Loading...
Note: File does not exist in v5.9.
1// SPDX-License-Identifier: GPL-2.0-only
2/* Copyright(c) 2021 Intel Corporation. All rights reserved. */
3#include <linux/units.h>
4#include <linux/io-64-nonatomic-lo-hi.h>
5#include <linux/device.h>
6#include <linux/delay.h>
7#include <linux/pci.h>
8#include <linux/pci-doe.h>
9#include <linux/aer.h>
10#include <cxlpci.h>
11#include <cxlmem.h>
12#include <cxl.h>
13#include "core.h"
14#include "trace.h"
15
16/**
17 * DOC: cxl core pci
18 *
19 * Compute Express Link protocols are layered on top of PCIe. CXL core provides
20 * a set of helpers for CXL interactions which occur via PCIe.
21 */
22
23static unsigned short media_ready_timeout = 60;
24module_param(media_ready_timeout, ushort, 0644);
25MODULE_PARM_DESC(media_ready_timeout, "seconds to wait for media ready");
26
27struct cxl_walk_context {
28 struct pci_bus *bus;
29 struct cxl_port *port;
30 int type;
31 int error;
32 int count;
33};
34
35static int match_add_dports(struct pci_dev *pdev, void *data)
36{
37 struct cxl_walk_context *ctx = data;
38 struct cxl_port *port = ctx->port;
39 int type = pci_pcie_type(pdev);
40 struct cxl_register_map map;
41 struct cxl_dport *dport;
42 u32 lnkcap, port_num;
43 int rc;
44
45 if (pdev->bus != ctx->bus)
46 return 0;
47 if (!pci_is_pcie(pdev))
48 return 0;
49 if (type != ctx->type)
50 return 0;
51 if (pci_read_config_dword(pdev, pci_pcie_cap(pdev) + PCI_EXP_LNKCAP,
52 &lnkcap))
53 return 0;
54
55 rc = cxl_find_regblock(pdev, CXL_REGLOC_RBI_COMPONENT, &map);
56 if (rc)
57 dev_dbg(&port->dev, "failed to find component registers\n");
58
59 port_num = FIELD_GET(PCI_EXP_LNKCAP_PN, lnkcap);
60 dport = devm_cxl_add_dport(port, &pdev->dev, port_num, map.resource);
61 if (IS_ERR(dport)) {
62 ctx->error = PTR_ERR(dport);
63 return PTR_ERR(dport);
64 }
65 ctx->count++;
66
67 return 0;
68}
69
70/**
71 * devm_cxl_port_enumerate_dports - enumerate downstream ports of the upstream port
72 * @port: cxl_port whose ->uport_dev is the upstream of dports to be enumerated
73 *
74 * Returns a positive number of dports enumerated or a negative error
75 * code.
76 */
77int devm_cxl_port_enumerate_dports(struct cxl_port *port)
78{
79 struct pci_bus *bus = cxl_port_to_pci_bus(port);
80 struct cxl_walk_context ctx;
81 int type;
82
83 if (!bus)
84 return -ENXIO;
85
86 if (pci_is_root_bus(bus))
87 type = PCI_EXP_TYPE_ROOT_PORT;
88 else
89 type = PCI_EXP_TYPE_DOWNSTREAM;
90
91 ctx = (struct cxl_walk_context) {
92 .port = port,
93 .bus = bus,
94 .type = type,
95 };
96 pci_walk_bus(bus, match_add_dports, &ctx);
97
98 if (ctx.count == 0)
99 return -ENODEV;
100 if (ctx.error)
101 return ctx.error;
102 return ctx.count;
103}
104EXPORT_SYMBOL_NS_GPL(devm_cxl_port_enumerate_dports, CXL);
105
106static int cxl_dvsec_mem_range_valid(struct cxl_dev_state *cxlds, int id)
107{
108 struct pci_dev *pdev = to_pci_dev(cxlds->dev);
109 int d = cxlds->cxl_dvsec;
110 bool valid = false;
111 int rc, i;
112 u32 temp;
113
114 if (id > CXL_DVSEC_RANGE_MAX)
115 return -EINVAL;
116
117 /* Check MEM INFO VALID bit first, give up after 1s */
118 i = 1;
119 do {
120 rc = pci_read_config_dword(pdev,
121 d + CXL_DVSEC_RANGE_SIZE_LOW(id),
122 &temp);
123 if (rc)
124 return rc;
125
126 valid = FIELD_GET(CXL_DVSEC_MEM_INFO_VALID, temp);
127 if (valid)
128 break;
129 msleep(1000);
130 } while (i--);
131
132 if (!valid) {
133 dev_err(&pdev->dev,
134 "Timeout awaiting memory range %d valid after 1s.\n",
135 id);
136 return -ETIMEDOUT;
137 }
138
139 return 0;
140}
141
142static int cxl_dvsec_mem_range_active(struct cxl_dev_state *cxlds, int id)
143{
144 struct pci_dev *pdev = to_pci_dev(cxlds->dev);
145 int d = cxlds->cxl_dvsec;
146 bool active = false;
147 int rc, i;
148 u32 temp;
149
150 if (id > CXL_DVSEC_RANGE_MAX)
151 return -EINVAL;
152
153 /* Check MEM ACTIVE bit, up to 60s timeout by default */
154 for (i = media_ready_timeout; i; i--) {
155 rc = pci_read_config_dword(
156 pdev, d + CXL_DVSEC_RANGE_SIZE_LOW(id), &temp);
157 if (rc)
158 return rc;
159
160 active = FIELD_GET(CXL_DVSEC_MEM_ACTIVE, temp);
161 if (active)
162 break;
163 msleep(1000);
164 }
165
166 if (!active) {
167 dev_err(&pdev->dev,
168 "timeout awaiting memory active after %d seconds\n",
169 media_ready_timeout);
170 return -ETIMEDOUT;
171 }
172
173 return 0;
174}
175
176/*
177 * Wait up to @media_ready_timeout for the device to report memory
178 * active.
