_warm_reset:
|
|
eeh_pe_mark_isolated(pe);
|
|
eeh_pe_state_clear(pe, EEH_PE_CFG_BLOCKED, true);
|
|
eeh_ops->set_option(pe, EEH_OPT_FREEZE_PE);
|
|
eeh_pe_dev_traverse(pe, eeh_disable_and_save_dev_state, dev);
|
|
if (!(pe->type & EEH_PE_VF))
|
|
eeh_pe_state_mark(pe, EEH_PE_CFG_BLOCKED);
|
|
eeh_ops->reset(pe, EEH_RESET_FUNDAMENTAL);
|
|
break;
|
|
default:
|
|
eeh_pe_state_clear(pe, EEH_PE_ISOLATED | EEH_PE_CFG_BLOCKED, true);
|
|
return -EINVAL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* eeh_set_dev_freset - Check the required reset for the indicated device
|
|
* @edev: EEH device
|
|
* @flag: return value
|
|
*
|
|
* Each device might have its preferred reset type: fundamental or
|
|
* hot reset. The routine is used to collected the information for
|
|
* the indicated device and its children so that the bunch of the
|
|
* devices could be reset properly.
|
|
*/
|
|
static void eeh_set_dev_freset(struct eeh_dev *edev, void *flag)
|
|
{
|
|
struct pci_dev *dev;
|
|
unsigned int *freset = (unsigned int *)flag;
|
|
|
|
dev = eeh_dev_to_pci_dev(edev);
|
|
if (dev)
|
|
*freset |= dev->needs_freset;
|
|
}
|
|
|
|
static void eeh_pe_refreeze_passed(struct eeh_pe *root)
|
|
{
|
|
struct eeh_pe *pe;
|
|
int state;
|
|
|
|
eeh_for_each_pe(root, pe) {
|
|
if (eeh_pe_passed(pe)) {
|
|
state = eeh_ops->get_state(pe, NULL);
|
|
if (state &
|
|
(EEH_STATE_MMIO_ACTIVE | EEH_STATE_MMIO_ENABLED)) {
|
|
pr_info("EEH: Passed-through PE PHB#%x-PE#%x was thawed by reset, re-freezing for safety.\n",
|
|
pe->phb->global_number, pe->addr);
|
|
eeh_pe_set_option(pe, EEH_OPT_FREEZE_PE);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
* eeh_pe_reset_full - Complete a full reset process on the indicated PE
|
|
* @pe: EEH PE
|
|
* @include_passed: include passed-through devices?
|
|
*
|
|
* This function executes a full reset procedure on a PE, including setting
|
|
* the appropriate flags, performing a fundamental or hot reset, and then
|
|
* deactivating the reset status. It is designed to be used within the EEH
|
|
* subsystem, as opposed to eeh_pe_reset which is exported to drivers and
|
|
* only performs a single operation at a time.
|
|
*
|
|
* This function will attempt to reset a PE three times before failing.
|
|
*/
|
|
int eeh_pe_reset_full(struct eeh_pe *pe, bool include_passed)
|
|
{
|
|
int reset_state = (EEH_PE_RESET | EEH_PE_CFG_BLOCKED);
|
|
int type = EEH_RESET_HOT;
|
|
unsigned int freset = 0;
|
|
int i, state = 0, ret;
|
|
|
|
/*
|
|
* Determine the type of reset to perform - hot or fundamental.
|
|
* Hot reset is the default operation, unless any device under the
|
|
* PE requires a fundamental reset.
|
|
*/
|
|
eeh_pe_dev_traverse(pe, eeh_set_dev_freset, &freset);
|
|
|
|
if (freset)
|
|
type = EEH_RESET_FUNDAMENTAL;
|
|
|
|
/* Mark the PE as in reset state and block config space accesses */
|
|
eeh_pe_state_mark(pe, reset_state);
|
|
|
|
/* Make three attempts at resetting the bus */
|
|
for (i = 0; i < 3; i++) {
|
|
ret = eeh_pe_reset(pe, type, include_passed);
|
|
if (!ret)
|
|
ret = eeh_pe_reset(pe, EEH_RESET_DEACTIVATE,
|
|
include_passed);
|
|
if (ret) {
|
|
ret = -EIO;
|
|
pr_warn("EEH: Failure %d resetting PHB#%x-PE#%x (attempt %d)\n\n",
|
|
state, pe->phb->global_number, pe->addr, i + 1);
|
|
continue;
|
|
}
|
|
if (i)
|
|
pr_warn("EEH: PHB#%x-PE#%x: Successful reset (attempt %d)\n",
|
|
pe->phb->global_number, pe->addr, i + 1);
|
|
|
|
/* Wait until the PE is in a functioning state */
|
|
state = eeh_wait_state(pe, PCI_BUS_RESET_WAIT_MSEC);
|
|
if (state < 0) {
|
|
pr_warn("EEH: Unrecoverable slot failure on PHB#%x-PE#%x",
|
|
pe->phb->global_number, pe->addr);
|
|
ret = -ENOTRECOVERABLE;
|
|
break;
|
|
}
|
|
if (eeh_state_active(state))
|
|
break;
|
|
else
|
|
pr_warn("EEH: PHB#%x-PE#%x: Slot inactive after reset: 0x%x (attempt %d)\n",
|
|
pe->phb->global_number, pe->addr, state, i + 1);
|
|
}
|
|
|
|
/* Resetting the PE may have unfrozen child PEs. If those PEs have been
|
|
* (potentially) passed through to a guest, re-freeze them:
|
|
*/
|
|
if (!include_passed)
|
|
eeh_pe_refreeze_passed(pe);
|
|
|
|
eeh_pe_state_clear(pe, reset_state, true);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* eeh_save_bars - Save device bars
|
|
* @edev: PCI device associated EEH device
|
|
*
|
|
* Save the values of the device bars. Unlike the restore
|
|
* routine, this routine is *not* recursive. This is because
|
|
* PCI devices are added individually; but, for the restore,
|
|
* an entire slot is reset at a time.
