xref: /linux/drivers/cxl/core/pci.c (revision d163d60258c755845cbc9cfe0e45fca71e649488)
1 // SPDX-License-Identifier: GPL-2.0-only
2 /* Copyright(c) 2021 Intel Corporation. All rights reserved. */
3 #include <linux/units.h>
4 #include <linux/io-64-nonatomic-lo-hi.h>
5 #include <linux/device.h>
6 #include <linux/delay.h>
7 #include <linux/pci.h>
8 #include <linux/pci-doe.h>
9 #include <linux/aer.h>
10 #include <cxlpci.h>
11 #include <cxlmem.h>
12 #include <cxl.h>
13 #include "core.h"
14 #include "trace.h"
15 
16 /**
17  * DOC: cxl core pci
18  *
19  * Compute Express Link protocols are layered on top of PCIe. CXL core provides
20  * a set of helpers for CXL interactions which occur via PCIe.
21  */
22 
23 static unsigned short media_ready_timeout = 60;
24 module_param(media_ready_timeout, ushort, 0644);
25 MODULE_PARM_DESC(media_ready_timeout, "seconds to wait for media ready");
26 
27 struct cxl_walk_context {
28 	struct pci_bus *bus;
29 	struct cxl_port *port;
30 	int type;
31 	int error;
32 	int count;
33 };
34 
35 static int match_add_dports(struct pci_dev *pdev, void *data)
36 {
37 	struct cxl_walk_context *ctx = data;
38 	struct cxl_port *port = ctx->port;
39 	int type = pci_pcie_type(pdev);
40 	struct cxl_register_map map;
41 	struct cxl_dport *dport;
42 	u32 lnkcap, port_num;
43 	int rc;
44 
45 	if (pdev->bus != ctx->bus)
46 		return 0;
47 	if (!pci_is_pcie(pdev))
48 		return 0;
49 	if (type != ctx->type)
50 		return 0;
51 	if (pci_read_config_dword(pdev, pci_pcie_cap(pdev) + PCI_EXP_LNKCAP,
52 				  &lnkcap))
53 		return 0;
54 
55 	rc = cxl_find_regblock(pdev, CXL_REGLOC_RBI_COMPONENT, &map);
56 	if (rc)
57 		dev_dbg(&port->dev, "failed to find component registers\n");
58 
59 	port_num = FIELD_GET(PCI_EXP_LNKCAP_PN, lnkcap);
60 	dport = devm_cxl_add_dport(port, &pdev->dev, port_num, map.resource);
61 	if (IS_ERR(dport)) {
62 		ctx->error = PTR_ERR(dport);
63 		return PTR_ERR(dport);
64 	}
65 	ctx->count++;
66 
67 	return 0;
68 }
69 
70 /**
71  * devm_cxl_port_enumerate_dports - enumerate downstream ports of the upstream port
72  * @port: cxl_port whose ->uport_dev is the upstream of dports to be enumerated
73  *
74  * Returns a positive number of dports enumerated or a negative error
75  * code.
76  */
77 int devm_cxl_port_enumerate_dports(struct cxl_port *port)
78 {
79 	struct pci_bus *bus = cxl_port_to_pci_bus(port);
80 	struct cxl_walk_context ctx;
81 	int type;
82 
83 	if (!bus)
84 		return -ENXIO;
85 
86 	if (pci_is_root_bus(bus))
87 		type = PCI_EXP_TYPE_ROOT_PORT;
88 	else
89 		type = PCI_EXP_TYPE_DOWNSTREAM;
90 
91 	ctx = (struct cxl_walk_context) {
92 		.port = port,
93 		.bus = bus,
94 		.type = type,
95 	};
96 	pci_walk_bus(bus, match_add_dports, &ctx);
97 
98 	if (ctx.count == 0)
99 		return -ENODEV;
100 	if (ctx.error)
101 		return ctx.error;
102 	return ctx.count;
103 }
104 EXPORT_SYMBOL_NS_GPL(devm_cxl_port_enumerate_dports, CXL);
105 
106 static int cxl_dvsec_mem_range_valid(struct cxl_dev_state *cxlds, int id)
107 {
108 	struct pci_dev *pdev = to_pci_dev(cxlds->dev);
109 	int d = cxlds->cxl_dvsec;
110 	bool valid = false;
111 	int rc, i;
112 	u32 temp;
113 
114 	if (id > CXL_DVSEC_RANGE_MAX)
115 		return -EINVAL;
116 
117 	/* Check MEM INFO VALID bit first, give up after 1s */
118 	i = 1;
119 	do {
120 		rc = pci_read_config_dword(pdev,
121 					   d + CXL_DVSEC_RANGE_SIZE_LOW(id),
122 					   &temp);
123 		if (rc)
124 			return rc;
125 
126 		valid = FIELD_GET(CXL_DVSEC_MEM_INFO_VALID, temp);
127 		if (valid)
128 			break;
129 		msleep(1000);
130 	} while (i--);
131 
132 	if (!valid) {
133 		dev_err(&pdev->dev,
134 			"Timeout awaiting memory range %d valid after 1s.\n",
135 			id);
136 		return -ETIMEDOUT;
137 	}
138 
139 	return 0;
140 }
141 
142 static int cxl_dvsec_mem_range_active(struct cxl_dev_state *cxlds, int id)
143 {
144 	struct pci_dev *pdev = to_pci_dev(cxlds->dev);
145 	int d = cxlds->cxl_dvsec;
146 	bool active = false;
147 	int rc, i;
148 	u32 temp;
149 
150 	if (id > CXL_DVSEC_RANGE_MAX)
151 		return -EINVAL;
152 
153 	/* Check MEM ACTIVE bit, up to 60s timeout by default */
154 	for (i = media_ready_timeout; i; i--) {
155 		rc = pci_read_config_dword(
156 			pdev, d + CXL_DVSEC_RANGE_SIZE_LOW(id), &temp);
157 		if (rc)
158 			return rc;
159 
160 		active = FIELD_GET(CXL_DVSEC_MEM_ACTIVE, temp);
161 		if (active)
162 			break;
163 		msleep(1000);
164 	}
165 
166 	if (!active) {
167 		dev_err(&pdev->dev,
168 			"timeout awaiting memory active after %d seconds\n",
169 			media_ready_timeout);
170 		return -ETIMEDOUT;
171 	}
172 
173 	return 0;
174 }
175 
176 /*
177  * Wait up to @media_ready_timeout for the device to report memory
178  * active.