179 */
180int cxl_await_media_ready(struct cxl_dev_state *cxlds)
181{
182 struct pci_dev *pdev = to_pci_dev(cxlds->dev);
183 int d = cxlds->cxl_dvsec;
184 int rc, i, hdm_count;
185 u64 md_status;
186 u16 cap;
187
188 rc = pci_read_config_word(pdev,
189 d + CXL_DVSEC_CAP_OFFSET, &cap);
190 if (rc)
191 return rc;
192
193 hdm_count = FIELD_GET(CXL_DVSEC_HDM_COUNT_MASK, cap);
194 for (i = 0; i < hdm_count; i++) {
195 rc = cxl_dvsec_mem_range_valid(cxlds, i);
196 if (rc)
197 return rc;
198 }
199
200 for (i = 0; i < hdm_count; i++) {
201 rc = cxl_dvsec_mem_range_active(cxlds, i);
202 if (rc)
203 return rc;
204 }
205
206 md_status = readq(cxlds->regs.memdev + CXLMDEV_STATUS_OFFSET);
207 if (!CXLMDEV_READY(md_status))
208 return -EIO;
209
210 return 0;
211}
212EXPORT_SYMBOL_NS_GPL(cxl_await_media_ready, CXL);
213
214static int wait_for_valid(struct pci_dev *pdev, int d)
215{
216 u32 val;
217 int rc;
218
219 /*
220 * Memory_Info_Valid: When set, indicates that the CXL Range 1 Size high
221 * and Size Low registers are valid. Must be set within 1 second of
222 * deassertion of reset to CXL device. Likely it is already set by the
223 * time this runs, but otherwise give a 1.5 second timeout in case of
224 * clock skew.
225 */
226 rc = pci_read_config_dword(pdev, d + CXL_DVSEC_RANGE_SIZE_LOW(0), &val);
227 if (rc)
228 return rc;
229
230 if (val & CXL_DVSEC_MEM_INFO_VALID)
231 return 0;
232
233 msleep(1500);
234
235 rc = pci_read_config_dword(pdev, d + CXL_DVSEC_RANGE_SIZE_LOW(0), &val);
236 if (rc)
237 return rc;
238
239 if (val & CXL_DVSEC_MEM_INFO_VALID)
240 return 0;
241
242 return -ETIMEDOUT;
243}
244
245static int cxl_set_mem_enable(struct cxl_dev_state *cxlds, u16 val)
246{
247 struct pci_dev *pdev = to_pci_dev(cxlds->dev);
248 int d = cxlds->cxl_dvsec;
249 u16 ctrl;
250 int rc;
251
252 rc = pci_read_config_word(pdev, d + CXL_DVSEC_CTRL_OFFSET, &ctrl);
253 if (rc < 0)
254 return rc;
255
256 if ((ctrl & CXL_DVSEC_MEM_ENABLE) == val)
257 return 1;
258 ctrl &= ~CXL_DVSEC_MEM_ENABLE;
259 ctrl |= val;
260
261 rc = pci_write_config_word(pdev, d + CXL_DVSEC_CTRL_OFFSET, ctrl);
262 if (rc < 0)
263 return rc;
264
265 return 0;
266}
267
268static void clear_mem_enable(void *cxlds)
269{
270 cxl_set_mem_enable(cxlds, 0);
271}
272
273static int devm_cxl_enable_mem(struct device *host, struct cxl_dev_state *cxlds)
274{
275 int rc;
276
277 rc = cxl_set_mem_enable(cxlds, CXL_DVSEC_MEM_ENABLE);
278 if (rc < 0)
279 return rc;
280 if (rc > 0)
281 return 0;
