treewide: remove redundant IS_ERR() before error code check
[linux/fpc-iii.git] / drivers / misc / ocxl / config.c
blobc8e19bfb5ef90045b54c4ff2c1a571a8ac604849
1 // SPDX-License-Identifier: GPL-2.0+
2 // Copyright 2017 IBM Corp.
3 #include <linux/pci.h>
4 #include <asm/pnv-ocxl.h>
5 #include <misc/ocxl-config.h>
6 #include "ocxl_internal.h"
8 #define EXTRACT_BIT(val, bit) (!!(val & BIT(bit)))
9 #define EXTRACT_BITS(val, s, e) ((val & GENMASK(e, s)) >> s)
11 #define OCXL_DVSEC_AFU_IDX_MASK GENMASK(5, 0)
12 #define OCXL_DVSEC_ACTAG_MASK GENMASK(11, 0)
13 #define OCXL_DVSEC_PASID_MASK GENMASK(19, 0)
14 #define OCXL_DVSEC_PASID_LOG_MASK GENMASK(4, 0)
16 #define OCXL_DVSEC_TEMPL_VERSION 0x0
17 #define OCXL_DVSEC_TEMPL_NAME 0x4
18 #define OCXL_DVSEC_TEMPL_AFU_VERSION 0x1C
19 #define OCXL_DVSEC_TEMPL_MMIO_GLOBAL 0x20
20 #define OCXL_DVSEC_TEMPL_MMIO_GLOBAL_SZ 0x28
21 #define OCXL_DVSEC_TEMPL_MMIO_PP 0x30
22 #define OCXL_DVSEC_TEMPL_MMIO_PP_SZ 0x38
23 #define OCXL_DVSEC_TEMPL_ALL_MEM_SZ 0x3C
24 #define OCXL_DVSEC_TEMPL_LPC_MEM_START 0x40
25 #define OCXL_DVSEC_TEMPL_WWID 0x48
26 #define OCXL_DVSEC_TEMPL_LPC_MEM_SZ 0x58
28 #define OCXL_MAX_AFU_PER_FUNCTION 64
29 #define OCXL_TEMPL_LEN_1_0 0x58
30 #define OCXL_TEMPL_LEN_1_1 0x60
31 #define OCXL_TEMPL_NAME_LEN 24
32 #define OCXL_CFG_TIMEOUT 3
34 static int find_dvsec(struct pci_dev *dev, int dvsec_id)
36 int vsec = 0;
37 u16 vendor, id;
39 while ((vsec = pci_find_next_ext_capability(dev, vsec,
40 OCXL_EXT_CAP_ID_DVSEC))) {
41 pci_read_config_word(dev, vsec + OCXL_DVSEC_VENDOR_OFFSET,
42 &vendor);
43 pci_read_config_word(dev, vsec + OCXL_DVSEC_ID_OFFSET, &id);
44 if (vendor == PCI_VENDOR_ID_IBM && id == dvsec_id)
45 return vsec;
47 return 0;
50 static int find_dvsec_afu_ctrl(struct pci_dev *dev, u8 afu_idx)
52 int vsec = 0;
53 u16 vendor, id;
54 u8 idx;
56 while ((vsec = pci_find_next_ext_capability(dev, vsec,
57 OCXL_EXT_CAP_ID_DVSEC))) {
58 pci_read_config_word(dev, vsec + OCXL_DVSEC_VENDOR_OFFSET,
59 &vendor);
60 pci_read_config_word(dev, vsec + OCXL_DVSEC_ID_OFFSET, &id);
62 if (vendor == PCI_VENDOR_ID_IBM &&
63 id == OCXL_DVSEC_AFU_CTRL_ID) {
64 pci_read_config_byte(dev,
65 vsec + OCXL_DVSEC_AFU_CTRL_AFU_IDX,
66 &idx);
67 if (idx == afu_idx)
68 return vsec;
71 return 0;
74 static void read_pasid(struct pci_dev *dev, struct ocxl_fn_config *fn)
76 u16 val;
77 int pos;
79 pos = pci_find_ext_capability(dev, PCI_EXT_CAP_ID_PASID);
80 if (!pos) {
82 * PASID capability is not mandatory, but there
83 * shouldn't be any AFU
85 dev_dbg(&dev->dev, "Function doesn't require any PASID\n");
86 fn->max_pasid_log = -1;
87 goto out;
89 pci_read_config_word(dev, pos + PCI_PASID_CAP, &val);
90 fn->max_pasid_log = EXTRACT_BITS(val, 8, 12);
92 out:
93 dev_dbg(&dev->dev, "PASID capability:\n");
94 dev_dbg(&dev->dev, " Max PASID log = %d\n", fn->max_pasid_log);
97 static int read_dvsec_tl(struct pci_dev *dev, struct ocxl_fn_config *fn)
99 int pos;
101 pos = find_dvsec(dev, OCXL_DVSEC_TL_ID);
102 if (!pos && PCI_FUNC(dev->devfn) == 0) {
103 dev_err(&dev->dev, "Can't find TL DVSEC\n");
104 return -ENODEV;