179  */
180 int cxl_await_media_ready(struct cxl_dev_state *cxlds)
181 {
182 	struct pci_dev *pdev = to_pci_dev(cxlds->dev);
183 	int d = cxlds->cxl_dvsec;
184 	int rc, i, hdm_count;
185 	u64 md_status;
186 	u16 cap;
187 
188 	rc = pci_read_config_word(pdev,
189 				  d + CXL_DVSEC_CAP_OFFSET, &cap);
190 	if (rc)
191 		return rc;
192 
193 	hdm_count = FIELD_GET(CXL_DVSEC_HDM_COUNT_MASK, cap);
194 	for (i = 0; i < hdm_count; i++) {
195 		rc = cxl_dvsec_mem_range_valid(cxlds, i);
196 		if (rc)
197 			return rc;
198 	}
199 
200 	for (i = 0; i < hdm_count; i++) {
201 		rc = cxl_dvsec_mem_range_active(cxlds, i);
202 		if (rc)
203 			return rc;
204 	}
205 
206 	md_status = readq(cxlds->regs.memdev + CXLMDEV_STATUS_OFFSET);
207 	if (!CXLMDEV_READY(md_status))
208 		return -EIO;
209 
210 	return 0;
211 }
212 EXPORT_SYMBOL_NS_GPL(cxl_await_media_ready, CXL);
213 
214 static int wait_for_valid(struct pci_dev *pdev, int d)
215 {
216 	u32 val;
217 	int rc;
218 
219 	/*
220 	 * Memory_Info_Valid: When set, indicates that the CXL Range 1 Size high
221 	 * and Size Low registers are valid. Must be set within 1 second of
222 	 * deassertion of reset to CXL device. Likely it is already set by the
223 	 * time this runs, but otherwise give a 1.5 second timeout in case of
224 	 * clock skew.
225 	 */
226 	rc = pci_read_config_dword(pdev, d + CXL_DVSEC_RANGE_SIZE_LOW(0), &val);
227 	if (rc)
228 		return rc;
229 
230 	if (val & CXL_DVSEC_MEM_INFO_VALID)
231 		return 0;
232 
233 	msleep(1500);
234 
235 	rc = pci_read_config_dword(pdev, d + CXL_DVSEC_RANGE_SIZE_LOW(0), &val);
236 	if (rc)
237 		return rc;
238 
239 	if (val & CXL_DVSEC_MEM_INFO_VALID)
240 		return 0;
241 
242 	return -ETIMEDOUT;
243 }
244 
245 static int cxl_set_mem_enable(struct cxl_dev_state *cxlds, u16 val)
246 {
247 	struct pci_dev *pdev = to_pci_dev(cxlds->dev);
248 	int d = cxlds->cxl_dvsec;
249 	u16 ctrl;
250 	int rc;
251 
252 	rc = pci_read_config_word(pdev, d + CXL_DVSEC_CTRL_OFFSET, &ctrl);
253 	if (rc < 0)
254 		return rc;
255 
256 	if ((ctrl & CXL_DVSEC_MEM_ENABLE) == val)
257 		return 1;
258 	ctrl &= ~CXL_DVSEC_MEM_ENABLE;
259 	ctrl |= val;
260 
261 	rc = pci_write_config_word(pdev, d + CXL_DVSEC_CTRL_OFFSET, ctrl);
262 	if (rc < 0)
263 		return rc;
264 
265 	return 0;
266 }
267 
268 static void clear_mem_enable(void *cxlds)
269 {
270 	cxl_set_mem_enable(cxlds, 0);
271 }
272 
273 static int devm_cxl_enable_mem(struct device *host, struct cxl_dev_state *cxlds)
274 {
275 	int rc;
276 
277 	rc = cxl_set_mem_enable(cxlds, CXL_DVSEC_MEM_ENABLE);
278 	if (rc < 0)
279 		return rc;
280 	if (rc > 0)
281 		return 0;
282 	return devm_add_action_or_reset(host, clear_mem_enable, cxlds);
283 }
284 
285 /* require dvsec ranges to be covered by a locked platform window */
286 static int dvsec_range_allowed(struct device *dev, void *arg)
287 {
288 	struct range *dev_range = arg;
289 	struct cxl_decoder *cxld;
290 
291 	if (!is_root_decoder(dev))
292 		return 0;
293 
294 	cxld = to_cxl_decoder(dev);
295 
296 	if (!(cxld->flags & CXL_DECODER_F_RAM))
297 		return 0;
298 
299 	return range_contains(&cxld->hpa_range, dev_range);
300 }
301 
302 static void disable_hdm(void *_cxlhdm)
303 {
304 	u32 global_ctrl;
305 	struct cxl_hdm *cxlhdm = _cxlhdm;
306 	void __iomem *hdm = cxlhdm->regs.hdm_decoder;
307 
308 	global_ctrl = readl(hdm + CXL_HDM_DECODER_CTRL_OFFSET);
309 	writel(global_ctrl & ~CXL_HDM_DECODER_ENABLE,
310 	       hdm + CXL_HDM_DECODER_CTRL_OFFSET);
311 }
312 
313 static int devm_cxl_enable_hdm(struct device *host, struct cxl_hdm *cxlhdm)
314 {
315 	void __iomem *hdm = cxlhdm->regs.hdm_decoder;
316 	u32 global_ctrl;
317 
318 	global_ctrl = readl(hdm + CXL_HDM_DECODER_CTRL_OFFSET);