|
|
*/
|
|
void eeh_save_bars(struct eeh_dev *edev)
|
|
{
|
|
int i;
|
|
|
|
if (!edev)
|
|
return;
|
|
|
|
for (i = 0; i < 16; i++)
|
|
eeh_ops->read_config(edev, i * 4, 4, &edev->config_space[i]);
|
|
|
|
/*
|
|
* For PCI bridges including root port, we need enable bus
|
|
* master explicitly. Otherwise, it can't fetch IODA table
|
|
* entries correctly. So we cache the bit in advance so that
|
|
* we can restore it after reset, either PHB range or PE range.
|
|
*/
|
|
if (edev->mode & EEH_DEV_BRIDGE)
|
|
edev->config_space[1] |= PCI_COMMAND_MASTER;
|
|
}
|
|
|
|
static int eeh_reboot_notifier(struct notifier_block *nb,
|
|
unsigned long action, void *unused)
|
|
{
|
|
eeh_clear_flag(EEH_ENABLED);
|
|
return NOTIFY_DONE;
|
|
}
|
|
|
|
static struct notifier_block eeh_reboot_nb = {
|
|
.notifier_call = eeh_reboot_notifier,
|
|
};
|
|
|
|
static int eeh_device_notifier(struct notifier_block *nb,
|
|
unsigned long action, void *data)
|
|
{
|
|
struct device *dev = data;
|
|
|
|
switch (action) {
|
|
/*
|
|
* Note: It's not possible to perform EEH device addition (i.e.
|
|
* {pseries,pnv}_pcibios_bus_add_device()) here because it depends on
|
|
* the device's resources, which have not yet been set up.
|
|
*/
|
|
case BUS_NOTIFY_DEL_DEVICE:
|
|
eeh_remove_device(to_pci_dev(dev));
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
return NOTIFY_DONE;
|
|
}
|
|
|
|
static struct notifier_block eeh_device_nb = {
|
|
.notifier_call = eeh_device_notifier,
|
|
};
|
|
|
|
/**
|
|
* eeh_init - System wide EEH initialization
|
|
* @ops: struct to trace EEH operation callback functions
|
|
*
|
|
* It's the platform's job to call this from an arch_initcall().
|
|
*/
|
|
int eeh_init(struct eeh_ops *ops)
|
|
{
|
|
struct pci_controller *hose, *tmp;
|
|
int ret = 0;
|
|
|
|
/* the platform should only initialise EEH once */
|
|
if (WARN_ON(eeh_ops))
|
|
return -EEXIST;
|
|
if (WARN_ON(!ops))
|
|
return -ENOENT;
|
|
eeh_ops = ops;
|
|
|
|
/* Register reboot notifier */
|
|
ret = register_reboot_notifier(&eeh_reboot_nb);
|
|
if (ret) {
|
|
pr_warn("%s: Failed to register reboot notifier (%d)\n",
|
|
__func__, ret);
|
|
return ret;
|
|
}
|
|
|
|
ret = bus_register_notifier(&pci_bus_type, &eeh_device_nb);
|
|
if (ret) {
|
|
pr_warn("%s: Failed to register bus notifier (%d)\n",
|
|
__func__, ret);
|
|
return ret;
|
|
}
|
|
|
|
/* Initialize PHB PEs */
|
|
list_for_each_entry_safe(hose, tmp, &hose_list, list_node)
|
|
eeh_phb_pe_create(hose);
|
|
|
|
eeh_addr_cache_init();
|
|
|
|
/* Initialize EEH event */
|
|
return eeh_event_init();
|
|
}
|
|
|
|
/**
|
|
* eeh_probe_device() - Perform EEH initialization for the indicated pci device
|
|
* @dev: pci device for which to set up EEH
|
|
*
|
|
* This routine must be used to complete EEH initialization for PCI
|
|
* devices that were added after system boot (e.g. hotplug, dlpar).
|
|
*/
|
|
void eeh_probe_device(struct pci_dev *dev)
|
|
{
|
|
struct eeh_dev *edev;
|
|
|
|
pr_debug("EEH: Adding device %s\n", pci_name(dev));
|
|
|
|
/*
|
|
* pci_dev_to_eeh_dev() can only work if eeh_probe_dev() was
|
|
* already called for this device.
|
|
*/
|
|
if (WARN_ON_ONCE(pci_dev_to_eeh_dev(dev))) {
|
|
pci_dbg(dev, "Already bound to an eeh_dev!\n");
|
|
return;
|
|
}
|
|
|
|
edev = eeh_ops->probe(dev);
|
|
if (!edev) {
|
|
pr_debug("EEH: Adding device failed\n");
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* FIXME: We rely on pcibios_release_device() to remove the
|
|
* existing EEH state. The release function is only called if
|
|
* the pci_dev's refcount drops to zero so if something is
|
|
* keeping a ref to a device (e.g. a filesystem) we need to
|
|
* remove the old EEH state.
|
|
*
|
|
* FIXME: HEY MA, LOOK AT ME, NO LOCKING!
|
|
*/
|
|
if (edev->pdev && edev->pdev != dev) {
|
|
eeh_pe_tree_remove(edev);
|
|
eeh_addr_cache_rmv_dev(edev->pdev);
|
|
eeh_sysfs_remove_device(edev->pdev);
|
|
|
|
/*
|
|
* We definitely should have the PCI device removed
|
|
* though it wasn't correctly. So we needn't call
|
|
* into error handler afterwards.
