Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp4523203ybp; Mon, 14 Oct 2019 06:06:36 -0700 (PDT) X-Google-Smtp-Source: APXvYqy/ShorjGpLlrlVMn+JQTDYAMe3Kophst6OdrJtVh4mPDnPn9xhNIJablz1gy0yBaD+eZ16 X-Received: by 2002:a50:ec0f:: with SMTP id g15mr28285986edr.59.1571058395831; Mon, 14 Oct 2019 06:06:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571058395; cv=none; d=google.com; s=arc-20160816; b=wTXA49swsM1UpbUSPDlly/b4Yz/LCPcL5Df1M8IoiuTTckbqfUIeTlaTNiuo2gj/vx UgVjBml566cBcEicIOhaX1rqoPXhf7g5HvsMngd36hTQjOlcwLBAIkUAUVEZAz3mAqLO ZZMr01kVnhlBFPx/e3UdmFE2lNlnlhpGjbAxH+HHZzXLkLnVrpVm13nMgms1hfln3sQw +Vt9Kao4LsQuiaOAdVemkskJyo7daPA6ajqYafAgNQHedqB1nSNBWlwvfsgJJqduORHV +WjRLKL1Py46ZqSoZoMKXv1lCzqAHD+rc/keMwAsfZhC9IaRPIFjPsJOfnpLf0iKMnfT O40w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=davHcZdbKDhdKUF3ksnVddksX9hdrs8iDjkO9Aoeit8=; b=ULd/G/lK2mgZ6ZxrzlpIGtLYPkcew/egZL55NGc+IlDVHUoGVmjvAX1UJJnRpagGkk +LjscV2pwbNEA+aYPfGDlsFtL/gEXbh46bSM0cLuPBWMgN/ymlWu5418yzUXrtfP7vPR d8ooRXtyQHCg5JPPY50TmLmIQEp54E/0Tn6/mt9NZ0EDikAxc3MhOcIx936UMFKaTbpa qho+p6wixis3EduO2Z+ub0WFyriogQMUCqdNBBDxOAMOkigqsjQ1It+Umj/ODxaqpgjz LtwOfCQFJER8LaEaE4qqDMHfd8RZgn6OtL5PIFvKn3wr4iVYdUuidTOFhU53JhWedn4o ZYOg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z12si11075281ejb.312.2019.10.14.06.06.10; Mon, 14 Oct 2019 06:06:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731820AbfJNM53 (ORCPT + 99 others); Mon, 14 Oct 2019 08:57:29 -0400 Received: from relay11.mail.gandi.net ([217.70.178.231]:39139 "EHLO relay11.mail.gandi.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730472AbfJNM53 (ORCPT ); Mon, 14 Oct 2019 08:57:29 -0400 Received: from localhost (unknown [88.190.179.123]) (Authenticated sender: repk@triplefau.lt) by relay11.mail.gandi.net (Postfix) with ESMTPSA id 321C9100014; Mon, 14 Oct 2019 12:57:24 +0000 (UTC) Date: Mon, 14 Oct 2019 15:06:27 +0200 From: Remi Pommarel To: Lorenzo Pieralisi Cc: Marc Zyngier , Andrew Murray , Ellie Reeves , linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, Bjorn Helgaas , Thomas Petazzoni , linux-arm-kernel@lists.infradead.org Subject: Re: [PATCH v3] PCI: aardvark: Use LTSSM state to build link training flag Message-ID: <20191014130627.GA1426@voidbox> References: <20190522213351.21366-3-repk@triplefau.lt> <20190930154017.GF42880@e119886-lin.cambridge.arm.com> <20190930165230.GA12568@voidbox> <20191001080546.GI42880@e119886-lin.cambridge.arm.com> <20191013113415.3c653526@why> <20191014100129.GA18832@e121166-lin.cambridge.arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191014100129.GA18832@e121166-lin.cambridge.arm.com> User-Agent: Mutt/1.12.2 (2019-09-21) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Lorenzo, Marc, On Mon, Oct 14, 2019 at 11:01:29AM +0100, Lorenzo Pieralisi wrote: > On Sun, Oct 13, 2019 at 11:34:15AM +0100, Marc Zyngier wrote: > > On Tue, 1 Oct 2019 09:05:46 +0100 > > Andrew Murray wrote: > > > > Hi Lorenzo, > > > > > On Mon, Sep 30, 2019 at 06:52:30PM +0200, Remi Pommarel wrote: > > > > On Mon, Sep 30, 2019 at 04:40:18PM +0100, Andrew Murray wrote: > > > > > On Wed, May 22, 2019 at 11:33:51PM +0200, Remi Pommarel wrote: > > > > > > Aardvark's PCI_EXP_LNKSTA_LT flag in its link status register is not > > > > > > implemented and does not reflect the actual link