From patchwork Thu Dec 14 01:19:59 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ira Weiny X-Patchwork-Id: 755715 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="HUitspEw" Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.9]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 95D2C10F; Wed, 13 Dec 2023 17:20:16 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1702516816; x=1734052816; h=from:date:subject:mime-version:content-transfer-encoding: message-id:references:in-reply-to:to:cc; bh=FbZ9EDWLonKTUxYYGTqvScWFaNn8M+dQ29F7USZI6cI=; b=HUitspEw5g8h5y6spbLo9S18vQW4f94bq0S8IMRLF/gTZw5qMRwrlEia xDnvtEOmx6CuDNYt/fzvuOGlM9EkK4u890+cdMhzvbIEzvoTNl+joB9at Xu9/I2hUihtMl8RzsSfeZp4z9Uu898kU5nqbK+Rj8r8Q9ufa98STpWcud ScHoTxBwdc7ufa3LkRqjW9VWnQmmCNwqVCxv1x8VsIf3SHVgyRRiz0hFc hNCs+rtGBFqF1cIosrTy5alSIWvvi7wMinx1/8MLA+Q0vFYq9BYI6BcH2 Hh7yVrzwhb7pg3UYWAjvoosku0vtm2OSlA+O8TgebcwOSgJP8Vhff9dLT g==; X-IronPort-AV: E=McAfee;i="6600,9927,10923"; a="13747644" X-IronPort-AV: E=Sophos;i="6.04,274,1695711600"; d="scan'208";a="13747644" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by orvoesa101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Dec 2023 17:20:16 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10923"; a="767436347" X-IronPort-AV: E=Sophos;i="6.04,274,1695711600"; d="scan'208";a="767436347" Received: from iweiny-desk3.amr.corp.intel.com (HELO localhost) ([10.212.117.241]) by orsmga007-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Dec 2023 17:20:15 -0800 From: Ira Weiny Date: Wed, 13 Dec 2023 17:19:59 -0800 Subject: [PATCH v3 6/7] firmware/efi: Process CXL Component Events Precedence: bulk X-Mailing-List: linux-efi@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20231213-cxl-cper-v3-6-7fd863dd0d25@intel.com> References: <20231213-cxl-cper-v3-0-7fd863dd0d25@intel.com> In-Reply-To: <20231213-cxl-cper-v3-0-7fd863dd0d25@intel.com> To: Dan Williams , Jonathan Cameron , Smita Koralahalli , Shiju Jose Cc: Yazen Ghannam , Davidlohr Bueso , Dave Jiang , Alison Schofield , Vishal Verma , Ard Biesheuvel , linux-efi@vger.kernel.org, linux-kernel@vger.kernel.org, linux-cxl@vger.kernel.org, Ira Weiny X-Mailer: b4 0.13-dev-2539e X-Developer-Signature: v=1; a=ed25519-sha256; t=1702516806; l=7508; i=ira.weiny@intel.com; s=20221222; h=from:subject:message-id; bh=FbZ9EDWLonKTUxYYGTqvScWFaNn8M+dQ29F7USZI6cI=; b=4OlZYD++exmztTChyFE/x8xJl4Z/ni/sM0dZCQ5C0M2M8+amf5Ibjl1n1TWrXX2Ahi5D4tAi4 KRevRx76NlMBiUq294VLzgfbOGnGiHvN2NAPdLifaYqYyHs7yGaAdoU X-Developer-Key: i=ira.weiny@intel.com; a=ed25519; pk=brwqReAJklzu/xZ9FpSsMPSQ/qkSalbg6scP3w809Ec= BIOS can configure memory devices as firmware first. This will send CXL events to the firmware instead of the OS. The firmware can then send these events to the OS via UEFI. UEFI v2.10 section N.2.14 defines a Common Platform Error Record (CPER) format for CXL Component Events. The format is mostly the same as the CXL Common Event Record Format. The difference is the use of a GUID in the Section Type rather than a UUID as part of the event itself. Add EFI support to detect CXL CPER records and call a registered notifier with the event. Enforce that only