106 if (pos && PCI_FUNC(dev->devfn) != 0) {
107 dev_err(&dev->dev, "TL DVSEC is only allowed on function 0\n");
108 return -ENODEV;
110 fn->dvsec_tl_pos = pos;
111 return 0;
114 static int read_dvsec_function(struct pci_dev *dev, struct ocxl_fn_config *fn)
116 int pos, afu_present;
117 u32 val;
119 pos = find_dvsec(dev, OCXL_DVSEC_FUNC_ID);
120 if (!pos) {
121 dev_err(&dev->dev, "Can't find function DVSEC\n");
122 return -ENODEV;
124 fn->dvsec_function_pos = pos;
126 pci_read_config_dword(dev, pos + OCXL_DVSEC_FUNC_OFF_INDEX, &val);
127 afu_present = EXTRACT_BIT(val, 31);
128 if (!afu_present) {
129 fn->max_afu_index = -1;
130 dev_dbg(&dev->dev, "Function doesn't define any AFU\n");
131 goto out;
133 fn->max_afu_index = EXTRACT_BITS(val, 24, 29);
135 out:
136 dev_dbg(&dev->dev, "Function DVSEC:\n");
137 dev_dbg(&dev->dev, " Max AFU index = %d\n", fn->max_afu_index);
138 return 0;
141 static int read_dvsec_afu_info(struct pci_dev *dev, struct ocxl_fn_config *fn)
143 int pos;
145 if (fn->max_afu_index < 0) {
146 fn->dvsec_afu_info_pos = -1;
147 return 0;
150 pos = find_dvsec(dev, OCXL_DVSEC_AFU_INFO_ID);
151 if (!pos) {
152 dev_err(&dev->dev, "Can't find AFU information DVSEC\n");
153 return -ENODEV;
155 fn->dvsec_afu_info_pos = pos;
156 return 0;
159 static int read_dvsec_vendor(struct pci_dev *dev)
161 int pos;
162 u32 cfg, tlx, dlx;
165 * vendor specific DVSEC is optional
167 * It's currently only used on function 0 to specify the
168 * version of some logic blocks. Some older images may not
169 * even have it so we ignore any errors
171 if (PCI_FUNC(dev->devfn) != 0)
172 return 0;
174 pos = find_dvsec(dev, OCXL_DVSEC_VENDOR_ID);
175 if (!pos)
176 return 0;
178 pci_read_config_dword(dev, pos + OCXL_DVSEC_VENDOR_CFG_VERS, &cfg);
179 pci_read_config_dword(dev, pos + OCXL_DVSEC_VENDOR_TLX_VERS, &tlx);
180 pci_read_config_dword(dev, pos + OCXL_DVSEC_VENDOR_DLX_VERS, &dlx);
182 dev_dbg(&dev->dev, "Vendor specific DVSEC:\n");
183 dev_dbg(&dev->dev, " CFG version = 0x%x\n", cfg);
184 dev_dbg(&dev->dev, " TLX version = 0x%x\n", tlx);
185 dev_dbg(&dev->dev, " DLX version = 0x%x\n", dlx);
186 return 0;
189 static int validate_function(struct pci_dev *dev, struct ocxl_fn_config *fn)
191 if (fn->max_pasid_log == -1 && fn->max_afu_index >= 0) {
192 dev_err(&dev->dev,
193 "AFUs are defined but no PASIDs are requested\n");
194 return -EINVAL;
197 if (fn->max_afu_index > OCXL_MAX_AFU_PER_FUNCTION) {
198 dev_err(&dev->dev,
199 "Max AFU index out of architectural limit (%d vs %d)\n",
200 fn->max_afu_index, OCXL_MAX_AFU_PER_FUNCTION);
201 return -EINVAL;
203 return 0;
206 int ocxl_config_read_function(struct pci_dev *dev, struct ocxl_fn_config *fn)
208 int rc;
210 read_pasid(dev, fn);
212 rc = read_dvsec_tl(dev, fn);
213 if (rc) {
214 dev_err(&dev->dev,
215 "Invalid Transaction Layer DVSEC configuration: %d\n",
216 rc);
217 return -ENODEV;
220 rc = read_dvsec_function(dev, fn);
221 if (rc) {
222 dev_err(&dev->dev,
223 "Invalid Function DVSEC configuration: %d\n", rc);
224 return -ENODEV;
227 rc = read_dvsec_afu_info(dev, fn);
228 if (rc) {
229 dev_err(&dev->dev, "Invalid AFU configuration: %d\n", rc);