|
|
*/
|
|
edev->mode |= EEH_DEV_NO_HANDLER;
|
|
}
|
|
|
|
/* bind the pdev and the edev together */
|
|
edev->pdev = dev;
|
|
dev->dev.archdata.edev = edev;
|
|
eeh_addr_cache_insert_dev(dev);
|
|
eeh_sysfs_add_device(dev);
|
|
}
|
|
|
|
/**
|
|
* eeh_remove_device - Undo EEH setup for the indicated pci device
|
|
* @dev: pci device to be removed
|
|
*
|
|
* This routine should be called when a device is removed from
|
|
* a running system (e.g. by hotplug or dlpar). It unregisters
|
|
* the PCI device from the EEH subsystem. I/O errors affecting
|
|
* this device will no longer be detected after this call; thus,
|
|
* i/o errors affecting this slot may leave this device unusable.
|
|
*/
|
|
void eeh_remove_device(struct pci_dev *dev)
|
|
{
|
|
struct eeh_dev *edev;
|
|
|
|
if (!dev || !eeh_enabled())
|
|
return;
|
|
edev = pci_dev_to_eeh_dev(dev);
|
|
|
|
/* Unregister the device with the EEH/PCI address search system */
|
|
dev_dbg(&dev->dev, "EEH: Removing device\n");
|
|
|
|
if (!edev || !edev->pdev || !edev->pe) {
|
|
dev_dbg(&dev->dev, "EEH: Device not referenced!\n");
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* During the hotplug for EEH error recovery, we need the EEH
|
|
* device attached to the parent PE in order for BAR restore
|
|
* a bit later. So we keep it for BAR restore and remove it
|
|
* from the parent PE during the BAR resotre.
|
|
*/
|
|
edev->pdev = NULL;
|
|
|
|
/*
|
|
* eeh_sysfs_remove_device() uses pci_dev_to_eeh_dev() so we need to
|
|
* remove the sysfs files before clearing dev.archdata.edev
|
|
*/
|
|
if (edev->mode & EEH_DEV_SYSFS)
|
|
eeh_sysfs_remove_device(dev);
|
|
|
|
/*
|
|
* We're removing from the PCI subsystem, that means
|
|
* the PCI device driver can't support EEH or not
|
|
* well. So we rely on hotplug completely to do recovery
|
|
* for the specific PCI device.
|
|
*/
|
|
edev->mode |= EEH_DEV_NO_HANDLER;
|
|
|
|
eeh_addr_cache_rmv_dev(dev);
|
|
|
|
/*
|
|
* The flag "in_error" is used to trace EEH devices for VFs
|
|
* in error state or not. It's set in eeh_report_error(). If
|
|
* it's not set, eeh_report_{reset,resume}() won't be called
|
|
* for the VF EEH device.
|
|
*/
|
|
edev->in_error = false;
|
|
dev->dev.archdata.edev = NULL;
|
|
if (!(edev->pe->state & EEH_PE_KEEP))
|
|
eeh_pe_tree_remove(edev);
|
|
else
|
|
edev->mode |= EEH_DEV_DISCONNECTED;
|
|
}
|
|
|
|
int eeh_unfreeze_pe(struct eeh_pe *pe)
|
|
{
|
|
int ret;
|
|
|
|
ret = eeh_pci_enable(pe, EEH_OPT_THAW_MMIO);
|
|
if (ret) {
|
|
pr_warn("%s: Failure %d enabling IO on PHB#%x-PE#%x\n",
|
|
__func__, ret, pe->phb->global_number, pe->addr);
|
|
return ret;
|
|
}
|
|
|
|
ret = eeh_pci_enable(pe, EEH_OPT_THAW_DMA);
|
|
if (ret) {
|
|
pr_warn("%s: Failure %d enabling DMA on PHB#%x-PE#%x\n",
|
|
__func__, ret, pe->phb->global_number, pe->addr);
|
|
return ret;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
|
|
static struct pci_device_id eeh_reset_ids[] = {
|
|
{ PCI_DEVICE(0x19a2, 0x0710) }, /* Emulex, BE */
|
|
{ PCI_DEVICE(0x10df, 0xe220) }, /* Emulex, Lancer */
|
|
{ PCI_DEVICE(0x14e4, 0x1657) }, /* Broadcom BCM5719 */
|
|
{ 0 }
|
|
};
|
|
|
|
static int eeh_pe_change_owner(struct eeh_pe *pe)
|
|
{
|
|
struct eeh_dev *edev, *tmp;
|
|
struct pci_dev *pdev;
|
|
struct pci_device_id *id;
|
|
int ret;
|
|
|
|
/* Check PE state */
|
|
ret = eeh_ops->get_state(pe, NULL);
|
|
if (ret < 0 || ret == EEH_STATE_NOT_SUPPORT)
|
|
return 0;
|
|
|
|
/* Unfrozen PE, nothing to do */
|
|
if (eeh_state_active(ret))
|
|
return 0;
|
|
|
|
/* Frozen PE, check if it needs PE level reset */
|
|
eeh_pe_for_each_dev(pe, edev, tmp) {
|
|
pdev = eeh_dev_to_pci_dev(edev);
|
|
if (!pdev)
|
|
continue;
|
|
|
|
for (id = &eeh_reset_ids[0]; id->vendor != 0; id++) {
|
|
if (id->vendor != PCI_ANY_ID &&
|
|
id->vendor != pdev->vendor)
|
|
continue;
|
|
if (id->device != PCI_ANY_ID &&
|
|
id->device != pdev->device)
|
|
continue;
|
|
if (id->subvendor != PCI_ANY_ID &&
|
|
id->subvendor != pdev->subsystem_vendor)
|
|
continue;
|
|
if (id->subdevice != PCI_ANY_ID &&
|
|
id->subdevice != pdev->subsystem_device)
|
|
continue;
|
|
|
|
return eeh_pe_reset_and_recover(pe);
|
|
}
|
|
}
|
|
|
|
ret = eeh_unfreeze_pe(pe);
|
|
if (!ret)
|
|
eeh_pe_state_clear(pe, EEH_PE_ISOLATED, true);
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* eeh_dev_open - Increase count of pass through devices for PE
|
|
* @pdev: PCI device
|
|
*
|
|
* Increase count of passed through devices for the indicated
|
|
* PE. In the result, the EEH errors detected on the PE won't be
|
|
* reported. The PE owner will be responsible for detection
|
|
* and recovery.