one notifier call can be registered at any time. Cc: Ard Biesheuvel Signed-off-by: Ira Weiny --- Changes for v3: [djbw: check notifier vs registered and error if not the same] [djbw: check for previous notifier and fail if already set] [djbw: use guard for rw sem] [djbw: pass the event type and record data as 2 parameters] [djbw: prefer __packed over pragma packed] [djbw: clean up commit message] [iweiny: clean structure names] --- drivers/firmware/efi/cper.c | 15 ++++++++++++++ drivers/firmware/efi/cper_cxl.c | 46 +++++++++++++++++++++++++++++++++++++++++ drivers/firmware/efi/cper_cxl.h | 29 ++++++++++++++++++++++++++ include/linux/cxl-event.h | 43 ++++++++++++++++++++++++++++++++++++++ 4 files changed, 133 insertions(+) diff --git a/drivers/firmware/efi/cper.c b/drivers/firmware/efi/cper.c index 35c37f667781..2ee5011c4a8e 100644 --- a/drivers/firmware/efi/cper.c +++ b/drivers/firmware/efi/cper.c @@ -22,6 +22,7 @@ #include #include #include +#include #include #include #include "cper_cxl.h" @@ -607,6 +608,20 @@ cper_estatus_print_section(const char *pfx, struct acpi_hest_generic_data *gdata cper_print_prot_err(newpfx, prot_err); else goto err_section_too_small; + } else if (guid_equal(sec_type, &CPER_SEC_CXL_GEN_MEDIA_GUID) || + guid_equal(sec_type, &CPER_SEC_CXL_DRAM_GUID) || + guid_equal(sec_type, &CPER_SEC_CXL_MEM_MODULE_GUID)) { + struct cxl_cper_event_rec *rec = acpi_hest_get_payload(gdata); + + if (rec->hdr.length <= sizeof(rec->hdr)) + goto err_section_too_small; + + if (rec->hdr.length > sizeof(*rec)) { + pr_err(FW_WARN "error section length is too big\n"); + return; + } + + cxl_cper_post_event(newpfx, sec_type, rec); } else { const void *err = acpi_hest_get_payload(gdata); diff --git a/drivers/firmware/efi/cper_cxl.c b/drivers/firmware/efi/cper_cxl.c index a55771b99a97..da6ae0912bc3 100644 --- a/drivers/firmware/efi/cper_cxl.c +++ b/drivers/firmware/efi/cper_cxl.c @@ -8,6 +8,7 @@ */ #include +#include #include "cper_cxl.h" #define PROT_ERR_VALID_AGENT_TYPE BIT_ULL(0) @@ -187,3 +188,48 @@ void cper_print_prot_err(const char *pfx, const struct cper_sec_prot_err *prot_e sizeof(cxl_ras->header_log), 0); } } + +DECLARE_RWSEM(cxl_cper_rw_sem); +static cxl_cper_notifier cper_notifier; + +void cxl_cper_post_event(const char *pfx, guid_t *sec_type, + struct cxl_cper_event_rec *rec) +{ + enum cxl_event_type event_type; + + if (!(rec->hdr.validation_bits & CPER_CXL_COMP_EVENT_LOG_VALID)) { + pr_err(FW_WARN "cxl event no Component Event Log present\n"); + return; + } + + if (guid_equal(sec_type, &CPER_SEC_CXL_GEN_MEDIA_GUID)) + event_type = CXL_CPER_EVENT_GEN_MEDIA; + else if (guid_equal(sec_type, &CPER_SEC_CXL_DRAM_GUID)) + event_type = CXL_CPER_EVENT_DRAM; + else if (guid_equal(sec_type, &CPER_SEC_CXL_MEM_MODULE_GUID)) + event_type = CXL_CPER_EVENT_MEM_MODULE; + + guard(rwsem_read)(&cxl_cper_rw_sem); + if (cper_notifier) + cper_notifier(event_type, rec); +} + +int cxl_cper_register_notifier(cxl_cper_notifier notifier) +{ + guard(rwsem_write)(&cxl_cper_rw_sem); + if (cper_notifier) + return -EINVAL; + cper_notifier = notifier; + return 0; +} +EXPORT_SYMBOL_NS_GPL(cxl_cper_register_notifier, CXL); + +int