230 return -ENODEV;
233 rc = read_dvsec_vendor(dev);
234 if (rc) {
235 dev_err(&dev->dev,
236 "Invalid vendor specific DVSEC configuration: %d\n",
237 rc);
238 return -ENODEV;
241 rc = validate_function(dev, fn);
242 return rc;
244 EXPORT_SYMBOL_GPL(ocxl_config_read_function);
246 static int read_afu_info(struct pci_dev *dev, struct ocxl_fn_config *fn,
247 int offset, u32 *data)
249 u32 val;
250 unsigned long timeout = jiffies + (HZ * OCXL_CFG_TIMEOUT);
251 int pos = fn->dvsec_afu_info_pos;
253 /* Protect 'data valid' bit */
254 if (EXTRACT_BIT(offset, 31)) {
255 dev_err(&dev->dev, "Invalid offset in AFU info DVSEC\n");
256 return -EINVAL;
259 pci_write_config_dword(dev, pos + OCXL_DVSEC_AFU_INFO_OFF, offset);
260 pci_read_config_dword(dev, pos + OCXL_DVSEC_AFU_INFO_OFF, &val);
261 while (!EXTRACT_BIT(val, 31)) {
262 if (time_after_eq(jiffies, timeout)) {
263 dev_err(&dev->dev,
264 "Timeout while reading AFU info DVSEC (offset=%d)\n",
265 offset);
266 return -EBUSY;
268 cpu_relax();
269 pci_read_config_dword(dev, pos + OCXL_DVSEC_AFU_INFO_OFF, &val);
271 pci_read_config_dword(dev, pos + OCXL_DVSEC_AFU_INFO_DATA, data);
272 return 0;
276 * Read the template version from the AFU
277 * dev: the device for the AFU
278 * fn: the AFU offsets
279 * len: outputs the template length
280 * version: outputs the major<<8,minor version
282 * Returns 0 on success, negative on failure
284 static int read_template_version(struct pci_dev *dev, struct ocxl_fn_config *fn,
285 u16 *len, u16 *version)
287 u32 val32;
288 u8 major, minor;
289 int rc;
291 rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_VERSION, &val32);
292 if (rc)
293 return rc;
295 *len = EXTRACT_BITS(val32, 16, 31);
296 major = EXTRACT_BITS(val32, 8, 15);
297 minor = EXTRACT_BITS(val32, 0, 7);
298 *version = (major << 8) + minor;
299 return 0;
302 int ocxl_config_check_afu_index(struct pci_dev *dev,
303 struct ocxl_fn_config *fn, int afu_idx)
305 int rc;
306 u16 templ_version;
307 u16 len, expected_len;
309 pci_write_config_byte(dev,
310 fn->dvsec_afu_info_pos + OCXL_DVSEC_AFU_INFO_AFU_IDX,
311 afu_idx);
313 rc = read_template_version(dev, fn, &len, &templ_version);
314 if (rc)
315 return rc;
317 /* AFU index map can have holes, in which case we read all 0's */
318 if (!templ_version && !len)
319 return 0;
321 dev_dbg(&dev->dev, "AFU descriptor template version %d.%d\n",
322 templ_version >> 8, templ_version & 0xFF);
324 switch (templ_version) {
325 case 0x0005: // v0.5 was used prior to the spec approval
326 case 0x0100:
327 expected_len = OCXL_TEMPL_LEN_1_0;
328 break;
329 case 0x0101:
330 expected_len = OCXL_TEMPL_LEN_1_1;
331 break;
332 default:
333 dev_warn(&dev->dev, "Unknown AFU template version %#x\n",
334 templ_version);
335 expected_len = len;
337 if (len != expected_len)
338 dev_warn(&dev->dev,
339 "Unexpected template length %#x in AFU information, expected %#x for version %#x\n",
340 len, expected_len, templ_version);
341 return 1;
344 static int read_afu_name(struct pci_dev *dev, struct ocxl_fn_config *fn,
345 struct ocxl_afu_config *afu)
347 int i, rc;
