Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp206183pxf; Thu, 25 Mar 2021 02:02:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwI06uYQDvwpGzz2yAehU+RQjV8Cap4pjvB5HVFfkjR7pX0pQqd+CsFw673DCJ+G9cPYuET X-Received: by 2002:a7b:cf11:: with SMTP id l17mr6711314wmg.128.1616662978395; Thu, 25 Mar 2021 02:02:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616662978; cv=none; d=google.com; s=arc-20160816; b=FkKJHJxgnSl/Jbe7wuDVs+DANGEidl5hdHxFoqP99Pb8f1VEzV1Bafkyx/TxTjdmXW FqeKa2yz7gxSjRW+KbT/6G5zZUPZqpyGuI7OxeWPT9BFH8JhBSKLe41Yz9NQatNiWh1c r/Ghg9eCfBOxFG5NceS2xFWWh7czroZybCTLD+QyFVvEAPkvGT7EdAy+8qRBXlwm57cS 2NjHnuagU8kGLnBisxi5TJk8gu6XvFtCfTG/KL14QymXSJVA8Q9298SIiL8XKRwQ8DSj F5gh4ZDd205QsH+65icN8d6qXkJV6kEXt6jZROg8Ue5gCNkTLg3527TfUs6QfAh3XC4l 2qYg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=ExpgZ6jri5aKrfzIk/qutKm65aR1bRdGd7julUa6edQ=; b=AtPndSSyFYROy8cydFXUmp3tExb11OqxaMQOaAlp+Ugd69LOkgxkPAG1g8FUD4/Jnl C1IXNSXplYQpZ8sq3g5/5qzrqmTkfhb609TPqhOyUscef/3beLtETp0t0JFSO+uSiAGm UnQrrD3BHrOldeMhcxf1AO+6IKR6wOtbvGtTdtJxZzEjkNgyvGmPn4ulfJQ8poXDKi6R VKkFvAAW9xkW6Iy+xGZK9DhWS7XFcji+pNH5wALKSKjlL/gnN9fKRnK/s5K9coRR14n7 jiZ1nOH2HaGMvliys8KSQx8nB+xAjeEklOyU2obFb2kvLl/i9HjurJ2PTVyy92UfoaCh 72Kg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b=PCDVgU9B; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id hr7si3969551ejc.596.2021.03.25.02.02.35; Thu, 25 Mar 2021 02:02:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b=PCDVgU9B; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230008AbhCYJBQ (ORCPT + 99 others); Thu, 25 Mar 2021 05:01:16 -0400 Received: from fllv0016.ext.ti.com ([198.47.19.142]:49494 "EHLO fllv0016.ext.ti.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229889AbhCYJBF (ORCPT ); Thu, 25 Mar 2021 05:01:05 -0400 Received: from fllv0034.itg.ti.com ([10.64.40.246]) by fllv0016.ext.ti.com (8.15.2/8.15.2) with ESMTP id 12P90uB2035081; Thu, 25 Mar 2021 04:00:56 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com; s=ti-com-17Q1; t=1616662856; bh=ExpgZ6jri5aKrfzIk/qutKm65aR1bRdGd7julUa6edQ=; h=From:To:CC:Subject:Date:In-Reply-To:References; b=PCDVgU9BlNPXt4roC7SMP0y2qNFHUtwO7Zqpx2XoOlC4vYmnBFYdo5jNLjKYFT6LT UeKz2ONOw8oL8dD5GxeNcedIMcLQx/wIb/AgOaW9ywUB6EVZQvnMW+qOt8gAkrnl8Y uA7v5PdvFiyw52lVYrlTawMKGIGJwDrel0lGuI1U= Received: from DFLE105.ent.ti.com (dfle105.ent.ti.com [10.64.6.26]) by fllv0034.itg.ti.com (8.15.2/8.15.2) with ESMTPS id 12P90ue3008917 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 25 Mar 2021 04:00:56 -0500 Received: from DFLE104.ent.ti.com (10.64.6.25) by DFLE105.ent.ti.com (10.64.6.26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2176.2; Thu, 25 Mar 2021 04:00:56 -0500 Received: from lelv0326.itg.ti.com (10.180.67.84) by DFLE104.ent.ti.com (10.64.6.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2176.2 via Frontend Transport; Thu, 25 Mar 2021 04:00:56 -0500 Received: from a0393678-ssd.dhcp.ti.com (ileax41-snat.itg.ti.com [10.172.224.153]) by lelv0326.itg.ti.com (8.15.2/8.15.2) with ESMTP id 12P90RkD115556; Thu, 25 Mar 2021 04:00:53 -0500 From: Kishon Vijay Abraham I To: Kishon Vijay Abraham I , Bjorn Helgaas , Rob Herring , Lorenzo Pieralisi , Marc Zyngier CC: , , , , Lokesh Vutla Subject: [PATCH 6/6] PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) Date: Thu, 25 Mar 2021 14:30:26 +0530 Message-ID: <20210325090026.8843-7-kishon@ti.