]> Git Repo - linux.git/blob - drivers/misc/ocxl/config.c
treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 336
[linux.git] / drivers / misc / ocxl / config.c
1 // SPDX-License-Identifier: GPL-2.0+
2 // Copyright 2017 IBM Corp.
3 #include <linux/pci.h>
4 #include <asm/pnv-ocxl.h>
5 #include <misc/ocxl-config.h>
6 #include "ocxl_internal.h"
7
8 #define EXTRACT_BIT(val, bit) (!!(val & BIT(bit)))
9 #define EXTRACT_BITS(val, s, e) ((val & GENMASK(e, s)) >> s)
10
11 #define OCXL_DVSEC_AFU_IDX_MASK              GENMASK(5, 0)
12 #define OCXL_DVSEC_ACTAG_MASK                GENMASK(11, 0)
13 #define OCXL_DVSEC_PASID_MASK                GENMASK(19, 0)
14 #define OCXL_DVSEC_PASID_LOG_MASK            GENMASK(4, 0)
15
16 #define OCXL_DVSEC_TEMPL_VERSION         0x0
17 #define OCXL_DVSEC_TEMPL_NAME            0x4
18 #define OCXL_DVSEC_TEMPL_AFU_VERSION     0x1C
19 #define OCXL_DVSEC_TEMPL_MMIO_GLOBAL     0x20
20 #define OCXL_DVSEC_TEMPL_MMIO_GLOBAL_SZ  0x28
21 #define OCXL_DVSEC_TEMPL_MMIO_PP         0x30
22 #define OCXL_DVSEC_TEMPL_MMIO_PP_SZ      0x38
23 #define OCXL_DVSEC_TEMPL_MEM_SZ          0x3C
24 #define OCXL_DVSEC_TEMPL_WWID            0x40
25
26 #define OCXL_MAX_AFU_PER_FUNCTION 64
27 #define OCXL_TEMPL_LEN            0x58
28 #define OCXL_TEMPL_NAME_LEN       24
29 #define OCXL_CFG_TIMEOUT     3
30
31 static int find_dvsec(struct pci_dev *dev, int dvsec_id)
32 {
33         int vsec = 0;
34         u16 vendor, id;
35
36         while ((vsec = pci_find_next_ext_capability(dev, vsec,
37                                                     OCXL_EXT_CAP_ID_DVSEC))) {
38                 pci_read_config_word(dev, vsec + OCXL_DVSEC_VENDOR_OFFSET,
39                                 &vendor);
40                 pci_read_config_word(dev, vsec + OCXL_DVSEC_ID_OFFSET, &id);
41                 if (vendor == PCI_VENDOR_ID_IBM && id == dvsec_id)
42                         return vsec;
43         }
44         return 0;
45 }
46
47 static int find_dvsec_afu_ctrl(struct pci_dev *dev, u8 afu_idx)
48 {
49         int vsec = 0;
50         u16 vendor, id;
51         u8 idx;
52
53         while ((vsec = pci_find_next_ext_capability(dev, vsec,
54                                                     OCXL_EXT_CAP_ID_DVSEC))) {
55                 pci_read_config_word(dev, vsec + OCXL_DVSEC_VENDOR_OFFSET,
56                                 &vendor);
57                 pci_read_config_word(dev, vsec + OCXL_DVSEC_ID_OFFSET, &id);
58
59                 if (vendor == PCI_VENDOR_ID_IBM &&
60                         id == OCXL_DVSEC_AFU_CTRL_ID) {
61                         pci_read_config_byte(dev,
62                                         vsec + OCXL_DVSEC_AFU_CTRL_AFU_IDX,
63                                         &idx);
64                         if (idx == afu_idx)
65                                 return vsec;
66                 }
67         }
68         return 0;
69 }
70
71 static void read_pasid(struct pci_dev *dev, struct ocxl_fn_config *fn)
72 {
73         u16 val;
74         int pos;
75
76         pos = pci_find_ext_capability(dev, PCI_EXT_CAP_ID_PASID);
77         if (!pos) {
78                 /*
79                  * PASID capability is not mandatory, but there
80                  * shouldn't be any AFU
81                  */
82                 dev_dbg(&dev->dev, "Function doesn't require any PASID\n");
83                 fn->max_pasid_log = -1;
84                 goto out;
85         }
86         pci_read_config_word(dev, pos + PCI_PASID_CAP, &val);
87         fn->max_pasid_log = EXTRACT_BITS(val, 8, 12);
88
89 out:
90         dev_dbg(&dev->dev, "PASID capability:\n");
91         dev_dbg(&dev->dev, "  Max PASID log = %d\n", fn->max_pasid_log);
92 }
93
94 static int read_dvsec_tl(struct pci_dev *dev, struct ocxl_fn_config *fn)
95 {
96         int pos;
97
98         pos = find_dvsec(dev, OCXL_DVSEC_TL_ID);
99         if (!pos && PCI_FUNC(dev->devfn) == 0) {
100                 dev_err(&dev->dev, "Can't find TL DVSEC\n");
101                 return -ENODEV;
102         }
103         if (pos && PCI_FUNC(dev->devfn) != 0) {