319 	writel(global_ctrl | CXL_HDM_DECODER_ENABLE,
320 	       hdm + CXL_HDM_DECODER_CTRL_OFFSET);
321 
322 	return devm_add_action_or_reset(host, disable_hdm, cxlhdm);
323 }
324 
325 int cxl_dvsec_rr_decode(struct device *dev, int d,
326 			struct cxl_endpoint_dvsec_info *info)
327 {
328 	struct pci_dev *pdev = to_pci_dev(dev);
329 	int hdm_count, rc, i, ranges = 0;
330 	u16 cap, ctrl;
331 
332 	if (!d) {
333 		dev_dbg(dev, "No DVSEC Capability\n");
334 		return -ENXIO;
335 	}
336 
337 	rc = pci_read_config_word(pdev, d + CXL_DVSEC_CAP_OFFSET, &cap);
338 	if (rc)
339 		return rc;
340 
341 	rc = pci_read_config_word(pdev, d + CXL_DVSEC_CTRL_OFFSET, &ctrl);
342 	if (rc)
343 		return rc;
344 
345 	if (!(cap & CXL_DVSEC_MEM_CAPABLE)) {
346 		dev_dbg(dev, "Not MEM Capable\n");
347 		return -ENXIO;
348 	}
349 
350 	/*
351 	 * It is not allowed by spec for MEM.capable to be set and have 0 legacy
352 	 * HDM decoders (values > 2 are also undefined as of CXL 2.0). As this
353 	 * driver is for a spec defined class code which must be CXL.mem
354 	 * capable, there is no point in continuing to enable CXL.mem.
355 	 */
356 	hdm_count = FIELD_GET(CXL_DVSEC_HDM_COUNT_MASK, cap);
357 	if (!hdm_count || hdm_count > 2)
358 		return -EINVAL;
359 
360 	rc = wait_for_valid(pdev, d);
361 	if (rc) {
362 		dev_dbg(dev, "Failure awaiting MEM_INFO_VALID (%d)\n", rc);
363 		return rc;
364 	}
365 
366 	/*
367 	 * The current DVSEC values are moot if the memory capability is
368 	 * disabled, and they will remain moot after the HDM Decoder
369 	 * capability is enabled.
370 	 */
371 	info->mem_enabled = FIELD_GET(CXL_DVSEC_MEM_ENABLE, ctrl);
372 	if (!info->mem_enabled)
373 		return 0;
374 
375 	for (i = 0; i < hdm_count; i++) {
376 		u64 base, size;
377 		u32 temp;
378 
379 		rc = pci_read_config_dword(
380 			pdev, d + CXL_DVSEC_RANGE_SIZE_HIGH(i), &temp);
381 		if (rc)
382 			return rc;
383 
384 		size = (u64)temp << 32;
385 
386 		rc = pci_read_config_dword(
387 			pdev, d + CXL_DVSEC_RANGE_SIZE_LOW(i), &temp);
388 		if (rc)
389 			return rc;
390 
391 		size |= temp & CXL_DVSEC_MEM_SIZE_LOW_MASK;
392 		if (!size) {
393 			info->dvsec_range[i] = (struct range) {
394 				.start = 0,
395 				.end = CXL_RESOURCE_NONE,
396 			};
397 			continue;
398 		}
399 
400 		rc = pci_read_config_dword(
401 			pdev, d + CXL_DVSEC_RANGE_BASE_HIGH(i), &temp);
402 		if (rc)
403 			return rc;
404 
405 		base = (u64)temp << 32;
406 
407 		rc = pci_read_config_dword(
408 			pdev, d + CXL_DVSEC_RANGE_BASE_LOW(i), &temp);
409 		if (rc)
410 			return rc;
411 
412 		base |= temp & CXL_DVSEC_MEM_BASE_LOW_MASK;
413 
414 		info->dvsec_range[i] = (struct range) {
415 			.start = base,
416 			.end = base + size - 1
417 		};
418 
419 		ranges++;
420 	}
421 
422 	info->ranges = ranges;
423 
424 	return 0;
425 }
426 EXPORT_SYMBOL_NS_GPL(cxl_dvsec_rr_decode, CXL);
427 
428 /**
429  * cxl_hdm_decode_init() - Setup HDM decoding for the endpoint
430  * @cxlds: Device state
431  * @cxlhdm: Mapped HDM decoder Capability
432  * @info: Cached DVSEC range registers info
433  *
434  * Try to enable the endpoint's HDM Decoder Capability
435  */
436 int cxl_hdm_decode_init(struct cxl_dev_state *cxlds, struct cxl_hdm *cxlhdm,
437 			struct cxl_endpoint_dvsec_info *info)
438 {
439 	void __iomem *hdm = cxlhdm->regs.hdm_decoder;
440 	struct cxl_port *port = cxlhdm->port;
441 	struct device *dev = cxlds->dev;
442 	struct cxl_port *root;
443 	int i, rc, allowed;
444 	u32 global_ctrl = 0;
445 
446 	if (hdm)
447 		global_ctrl = readl(hdm + CXL_HDM_DECODER_CTRL_OFFSET);
448 
449 	/*
450 	 * If the HDM Decoder Capability is already enabled then assume
451 	 * that some other agent like platform firmware set it up.