|
|
*/
|
|
int eeh_dev_open(struct pci_dev *pdev)
|
|
{
|
|
struct eeh_dev *edev;
|
|
int ret = -ENODEV;
|
|
|
|
mutex_lock(&eeh_dev_mutex);
|
|
|
|
/* No PCI device ? */
|
|
if (!pdev)
|
|
goto out;
|
|
|
|
/* No EEH device or PE ? */
|
|
edev = pci_dev_to_eeh_dev(pdev);
|
|
if (!edev || !edev->pe)
|
|
goto out;
|
|
|
|
/*
|
|
* The PE might have been put into frozen state, but we
|
|
* didn't detect that yet. The passed through PCI devices
|
|
* in frozen PE won't work properly. Clear the frozen state
|
|
* in advance.
|
|
*/
|
|
ret = eeh_pe_change_owner(edev->pe);
|
|
if (ret)
|
|
goto out;
|
|
|
|
/* Increase PE's pass through count */
|
|
atomic_inc(&edev->pe->pass_dev_cnt);
|
|
mutex_unlock(&eeh_dev_mutex);
|
|
|
|
return 0;
|
|
out:
|
|
mutex_unlock(&eeh_dev_mutex);
|
|
return ret;
|
|
}
|
|
EXPORT_SYMBOL_GPL(eeh_dev_open);
|
|
|
|
/**
|
|
* eeh_dev_release - Decrease count of pass through devices for PE
|
|
* @pdev: PCI device
|
|
*
|
|
* Decrease count of pass through devices for the indicated PE. If
|
|
* there is no passed through device in PE, the EEH errors detected
|
|
* on the PE will be reported and handled as usual.
|
|
*/
|
|
void eeh_dev_release(struct pci_dev *pdev)
|
|
{
|
|
struct eeh_dev *edev;
|
|
|
|
mutex_lock(&eeh_dev_mutex);
|
|
|
|
/* No PCI device ? */
|
|
if (!pdev)
|
|
goto out;
|
|
|
|
/* No EEH device ? */
|
|
edev = pci_dev_to_eeh_dev(pdev);
|
|
if (!edev || !edev->pe || !eeh_pe_passed(edev->pe))
|
|
goto out;
|
|
|
|
/* Decrease PE's pass through count */
|
|
WARN_ON(atomic_dec_if_positive(&edev->pe->pass_dev_cnt) < 0);
|
|
eeh_pe_change_owner(edev->pe);
|
|
out:
|
|
mutex_unlock(&eeh_dev_mutex);
|
|
}
|
|
EXPORT_SYMBOL(eeh_dev_release);
|
|
|
|
#ifdef CONFIG_IOMMU_API
|
|
|
|
static int dev_has_iommu_table(struct device *dev, void *data)
|
|
{
|
|
struct pci_dev *pdev = to_pci_dev(dev);
|
|
struct pci_dev **ppdev = data;
|
|
|
|
if (!dev)
|
|
return 0;
|
|
|
|
if (device_iommu_mapped(dev)) {
|
|
*ppdev = pdev;
|
|
return 1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* eeh_iommu_group_to_pe - Convert IOMMU group to EEH PE
|
|
* @group: IOMMU group
|
|
*
|
|
* The routine is called to convert IOMMU group to EEH PE.
|
|
*/
|
|
struct eeh_pe *eeh_iommu_group_to_pe(struct iommu_group *group)
|
|
{
|
|
struct pci_dev *pdev = NULL;
|
|
struct eeh_dev *edev;
|
|
int ret;
|
|
|
|
/* No IOMMU group ? */
|
|
if (!group)
|
|
return NULL;
|
|
|
|
ret = iommu_group_for_each_dev(group, &pdev, dev_has_iommu_table);
|
|
if (!ret || !pdev)
|
|
return NULL;
|
|
|
|
/* No EEH device or PE ? */
|
|
edev = pci_dev_to_eeh_dev(pdev);
|
|
if (!edev || !edev->pe)
|
|
return NULL;
|
|
|
|
return edev->pe;
|
|
}
|
|
EXPORT_SYMBOL_GPL(eeh_iommu_group_to_pe);
|
|
|
|
#endif /* CONFIG_IOMMU_API */
|
|
|
|
/**
|
|
* eeh_pe_set_option - Set options for the indicated PE
|
|
* @pe: EEH PE
|
|
* @option: requested option
|
|
*
|
|
* The routine is called to enable or disable EEH functionality
|
|
* on the indicated PE, to enable IO or DMA for the frozen PE.
|
|
*/
|
|
int eeh_pe_set_option(struct eeh_pe *pe, int option)
|
|
{
|
|
int ret = 0;
|
|
|
|
/* Invalid PE ? */
|
|
if (!pe)
|
|
return -ENODEV;
|
|
|
|
/*
|
|
* EEH functionality could possibly be disabled, just
|
|
* return error for the case. And the EEH functionality
|
|
* isn't expected to be disabled on one specific PE.
