From patchwork Mon Jan 11 22:51:04 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Ben Widawsky X-Patchwork-Id: 12015439 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-16.8 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4A4C6C433DB for ; Tue, 12 Jan 2021 00:29:51 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 1F36922CB8 for ; Tue, 12 Jan 2021 00:29:51 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404267AbhALAZ6 (ORCPT ); Mon, 11 Jan 2021 19:25:58 -0500 Received: from mga01.intel.com ([192.55.52.88]:57916 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390863AbhAKXBx (ORCPT ); Mon, 11 Jan 2021 18:01:53 -0500 IronPort-SDR: 87IZ8EwlPuSJElnLka/6RnFveVftUy2Nx3r/WwEAWsWW9/Xpj6cXD+J1TSy2L97l96mapOy5iZ 4TAoCVQnLJvg== X-IronPort-AV: E=McAfee;i="6000,8403,9861"; a="196564861" X-IronPort-AV: E=Sophos;i="5.79,339,1602572400"; d="scan'208";a="196564861" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Jan 2021 15:01:10 -0800 IronPort-SDR: sCAQPpFdLZSG8f6X/xJQWLGHIlG/kuxg2J9NjkdOtcj6mqO/Z/g5jC0+lra3eAB/+5NAB8aQZc w7hHPdFBLscw== X-IronPort-AV: E=Sophos;i="5.79,339,1602572400"; d="scan'208";a="381181152" Received: from yyang31-mobl.amr.corp.intel.com (HELO intel.com) ([10.252.142.71]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Jan 2021 15:01:10 -0800 Received: from fmsmsx611.amr.corp.intel.com (10.18.126.91) by fmsmsx612.amr.corp.intel.com (10.18.126.92) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5 via Mailbox Transport; Mon, 11 Jan 2021 14:51:29 -0800 Received: from fmsmsx605.amr.corp.intel.com (10.18.126.85) by fmsmsx611.amr.corp.intel.com (10.18.126.91) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Mon, 11 Jan 2021 14:51:28 -0800 Received: from fmsmga008.fm.intel.com (10.253.24.58) by fmsmsx605.amr.corp.intel.com (10.18.126.85) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5 via Frontend Transport; Mon, 11 Jan 2021 14:51:28 -0800 IronPort-SDR: 4kpmIzK06kE1yRaJe9re3m2tIDNClqa6Cy3ySeFmDGJy519orI6KGw4GRaFxlqP10b5tK/ii0R sG+HdmFZG/9w== X-IronPort-AV: E=Sophos;i="5.79,339,1602572400"; d="scan'208";a="352777923" Received: from yyang31-mobl.amr.corp.intel.com (HELO bwidawsk-mobl5.local) ([10.252.142.71]) by fmsmga008-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Jan 2021 14:51:27 -0800 From: Ben Widawsky To: CC: Ben Widawsky , , , "linux-acpi@vger.kernel.org, Ira Weiny" , Dan Williams , Vishal Verma , "Kelley, Sean V" , Rafael Wysocki , Bjorn Helgaas , Jonathan Cameron , "Jon Masters" , Chris Browy , "Randy Dunlap" , Christoph Hellwig , Subject: [RFC PATCH v3 00/16] CXL 2.0 Support Date: Mon, 11 Jan 2021 14:51:04 -0800 Message-ID: <20210111225121.820014-1-ben.widawsky@intel.com> X-Mailer: git-send-email 2.30.0 X-MS-Exchange-Organization-Network-Message-Id: d476fb40-2240-452d-d5cb-08d8b6836eae X-MS-Exchange-Organization-AVStamp-Enterprise: 1.0 X-MS-Exchange-Organization-SCL: -1 X-MS-Exchange-Organization-AuthSource: fmsmsx605.amr.corp.intel.com X-MS-Exchange-Organization-AuthAs: Anonymous X-MS-Exchange-Transport-EndToEndLatency: 00:00:00.6311572 X-MS-Exchange-Processed-By-BccFoldering: 15.01.1713.001 MIME-Version: 1.0 X-TUID: o4CKhML9mBEW Precedence: bulk List-ID: X-Mailing-List: linux-acpi@vger.kernel.org Changes since v2 [1] - Rebased onto v5.11-rc2 - fixes for sparse (Ben) - Add (and modify) IOCTL number to ioctl-number.rst. (Randy) - Change @enable to @flags with enable field. (Dan) - Move command "name" to UAPI enum. (Dan) - Make command array use designated initializer. (Dan) - Avoid copies to/from payload registers (Ben) - Actually write the input payload length (Ben) - Return ENOTTY instead of EINVAL for missing Send