282 return devm_add_action_or_reset(host, clear_mem_enable, cxlds);
283}
284
285/* require dvsec ranges to be covered by a locked platform window */
286static int dvsec_range_allowed(struct device *dev, void *arg)
287{
288 struct range *dev_range = arg;
289 struct cxl_decoder *cxld;
290
291 if (!is_root_decoder(dev))
292 return 0;
293
294 cxld = to_cxl_decoder(dev);
295
296 if (!(cxld->flags & CXL_DECODER_F_RAM))
297 return 0;
298
299 return range_contains(&cxld->hpa_range, dev_range);
300}
301
302static void disable_hdm(void *_cxlhdm)
303{
304 u32 global_ctrl;
305 struct cxl_hdm *cxlhdm = _cxlhdm;
306 void __iomem *hdm = cxlhdm->regs.hdm_decoder;
307
308 global_ctrl = readl(hdm + CXL_HDM_DECODER_CTRL_OFFSET);
309 writel(global_ctrl & ~CXL_HDM_DECODER_ENABLE,
310 hdm + CXL_HDM_DECODER_CTRL_OFFSET);
311}
312
313static int devm_cxl_enable_hdm(struct device *host, struct cxl_hdm *cxlhdm)
314{
315 void __iomem *hdm = cxlhdm->regs.hdm_decoder;
316 u32 global_ctrl;
317
318 global_ctrl = readl(hdm + CXL_HDM_DECODER_CTRL_OFFSET);
319 writel(global_ctrl | CXL_HDM_DECODER_ENABLE,
320 hdm + CXL_HDM_DECODER_CTRL_OFFSET);
321
322 return devm_add_action_or_reset(host, disable_hdm, cxlhdm);
323}
324
325int cxl_dvsec_rr_decode(struct device *dev, int d,
326 struct cxl_endpoint_dvsec_info *info)
327{
328 struct pci_dev *pdev = to_pci_dev(dev);
329 int hdm_count, rc, i, ranges = 0;
330 u16 cap, ctrl;
331
332 if (!d) {
333 dev_dbg(dev, "No DVSEC Capability\n");
334 return -ENXIO;
335 }
336
337 rc = pci_read_config_word(pdev, d + CXL_DVSEC_CAP_OFFSET, &cap);
338 if (rc)
339 return rc;
340
341 rc = pci_read_config_word(pdev, d + CXL_DVSEC_CTRL_OFFSET, &ctrl);
342 if (rc)
343 return rc;
344
345 if (!(cap & CXL_DVSEC_MEM_CAPABLE)) {
346 dev_dbg(dev, "Not MEM Capable\n");
347 return -ENXIO;
348 }
349
350 /*
351 * It is not allowed by spec for MEM.capable to be set and have 0 legacy
352 * HDM decoders (values > 2 are also undefined as of CXL 2.0). As this
353 * driver is for a spec defined class code which must be CXL.mem
354 * capable, there is no point in continuing to enable CXL.mem.
355 */
356 hdm_count = FIELD_GET(CXL_DVSEC_HDM_COUNT_MASK, cap);
357 if (!hdm_count || hdm_count > 2)
358 return -EINVAL;
359
360 rc = wait_for_valid(pdev, d);
361 if (rc) {
362 dev_dbg(dev, "Failure awaiting MEM_INFO_VALID (%d)\n", rc);
363 return rc;
364 }
365
366 /*
367 * The current DVSEC values are moot if the memory capability is
368 * disabled, and they will remain moot after the HDM Decoder
369 * capability is enabled.
