Received: by 2002:a05:6602:2086:0:0:0:0 with SMTP id a6csp4773087ioa; Wed, 27 Apr 2022 10:46:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzruYBqJXH845YCauBuLvuXsixoSCN/jn2XHIqqC/77zZ8XqUCepK8g1rtayThViwHiNI8u X-Received: by 2002:a17:90b:1d8a:b0:1d9:96ed:436e with SMTP id pf10-20020a17090b1d8a00b001d996ed436emr14714532pjb.90.1651081606407; Wed, 27 Apr 2022 10:46:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651081606; cv=none; d=google.com; s=arc-20160816; b=OisL6HJ0VaiopXI0e3hjMNEb5geCUWJRU52Mlxi6YRq5GA1wddKIeHWMWkPtyto71D o7h4S8NXbg8na2b8+tQnBkOebbLAneOgH2b/jgtwN4afG2lSSjhBbxTcqDcm7hhQNAbo UeCIl4y7kQ6NM8STfHySMIj17sCgu6lD0HSz5qgQ0s+Knp6VRsQu3ORckHYwnmN5h3Be B+V9ig/FiXqr/rNCfUaoaMwhHGIqd/hJsCfh4BYe3eWedjk19RdNwDLXm1XA+bgJPWaz /MzoxDcmv4IfdRT/LjlnmyDKQqOzgh8Ibr6N5UrnfmT1WDgoIbDm++vTqSJK192M8MEg 51Vw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date; bh=Fl7ItkJ2C9Vihbt19WpXvZeemAKz2c9Z0S5m2jPpaXM=; b=nO1VgnvTDaPCuScpoxAqflALU591hT58Pm6WwmTWSaEgGKTwCUsZJ+RM3XDwQjgigI PK1JlCxfCKJiHAKnISlQYaiH6wWL5fAbDMQhkwNwFBGjrar/DtwJ1cqe8oZnPEy/RZE5 Rug8CSt19LHAv/VTZxgnkSQiN27wQbfulRM1qKa4piBnmGkMjMXOMiPOcBMzcHUZS2O8 oMOuf7+uXCctO8iCt1KHo+aSddjlcEnCuBbSMNFgWDfa5uW+l/GekBEVyrRzv59sUu8N ErJCofMkzFuRp638tUmDzp3IsdiV8lj79tG/m/hq3V26Dz12LIEsa7IIkjZgxDt9icEi yL/A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id m10-20020a170902db0a00b00158dd22994dsi2536883plx.93.2022.04.27.10.46.45 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 27 Apr 2022 10:46:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 8D99444A14; Wed, 27 Apr 2022 10:20:00 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234530AbiD0RXD (ORCPT + 99 others); Wed, 27 Apr 2022 13:23:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38430 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236975AbiD0RXA (ORCPT ); Wed, 27 Apr 2022 13:23:00 -0400 Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A274744745; Wed, 27 Apr 2022 10:19:47 -0700 (PDT) Received: from fraeml710-chm.china.huawei.com (unknown [172.18.147.201]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4KpQRD4GX0z685K1; Thu, 28 Apr 2022 01:17:12 +0800 (CST) Received: from lhreml710-chm.china.huawei.com (10.201.108.61) by fraeml710-chm.china.huawei.com (10.206.15.59) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Wed, 27 Apr 2022 19:19:45 +0200 Received: from localhost (10.81.200.74) by lhreml710-chm.china.huawei.com (10.201.108.61) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.2375.24; Wed, 27 Apr 2022 18:19:44 +0100 Date: Wed, 27 Apr 2022 18:19:42 +0100 From: Jonathan Cameron To: CC: Dan Williams , Bjorn Helgaas , Alison Schofield , "Vishal Verma" , Ben Widawsky , , , Subject: Re: [PATCH V8 04/10] cxl/pci: Create auxiliary devices for each DOE mailbox Message-ID: <20220427181942.00003492@Huawei.com> In-Reply-To: <20220414203237.2198665-5-ira.weiny@intel.com> References: <20220414203237.2198665-1-ira.weiny@intel.com> <20220414203237.2198665-5-ira.weiny@intel.com> Organization: Huawei Technologies Research and Development (UK) Ltd. X-Mailer: Claws Mail 4.0.0 (GTK+ 