xref: /openbmc/linux/drivers/cxl/pci.c (revision d2f9fe695313b1e50028c1ec4cd09bea67152a60)
1 // SPDX-License-Identifier: GPL-2.0-only
2 /* Copyright(c) 2020 Intel Corporation. All rights reserved. */
3 #include <linux/io-64-nonatomic-lo-hi.h>
4 #include <linux/moduleparam.h>
5 #include <linux/module.h>
6 #include <linux/delay.h>
7 #include <linux/sizes.h>
8 #include <linux/mutex.h>
9 #include <linux/list.h>
10 #include <linux/pci.h>
11 #include <linux/aer.h>
12 #include <linux/io.h>
13 #include "cxlmem.h"
14 #include "cxlpci.h"
15 #include "cxl.h"
16 #include "pmu.h"
17 
18 /**
19  * DOC: cxl pci
20  *
21  * This implements the PCI exclusive functionality for a CXL device as it is
22  * defined by the Compute Express Link specification. CXL devices may surface
23  * certain functionality even if it isn't CXL enabled. While this driver is
24  * focused around the PCI specific aspects of a CXL device, it binds to the
25  * specific CXL memory device class code, and therefore the implementation of
26  * cxl_pci is focused around CXL memory devices.
27  *
28  * The driver has several responsibilities, mainly:
29  *  - Create the memX device and register on the CXL bus.
30  *  - Enumerate device's register interface and map them.
31  *  - Registers nvdimm bridge device with cxl_core.
32  *  - Registers a CXL mailbox with cxl_core.
33  */
34 
35 #define cxl_doorbell_busy(cxlds)                                                \
36 	(readl((cxlds)->regs.mbox + CXLDEV_MBOX_CTRL_OFFSET) &                  \
37 	 CXLDEV_MBOX_CTRL_DOORBELL)
38 
39 /* CXL 2.0 - 8.2.8.4 */
40 #define CXL_MAILBOX_TIMEOUT_MS (2 * HZ)
41 
42 /*
43  * CXL 2.0 ECN "Add Mailbox Ready Time" defines a capability field to
44  * dictate how long to wait for the mailbox to become ready. The new
45  * field allows the device to tell software the amount of time to wait
46  * before mailbox ready. This field per the spec theoretically allows
47  * for up to 255 seconds. 255 seconds is unreasonably long, its longer
48  * than the maximum SATA port link recovery wait. Default to 60 seconds
49  * until someone builds a CXL device that needs more time in practice.
50  */
51 static unsigned short mbox_ready_timeout = 60;
52 module_param(mbox_ready_timeout, ushort, 0644);
53 MODULE_PARM_DESC(mbox_ready_timeout, "seconds to wait for mailbox ready");
54 
55 static int cxl_pci_mbox_wait_for_doorbell(struct cxl_dev_state *cxlds)
56 {
57 	const unsigned long start = jiffies;
58 	unsigned long end = start;
59 
60 	while (cxl_doorbell_busy(cxlds)) {
61 		end = jiffies;
62 
63 		if (time_after(end, start + CXL_MAILBOX_TIMEOUT_MS)) {
64 			/* Check again in case preempted before timeout test */
65 			if (!cxl_doorbell_busy(cxlds))
66 				break;
67 			return -ETIMEDOUT;
68 		}
69 		cpu_relax();
70 	}
71 
72 	dev_dbg(cxlds->dev, "Doorbell wait took %dms",
73 		jiffies_to_msecs(end) - jiffies_to_msecs(start));
74 	return 0;
75 }
76 
77 #define cxl_err(dev, status, msg)                                        \
78 	dev_err_ratelimited(dev, msg ", device state %s%s\n",                  \
79 			    status & CXLMDEV_DEV_FATAL ? " fatal" : "",        \
80 			    status & CXLMDEV_FW_HALT ? " firmware-halt" : "")
81 
82 #define cxl_cmd_err(dev, cmd, status, msg)                               \
83 	dev_err_ratelimited(dev, msg " (opcode: %#x), device state %s%s\n",    \
84 			    (cmd)->opcode,                                     \
85 			    status & CXLMDEV_DEV_FATAL ? " fatal" : "",        \
86 			    status & CXLMDEV_FW_HALT ? " firmware-halt" : "")
87 
88 struct cxl_dev_id {
89 	struct cxl_dev_state *cxlds;
90 };
91 
92 static int cxl_request_irq(struct cxl_dev_state *cxlds, int irq,
93 			   irq_handler_t handler, irq_handler_t thread_fn)
94 {
95 	struct device *dev = cxlds->dev;
96 	struct cxl_dev_id *dev_id;
97 
98 	/* dev_id must be globally unique and must contain the cxlds */
99 	dev_id = devm_kzalloc(dev, sizeof(*dev_id), GFP_KERNEL);
100 	if (!dev_id)
101 		return -ENOMEM;
102 	dev_id->cxlds = cxlds;
103 
104 	return devm_request_threaded_irq(dev, irq, handler, thread_fn,
105 					 IRQF_SHARED | IRQF_ONESHOT,
106 					 NULL, dev_id);
107 }
108 
109 static bool cxl_mbox_background_complete(struct cxl_dev_state *cxlds)
110 {
111 	u64 reg;
112 
113 	reg = readq(cxlds->regs.mbox + CXLDEV_MBOX_BG_CMD_STATUS_OFFSET);
114 	return FIELD_GET(CXLDEV_MBOX_BG_CMD_COMMAND_PCT_MASK, reg) == 100;
115 }
116 
117 static irqreturn_t cxl_pci_mbox_irq(int irq, void *id)
118 {
119 	u64 reg;
120 	u16 opcode;
121 	struct cxl_dev_id *dev_id = id;
122 	struct cxl_dev_state *cxlds = dev_id->cxlds;
123 	struct cxl_memdev_state *mds = to_cxl_memdev_state(cxlds);
124 
125 	if (!cxl_mbox_background_complete(cxlds))
126 		return IRQ_NONE;
127 
128 	reg = readq(cxlds->regs.mbox + CXLDEV_MBOX_BG_CMD_STATUS_OFFSET);
129 	opcode = FIELD_GET(CXLDEV_MBOX_BG_CMD_COMMAND_OPCODE_MASK, reg);
130 	if (opcode == CXL_MBOX_OP_SANITIZE) {
131 		if (mds->security.sanitize_node)
132 			sysfs_notify_dirent(mds->security.sanitize_node);
133 
134 		dev_dbg(cxlds->dev, "Sanitization operation ended\n");
135 	} else {
136 		/* short-circuit the wait in __cxl_pci_mbox_send_cmd() */
137 		rcuwait_wake_up(&mds->mbox_wait);
138 	}
139 
140 	return IRQ_HANDLED;
141 }
142 
143 /*
144  * Sanitization operation polling mode.
