|  | // SPDX-License-Identifier: GPL-2.0+ | 
|  | // Copyright 2017 IBM Corp. | 
|  | #include <linux/pci.h> | 
|  | #include <asm/pnv-ocxl.h> | 
|  | #include <misc/ocxl.h> | 
|  | #include <misc/ocxl-config.h> | 
|  |  | 
|  | #define EXTRACT_BIT(val, bit) (!!(val & BIT(bit))) | 
|  | #define EXTRACT_BITS(val, s, e) ((val & GENMASK(e, s)) >> s) | 
|  |  | 
|  | #define OCXL_DVSEC_AFU_IDX_MASK              GENMASK(5, 0) | 
|  | #define OCXL_DVSEC_ACTAG_MASK                GENMASK(11, 0) | 
|  | #define OCXL_DVSEC_PASID_MASK                GENMASK(19, 0) | 
|  | #define OCXL_DVSEC_PASID_LOG_MASK            GENMASK(4, 0) | 
|  |  | 
|  | #define OCXL_DVSEC_TEMPL_VERSION         0x0 | 
|  | #define OCXL_DVSEC_TEMPL_NAME            0x4 | 
|  | #define OCXL_DVSEC_TEMPL_AFU_VERSION     0x1C | 
|  | #define OCXL_DVSEC_TEMPL_MMIO_GLOBAL     0x20 | 
|  | #define OCXL_DVSEC_TEMPL_MMIO_GLOBAL_SZ  0x28 | 
|  | #define OCXL_DVSEC_TEMPL_MMIO_PP         0x30 | 
|  | #define OCXL_DVSEC_TEMPL_MMIO_PP_SZ      0x38 | 
|  | #define OCXL_DVSEC_TEMPL_MEM_SZ          0x3C | 
|  | #define OCXL_DVSEC_TEMPL_WWID            0x40 | 
|  |  | 
|  | #define OCXL_MAX_AFU_PER_FUNCTION 64 | 
|  | #define OCXL_TEMPL_LEN            0x58 | 
|  | #define OCXL_TEMPL_NAME_LEN       24 | 
|  | #define OCXL_CFG_TIMEOUT     3 | 
|  |  | 
|  | static int find_dvsec(struct pci_dev *dev, int dvsec_id) | 
|  | { | 
|  | int vsec = 0; | 
|  | u16 vendor, id; | 
|  |  | 
|  | while ((vsec = pci_find_next_ext_capability(dev, vsec, | 
|  | OCXL_EXT_CAP_ID_DVSEC))) { | 
|  | pci_read_config_word(dev, vsec + OCXL_DVSEC_VENDOR_OFFSET, | 
|  | &vendor); | 
|  | pci_read_config_word(dev, vsec + OCXL_DVSEC_ID_OFFSET, &id); | 
|  | if (vendor == PCI_VENDOR_ID_IBM && id == dvsec_id) | 
|  | return vsec; | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int find_dvsec_afu_ctrl(struct pci_dev *dev, u8 afu_idx) | 
|  | { | 
|  | int vsec = 0; | 
|  | u16 vendor, id; | 
|  | u8 idx; | 
|  |  | 
|  | while ((vsec = pci_find_next_ext_capability(dev, vsec, | 
|  | OCXL_EXT_CAP_ID_DVSEC))) { | 
|  | pci_read_config_word(dev, vsec + OCXL_DVSEC_VENDOR_OFFSET, | 
|  | &vendor); | 
|  | pci_read_config_word(dev, vsec + OCXL_DVSEC_ID_OFFSET, &id); | 
|  |  | 
|  | if (vendor == PCI_VENDOR_ID_IBM && | 
|  | id == OCXL_DVSEC_AFU_CTRL_ID) { | 
|  | pci_read_config_byte(dev, | 
|  | vsec + OCXL_DVSEC_AFU_CTRL_AFU_IDX, | 
|  | &idx); | 
|  | if (idx == afu_idx) | 
|  | return vsec; | 
|  | } | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int read_pasid(struct pci_dev *dev, struct ocxl_fn_config *fn) | 
|  | { | 
|  | u16 val; | 
|  | int pos; | 
|  |  | 
|  | pos = pci_find_ext_capability(dev, PCI_EXT_CAP_ID_PASID); | 
|  | if (!pos) { | 
|  | /* | 
|  | * PASID capability is not mandatory, but there | 
|  | * shouldn't be any AFU | 
|  | */ | 
|  | dev_dbg(&dev->dev, "Function doesn't require any PASID\n"); | 
|  | fn->max_pasid_log = -1; | 
|  | goto out; | 
|  | } | 
|  | pci_read_config_word(dev, pos + PCI_PASID_CAP, &val); | 