training state (the > > > > > > flag is always set to 0). In order to support link re-training feature > > > > > > this flag has to be emulated. The Link Training and Status State > > > > > > Machine (LTSSM) flag in Aardvark LMI config register could be used as > > > > > > a link training indicator. Indeed if the LTSSM is in L0 or upper state > > > > > > then link training has completed (see [1]). > > > > > > > > > > > > Unfortunately because after asking a link retraining it takes a while > > > > > > for the LTSSM state to become less than 0x10 (due to L0s to recovery > > > > > > state transition delays), LTSSM can still be in L0 while link training > > > > > > has not finished yet. So this waits for link to be in recovery or lesser > > > > > > state before returning after asking for a link retrain. > > > > > > > > > > > > [1] "PCI Express Base Specification", REV. 4.0 > > > > > > PCI Express, February 19 2014, Table 4-14 > > > > > > > > > > > > Signed-off-by: Remi Pommarel > > > > > > --- > > > > > > Changes since v1: > > > > > > - Rename retraining flag field > > > > > > - Fix DEVCTL register writing > > > > > > > > > > > > Changes since v2: > > > > > > - Rewrite patch logic so it is more legible > > > > > > > > > > > > Please note that I will unlikely be able to answer any comments from May > > > > > > 24th to June 10th. > > > > > > --- > > > > > > drivers/pci/controller/pci-aardvark.c | 29 ++++++++++++++++++++++++++- > > > > > > 1 file changed, 28 insertions(+), 1 deletion(-) > > > > > > > > > > > > diff --git a/drivers/pci/controller/pci-aardvark.c b/drivers/pci/controller/pci-aardvark.c > > > > > > index 134e0306ff00..8803083b2174 100644 > > > > > > --- a/drivers/pci/controller/pci-aardvark.c > > > > > > +++ b/drivers/pci/controller/pci-aardvark.c > > > > > > @@ -180,6 +180,8 @@ > > > > > > #define LINK_WAIT_MAX_RETRIES 10 > > > > > > #define LINK_WAIT_USLEEP_MIN 90000 > > > > > > #define LINK_WAIT_USLEEP_MAX 100000 > > > > > > +#define RETRAIN_WAIT_MAX_RETRIES 10 > > > > > > +#define RETRAIN_WAIT_USLEEP_US 2000 > > > > > > > > > > > > #define MSI_IRQ_NUM 32 > > > > > > > > > > > > @@ -239,6 +241,17 @@ static int advk_pcie_wait_for_link(struct advk_pcie *pcie) > > > > > > return -ETIMEDOUT; > > > > > > } > > > > > > > > > > > > +static void advk_pcie_wait_for_retrain(struct advk_pcie *pcie) > > > > > > +{ > > > > > > + size_t retries; > > > > > > + > > > > > > + for (retries = 0; retries < RETRAIN_WAIT_MAX_RETRIES; ++retries) { > > > > > > + if (!advk_pcie_link_up(pcie)) > > > > > > + break; > > > > > > + udelay(RETRAIN_WAIT_USLEEP_US); > > > > > > + } > > > > > > +} > > > > > > + > > > > > > static void advk_pcie_setup_hw(struct advk_pcie *pcie) > > > > > > { > > > > > > u32 reg; > > > > > > @@ -426,11 +439,20 @@ advk_pci_bridge_emul_pcie_conf_read(struct pci_bridge_emul *bridge, > > > > > > return PCI_BRIDGE_EMUL_HANDLED; > > > > > > } > > > > > > > > > > > > + case PCI_EXP_LNKCTL: { > > > > > > + /* u32 contains both PCI_EXP_LNKCTL and PCI_EXP_LNKSTA */ > > > > > > + u32 val = advk_readl(pcie, PCIE_CORE_PCIEXP_CAP + reg) & > > > > > > + ~(PCI_EXP_LNKSTA_LT << 16); > > > > > > > > > > The commit message says "the flag is always set to 0" - therefore I guess > > > > > you don't *need* to mask out the LT bit here? I assume