Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756083AbcJVD1T (ORCPT ); Fri, 21 Oct 2016 23:27:19 -0400 Received: from rcdn-iport-1.cisco.com ([173.37.86.72]:47172 "EHLO rcdn-iport-1.cisco.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755988AbcJVD1Q (ORCPT ); Fri, 21 Oct 2016 23:27:16 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0CpCwBa3ApY/4cNJK1cGgEBAQECAQEBA?= =?us-ascii?q?QgBAQEBgz4BAQEBAR2BVAd2jDeWfZIvgg+CB4YhAhqBTD8UAQIBAQEBAQEBYh0?= =?us-ascii?q?LhGIBAQEDASMEDUUSAQgRAwECAQICJgIEHRMVCAoEDgWISgi2Ao0KAQEBAQEBA?= =?us-ascii?q?QEBAQEBAQEBAQEBAQEBHIEHhzMIglCERxeCbSyCLwWaFAEZiRWGYYFuhG2DOYV?= =?us-ascii?q?tjQKDfwEeNlqDFBwYgTpyhhIpgQaBAAEBAQ?= X-IronPort-AV: E=Sophos;i="5.31,527,1473120000"; d="scan'208";a="166154793" From: "David Singleton -X (davsingl - MONTA VISTA SOFTWARE INC at Cisco)" To: "helgaas@kernel.org" CC: "David Singleton -X (davsingl - MONTA VISTA SOFTWARE INC at Cisco)" , "linux-pci@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "Steve Shih (sshih)" , "xe-kernel@external.cisco.com" Subject: Re: Re: [PATCH] pcie: aer: aerdrv: PCIe AER workaround and handling for ASR1K platforms. Thread-Topic: Re: [PATCH] pcie: aer: aerdrv: PCIe AER workaround and handling for ASR1K platforms. Thread-Index: AQHSLBQsUDGQ1gvJVEasxkLw5BB23g== Date: Sat, 22 Oct 2016 03:27:10 +0000 Message-ID: <9D016821-8AF9-4995-A17D-7580C814BDD8@cisco.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-messagesentrepresentingtype: 1 x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.24.97.117] Content-Type: text/plain; charset="utf-8" Content-ID: MIME-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from base64 to 8bit by mail.home.local id u9M3RSuU006644 Content-Length: 18390 Lines: 501 Bjorn, sorry for the delay in getting back to you. The first patch was incomplete. The patch was not a complete unit. There was a second patch that has the callers of the routines in question. Appended are the two patches merged into one new patch. And here is an explanation from the original Author, Steve Shih. Hi Steve & David, On Mon, Oct 17, 2016 at 09:51:06AM -0700, David Singleton wrote: > From: Steve Shih > > ASR1K FPGAs and ASICs are configured to raise SERR/PERR through PCIe AER. > When an error is raised, it is detected at the root complex, but it is not > detected by the AER driver. If the root complex bridge control register is > configured to forward secondary bus errors to the primary bus (which is not > the case by default), then the aerdrv.c:aer_irq() is invoked, but the id read > from the PCI_ERR_ROOT_COR_SRC register is 0. When aer_isr_one_error() > processes the work posted by aer_irq(), it subsequently complains that > "aer_isr_one_err->can't find device of ID0000". > > Modifications need to be made such that PCIe AER are propagated through the > root complex detected by the AER driver and delivered to the ASR1K PCI error > handler. > > In additions, MCH5100 and 3500/5500 JF send broadcast EOI to subordinate > devices. However, the Cisco FPGAs and ASICs don't handle the vendor (Intel) > specific messages properly and rases Uncorrectable and Unsupported Request > errors. Thus, need to disable EOI Broadcast. > > This change is needed to support 