452 	 */
453 	if (global_ctrl & CXL_HDM_DECODER_ENABLE || (!hdm && info->mem_enabled))
454 		return devm_cxl_enable_mem(&port->dev, cxlds);
455 	else if (!hdm)
456 		return -ENODEV;
457 
458 	root = to_cxl_port(port->dev.parent);
459 	while (!is_cxl_root(root) && is_cxl_port(root->dev.parent))
460 		root = to_cxl_port(root->dev.parent);
461 	if (!is_cxl_root(root)) {
462 		dev_err(dev, "Failed to acquire root port for HDM enable\n");
463 		return -ENODEV;
464 	}
465 
466 	for (i = 0, allowed = 0; info->mem_enabled && i < info->ranges; i++) {
467 		struct device *cxld_dev;
468 
469 		cxld_dev = device_find_child(&root->dev, &info->dvsec_range[i],
470 					     dvsec_range_allowed);
471 		if (!cxld_dev) {
472 			dev_dbg(dev, "DVSEC Range%d denied by platform\n", i);
473 			continue;
474 		}
475 		dev_dbg(dev, "DVSEC Range%d allowed by platform\n", i);
476 		put_device(cxld_dev);
477 		allowed++;
478 	}
479 
480 	if (!allowed && info->mem_enabled) {
481 		dev_err(dev, "Range register decodes outside platform defined CXL ranges.\n");
482 		return -ENXIO;
483 	}
484 
485 	/*
486 	 * Per CXL 2.0 Section 8.1.3.8.3 and 8.1.3.8.4 DVSEC CXL Range 1 Base
487 	 * [High,Low] when HDM operation is enabled the range register values
488 	 * are ignored by the device, but the spec also recommends matching the
489 	 * DVSEC Range 1,2 to HDM Decoder Range 0,1. So, non-zero info->ranges
490 	 * are expected even though Linux does not require or maintain that
491 	 * match. If at least one DVSEC range is enabled and allowed, skip HDM
492 	 * Decoder Capability Enable.
493 	 */
494 	if (info->mem_enabled)
495 		return 0;
496 
497 	rc = devm_cxl_enable_hdm(&port->dev, cxlhdm);
498 	if (rc)
499 		return rc;
500 
501 	return devm_cxl_enable_mem(&port->dev, cxlds);
502 }
503 EXPORT_SYMBOL_NS_GPL(cxl_hdm_decode_init, CXL);
504 
505 #define CXL_DOE_TABLE_ACCESS_REQ_CODE		0x000000ff
506 #define   CXL_DOE_TABLE_ACCESS_REQ_CODE_READ	0
507 #define CXL_DOE_TABLE_ACCESS_TABLE_TYPE		0x0000ff00
508 #define   CXL_DOE_TABLE_ACCESS_TABLE_TYPE_CDATA	0
509 #define CXL_DOE_TABLE_ACCESS_ENTRY_HANDLE	0xffff0000
510 #define CXL_DOE_TABLE_ACCESS_LAST_ENTRY		0xffff
511 #define CXL_DOE_PROTOCOL_TABLE_ACCESS 2
512 
513 #define CDAT_DOE_REQ(entry_handle) cpu_to_le32				\
514 	(FIELD_PREP(CXL_DOE_TABLE_ACCESS_REQ_CODE,			\
515 		    CXL_DOE_TABLE_ACCESS_REQ_CODE_READ) |		\
516 	 FIELD_PREP(CXL_DOE_TABLE_ACCESS_TABLE_TYPE,			\
517 		    CXL_DOE_TABLE_ACCESS_TABLE_TYPE_CDATA) |		\
518 	 FIELD_PREP(CXL_DOE_TABLE_ACCESS_ENTRY_HANDLE, (entry_handle)))
519 
520 static int cxl_cdat_get_length(struct device *dev,
521 			       struct pci_doe_mb *doe_mb,
522 			       size_t *length)
523 {
524 	__le32 request = CDAT_DOE_REQ(0);
525 	__le32 response[2];
526 	int rc;
527 
528 	rc = pci_doe(doe_mb, PCI_VENDOR_ID_CXL,
529 		     CXL_DOE_PROTOCOL_TABLE_ACCESS,
530 		     &request, sizeof(request),
531 		     &response, sizeof(response));
532 	if (rc < 0) {
533 		dev_err(dev, "DOE failed: %d", rc);
534 		return rc;
535 	}
536 	if (rc < sizeof(response))
537 		return -EIO;
538 
539 	*length = le32_to_cpu(response[1]);
540 	dev_dbg(dev, "CDAT length %zu\n", *length);
541 
542 	return 0;
543 }