this is just > > > > > belt-and-braces but thought I'd check incase I've misunderstood or if your > > > > > commit message is inaccurate. > > > > > > > > > > In any case masking out the bit (or adding a comment) makes this code more > > > > > readable as the reader doesn't need to know what the hardware does with this > > > > > bit. > > > > > > > > Actually vendor eventually responded that the bit was reserved, but > > > > during my tests it remains to 0. > > > > > > > > So yes I am masking this out mainly for belt-and-braces and legibility. > > > > > > Thanks for the clarification. > > > > > > > > > > > > > + if (!advk_pcie_link_up(pcie)) > > > > > > + val |= (PCI_EXP_LNKSTA_LT << 16); > > > > > > + *value = val; > > > > > > + return PCI_BRIDGE_EMUL_HANDLED; > > > > > > + } > > > > > > + > > > > > > case PCI_CAP_LIST_ID: > > > > > > case PCI_EXP_DEVCAP: > > > > > > case PCI_EXP_DEVCTL: > > > > > > case PCI_EXP_LNKCAP: > > > > > > - case PCI_EXP_LNKCTL: > > > > > > *value = advk_readl(pcie, PCIE_CORE_PCIEXP_CAP + reg); > > > > > > return PCI_BRIDGE_EMUL_HANDLED; > > > > > > default: > > > > > > @@ -447,8 +469,13 @@ advk_pci_bridge_emul_pcie_conf_write(struct pci_bridge_emul *bridge, > > > > > > > > > > > > switch (reg) { > > > > > > case PCI_EXP_DEVCTL: > > > > > > + advk_writel(pcie, new, PCIE_CORE_PCIEXP_CAP + reg); > > > > > > + break; > > > > > > > > > > Why is this here? > > > > > > > > > > > > > Before PCI_EXP_DEVCTL and PCI_EXP_LNKCTL were doing the same thing, but > > > > as now PCI_EXP_LNKCTL does extra things (i.e. wait for link to > > > > successfully retrain), they do have different behaviours. > > > > > > > > So this is here so PCI_EXP_DEVCTL keeps its old behaviour and do not > > > > wait for link retrain in case an unrelated (PCI_EXP_LNKCTL_RL) bit is > > > > set. > > > > > > Oh yes, of course! > > > > > > Thanks and: > > > > > > Reviewed-by: Andrew Murray > > > > Is there any hope for this workaround to make it into 5.4? > > > > My EspressoBin (which is blessed with this joke of a PCIe controller) > > is pretty much a doorstop without it and dies with a SError early at > > boot. > > > > FWIW: > > > > Tested-by: Marc Zyngier > > Hi Marc, > > First thing I will have to mark it as a Fixes: (if Remi can provide > me with a tag that'd be great), usually we send fixes at -rc* for > patches that fix code that went in the current (eg 5.4) material, > I will ask Bjorn to see if we can send this in one of the upcoming > -rc* even if it fixes older code. Sure, I think this could be considered a fix for the following commit : Fixes: 8a3ebd8de328 ("PCI: aardvark: Implement emulated root PCI bridge config space") Moreover, Marc, I am also a bit supprised that you did not have to use [1] to even be able to boot. Also if you want to be completely immune to this kind of SError (that could theoretically happen if the link goes down for other reasons than being retrained) you would have to use mainline ATF along with [2]. But the chances to hit that are low (could only happen in case of link errors). [1] [v3] PCI: aardvark: Use LTSSM state to build link training flag https://patchwork.ozlabs.org/patch/1115864/ [2] [v3] PCI: aardvark: Don't rely on jiffies while holding spinlock https://patchwork.ozlabs.org/patch/1168349/ -- Remi