1RU, FP40, Kingpin, FP80, and FP160. Can you help me understand this? I'm having trouble connecting the changelog to the patch. The patch adds a pci_aer_set_callbacks() interface, but no users of it. It also adds a pci_fixup_aer_enable fixup phase, but it is also unused. The changelog mentions a change to the root complex bridge control register, but I don't see that in the patch. It also mentions a broadcast EOI change, which also doesn't appear in the patch. We have another platform where AER doesn't work with the existing Linux driver; see [1]. It'd be nice if it turned out that the same sort of change would help both that system and your Cisco platforms. I'm familiar with the normal PCI Bridge Control Register. But I don't know what the "root complex bridge control register" is. Can you point me to a section of the spec? Since you mention forwarding secondary bus errors to the primary bus, maybe you mean a Root Port bridge control register? Is this a case of the hardware not quite conforming to the spec, or is it a case of spec-compliant hardware where Linux is just missing support for this particular case? I'm going to resist adding a new fixup phase, especially one as special-purpose as this one appears to be. Without seeing the way you want to actually use it, it's hard to tell, but likely one of the existing fixup phases would be enough. Bjorn Yes, it’s the root port PCI bridge control register at offset 0x3e: #define PCI_BRIDGE_CONTROL 0x3e #define PCI_BRIDGE_CTL_PARITY 0x01 /* Enable parity detection on secondary interface */ #define PCI_BRIDGE_CTL_SERR 0x02 /* The same for SERR forwarding */ #define PCI_BRIDGE_CTL_ISA 0x04 /* Enable ISA mode */ #define PCI_BRIDGE_CTL_VGA 0x08 /* Forward VGA addresses */ #define PCI_BRIDGE_CTL_MASTER_ABORT 0x20 /* Report master aborts */ #define PCI_BRIDGE_CTL_BUS_RESET 0x40 /* Secondary bus reset */ #define PCI_BRIDGE_CTL_FAST_BACK 0x80 /* Fast Back2Back enabled on secondary interface */ /* * We must also forward #SERR and #PERR from the secondary * to primary bus. This will result in the AER driver * receiving an interrupt that can then be delivered to * the device specific driver. */ pci_read_config_word(pdev, PCI_BRIDGE_CONTROL, ®16); reg16 |= PCI_BRIDGE_CTL_PARITY | PCI_BRIDGE_CTL_SERR; pci_write_config_word(pdev, PCI_BRIDGE_CONTROL, reg16); Yes, the Cisco FPGA/ASIC is not confirming to the PCIe standard in handling vendor specific messages. Instead of ignoring the Intel specific messages, the FPGA/ASIC raises Uncorrectable and Unsupported Request errors. /* * 3500/5500 series CPUs (JF) send broadcast EOI to * subordinate devices. It is a vendor (Intel) specific * message that should be ignored by non-Intel devices, * but our devices (Yoda etc) do not ignore it and * raise Uncorrectable and Unsupported Request * errors. * * The EOI is for the Intel IO APIC, which is not * present and therefore not required. * * Disable EOI Broadcast to avoid Uncorrectable and * Unsupported request errors from devices which do * not support the EOI and do not adhere to the PCIe * spec. */ pci_read_config_dword(pdev, MISCCTRLSTS_REG, ®32); reg32 |= MISCCTRLSTS_DISABLE_EOI_MASK; pci_write_config_dword(pdev, MISCCTRLSTS_REG, reg32); -Steve >From