|  | fn->max_pasid_log = EXTRACT_BITS(val, 8, 12); | 
|  |  | 
|  | out: | 
|  | dev_dbg(&dev->dev, "PASID capability:\n"); | 
|  | dev_dbg(&dev->dev, "  Max PASID log = %d\n", fn->max_pasid_log); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int read_dvsec_tl(struct pci_dev *dev, struct ocxl_fn_config *fn) | 
|  | { | 
|  | int pos; | 
|  |  | 
|  | pos = find_dvsec(dev, OCXL_DVSEC_TL_ID); | 
|  | if (!pos && PCI_FUNC(dev->devfn) == 0) { | 
|  | dev_err(&dev->dev, "Can't find TL DVSEC\n"); | 
|  | return -ENODEV; | 
|  | } | 
|  | if (pos && PCI_FUNC(dev->devfn) != 0) { | 
|  | dev_err(&dev->dev, "TL DVSEC is only allowed on function 0\n"); | 
|  | return -ENODEV; | 
|  | } | 
|  | fn->dvsec_tl_pos = pos; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int read_dvsec_function(struct pci_dev *dev, struct ocxl_fn_config *fn) | 
|  | { | 
|  | int pos, afu_present; | 
|  | u32 val; | 
|  |  | 
|  | pos = find_dvsec(dev, OCXL_DVSEC_FUNC_ID); | 
|  | if (!pos) { | 
|  | dev_err(&dev->dev, "Can't find function DVSEC\n"); | 
|  | return -ENODEV; | 
|  | } | 
|  | fn->dvsec_function_pos = pos; | 
|  |  | 
|  | pci_read_config_dword(dev, pos + OCXL_DVSEC_FUNC_OFF_INDEX, &val); | 
|  | afu_present = EXTRACT_BIT(val, 31); | 
|  | if (!afu_present) { | 
|  | fn->max_afu_index = -1; | 
|  | dev_dbg(&dev->dev, "Function doesn't define any AFU\n"); | 
|  | goto out; | 
|  | } | 
|  | fn->max_afu_index = EXTRACT_BITS(val, 24, 29); | 
|  |  | 
|  | out: | 
|  | dev_dbg(&dev->dev, "Function DVSEC:\n"); | 
|  | dev_dbg(&dev->dev, "  Max AFU index = %d\n", fn->max_afu_index); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int read_dvsec_afu_info(struct pci_dev *dev, struct ocxl_fn_config *fn) | 
|  | { | 
|  | int pos; | 
|  |  | 
|  | if (fn->max_afu_index < 0) { | 
|  | fn->dvsec_afu_info_pos = -1; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | pos = find_dvsec(dev, OCXL_DVSEC_AFU_INFO_ID); | 
|  | if (!pos) { | 
|  | dev_err(&dev->dev, "Can't find AFU information DVSEC\n"); | 
|  | return -ENODEV; | 
|  | } | 
|  | fn->dvsec_afu_info_pos = pos; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int read_dvsec_vendor(struct pci_dev *dev) | 
|  | { | 
|  | int pos; | 
|  | u32 cfg, tlx, dlx; | 
|  |  | 
|  | /* | 
|  | * vendor specific DVSEC is optional | 
|  | * | 
|  | * It's currently only used on function 0 to specify the | 
|  | * version of some logic blocks. Some older images may not | 
|  | * even have it so we ignore any errors | 
|  | */ | 
|  | if (PCI_FUNC(dev->devfn) != 0) | 
|  | return 0; | 
|  |  | 
|  | pos = find_dvsec(dev, OCXL_DVSEC_VENDOR_ID); | 
|  | if (!pos) | 
|  | return 0; | 
|  |  | 
|  | pci_read_config_dword(dev, pos + OCXL_DVSEC_VENDOR_CFG_VERS, &cfg); | 
|  | pci_read_config_dword(dev, pos + OCXL_DVSEC_VENDOR_TLX_VERS, &tlx); | 
|  | pci_read_config_dword(dev, pos + OCXL_DVSEC_VENDOR_DLX_VERS, &dlx); | 
|  |  | 
|  | dev_dbg(&dev->dev, "Vendor specific DVSEC:\n"); | 
|  | dev_dbg(&dev->dev, "  CFG version = 0x%x\n", cfg); | 