145  */
146 static void cxl_mbox_sanitize_work(struct work_struct *work)
147 {
148 	struct cxl_memdev_state *mds =
149 		container_of(work, typeof(*mds), security.poll_dwork.work);
150 	struct cxl_dev_state *cxlds = &mds->cxlds;
151 
152 	mutex_lock(&mds->mbox_mutex);
153 	if (cxl_mbox_background_complete(cxlds)) {
154 		mds->security.poll_tmo_secs = 0;
155 		put_device(cxlds->dev);
156 
157 		if (mds->security.sanitize_node)
158 			sysfs_notify_dirent(mds->security.sanitize_node);
159 
160 		dev_dbg(cxlds->dev, "Sanitization operation ended\n");
161 	} else {
162 		int timeout = mds->security.poll_tmo_secs + 10;
163 
164 		mds->security.poll_tmo_secs = min(15 * 60, timeout);
165 		queue_delayed_work(system_wq, &mds->security.poll_dwork,
166 				   timeout * HZ);
167 	}
168 	mutex_unlock(&mds->mbox_mutex);
169 }
170 
171 /**
172  * __cxl_pci_mbox_send_cmd() - Execute a mailbox command
173  * @mds: The memory device driver data
174  * @mbox_cmd: Command to send to the memory device.
175  *
176  * Context: Any context. Expects mbox_mutex to be held.
177  * Return: -ETIMEDOUT if timeout occurred waiting for completion. 0 on success.
178  *         Caller should check the return code in @mbox_cmd to make sure it
179  *         succeeded.
180  *
181  * This is a generic form of the CXL mailbox send command thus only using the
182  * registers defined by the mailbox capability ID - CXL 2.0 8.2.8.4. Memory
183  * devices, and perhaps other types of CXL devices may have further information
184  * available upon error conditions. Driver facilities wishing to send mailbox
185  * commands should use the wrapper command.
186  *
187  * The CXL spec allows for up to two mailboxes. The intention is for the primary
188  * mailbox to be OS controlled and the secondary mailbox to be used by system
189  * firmware. This allows the OS and firmware to communicate with the device and
190  * not need to coordinate with each other. The driver only uses the primary
191  * mailbox.
192  */
193 static int __cxl_pci_mbox_send_cmd(struct cxl_memdev_state *mds,
194 				   struct cxl_mbox_cmd *mbox_cmd)
195 {
196 	struct cxl_dev_state *cxlds = &mds->cxlds;
197 	void __iomem *payload = cxlds->regs.mbox + CXLDEV_MBOX_PAYLOAD_OFFSET;
198 	struct device *dev = cxlds->dev;
199 	u64 cmd_reg, status_reg;
200 	size_t out_len;
201 	int rc;
202 
203 	lockdep_assert_held(&mds->mbox_mutex);
204 
205 	/*
206 	 * Here are the steps from 8.2.8.4 of the CXL 2.0 spec.
207 	 *   1. Caller reads MB Control Register to verify doorbell is clear
208 	 *   2. Caller writes Command Register
209 	 *   3. Caller writes Command Payload Registers if input payload is non-empty
210 	 *   4. Caller writes MB Control Register to set doorbell
211 	 *   5. Caller either polls for doorbell to be clear or waits for interrupt if configured
212 	 *   6. Caller reads MB Status Register to fetch Return code
213 	 *   7. If command successful, Caller reads Command Register to get Payload Length
214 	 *   8. If output payload is non-empty, host reads Command Payload Registers
215 	 *
216 	 * Hardware is free to do whatever it wants before the doorbell is rung,
217 	 * and isn't allowed to change anything after it clears the doorbell. As
218 	 * such, steps 2 and 3 can happen in any order, and steps 6, 7, 8 can
219 	 * also happen in any order (though some orders might not make sense).