bf52b18d6babf4d1ff79b6036369af9d5dc991be Mon Sep 17 00:00:00 2001 From: Steve Shih Date: Mon, 10 Oct 2016 19:23:58 -0700 Subject: [PATCH] pcie: aer: aerdrv: PCIe AER workaround and handling for ASR1K platforms. ASR1K FPGAs and ASICs are configured to raise SERR/PERR through PCIe AER. When an error is raised, it is detected at the root complex, but it is not detected by the AER driver. If the root complex bridge control register is configured to forward secondary bus errors to the primary bus (which is not the case by default), then the aerdrv.c:aer_irq() is invoked, but the id read from the PCI_ERR_ROOT_COR_SRC register is 0. When aer_isr_one_error() processes the work posted by aer_irq(), it subsequently complains that "aer_isr_one_err->can't find device of ID0000". Modifications need to be made such that PCIe AER are propagated through the root complex detected by the AER driver and delivered to the ASR1K PCI error handler. In additions, MCH5100 and 3500/5500 JF send broadcast EOI to subordinate devices. However, the Cisco FPGAs and ASICs don't handle the vendor (Intel) specific messages properly and rases Uncorrectable and Unsupported Request errors. Thus, need to disable EOI Broadcast. This change is needed to support 1RU, FP40, Kingpin, FP80, and FP160. Cc: xe-kernel@external.cisco.com Signed-off-by: Steve Shih Signed-off-by: David Singleton --- arch/x86/Kconfig | 9 ++ arch/x86/platform/Makefile | 1 + arch/x86/platform/asr1k/Makefile | 1 + arch/x86/platform/asr1k/asr1k_aer.c | 165 ++++++++++++++++++++++++++++++++++++ drivers/pci/pcie/aer/aerdrv.c | 13 +++ drivers/pci/pcie/aer/aerdrv.h | 5 ++ drivers/pci/quirks.c | 7 ++ include/asm-generic/vmlinux.lds.h | 3 + include/linux/pci.h | 5 ++ 9 files changed, 209 insertions(+) create mode 100644 arch/x86/platform/asr1k/Makefile create mode 100644 arch/x86/platform/asr1k/asr1k_aer.c diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index bada636..11bdcb2 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -449,6 +449,15 @@ config X86_EXTENDED_PLATFORM endif # This is an alphabetically sorted list of 64 bit extended platforms # Please maintain the alphabetic order if and when there are additions + +config X86_ASR1K + bool "Cisco ASR1K" + depends on X86_64 + depends on X86_EXTENDED_PLATFORM + ---help--- + This option is needed in order to support Cisco ASR1K platforms. + If you don't have one of these, you should say N here. + config X86_NUMACHIP bool "Numascale NumaChip" depends on X86_64 diff --git a/arch/x86/platform/Makefile b/arch/x86/platform/Makefile index 3c3c19e..cbae8c2 100644 --- a/arch/x86/platform/Makefile +++ b/arch/x86/platform/Makefile @@ -1,5 +1,6 @@ # Platform specific code goes here obj-y += atom/ +obj-$(X86_ASR1K) += asr1k/ obj-y += ce4100/ obj-y += efi/ obj-y += geode/ diff --git a/arch/x86/platform/asr1k/Makefile b/arch/x86/platform/asr1k/Makefile new file mode 100644 index 0000000..0219e40 --- /dev/null +++ b/arch/x86/platform/asr1k/Makefile @@ -0,0 +1 @@ +obj-$(CONFIG_PCIEAER) += asr1k_aer.o diff --git a/arch/x86/platform/asr1k/asr1k_aer.c b/arch/x86/platform/asr1k/asr1k_aer.c new file mode 100644 index 0000000..6962672 --- /dev/null +++ b/arch/x86/platform/asr1k/asr1k_aer.c @@ -0,0 +1,165 @@ +/* + * Cisco ASR1K platform PCIe AER support + * + * Copyright (c) 2015 by cisco Systems, Inc. + */ + +#include +#include <../../../drivers/pci/pcie/aer/aerdrv.h> + +/* MCH 5100 */ +#define PCI_DEVICE_ID_5100_PORT_0 0x7270 +#define PCI_DEVICE_ID_5100_PORT_2_3 0x65F7 +#define PCI_DEVICE_ID_5100_PORT_6 0x65E6 +#define PEXCTRL3 0x4D +#define PEXCTRL3_MSI_RAS_ERREN 0x01 +#define PEXCTRL 0x48 +#define PEXCTRL_DIS_APIC_EOI 0x02 + +/* Jasper Forest - 3500/5500 Series */ +#define PCI_DEVICE_ID_3500_PORT_1 0x3721 +#define PCI_DEVICE_ID_3500_PORT_2 0x3722 +#define PCI_DEVICE_ID_3500_PORT_3 0x3723 +#define PCI_DEVICE_ID_3500_PORT_4 0x3724 +#define MISCCTRLSTS_REG 0x188 +#define MISCCTRLSTS_DISABLE_EOI_MASK 0x04000000 + +static int aer_err_src_mch5100(struct pci_dev *pdev, unsigned int *id) +{ + /* + * MCH 5100 doesn't populate src register, explained + * in an errata, so hard coding the source id + */ + *id = ((pdev->devfn << 16) | pdev->devfn); + + return 0; +} + +static int aer_err_src_jf(struct pci_dev *pdev, unsigned int *id) +{ + /* + * Xeon 3500/5500 series (Jasper Forest) doesn't populate + * the source register either, so we must hard code. + */ + unsigned int devfn = (pdev->subordinate->number << 8) | + PCI_DEVFN(0,0); + *id = (devfn << 16) | devfn; + + return 0; +} + +int aer_err_src(struct pci_dev *dev, unsigned int *id) +{ + if ((dev->vendor == PCI_VENDOR_ID_INTEL) && + ((dev->device == PCI_DEVICE_ID_5100_PORT_0) || + (dev->device == PCI_DEVICE_ID_5100_PORT_2_3) || + (dev->device == PCI_DEVICE_ID_5100_PORT_6))) + return aer_err_src_mch5100(dev, id); + + if ((dev->vendor == PCI_VENDOR_ID_INTEL) && + ((dev->device == PCI_DEVICE_ID_3500_PORT_1) || + (dev->device == PCI_DEVICE_ID_3500_PORT_2) || + (dev->device == PCI_DEVICE_ID_3500_PORT_3) || + (dev->device == PCI_DEVICE_ID_3500_PORT_4))) + return aer_err_src_jf(dev, id); + + return 0; +} + +static bool aer_callbacks_set; + +static struct pci_aer_callbacks aer_callbacks = { + .error_source = aer_err_src, +}; + +static void aer_enable_rootport_mch5100(struct pci_dev *pdev) +{ + u32 reg32; + u8 reg8; + + if (!aer_callbacks_set) { + pci_aer_set_callbacks(&aer_callbacks); + aer_callbacks_set = true; + } + + /* + * MCH5100 sends broadcast EOI to subordinate + * devices. It is a vendor (Intel) specific message + * that should be ignored by non-Intel devices, but + * our devices (Hytop etc) do not ignore it and + * raise Uncorrectable and Unsupported Request + * errors. + * + * The EOI is for the Intel IO APIC, which is not + * present and therefore not required. + * + * Disable EOI Broadcast to avoid Uncorrectable and + * Unsupported request errors from devices which do + * not support the EOI and do not adhere to the PCIe + * spec. + */ + pci_read_config_dword(pdev, PEXCTRL, ®32); + reg32 |= PEXCTRL_DIS_APIC_EOI; + pci_write_config_dword(pdev, PEXCTRL, reg32); + + /* Enable MSI */ + pci_read_config_byte(pdev, PEXCTRL3, ®8); + reg8 |= PEXCTRL3_MSI_RAS_ERREN; + pci_write_config_byte(pdev, PEXCTRL3, reg8); +} + +static void aer_enable_rootport_jf(struct pci_dev *pdev) +{ + u32 reg32; + u16 reg16; + + if (!aer_callbacks_set) { + pci_aer_set_callbacks(&aer_callbacks); + aer_callbacks_set = true; + } + + /* + * 3500/5500 series