|  | dev_dbg(&dev->dev, "  TLX version = 0x%x\n", tlx); | 
|  | dev_dbg(&dev->dev, "  DLX version = 0x%x\n", dlx); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int validate_function(struct pci_dev *dev, struct ocxl_fn_config *fn) | 
|  | { | 
|  | if (fn->max_pasid_log == -1 && fn->max_afu_index >= 0) { | 
|  | dev_err(&dev->dev, | 
|  | "AFUs are defined but no PASIDs are requested\n"); | 
|  | return -EINVAL; | 
|  | } | 
|  |  | 
|  | if (fn->max_afu_index > OCXL_MAX_AFU_PER_FUNCTION) { | 
|  | dev_err(&dev->dev, | 
|  | "Max AFU index out of architectural limit (%d vs %d)\n", | 
|  | fn->max_afu_index, OCXL_MAX_AFU_PER_FUNCTION); | 
|  | return -EINVAL; | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int ocxl_config_read_function(struct pci_dev *dev, struct ocxl_fn_config *fn) | 
|  | { | 
|  | int rc; | 
|  |  | 
|  | rc = read_pasid(dev, fn); | 
|  | if (rc) { | 
|  | dev_err(&dev->dev, "Invalid PASID configuration: %d\n", rc); | 
|  | return -ENODEV; | 
|  | } | 
|  |  | 
|  | rc = read_dvsec_tl(dev, fn); | 
|  | if (rc) { | 
|  | dev_err(&dev->dev, | 
|  | "Invalid Transaction Layer DVSEC configuration: %d\n", | 
|  | rc); | 
|  | return -ENODEV; | 
|  | } | 
|  |  | 
|  | rc = read_dvsec_function(dev, fn); | 
|  | if (rc) { | 
|  | dev_err(&dev->dev, | 
|  | "Invalid Function DVSEC configuration: %d\n", rc); | 
|  | return -ENODEV; | 
|  | } | 
|  |  | 
|  | rc = read_dvsec_afu_info(dev, fn); | 
|  | if (rc) { | 
|  | dev_err(&dev->dev, "Invalid AFU configuration: %d\n", rc); | 
|  | return -ENODEV; | 
|  | } | 
|  |  | 
|  | rc = read_dvsec_vendor(dev); | 
|  | if (rc) { | 
|  | dev_err(&dev->dev, | 
|  | "Invalid vendor specific DVSEC configuration: %d\n", | 
|  | rc); | 
|  | return -ENODEV; | 
|  | } | 
|  |  | 
|  | rc = validate_function(dev, fn); | 
|  | return rc; | 
|  | } | 
|  | EXPORT_SYMBOL_GPL(ocxl_config_read_function); | 
|  |  | 
|  | static int read_afu_info(struct pci_dev *dev, struct ocxl_fn_config *fn, | 
|  | int offset, u32 *data) | 
|  | { | 
|  | u32 val; | 
|  | unsigned long timeout = jiffies + (HZ * OCXL_CFG_TIMEOUT); | 
|  | int pos = fn->dvsec_afu_info_pos; | 
|  |  | 
|  | /* Protect 'data valid' bit */ | 
|  | if (EXTRACT_BIT(offset, 31)) { | 
|  | dev_err(&dev->dev, "Invalid offset in AFU info DVSEC\n"); | 
|  | return -EINVAL; | 
|  | } | 
|  |  | 
|  | pci_write_config_dword(dev, pos + OCXL_DVSEC_AFU_INFO_OFF, offset); | 
|  | pci_read_config_dword(dev, pos + OCXL_DVSEC_AFU_INFO_OFF, &val); | 
|  | while (!EXTRACT_BIT(val, 31)) { | 
|  | if (time_after_eq(jiffies, timeout)) { | 
|  | dev_err(&dev->dev, | 
|  | "Timeout while reading AFU info DVSEC (offset=%d)\n", | 
|  | offset); | 
|  | return -EBUSY; | 
|  | } | 
|  | cpu_relax(); | 
|  | pci_read_config_dword(dev, pos + OCXL_DVSEC_AFU_INFO_OFF, &val); | 
|  | } | 
|  | pci_read_config_dword(dev, pos + OCXL_DVSEC_AFU_INFO_DATA, data); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int ocxl_config_check_afu_index(struct pci_dev *dev, | 