348 u32 val, *ptr;
350 BUILD_BUG_ON(OCXL_AFU_NAME_SZ < OCXL_TEMPL_NAME_LEN);
351 for (i = 0; i < OCXL_TEMPL_NAME_LEN; i += 4) {
352 rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_NAME + i, &val);
353 if (rc)
354 return rc;
355 ptr = (u32 *) &afu->name[i];
356 *ptr = le32_to_cpu((__force __le32) val);
358 afu->name[OCXL_AFU_NAME_SZ - 1] = '\0'; /* play safe */
359 return 0;
362 static int read_afu_mmio(struct pci_dev *dev, struct ocxl_fn_config *fn,
363 struct ocxl_afu_config *afu)
365 int rc;
366 u32 val;
369 * Global MMIO
371 rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MMIO_GLOBAL, &val);
372 if (rc)
373 return rc;
374 afu->global_mmio_bar = EXTRACT_BITS(val, 0, 2);
375 afu->global_mmio_offset = EXTRACT_BITS(val, 16, 31) << 16;
377 rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MMIO_GLOBAL + 4, &val);
378 if (rc)
379 return rc;
380 afu->global_mmio_offset += (u64) val << 32;
382 rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MMIO_GLOBAL_SZ, &val);
383 if (rc)
384 return rc;
385 afu->global_mmio_size = val;
388 * Per-process MMIO
390 rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MMIO_PP, &val);
391 if (rc)
392 return rc;
393 afu->pp_mmio_bar = EXTRACT_BITS(val, 0, 2);
394 afu->pp_mmio_offset = EXTRACT_BITS(val, 16, 31) << 16;
396 rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MMIO_PP + 4, &val);
397 if (rc)
398 return rc;
399 afu->pp_mmio_offset += (u64) val << 32;
401 rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MMIO_PP_SZ, &val);
402 if (rc)
403 return rc;
404 afu->pp_mmio_stride = val;
406 return 0;
409 static int read_afu_control(struct pci_dev *dev, struct ocxl_afu_config *afu)
411 int pos;
412 u8 val8;
413 u16 val16;
415 pos = find_dvsec_afu_ctrl(dev, afu->idx);
416 if (!pos) {
417 dev_err(&dev->dev, "Can't find AFU control DVSEC for AFU %d\n",
418 afu->idx);
419 return -ENODEV;
421 afu->dvsec_afu_control_pos = pos;
423 pci_read_config_byte(dev, pos + OCXL_DVSEC_AFU_CTRL_PASID_SUP, &val8);
424 afu->pasid_supported_log = EXTRACT_BITS(val8, 0, 4);
426 pci_read_config_word(dev, pos + OCXL_DVSEC_AFU_CTRL_ACTAG_SUP, &val16);
427 afu->actag_supported = EXTRACT_BITS(val16, 0, 11);
428 return 0;
431 static bool char_allowed(int c)
434 * Permitted Characters : Alphanumeric, hyphen, underscore, comma
436 if ((c >= 0x30 && c <= 0x39) /* digits */ ||
437 (c >= 0x41 && c <= 0x5A) /* upper case */ ||
438 (c >= 0x61 && c <= 0x7A) /* lower case */ ||
439 c == 0 /* NULL */ ||
440 c == 0x2D /* - */ ||
441 c == 0x5F /* _ */ ||
442 c == 0x2C /* , */)
443 return true;
444 return false;
447 static int validate_afu(struct pci_dev *dev, struct ocxl_afu_config *afu)
449 int i;
451 if (!afu->name[0]) {
452 dev_err(&dev->dev, "Empty AFU name\n");
453 return -EINVAL;
455 for (i = 0; i < OCXL_TEMPL_NAME_LEN; i++) {
456 if (!char_allowed(afu->name[i])) {
457 dev_err(&dev->dev,
458 "Invalid character in AFU name\n");
459 return -EINVAL;
463 if (afu->global_mmio_bar != 0 &&
464 afu->global_mmio_bar != 2 &&
465 afu->global_mmio_bar != 4) {
466 dev_err(&dev->dev, "Invalid global MMIO bar number\n");
467 return -EINVAL;
