Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp2997263ybg; Thu, 24 Oct 2019 19:39:11 -0700 (PDT) X-Google-Smtp-Source: APXvYqyW2DoOZusOxYBnQafiam20Ypp1ODxh3JsVGcxcEowS4JjwnLI8DSxu8A4vHmCxSjEFxQcT X-Received: by 2002:a05:6402:28e:: with SMTP id l14mr1468836edv.70.1571971151372; Thu, 24 Oct 2019 19:39:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571971151; cv=none; d=google.com; s=arc-20160816; b=kjZKflCXROqWdoZB5/6yCHQgiOlS+kEMrpQ6LjwSt6Rq6tLI3V4j/YGgfhsTiOV3J/ ld1EWksxRtjp4QaaIxkeantSOmA4kkxwHo5RmHV38jyR+VIYS33tehBvJykGjD+4Nxy/ UK3e8cMYg5IX/I+W0zPTZPHa50WnItT2AdKMjv4FSB1EygtiFcnkrpn7OlOAqG8l0EVf Zm3RwWpTAmqgAXtLUnotNonSEMH8FL1t363CPwduMsPkb+zPNUoU2fXBYs8A2IVqYxZ8 cBB/dMDxgHWoEhLLMyYEdVa9fnade8RJFMzZhWv19rA2khDbmBK/4gcWfXPQ4wUP3kGp /soA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=B48Ic/WJodnFTgpxPwA1iCUBrO92cT6uUMub6pzkK9g=; b=hsjMB9XwDuo91qzk1M4S7fpvbXuavTMv/tOs+pVyPydTa4wseJ+PkYANSTKC3gdr4H BSpIhXYTzncQdkMRzFLieAmnwb3x+ZCD7tLiKdtN86ssAxWJxLECtFUUQVhewuTelrwe t8J8j+obh30axSb7+rZ8Kwy09xPkvnRGze+ubbwM1APGuGfkBGuk+d2xCz8RxQ/qODrl es8oXdrMMIm4KDUjknT9rvRTEJGHkpU7rbgQBupVQkAyLF+5pMHSTCIT/Z1VpJNPHj9Q jKbIJnUuIPALCUSwjgMqAdpRZ8jebR41fIqwt6if6GTyAW8KkjHBzfNKS4sCJbs7dDZh RZaA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u1si418980ejt.18.2019.10.24.19.38.32; Thu, 24 Oct 2019 19:39:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2438362AbfJXIsm (ORCPT + 99 others); Thu, 24 Oct 2019 04:48:42 -0400 Received: from foss.arm.com ([217.140.110.172]:43260 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730201AbfJXIsl (ORCPT ); Thu, 24 Oct 2019 04:48:41 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 104DE31F; Thu, 24 Oct 2019 01:48:26 -0700 (PDT) Received: from e121166-lin.cambridge.arm.com (unknown [10.1.196.255]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id E568C3F718; Thu, 24 Oct 2019 01:48:24 -0700 (PDT) Date: Thu, 24 Oct 2019 09:48:18 +0100 From: Lorenzo Pieralisi To: Abhishek Shah Cc: Bjorn Helgaas , Ray Jui , Scott Branden , linux-pci@vger.kernel.org, linux-arm-kernel , open list , BCM Kernel Feedback Subject: Re: [PATCH 1/1] PCI: iproc: Invalidate PAXB address mapping before programming it Message-ID: <20191024084818.GA22148@e121166-lin.cambridge.arm.com> References: <20190906035813.24046-1-abhishek.shah@broadcom.com> <20191015164303.GC25674@e121166-lin.cambridge.arm.com> <20191021103808.GA29528@e121166-lin.cambridge.arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Oct 24, 2019 at 08:52:41AM +0530, Abhishek Shah wrote: > On Mon, Oct 21, 2019 at 4:08 PM Lorenzo Pieralisi > wrote: > > > > On Thu, Oct 17, 2019 at 07:57:56PM +0530, Abhishek Shah wrote: > > > Hi Lorenzo, > > > > > > Please see my comments inline: > > > > > > On Tue, Oct 15, 2019 at 10:13 PM Lorenzo Pieralisi > > > wrote: > > > > > > > > On Fri, Sep 06, 2019 at 09:28:13AM +0530, Abhishek Shah wrote: > > > > > Invalidate PAXB inbound/outbound address mapping each time before > > > > > programming it. This is helpful for the cases where we need to > > > > > reprogram inbound/outbound address mapping without resetting PAXB. > > > > > kexec kernel is one such example. > > > > > > > > This looks like a hack, explain to us please what it actually solves and > > > > why a full reset is not necessary. > > > > > > > The PAXB IP performs address translation(PCI<->AXI address) for both inbound and > > > outbound addresses (amongst other things) based on version of IP being used. > > > It does so using the IMAP/IARR/OMAP/OARR registers. > > > > > > These registers get programmed as per mappings specified in device tree during > > > PCI driver probe for each RC and do not get reset when kexec/kdump kernel boots. > > > This results in driver assuming valid mappings in place for some mapping windows > > > during kexec/kdump kernel boot, consequently it skips those windows and > > > we run out of available mapping windows, leading to mapping failure. > > > > > > Normally, we take care of resetting PAXB block in firmware, but in > > > primary kernel to kexec/kdump kernel handover, no firmware is executed > > > in between. So, we just, by default, invalidate the mapping registers > > > each time before > > > programming them to solve the issue described above.. > > > We do not need full reset for handling this. > > > > I see. A simple bitmap to detect which windows are *actually* > > programmed by the current kernel (that can be used by > > > > iproc_pcie_ob_is_valid() > > > > to carry out a valid check) would do as well instead of having to > > invalidate all the OB registers. > > > Okay, so you are suggesting to use variable/bitmap to hold status of > ib/ob windows (mapped/unmapped) instead of using registers to check > it. Please note that we would still be programming corresponding > window register to mark it valid (HW requirement). It is your choice. > @Ray, could you please provide feedback on this? I think existing way > is proper for given driver design. > > Also, as internal review tags are irrelevant as suggested by Lorenzo > earlier, could you please put sign again once reviewed? Yes please, repost (with the solution you prefer) and Ray please tag accordingly on ML. Thanks, Lorenzo > Regards, > Abhishek > > > It is up to you, let me know and I will merge code accordingly. > > > > Lorenzo > > > > > > > Signed-off-by: Abhishek Shah > > > > > Reviewed-by: Ray Jui > > > > > Reviewed-by: Vikram Mysore Prakash > > > > > > > > Patches are reviewed on public mailing lists, remove tags given > > > > on internal reviews - they are not relevant. > > > > > > > Ok, will remove. > > > > > > > > --- > > > > > drivers/pci/controller/pcie-iproc.c | 28 ++++++++++++++++++++++++++++ > > > > > 1 file changed, 28 insertions(+) > > > > > > > > > > diff --git a/drivers/pci/controller/pcie-iproc.c b/drivers/pci/controller/pcie-iproc.c > > > > > index e3ca46497470..99a9521ba7ab 100644 > > > > > --- a/drivers/pci/controller/pcie-iproc.c > > > > > +++ b/drivers/pci/controller/pcie-iproc.c > > > > > @@ -1245,6 +1245,32 @@ static int iproc_pcie_map_dma_ranges(struct iproc_pcie *pcie) > > > > > return ret; > > > > > } > > > > > > > > > > +static void iproc_pcie_invalidate_mapping(struct iproc_pcie *pcie) > > > > > +{ > > > > > + struct iproc_pcie_ib *ib = &pcie->ib; > > > > > + struct iproc_pcie_ob *ob = &pcie->ob; > > > > > + int idx; > > > > > + > > > > > + if (pcie->ep_is_internal) > > > > > > > > What's this check for and why leaving mappings in place is safe for > > > > this category of IPs ? > > > For this category of IP(PAXC), no mappings need to be programmed in > > > the first place. > > > > > > > > > > > > + return; > > > > > + > > > > > + if (pcie->need_ob_cfg) { > > > > > + /* iterate through all OARR mapping regions */ > > > > > + for (idx = ob->nr_windows - 1; idx >= 0; idx--) { > > > > > + iproc_pcie_write_reg(pcie, > > > > > + MAP_REG(IPROC_PCIE_OARR0, idx), 0); > > > > > + } > > > > > + } > > > > > + > > > > > + if (pcie->need_ib_cfg) { > > > > > + /* iterate through all IARR mapping regions */ > > > > > + for (idx = 0; idx < ib->nr_regions; idx++) { > > > > > + iproc_pcie_write_reg(pcie, > > > > > + MAP_REG(IPROC_PCIE_IARR0, idx), 0); > > > > > + } > > > > > + } > > > > > +} > > > > > + > > > > > static int iproce_pcie_get_msi(struct iproc_pcie *pcie, > > > > > struct device_node *msi_node, > > > > > u64 *msi_addr) > > > > > @@ -1517,6 +1543,8 @@ int iproc_pcie_setup(struct iproc_pcie *pcie, struct list_head *res) > > > > > iproc_pcie_perst_ctrl(pcie, true); > > > > > iproc_pcie_perst_ctrl(pcie, false); > > > > > > > > > > + iproc_pcie_invalidate_mapping(pcie); > > > > > > > > It makes more sense to call this in the .shutdown() method if I > > > > understand what it does. > > > > > > > It would work for kexec kernel, but not for kdump kernel as only for > > > kexec'ed kernel, > > > "device_shutdown" callback is present. We are here taking care of both the cases > > > with this patch. > > > > > > > > > Regards, > > > Abhishek > > > > > > > Lorenzo > > > > > > > > > if (pcie->need_ob_cfg) { > > > > > ret = iproc_pcie_map_ranges(pcie, res); > > > > > if (ret) { > > > > > -- > > > > > 2.17.1 > > > > >