CPUs (JF) send broadcast EOI to + * subordinate devices. It is a vendor (Intel) specific + * message that should be ignored by non-Intel devices, + * but our devices (Yoda etc) do not ignore it and + * raise Uncorrectable and Unsupported Request + * errors. + * + * The EOI is for the Intel IO APIC, which is not + * present and therefore not required. + * + * Disable EOI Broadcast to avoid Uncorrectable and + * Unsupported request errors from devices which do + * not support the EOI and do not adhere to the PCIe + * spec. + */ + pci_read_config_dword(pdev, MISCCTRLSTS_REG, ®32); + reg32 |= MISCCTRLSTS_DISABLE_EOI_MASK; + pci_write_config_dword(pdev, MISCCTRLSTS_REG, reg32); + + /* + * We must also forward #SERR and #PERR from the secondary + * to primary bus. This will result in the AER driver + * receiving an interrupt that can then be delivered to + * the device specific driver. + */ + pci_read_config_word(pdev, PCI_BRIDGE_CONTROL, ®16); + reg16 |= PCI_BRIDGE_CTL_PARITY | PCI_BRIDGE_CTL_SERR; + pci_write_config_word(pdev, PCI_BRIDGE_CONTROL, reg16); +} + +DECLARE_PCI_FIXUP_AER_ENABLE(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_5100_PORT_0, + aer_enable_rootport_mch5100); +DECLARE_PCI_FIXUP_AER_ENABLE(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_5100_PORT_2_3, + aer_enable_rootport_mch5100); +DECLARE_PCI_FIXUP_AER_ENABLE(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_5100_PORT_6, + aer_enable_rootport_mch5100); +DECLARE_PCI_FIXUP_AER_ENABLE(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_3500_PORT_1, + aer_enable_rootport_jf); +DECLARE_PCI_FIXUP_AER_ENABLE(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_3500_PORT_2, + aer_enable_rootport_jf); +DECLARE_PCI_FIXUP_AER_ENABLE(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_3500_PORT_3, + aer_enable_rootport_jf); +DECLARE_PCI_FIXUP_AER_ENABLE(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_3500_PORT_4, + aer_enable_rootport_jf); diff --git a/drivers/pci/pcie/aer/aerdrv.c b/drivers/pci/pcie/aer/aerdrv.c index 139150b..836e0cb 100644 --- a/drivers/pci/pcie/aer/aerdrv.c +++ b/drivers/pci/pcie/aer/aerdrv.c @@ -62,6 +62,8 @@ static struct pcie_port_service_driver aerdriver = { .reset_link = aer_root_reset, }; +static struct pci_aer_callbacks callbacks; + static int pcie_aer_disable; void pci_no_aer(void) @@ -74,6 +76,11 @@ bool pci_aer_available(void) return !pcie_aer_disable && pci_msi_enabled(); } +void pci_aer_set_callbacks(struct pci_aer_callbacks *cb) +{ + memcpy(&callbacks, cb, sizeof(*cb)); +} + static int set_device_error_reporting(struct pci_dev *dev, void *data) { bool enable = *((bool *)data); @@ -149,6 +156,8 @@ static void aer_enable_rootport(struct aer_rpc *rpc) pci_read_config_dword(pdev, aer_pos + PCI_ERR_ROOT_COMMAND, ®32); reg32 |= ROOT_PORT_INTR_ON_MESG_MASK; pci_write_config_dword(pdev, aer_pos + PCI_ERR_ROOT_COMMAND, reg32); + + pci_fixup_device(pci_fixup_aer_enable, pdev); } /** @@ -212,6 +221,10 @@ irqreturn_t aer_irq(int irq, void *context) /* Read error source and clear error status */ pci_read_config_dword(pdev->port, pos + PCI_ERR_ROOT_ERR_SRC, &id); + + if (callbacks.error_source) + callbacks.error_source(pdev->port, &id); + pci_write_config_dword(pdev->port, pos + PCI_ERR_ROOT_STATUS, status); /* Store error source for later DPC handler */ diff --git a/drivers/pci/pcie/aer/aerdrv.h b/drivers/pci/pcie/aer/aerdrv.h index d51e4a5..79ac642 100644 --- a/drivers/pci/pcie/aer/aerdrv.h +++ b/drivers/pci/pcie/aer/aerdrv.h @@ -80,6 +80,10 @@ struct aer_broadcast_data { enum pci_ers_result result; }; +struct pci_aer_callbacks { + int (*error_source)(struct pci_dev *dev, unsigned int *id); +}; + static inline pci_ers_result_t merge_result(enum pci_ers_result orig, enum pci_ers_result new) { @@ -110,6 +114,7 @@ void aer_isr(struct work_struct *work); void aer_print_error(struct pci_dev *dev, struct aer_err_info *info); void aer_print_port_info(struct pci_dev *dev, struct aer_err_info *info); irqreturn_t aer_irq(int irq, void *context); +void pci_aer_set_callbacks(struct pci_aer_callbacks *cb); #ifdef CONFIG_ACPI_APEI int pcie_aer_get_firmware_first(struct pci_dev *pci_dev); diff --git a/drivers/pci/quirks.c b/drivers/pci/quirks.c index c232729..63b33ff 100644 --- a/drivers/pci/quirks.c +++ b/drivers/pci/quirks.c @@ -3397,6 +3397,8 @@ extern struct pci_fixup __start_pci_fixups_suspend[]; extern struct pci_fixup __end_pci_fixups_suspend[]; extern struct pci_fixup __start_pci_fixups_suspend_late[]; extern struct pci_fixup __end_pci_fixups_suspend_late[]; +extern struct pci_fixup __start_pci_fixups_aer_enable[]; +extern struct pci_fixup __end_pci_fixups_aer_enable[]; static bool pci_apply_fixup_final_quirks; @@ -3447,6 +3449,11 @@ void pci_fixup_device(enum pci_fixup_pass pass, struct pci_dev *dev) end = __end_pci_fixups_suspend_late; break; + case pci_fixup_aer_enable: + start = __start_pci_fixups_aer_enable; + end = __end_pci_fixups_aer_enable; + break; + default: /* stupid compiler warning, you would think with an enum... */ return; diff --git a/include/asm-generic/vmlinux.lds.h b/include/asm-generic/vmlinux.lds.h index 3074796..c646106 100644 --- a/include/asm-generic/vmlinux.lds.h +++ b/include/asm-generic/vmlinux.lds.h @@ -311,6 +311,9 @@ VMLINUX_SYMBOL(__start_pci_fixups_suspend_late) = .; \ *(.pci_fixup_suspend_late) \ VMLINUX_SYMBOL(__end_pci_fixups_suspend_late) = .; \ + VMLINUX_SYMBOL(__start_pci_fixups_aer_enable) = .; \ + *(.pci_fixup_aer_enable) \ + VMLINUX_SYMBOL(__end_pci_fixups_aer_enable) = .; \ } \ \ /* Built-in firmware blobs */ \ diff --git a/include/linux/pci.h b/include/linux/pci.h index 0e49f70..9a9119c 100644 --- a/include/linux/pci.h +++ b/include/linux/pci.h @@ -1689,6 +1689,7 @@ enum pci_fixup_pass { pci_fixup_suspend, /* pci_device_suspend() */ pci_fixup_resume_early, /* pci_device_resume_early() */ pci_fixup_suspend_late, /* pci_device_suspend_late() */ + pci_fixup_aer_enable, /* pci_device_aer_enable() */ }; /* Anonymous variables would be nice... */ @@ -1763,6 +1764,10 @@ enum pci_fixup_pass { DECLARE_PCI_FIXUP_SECTION(.pci_fixup_suspend_late, \ suspend_late##hook, vendor, device, \ PCI_ANY_ID, 0, hook) +#define DECLARE_PCI_FIXUP_AER_ENABLE(vendor, device, hook) \ + DECLARE_PCI_FIXUP_SECTION(.pci_fixup_aer_enable, \ + aer_enable##vendor##device##hook, vendor, device, \ + PCI_ANY_ID, 0, hook) #ifdef CONFIG_PCI_QUIRKS void pci_fixup_device(enum pci_fixup_pass pass, struct pci_dev *dev); -- 2.10.1