220 	 */
221 
222 	/* #1 */
223 	if (cxl_doorbell_busy(cxlds)) {
224 		u64 md_status =
225 			readq(cxlds->regs.memdev + CXLMDEV_STATUS_OFFSET);
226 
227 		cxl_cmd_err(cxlds->dev, mbox_cmd, md_status,
228 			    "mailbox queue busy");
229 		return -EBUSY;
230 	}
231 
232 	/*
233 	 * With sanitize polling, hardware might be done and the poller still
234 	 * not be in sync. Ensure no new command comes in until so. Keep the
235 	 * hardware semantics and only allow device health status.
236 	 */
237 	if (mds->security.poll_tmo_secs > 0) {
238 		if (mbox_cmd->opcode != CXL_MBOX_OP_GET_HEALTH_INFO)
239 			return -EBUSY;
240 	}
241 
242 	cmd_reg = FIELD_PREP(CXLDEV_MBOX_CMD_COMMAND_OPCODE_MASK,
243 			     mbox_cmd->opcode);
244 	if (mbox_cmd->size_in) {
245 		if (WARN_ON(!mbox_cmd->payload_in))
246 			return -EINVAL;
247 
248 		cmd_reg |= FIELD_PREP(CXLDEV_MBOX_CMD_PAYLOAD_LENGTH_MASK,
249 				      mbox_cmd->size_in);
250 		memcpy_toio(payload, mbox_cmd->payload_in, mbox_cmd->size_in);
251 	}
252 
253 	/* #2, #3 */
254 	writeq(cmd_reg, cxlds->regs.mbox + CXLDEV_MBOX_CMD_OFFSET);
255 
256 	/* #4 */
257 	dev_dbg(dev, "Sending command: 0x%04x\n", mbox_cmd->opcode);
258 	writel(CXLDEV_MBOX_CTRL_DOORBELL,
259 	       cxlds->regs.mbox + CXLDEV_MBOX_CTRL_OFFSET);
260 
261 	/* #5 */
262 	rc = cxl_pci_mbox_wait_for_doorbell(cxlds);
263 	if (rc == -ETIMEDOUT) {
264 		u64 md_status = readq(cxlds->regs.memdev + CXLMDEV_STATUS_OFFSET);
265 
266 		cxl_cmd_err(cxlds->dev, mbox_cmd, md_status, "mailbox timeout");
267 		return rc;
268 	}
269 
270 	/* #6 */
271 	status_reg = readq(cxlds->regs.mbox + CXLDEV_MBOX_STATUS_OFFSET);
272 	mbox_cmd->return_code =
273 		FIELD_GET(CXLDEV_MBOX_STATUS_RET_CODE_MASK, status_reg);
274 
275 	/*
276 	 * Handle the background command in a synchronous manner.
277 	 *
278 	 * All other mailbox commands will serialize/queue on the mbox_mutex,
279 	 * which we currently hold. Furthermore this also guarantees that
280 	 * cxl_mbox_background_complete() checks are safe amongst each other,
281 	 * in that no new bg operation can occur in between.
282 	 *
283 	 * Background operations are timesliced in accordance with the nature
284 	 * of the command. In the event of timeout, the mailbox state is
285 	 * indeterminate until the next successful command submission and the
286 	 * driver can get back in sync with the hardware state.
287 	 */
288 	if (mbox_cmd->return_code == CXL_MBOX_CMD_RC_BACKGROUND) {
289 		u64 bg_status_reg;
290 		int i, timeout;
291 
292 		/*
293 		 * Sanitization is a special case which monopolizes the device
294 		 * and cannot be timesliced. Handle asynchronously instead,
295 		 * and allow userspace to poll(2) for completion.
296 		 */
297 		if (mbox_cmd->opcode == CXL_MBOX_OP_SANITIZE) {
298 			if (mds->security.poll_tmo_secs != -1) {
299 				/* hold the device throughout */
300 				get_device(cxlds->dev);
301 
302 				/* give first timeout a second */
303 				timeout = 1;
304 				mds->security.poll_tmo_secs = timeout;
305 				queue_delayed_work(system_wq,
306 						   &mds->security.poll_dwork,
307 						   timeout * HZ);
308 			}
309 
310 			dev_dbg(dev, "Sanitization operation started\n");
311 			goto success;
312 		}
313 
314 		dev_dbg(dev, "Mailbox background operation (0x%04x) started\n",
315 			mbox_cmd->opcode);
316 
317 		timeout = mbox_cmd->poll_interval_ms;
318 		for (i = 0; i < mbox_cmd->poll_count; i++) {
319 			if (rcuwait_wait_event_timeout(&mds->mbox_wait,
320 				       cxl_mbox_background_complete(cxlds),
321 				       TASK_UNINTERRUPTIBLE,
322 				       msecs_to_jiffies(timeout)) > 0)
323 				break;
324 		}
325 
326 		if (!cxl_mbox_background_complete(cxlds)) {
327 			dev_err(dev, "timeout waiting for background (%d ms)\n",
328 				timeout * mbox_cmd->poll_count);
329 			return -ETIMEDOUT;
330 		}
331 
332 		bg_status_reg = readq(cxlds->regs.mbox +
333 				      CXLDEV_MBOX_BG_CMD_STATUS_OFFSET);
334 		mbox_cmd->return_code =
335 			FIELD_GET(CXLDEV_MBOX_BG_CMD_COMMAND_RC_MASK,
336 				  bg_status_reg);
337 		dev_dbg(dev,
338 			"Mailbox background operation (0x%04x) completed\n",
339 			mbox_cmd->opcode);
340 	}
341 
342 	if (mbox_cmd->return_code != CXL_MBOX_CMD_RC_SUCCESS) {
343 		dev_dbg(dev, "Mailbox operation had an error: %s\n",
344 			cxl_mbox_cmd_rc2str(mbox_cmd));
345 		return 0; /* completed but caller must check return_code */
346 	}
347 
348 success:
349 	/* #7 */
350 	cmd_reg = readq(cxlds->regs.mbox + CXLDEV_MBOX_CMD_OFFSET);
351 	out_len = FIELD_GET(CXLDEV_MBOX_CMD_PAYLOAD_LENGTH_MASK, cmd_reg);
352 
353 	/* #8 */
354 	if (out_len && mbox_cmd->payload_out) {
355 		/*
356 		 * Sanitize the copy. If hardware misbehaves, out_len per the
357 		 * spec can actually be greater than the max allowed size (21
358 		 * bits available but spec defined 1M max). The caller also may
359 		 * have requested less data than the hardware supplied even
360 		 * within spec.