|  | struct ocxl_fn_config *fn, int afu_idx) | 
|  | { | 
|  | u32 val; | 
|  | int rc, templ_major, templ_minor, len; | 
|  |  | 
|  | pci_write_config_byte(dev, | 
|  | fn->dvsec_afu_info_pos + OCXL_DVSEC_AFU_INFO_AFU_IDX, | 
|  | afu_idx); | 
|  | rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_VERSION, &val); | 
|  | if (rc) | 
|  | return rc; | 
|  |  | 
|  | /* AFU index map can have holes */ | 
|  | if (!val) | 
|  | return 0; | 
|  |  | 
|  | templ_major = EXTRACT_BITS(val, 8, 15); | 
|  | templ_minor = EXTRACT_BITS(val, 0, 7); | 
|  | dev_dbg(&dev->dev, "AFU descriptor template version %d.%d\n", | 
|  | templ_major, templ_minor); | 
|  |  | 
|  | len = EXTRACT_BITS(val, 16, 31); | 
|  | if (len != OCXL_TEMPL_LEN) { | 
|  | dev_warn(&dev->dev, | 
|  | "Unexpected template length in AFU information (%#x)\n", | 
|  | len); | 
|  | } | 
|  | return 1; | 
|  | } | 
|  | EXPORT_SYMBOL_GPL(ocxl_config_check_afu_index); | 
|  |  | 
|  | static int read_afu_name(struct pci_dev *dev, struct ocxl_fn_config *fn, | 
|  | struct ocxl_afu_config *afu) | 
|  | { | 
|  | int i, rc; | 
|  | u32 val, *ptr; | 
|  |  | 
|  | BUILD_BUG_ON(OCXL_AFU_NAME_SZ < OCXL_TEMPL_NAME_LEN); | 
|  | for (i = 0; i < OCXL_TEMPL_NAME_LEN; i += 4) { | 
|  | rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_NAME + i, &val); | 
|  | if (rc) | 
|  | return rc; | 
|  | ptr = (u32 *) &afu->name[i]; | 
|  | *ptr = le32_to_cpu((__force __le32) val); | 
|  | } | 
|  | afu->name[OCXL_AFU_NAME_SZ - 1] = '\0'; /* play safe */ | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int read_afu_mmio(struct pci_dev *dev, struct ocxl_fn_config *fn, | 
|  | struct ocxl_afu_config *afu) | 
|  | { | 
|  | int rc; | 
|  | u32 val; | 
|  |  | 
|  | /* | 
|  | * Global MMIO | 
|  | */ | 
|  | rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MMIO_GLOBAL, &val); | 
|  | if (rc) | 
|  | return rc; | 
|  | afu->global_mmio_bar = EXTRACT_BITS(val, 0, 2); | 
|  | afu->global_mmio_offset = EXTRACT_BITS(val, 16, 31) << 16; | 
|  |  | 
|  | rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MMIO_GLOBAL + 4, &val); | 
|  | if (rc) | 
|  | return rc; | 
|  | afu->global_mmio_offset += (u64) val << 32; | 
|  |  | 
|  | rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MMIO_GLOBAL_SZ, &val); | 
|  | if (rc) | 
|  | return rc; | 
|  | afu->global_mmio_size = val; | 
|  |  | 
|  | /* | 
|  | * Per-process MMIO | 
|  | */ | 
|  | rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MMIO_PP, &val); | 
|  | if (rc) | 
|  | return rc; | 
|  | afu->pp_mmio_bar = EXTRACT_BITS(val, 0, 2); | 
|  | afu->pp_mmio_offset = EXTRACT_BITS(val, 16, 31) << 16; | 
|  |  | 
|  | rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MMIO_PP + 4, &val); | 
|  | if (rc) | 
|  | return rc; | 
|  | afu->pp_mmio_offset += (u64) val << 32; | 
|  |  | 
|  | rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MMIO_PP_SZ, &val); | 
|  | if (rc) | 
|  | return rc; | 