104                 dev_err(&dev->dev, "TL DVSEC is only allowed on function 0\n");
105                 return -ENODEV;
106         }
107         fn->dvsec_tl_pos = pos;
108         return 0;
109 }
110
111 static int read_dvsec_function(struct pci_dev *dev, struct ocxl_fn_config *fn)
112 {
113         int pos, afu_present;
114         u32 val;
115
116         pos = find_dvsec(dev, OCXL_DVSEC_FUNC_ID);
117         if (!pos) {
118                 dev_err(&dev->dev, "Can't find function DVSEC\n");
119                 return -ENODEV;
120         }
121         fn->dvsec_function_pos = pos;
122
123         pci_read_config_dword(dev, pos + OCXL_DVSEC_FUNC_OFF_INDEX, &val);
124         afu_present = EXTRACT_BIT(val, 31);
125         if (!afu_present) {
126                 fn->max_afu_index = -1;
127                 dev_dbg(&dev->dev, "Function doesn't define any AFU\n");
128                 goto out;
129         }
130         fn->max_afu_index = EXTRACT_BITS(val, 24, 29);
131
132 out:
133         dev_dbg(&dev->dev, "Function DVSEC:\n");
134         dev_dbg(&dev->dev, "  Max AFU index = %d\n", fn->max_afu_index);
135         return 0;
136 }
137
138 static int read_dvsec_afu_info(struct pci_dev *dev, struct ocxl_fn_config *fn)
139 {
140         int pos;
141
142         if (fn->max_afu_index < 0) {
143                 fn->dvsec_afu_info_pos = -1;
144                 return 0;
145         }
146
147         pos = find_dvsec(dev, OCXL_DVSEC_AFU_INFO_ID);
148         if (!pos) {
149                 dev_err(&dev->dev, "Can't find AFU information DVSEC\n");
150                 return -ENODEV;
151         }
152         fn->dvsec_afu_info_pos = pos;
153         return 0;
154 }
155
156 static int read_dvsec_vendor(struct pci_dev *dev)
157 {
158         int pos;
159         u32 cfg, tlx, dlx;
160
161         /*
162          * vendor specific DVSEC is optional
163          *
164          * It's currently only used on function 0 to specify the
165          * version of some logic blocks. Some older images may not
166          * even have it so we ignore any errors
167          */
168         if (PCI_FUNC(dev->devfn) != 0)
169                 return 0;
170
171         pos = find_dvsec(dev, OCXL_DVSEC_VENDOR_ID);
172         if (!pos)
173                 return 0;
174
175         pci_read_config_dword(dev, pos + OCXL_DVSEC_VENDOR_CFG_VERS, &cfg);
176         pci_read_config_dword(dev, pos + OCXL_DVSEC_VENDOR_TLX_VERS, &tlx);
177         pci_read_config_dword(dev, pos + OCXL_DVSEC_VENDOR_DLX_VERS, &dlx);
178
179         dev_dbg(&dev->dev, "Vendor specific DVSEC:\n");
180         dev_dbg(&dev->dev, "  CFG version = 0x%x\n", cfg);
181         dev_dbg(&dev->dev, "  TLX version = 0x%x\n", tlx);
182         dev_dbg(&dev->dev, "  DLX version = 0x%x\n", dlx);
183         return 0;
184 }
185
186 static int validate_function(struct pci_dev *dev, struct ocxl_fn_config *fn)
187 {
188         if (fn->max_pasid_log == -1 && fn->max_afu_index >= 0) {
189                 dev_err(&dev->dev,
190                         "AFUs are defined but no PASIDs are requested\n");
191                 return -EINVAL;
192         }
193
194         if (fn->max_afu_index > OCXL_MAX_AFU_PER_FUNCTION) {
195                 dev_err(&dev->dev,
196                         "Max AFU index out of architectural limit (%d vs %d)\n",
197                         fn->max_afu_index, OCXL_MAX_AFU_PER_FUNCTION);
198                 return -EINVAL;
199         }
200         return 0;
201 }
202
203 int ocxl_config_read_function(struct pci_dev *dev, struct ocxl_fn_config *fn)
204 {
205         int rc;
206
207         read_pasid(dev, fn);
208
209         rc = read_dvsec_tl(dev, fn);
210         if (rc) {
211                 dev_err(&dev->dev,
212                         "Invalid Transaction Layer DVSEC configuration: %d\n",
213                         rc);
214                 return -ENODEV;
215         }
216
217         rc = read_dvsec_function(dev, fn);
218         if (rc) {
219                 dev_err(&dev->dev,
220                         "Invalid Function DVSEC configuration: %d\n", rc);