command. (Dan) - Keep device locked and pinned during send commands. (Dan) - Validate input payload size doesn't exceed hardware's limit. (Ben) - Get rid of TAINT flag in UAPI. (Dan) - Spelling fixes. (Dan) - Document things that must be zero. (Dan) - Use new TAINT (Dan) - Replace cxl_debug with dev_debug (Dan) - Squash debug info into relevant patches (Ben) - Put CXL_CMD on a diet, #define the opcodes (Dan) - Switch mailbox sync from spinlock to mutex (Ben) - Store off (and debug print) hardware's payload size (Ben) - Fix length of GENMASK for mailbox payload (Ben) - Create concept of enabled commands. (Ben) - Use CEL to enable commands based on hardware. (Ben) - Move command struct definitions into mem.c (Ben) - Create concept of hidden commands, and kernel only commands (Ben) - Add payload min to sysfs (Ben) --- The patches can be found here: https://gitlab.com/bwidawsk/linux/-/commits/cxl-2.0v3 I've also created #cxl on oftc for any discussion. --- Introduce support for “type-3” memory devices defined in the recently released Compute Express Link (CXL) 2.0 specification[2]. Specifically, these are the memory devices defined by section 8.2.8.5 of the CXL 2.0 spec. A reference implementation emulating these devices has been submitted to the QEMU mailing list [3] and is available on gitlab [4]. “Type-3” is a CXL device that acts as a memory expander for RAM or PMEM. It might be interleaved with other CXL devices in a given physical address range. These changes allow for foundational enumeration of CXL 2.0 memory devices as well as basic userspace interaction. The functionality present is: - Initial driver bring-up - Device enumeration and an initial sysfs representation - Submit a basic firmware command via ‘mailbox’ to an emulated memory device with non-volatile capacity. - Provide an interface to send commands to the hardware. Some of the functionality that is still missing includes: - Memory interleaving at the host bridge, root port, or switch level - CXL 1.1 Root Complex Integrated Endpoint Support - CXL 2.0 Hot plug support - A bevy of supported device commands In addition to the core functionality of discovering the spec defined registers and resources, introduce a CXL device model that will be the foundation for translating CXL capabilities into existing Linux infrastructure for Persistent Memory and other memory devices. For now, this only includes support for the management command mailbox that type-3 devices surface. These control devices fill the role of “DIMMs” / nmemX memory-devices in LIBNVDIMM terms. Now, while implementing the driver some feedback for the specification was generated to cover perceived gaps and address conflicts. The feedback is presented as a reference implementation in the driver and QEMU emulation. Specifically the following concepts are original to the Linux implementation and feedback / collaboration is requested to develop these into specification proposals: 1. Top level ACPI object (ACPI0017) 2. HW imposed address space and interleave constraints ACPI0017 -------- Introduce a new ACPI namespace device with an _HID of ACPI0017. The purpose of this object is twofold, support a legacy OS with a set of out-of-tree CXL modules, and establish an attach point for a driver that knows about interleaving. Both of these boil down to the same point, to centralize Operating System support for resources described by the CXL Early Discovery Table (CEDT). The legacy OS problem stems from the spec's description of a host bridge, ACPI0016 is denoted as the _HID for host bridges, with a _CID of PNP0A08. In a CXL unaware version of Linux, the core ACPI subsystem will