|  | afu->pp_mmio_stride = val; | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int read_afu_control(struct pci_dev *dev, struct ocxl_afu_config *afu) | 
|  | { | 
|  | int pos; | 
|  | u8 val8; | 
|  | u16 val16; | 
|  |  | 
|  | pos = find_dvsec_afu_ctrl(dev, afu->idx); | 
|  | if (!pos) { | 
|  | dev_err(&dev->dev, "Can't find AFU control DVSEC for AFU %d\n", | 
|  | afu->idx); | 
|  | return -ENODEV; | 
|  | } | 
|  | afu->dvsec_afu_control_pos = pos; | 
|  |  | 
|  | pci_read_config_byte(dev, pos + OCXL_DVSEC_AFU_CTRL_PASID_SUP, &val8); | 
|  | afu->pasid_supported_log = EXTRACT_BITS(val8, 0, 4); | 
|  |  | 
|  | pci_read_config_word(dev, pos + OCXL_DVSEC_AFU_CTRL_ACTAG_SUP, &val16); | 
|  | afu->actag_supported = EXTRACT_BITS(val16, 0, 11); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static bool char_allowed(int c) | 
|  | { | 
|  | /* | 
|  | * Permitted Characters : Alphanumeric, hyphen, underscore, comma | 
|  | */ | 
|  | if ((c >= 0x30 && c <= 0x39) /* digits */ || | 
|  | (c >= 0x41 && c <= 0x5A) /* upper case */ || | 
|  | (c >= 0x61 && c <= 0x7A) /* lower case */ || | 
|  | c == 0 /* NULL */ || | 
|  | c == 0x2D /* - */ || | 
|  | c == 0x5F /* _ */ || | 
|  | c == 0x2C /* , */) | 
|  | return true; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | static int validate_afu(struct pci_dev *dev, struct ocxl_afu_config *afu) | 
|  | { | 
|  | int i; | 
|  |  | 
|  | if (!afu->name[0]) { | 
|  | dev_err(&dev->dev, "Empty AFU name\n"); | 
|  | return -EINVAL; | 
|  | } | 
|  | for (i = 0; i < OCXL_TEMPL_NAME_LEN; i++) { | 
|  | if (!char_allowed(afu->name[i])) { | 
|  | dev_err(&dev->dev, | 
|  | "Invalid character in AFU name\n"); | 
|  | return -EINVAL; | 
|  | } | 
|  | } | 
|  |  | 
|  | if (afu->global_mmio_bar != 0 && | 
|  | afu->global_mmio_bar != 2 && | 
|  | afu->global_mmio_bar != 4) { | 
|  | dev_err(&dev->dev, "Invalid global MMIO bar number\n"); | 
|  | return -EINVAL; | 
|  | } | 
|  | if (afu->pp_mmio_bar != 0 && | 
|  | afu->pp_mmio_bar != 2 && | 
|  | afu->pp_mmio_bar != 4) { | 
|  | dev_err(&dev->dev, "Invalid per-process MMIO bar number\n"); | 
|  | return -EINVAL; | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int ocxl_config_read_afu(struct pci_dev *dev, struct ocxl_fn_config *fn, | 
|  | struct ocxl_afu_config *afu, u8 afu_idx) | 
|  | { | 
|  | int rc; | 
|  | u32 val32; | 
|  |  | 
|  | /* | 
|  | * First, we need to write the AFU idx for the AFU we want to | 
|  | * access. | 
|  | */ | 
|  | WARN_ON((afu_idx & OCXL_DVSEC_AFU_IDX_MASK) != afu_idx); | 
|  | afu->idx = afu_idx; | 
|  | pci_write_config_byte(dev, | 
|  | fn->dvsec_afu_info_pos + OCXL_DVSEC_AFU_INFO_AFU_IDX, | 
|  | afu->idx); | 
|  |  | 
|  | rc = read_afu_name(dev, fn, afu); | 
|  | if (rc) | 
|  | return rc; | 
|  |  | 
|  | rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_AFU_VERSION, &val32); | 
|  | if (rc) | 
|  | return rc; | 
|  | afu->version_major = EXTRACT_BITS(val32, 24, 31); | 
|  | afu->version_minor = EXTRACT_BITS(val32, 16, 23); | 
|  | afu->afuc_type = EXTRACT_BITS(val32, 14, 15); | 