361 		 */
362 		size_t n;
363 
364 		n = min3(mbox_cmd->size_out, mds->payload_size, out_len);
365 		memcpy_fromio(mbox_cmd->payload_out, payload, n);
366 		mbox_cmd->size_out = n;
367 	} else {
368 		mbox_cmd->size_out = 0;
369 	}
370 
371 	return 0;
372 }
373 
374 static int cxl_pci_mbox_send(struct cxl_memdev_state *mds,
375 			     struct cxl_mbox_cmd *cmd)
376 {
377 	int rc;
378 
379 	mutex_lock_io(&mds->mbox_mutex);
380 	rc = __cxl_pci_mbox_send_cmd(mds, cmd);
381 	mutex_unlock(&mds->mbox_mutex);
382 
383 	return rc;
384 }
385 
386 static int cxl_pci_setup_mailbox(struct cxl_memdev_state *mds)
387 {
388 	struct cxl_dev_state *cxlds = &mds->cxlds;
389 	const int cap = readl(cxlds->regs.mbox + CXLDEV_MBOX_CAPS_OFFSET);
390 	struct device *dev = cxlds->dev;
391 	unsigned long timeout;
392 	u64 md_status;
393 
394 	timeout = jiffies + mbox_ready_timeout * HZ;
395 	do {
396 		md_status = readq(cxlds->regs.memdev + CXLMDEV_STATUS_OFFSET);
397 		if (md_status & CXLMDEV_MBOX_IF_READY)
398 			break;
399 		if (msleep_interruptible(100))
400 			break;
401 	} while (!time_after(jiffies, timeout));
402 
403 	if (!(md_status & CXLMDEV_MBOX_IF_READY)) {
404 		cxl_err(dev, md_status, "timeout awaiting mailbox ready");
405 		return -ETIMEDOUT;
406 	}
407 
408 	/*
409 	 * A command may be in flight from a previous driver instance,
410 	 * think kexec, do one doorbell wait so that
411 	 * __cxl_pci_mbox_send_cmd() can assume that it is the only
412 	 * source for future doorbell busy events.
413 	 */
414 	if (cxl_pci_mbox_wait_for_doorbell(cxlds) != 0) {
415 		cxl_err(dev, md_status, "timeout awaiting mailbox idle");
416 		return -ETIMEDOUT;
417 	}
418 
419 	mds->mbox_send = cxl_pci_mbox_send;
420 	mds->payload_size =
421 		1 << FIELD_GET(CXLDEV_MBOX_CAP_PAYLOAD_SIZE_MASK, cap);
422 
423 	/*
424 	 * CXL 2.0 8.2.8.4.3 Mailbox Capabilities Register
425 	 *
426 	 * If the size is too small, mandatory commands will not work and so
427 	 * there's no point in going forward. If the size is too large, there's
428 	 * no harm is soft limiting it.
429 	 */
430 	mds->payload_size = min_t(size_t, mds->payload_size, SZ_1M);
431 	if (mds->payload_size < 256) {
432 		dev_err(dev, "Mailbox is too small (%zub)",
433 			mds->payload_size);
434 		return -ENXIO;
435 	}
436 
437 	dev_dbg(dev, "Mailbox payload sized %zu", mds->payload_size);
438 
439 	rcuwait_init(&mds->mbox_wait);
440 
441 	if (cap & CXLDEV_MBOX_CAP_BG_CMD_IRQ) {
442 		u32 ctrl;
443 		int irq, msgnum;
444 		struct pci_dev *pdev = to_pci_dev(cxlds->dev);
445 
446 		msgnum = FIELD_GET(CXLDEV_MBOX_CAP_IRQ_MSGNUM_MASK, cap);
447 		irq = pci_irq_vector(pdev, msgnum);
448 		if (irq < 0)
449 			goto mbox_poll;
450 
451 		if (cxl_request_irq(cxlds, irq, cxl_pci_mbox_irq, NULL))
452 			goto mbox_poll;
453 
454 		/* enable background command mbox irq support */
455 		ctrl = readl(cxlds->regs.mbox + CXLDEV_MBOX_CTRL_OFFSET);
456 		ctrl |= CXLDEV_MBOX_CTRL_BG_CMD_IRQ;
457 		writel(ctrl, cxlds->regs.mbox + CXLDEV_MBOX_CTRL_OFFSET);
458 
459 		return 0;
460 	}
461 
462 mbox_poll:
463 	mds->security.poll = true;
464 	INIT_DELAYED_WORK(&mds->security.poll_dwork, cxl_mbox_sanitize_work);
465 
466 	dev_dbg(cxlds->dev, "Mailbox interrupts are unsupported");
467 	return 0;
468 }
469 
470 static int cxl_map_regblock(struct pci_dev *pdev, struct cxl_register_map *map)
471 {
472 	struct device *dev = &pdev->dev;
473 
474 	map->base = ioremap(map->resource, map->max_size);
475 	if (!map->base) {
476 		dev_err(dev, "failed to map registers\n");
477 		return -ENOMEM;
478 	}
479 
480 	dev_dbg(dev, "Mapped CXL Memory Device resource %pa\n", &map->resource);
481 	return 0;
482 }
483 