221                 return -ENODEV;
222         }
223
224         rc = read_dvsec_afu_info(dev, fn);
225         if (rc) {
226                 dev_err(&dev->dev, "Invalid AFU configuration: %d\n", rc);
227                 return -ENODEV;
228         }
229
230         rc = read_dvsec_vendor(dev);
231         if (rc) {
232                 dev_err(&dev->dev,
233                         "Invalid vendor specific DVSEC configuration: %d\n",
234                         rc);
235                 return -ENODEV;
236         }
237
238         rc = validate_function(dev, fn);
239         return rc;
240 }
241 EXPORT_SYMBOL_GPL(ocxl_config_read_function);
242
243 static int read_afu_info(struct pci_dev *dev, struct ocxl_fn_config *fn,
244                         int offset, u32 *data)
245 {
246         u32 val;
247         unsigned long timeout = jiffies + (HZ * OCXL_CFG_TIMEOUT);
248         int pos = fn->dvsec_afu_info_pos;
249
250         /* Protect 'data valid' bit */
251         if (EXTRACT_BIT(offset, 31)) {
252                 dev_err(&dev->dev, "Invalid offset in AFU info DVSEC\n");
253                 return -EINVAL;
254         }
255
256         pci_write_config_dword(dev, pos + OCXL_DVSEC_AFU_INFO_OFF, offset);
257         pci_read_config_dword(dev, pos + OCXL_DVSEC_AFU_INFO_OFF, &val);
258         while (!EXTRACT_BIT(val, 31)) {
259                 if (time_after_eq(jiffies, timeout)) {
260                         dev_err(&dev->dev,
261                                 "Timeout while reading AFU info DVSEC (offset=%d)\n",
262                                 offset);
263                         return -EBUSY;
264                 }
265                 cpu_relax();
266                 pci_read_config_dword(dev, pos + OCXL_DVSEC_AFU_INFO_OFF, &val);
267         }
268         pci_read_config_dword(dev, pos + OCXL_DVSEC_AFU_INFO_DATA, data);
269         return 0;
270 }
271
272 int ocxl_config_check_afu_index(struct pci_dev *dev,
273                                 struct ocxl_fn_config *fn, int afu_idx)
274 {
275         u32 val;
276         int rc, templ_major, templ_minor, len;
277
278         pci_write_config_byte(dev,
279                         fn->dvsec_afu_info_pos + OCXL_DVSEC_AFU_INFO_AFU_IDX,
280                         afu_idx);
281         rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_VERSION, &val);
282         if (rc)
283                 return rc;
284
285         /* AFU index map can have holes */
286         if (!val)
287                 return 0;
288
289         templ_major = EXTRACT_BITS(val, 8, 15);
290         templ_minor = EXTRACT_BITS(val, 0, 7);
291         dev_dbg(&dev->dev, "AFU descriptor template version %d.%d\n",
292                 templ_major, templ_minor);
293
294         len = EXTRACT_BITS(val, 16, 31);
295         if (len != OCXL_TEMPL_LEN) {
296                 dev_warn(&dev->dev,
297                         "Unexpected template length in AFU information (%#x)\n",
298                         len);
299         }
300         return 1;
301 }
302
303 static int read_afu_name(struct pci_dev *dev, struct ocxl_fn_config *fn,
304                         struct ocxl_afu_config *afu)
305 {
306         int i, rc;
307         u32 val, *ptr;
308
309         BUILD_BUG_ON(OCXL_AFU_NAME_SZ < OCXL_TEMPL_NAME_LEN);
310         for (i = 0; i < OCXL_TEMPL_NAME_LEN; i += 4) {
311                 rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_NAME + i, &val);
312                 if (rc)
313                         return rc;
314                 ptr = (u32 *) &afu->name[i];
315                 *ptr = le32_to_cpu((__force __le32) val);
316         }
317         afu->name[OCXL_AFU_NAME_SZ - 1] = '\0'; /* play safe */
318         return 0;
319 }
320
321 static int read_afu_mmio(struct pci_dev *dev, struct ocxl_fn_config *fn,
322                         struct ocxl_afu_config *afu)
323 {
324         int rc;
325         u32 val;
326
327         /*
328          * Global MMIO
329          */
330         rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MMIO_GLOBAL, &val);
331         if (rc)