|
|
*/
|
|
switch (option) {
|
|
case EEH_OPT_ENABLE:
|
|
if (eeh_enabled()) {
|
|
ret = eeh_pe_change_owner(pe);
|
|
break;
|
|
}
|
|
ret = -EIO;
|
|
break;
|
|
case EEH_OPT_DISABLE:
|
|
break;
|
|
case EEH_OPT_THAW_MMIO:
|
|
case EEH_OPT_THAW_DMA:
|
|
case EEH_OPT_FREEZE_PE:
|
|
if (!eeh_ops || !eeh_ops->set_option) {
|
|
ret = -ENOENT;
|
|
break;
|
|
}
|
|
|
|
ret = eeh_pci_enable(pe, option);
|
|
break;
|
|
default:
|
|
pr_debug("%s: Option %d out of range (%d, %d)\n",
|
|
__func__, option, EEH_OPT_DISABLE, EEH_OPT_THAW_DMA);
|
|
ret = -EINVAL;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
EXPORT_SYMBOL_GPL(eeh_pe_set_option);
|
|
|
|
/**
|
|
* eeh_pe_get_state - Retrieve PE's state
|
|
* @pe: EEH PE
|
|
*
|
|
* Retrieve the PE's state, which includes 3 aspects: enabled
|
|
* DMA, enabled IO and asserted reset.
|
|
*/
|
|
int eeh_pe_get_state(struct eeh_pe *pe)
|
|
{
|
|
int result, ret = 0;
|
|
bool rst_active, dma_en, mmio_en;
|
|
|
|
/* Existing PE ? */
|
|
if (!pe)
|
|
return -ENODEV;
|
|
|
|
if (!eeh_ops || !eeh_ops->get_state)
|
|
return -ENOENT;
|
|
|
|
/*
|
|
* If the parent PE is owned by the host kernel and is undergoing
|
|
* error recovery, we should return the PE state as temporarily
|
|
* unavailable so that the error recovery on the guest is suspended
|
|
* until the recovery completes on the host.
|
|
*/
|
|
if (pe->parent &&
|
|
!(pe->state & EEH_PE_REMOVED) &&
|
|
(pe->parent->state & (EEH_PE_ISOLATED | EEH_PE_RECOVERING)))
|
|
return EEH_PE_STATE_UNAVAIL;
|
|
|
|
result = eeh_ops->get_state(pe, NULL);
|
|
rst_active = !!(result & EEH_STATE_RESET_ACTIVE);
|
|
dma_en = !!(result & EEH_STATE_DMA_ENABLED);
|
|
mmio_en = !!(result & EEH_STATE_MMIO_ENABLED);
|
|
|
|
if (rst_active)
|
|
ret = EEH_PE_STATE_RESET;
|
|
else if (dma_en && mmio_en)
|
|
ret = EEH_PE_STATE_NORMAL;
|
|
else if (!dma_en && !mmio_en)
|
|
ret = EEH_PE_STATE_STOPPED_IO_DMA;
|
|
else if (!dma_en && mmio_en)
|
|
ret = EEH_PE_STATE_STOPPED_DMA;
|
|
else
|
|
ret = EEH_PE_STATE_UNAVAIL;
|
|
|
|
return ret;
|
|
}
|
|
EXPORT_SYMBOL_GPL(eeh_pe_get_state);
|
|
|
|
static int eeh_pe_reenable_devices(struct eeh_pe *pe, bool include_passed)
|
|
{
|
|
struct eeh_dev *edev, *tmp;
|
|
struct pci_dev *pdev;
|
|
int ret = 0;
|
|
|
|
eeh_pe_restore_bars(pe);
|
|
|
|
/*
|
|
* Reenable PCI devices as the devices passed
|
|
* through are always enabled before the reset.
|
|
*/
|
|
eeh_pe_for_each_dev(pe, edev, tmp) {
|
|
pdev = eeh_dev_to_pci_dev(edev);
|
|
if (!pdev)
|
|
continue;
|
|
|
|
ret = pci_reenable_device(pdev);
|
|
if (ret) {
|
|
pr_warn("%s: Failure %d reenabling %s\n",
|
|
__func__, ret, pci_name(pdev));
|
|
return ret;
|
|
}
|
|
}
|
|
|
|
/* The PE is still in frozen state */
|
|
if (include_passed || !eeh_pe_passed(pe)) {
|
|
ret = eeh_unfreeze_pe(pe);
|
|
} else
|
|
pr_info("EEH: Note: Leaving passthrough PHB#%x-PE#%x frozen.\n",
|
|
pe->phb->global_number, pe->addr);
|
|
if (!ret)
|
|
eeh_pe_state_clear(pe, EEH_PE_ISOLATED, include_passed);
|
|
return ret;
|
|
}
|
|
|
|
|
|
/**
|
|
* eeh_pe_reset - Issue PE reset according to specified type
|
|
* @pe: EEH PE
|
|
* @option: reset type
|
|
* @include_passed: include passed-through devices?
|
|
*
|
|
* The routine is called to reset the specified PE with the
|
|
* indicated type, either fundamental reset or hot reset.
|
|
* PE reset is the most important part for error recovery.
|
|
*/
|
|
int eeh_pe_reset(struct eeh_pe *pe, int option, bool include_passed)
|
|
{
|
|
int ret = 0;
|
|
|
|
/* Invalid PE ? */
|
|
if (!pe)
|
|
return -ENODEV;
|
|
|
|
if (!eeh_ops || !eeh_ops->set_option || !eeh_ops->reset)
|
|
return -ENOENT;
|
|
|
|
switch (option) {
|
|
case EEH_RESET_DEACTIVATE:
|
|
ret = eeh_ops->reset(pe, option);
|
|
eeh_pe_state_clear(pe, EEH_PE_CFG_BLOCKED, include_passed);
|
|
if (ret)
|
|
break;
|
|
|
|
ret = eeh_pe_reenable_devices(pe, include_passed);
|
|
break;
|
|
case EEH_RESET_HOT:
|
|
case EEH_RESET_FUNDAMENTAL:
|
|
/*
|
|
* Proactively freeze the PE to drop all MMIO access
|
|
* during reset, which should be banned as it's always
|
|
* cause recursive EEH error.