|  | afu->afum_type = EXTRACT_BITS(val32, 12, 13); | 
|  | afu->profile = EXTRACT_BITS(val32, 0, 7); | 
|  |  | 
|  | rc = read_afu_mmio(dev, fn, afu); | 
|  | if (rc) | 
|  | return rc; | 
|  |  | 
|  | rc = read_afu_info(dev, fn, OCXL_DVSEC_TEMPL_MEM_SZ, &val32); | 
|  | if (rc) | 
|  | return rc; | 
|  | afu->log_mem_size = EXTRACT_BITS(val32, 0, 7); | 
|  |  | 
|  | rc = read_afu_control(dev, afu); | 
|  | if (rc) | 
|  | return rc; | 
|  |  | 
|  | dev_dbg(&dev->dev, "AFU configuration:\n"); | 
|  | dev_dbg(&dev->dev, "  name = %s\n", afu->name); | 
|  | dev_dbg(&dev->dev, "  version = %d.%d\n", afu->version_major, | 
|  | afu->version_minor); | 
|  | dev_dbg(&dev->dev, "  global mmio bar = %hhu\n", afu->global_mmio_bar); | 
|  | dev_dbg(&dev->dev, "  global mmio offset = %#llx\n", | 
|  | afu->global_mmio_offset); | 
|  | dev_dbg(&dev->dev, "  global mmio size = %#x\n", afu->global_mmio_size); | 
|  | dev_dbg(&dev->dev, "  pp mmio bar = %hhu\n", afu->pp_mmio_bar); | 
|  | dev_dbg(&dev->dev, "  pp mmio offset = %#llx\n", afu->pp_mmio_offset); | 
|  | dev_dbg(&dev->dev, "  pp mmio stride = %#x\n", afu->pp_mmio_stride); | 
|  | dev_dbg(&dev->dev, "  mem size (log) = %hhu\n", afu->log_mem_size); | 
|  | dev_dbg(&dev->dev, "  pasid supported (log) = %u\n", | 
|  | afu->pasid_supported_log); | 
|  | dev_dbg(&dev->dev, "  actag supported = %u\n", | 
|  | afu->actag_supported); | 
|  |  | 
|  | rc = validate_afu(dev, afu); | 
|  | return rc; | 
|  | } | 
|  | EXPORT_SYMBOL_GPL(ocxl_config_read_afu); | 
|  |  | 
|  | int ocxl_config_get_actag_info(struct pci_dev *dev, u16 *base, u16 *enabled, | 
|  | u16 *supported) | 
|  | { | 
|  | int rc; | 
|  |  | 
|  | /* | 
|  | * This is really a simple wrapper for the kernel API, to | 
|  | * avoid an external driver using ocxl as a library to call | 
|  | * platform-dependent code | 
|  | */ | 
|  | rc = pnv_ocxl_get_actag(dev, base, enabled, supported); | 
|  | if (rc) { | 
|  | dev_err(&dev->dev, "Can't get actag for device: %d\n", rc); | 
|  | return rc; | 
|  | } | 
|  | return 0; | 
|  | } | 
|  | EXPORT_SYMBOL_GPL(ocxl_config_get_actag_info); | 
|  |  | 
|  | void ocxl_config_set_afu_actag(struct pci_dev *dev, int pos, int actag_base, | 
|  | int actag_count) | 
|  | { | 
|  | u16 val; | 
|  |  | 
|  | val = actag_count & OCXL_DVSEC_ACTAG_MASK; | 
|  | pci_write_config_byte(dev, pos + OCXL_DVSEC_AFU_CTRL_ACTAG_EN, val); | 
|  |  | 
|  | val = actag_base & OCXL_DVSEC_ACTAG_MASK; | 
|  | pci_write_config_dword(dev, pos + OCXL_DVSEC_AFU_CTRL_ACTAG_BASE, val); | 
|  | } | 
|  | EXPORT_SYMBOL_GPL(ocxl_config_set_afu_actag); | 
|  |  | 
|  | int ocxl_config_get_pasid_info(struct pci_dev *dev, int *count) | 
|  | { | 
|  | return pnv_ocxl_get_pasid_count(dev, count); | 
|  | } | 
|  | EXPORT_SYMBOL_GPL(ocxl_config_get_pasid_info); | 
|  |  | 
|  | void ocxl_config_set_afu_pasid(struct pci_dev *dev, int pos, int pasid_base, | 
|  | u32 pasid_count_log) | 
|  | { | 
|  | u8 val8; | 
|  | u32 val32; | 