469 if (afu->pp_mmio_bar != 0 &&
470 afu->pp_mmio_bar != 2 &&
471 afu->pp_mmio_bar != 4) {
472 dev_err(&dev->dev, "Invalid per-process MMIO bar number\n");
473 return -EINVAL;
475 return 0;
479 * Populate AFU metadata regarding LPC memory
480 * dev: the device for the AFU
481 * fn: the AFU offsets
482 * afu: the AFU struct to populate the LPC metadata into
484 * Returns 0 on success, negative on failure
486 static int read_afu_lpc_memory_info(struct pci_dev *dev,
487 struct ocxl_fn_config *fn,
488 struct ocxl_afu_config *afu)
490 int rc;
491 u32 val32;
492 u16 templ_version;
493 u16 templ_len;
494 u64 total_mem_size = 0;
495 u64 lpc_mem_size = 0;
497 afu->lpc_mem_offset = 0;
498 afu->lpc_mem_size = 0;
499 afu->special_purpose_mem_offset = 0;
500 afu->special_purpose_mem_size = 0;
502 * For AFUs following template v1.0, the LPC memory covers the
503 * total memory. Its size is a power of 2.
505 * For AFUs with template >= v1.01, the total memory size is
506 * still a power of 2, but it is split in 2 parts:
507 * - the LPC memory, whose size can now be anything
508 * - the remainder memory is a special purpose memory, whose
509 * definition is AFU-dependent. It is not accessible through
510 * the usual commands for LPC memory
512 rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_ALL_MEM_SZ, &val32);
513 if (rc)
514 return rc;
516 val32 = EXTRACT_BITS(val32, 0, 7);
517 if (!val32)
518 return 0; /* No LPC memory */
521 * The configuration space spec allows for a memory size of up
522 * to 2^255 bytes.
524 * Current generation hardware uses 56-bit physical addresses,
525 * but we won't be able to get near close to that, as we won't
526 * have a hole big enough in the memory map. Let it pass in
527 * the driver for now. We'll get an error from the firmware
528 * when trying to configure something too big.
530 total_mem_size = 1ull << val32;
532 rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_LPC_MEM_START, &val32);
533 if (rc)
534 return rc;
536 afu->lpc_mem_offset = val32;
538 rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_LPC_MEM_START + 4, &val32);
539 if (rc)
540 return rc;
542 afu->lpc_mem_offset |= (u64) val32 << 32;
544 rc = read_template_version(dev, fn, &templ_len, &templ_version);
545 if (rc)
546 return rc;
548 if (templ_version >= 0x0101) {
549 rc = read_afu_info(dev, fn,
550 OCXL_DVSEC_TEMPL_LPC_MEM_SZ, &val32);
551 if (rc)
552 return rc;
553 lpc_mem_size = val32;
555 rc = read_afu_info(dev, fn,
556 OCXL_DVSEC_TEMPL_LPC_MEM_SZ + 4, &val32);
557 if (rc)
558 return rc;
559 lpc_mem_size |= (u64) val32 << 32;
560 } else {
561 lpc_mem_size = total_mem_size;
563 afu->lpc_mem_size = lpc_mem_size;
565 if (lpc_mem_size < total_mem_size) {
566 afu->special_purpose_mem_offset =
567 afu->lpc_mem_offset + lpc_mem_size;
568 afu->special_purpose_mem_size =
569 total_mem_size - lpc_mem_size;
571 return 0;
574 int ocxl_config_read_afu(struct pci_dev *dev, struct ocxl_fn_config *fn,
575 struct ocxl_afu_config *afu, u8 afu_idx)
577 int rc;
578 u32 val32;
581 * First, we need to write the AFU idx for the AFU we want to
582 * access.