370 */
371 info->mem_enabled = FIELD_GET(CXL_DVSEC_MEM_ENABLE, ctrl);
372 if (!info->mem_enabled)
373 return 0;
374
375 for (i = 0; i < hdm_count; i++) {
376 u64 base, size;
377 u32 temp;
378
379 rc = pci_read_config_dword(
380 pdev, d + CXL_DVSEC_RANGE_SIZE_HIGH(i), &temp);
381 if (rc)
382 return rc;
383
384 size = (u64)temp << 32;
385
386 rc = pci_read_config_dword(
387 pdev, d + CXL_DVSEC_RANGE_SIZE_LOW(i), &temp);
388 if (rc)
389 return rc;
390
391 size |= temp & CXL_DVSEC_MEM_SIZE_LOW_MASK;
392 if (!size) {
393 info->dvsec_range[i] = (struct range) {
394 .start = 0,
395 .end = CXL_RESOURCE_NONE,
396 };
397 continue;
398 }
399
400 rc = pci_read_config_dword(
401 pdev, d + CXL_DVSEC_RANGE_BASE_HIGH(i), &temp);
402 if (rc)
403 return rc;
404
405 base = (u64)temp << 32;
406
407 rc = pci_read_config_dword(
408 pdev, d + CXL_DVSEC_RANGE_BASE_LOW(i), &temp);
409 if (rc)
410 return rc;
411
412 base |= temp & CXL_DVSEC_MEM_BASE_LOW_MASK;
413
414 info->dvsec_range[i] = (struct range) {
415 .start = base,
416 .end = base + size - 1
417 };
418
419 ranges++;
420 }
421
422 info->ranges = ranges;
423
424 return 0;
425}
426EXPORT_SYMBOL_NS_GPL(cxl_dvsec_rr_decode, CXL);
427
428/**
429 * cxl_hdm_decode_init() - Setup HDM decoding for the endpoint
430 * @cxlds: Device state
431 * @cxlhdm: Mapped HDM decoder Capability
432 * @info: Cached DVSEC range registers info
433 *
434 * Try to enable the endpoint's HDM Decoder Capability
435 */
436int cxl_hdm_decode_init(struct cxl_dev_state *cxlds, struct cxl_hdm *cxlhdm,
437 struct cxl_endpoint_dvsec_info *info)
438{
439 void __iomem *hdm = cxlhdm->regs.hdm_decoder;
440 struct cxl_port *port = cxlhdm->port;
441 struct device *dev = cxlds->dev;
442 struct cxl_port *root;
443 int i, rc, allowed;
444 u32 global_ctrl = 0;
445
446 if (hdm)
447 global_ctrl = readl(hdm + CXL_HDM_DECODER_CTRL_OFFSET);
448
449 /*
450 * If the HDM Decoder Capability is already enabled then assume
451 * that some other agent like platform firmware set it up.
452 */
453 if (global_ctrl & CXL_HDM_DECODER_ENABLE || (!hdm && info->mem_enabled))
454 return devm_cxl_enable_mem(&port->dev, cxlds);
455 else if (!hdm)
456 return -ENODEV;
457
458 root = to_cxl_port(port->dev.parent);
459 while (!is_cxl_root(root) && is_cxl_port(root->dev.parent))
460 root = to_cxl_port(root->dev.parent);
461 if (!is_cxl_root(root)) {
462 dev_err(dev, "Failed to acquire root port for HDM enable\n");
463 return -ENODEV;
464 }
465
466 for (i = 0, allowed = 0; info->mem_enabled && i < info->ranges; i++) {
467 struct device *cxld_dev;
468
469 cxld_dev = device_find_child(&root->dev, &info->dvsec_range[i],
470 dvsec_range_allowed);
471 if (!cxld_dev) {
472 dev_dbg(dev, "DVSEC Range%d denied by platform\n", i);
473 continue;
474 }
475 dev_dbg(dev, "DVSEC Range%d allowed by platform\n", i);
476 put_device(cxld_dev);
477 allowed++;
478 }
479
480 if (!allowed && info->mem_enabled) {
481 dev_err(dev, "Range register decodes outside platform defined CXL ranges.\n");
482 return -ENXIO;
483 }
484
485 /*
486 * Per CXL 2.0 Section 8.1.3.8.3 and 8.1.3.8.4 DVSEC CXL Range 1 Base
487 * [High,Low] when HDM operation is enabled the range register values
488 * are ignored by the device, but the spec also recommends matching the
489 * DVSEC Range 1,2 to HDM Decoder Range 0,1. So, non-zero info->ranges
490 * are expected even though Linux does not require or maintain that
491 * match. If at least one DVSEC range is enabled and allowed, skip HDM
492 * Decoder Capability Enable.
493 */