3.24.29; i686-w64-mingw32) MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.81.200.74] X-ClientProxiedBy: lhreml709-chm.china.huawei.com (10.201.108.58) To lhreml710-chm.china.huawei.com (10.201.108.61) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 14 Apr 2022 13:32:31 -0700 ira.weiny@intel.com wrote: > From: Ira Weiny > > CXL kernel drivers optionally need to access DOE mailbox capabilities. > Access to mailboxes for things such as CDAT, SPDM, and IDE are needed by > the kernel while other access is designed towards user space usage. An > example of this is for CXL Compliance Testing (see CXL 2.0 14.16.4 > Compliance Mode DOE) which offers a mechanism to set different test > modes for a device. > > There is no anticipated need for the kernel to share an individual > mailbox with user space. Thus developing an interface to marshal access > between the kernel and user space for a single mailbox is unnecessary > overhead. However, having the kernel relinquish some mailboxes to be > controlled by user space is a reasonable compromise to share access to > the device. > > The auxiliary bus provides an elegant solution for this. Each DOE > capability is given its own auxiliary device. This device is controlled > by a kernel driver by default which restricts access to the mailbox. > Unbinding the driver from a single auxiliary device (DOE mailbox > capability) frees the mailbox for user space access. This architecture > also allows a clear picture on which mailboxes are kernel controlled vs > not. > > Iterate each DOE mailbox capability and create auxiliary bus devices. > Follow on patches will define a driver for the newly created devices. > > sysfs shows the devices. > > $ ls -l /sys/bus/auxiliary/devices/ > total 0 > lrwxrwxrwx 1 root root 0 Mar 24 10:47 cxl_pci.doe.0 -> ../../../devices/pci0000:bf/0000:bf:00.0/0000:c0:00.0/cxl_pci.doe.0 > lrwxrwxrwx 1 root root 0 Mar 24 10:47 cxl_pci.doe.1 -> ../../../devices/pci0000:bf/0000:bf:01.0/0000:c1:00.0/cxl_pci.doe.1 > lrwxrwxrwx 1 root root 0 Mar 24 10:47 cxl_pci.doe.2 -> ../../../devices/pci0000:35/0000:35:00.0/0000:36:00.0/cxl_pci.doe.2 > lrwxrwxrwx 1 root root 0 Mar 24 10:47 cxl_pci.doe.3 -> ../../../devices/pci0000:35/0000:35:01.0/0000:37:00.0/cxl_pci.doe.3 > lrwxrwxrwx 1 root root 0 Mar 24 10:47 cxl_pci.doe.4 -> ../../../devices/pci0000:35/0000:35:00.0/0000:36:00.0/cxl_pci.doe.4 > lrwxrwxrwx 1 root root 0 Mar 24 10:47 cxl_pci.doe.5 -> ../../../devices/pci0000:bf/0000:bf:00.0/0000:c0:00.0/cxl_pci.doe.5 > lrwxrwxrwx 1 root root 0 Mar 24 10:47 cxl_pci.doe.6 -> ../../../devices/pci0000:35/0000:35:01.0/0000:37:00.0/cxl_pci.doe.6 > lrwxrwxrwx 1 root root 0 Mar 24 10:47 cxl_pci.doe.7 -> ../../../devices/pci0000:bf/0000:bf:01.0/0000:c1:00.0/cxl_pci.doe.7 > > Signed-off-by: Ira Weiny I'm not 100% happy with effectively having one solution for CXL and probably a different one for DOEs on switch ports (which I just hacked into a port service driver to convince myself there was at least one plausible way of doing that) but if this effectively separates the two discussions then I guess I can live with it for now ;) Once this is merged we can start the discussion about how to