584 WARN_ON((afu_idx & OCXL_DVSEC_AFU_IDX_MASK) != afu_idx);
585 afu->idx = afu_idx;
586 pci_write_config_byte(dev,
587 fn->dvsec_afu_info_pos + OCXL_DVSEC_AFU_INFO_AFU_IDX,
588 afu->idx);
590 rc = read_afu_name(dev, fn, afu);
591 if (rc)
592 return rc;
594 rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_AFU_VERSION, &val32);
595 if (rc)
596 return rc;
597 afu->version_major = EXTRACT_BITS(val32, 24, 31);
598 afu->version_minor = EXTRACT_BITS(val32, 16, 23);
599 afu->afuc_type = EXTRACT_BITS(val32, 14, 15);
600 afu->afum_type = EXTRACT_BITS(val32, 12, 13);
601 afu->profile = EXTRACT_BITS(val32, 0, 7);
603 rc = read_afu_mmio(dev, fn, afu);
604 if (rc)
605 return rc;
607 rc = read_afu_lpc_memory_info(dev, fn, afu);
608 if (rc)
609 return rc;
611 rc = read_afu_control(dev, afu);
612 if (rc)
613 return rc;
615 dev_dbg(&dev->dev, "AFU configuration:\n");
616 dev_dbg(&dev->dev, " name = %s\n", afu->name);
617 dev_dbg(&dev->dev, " version = %d.%d\n", afu->version_major,
618 afu->version_minor);
619 dev_dbg(&dev->dev, " global mmio bar = %hhu\n", afu->global_mmio_bar);
620 dev_dbg(&dev->dev, " global mmio offset = %#llx\n",
621 afu->global_mmio_offset);
622 dev_dbg(&dev->dev, " global mmio size = %#x\n", afu->global_mmio_size);
623 dev_dbg(&dev->dev, " pp mmio bar = %hhu\n", afu->pp_mmio_bar);
624 dev_dbg(&dev->dev, " pp mmio offset = %#llx\n", afu->pp_mmio_offset);
625 dev_dbg(&dev->dev, " pp mmio stride = %#x\n", afu->pp_mmio_stride);
626 dev_dbg(&dev->dev, " lpc_mem offset = %#llx\n", afu->lpc_mem_offset);
627 dev_dbg(&dev->dev, " lpc_mem size = %#llx\n", afu->lpc_mem_size);
628 dev_dbg(&dev->dev, " special purpose mem offset = %#llx\n",
629 afu->special_purpose_mem_offset);
630 dev_dbg(&dev->dev, " special purpose mem size = %#llx\n",
631 afu->special_purpose_mem_size);
632 dev_dbg(&dev->dev, " pasid supported (log) = %u\n",
633 afu->pasid_supported_log);
634 dev_dbg(&dev->dev, " actag supported = %u\n",
635 afu->actag_supported);
637 rc = validate_afu(dev, afu);
638 return rc;
640 EXPORT_SYMBOL_GPL(ocxl_config_read_afu);
642 int ocxl_config_get_actag_info(struct pci_dev *dev, u16 *base, u16 *enabled,
643 u16 *supported)
645 int rc;
648 * This is really a simple wrapper for the kernel API, to
649 * avoid an external driver using ocxl as a library to call
650 * platform-dependent code
652 rc = pnv_ocxl_get_actag(dev, base, enabled, supported);
653 if (rc) {