|  |  | 
|  | val8 = pasid_count_log & OCXL_DVSEC_PASID_LOG_MASK; | 
|  | pci_write_config_byte(dev, pos + OCXL_DVSEC_AFU_CTRL_PASID_EN, val8); | 
|  |  | 
|  | pci_read_config_dword(dev, pos + OCXL_DVSEC_AFU_CTRL_PASID_BASE, | 
|  | &val32); | 
|  | val32 &= ~OCXL_DVSEC_PASID_MASK; | 
|  | val32 |= pasid_base & OCXL_DVSEC_PASID_MASK; | 
|  | pci_write_config_dword(dev, pos + OCXL_DVSEC_AFU_CTRL_PASID_BASE, | 
|  | val32); | 
|  | } | 
|  | EXPORT_SYMBOL_GPL(ocxl_config_set_afu_pasid); | 
|  |  | 
|  | void ocxl_config_set_afu_state(struct pci_dev *dev, int pos, int enable) | 
|  | { | 
|  | u8 val; | 
|  |  | 
|  | pci_read_config_byte(dev, pos + OCXL_DVSEC_AFU_CTRL_ENABLE, &val); | 
|  | if (enable) | 
|  | val |= 1; | 
|  | else | 
|  | val &= 0xFE; | 
|  | pci_write_config_byte(dev, pos + OCXL_DVSEC_AFU_CTRL_ENABLE, val); | 
|  | } | 
|  | EXPORT_SYMBOL_GPL(ocxl_config_set_afu_state); | 
|  |  | 
|  | int ocxl_config_set_TL(struct pci_dev *dev, int tl_dvsec) | 
|  | { | 
|  | u32 val; | 
|  | __be32 *be32ptr; | 
|  | u8 timers; | 
|  | int i, rc; | 
|  | long recv_cap; | 
|  | char *recv_rate; | 
|  |  | 
|  | /* | 
|  | * Skip on function != 0, as the TL can only be defined on 0 | 
|  | */ | 
|  | if (PCI_FUNC(dev->devfn) != 0) | 
|  | return 0; | 
|  |  | 
|  | recv_rate = kzalloc(PNV_OCXL_TL_RATE_BUF_SIZE, GFP_KERNEL); | 
|  | if (!recv_rate) | 
|  | return -ENOMEM; | 
|  | /* | 
|  | * The spec defines 64 templates for messages in the | 
|  | * Transaction Layer (TL). | 
|  | * | 
|  | * The host and device each support a subset, so we need to | 
|  | * configure the transmitters on each side to send only | 
|  | * templates the receiver understands, at a rate the receiver | 
|  | * can process.  Per the spec, template 0 must be supported by | 
|  | * everybody. That's the template which has been used by the | 
|  | * host and device so far. | 
|  | * | 
|  | * The sending rate limit must be set before the template is | 
|  | * enabled. | 
|  | */ | 
|  |  | 
|  | /* | 
|  | * Device -> host | 
|  | */ | 
|  | rc = pnv_ocxl_get_tl_cap(dev, &recv_cap, recv_rate, | 
|  | PNV_OCXL_TL_RATE_BUF_SIZE); | 
|  | if (rc) | 
|  | goto out; | 
|  |  | 
|  | for (i = 0; i < PNV_OCXL_TL_RATE_BUF_SIZE; i += 4) { | 
|  | be32ptr = (__be32 *) &recv_rate[i]; | 
|  | pci_write_config_dword(dev, | 
|  | tl_dvsec + OCXL_DVSEC_TL_SEND_RATE + i, | 
|  | be32_to_cpu(*be32ptr)); | 
|  | } | 
|  | val = recv_cap >> 32; | 
|  | pci_write_config_dword(dev, tl_dvsec + OCXL_DVSEC_TL_SEND_CAP, val); | 
|  | val = recv_cap & GENMASK(31, 0); | 
|  | pci_write_config_dword(dev, tl_dvsec + OCXL_DVSEC_TL_SEND_CAP + 4, val); | 
|  |  | 
|  | /* | 
|  | * Host -> device | 
|  | */ | 
|  | for (i = 0; i < PNV_OCXL_TL_RATE_BUF_SIZE; i += 4) { | 
|  | pci_read_config_dword(dev, | 
|  | tl_dvsec + OCXL_DVSEC_TL_RECV_RATE + i, | 
|  | &val); | 
|  | be32ptr = (__be32 *) &recv_rate[i]; | 
|  | *be32ptr = cpu_to_be32(val); | 
|  | } | 
|  | pci_read_config_dword(dev, tl_dvsec + OCXL_DVSEC_TL_RECV_CAP, &val); | 