544 
545 static int cxl_cdat_read_table(struct device *dev,
546 			       struct pci_doe_mb *doe_mb,
547 			       struct cdat_doe_rsp *rsp, size_t *length)
548 {
549 	size_t received, remaining = *length;
550 	unsigned int entry_handle = 0;
551 	union cdat_data *data;
552 	__le32 saved_dw = 0;
553 
554 	do {
555 		__le32 request = CDAT_DOE_REQ(entry_handle);
556 		int rc;
557 
558 		rc = pci_doe(doe_mb, PCI_VENDOR_ID_CXL,
559 			     CXL_DOE_PROTOCOL_TABLE_ACCESS,
560 			     &request, sizeof(request),
561 			     rsp, sizeof(*rsp) + remaining);
562 		if (rc < 0) {
563 			dev_err(dev, "DOE failed: %d", rc);
564 			return rc;
565 		}
566 
567 		if (rc < sizeof(*rsp))
568 			return -EIO;
569 
570 		data = (union cdat_data *)rsp->data;
571 		received = rc - sizeof(*rsp);
572 
573 		if (entry_handle == 0) {
574 			if (received != sizeof(data->header))
575 				return -EIO;
576 		} else {
577 			if (received < sizeof(data->entry) ||
578 			    received != le16_to_cpu(data->entry.length))
579 				return -EIO;
580 		}
581 
582 		/* Get the CXL table access header entry handle */
583 		entry_handle = FIELD_GET(CXL_DOE_TABLE_ACCESS_ENTRY_HANDLE,
584 					 le32_to_cpu(rsp->doe_header));
585 
586 		/*
587 		 * Table Access Response Header overwrote the last DW of
588 		 * previous entry, so restore that DW
589 		 */
590 		rsp->doe_header = saved_dw;
591 		remaining -= received;
592 		rsp = (void *)rsp + received;
593 		saved_dw = rsp->doe_header;
594 	} while (entry_handle != CXL_DOE_TABLE_ACCESS_LAST_ENTRY);
595 
596 	/* Length in CDAT header may exceed concatenation of CDAT entries */
597 	*length -= remaining;
598 
599 	return 0;
600 }
601 
602 static unsigned char cdat_checksum(void *buf, size_t size)
603 {
604 	unsigned char sum, *data = buf;
605 	size_t i;
606 
607 	for (sum = 0, i = 0; i < size; i++)
608 		sum += data[i];
609 	return sum;
610 }
611 
612 /**
613  * read_cdat_data - Read the CDAT data on this port
614  * @port: Port to read data from
615  *
616  * This call will sleep waiting for responses from the DOE mailbox.
617  */
618 void read_cdat_data(struct cxl_port *port)
619 {
620 	struct device *uport = port->uport_dev;
621 	struct device *dev = &port->dev;
622 	struct pci_doe_mb *doe_mb;
623 	struct pci_dev *pdev = NULL;
624 	struct cxl_memdev *cxlmd;
625 	struct cdat_doe_rsp *buf;
626 	size_t table_length, length;
627 	int rc;
628 
629 	if (is_cxl_memdev(uport)) {
630 		struct device *host;
631 
632 		cxlmd = to_cxl_memdev(uport);
633 		host = cxlmd->dev.parent;
634 		if (dev_is_pci(host))
635 			pdev = to_pci_dev(host);
636 	} else if (dev_is_pci(uport)) {
637 		pdev = to_pci_dev(uport);
638 	}
639 
640 	if (!pdev)
641 		return;
642 
643 	doe_mb = pci_find_doe_mailbox(pdev, PCI_VENDOR_ID_CXL,
644 				      CXL_DOE_PROTOCOL_TABLE_ACCESS);
645 	if (!doe_mb) {
646 		dev_dbg(dev, "No CDAT mailbox\n");
647 		return;
648 	}
649 
650 	port->cdat_available = true;
651 
652 	if (cxl_cdat_get_length(dev, doe_mb, &length)) {
653 		dev_dbg(dev, "No CDAT length\n");
654 		return;
655 	}
656 
657 	/*
658 	 * The begin of the CDAT buffer needs space for additional 4
659 	 * bytes for the DOE header. Table data starts afterwards.
