Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp905666imu; Wed, 23 Jan 2019 07:41:52 -0800 (PST) X-Google-Smtp-Source: ALg8bN7jasDHb5/o4vdkYRVlRDwdMzJ3hmRDOC3nNEu/gcXW7Xcs+noueVhK9YhxBPUpBZH1L0mX X-Received: by 2002:a17:902:2006:: with SMTP id n6mr2724841pla.66.1548258112787; Wed, 23 Jan 2019 07:41:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548258112; cv=none; d=google.com; s=arc-20160816; b=P9Ptwv19Wx9ZwfIzaYX2m9NTMr/TK8Q8Xv9q2V7IUlGCqjQKMvK7i6z4dAa8mPTuQM b+ZmlS8d9C2r3XoC6cAAjF0oVOh5RA92Ere6rhtkfzS+/QPo37wJvOKSKLfGh8gVmju9 dwOlrLD8YZ3pNmAxkUladArodW138j/C44CB3hv/MOq7zYfh+yVfaJvD02Y6ce4kM5ko vpwhXOHAmIHL2lrgTcsGC8W9GvHLfqCFcvjJzEx/fkKwUTEmYviNlRJR81EtNVmT2ds6 CygvXzyAwN6bxRgSNVNzz4e9UMfNcDAaPoZADboFslFyRicN6TmfGjmPZNgxvnrA1G6S YR6g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=X58O8CvUz7SHvV9+Tk5CzFHshT5WpV/GO+QPUuAjpRM=; b=xKS/cCxGVxvIXJj8ZxBmA5zPfeCnr73jL2lorzDYqXuWcO+Uq3E07xZJ/ETQYriRC2 XeVUZ/9Ke26R8FCM0GjqSb5Ira59/OA7ab6s34AsYiUYDvBwE+irdFAJFfHjvdRMPuuO FIbDK0KWGjZZ7IqB+83W4HeX/5jMl0p6itqufJp9d/00Wz/dWZAQ0V0GTvmcR+Q0pgY5 jElqJGn6XjrThEzRXZb6RVCirjNv+PSMXCD/QJF61AWyHrAzFrOOzdjfMrBUwATpNnvr tv3XcIYPLTbiDs4Rymb1/UZhLFhArWYsDoMmLXEjHaouWaCN8o4OcBYIoAoiPrSLT1/c DrWA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y29si18354458pgk.376.2019.01.23.07.41.37; Wed, 23 Jan 2019 07:41:52 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726157AbfAWPkc (ORCPT + 99 others); Wed, 23 Jan 2019 10:40:32 -0500 Received: from foss.arm.com ([217.140.101.70]:42996 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725871AbfAWPkb (ORCPT ); Wed, 23 Jan 2019 10:40:31 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 67B05A78; Wed, 23 Jan 2019 07:40:31 -0800 (PST) Received: from e107981-ln.cambridge.arm.com (e107981-ln.cambridge.arm.com [10.1.197.40]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 01FC73F5C1; Wed, 23 Jan 2019 07:40:28 -0800 (PST) Date: Wed, 23 Jan 2019 15:40:24 +0000 From: Lorenzo Pieralisi To: Jianjun Wang Cc: Bjorn Helgaas , ryder.lee@mediatek.com, robh+dt@kernel.org, matthias.bgg@gmail.com, linux-pci@vger.kernel.org, mark.rutland@arm.com, devicetree@vger.kernel.org, youlin.pei@mediatek.com, linux-kernel@vger.kernel.org, linux-mediatek@lists.infradead.org, honghui.zhang@mediatek.com, linux-arm-kernel@lists.infradead.org Subject: Re: [PATCH 2/2] PCI: mediatek: Add controller support for MT7629 Message-ID: <20190123154023.GA1157@e107981-ln.cambridge.arm.com> References: <1544058553-10936-1-git-send-email-jianjun.wang@mediatek.com> <1544058553-10936-3-git-send-email-jianjun.wang@mediatek.com> <20181213145517.GB4701@google.com> <1545034779.8528.8.camel@mhfsdcap03> <20181217143247.GK20725@google.com> <20181217154645.GA24864@e107981-ln.cambridge.arm.com> <1545124764.25199.3.camel@mhfsdcap03> <20181220182043.GC183878@google.com> <1545651628.5634.57.camel@mhfsdcap03> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1545651628.5634.57.camel@mhfsdcap03> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Dec 24, 2018 at 07:40:28PM +0800, Jianjun Wang wrote: > On Thu, 2018-12-20 at 12:20 -0600, Bjorn Helgaas wrote: > > On Tue, Dec 18, 2018 at 05:19:24PM +0800, Jianjun Wang wrote: > > > On Mon, 2018-12-17 at 15:46 +0000, Lorenzo Pieralisi wrote: > > > > On Mon, Dec 17, 2018 at 08:32:47AM -0600, Bjorn Helgaas wrote: > > > > > On Mon, Dec 17, 2018 at 04:19:39PM +0800, Jianjun Wang wrote: > > > > > > On Thu, 2018-12-13 at 08:55 -0600, Bjorn Helgaas wrote: > > > > > > > On Thu, Dec 06, 2018 at 09:09:13AM +0800, Jianjun Wang wrote: > > > > > > > > The read value of BAR0 is 0xffff_ffff, it's size will be > > > > > > > > calculated as 4GB in arm64 but bogus alignment values at > > > > > > > > arm32, the pcie device and devices behind this bridge will > > > > > > > > not be enabled. Fix it's BAR0 resource size to guarantee > > > > > > > > the pcie devices will be enabled correctly. > > > > > > > > > > > > > > So this is a hardware erratum? Per spec, a memory BAR has > > > > > > > bit 0 hardwired to 0, and an IO BAR has bit 1 hardwired to > > > > > > > 0. > > > > > > > > > > > > Yes, it only works properly on 64bit platform. > > > > > > > > > > I don't understand. BARs are supposed to work the same > > > > > regardless of whether it's a 32- or 64-bit platform. If this is > > > > > a workaround for a hardware defect, please just say that > > > > > explicitly. > > > > > > > > I do not understand this either. First thing to do is to describe > > > > the problem properly so that we can actually find a solution to > > > > it. > > > > > > This BAR0 is a 64-bit memory BAR, the HW default values for this BAR > > > is 0xffff_ffff_0000_0000 and it could not be changed except by > > > config write operation. > > > > If you literally get 0xffff_ffff_0000_0000 when reading the BAR, that > > is out of spec because the low-order 4 bits of a 64-bit memory BAR > > cannot all be zero. > > > > A 64-bit BAR consumes two DWORDS in config space. For a 64-bit BAR0, > > the DWORD at 0x10 contains the low-order bits, and the DWORD at 0x14 > > contains the upper 32 bits. Bits 0-3 of the low-order DWORD (the > > one at 0x10) are read-only, and in this case should contain the value > > 0b1100 (0xc). That means the range is prefetchable (bit 3 == 1) and > > the BAR is 64 bits (bits 2:1 == 10). > > Sorry, I have confused the HW default value and the read value of BAR > size. The hardware default value is 0xffff_ffff_0000_000c, it's a 64-bit > BAR with prefetchable range. > > When we start to decoding the BAR, the read value of BAR0 at 0x10 is > 0x0c, and the value at 0x14 is 0xffff_ffff, so the read value of BAR > size is 0xffff_ffff_0000_0000, which will be decoded to 0xffff_ffff, and > it will be set to the end value of BAR0 resource in the pci_dev. > > > > > The calculated BAR size will be 0 in 32-bit platform since the > > > phys_addr_t is a 32bit value in 32-bit platform. > > > > Either (1) this is a hardware defect that feeds incorrect data to the > > BAR size calculation, or (2) there's a problem in the BAR size > > calculation code. We need to figure out which one and work around or > > fix it correctly. > > The BAR size is calculated by the code (res->end - res->start + 1) is > fine, I think it's a hardware defect because that we can not change the > hardware default value or just disable it since we don't using it. Apologies for the delay in getting back to this. This looks like a kernel defect, not a HW defect. I need some time to make up my mind on what the right fix for this but it is most certainly not this patch. Lorenzo