494 if (info->mem_enabled)
495 return 0;
496
497 rc = devm_cxl_enable_hdm(&port->dev, cxlhdm);
498 if (rc)
499 return rc;
500
501 return devm_cxl_enable_mem(&port->dev, cxlds);
502}
503EXPORT_SYMBOL_NS_GPL(cxl_hdm_decode_init, CXL);
504
505#define CXL_DOE_TABLE_ACCESS_REQ_CODE 0x000000ff
506#define CXL_DOE_TABLE_ACCESS_REQ_CODE_READ 0
507#define CXL_DOE_TABLE_ACCESS_TABLE_TYPE 0x0000ff00
508#define CXL_DOE_TABLE_ACCESS_TABLE_TYPE_CDATA 0
509#define CXL_DOE_TABLE_ACCESS_ENTRY_HANDLE 0xffff0000
510#define CXL_DOE_TABLE_ACCESS_LAST_ENTRY 0xffff
511#define CXL_DOE_PROTOCOL_TABLE_ACCESS 2
512
513#define CDAT_DOE_REQ(entry_handle) cpu_to_le32 \
514 (FIELD_PREP(CXL_DOE_TABLE_ACCESS_REQ_CODE, \
515 CXL_DOE_TABLE_ACCESS_REQ_CODE_READ) | \
516 FIELD_PREP(CXL_DOE_TABLE_ACCESS_TABLE_TYPE, \
517 CXL_DOE_TABLE_ACCESS_TABLE_TYPE_CDATA) | \
518 FIELD_PREP(CXL_DOE_TABLE_ACCESS_ENTRY_HANDLE, (entry_handle)))
519
520static int cxl_cdat_get_length(struct device *dev,
521 struct pci_doe_mb *cdat_doe,
522 size_t *length)
523{
524 __le32 request = CDAT_DOE_REQ(0);
525 __le32 response[2];
526 int rc;
527
528 rc = pci_doe(cdat_doe, PCI_DVSEC_VENDOR_ID_CXL,
529 CXL_DOE_PROTOCOL_TABLE_ACCESS,
530 &request, sizeof(request),
531 &response, sizeof(response));
532 if (rc < 0) {
533 dev_err(dev, "DOE failed: %d", rc);
534 return rc;
535 }
536 if (rc < sizeof(response))
537 return -EIO;
538
539 *length = le32_to_cpu(response[1]);
540 dev_dbg(dev, "CDAT length %zu\n", *length);
541
542 return 0;
543}
544
545static int cxl_cdat_read_table(struct device *dev,
546 struct pci_doe_mb *cdat_doe,
547 void *cdat_table, size_t *cdat_length)
548{
549 size_t length = *cdat_length + sizeof(__le32);
550 __le32 *data = cdat_table;
551 int entry_handle = 0;
552 __le32 saved_dw = 0;
553
554 do {
555 __le32 request = CDAT_DOE_REQ(entry_handle);
556 struct cdat_entry_header *entry;
557 size_t entry_dw;
558 int rc;
559
560 rc = pci_doe(cdat_doe, PCI_DVSEC_VENDOR_ID_CXL,
561 CXL_DOE_PROTOCOL_TABLE_ACCESS,
562 &request, sizeof(request),
563 data, length);
564 if (rc < 0) {
565 dev_err(dev, "DOE failed: %d", rc);
566 return rc;
567 }
568
569 /* 1 DW Table Access Response Header + CDAT entry */
570 entry = (struct cdat_entry_header *)(data + 1);
571 if ((entry_handle == 0 &&
572 rc != sizeof(__le32) + sizeof(struct cdat_header)) ||
573 (entry_handle > 0 &&
574 (rc < sizeof(__le32) + sizeof(*entry) ||
575 rc != sizeof(__le32) + le16_to_cpu(entry->length))))
576 return -EIO;
577
578 /* Get the CXL table access header entry handle */
579 entry_handle = FIELD_GET(CXL_DOE_TABLE_ACCESS_ENTRY_HANDLE,
580 le32_to_cpu(data[0]));
581 entry_dw = rc / sizeof(__le32);
582 /* Skip Header */
583 entry_dw -= 1;
584 /*
585 * Table Access Response Header overwrote the last DW of
586 * previous entry, so restore that DW
587 */
588 *data = saved_dw;
589 length -= entry_dw * sizeof(__le32);
590 data += entry_dw;
591 saved_dw = *data;
592 } while (entry_handle != CXL_DOE_TABLE_ACCESS_LAST_ENTRY);
593
594 /* Length in CDAT header may exceed concatenation of CDAT entries */
595 *cdat_length -= length - sizeof(__le32);
596
597 return 0;
598}
599
600static unsigned char cdat_checksum(void *buf, size_t size)
601{
602 unsigned char sum, *data = buf;
603 size_t i;
604
605 for (sum = 0, i = 0; i < size; i++)
606 sum += data[i];
607 return sum;
608}
609
610/**
611 * read_cdat_data - Read the CDAT data on this port
612 * @port: Port to read data from
613 *
614 * This call will sleep waiting for responses from the DOE mailbox.
