Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2424944imm; Sat, 16 Jun 2018 18:18:41 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIh25p47rOCfWNQCMbo85SbSRutw8c0YNvpVRVAwbSm1+pfsvAkI6Y6ebeb8IRfUlUKPcGJ X-Received: by 2002:a17:902:321:: with SMTP id 30-v6mr8497695pld.122.1529198321527; Sat, 16 Jun 2018 18:18:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529198321; cv=none; d=google.com; s=arc-20160816; b=T00Jbxy8/djilLPDl0C4H2JP2aF5asJHiesUR5I2cEQ48LqKwR99Gox50Lzzh3ap17 VZzkmZLKNqI6Yz9XmcnItgZ5APt9Y7ngPOg6ArkfYWtdG7o9DmKJ0TPKe5IVa3xNc56e Jc3i7WRZTzXCxIfqBjd3lCGtgdCBH/zM1vnPUXaJIbuYkp/ORkpM2GW6XrkqQR7Y2Xtg BlCllKbLQm0t1HQyCP4QQ5SuKZmY0RZJAgbdWZbsBWwpFWwcAmm8CE/jSNEXhLx+nGhV bbJr12J0lc80uRl9VCUgICLPPILKHw7lKL5/6YBqnaSKEo6d6lFJsLoE5ZmNBYlwp/j0 qRrw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :arc-authentication-results; bh=vOotwm0K2JLtzEPG2/F9MiRnA53uD8idJe0fUKJdWNA=; b=A8YbDgHh2C1cPjMSgBNrjiu/gMIO8jRxwgQHOS5WPsa73NqXj0riZpIszz39uG/9v2 dOMw7zdMKMUPfwHGtml647NZwbxaQixKSVuQnMOCchwy0lRUEFBy7v1Z0DnPaIartgmQ 1yt4u+O7OmUy9IoBJvE4EpY+eshBLdcmzdRSJR+H/V9VLGc1jiMCQJKEtIR3NCUYJ41J lA/gFQV1tipaCihBp5swrnxom+Obl5VYuO5o3z0HRIY02mrtayfSNSZKGLJJk8N5n307 5e3JtY480VM8EZgFebBfHDG27kHBxYOImt2tdzH8RDAMnPMDZm317zEWlQHUbERWIy68 mI4A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h126-v6si10887585pfg.126.2018.06.16.18.18.26; Sat, 16 Jun 2018 18:18:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757022AbeFQBSC (ORCPT + 99 others); Sat, 16 Jun 2018 21:18:02 -0400 Received: from gate.crashing.org ([63.228.1.57]:34872 "EHLO gate.crashing.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756932AbeFQBSB (ORCPT ); Sat, 16 Jun 2018 21:18:01 -0400 Received: from localhost (localhost.localdomain [127.0.0.1]) by gate.crashing.org (8.14.1/8.14.1) with ESMTP id w5H1HhOk015814; Sat, 16 Jun 2018 20:17:44 -0500 Message-ID: Subject: Re: [RFC PATCH 5/5] fsi/scom: Major overhaul From: Benjamin Herrenschmidt To: Joel Stanley Cc: OpenBMC Maillist , Linux Kernel Mailing List , Andrew Jeffery , Greg Kroah-Hartman Date: Sun, 17 Jun 2018 11:17:43 +1000 In-Reply-To: References: <20180612051911.20690-1-benh@kernel.crashing.org> <20180612051911.20690-6-benh@kernel.crashing.org> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.28.1 (3.28.1-2.fc28) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 2018-06-16 at 14:34 +0930, Joel Stanley wrote: > On 12 June 2018 at 14:49, Benjamin Herrenschmidt > wrote: > > This was too hard to split ... this adds a number of features > > to the SCOM user interface: > > > > - Support for indirect SCOMs > > > > - read()/write() interface now handle errors and retries > > > > - New ioctl() "raw" interface for use by debuggers > > > > Signed-off-by: Benjamin Herrenschmidt > > Looks okay to me. I will put it in the openbmc tree with Eddie's ack > for more testing. > > I got a warning from the 0day infra, I made comments below. > > We should get Alistair review the ioctl interface to ensure we have > everything that pdbg might need. We have everything that cronus needs and more than pdbg needs afaik :-) That said, cronus does a bunch of other stupid things that I'm still trying to figure out how to fix. We might need to create a /dev/cfam rather than going through that magic sysfs "raw" file, and I wouldn't mind using a single IDA so that all the devices below a given FSI slace (cfam itself, sbefifo, occ, ...) have the same "number". > > > +++ b/include/uapi/linux/fsi.h > > @@ -0,0 +1,56 @@ > > +#ifndef _UAPI_LINUX_FSI_H > > +#define _UAPI_LINUX_FSI_H > > + > > +#include > > This needs to include for the __u64 etc types. > > We should also put a licence in the header. Probably: > > /* SPDX-License-Identifier: GPL-2.0+ WITH Linux-syscall-note */ Yup. Cheers, Ben. > > Cheers, > > Joel > > > + > > +/* > > + * /dev/scom "raw" ioctl interface > > + * > > + * The driver supports a high level "read/write" interface which > > + * handles retries and converts the status to Linux error codes, > > + * however low level tools an debugger need to access the "raw" > > + * HW status information and interpret it themselves, so this > > + * ioctl interface is also provided for their use case. > > + */ > > + > > +/* Structure for SCOM read/write */ > > +struct scom_access { > > + __u64 addr; /* SCOM address, supports indirect */ > > + __u64 data; /* SCOM data (in for write, out for read) */ > > + __u64 mask; /* Data mask for writes */ > > + __u32 intf_errors; /* Interface error flags */ > > +#define SCOM_INTF_ERR_PARITY 0x00000001 /* Parity error */ > > +#define SCOM_INTF_ERR_PROTECTION 0x00000002 /* Blocked by secure boot */ > > +#define SCOM_INTF_ERR_ABORT 0x00000004 /* PIB reset during access */ > > +#define SCOM_INTF_ERR_UNKNOWN 0x80000000 /* Unknown error */ > > + /* > > + * Note: Any other bit set in intf_errors need to be considered as an > > + * error. Future implementations may define new error conditions. The > > + * pib_status below is only valid if intf_errors is 0. > > + */ > > + __u8 pib_status; /* 3-bit PIB status */ > > +#define SCOM_PIB_SUCCESS 0 /* Access successful */ > > +#define SCOM_PIB_BLOCKED 1 /* PIB blocked, pls retry */ > > +#define SCOM_PIB_OFFLINE 2 /* Chiplet offline */ > > +#define SCOM_PIB_PARTIAL 3 /* Partial good */ > > +#define SCOM_PIB_BAD_ADDR 4 /* Invalid address */ > > +#define SCOM_PIB_CLK_ERR 5 /* Clock error */ > > +#define SCOM_PIB_PARITY_ERR 6 /* Parity error on the PIB bus */ > > +#define SCOM_PIB_TIMEOUT 7 /* Bus timeout */ > > + __u8 pad; > > +}; > > + > > +/* Flags for SCOM check */ > > +#define SCOM_CHECK_SUPPORTED 0x00000001 /* Interface supported */ > > +#define SCOM_CHECK_PROTECTED 0x00000002 /* Interface blocked by secure boot */ > > + > > +/* Flags for SCOM reset */ > > +#define SCOM_RESET_INTF 0x00000001 /* Reset interface */ > > +#define SCOM_RESET_PIB 0x00000002 /* Reset PIB */ > > + > > +#define FSI_SCOM_CHECK _IOR('s', 0x00, __u32) > > +#define FSI_SCOM_READ _IOWR('s', 0x01, struct scom_access) > > +#define FSI_SCOM_WRITE _IOWR('s', 0x02, struct scom_access) > > +#define FSI_SCOM_RESET _IOW('s', 0x03, __u32) > > + > > +#endif /* _UAPI_LINUX_FSI_H */ > > -- > > 2.17.0 > >