332                 return rc;
333         afu->global_mmio_bar = EXTRACT_BITS(val, 0, 2);
334         afu->global_mmio_offset = EXTRACT_BITS(val, 16, 31) << 16;
335
336         rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MMIO_GLOBAL + 4, &val);
337         if (rc)
338                 return rc;
339         afu->global_mmio_offset += (u64) val << 32;
340
341         rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MMIO_GLOBAL_SZ, &val);
342         if (rc)
343                 return rc;
344         afu->global_mmio_size = val;
345
346         /*
347          * Per-process MMIO
348          */
349         rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MMIO_PP, &val);
350         if (rc)
351                 return rc;
352         afu->pp_mmio_bar = EXTRACT_BITS(val, 0, 2);
353         afu->pp_mmio_offset = EXTRACT_BITS(val, 16, 31) << 16;
354
355         rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MMIO_PP + 4, &val);
356         if (rc)
357                 return rc;
358         afu->pp_mmio_offset += (u64) val << 32;
359
360         rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MMIO_PP_SZ, &val);
361         if (rc)
362                 return rc;
363         afu->pp_mmio_stride = val;
364
365         return 0;
366 }
367
368 static int read_afu_control(struct pci_dev *dev, struct ocxl_afu_config *afu)
369 {
370         int pos;
371         u8 val8;
372         u16 val16;
373
374         pos = find_dvsec_afu_ctrl(dev, afu->idx);
375         if (!pos) {
376                 dev_err(&dev->dev, "Can't find AFU control DVSEC for AFU %d\n",
377                         afu->idx);
378                 return -ENODEV;
379         }
380         afu->dvsec_afu_control_pos = pos;
381
382         pci_read_config_byte(dev, pos + OCXL_DVSEC_AFU_CTRL_PASID_SUP, &val8);
383         afu->pasid_supported_log = EXTRACT_BITS(val8, 0, 4);
384
385         pci_read_config_word(dev, pos + OCXL_DVSEC_AFU_CTRL_ACTAG_SUP, &val16);
386         afu->actag_supported = EXTRACT_BITS(val16, 0, 11);
387         return 0;
388 }
389
390 static bool char_allowed(int c)
391 {
392         /*
393          * Permitted Characters : Alphanumeric, hyphen, underscore, comma
394          */
395         if ((c >= 0x30 && c <= 0x39) /* digits */ ||
396                 (c >= 0x41 && c <= 0x5A) /* upper case */ ||
397                 (c >= 0x61 && c <= 0x7A) /* lower case */ ||
398                 c == 0 /* NULL */ ||
399                 c == 0x2D /* - */ ||
400                 c == 0x5F /* _ */ ||
401                 c == 0x2C /* , */)
402                 return true;
403         return false;
404 }
405
406 static int validate_afu(struct pci_dev *dev, struct ocxl_afu_config *afu)
407 {
408         int i;
409
410         if (!afu->name[0]) {
411                 dev_err(&dev->dev, "Empty AFU name\n");
412                 return -EINVAL;
413         }
414         for (i = 0; i < OCXL_TEMPL_NAME_LEN; i++) {
415                 if (!char_allowed(afu->name[i])) {
416                         dev_err(&dev->dev,
417                                 "Invalid character in AFU name\n");
418                         return -EINVAL;
419                 }
420         }
421
422         if (afu->global_mmio_bar != 0 &&
423                 afu->global_mmio_bar != 2 &&
424                 afu->global_mmio_bar != 4) {
425                 dev_err(&dev->dev, "Invalid global MMIO bar number\n");
426                 return -EINVAL;
427         }
428         if (afu->pp_mmio_bar != 0 &&
429                 afu->pp_mmio_bar != 2 &&
430                 afu->pp_mmio_bar != 4) {
431                 dev_err(&dev->dev, "Invalid per-process MMIO bar number\n");
432                 return -EINVAL;
433         }
434         return 0;
435 }
436
437 int ocxl_config_read_afu(struct pci_dev *dev, struct ocxl_fn_config *fn,
438                         struct ocxl_afu_config *afu, u8 afu_idx)
439 {
440         int rc;
441         u32 val32;
442
443         /*
444          * First, we need to write the AFU idx for the AFU we want to
445          * access.