615 */
616void read_cdat_data(struct cxl_port *port)
617{
618 struct device *uport = port->uport_dev;
619 struct device *dev = &port->dev;
620 struct pci_doe_mb *cdat_doe;
621 struct pci_dev *pdev = NULL;
622 struct cxl_memdev *cxlmd;
623 size_t cdat_length;
624 void *cdat_table, *cdat_buf;
625 int rc;
626
627 if (is_cxl_memdev(uport)) {
628 struct device *host;
629
630 cxlmd = to_cxl_memdev(uport);
631 host = cxlmd->dev.parent;
632 if (dev_is_pci(host))
633 pdev = to_pci_dev(host);
634 } else if (dev_is_pci(uport)) {
635 pdev = to_pci_dev(uport);
636 }
637
638 if (!pdev)
639 return;
640
641 cdat_doe = pci_find_doe_mailbox(pdev, PCI_DVSEC_VENDOR_ID_CXL,
642 CXL_DOE_PROTOCOL_TABLE_ACCESS);
643 if (!cdat_doe) {
644 dev_dbg(dev, "No CDAT mailbox\n");
645 return;
646 }
647
648 port->cdat_available = true;
649
650 if (cxl_cdat_get_length(dev, cdat_doe, &cdat_length)) {
651 dev_dbg(dev, "No CDAT length\n");
652 return;
653 }
654
655 cdat_buf = devm_kzalloc(dev, cdat_length + sizeof(__le32), GFP_KERNEL);
656 if (!cdat_buf)
657 return;
658
659 rc = cxl_cdat_read_table(dev, cdat_doe, cdat_buf, &cdat_length);
660 if (rc)
661 goto err;
662
663 cdat_table = cdat_buf + sizeof(__le32);
664 if (cdat_checksum(cdat_table, cdat_length))
665 goto err;
666
667 port->cdat.table = cdat_table;
668 port->cdat.length = cdat_length;
669 return;
670
671err:
672 /* Don't leave table data allocated on error */
673 devm_kfree(dev, cdat_buf);
674 dev_err(dev, "Failed to read/validate CDAT.\n");
675}
676EXPORT_SYMBOL_NS_GPL(read_cdat_data, CXL);
677
678static void __cxl_handle_cor_ras(struct cxl_dev_state *cxlds,
679 void __iomem *ras_base)
680{
681 void __iomem *addr;
682 u32 status;
683
684 if (!ras_base)
685 return;
686
687 addr = ras_base + CXL_RAS_CORRECTABLE_STATUS_OFFSET;
688 status = readl(addr);
689 if (status & CXL_RAS_CORRECTABLE_STATUS_MASK) {
690 writel(status & CXL_RAS_CORRECTABLE_STATUS_MASK, addr);
691 trace_cxl_aer_correctable_error(cxlds->cxlmd, status);
692 }
693}
694
695static void cxl_handle_endpoint_cor_ras(struct cxl_dev_state *cxlds)
696{
697 return __cxl_handle_cor_ras(cxlds, cxlds->regs.ras);
698}
699
700/* CXL spec rev3.0 8.2.4.16.1 */
701static void header_log_copy(void __iomem *ras_base, u32 *log)
702{
703 void __iomem *addr;
704 u32 *log_addr;
705 int i, log_u32_size = CXL_HEADERLOG_SIZE / sizeof(u32);
706
707 addr = ras_base + CXL_RAS_HEADER_LOG_OFFSET;
708 log_addr = log;
709
710 for (i = 0; i < log_u32_size; i++) {
711 *log_addr = readl(addr);
712 log_addr++;
713 addr += sizeof(u32);
714 }
715}
716
717/*
718 * Log the state of the RAS status registers and prepare them to log the
719 * next error status. Return 1 if reset needed.
720 */
721static bool __cxl_handle_ras(struct cxl_dev_state *cxlds,
722 void __iomem *ras_base)
723{
724 u32 hl[CXL_HEADERLOG_SIZE_U32];
725 void __iomem *addr;
726 u32 status;
727 u32 fe;
728
729 if (!ras_base)
730 return false;
731
732 addr = ras_base + CXL_RAS_UNCORRECTABLE_STATUS_OFFSET;
733 status = readl(addr);
734 if (!(status & CXL_RAS_UNCORRECTABLE_STATUS_MASK))
735 return false;
736
737 /* If multiple errors, log header points to first error from ctrl reg */
738 if (hweight32(status) > 1) {
739 void __iomem *rcc_addr =
740 ras_base + CXL_RAS_CAP_CONTROL_OFFSET;
741
742 fe = BIT(FIELD_GET(CXL_RAS_CAP_CONTROL_FE_MASK,
743 readl(rcc_addr)));
744 } else {
745 fe = status;
746 }
747
748 header_log_copy(ras_base, hl);
749 trace_cxl_aer_uncorrectable_error(cxlds->cxlmd, status, fe, hl);
750 writel(status & CXL_RAS_UNCORRECTABLE_STATUS_MASK, addr);
751
752 return true;
753}
754
755static bool cxl_handle_endpoint_ras(struct cxl_dev_state *cxlds)
756{
757 return __cxl_handle_ras(cxlds, cxlds->regs.ras);
758}
759
760#ifdef CONFIG_PCIEAER_CXL
761
762static void cxl_dport_map_rch_aer(struct cxl_dport *dport)
763{
764 struct cxl_rcrb_info *ri = &dport->rcrb;
765 void __iomem *dport_aer = NULL;
766 resource_size_t aer_phys;
767 struct device *host;
768
769 if (dport->rch && ri->aer_cap) {
770 host = dport->reg_map.host;
771 aer_phys = ri->aer_cap + ri->base;
772 dport_aer = devm_cxl_iomap_block(host, aer_phys,
773 sizeof(struct aer_capability_regs));
774 }
775
776 dport->regs.dport_aer = dport_aer;
777}
778
779static void cxl_dport_map_regs(struct cxl_dport *dport)
780{
781 struct cxl_register_map *map = &dport->reg_map;
782 struct device *dev = dport->dport_dev;
783
784 if (!map->component_map.ras.valid)
785 dev_dbg(dev, "RAS registers not found\n");
786 else if (cxl_map_component_regs(map, &dport->regs.component,
787 BIT(CXL_CM_CAP_CAP_ID_RAS)))
788 dev_dbg(dev, "Failed to map RAS capability.\n");
789
790 if (dport->rch)
791 cxl_dport_map_rch_aer(dport);
792}
793
794static void cxl_disable_rch_root_ints(struct cxl_dport *dport)
795{
796 void __iomem *aer_base = dport->regs.dport_aer;
797 struct pci_host_bridge *bridge;
798 u32 aer_cmd_mask, aer_cmd;
799
800 if (!aer_base)
801 return;
802
803 bridge = to_pci_host_bridge(dport->dport_dev);
804
805 /*
806 * Disable RCH root port command interrupts.