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210325090026.8843-1-kishon@ti.com> References: <20210325090026.8843-1-kishon@ti.com> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-EXCLAIMER-MD-CONFIG: e1e8a2fd-e40a-4ac6-ac9b-f7e9cc9ee180 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Errata #i2037 in AM65x/DRA80xM Processors Silicon Revision 1.0 (SPRZ452D–July 2018–Revised December 2019 [1]) mentions when an inbound PCIe TLP spans more than two internal AXI 128-byte bursts, the bus may corrupt the packet payload and the corrupt data may cause associated applications or the processor to hang. The workaround for Errata #i2037 is to limit the maximum read request size and maximum payload size to 128 Bytes. Add workaround for Errata #i2037 here. The errata and workaround is applicable only to AM65x SR 1.0 and later versions of the silicon will have this fixed. [1] -> http://www.ti.com/lit/er/sprz452d/sprz452d.pdf Signed-off-by: Kishon Vijay Abraham I --- drivers/pci/controller/dwc/pci-keystone.c | 42 +++++++++++++++++++++++ 1 file changed, 42 insertions(+) diff --git a/drivers/pci/controller/dwc/pci-keystone.c b/drivers/pci/controller/dwc/pci-keystone.c index 84a25207d0d3..80b6e874199d 100644 --- a/drivers/pci/controller/dwc/pci-keystone.c +++ b/drivers/pci/controller/dwc/pci-keystone.c @@ -35,6 +35,11 @@ #define PCIE_DEVICEID_SHIFT 16 /* Application registers */ +#define PID 0x000 +#define RTL GENMASK(15, 11) +#define RTL_SHIFT 11 +#define AM6_PCI_PG1_RTL_VER 0x15 + #define CMD_STATUS 0x004 #define LTSSM_EN_VAL BIT(0) #define OB_XLAT_EN_VAL BIT(1) @@ -106,6 +111,8 @@ #define to_keystone_pcie(x) dev_get_drvdata((x)->dev) +#define PCI_DEVICE_ID_TI_AM654X 0xb00c + struct ks_pcie_of_data { enum dw_pcie_device_mode mode; const struct dw_pcie_host_ops *host_ops; @@ -619,7 +626,11 @@ static int ks_pcie_start_link(struct dw_pcie *pci) static void ks_pcie_quirk(struct pci_dev *dev) { struct pci_bus *bus = dev->bus; + struct keystone_pcie *ks_pcie; + struct device *bridge_dev; struct pci_dev *bridge; + u32 val; + static const struct pci_device_id rc_pci_devids[] = { { PCI_DEVICE(PCI_VENDOR_ID_TI, PCIE_RC_K2HK), .class = PCI_CLASS_BRIDGE_PCI << 8, .class_mask = ~0, }, @@ -631,6 +642,11 @@ static void ks_pcie_quirk(struct pci_dev *dev) .class = PCI_CLASS_BRIDGE_PCI << 8, .class_mask = ~0, }, { 0, }, }; + static const struct pci_device_id am6_pci_devids[] = { + { PCI_DEVICE(PCI_VENDOR_ID_TI, PCI_DEVICE_ID_TI_AM654X), + .class = PCI_CLASS_BRIDGE_PCI << 8, .class_mask = ~0, }, + { 0, }, + }; if (pci_is_root_bus(bus)) bridge = dev; @@ -656,6 +672,32 @@ static void ks_pcie_quirk(struct pci_dev *dev) pcie_set_readrq(dev, 256); } } + + /* + * Memory transactions fail with PCI controller in AM654 PG1.0 + * when MRRS is set to more than 128 Bytes. Force the MRRS to + * 128 Bytes in all downstream devices. + */ + if (pci_match_id(am6_pci_devids, bridge)) { + bridge_dev = pci_get_host_bridge_device(dev); + if (!bridge_dev && !bridge_dev->parent) + return; + + ks_pcie = dev_get_drvdata(bridge_dev->parent); + if (!ks_pcie) + return; + + val = ks_pcie_app_readl(ks_pcie, PID); + val &= RTL; + val >>= RTL_SHIFT; + if (val != AM6_PCI_PG1_RTL_VER) + return; + + if (pcie_get_readrq(dev) > 128) { + dev_info(&dev->dev, "limiting MRRS to 128\n"); + pcie_set_readrq(dev, 128); + } + } } DECLARE_PCI_FIXUP_ENABLE(PCI_ANY_ID, PCI_ANY_ID, ks_pcie_quirk); -- 2.17.1