|
|
*/
|
|
eeh_ops->set_option(pe, EEH_OPT_FREEZE_PE);
|
|
|
|
eeh_pe_state_mark(pe, EEH_PE_CFG_BLOCKED);
|
|
ret = eeh_ops->reset(pe, option);
|
|
break;
|
|
default:
|
|
pr_debug("%s: Unsupported option %d\n",
|
|
__func__, option);
|
|
ret = -EINVAL;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
EXPORT_SYMBOL_GPL(eeh_pe_reset);
|
|
|
|
/**
|
|
* eeh_pe_configure - Configure PCI bridges after PE reset
|
|
* @pe: EEH PE
|
|
*
|
|
* The routine is called to restore the PCI config space for
|
|
* those PCI devices, especially PCI bridges affected by PE
|
|
* reset issued previously.
|
|
*/
|
|
int eeh_pe_configure(struct eeh_pe *pe)
|
|
{
|
|
int ret = 0;
|
|
|
|
/* Invalid PE ? */
|
|
if (!pe)
|
|
return -ENODEV;
|
|
|
|
return ret;
|
|
}
|
|
EXPORT_SYMBOL_GPL(eeh_pe_configure);
|
|
|
|
/**
|
|
* eeh_pe_inject_err - Injecting the specified PCI error to the indicated PE
|
|
* @pe: the indicated PE
|
|
* @type: error type
|
|
* @func: error function
|
|
* @addr: address
|
|
* @mask: address mask
|
|
*
|
|
* The routine is called to inject the specified PCI error, which
|
|
* is determined by @type and @func, to the indicated PE for
|
|
* testing purpose.
|
|
*/
|
|
int eeh_pe_inject_err(struct eeh_pe *pe, int type, int func,
|
|
unsigned long addr, unsigned long mask)
|
|
{
|
|
/* Invalid PE ? */
|
|
if (!pe)
|
|
return -ENODEV;
|
|
|
|
/* Unsupported operation ? */
|
|
if (!eeh_ops || !eeh_ops->err_inject)
|
|
return -ENOENT;
|
|
|
|
/* Check on PCI error type */
|
|
if (type != EEH_ERR_TYPE_32 && type != EEH_ERR_TYPE_64)
|
|
return -EINVAL;
|
|
|
|
/* Check on PCI error function */
|
|
if (func < EEH_ERR_FUNC_MIN || func > EEH_ERR_FUNC_MAX)
|
|
return -EINVAL;
|
|
|
|
return eeh_ops->err_inject(pe, type, func, addr, mask);
|
|
}
|
|
EXPORT_SYMBOL_GPL(eeh_pe_inject_err);
|
|
|
|
#ifdef CONFIG_PROC_FS
|
|
static int proc_eeh_show(struct seq_file *m, void *v)
|
|
{
|
|
if (!eeh_enabled()) {
|
|
seq_printf(m, "EEH Subsystem is globally disabled\n");
|
|
seq_printf(m, "eeh_total_mmio_ffs=%llu\n", eeh_stats.total_mmio_ffs);
|
|
} else {
|
|
seq_printf(m, "EEH Subsystem is enabled\n");
|
|
seq_printf(m,
|
|
"no device=%llu\n"
|
|
"no device node=%llu\n"
|
|
"no config address=%llu\n"
|
|
"check not wanted=%llu\n"
|
|
"eeh_total_mmio_ffs=%llu\n"
|
|
"eeh_false_positives=%llu\n"
|
|
"eeh_slot_resets=%llu\n",
|
|
eeh_stats.no_device,
|
|
eeh_stats.no_dn,
|
|
eeh_stats.no_cfg_addr,
|
|
eeh_stats.ignored_check,
|
|
eeh_stats.total_mmio_ffs,
|
|
eeh_stats.false_positives,
|
|
eeh_stats.slot_resets);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
#endif /* CONFIG_PROC_FS */
|
|
|
|
#ifdef CONFIG_DEBUG_FS
|
|
|
|
|
|
static struct pci_dev *eeh_debug_lookup_pdev(struct file *filp,
|
|
const char __user *user_buf,
|
|
size_t count, loff_t *ppos)
|
|
{
|
|
uint32_t domain, bus, dev, fn;
|
|
struct pci_dev *pdev;
|
|
char buf[20];
|
|
int ret;
|
|
|
|
memset(buf, 0, sizeof(buf));
|
|
ret = simple_write_to_buffer(buf, sizeof(buf)-1, ppos, user_buf, count);
|
|
if (!ret)
|
|
return ERR_PTR(-EFAULT);
|
|
|
|
ret = sscanf(buf, "%x:%x:%x.%x", &domain, &bus, &dev, &fn);
|
|
if (ret != 4) {
|
|
pr_err("%s: expected 4 args, got %d\n", __func__, ret);
|
|
return ERR_PTR(-EINVAL);
|
|
}
|
|
|
|
pdev = pci_get_domain_bus_and_slot(domain, bus, (dev << 3) | fn);
|
|
if (!pdev)
|
|
return ERR_PTR(-ENODEV);
|
|
|
|
return pdev;
|
|
}
|
|
|
|
static int eeh_enable_dbgfs_set(void *data, u64 val)
|
|
{
|
|
if (val)
|
|
eeh_clear_flag(EEH_FORCE_DISABLED);
|
|
else
|
|
eeh_add_flag(EEH_FORCE_DISABLED);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int eeh_enable_dbgfs_get(void *data, u64 *val)
|
|
{
|
|
if (eeh_enabled())
|
|
*val = 0x1ul;
|
|
else
|
|
*val = 0x0ul;
|
|
return 0;
|
|
}
|
|
|
|
DEFINE_DEBUGFS_ATTRIBUTE(eeh_enable_dbgfs_ops, eeh_enable_dbgfs_get,
|
|
eeh_enable_dbgfs_set, "0x%llx\n");
|
|
|
|
static ssize_t eeh_force_recover_write(struct file *filp,
|
|
const char __user *user_buf,
|
|
size_t count, loff_t *ppos)
|
|
{
|
|
struct pci_controller *hose;
|
|
uint32_t phbid, pe_no;
|
|
struct eeh_pe *pe;
|
|
char buf[20];
|
|
int ret;
|
|
|
|
ret = simple_write_to_buffer(buf, sizeof(buf), ppos, user_buf, count);
|
|
if (!ret)
|
|
return -EFAULT;
|
|
|
|
/*
|
|
* When PE is NULL the event is a "special" event. Rather than
|
|
* recovering a specific PE it forces the EEH core to scan for failed
|
|
* PHBs and recovers each. This needs to be done before any device
|
|
* recoveries can occur.