660 	 */
661 	buf = devm_kzalloc(dev, sizeof(*buf) + length, GFP_KERNEL);
662 	if (!buf)
663 		goto err;
664 
665 	table_length = length;
666 
667 	rc = cxl_cdat_read_table(dev, doe_mb, buf, &length);
668 	if (rc)
669 		goto err;
670 
671 	if (table_length != length)
672 		dev_warn(dev, "Malformed CDAT table length (%zu:%zu), discarding trailing data\n",
673 			table_length, length);
674 
675 	if (cdat_checksum(buf->data, length))
676 		goto err;
677 
678 	port->cdat.table = buf->data;
679 	port->cdat.length = length;
680 
681 	return;
682 err:
683 	/* Don't leave table data allocated on error */
684 	devm_kfree(dev, buf);
685 	dev_err(dev, "Failed to read/validate CDAT.\n");
686 }
687 EXPORT_SYMBOL_NS_GPL(read_cdat_data, CXL);
688 
689 static void __cxl_handle_cor_ras(struct cxl_dev_state *cxlds,
690 				 void __iomem *ras_base)
691 {
692 	void __iomem *addr;
693 	u32 status;
694 
695 	if (!ras_base)
696 		return;
697 
698 	addr = ras_base + CXL_RAS_CORRECTABLE_STATUS_OFFSET;
699 	status = readl(addr);
700 	if (status & CXL_RAS_CORRECTABLE_STATUS_MASK) {
701 		writel(status & CXL_RAS_CORRECTABLE_STATUS_MASK, addr);
702 		trace_cxl_aer_correctable_error(cxlds->cxlmd, status);
703 	}
704 }
705 
706 static void cxl_handle_endpoint_cor_ras(struct cxl_dev_state *cxlds)
707 {
708 	return __cxl_handle_cor_ras(cxlds, cxlds->regs.ras);
709 }
710 
711 /* CXL spec rev3.0 8.2.4.16.1 */
712 static void header_log_copy(void __iomem *ras_base, u32 *log)
713 {
714 	void __iomem *addr;
715 	u32 *log_addr;
716 	int i, log_u32_size = CXL_HEADERLOG_SIZE / sizeof(u32);
717 
718 	addr = ras_base + CXL_RAS_HEADER_LOG_OFFSET;
719 	log_addr = log;
720 
721 	for (i = 0; i < log_u32_size; i++) {
722 		*log_addr = readl(addr);
723 		log_addr++;
724 		addr += sizeof(u32);
725 	}
726 }
727 
728 /*
729  * Log the state of the RAS status registers and prepare them to log the
730  * next error status. Return 1 if reset needed.
731  */
732 static bool __cxl_handle_ras(struct cxl_dev_state *cxlds,
733 				  void __iomem *ras_base)
734 {
735 	u32 hl[CXL_HEADERLOG_SIZE_U32];
736 	void __iomem *addr;
737 	u32 status;
738 	u32 fe;
739 
740 	if (!ras_base)
741 		return false;
742 
743 	addr = ras_base + CXL_RAS_UNCORRECTABLE_STATUS_OFFSET;
744 	status = readl(addr);
745 	if (!(status & CXL_RAS_UNCORRECTABLE_STATUS_MASK))
746 		return false;
747 
748 	/* If multiple errors, log header points to first error from ctrl reg */
749 	if (hweight32(status) > 1) {
750 		void __iomem *rcc_addr =
751 			ras_base + CXL_RAS_CAP_CONTROL_OFFSET;
752 
753 		fe = BIT(FIELD_GET(CXL_RAS_CAP_CONTROL_FE_MASK,
754 				   readl(rcc_addr)));
755 	} else {
756 		fe = status;
757 	}
758 
759 	header_log_copy(ras_base, hl);
760 	trace_cxl_aer_uncorrectable_error(cxlds->cxlmd, status, fe, hl);
761 	writel(status & CXL_RAS_UNCORRECTABLE_STATUS_MASK, addr);
762 
763 	return true;
764 }
765 
766 static bool cxl_handle_endpoint_ras(struct cxl_dev_state *cxlds)
767 {
768 	return __cxl_handle_ras(cxlds, cxlds->regs.ras);
769 }
770 
771 #ifdef CONFIG_PCIEAER_CXL
772 
773 static void cxl_dport_map_rch_aer(struct cxl_dport *dport)
774 {
775 	struct cxl_rcrb_info *ri = &dport->rcrb;
776 	void __iomem *dport_aer = NULL;
777 	resource_size_t aer_phys;
778 	struct device *host;
779 
780 	if (dport->rch && ri->aer_cap) {
781 		host = dport->reg_map.host;
782 		aer_phys = ri->aer_cap + ri->base;
783 		dport_aer = devm_cxl_iomap_block(host, aer_phys,
784 				sizeof(struct aer_capability_regs));
785 	}
786 
787 	dport->regs.dport_aer = dport_aer;
788 }
789 
790 static void cxl_dport_map_regs(struct cxl_dport *dport)
791 {
792 	struct cxl_register_map *map = &dport->reg_map;
793 	struct device *dev = dport->dport_dev;
794 
795 	if (!map->component_map.ras.valid)
796 		dev_dbg(dev, "RAS registers not found\n");
797 	else if (cxl_map_component_regs(map, &dport->regs.component,
798 					BIT(CXL_CM_CAP_CAP_ID_RAS)))
799 		dev_dbg(dev, "Failed to map RAS capability.\n");
800 
801 	if (dport->rch)
802 		cxl_dport_map_rch_aer(dport);
803 }
804 
805 static void cxl_disable_rch_root_ints(struct cxl_dport *dport)
806 {
807 	void __iomem *aer_base = dport->regs.dport_aer;
808 	struct pci_host_bridge *bridge;
809 	u32 aer_cmd_mask, aer_cmd;
810 
811 	if (!aer_base)
812 		return;
813 
814 	bridge = to_pci_host_bridge(dport->dport_dev);
815 
816 	/*
817 	 * Disable RCH root port command interrupts.