484 static void cxl_unmap_regblock(struct pci_dev *pdev,
485 			       struct cxl_register_map *map)
486 {
487 	iounmap(map->base);
488 	map->base = NULL;
489 }
490 
491 static int cxl_probe_regs(struct pci_dev *pdev, struct cxl_register_map *map)
492 {
493 	struct cxl_component_reg_map *comp_map;
494 	struct cxl_device_reg_map *dev_map;
495 	struct device *dev = &pdev->dev;
496 	void __iomem *base = map->base;
497 
498 	switch (map->reg_type) {
499 	case CXL_REGLOC_RBI_COMPONENT:
500 		comp_map = &map->component_map;
501 		cxl_probe_component_regs(dev, base, comp_map);
502 		if (!comp_map->hdm_decoder.valid) {
503 			dev_err(dev, "HDM decoder registers not found\n");
504 			return -ENXIO;
505 		}
506 
507 		if (!comp_map->ras.valid)
508 			dev_dbg(dev, "RAS registers not found\n");
509 
510 		dev_dbg(dev, "Set up component registers\n");
511 		break;
512 	case CXL_REGLOC_RBI_MEMDEV:
513 		dev_map = &map->device_map;
514 		cxl_probe_device_regs(dev, base, dev_map);
515 		if (!dev_map->status.valid || !dev_map->mbox.valid ||
516 		    !dev_map->memdev.valid) {
517 			dev_err(dev, "registers not found: %s%s%s\n",
518 				!dev_map->status.valid ? "status " : "",
519 				!dev_map->mbox.valid ? "mbox " : "",
520 				!dev_map->memdev.valid ? "memdev " : "");
521 			return -ENXIO;
522 		}
523 
524 		dev_dbg(dev, "Probing device registers...\n");
525 		break;
526 	default:
527 		break;
528 	}
529 
530 	return 0;
531 }
532 
533 static int cxl_setup_regs(struct pci_dev *pdev, enum cxl_regloc_type type,
534 			  struct cxl_register_map *map)
535 {
536 	int rc;
537 
538 	rc = cxl_find_regblock(pdev, type, map);
539 	if (rc)
540 		return rc;
541 
542 	rc = cxl_map_regblock(pdev, map);
543 	if (rc)
544 		return rc;
545 
546 	rc = cxl_probe_regs(pdev, map);
547 	cxl_unmap_regblock(pdev, map);
548 
549 	return rc;
550 }
551 
552 /*
553  * Assume that any RCIEP that emits the CXL memory expander class code
554  * is an RCD
555  */
556 static bool is_cxl_restricted(struct pci_dev *pdev)
557 {
558 	return pci_pcie_type(pdev) == PCI_EXP_TYPE_RC_END;
559 }
560 
561 static int cxl_pci_ras_unmask(struct pci_dev *pdev)
562 {
563 	struct pci_host_bridge *host_bridge = pci_find_host_bridge(pdev->bus);
564 	struct cxl_dev_state *cxlds = pci_get_drvdata(pdev);
565 	void __iomem *addr;
566 	u32 orig_val, val, mask;
567 	u16 cap;
568 	int rc;
569 
570 	if (!cxlds->regs.ras) {
571 		dev_dbg(&pdev->dev, "No RAS registers.\n");
572 		return 0;
573 	}
574 
575 	/* BIOS has CXL error control */
576 	if (!host_bridge->native_cxl_error)
577 		return -ENXIO;
578 
579 	rc = pcie_capability_read_word(pdev, PCI_EXP_DEVCTL, &cap);
580 	if (rc)
581 		return rc;
582 
583 	if (cap & PCI_EXP_DEVCTL_URRE) {
584 		addr = cxlds->regs.ras + CXL_RAS_UNCORRECTABLE_MASK_OFFSET;
585 		orig_val = readl(addr);
586 
587 		mask = CXL_RAS_UNCORRECTABLE_MASK_MASK |
588 		       CXL_RAS_UNCORRECTABLE_MASK_F256B_MASK;
589 		val = orig_val & ~mask;
590 		writel(val, addr);
591 		dev_dbg(&pdev->dev,
592 			"Uncorrectable RAS Errors Mask: %#x -> %#x\n",
593 			orig_val, val);
594 	}
595 
596 	if (cap & PCI_EXP_DEVCTL_CERE) {
597 		addr = cxlds->regs.ras + CXL_RAS_CORRECTABLE_MASK_OFFSET;
598 		orig_val = readl(addr);
599 		val = orig_val & ~CXL_RAS_CORRECTABLE_MASK_MASK;
600 		writel(val, addr);
601 		dev_dbg(&pdev->dev, "Correctable RAS Errors Mask: %#x -> %#x\n",
602 			orig_val, val);
603 	}
604 
605 	return 0;
606 }
607 
608 static void free_event_buf(void *buf)
609 {
610 	kvfree(buf);
611 }
612 
613 /*
614  * There is a single buffer for reading event logs from the mailbox.  All logs
615  * share this buffer protected by the mds->event_log_lock.