|
|
*/
|
|
if (!strncmp(buf, "hwcheck", 7)) {
|
|
__eeh_send_failure_event(NULL);
|
|
return count;
|
|
}
|
|
|
|
ret = sscanf(buf, "%x:%x", &phbid, &pe_no);
|
|
if (ret != 2)
|
|
return -EINVAL;
|
|
|
|
hose = pci_find_controller_for_domain(phbid);
|
|
if (!hose)
|
|
return -ENODEV;
|
|
|
|
/* Retrieve PE */
|
|
pe = eeh_pe_get(hose, pe_no);
|
|
if (!pe)
|
|
return -ENODEV;
|
|
|
|
/*
|
|
* We don't do any state checking here since the detection
|
|
* process is async to the recovery process. The recovery
|
|
* thread *should* not break even if we schedule a recovery
|
|
* from an odd state (e.g. PE removed, or recovery of a
|
|
* non-isolated PE)
|
|
*/
|
|
__eeh_send_failure_event(pe);
|
|
|
|
return ret < 0 ? ret : count;
|
|
}
|
|
|
|
static const struct file_operations eeh_force_recover_fops = {
|
|
.open = simple_open,
|
|
.llseek = no_llseek,
|
|
.write = eeh_force_recover_write,
|
|
};
|
|
|
|
static ssize_t eeh_debugfs_dev_usage(struct file *filp,
|
|
char __user *user_buf,
|
|
size_t count, loff_t *ppos)
|
|
{
|
|
static const char usage[] = "input format: <domain>:<bus>:<dev>.<fn>\n";
|
|
|
|
return simple_read_from_buffer(user_buf, count, ppos,
|
|
usage, sizeof(usage) - 1);
|
|
}
|
|
|
|
static ssize_t eeh_dev_check_write(struct file *filp,
|
|
const char __user *user_buf,
|
|
size_t count, loff_t *ppos)
|
|
{
|
|
struct pci_dev *pdev;
|
|
struct eeh_dev *edev;
|
|
int ret;
|
|
|
|
pdev = eeh_debug_lookup_pdev(filp, user_buf, count, ppos);
|
|
if (IS_ERR(pdev))
|
|
return PTR_ERR(pdev);
|
|
|
|
edev = pci_dev_to_eeh_dev(pdev);
|
|
if (!edev) {
|
|
pci_err(pdev, "No eeh_dev for this device!\n");
|
|
pci_dev_put(pdev);
|
|
return -ENODEV;
|
|
}
|
|
|
|
ret = eeh_dev_check_failure(edev);
|
|
pci_info(pdev, "eeh_dev_check_failure(%s) = %d\n",
|
|
pci_name(pdev), ret);
|
|
|
|
pci_dev_put(pdev);
|
|
|
|
return count;
|
|
}
|
|
|
|
static const struct file_operations eeh_dev_check_fops = {
|
|
.open = simple_open,
|
|
.llseek = no_llseek,
|
|
.write = eeh_dev_check_write,
|
|
.read = eeh_debugfs_dev_usage,
|
|
};
|
|
|
|
static int eeh_debugfs_break_device(struct pci_dev *pdev)
|
|
{
|
|
struct resource *bar = NULL;
|
|
void __iomem *mapped;
|
|
u16 old, bit;
|
|
int i, pos;
|
|
|
|
/* Do we have an MMIO BAR to disable? */
|
|
for (i = 0; i <= PCI_STD_RESOURCE_END; i++) {
|
|
struct resource *r = &pdev->resource[i];
|
|
|
|
if (!r->flags || !r->start)
|
|
continue;
|
|
if (r->flags & IORESOURCE_IO)
|
|
continue;
|
|
if (r->flags & IORESOURCE_UNSET)
|
|
continue;
|
|
|
|
bar = r;
|
|
break;
|
|
}
|
|
|
|
if (!bar) {
|
|
pci_err(pdev, "Unable to find Memory BAR to cause EEH with\n");
|
|
return -ENXIO;
|
|
}
|
|
|
|
pci_err(pdev, "Going to break: %pR\n", bar);
|
|
|
|
if (pdev->is_virtfn) {
|
|
#ifndef CONFIG_PCI_IOV
|
|
return -ENXIO;
|
|
#else
|
|
/*
|
|
* VFs don't have a per-function COMMAND register, so the best
|
|
* we can do is clear the Memory Space Enable bit in the PF's
|
|
* SRIOV control reg.
|
|
*
|
|
* Unfortunately, this requires that we have a PF (i.e doesn't
|
|
* work for a passed-through VF) and it has the potential side
|
|
* effect of also causing an EEH on every other VF under the
|
|
* PF. Oh well.
|
|
*/
|
|
pdev = pdev->physfn;
|
|
if (!pdev)
|
|
return -ENXIO; /* passed through VFs have no PF */
|
|
|
|
pos = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_SRIOV);
|
|
pos += PCI_SRIOV_CTRL;
|
|
bit = PCI_SRIOV_CTRL_MSE;
|
|
#endif /* !CONFIG_PCI_IOV */
|
|
} else {
|
|
bit = PCI_COMMAND_MEMORY;
|
|
pos = PCI_COMMAND;
|
|
}
|
|
|
|
/*
|
|
* Process here is:
|
|
*
|
|
* 1. Disable Memory space.