handle switch ports with DOEs both for CDAT and SPDM. I'll send out an RFC that is so hideous it will get people to suggestion how to do it better! Currently it starts and stops the mailbox 3 times in the registration path and I think it's more luck than judgement that is landing me with the right MSI. Anyhow, this looks good to me. Reviewed-by: Jonathan Cameron > > --- > Changes from V7: > Minor code clean ups > Rebased on cxl-pending > > Changes from V6: > Move all the auxiliary device stuff to the CXL layer > > Changes from V5: > Split the CXL specific stuff off from the PCI DOE create > auxiliary device code. > --- > drivers/cxl/Kconfig | 1 + > drivers/cxl/cxlpci.h | 21 +++++++ > drivers/cxl/pci.c | 127 +++++++++++++++++++++++++++++++++++++++++++ > 3 files changed, 149 insertions(+) > > diff --git a/drivers/cxl/Kconfig b/drivers/cxl/Kconfig > index f64e3984689f..ac0f5ca95431 100644 > --- a/drivers/cxl/Kconfig > +++ b/drivers/cxl/Kconfig > @@ -16,6 +16,7 @@ if CXL_BUS > config CXL_PCI > tristate "PCI manageability" > default CXL_BUS > + select AUXILIARY_BUS > help > The CXL specification defines a "CXL memory device" sub-class in the > PCI "memory controller" base class of devices. Device's identified by > diff --git a/drivers/cxl/cxlpci.h b/drivers/cxl/cxlpci.h > index 329e7ea3f36a..2ad8715173ce 100644 > --- a/drivers/cxl/cxlpci.h > +++ b/drivers/cxl/cxlpci.h > @@ -2,6 +2,7 @@ > /* Copyright(c) 2020 Intel Corporation. All rights reserved. */ > #ifndef __CXL_PCI_H__ > #define __CXL_PCI_H__ > +#include > #include > #include "cxl.h" > > @@ -72,4 +73,24 @@ static inline resource_size_t cxl_regmap_to_base(struct pci_dev *pdev, > } > > int devm_cxl_port_enumerate_dports(struct cxl_port *port); > + > +/** > + * struct cxl_doe_dev - CXL DOE auxiliary bus device > + * > + * @adev: Auxiliary bus device > + * @pdev: PCI device this belongs to > + * @cap_offset: Capability offset > + * @use_irq: Set if IRQs are to be used with this mailbox > + * > + * This represents a single DOE mailbox device. CXL devices should create this > + * device and register it on the Auxiliary bus for the CXL DOE driver to drive. > + */ > +struct cxl_doe_dev { > + struct auxiliary_device adev; > + struct pci_dev *pdev; > + int cap_offset; > + bool use_irq; > +}; > +#define DOE_DEV_NAME "doe" > + > #endif /* __CXL_PCI_H__ */ > diff --git a/drivers/cxl/pci.c b/drivers/cxl/pci.c > index e7ab9a34d718..41a6f3eb0a5c 100644 > --- a/drivers/cxl/pci.c > +++ b/drivers/cxl/pci.c > @@ -8,6 +8,7 @@ > #include > #include > #include > +#include > #include > #include "cxlmem.h" > #include "cxlpci.h" > @@ -564,6 +565,128 @@ static void cxl_dvsec_ranges(struct cxl_dev_state *cxlds) > info->ranges = __cxl_dvsec_ranges(cxlds, info); > } > > +static void cxl_pci_free_irq_vectors(void *data) > +{ > + pci_free_irq_vectors(data); > +} > + > +static DEFINE_IDA(pci_doe_adev_ida); > + > +static void cxl_pci_doe_dev_release(struct device *dev) > +{ > + struct auxiliary_device *adev = container_of(dev, > + struct auxiliary_device, > + dev); > + struct cxl_doe_dev *doe_dev = container_of(adev, struct