616  */
617 static int cxl_mem_alloc_event_buf(struct cxl_memdev_state *mds)
618 {
619 	struct cxl_get_event_payload *buf;
620 
621 	buf = kvmalloc(mds->payload_size, GFP_KERNEL);
622 	if (!buf)
623 		return -ENOMEM;
624 	mds->event.buf = buf;
625 
626 	return devm_add_action_or_reset(mds->cxlds.dev, free_event_buf, buf);
627 }
628 
629 static int cxl_alloc_irq_vectors(struct pci_dev *pdev)
630 {
631 	int nvecs;
632 
633 	/*
634 	 * Per CXL 3.0 3.1.1 CXL.io Endpoint a function on a CXL device must
635 	 * not generate INTx messages if that function participates in
636 	 * CXL.cache or CXL.mem.
637 	 *
638 	 * Additionally pci_alloc_irq_vectors() handles calling
639 	 * pci_free_irq_vectors() automatically despite not being called
640 	 * pcim_*.  See pci_setup_msi_context().
641 	 */
642 	nvecs = pci_alloc_irq_vectors(pdev, 1, CXL_PCI_DEFAULT_MAX_VECTORS,
643 				      PCI_IRQ_MSIX | PCI_IRQ_MSI);
644 	if (nvecs < 1) {
645 		dev_dbg(&pdev->dev, "Failed to alloc irq vectors: %d\n", nvecs);
646 		return -ENXIO;
647 	}
648 	return 0;
649 }
650 
651 static irqreturn_t cxl_event_thread(int irq, void *id)
652 {
653 	struct cxl_dev_id *dev_id = id;
654 	struct cxl_dev_state *cxlds = dev_id->cxlds;
655 	struct cxl_memdev_state *mds = to_cxl_memdev_state(cxlds);
656 	u32 status;
657 
658 	do {
659 		/*
660 		 * CXL 3.0 8.2.8.3.1: The lower 32 bits are the status;
661 		 * ignore the reserved upper 32 bits
662 		 */
663 		status = readl(cxlds->regs.status + CXLDEV_DEV_EVENT_STATUS_OFFSET);
664 		/* Ignore logs unknown to the driver */
665 		status &= CXLDEV_EVENT_STATUS_ALL;
666 		if (!status)
667 			break;
668 		cxl_mem_get_event_records(mds, status);
669 		cond_resched();
670 	} while (status);
671 
672 	return IRQ_HANDLED;
673 }
674 
675 static int cxl_event_req_irq(struct cxl_dev_state *cxlds, u8 setting)
676 {
677 	struct pci_dev *pdev = to_pci_dev(cxlds->dev);
678 	int irq;
679 
680 	if (FIELD_GET(CXLDEV_EVENT_INT_MODE_MASK, setting) != CXL_INT_MSI_MSIX)
681 		return -ENXIO;
682 
683 	irq =  pci_irq_vector(pdev,
684 			      FIELD_GET(CXLDEV_EVENT_INT_MSGNUM_MASK, setting));
685 	if (irq < 0)
686 		return irq;
687 
688 	return cxl_request_irq(cxlds, irq, NULL, cxl_event_thread);
689 }
690 
691 static int cxl_event_get_int_policy(struct cxl_memdev_state *mds,
692 				    struct cxl_event_interrupt_policy *policy)
693 {
694 	struct cxl_mbox_cmd mbox_cmd = {
695 		.opcode = CXL_MBOX_OP_GET_EVT_INT_POLICY,
696 		.payload_out = policy,
697 		.size_out = sizeof(*policy),
698 	};
699 	int rc;
700 
701 	rc = cxl_internal_send_cmd(mds, &mbox_cmd);
702 	if (rc < 0)
703 		dev_err(mds->cxlds.dev,
704 			"Failed to get event interrupt policy : %d", rc);
705 
706 	return rc;
707 }
708 
709 static int cxl_event_config_msgnums(struct cxl_memdev_state *mds,
710 				    struct cxl_event_interrupt_policy *policy)
711 {
712 	struct cxl_mbox_cmd mbox_cmd;
713 	int rc;
714 
715 	*policy = (struct cxl_event_interrupt_policy) {
716 		.info_settings = CXL_INT_MSI_MSIX,
717 		.warn_settings = CXL_INT_MSI_MSIX,
718 		.failure_settings = CXL_INT_MSI_MSIX,
719 		.fatal_settings = CXL_INT_MSI_MSIX,
720 	};
721 
722 	mbox_cmd = (struct cxl_mbox_cmd) {
723 		.opcode = CXL_MBOX_OP_SET_EVT_INT_POLICY,
724 		.payload_in = policy,
725 		.size_in = sizeof(*policy),
726 	};
727 
728 	rc = cxl_internal_send_cmd(mds, &mbox_cmd);
729 	if (rc < 0) {
730 		dev_err(mds->cxlds.dev, "Failed to set event interrupt policy : %d",
731 			rc);
732 		return rc;
733 	}
734 
735 	/* Retrieve final interrupt settings */
736 	return cxl_event_get_int_policy(mds, policy);
737 }
738 
739 static int cxl_event_irqsetup(struct cxl_memdev_state *mds)
740 {