|
|
*
|
|
* 2. Perform an MMIO to the device. This should result in an error
|
|
* (CA / UR) being raised by the device which results in an EEH
|
|
* PE freeze. Using the in_8() accessor skips the eeh detection hook
|
|
* so the freeze hook so the EEH Detection machinery won't be
|
|
* triggered here. This is to match the usual behaviour of EEH
|
|
* where the HW will asynchronously freeze a PE and it's up to
|
|
* the kernel to notice and deal with it.
|
|
*
|
|
* 3. Turn Memory space back on. This is more important for VFs
|
|
* since recovery will probably fail if we don't. For normal
|
|
* the COMMAND register is reset as a part of re-initialising
|
|
* the device.
|
|
*
|
|
* Breaking stuff is the point so who cares if it's racy ;)
|
|
*/
|
|
pci_read_config_word(pdev, pos, &old);
|
|
|
|
mapped = ioremap(bar->start, PAGE_SIZE);
|
|
if (!mapped) {
|
|
pci_err(pdev, "Unable to map MMIO BAR %pR\n", bar);
|
|
return -ENXIO;
|
|
}
|
|
|
|
pci_write_config_word(pdev, pos, old & ~bit);
|
|
in_8(mapped);
|
|
pci_write_config_word(pdev, pos, old);
|
|
|
|
iounmap(mapped);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static ssize_t eeh_dev_break_write(struct file *filp,
|
|
const char __user *user_buf,
|
|
size_t count, loff_t *ppos)
|
|
{
|
|
struct pci_dev *pdev;
|
|
int ret;
|
|
|
|
pdev = eeh_debug_lookup_pdev(filp, user_buf, count, ppos);
|
|
if (IS_ERR(pdev))
|
|
return PTR_ERR(pdev);
|
|
|
|
ret = eeh_debugfs_break_device(pdev);
|
|
pci_dev_put(pdev);
|
|
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
return count;
|
|
}
|
|
|
|
static const struct file_operations eeh_dev_break_fops = {
|
|
.open = simple_open,
|
|
.llseek = no_llseek,
|
|
.write = eeh_dev_break_write,
|
|
.read = eeh_debugfs_dev_usage,
|
|
};
|
|
|
|
static ssize_t eeh_dev_can_recover(struct file *filp,
|
|
const char __user *user_buf,
|
|
size_t count, loff_t *ppos)
|
|
{
|
|
struct pci_driver *drv;
|
|
struct pci_dev *pdev;
|
|
size_t ret;
|
|
|
|
pdev = eeh_debug_lookup_pdev(filp, user_buf, count, ppos);
|
|
if (IS_ERR(pdev))
|
|
return PTR_ERR(pdev);
|
|
|
|
/*
|
|
* In order for error recovery to work the driver needs to implement
|
|
* .error_detected(), so it can quiesce IO to the device, and
|
|
* .slot_reset() so it can re-initialise the device after a reset.
|
|
*
|
|
* Ideally they'd implement .resume() too, but some drivers which
|
|
* we need to support (notably IPR) don't so I guess we can tolerate
|
|
* that.
|
|
*
|
|
* .mmio_enabled() is mostly there as a work-around for devices which
|
|
* take forever to re-init after a hot reset. Implementing that is
|
|
* strictly optional.
|
|
*/
|
|
drv = pci_dev_driver(pdev);
|
|
if (drv &&
|
|
drv->err_handler &&
|
|
drv->err_handler->error_detected &&
|
|
drv->err_handler->slot_reset) {
|
|
ret = count;
|
|
} else {
|
|
ret = -EOPNOTSUPP;
|
|
}
|
|
|
|
pci_dev_put(pdev);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static const struct file_operations eeh_dev_can_recover_fops = {
|
|
.open = simple_open,
|
|
.llseek = no_llseek,
|
|
.write = eeh_dev_can_recover,
|
|
.read = eeh_debugfs_dev_usage,
|
|
};
|
|
|
|
#endif
|
|
|
|
static int __init eeh_init_proc(void)
|
|
{
|
|
if (machine_is(pseries) || machine_is(powernv)) {
|
|
proc_create_single("powerpc/eeh", 0, NULL, proc_eeh_show);
|
|
#ifdef CONFIG_DEBUG_FS
|
|
debugfs_create_file_unsafe("eeh_enable", 0600,
|
|
arch_debugfs_dir, NULL,
|
|
&eeh_enable_dbgfs_ops);
|
|
debugfs_create_u32("eeh_max_freezes", 0600,
|
|
arch_debugfs_dir, &eeh_max_freezes);
|
|
debugfs_create_bool("eeh_disable_recovery", 0600,
|
|
arch_debugfs_dir,
|
|
&eeh_debugfs_no_recover);
|
|
debugfs_create_file_unsafe("eeh_dev_check", 0600,
|
|
arch_debugfs_dir, NULL,
|
|
&eeh_dev_check_fops);
|
|
debugfs_create_file_unsafe("eeh_dev_break", 0600,
|
|
arch_debugfs_dir, NULL,
|
|
&eeh_dev_break_fops);
|
|
debugfs_create_file_unsafe("eeh_force_recover", 0600,
|
|
arch_debugfs_dir, NULL,
|
|
&eeh_force_recover_fops);
|
|
debugfs_create_file_unsafe("eeh_dev_can_recover", 0600,
|
|
arch_debugfs_dir, NULL,
|
|
&eeh_dev_can_recover_fops);
|
|
eeh_cache_debugfs_init();
|
|
#endif
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
__initcall(eeh_init_proc);
|