807 * CXL 3.0 12.2.1.1 - RCH Downstream Port-detected Errors
808 *
809 * This sequence may not be necessary. CXL spec states disabling
810 * the root cmd register's interrupts is required. But, PCI spec
811 * shows these are disabled by default on reset.
812 */
813 if (bridge->native_aer) {
814 aer_cmd_mask = (PCI_ERR_ROOT_CMD_COR_EN |
815 PCI_ERR_ROOT_CMD_NONFATAL_EN |
816 PCI_ERR_ROOT_CMD_FATAL_EN);
817 aer_cmd = readl(aer_base + PCI_ERR_ROOT_COMMAND);
818 aer_cmd &= ~aer_cmd_mask;
819 writel(aer_cmd, aer_base + PCI_ERR_ROOT_COMMAND);
820 }
821}
822
823void cxl_setup_parent_dport(struct device *host, struct cxl_dport *dport)
824{
825 struct device *dport_dev = dport->dport_dev;
826 struct pci_host_bridge *host_bridge;
827
828 host_bridge = to_pci_host_bridge(dport_dev);
829 if (host_bridge->native_aer)
830 dport->rcrb.aer_cap = cxl_rcrb_to_aer(dport_dev, dport->rcrb.base);
831
832 dport->reg_map.host = host;
833 cxl_dport_map_regs(dport);
834
835 if (dport->rch)
836 cxl_disable_rch_root_ints(dport);
837}
838EXPORT_SYMBOL_NS_GPL(cxl_setup_parent_dport, CXL);
839
840static void cxl_handle_rdport_cor_ras(struct cxl_dev_state *cxlds,
841 struct cxl_dport *dport)
842{
843 return __cxl_handle_cor_ras(cxlds, dport->regs.ras);
844}
845
846static bool cxl_handle_rdport_ras(struct cxl_dev_state *cxlds,
847 struct cxl_dport *dport)
848{
849 return __cxl_handle_ras(cxlds, dport->regs.ras);
850}
851
852/*
853 * Copy the AER capability registers using 32 bit read accesses.
854 * This is necessary because RCRB AER capability is MMIO mapped. Clear the
855 * status after copying.
856 *
857 * @aer_base: base address of AER capability block in RCRB
858 * @aer_regs: destination for copying AER capability
859 */
860static bool cxl_rch_get_aer_info(void __iomem *aer_base,
861 struct aer_capability_regs *aer_regs)
862{
863 int read_cnt = sizeof(struct aer_capability_regs) / sizeof(u32);
864 u32 *aer_regs_buf = (u32 *)aer_regs;
865 int n;
866
867 if (!aer_base)
868 return false;
869
870 /* Use readl() to guarantee 32-bit accesses */
871 for (n = 0; n < read_cnt; n++)
872 aer_regs_buf[n] = readl(aer_base + n * sizeof(u32));
873
874 writel(aer_regs->uncor_status, aer_base + PCI_ERR_UNCOR_STATUS);
875 writel(aer_regs->cor_status, aer_base + PCI_ERR_COR_STATUS);
876
877 return true;
878}
879
880/* Get AER severity. Return false if there is no error. */
881static bool cxl_rch_get_aer_severity(struct aer_capability_regs *aer_regs,
882 int *severity)
883{
884 if (aer_regs->uncor_status & ~aer_regs->uncor_mask) {
885 if (aer_regs->uncor_status & PCI_ERR_ROOT_FATAL_RCV)
886 *severity = AER_FATAL;
887 else
888 *severity = AER_NONFATAL;
889 return true;
890 }
891
892 if (aer_regs->cor_status & ~aer_regs->cor_mask) {
893 *severity = AER_CORRECTABLE;
894 return true;
895 }
896
897 return false;
898}
899
900static void cxl_handle_rdport_errors(struct cxl_dev_state *cxlds)
901{
902 struct pci_dev *pdev = to_pci_dev(cxlds->dev);
903 struct aer_capability_regs aer_regs;
904 struct cxl_dport *dport;
905 struct cxl_port *port;
906 int severity;
907
908 port = cxl_pci_find_port(pdev, &dport);
909 if (!port)
910 return;
911
912 put_device(&port->dev);
913
914 if (!cxl_rch_get_aer_info(dport->regs.dport_aer, &aer_regs))
915 return;
916
917 if (!cxl_rch_get_aer_severity(&aer_regs, &severity))
918 return;
919