446          */
447         WARN_ON((afu_idx & OCXL_DVSEC_AFU_IDX_MASK) != afu_idx);
448         afu->idx = afu_idx;
449         pci_write_config_byte(dev,
450                         fn->dvsec_afu_info_pos + OCXL_DVSEC_AFU_INFO_AFU_IDX,
451                         afu->idx);
452
453         rc = read_afu_name(dev, fn, afu);
454         if (rc)
455                 return rc;
456
457         rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_AFU_VERSION, &val32);
458         if (rc)
459                 return rc;
460         afu->version_major = EXTRACT_BITS(val32, 24, 31);
461         afu->version_minor = EXTRACT_BITS(val32, 16, 23);
462         afu->afuc_type = EXTRACT_BITS(val32, 14, 15);
463         afu->afum_type = EXTRACT_BITS(val32, 12, 13);
464         afu->profile = EXTRACT_BITS(val32, 0, 7);
465
466         rc = read_afu_mmio(dev, fn, afu);
467         if (rc)
468                 return rc;
469
470         rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MEM_SZ, &val32);
471         if (rc)
472                 return rc;
473         afu->log_mem_size = EXTRACT_BITS(val32, 0, 7);
474
475         rc = read_afu_control(dev, afu);
476         if (rc)
477                 return rc;
478
479         dev_dbg(&dev->dev, "AFU configuration:\n");
480         dev_dbg(&dev->dev, "  name = %s\n", afu->name);
481         dev_dbg(&dev->dev, "  version = %d.%d\n", afu->version_major,
482                 afu->version_minor);
483         dev_dbg(&dev->dev, "  global mmio bar = %hhu\n", afu->global_mmio_bar);
484         dev_dbg(&dev->dev, "  global mmio offset = %#llx\n",
485                 afu->global_mmio_offset);
486         dev_dbg(&dev->dev, "  global mmio size = %#x\n", afu->global_mmio_size);
487         dev_dbg(&dev->dev, "  pp mmio bar = %hhu\n", afu->pp_mmio_bar);
488         dev_dbg(&dev->dev, "  pp mmio offset = %#llx\n", afu->pp_mmio_offset);
489         dev_dbg(&dev->dev, "  pp mmio stride = %#x\n", afu->pp_mmio_stride);
490         dev_dbg(&dev->dev, "  mem size (log) = %hhu\n", afu->log_mem_size);
491         dev_dbg(&dev->dev, "  pasid supported (log) = %u\n",
492                 afu->pasid_supported_log);
493         dev_dbg(&dev->dev, "  actag supported = %u\n",
494                 afu->actag_supported);
495
496         rc = validate_afu(dev, afu);
497         return rc;
498 }
499 EXPORT_SYMBOL_GPL(ocxl_config_read_afu);
500
501 int ocxl_config_get_actag_info(struct pci_dev *dev, u16 *base, u16 *enabled,
502                         u16 *supported)
503 {
504         int rc;
505
506         /*
507          * This is really a simple wrapper for the kernel API, to
508          * avoid an external driver using ocxl as a library to call
509          * platform-dependent code
510          */
511         rc = pnv_ocxl_get_actag(dev, base, enabled, supported);
512         if (rc) {
513                 dev_err(&dev->dev, "Can't get actag for device: %d\n", rc);
514                 return rc;
515         }
516         return 0;
517 }