741 	struct cxl_dev_state *cxlds = &mds->cxlds;
742 	struct cxl_event_interrupt_policy policy;
743 	int rc;
744 
745 	rc = cxl_event_config_msgnums(mds, &policy);
746 	if (rc)
747 		return rc;
748 
749 	rc = cxl_event_req_irq(cxlds, policy.info_settings);
750 	if (rc) {
751 		dev_err(cxlds->dev, "Failed to get interrupt for event Info log\n");
752 		return rc;
753 	}
754 
755 	rc = cxl_event_req_irq(cxlds, policy.warn_settings);
756 	if (rc) {
757 		dev_err(cxlds->dev, "Failed to get interrupt for event Warn log\n");
758 		return rc;
759 	}
760 
761 	rc = cxl_event_req_irq(cxlds, policy.failure_settings);
762 	if (rc) {
763 		dev_err(cxlds->dev, "Failed to get interrupt for event Failure log\n");
764 		return rc;
765 	}
766 
767 	rc = cxl_event_req_irq(cxlds, policy.fatal_settings);
768 	if (rc) {
769 		dev_err(cxlds->dev, "Failed to get interrupt for event Fatal log\n");
770 		return rc;
771 	}
772 
773 	return 0;
774 }
775 
776 static bool cxl_event_int_is_fw(u8 setting)
777 {
778 	u8 mode = FIELD_GET(CXLDEV_EVENT_INT_MODE_MASK, setting);
779 
780 	return mode == CXL_INT_FW;
781 }
782 
783 static int cxl_event_config(struct pci_host_bridge *host_bridge,
784 			    struct cxl_memdev_state *mds)
785 {
786 	struct cxl_event_interrupt_policy policy;
787 	int rc;
788 
789 	/*
790 	 * When BIOS maintains CXL error reporting control, it will process
791 	 * event records.  Only one agent can do so.
792 	 */
793 	if (!host_bridge->native_cxl_error)
794 		return 0;
795 
796 	rc = cxl_mem_alloc_event_buf(mds);
797 	if (rc)
798 		return rc;
799 
800 	rc = cxl_event_get_int_policy(mds, &policy);
801 	if (rc)
802 		return rc;
803 
804 	if (cxl_event_int_is_fw(policy.info_settings) ||
805 	    cxl_event_int_is_fw(policy.warn_settings) ||
806 	    cxl_event_int_is_fw(policy.failure_settings) ||
807 	    cxl_event_int_is_fw(policy.fatal_settings)) {
808 		dev_err(mds->cxlds.dev,
809 			"FW still in control of Event Logs despite _OSC settings\n");
810 		return -EBUSY;
811 	}
812 
813 	rc = cxl_event_irqsetup(mds);
814 	if (rc)
815 		return rc;
816 
817 	cxl_mem_get_event_records(mds, CXLDEV_EVENT_STATUS_ALL);
818 
819 	return 0;
820 }
821 
822 static int cxl_pci_probe(struct pci_dev *pdev, const struct pci_device_id *id)
823 {
824 	struct pci_host_bridge *host_bridge = pci_find_host_bridge(pdev->bus);
825 	struct cxl_memdev_state *mds;
826 	struct cxl_dev_state *cxlds;
827 	struct cxl_register_map map;
828 	struct cxl_memdev *cxlmd;
829 	int i, rc, pmu_count;
830 
831 	/*
832 	 * Double check the anonymous union trickery in struct cxl_regs
833 	 * FIXME switch to struct_group()
834 	 */
835 	BUILD_BUG_ON(offsetof(struct cxl_regs, memdev) !=
836 		     offsetof(struct cxl_regs, device_regs.memdev));
837 
838 	rc = pcim_enable_device(pdev);
839 	if (rc)
840 		return rc;
841 	pci_set_master(pdev);
842 
843 	mds = cxl_memdev_state_create(&pdev->dev);
844 	if (IS_ERR(mds))
845 		return PTR_ERR(mds);
846 	cxlds = &mds->cxlds;
847 	pci_set_drvdata(pdev, cxlds);
848 
849 	cxlds->rcd = is_cxl_restricted(pdev);
850 	cxlds->serial = pci_get_dsn(pdev);
851 	cxlds->cxl_dvsec = pci_find_dvsec_capability(
852 		pdev, PCI_DVSEC_VENDOR_ID_CXL, CXL_DVSEC_PCIE_DEVICE);
853 	if (!cxlds->cxl_dvsec)
854 		dev_warn(&pdev->dev,
855 			 "Device DVSEC not present, skip CXL.mem init\n");
856 
857 	rc = cxl_setup_regs(pdev, CXL_REGLOC_RBI_MEMDEV, &map);
858 	if (rc)
859 		return rc;
860 
861 	rc = cxl_map_device_regs(&pdev->dev, &cxlds->regs.device_regs, &map);
862 	if (rc)
863 		return rc;
864 
865 	/*
866 	 * If the component registers can't be found, the cxl_pci driver may
867 	 * still be useful for management functions so don't return an error.