|  | recv_cap = (long) val << 32; | 
|  | pci_read_config_dword(dev, tl_dvsec + OCXL_DVSEC_TL_RECV_CAP + 4, &val); | 
|  | recv_cap |= val; | 
|  |  | 
|  | rc = pnv_ocxl_set_tl_conf(dev, recv_cap, __pa(recv_rate), | 
|  | PNV_OCXL_TL_RATE_BUF_SIZE); | 
|  | if (rc) | 
|  | goto out; | 
|  |  | 
|  | /* | 
|  | * Opencapi commands needing to be retried are classified per | 
|  | * the TL in 2 groups: short and long commands. | 
|  | * | 
|  | * The short back off timer it not used for now. It will be | 
|  | * for opencapi 4.0. | 
|  | * | 
|  | * The long back off timer is typically used when an AFU hits | 
|  | * a page fault but the NPU is already processing one. So the | 
|  | * AFU needs to wait before it can resubmit. Having a value | 
|  | * too low doesn't break anything, but can generate extra | 
|  | * traffic on the link. | 
|  | * We set it to 1.6 us for now. It's shorter than, but in the | 
|  | * same order of magnitude as the time spent to process a page | 
|  | * fault. | 
|  | */ | 
|  | timers = 0x2 << 4; /* long timer = 1.6 us */ | 
|  | pci_write_config_byte(dev, tl_dvsec + OCXL_DVSEC_TL_BACKOFF_TIMERS, | 
|  | timers); | 
|  |  | 
|  | rc = 0; | 
|  | out: | 
|  | kfree(recv_rate); | 
|  | return rc; | 
|  | } | 
|  | EXPORT_SYMBOL_GPL(ocxl_config_set_TL); | 
|  |  | 
|  | int ocxl_config_terminate_pasid(struct pci_dev *dev, int afu_control, int pasid) | 
|  | { | 
|  | u32 val; | 
|  | unsigned long timeout; | 
|  |  | 
|  | pci_read_config_dword(dev, afu_control + OCXL_DVSEC_AFU_CTRL_TERM_PASID, | 
|  | &val); | 
|  | if (EXTRACT_BIT(val, 20)) { | 
|  | dev_err(&dev->dev, | 
|  | "Can't terminate PASID %#x, previous termination didn't complete\n", | 
|  | pasid); | 
|  | return -EBUSY; | 
|  | } | 
|  |  | 
|  | val &= ~OCXL_DVSEC_PASID_MASK; | 
|  | val |= pasid & OCXL_DVSEC_PASID_MASK; | 
|  | val |= BIT(20); | 
|  | pci_write_config_dword(dev, | 
|  | afu_control + OCXL_DVSEC_AFU_CTRL_TERM_PASID, | 
|  | val); | 
|  |  | 
|  | timeout = jiffies + (HZ * OCXL_CFG_TIMEOUT); | 
|  | pci_read_config_dword(dev, afu_control + OCXL_DVSEC_AFU_CTRL_TERM_PASID, | 
|  | &val); | 
|  | while (EXTRACT_BIT(val, 20)) { | 
|  | if (time_after_eq(jiffies, timeout)) { | 
|  | dev_err(&dev->dev, | 
|  | "Timeout while waiting for AFU to terminate PASID %#x\n", | 
|  | pasid); | 
|  | return -EBUSY; | 
|  | } | 
|  | cpu_relax(); | 
|  | pci_read_config_dword(dev, | 
|  | afu_control + OCXL_DVSEC_AFU_CTRL_TERM_PASID, | 
|  | &val); | 
|  | } | 
|  | return 0; | 
|  | } | 
|  | EXPORT_SYMBOL_GPL(ocxl_config_terminate_pasid); | 
|  |  | 
|  | void ocxl_config_set_actag(struct pci_dev *dev, int func_dvsec, u32 tag_first, | 
|  | u32 tag_count) | 
|  | { | 
|  | u32 val; | 
|  |  | 
|  | val = (tag_first & OCXL_DVSEC_ACTAG_MASK) << 16; | 
|  | val |= tag_count & OCXL_DVSEC_ACTAG_MASK; | 
|  | pci_write_config_dword(dev, func_dvsec + OCXL_DVSEC_FUNC_OFF_ACTAG, | 
|  | val); | 
|  | } | 
|  | EXPORT_SYMBOL_GPL(ocxl_config_set_actag); |