818 	 * CXL 3.0 12.2.1.1 - RCH Downstream Port-detected Errors
819 	 *
820 	 * This sequence may not be necessary. CXL spec states disabling
821 	 * the root cmd register's interrupts is required. But, PCI spec
822 	 * shows these are disabled by default on reset.
823 	 */
824 	if (bridge->native_aer) {
825 		aer_cmd_mask = (PCI_ERR_ROOT_CMD_COR_EN |
826 				PCI_ERR_ROOT_CMD_NONFATAL_EN |
827 				PCI_ERR_ROOT_CMD_FATAL_EN);
828 		aer_cmd = readl(aer_base + PCI_ERR_ROOT_COMMAND);
829 		aer_cmd &= ~aer_cmd_mask;
830 		writel(aer_cmd, aer_base + PCI_ERR_ROOT_COMMAND);
831 	}
832 }
833 
834 void cxl_setup_parent_dport(struct device *host, struct cxl_dport *dport)
835 {
836 	struct device *dport_dev = dport->dport_dev;
837 	struct pci_host_bridge *host_bridge;
838 
839 	host_bridge = to_pci_host_bridge(dport_dev);
840 	if (host_bridge->native_aer)
841 		dport->rcrb.aer_cap = cxl_rcrb_to_aer(dport_dev, dport->rcrb.base);
842 
843 	dport->reg_map.host = host;
844 	cxl_dport_map_regs(dport);
845 
846 	if (dport->rch)
847 		cxl_disable_rch_root_ints(dport);
848 }
849 EXPORT_SYMBOL_NS_GPL(cxl_setup_parent_dport, CXL);
850 
851 static void cxl_handle_rdport_cor_ras(struct cxl_dev_state *cxlds,
852 					  struct cxl_dport *dport)
853 {
854 	return __cxl_handle_cor_ras(cxlds, dport->regs.ras);
855 }
856 
857 static bool cxl_handle_rdport_ras(struct cxl_dev_state *cxlds,
858 				       struct cxl_dport *dport)
859 {
860 	return __cxl_handle_ras(cxlds, dport->regs.ras);
861 }
862 
863 /*
864  * Copy the AER capability registers using 32 bit read accesses.
865  * This is necessary because RCRB AER capability is MMIO mapped. Clear the
866  * status after copying.
867  *
868  * @aer_base: base address of AER capability block in RCRB
869  * @aer_regs: destination for copying AER capability
870  */
871 static bool cxl_rch_get_aer_info(void __iomem *aer_base,
872 				 struct aer_capability_regs *aer_regs)
873 {
874 	int read_cnt = sizeof(struct aer_capability_regs) / sizeof(u32);
875 	u32 *aer_regs_buf = (u32 *)aer_regs;
876 	int n;
877 
878 	if (!aer_base)
879 		return false;
880 
881 	/* Use readl() to guarantee 32-bit accesses */
882 	for (n = 0; n < read_cnt; n++)
883 		aer_regs_buf[n] = readl(aer_base + n * sizeof(u32));
884 
885 	writel(aer_regs->uncor_status, aer_base + PCI_ERR_UNCOR_STATUS);
886 	writel(aer_regs->cor_status, aer_base + PCI_ERR_COR_STATUS);
887 
888 	return true;
889 }
890 
891 /* Get AER severity. Return false if there is no error. */
892 static bool cxl_rch_get_aer_severity(struct aer_capability_regs *aer_regs,
893 				     int *severity)
894 {
895 	if (aer_regs->uncor_status & ~aer_regs->uncor_mask) {
896 		if (aer_regs->uncor_status & PCI_ERR_ROOT_FATAL_RCV)
897 			*severity = AER_FATAL;
898 		else
899 			*severity = AER_NONFATAL;
900 		return true;
901 	}
902 
903 	if (aer_regs->cor_status & ~aer_regs->cor_mask) {
904 		*severity = AER_CORRECTABLE;
905 		return true;
906 	}
907 
908 	return false;
909 }
910 
911 static void cxl_handle_rdport_errors(struct cxl_dev_state *cxlds)
912 {
913 	struct pci_dev *pdev = to_pci_dev(cxlds->dev);
914 	struct aer_capability_regs aer_regs;
915 	struct cxl_dport *dport;
916 	struct cxl_port *port;
917 	int severity;
918 
919 	port = cxl_pci_find_port(pdev, &dport);
920 	if (!port)
921 		return;
922 
923 	put_device(&port->dev);
924 
925 	if (!cxl_rch_get_aer_info(dport->regs.dport_aer, &aer_regs))
926 		return;
927 
928 	if (!cxl_rch_get_aer_severity(&aer_regs, &severity))
929 		return;
930 
931 	pci_print_aer(pdev, severity, &aer_regs);
932 
933 	if (severity == AER_CORRECTABLE)
934 		cxl_handle_rdport_cor_ras(cxlds, dport);
935 	else
936 		cxl_handle_rdport_ras(cxlds, dport);
937 }
938 
939 #else
940 static void cxl_handle_rdport_errors(struct cxl_dev_state *cxlds) { }
941 #endif
942 
943 void cxl_cor_error_detected(struct pci_dev *pdev)
944 {
945 	struct cxl_dev_state *cxlds = pci_get_drvdata(pdev);
946 	struct device *dev = &cxlds->cxlmd->dev;
947 
948 	scoped_guard(device, dev) {
949 		if (!dev->driver) {
950 			dev_warn(&pdev->dev,
951 				 "%s: memdev disabled, abort error handling\n",
952 				 dev_name(dev));
953 			return;
954 		}
955 
956 		if (cxlds->rcd)
957 			cxl_handle_rdport_errors(cxlds);
958 
959 		cxl_handle_endpoint_cor_ras(cxlds);
960 	}
961 }
962 EXPORT_SYMBOL_NS_GPL(cxl_cor_error_detected, CXL);
963 
964 pci_ers_result_t cxl_error_detected(struct pci_dev *pdev,
965 				    pci_channel_state_t state)
966 {
967 	struct cxl_dev_state *cxlds = pci_get_drvdata(pdev);
968 	struct cxl_memdev *cxlmd = cxlds->cxlmd;
969 	struct device *dev = &cxlmd->dev;
970 	bool ue;
971 
972 	scoped_guard(device, dev) {
973 		if (!dev->driver) {
974 			dev_warn(&pdev->dev,
975 				 "%s: memdev disabled, abort error handling\n",
976 				 dev_name(dev));
977 			return PCI_ERS_RESULT_DISCONNECT;
978 		}
979 
980 		if (cxlds->rcd)
981 			cxl_handle_rdport_errors(cxlds);
982 		/*
983 		 * A frozen channel indicates an impending reset which is fatal to
984 		 * CXL.mem operation, and will likely crash the system. On the off
985 		 * chance the situation is recoverable dump the status of the RAS
986 		 * capability registers and bounce the active state of the memdev.