654 dev_err(&dev->dev, "Can't get actag for device: %d\n", rc);
655 return rc;
657 return 0;
659 EXPORT_SYMBOL_GPL(ocxl_config_get_actag_info);
661 void ocxl_config_set_afu_actag(struct pci_dev *dev, int pos, int actag_base,
662 int actag_count)
664 u16 val;
666 val = actag_count & OCXL_DVSEC_ACTAG_MASK;
667 pci_write_config_byte(dev, pos + OCXL_DVSEC_AFU_CTRL_ACTAG_EN, val);
669 val = actag_base & OCXL_DVSEC_ACTAG_MASK;
670 pci_write_config_dword(dev, pos + OCXL_DVSEC_AFU_CTRL_ACTAG_BASE, val);
672 EXPORT_SYMBOL_GPL(ocxl_config_set_afu_actag);
674 int ocxl_config_get_pasid_info(struct pci_dev *dev, int *count)
676 return pnv_ocxl_get_pasid_count(dev, count);
679 void ocxl_config_set_afu_pasid(struct pci_dev *dev, int pos, int pasid_base,
680 u32 pasid_count_log)
682 u8 val8;
683 u32 val32;
685 val8 = pasid_count_log & OCXL_DVSEC_PASID_LOG_MASK;
686 pci_write_config_byte(dev, pos + OCXL_DVSEC_AFU_CTRL_PASID_EN, val8);
688 pci_read_config_dword(dev, pos + OCXL_DVSEC_AFU_CTRL_PASID_BASE,
689 &val32);
690 val32 &= ~OCXL_DVSEC_PASID_MASK;
691 val32 |= pasid_base & OCXL_DVSEC_PASID_MASK;
692 pci_write_config_dword(dev, pos + OCXL_DVSEC_AFU_CTRL_PASID_BASE,
693 val32);
695 EXPORT_SYMBOL_GPL(ocxl_config_set_afu_pasid);
697 void ocxl_config_set_afu_state(struct pci_dev *dev, int pos, int enable)
699 u8 val;
701 pci_read_config_byte(dev, pos + OCXL_DVSEC_AFU_CTRL_ENABLE, &val);
702 if (enable)
703 val |= 1;
704 else
705 val &= 0xFE;
706 pci_write_config_byte(dev, pos + OCXL_DVSEC_AFU_CTRL_ENABLE, val);
708 EXPORT_SYMBOL_GPL(ocxl_config_set_afu_state);
710 int ocxl_config_set_TL(struct pci_dev *dev, int tl_dvsec)
712 u32 val;
713 __be32 *be32ptr;
714 u8 timers;
715 int i, rc;
716 long recv_cap;
717 char *recv_rate;
720 * Skip on function != 0, as the TL can only be defined on 0
722 if (PCI_FUNC(dev->devfn) != 0)
723 return 0;
725 recv_rate = kzalloc(PNV_OCXL_TL_RATE_BUF_SIZE, GFP_KERNEL);
726 if (!recv_rate)
727 return -ENOMEM;
729 * The spec defines 64 templates for messages in the
730 * Transaction Layer (TL).
732 * The host and device each support a subset, so we need to
733 * configure the transmitters on each side to send only
734 * templates the receiver understands, at a rate the receiver
735 * can process. Per the spec, template 0 must be supported by
736 * everybody. That's the template which has been used by the
737 * host and device so far.
739 * The sending rate limit must be set before the template is
740 * enabled.