cxl_doe_dev, > + adev); > + > + ida_free(&pci_doe_adev_ida, adev->id); > + kfree(doe_dev); > +} > + > +static void cxl_pci_doe_destroy_device(void *ad) > +{ > + auxiliary_device_delete(ad); > + auxiliary_device_uninit(ad); > +} > + > +/** > + * cxl_pci_create_doe_devices - Create auxiliary bus DOE devices for all DOE > + * mailboxes found > + * > + * @pci_dev: The PCI device to scan for DOE mailboxes > + * > + * There is no coresponding destroy of these devices. This function associates > + * the DOE auxiliary devices created with the pci_dev passed in. That > + * association is device managed (devm_*) such that the DOE auxiliary device > + * lifetime is always less than or equal to the lifetime of the pci_dev. > + * > + * RETURNS: 0 on success -ERRNO on failure. > + */ > +static int cxl_pci_create_doe_devices(struct pci_dev *pdev) > +{ > + struct device *dev = &pdev->dev; > + bool use_irq = true; > + int irqs = 0; > + u16 off = 0; > + int rc; > + > + pci_doe_for_each_off(pdev, off) > + irqs++; > + pci_info(pdev, "Found %d DOE mailbox's\n", irqs); > + > + /* > + * Allocate enough vectors for the DOE's > + */ > + rc = pci_alloc_irq_vectors(pdev, irqs, irqs, PCI_IRQ_MSI | > + PCI_IRQ_MSIX); > + if (rc != irqs) { > + pci_err(pdev, > + "Not enough interrupts for all the DOEs; use polling\n"); > + use_irq = false; > + /* Some got allocated; clean them up */ > + if (rc > 0) > + cxl_pci_free_irq_vectors(pdev); > + } else { > + /* > + * Enabling bus mastering is require for MSI/MSIx. It could be > + * done later within the DOE initialization, but as it > + * potentially has other impacts keep it here when setting up > + * the IRQ's. > + */ > + pci_set_master(pdev); > + rc = devm_add_action_or_reset(dev, > + cxl_pci_free_irq_vectors, > + pdev); > + if (rc) > + return rc; > + } > + > + pci_doe_for_each_off(pdev, off) { > + struct auxiliary_device *adev; > + struct cxl_doe_dev *new_dev; > + int id; > + > + new_dev = kzalloc(sizeof(*new_dev), GFP_KERNEL); > + if (!new_dev) > + return -ENOMEM; > + > + new_dev->pdev = pdev; > + new_dev->cap_offset = off; > + new_dev->use_irq = use_irq; > + > + /* Set up struct auxiliary_device */ > + adev = &new_dev->adev; > + id = ida_alloc(&pci_doe_adev_ida, GFP_KERNEL); > + if (id < 0) { > + kfree(new_dev); > + return -ENOMEM; > + } > + > + adev->id = id; > + adev->name = DOE_DEV_NAME; > + adev->dev.release = cxl_pci_doe_dev_release; > + adev->dev.parent = dev; > + > + if (auxiliary_device_init(adev)) { > + cxl_pci_doe_dev_release(&adev->dev); > + return -EIO; > + } > + > + if (auxiliary_device_add(adev)) { > + auxiliary_device_uninit(adev); > + return -EIO; > + } > + > + rc = devm_add_action_or_reset(dev, cxl_pci_doe_destroy_device, > + adev); > + if (rc) > + return rc; > + } > + > + return 0; > +} > + > static int cxl_pci_probe(struct pci_dev *pdev, const struct pci_device_id *id) > { > struct cxl_register_map map; > @@ -630,6 +753,10 @@ static int cxl_pci_probe(struct pci_dev *pdev, const struct pci_device_id *id) > if (rc) > return rc; > > + rc = cxl_pci_create_doe_devices(pdev); > + if (rc) > + return rc; > + > cxl_dvsec_ranges(cxlds); > > cxlmd = devm_cxl_add_memdev(cxlds);