From patchwork Fri Jan 13 16:17:04 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jonathan Cameron X-Patchwork-Id: 13101071 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 28B37C54EBE for ; Fri, 13 Jan 2023 16:23:25 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229703AbjAMQXY (ORCPT ); Fri, 13 Jan 2023 11:23:24 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38184 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229791AbjAMQW6 (ORCPT ); Fri, 13 Jan 2023 11:22:58 -0500 Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3C2AB876C9 for ; Fri, 13 Jan 2023 08:17:12 -0800 (PST) Received: from lhrpeml500005.china.huawei.com (unknown [172.18.147.200]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4NtmhM6Qbzz67MK3; Sat, 14 Jan 2023 00:14:27 +0800 (CST) Received: from SecurePC-101-06.china.huawei.com (10.122.247.231) by lhrpeml500005.china.huawei.com (7.191.163.240) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Fri, 13 Jan 2023 16:17:09 +0000 From: Jonathan Cameron To: , Michael Tsirkin CC: Ben Widawsky , , , Dave Jiang , , , Shameerali Kolothum Thodi Subject: [PATCH 0/7] hw/cxl: RAS error emulation and injection Date: Fri, 13 Jan 2023 16:17:04 +0000 Message-ID: <20230113161711.7885-1-Jonathan.Cameron@huawei.com> X-Mailer: git-send-email 2.37.2 MIME-Version: 1.0 X-Originating-IP: [10.122.247.231] X-ClientProxiedBy: lhrpeml500006.china.huawei.com (7.191.161.198) To lhrpeml500005.china.huawei.com (7.191.163.240) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-cxl@vger.kernel.org CXL error reporting is complex. This series only covers the protocol related errors reported via PCIE AER - Ira Weiny has posted support for Event log based injection and I will post an update of Poison list injection shortly. My proposal is to upstream this one first, followed by Ira's Event Log series, then finally the Poison List handling. That is based on likely order of Linux kernel support (the support for this type of error reporting went in during the recent merge window, the others are still under review). Note we may propose other non error related features in between! The current revisions of all the error injection can be found at: https://gitlab.com/jic23/qemu/-/tree/cxl-2023-01-11 In order to test the kernel support for RAS error handling, I previously provided this series via gitlab, enabling David Jiang's kernel patches to be tested. Now that Linux kernel support is upstream, this series is proposing the support for upstream inclusion in QEMU. Note that support for Multiple Header Recording has been added to QEMU the meantime and a kernel patch to use that feature sent out. https://lore.kernel.org/linux-cxl/20230113154058.16227-1-Jonathan.Cameron@huawei.com/T/#t There are two generic PCI AER precursor feature additions. 1) The PCI_ERR_UCOR_MASK register has not been implemented until now and is necessary for correct emulation. 2) The routing for AER errors, via existing AER error injection, only covered one of two paths given in the PCIe base specification, unfortunately not the one used by the Linux kernel CXL support. The use of MSI for the CXL root ports, both makes sense from the point of view of how it may well be implemented, and works around the documented lack of PCI interrupt routing in i386/q35. I have a hack that lets us correctly route those interrupts but don't currently plan to post it. The actual CXL error injection uses a new QMP interface as documented in the final patch description. The existing AER error injection internals are reused though it's HMP interface is not. Injection via QMP: { "execute": "qmp_capabilities" } ... { "execute": "cxl-inject-uncorrectable-errors", "arguments": { "path": "/machine/peripheral/cxl-pmem0", "errors": [ { "type": "cache-address-parity", "header": [ 3, 4] }, { "type": "cache-data-parity", "header": [0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31] }, { "type": "internal", "header": [ 1, 2, 4] } ] }} ... { "execute": "cxl-inject-correctable-error", "arguments": { "path": "/machine/peripheral/cxl-pmem0", "type": "physical", "header": [ 3, 4] } } Based on top of: https://lore.kernel.org/all/20230112102644.27830-1-Jonathan.Cameron@huawei.com/ [PATCH v2 0/8] hw/cxl: CXL emulation cleanups and minor fixes for upstream Jonathan Cameron (7): hw/pci/aer: Implement PCI_ERR_UNCOR_MASK register hw/pci/aer: Add missing routing for AER errors hw/pci-bridge/cxl_root_port: Wire up AER hw/pci-bridge/cxl_root_port: Wire up MSI hw/mem/cxl-type3: Add AER extended capability hw/pci/aer: Make PCIE AER error injection facility available for other emulation to use. hw/mem/cxl_type3: Add CXL RAS Error Injection Support. hw/cxl/cxl-component-utils.c | 4 +- hw/mem/cxl_type3.c | 303 +++++++++++++++++++++++++++++++++ hw/mem/cxl_type3_stubs.c | 10 ++ hw/mem/meson.build | 2 + hw/pci-bridge/cxl_root_port.c | 64 +++++++ hw/pci/pci-internal.h | 1 - hw/pci/pcie_aer.c | 14 +- include/hw/cxl/cxl_component.h | 26 +++ include/hw/cxl/cxl_device.h | 11 ++ include/hw/pci/pcie_aer.h | 1 + include/hw/pci/pcie_regs.h | 3 + qapi/cxl.json | 113 ++++++++++++ qapi/meson.build | 1 + qapi/qapi-schema.json | 1 + 14 files changed, 551 insertions(+), 3 deletions(-) create mode 100644 hw/mem/cxl_type3_stubs.c create mode 100644 qapi/cxl.json