518 EXPORT_SYMBOL_GPL(ocxl_config_get_actag_info);
519
520 void ocxl_config_set_afu_actag(struct pci_dev *dev, int pos, int actag_base,
521                         int actag_count)
522 {
523         u16 val;
524
525         val = actag_count & OCXL_DVSEC_ACTAG_MASK;
526         pci_write_config_byte(dev, pos + OCXL_DVSEC_AFU_CTRL_ACTAG_EN, val);
527
528         val = actag_base & OCXL_DVSEC_ACTAG_MASK;
529         pci_write_config_dword(dev, pos + OCXL_DVSEC_AFU_CTRL_ACTAG_BASE, val);
530 }
531 EXPORT_SYMBOL_GPL(ocxl_config_set_afu_actag);
532
533 int ocxl_config_get_pasid_info(struct pci_dev *dev, int *count)
534 {
535         return pnv_ocxl_get_pasid_count(dev, count);
536 }
537
538 void ocxl_config_set_afu_pasid(struct pci_dev *dev, int pos, int pasid_base,
539                         u32 pasid_count_log)
540 {
541         u8 val8;
542         u32 val32;
543
544         val8 = pasid_count_log & OCXL_DVSEC_PASID_LOG_MASK;
545         pci_write_config_byte(dev, pos + OCXL_DVSEC_AFU_CTRL_PASID_EN, val8);
546
547         pci_read_config_dword(dev, pos + OCXL_DVSEC_AFU_CTRL_PASID_BASE,
548                         &val32);
549         val32 &= ~OCXL_DVSEC_PASID_MASK;
550         val32 |= pasid_base & OCXL_DVSEC_PASID_MASK;
551         pci_write_config_dword(dev, pos + OCXL_DVSEC_AFU_CTRL_PASID_BASE,
552                         val32);
553 }
554 EXPORT_SYMBOL_GPL(ocxl_config_set_afu_pasid);
555
556 void ocxl_config_set_afu_state(struct pci_dev *dev, int pos, int enable)
557 {
558         u8 val;
559
560         pci_read_config_byte(dev, pos + OCXL_DVSEC_AFU_CTRL_ENABLE, &val);
561         if (enable)
562                 val |= 1;
563         else
564                 val &= 0xFE;
565         pci_write_config_byte(dev, pos + OCXL_DVSEC_AFU_CTRL_ENABLE, val);
566 }
567 EXPORT_SYMBOL_GPL(ocxl_config_set_afu_state);
568
569 int ocxl_config_set_TL(struct pci_dev *dev, int tl_dvsec)
570 {
571         u32 val;
572         __be32 *be32ptr;
573         u8 timers;
574         int i, rc;
575         long recv_cap;
576         char *recv_rate;
577
578         /*
579          * Skip on function != 0, as the TL can only be defined on 0
580          */
581         if (PCI_FUNC(dev->devfn) != 0)
582                 return 0;
583
584         recv_rate = kzalloc(PNV_OCXL_TL_RATE_BUF_SIZE, GFP_KERNEL);
585         if (!recv_rate)
586                 return -ENOMEM;
587         /*
588          * The spec defines 64 templates for messages in the
589          * Transaction Layer (TL).
590          *
591          * The host and device each support a subset, so we need to
592          * configure the transmitters on each side to send only
593          * templates the receiver understands, at a rate the receiver
594          * can process.  Per the spec, template 0 must be supported by
595          * everybody. That's the template which has been used by the
596          * host and device so far.
597          *
598          * The sending rate limit must be set before the template is
599          * enabled.