744 * Device -> host
746 rc = pnv_ocxl_get_tl_cap(dev, &recv_cap, recv_rate,
747 PNV_OCXL_TL_RATE_BUF_SIZE);
748 if (rc)
749 goto out;
751 for (i = 0; i < PNV_OCXL_TL_RATE_BUF_SIZE; i += 4) {
752 be32ptr = (__be32 *) &recv_rate[i];
753 pci_write_config_dword(dev,
754 tl_dvsec + OCXL_DVSEC_TL_SEND_RATE + i,
755 be32_to_cpu(*be32ptr));
757 val = recv_cap >> 32;
758 pci_write_config_dword(dev, tl_dvsec + OCXL_DVSEC_TL_SEND_CAP, val);
759 val = recv_cap & GENMASK(31, 0);
760 pci_write_config_dword(dev, tl_dvsec + OCXL_DVSEC_TL_SEND_CAP + 4, val);
763 * Host -> device
765 for (i = 0; i < PNV_OCXL_TL_RATE_BUF_SIZE; i += 4) {
766 pci_read_config_dword(dev,
767 tl_dvsec + OCXL_DVSEC_TL_RECV_RATE + i,
768 &val);
769 be32ptr = (__be32 *) &recv_rate[i];
770 *be32ptr = cpu_to_be32(val);
772 pci_read_config_dword(dev, tl_dvsec + OCXL_DVSEC_TL_RECV_CAP, &val);
773 recv_cap = (long) val << 32;
774 pci_read_config_dword(dev, tl_dvsec + OCXL_DVSEC_TL_RECV_CAP + 4, &val);
775 recv_cap |= val;
777 rc = pnv_ocxl_set_tl_conf(dev, recv_cap, __pa(recv_rate),
778 PNV_OCXL_TL_RATE_BUF_SIZE);
779 if (rc)
780 goto out;
783 * Opencapi commands needing to be retried are classified per
784 * the TL in 2 groups: short and long commands.
786 * The short back off timer it not used for now. It will be
787 * for opencapi 4.0.
789 * The long back off timer is typically used when an AFU hits
790 * a page fault but the NPU is already processing one. So the
791 * AFU needs to wait before it can resubmit. Having a value
792 * too low doesn't break anything, but can generate extra
793 * traffic on the link.
794 * We set it to 1.6 us for now. It's shorter than, but in the
795 * same order of magnitude as the time spent to process a page
796 * fault.
798 timers = 0x2 << 4; /* long timer = 1.6 us */
799 pci_write_config_byte(dev, tl_dvsec + OCXL_DVSEC_TL_BACKOFF_TIMERS,
800 timers);
802 rc = 0;
803 out:
804 kfree(recv_rate);
805 return rc;
807 EXPORT_SYMBOL_GPL(ocxl_config_set_TL);
809 int ocxl_config_terminate_pasid(struct pci_dev *dev, int afu_control, int pasid)
811 u32 val;
812 unsigned long timeout;
814 pci_read_config_dword(dev, afu_control + OCXL_DVSEC_AFU_CTRL_TERM_PASID,
815 &val);
816 if (EXTRACT_BIT(val, 20)) {
817 dev_err(&dev->dev,
818 "Can't terminate PASID %#x, previous termination didn't complete\n",
819 pasid);
820 return -EBUSY;
823 val &= ~OCXL_DVSEC_PASID_MASK;
824 val |= pasid & OCXL_DVSEC_PASID_MASK;
825 val |= BIT(20);
826 pci_write_config_dword(dev,
827 afu_control + OCXL_DVSEC_AFU_CTRL_TERM_PASID,
828 val);
830 timeout = jiffies + (HZ * OCXL_CFG_TIMEOUT);
831 pci_read_config_dword(dev, afu_control + OCXL_DVSEC_AFU_CTRL_TERM_PASID,
832 &val);
833 while (EXTRACT_BIT(val, 20)) {
834 if (time_after_eq(jiffies, timeout)) {
835 dev_err(&dev->dev,
836 "Timeout while waiting for AFU to terminate PASID %#x\n",
837 pasid);
838 return -EBUSY;
840 cpu_relax();
841 pci_read_config_dword(dev,
842 afu_control + OCXL_DVSEC_AFU_CTRL_TERM_PASID,
843 &val);
845 return 0;
847 EXPORT_SYMBOL_GPL(ocxl_config_terminate_pasid);
849 void ocxl_config_set_actag(struct pci_dev *dev, int func_dvsec, u32 tag_first,
850 u32 tag_count)
852 u32 val;
854 val = (tag_first & OCXL_DVSEC_ACTAG_MASK) << 16;
855 val |= tag_count & OCXL_DVSEC_ACTAG_MASK;
856 pci_write_config_dword(dev, func_dvsec + OCXL_DVSEC_FUNC_OFF_ACTAG,
857 val);
859 EXPORT_SYMBOL_GPL(ocxl_config_set_actag);