cxl_cper_unregister_notifier(cxl_cper_notifier notifier) +{ + guard(rwsem_write)(&cxl_cper_rw_sem); + if (notifier != cper_notifier) + return -EINVAL; + cper_notifier = NULL; + return 0; +} +EXPORT_SYMBOL_NS_GPL(cxl_cper_unregister_notifier, CXL); diff --git a/drivers/firmware/efi/cper_cxl.h b/drivers/firmware/efi/cper_cxl.h index 86bfcf7909ec..71f27b3e2810 100644 --- a/drivers/firmware/efi/cper_cxl.h +++ b/drivers/firmware/efi/cper_cxl.h @@ -10,11 +10,38 @@ #ifndef LINUX_CPER_CXL_H #define LINUX_CPER_CXL_H +#include + /* CXL Protocol Error Section */ #define CPER_SEC_CXL_PROT_ERR \ GUID_INIT(0x80B9EFB4, 0x52B5, 0x4DE3, 0xA7, 0x77, 0x68, 0x78, \ 0x4B, 0x77, 0x10, 0x48) +/* CXL Event record UUIDs are formated at GUIDs and reported in section type */ +/* + * General Media Event Record + * CXL rev 3.0 Section 8.2.9.2.1.1; Table 8-43 + */ +#define CPER_SEC_CXL_GEN_MEDIA_GUID \ + GUID_INIT(0xfbcd0a77, 0xc260, 0x417f, \ + 0x85, 0xa9, 0x08, 0x8b, 0x16, 0x21, 0xeb, 0xa6) + +/* + * DRAM Event Record + * CXL rev 3.0 section 8.2.9.2.1.2; Table 8-44 + */ +#define CPER_SEC_CXL_DRAM_GUID \ + GUID_INIT(0x601dcbb3, 0x9c06, 0x4eab, \ + 0xb8, 0xaf, 0x4e, 0x9b, 0xfb, 0x5c, 0x96, 0x24) + +/* + * Memory Module Event Record + * CXL rev 3.0 section 8.2.9.2.1.3; Table 8-45 + */ +#define CPER_SEC_CXL_MEM_MODULE_GUID \ + GUID_INIT(0xfe927475, 0xdd59, 0x4339, \ + 0xa5, 0x86, 0x79, 0xba, 0xb1, 0x13, 0xb7, 0x74) + #pragma pack(1) /* Compute Express Link Protocol Error Section, UEFI v2.10 sec N.2.13 */ @@ -62,5 +89,7 @@ struct cper_sec_prot_err { #pragma pack() void cper_print_prot_err(const char *pfx, const struct cper_sec_prot_err *prot_err); +void cxl_cper_post_event(const char *pfx, guid_t *sec_type, + struct cxl_cper_event_rec *rec); #endif //__CPER_CXL_ diff --git a/include/linux/cxl-event.h b/include/linux/cxl-event.h index 18dab4d90dc8..167cc812f212 100644 --- a/include/linux/cxl-event.h +++ b/include/linux/cxl-event.h @@ -108,4 +108,47 @@ struct cxl_event_record_raw { union cxl_event event; } __packed; +enum cxl_event_type { + CXL_CPER_EVENT_GEN_MEDIA, + CXL_CPER_EVENT_DRAM, + CXL_CPER_EVENT_MEM_MODULE, +}; + +#define CPER_CXL_DEVICE_ID_VALID BIT(0) +#define CPER_CXL_DEVICE_SN_VALID BIT(1) +#define CPER_CXL_COMP_EVENT_LOG_VALID BIT(2) +struct cxl_cper_event_rec { + struct { + u32 length; + u64 validation_bits; + struct cper_cxl_event_devid { + u16 vendor_id; + u16 device_id; + u8 func_num; + u8 device_num; + u8 bus_num; + u16 segment_num; + u16 slot_num; /* bits 2:0 reserved */ + u8 reserved; + } device_id __packed; + struct cper_cxl_event_sn { + u32 lower_dw; + u32 upper_dw; + } dev_serial_num __packed; + } hdr __packed; + + union cxl_event event; +} __packed; + +typedef void (*cxl_cper_notifier)(enum cxl_event_type type, + struct cxl_cper_event_rec *rec); + +#ifdef CONFIG_UEFI_CPER +int cxl_cper_register_notifier(cxl_cper_notifier notifier); +int cxl_cper_unregister_notifier(cxl_cper_notifier notifier); +#else +static inline int cxl_cper_register_notifier(cxl_cper_notifier notifier) { } +static inline int cxl_cper_unregister_notifier(cxl_cper_notifier notifier) { } +#endif + #endif /* _LINUX_CXL_EVENT_H */