920 pci_print_aer(pdev, severity, &aer_regs);
921
922 if (severity == AER_CORRECTABLE)
923 cxl_handle_rdport_cor_ras(cxlds, dport);
924 else
925 cxl_handle_rdport_ras(cxlds, dport);
926}
927
928#else
929static void cxl_handle_rdport_errors(struct cxl_dev_state *cxlds) { }
930#endif
931
932void cxl_cor_error_detected(struct pci_dev *pdev)
933{
934 struct cxl_dev_state *cxlds = pci_get_drvdata(pdev);
935 struct device *dev = &cxlds->cxlmd->dev;
936
937 scoped_guard(device, dev) {
938 if (!dev->driver) {
939 dev_warn(&pdev->dev,
940 "%s: memdev disabled, abort error handling\n",
941 dev_name(dev));
942 return;
943 }
944
945 if (cxlds->rcd)
946 cxl_handle_rdport_errors(cxlds);
947
948 cxl_handle_endpoint_cor_ras(cxlds);
949 }
950}
951EXPORT_SYMBOL_NS_GPL(cxl_cor_error_detected, CXL);
952
953pci_ers_result_t cxl_error_detected(struct pci_dev *pdev,
954 pci_channel_state_t state)
955{
956 struct cxl_dev_state *cxlds = pci_get_drvdata(pdev);
957 struct cxl_memdev *cxlmd = cxlds->cxlmd;
958 struct device *dev = &cxlmd->dev;
959 bool ue;
960
961 scoped_guard(device, dev) {
962 if (!dev->driver) {
963 dev_warn(&pdev->dev,
964 "%s: memdev disabled, abort error handling\n",
965 dev_name(dev));
966 return PCI_ERS_RESULT_DISCONNECT;
967 }
968
969 if (cxlds->rcd)
970 cxl_handle_rdport_errors(cxlds);
971 /*
972 * A frozen channel indicates an impending reset which is fatal to
973 * CXL.mem operation, and will likely crash the system. On the off
974 * chance the situation is recoverable dump the status of the RAS
975 * capability registers and bounce the active state of the memdev.
976 */
977 ue = cxl_handle_endpoint_ras(cxlds);
978 }
979
980
981 switch (state) {
982 case pci_channel_io_normal:
983 if (ue) {
984 device_release_driver(dev);
985 return PCI_ERS_RESULT_NEED_RESET;
986 }
987 return PCI_ERS_RESULT_CAN_RECOVER;
988 case pci_channel_io_frozen:
989 dev_warn(&pdev->dev,
990 "%s: frozen state error detected, disable CXL.mem\n",
991 dev_name(dev));
992 device_release_driver(dev);
993 return PCI_ERS_RESULT_NEED_RESET;
994 case pci_channel_io_perm_failure:
995 dev_warn(&pdev->dev,
996 "failure state error detected, request disconnect\n");
997 return PCI_ERS_RESULT_DISCONNECT;
998 }
999 return PCI_ERS_RESULT_NEED_RESET;
1000}
1001EXPORT_SYMBOL_NS_GPL(cxl_error_detected, CXL);
1002
1003static int cxl_flit_size(struct pci_dev *pdev)
1004{
1005 if (cxl_pci_flit_256(pdev))
1006 return 256;
1007
1008 return 68;
1009}
1010
1011/**
1012 * cxl_pci_get_latency - calculate the link latency for the PCIe link
1013 * @pdev: PCI device
1014 *
1015 * return: calculated latency or 0 for no latency
1016 *
1017 * CXL Memory Device SW Guide v1.0 2.11.4 Link latency calculation
1018 * Link latency = LinkPropagationLatency + FlitLatency + RetimerLatency
1019 * LinkProgationLatency is negligible, so 0 will be used
1020 * RetimerLatency is assumed to be negligible and 0 will be used
1021 * FlitLatency = FlitSize / LinkBandwidth
1022 * FlitSize is defined by spec. CXL rev3.0 4.2.1.
1023 * 68B flit is used up to 32GT/s. >32GT/s, 256B flit size is used.
1024 * The FlitLatency is converted to picoseconds.
1025 */
1026long cxl_pci_get_latency(struct pci_dev *pdev)
1027{
1028 long bw;
1029
1030 bw = pcie_link_speed_mbps(pdev);
1031 if (bw < 0)
1032 return 0;
1033 bw /= BITS_PER_BYTE;
1034
1035 return cxl_flit_size(pdev) * MEGA / bw;
1036}