868 	 */
869 	cxlds->component_reg_phys = CXL_RESOURCE_NONE;
870 	rc = cxl_setup_regs(pdev, CXL_REGLOC_RBI_COMPONENT, &map);
871 	if (rc)
872 		dev_warn(&pdev->dev, "No component registers (%d)\n", rc);
873 
874 	cxlds->component_reg_phys = map.resource;
875 
876 	rc = cxl_map_component_regs(&pdev->dev, &cxlds->regs.component,
877 				    &map, BIT(CXL_CM_CAP_CAP_ID_RAS));
878 	if (rc)
879 		dev_dbg(&pdev->dev, "Failed to map RAS capability.\n");
880 
881 	rc = cxl_await_media_ready(cxlds);
882 	if (rc == 0)
883 		cxlds->media_ready = true;
884 	else
885 		dev_warn(&pdev->dev, "Media not active (%d)\n", rc);
886 
887 	rc = cxl_alloc_irq_vectors(pdev);
888 	if (rc)
889 		return rc;
890 
891 	rc = cxl_pci_setup_mailbox(mds);
892 	if (rc)
893 		return rc;
894 
895 	rc = cxl_enumerate_cmds(mds);
896 	if (rc)
897 		return rc;
898 
899 	rc = cxl_set_timestamp(mds);
900 	if (rc)
901 		return rc;
902 
903 	rc = cxl_poison_state_init(mds);
904 	if (rc)
905 		return rc;
906 
907 	rc = cxl_dev_state_identify(mds);
908 	if (rc)
909 		return rc;
910 
911 	rc = cxl_mem_create_range_info(mds);
912 	if (rc)
913 		return rc;
914 
915 	cxlmd = devm_cxl_add_memdev(cxlds);
916 	if (IS_ERR(cxlmd))
917 		return PTR_ERR(cxlmd);
918 
919 	rc = cxl_memdev_setup_fw_upload(mds);
920 	if (rc)
921 		return rc;
922 
923 	pmu_count = cxl_count_regblock(pdev, CXL_REGLOC_RBI_PMU);
924 	for (i = 0; i < pmu_count; i++) {
925 		struct cxl_pmu_regs pmu_regs;
926 
927 		rc = cxl_find_regblock_instance(pdev, CXL_REGLOC_RBI_PMU, &map, i);
928 		if (rc) {
929 			dev_dbg(&pdev->dev, "Could not find PMU regblock\n");
930 			break;
931 		}
932 
933 		rc = cxl_map_pmu_regs(pdev, &pmu_regs, &map);
934 		if (rc) {
935 			dev_dbg(&pdev->dev, "Could not map PMU regs\n");
936 			break;
937 		}
938 
939 		rc = devm_cxl_pmu_add(cxlds->dev, &pmu_regs, cxlmd->id, i, CXL_PMU_MEMDEV);
940 		if (rc) {
941 			dev_dbg(&pdev->dev, "Could not add PMU instance\n");
942 			break;
943 		}
944 	}
945 
946 	rc = cxl_event_config(host_bridge, mds);
947 	if (rc)
948 		return rc;
949 
950 	rc = cxl_pci_ras_unmask(pdev);
951 	if (rc)
952 		dev_dbg(&pdev->dev, "No RAS reporting unmasked\n");
953 
954 	pci_save_state(pdev);
955 
956 	return rc;
957 }
958 
959 static const struct pci_device_id cxl_mem_pci_tbl[] = {
960 	/* PCI class code for CXL.mem Type-3 Devices */
961 	{ PCI_DEVICE_CLASS((PCI_CLASS_MEMORY_CXL << 8 | CXL_MEMORY_PROGIF), ~0)},
962 	{ /* terminate list */ },
963 };
964 MODULE_DEVICE_TABLE(pci, cxl_mem_pci_tbl);
965 
966 static pci_ers_result_t cxl_slot_reset(struct pci_dev *pdev)
967 {
968 	struct cxl_dev_state *cxlds = pci_get_drvdata(pdev);
969 	struct cxl_memdev *cxlmd = cxlds->cxlmd;
970 	struct device *dev = &cxlmd->dev;
971 
972 	dev_info(&pdev->dev, "%s: restart CXL.mem after slot reset\n",
973 		 dev_name(dev));
974 	pci_restore_state(pdev);
975 	if (device_attach(dev) <= 0)
976 		return PCI_ERS_RESULT_DISCONNECT;
977 	return PCI_ERS_RESULT_RECOVERED;
978 }
979 
980 static void cxl_error_resume(struct pci_dev *pdev)
981 {
982 	struct cxl_dev_state *cxlds = pci_get_drvdata(pdev);
983 	struct cxl_memdev *cxlmd = cxlds->cxlmd;
984 	struct device *dev = &cxlmd->dev;
985 
986 	dev_info(&pdev->dev, "%s: error resume %s\n", dev_name(dev),
987 		 dev->driver ? "successful" : "failed");
988 }
989 
990 static const struct pci_error_handlers cxl_error_handlers = {
991 	.error_detected	= cxl_error_detected,
992 	.slot_reset	= cxl_slot_reset,
993 	.resume		= cxl_error_resume,
994 	.cor_error_detected	= cxl_cor_error_detected,
995 };
996 
997 static struct pci_driver cxl_pci_driver = {
998 	.name			= KBUILD_MODNAME,
999 	.id_table		= cxl_mem_pci_tbl,
1000 	.probe			= cxl_pci_probe,
1001 	.err_handler		= &cxl_error_handlers,
1002 	.driver	= {
1003 		.probe_type	= PROBE_PREFER_ASYNCHRONOUS,
1004 	},
1005 };
1006 
1007 MODULE_LICENSE("GPL v2");
1008 module_pci_driver(cxl_pci_driver);
1009 MODULE_IMPORT_NS(CXL);
1010