bind a driver to PNP0A08 and preclude a CXL-aware driver from binding to ACPI0016. An ACPI0017 device allows a standalone CXL-aware driver to register for handling / coordinating CEDT and CXL-specific _OSC control. Similarly when managing interleaving there needs to be some management layer above the ACPI0016 device that is capable of assembling leaf nodes into interleave sets. As is the case with ACPI0012 that does this central coordination for NFIT defined resources, ACPI0017 does the same for CEDT described resources. Memory Windows ------- For CXL.mem capable platforms, there is a need for a mechanism for platform firmware to make the Operating System aware of any restrictions that hardware might have in address space. For example, in a system with 4 host bridges all participating in an interleave set, the firmware needs to provide some description of this. That information is missing from the CXL 2.0 spec as of today and it also is not implemented in the driver. A variety of ACPI based mechanisms, for example _CRS fields on the ACPI0017 device, were considered. Next steps after this basic foundation is expanded command support and LIBNVDIMM integration. This is the initial “release early / release often” version of the Linux CXL enabling. [1]: https://lore.kernel.org/linux-cxl/20201209002418.1976362-1-ben.widawsky@intel.com/ [2]: https://www.computeexpresslink.org/ [3]: https://lore.kernel.org/qemu-devel/20210105165323.783725-1-ben.widawsky@intel.com/T/#t [4]: https://gitlab.com/bwidawsk/qemu/-/tree/cxl-2.0v2 Ben Widawsky (12): docs: cxl: Add basic documentation cxl/mem: Map memory device registers cxl/mem: Find device capabilities cxl/mem: Implement polled mode mailbox cxl/mem: Add basic IOCTL interface cxl/mem: Add send command taint: add taint for direct hardware access cxl/mem: Add a "RAW" send command cxl/mem: Create concept of enabled commands cxl/mem: Use CEL for enabling commands cxl/mem: Add limited Get Log command (0401h) MAINTAINERS: Add maintainers of the CXL driver Dan Williams (2): cxl/mem: Introduce a driver for CXL-2.0-Type-3 endpoints cxl/mem: Register CXL memX devices Vishal Verma (2): cxl/acpi: Add an acpi_cxl module for the CXL interconnect cxl/acpi: add OSC support .clang-format | 1 + Documentation/ABI/testing/sysfs-bus-cxl | 26 + Documentation/admin-guide/sysctl/kernel.rst | 1 + Documentation/admin-guide/tainted-kernels.rst | 6 +- Documentation/cxl/index.rst | 12 + Documentation/cxl/memory-devices.rst | 51 + Documentation/index.rst | 1 + .../userspace-api/ioctl/ioctl-number.rst | 1 + MAINTAINERS | 10 + drivers/Kconfig | 1 + drivers/Makefile | 1 + drivers/base/core.c | 14 + drivers/cxl/Kconfig | 58 + drivers/cxl/Makefile | 9 + drivers/cxl/acpi.c | 351 ++++ drivers/cxl/acpi.h | 35 + drivers/cxl/bus.c | 54 + drivers/cxl/bus.h | 8 + drivers/cxl/cxl.h | 147 ++ drivers/cxl/mem.c | 1475 +++++++++++++++++ drivers/cxl/pci.h | 34 + include/acpi/actbl1.h | 50 + include/linux/device.h | 1 + include/linux/kernel.h | 3 +- include/uapi/linux/cxl_mem.h | 168 ++ kernel/panic.c | 1 + 26 files changed, 2517 insertions(+), 2 deletions(-) create mode 100644 Documentation/ABI/testing/sysfs-bus-cxl create mode 100644 Documentation/cxl/index.rst create mode 100644 Documentation/cxl/memory-devices.rst create mode 100644 drivers/cxl/Kconfig create mode 100644 drivers/cxl/Makefile create mode 100644 drivers/cxl/acpi.c create mode 100644 drivers/cxl/acpi.h create mode 100644 drivers/cxl/bus.c create mode 100644 drivers/cxl/bus.h create mode 100644 drivers/cxl/cxl.h create mode 100644 drivers/cxl/mem.c create mode 100644 drivers/cxl/pci.h create mode 100644 include/uapi/linux/cxl_mem.h