600          */
601
602         /*
603          * Device -> host
604          */
605         rc = pnv_ocxl_get_tl_cap(dev, &recv_cap, recv_rate,
606                                 PNV_OCXL_TL_RATE_BUF_SIZE);
607         if (rc)
608                 goto out;
609
610         for (i = 0; i < PNV_OCXL_TL_RATE_BUF_SIZE; i += 4) {
611                 be32ptr = (__be32 *) &recv_rate[i];
612                 pci_write_config_dword(dev,
613                                 tl_dvsec + OCXL_DVSEC_TL_SEND_RATE + i,
614                                 be32_to_cpu(*be32ptr));
615         }
616         val = recv_cap >> 32;
617         pci_write_config_dword(dev, tl_dvsec + OCXL_DVSEC_TL_SEND_CAP, val);
618         val = recv_cap & GENMASK(31, 0);
619         pci_write_config_dword(dev, tl_dvsec + OCXL_DVSEC_TL_SEND_CAP + 4, val);
620
621         /*
622          * Host -> device
623          */
624         for (i = 0; i < PNV_OCXL_TL_RATE_BUF_SIZE; i += 4) {
625                 pci_read_config_dword(dev,
626                                 tl_dvsec + OCXL_DVSEC_TL_RECV_RATE + i,
627                                 &val);
628                 be32ptr = (__be32 *) &recv_rate[i];
629                 *be32ptr = cpu_to_be32(val);
630         }
631         pci_read_config_dword(dev, tl_dvsec + OCXL_DVSEC_TL_RECV_CAP, &val);
632         recv_cap = (long) val << 32;
633         pci_read_config_dword(dev, tl_dvsec + OCXL_DVSEC_TL_RECV_CAP + 4, &val);
634         recv_cap |= val;
635
636         rc = pnv_ocxl_set_tl_conf(dev, recv_cap, __pa(recv_rate),
637                                 PNV_OCXL_TL_RATE_BUF_SIZE);
638         if (rc)
639                 goto out;
640
641         /*
642          * Opencapi commands needing to be retried are classified per
643          * the TL in 2 groups: short and long commands.
644          *
645          * The short back off timer it not used for now. It will be
646          * for opencapi 4.0.
647          *
648          * The long back off timer is typically used when an AFU hits
649          * a page fault but the NPU is already processing one. So the
650          * AFU needs to wait before it can resubmit. Having a value
651          * too low doesn't break anything, but can generate extra
652          * traffic on the link.
653          * We set it to 1.6 us for now. It's shorter than, but in the
654          * same order of magnitude as the time spent to process a page
655          * fault.
656          */
657         timers = 0x2 << 4; /* long timer = 1.6 us */
658         pci_write_config_byte(dev, tl_dvsec + OCXL_DVSEC_TL_BACKOFF_TIMERS,
659                         timers);
660
661         rc = 0;
662 out:
663         kfree(recv_rate);
664         return rc;
665 }
666 EXPORT_SYMBOL_GPL(ocxl_config_set_TL);
667
668 int ocxl_config_terminate_pasid(struct pci_dev *dev, int afu_control, int pasid)
669 {
670         u32 val;
671         unsigned long timeout;
672
673         pci_read_config_dword(dev, afu_control + OCXL_DVSEC_AFU_CTRL_TERM_PASID,
674                         &val);
675         if (EXTRACT_BIT(val, 20)) {
676                 dev_err(&dev->dev,
677                         "Can't terminate PASID %#x, previous termination didn't complete\n",
678                         pasid);
679                 return -EBUSY;
680         }
681
682         val &= ~OCXL_DVSEC_PASID_MASK;
683         val |= pasid & OCXL_DVSEC_PASID_MASK;
684         val |= BIT(20);
685         pci_write_config_dword(dev,
686                         afu_control + OCXL_DVSEC_AFU_CTRL_TERM_PASID,
687                         val);
688
689         timeout = jiffies + (HZ * OCXL_CFG_TIMEOUT);
690         pci_read_config_dword(dev, afu_control + OCXL_DVSEC_AFU_CTRL_TERM_PASID,
691                         &val);
692         while (EXTRACT_BIT(val, 20)) {
693                 if (time_after_eq(jiffies, timeout)) {
694                         dev_err(&dev->dev,
695                                 "Timeout while waiting for AFU to terminate PASID %#x\n",
696                                 pasid);
697                         return -EBUSY;
698                 }
699                 cpu_relax();
700                 pci_read_config_dword(dev,
701                                 afu_control + OCXL_DVSEC_AFU_CTRL_TERM_PASID,
702                                 &val);
703         }
704         return 0;
705 }
706 EXPORT_SYMBOL_GPL(ocxl_config_terminate_pasid);
707
708 void ocxl_config_set_actag(struct pci_dev *dev, int func_dvsec, u32 tag_first,
709                         u32 tag_count)
710 {
711         u32 val;
712
713         val = (tag_first & OCXL_DVSEC_ACTAG_MASK) << 16;
714         val |= tag_count & OCXL_DVSEC_ACTAG_MASK;
715         pci_write_config_dword(dev, func_dvsec + OCXL_DVSEC_FUNC_OFF_ACTAG,
716                         val);
717 }
718 EXPORT_SYMBOL_GPL(ocxl_config_set_actag);
This page took 0.073779 seconds and 4 git commands to generate.