987 		 */
988 		ue = cxl_handle_endpoint_ras(cxlds);
989 	}
990 
991 
992 	switch (state) {
993 	case pci_channel_io_normal:
994 		if (ue) {
995 			device_release_driver(dev);
996 			return PCI_ERS_RESULT_NEED_RESET;
997 		}
998 		return PCI_ERS_RESULT_CAN_RECOVER;
999 	case pci_channel_io_frozen:
1000 		dev_warn(&pdev->dev,
1001 			 "%s: frozen state error detected, disable CXL.mem\n",
1002 			 dev_name(dev));
1003 		device_release_driver(dev);
1004 		return PCI_ERS_RESULT_NEED_RESET;
1005 	case pci_channel_io_perm_failure:
1006 		dev_warn(&pdev->dev,
1007 			 "failure state error detected, request disconnect\n");
1008 		return PCI_ERS_RESULT_DISCONNECT;
1009 	}
1010 	return PCI_ERS_RESULT_NEED_RESET;
1011 }
1012 EXPORT_SYMBOL_NS_GPL(cxl_error_detected, CXL);
1013 
1014 static int cxl_flit_size(struct pci_dev *pdev)
1015 {
1016 	if (cxl_pci_flit_256(pdev))
1017 		return 256;
1018 
1019 	return 68;
1020 }
1021 
1022 /**
1023  * cxl_pci_get_latency - calculate the link latency for the PCIe link
1024  * @pdev: PCI device
1025  *
1026  * return: calculated latency or 0 for no latency
1027  *
1028  * CXL Memory Device SW Guide v1.0 2.11.4 Link latency calculation
1029  * Link latency = LinkPropagationLatency + FlitLatency + RetimerLatency
1030  * LinkProgationLatency is negligible, so 0 will be used
1031  * RetimerLatency is assumed to be negligible and 0 will be used
1032  * FlitLatency = FlitSize / LinkBandwidth
1033  * FlitSize is defined by spec. CXL rev3.0 4.2.1.
1034  * 68B flit is used up to 32GT/s. >32GT/s, 256B flit size is used.
1035  * The FlitLatency is converted to picoseconds.
1036  */
1037 long cxl_pci_get_latency(struct pci_dev *pdev)
1038 {
1039 	long bw;
1040 
1041 	bw = pcie_link_speed_mbps(pdev);
1042 	if (bw < 0)
1043 		return 0;
1044 	bw /= BITS_PER_BYTE;
1045 
1046 	return cxl_flit_size(pdev) * MEGA / bw;
1047 }
1048 
1049 static int __cxl_endpoint_decoder_reset_detected(struct device *dev, void *data)
1050 {
1051 	struct cxl_port *port = data;
1052 	struct cxl_decoder *cxld;
1053 	struct cxl_hdm *cxlhdm;
1054 	void __iomem *hdm;
1055 	u32 ctrl;
1056 
1057 	if (!is_endpoint_decoder(dev))
1058 		return 0;
1059 
1060 	cxld = to_cxl_decoder(dev);
1061 	if ((cxld->flags & CXL_DECODER_F_ENABLE) == 0)
1062 		return 0;
1063 
1064 	cxlhdm = dev_get_drvdata(&port->dev);
1065 	hdm = cxlhdm->regs.hdm_decoder;
1066 	ctrl = readl(hdm + CXL_HDM_DECODER0_CTRL_OFFSET(cxld->id));
1067 
1068 	return !FIELD_GET(CXL_HDM_DECODER0_CTRL_COMMITTED, ctrl);
1069 }
1070 
1071 bool cxl_endpoint_decoder_reset_detected(struct cxl_port *port)
1072 {
1073 	return device_for_each_child(&port->dev, port,
1074 				     __cxl_endpoint_decoder_reset_detected);
1075 }
1076 EXPORT_SYMBOL_NS_GPL(cxl_endpoint_decoder_reset_detected, CXL);
1077