Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp593019pxv; Thu, 22 Jul 2021 07:43:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJygaij5CkbquxB0OC1pVYPgmOV7Jo1pRaBgOwPKP8Frt5wnuKranRiHHh6Q5zjVMAL92epE X-Received: by 2002:a05:6402:1d49:: with SMTP id dz9mr54585927edb.301.1626965039684; Thu, 22 Jul 2021 07:43:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626965039; cv=none; d=google.com; s=arc-20160816; b=trHaB0SELynwb4KvH4bfD05A/tF7bboN0i4wyrGHP2LG9mJUq8AqsUsyn/L6cDJfLT yNicgp2uCAgWnLVajFF8VcDa8utTR5x7xtyzUVXZhdmyyFOX5imauZLRbmYZS6hzhvxw Wv6OyRvqZBwnQuCXxBzLMG+IYUo+SH77GxDFdRqLcNQissseLzfW6J8Y5wTgD0gWW6r1 JVP3UJRvcvb/vqgaJxVdTZAYqY+XRP0r6xcL2/B4yE14HmPaIOhZbkqmD2/g3K59vGjA sdvdLcvL9p8CHhyxmf9kYXrpHUJXaFgCiPen2M+bq27A4fWMTPHf4uQH+r/S+qCumtcq K5Yw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=uy8S+Gd7c/O2EvLJfcCAARb599NSCCr/xb/usM7Cwr8=; b=Rx+ZFId513qBSnXIzQCxklUbTHaDmts1mrhsRWBrn280yXKnOHLlzexdbFyQFkeYVj D5XIl415yz8KgGYKsf3GPrjPiH8+clgFbRjTetUubu63jdXoSSxOJQ485eVbI6QYQ7Md 9VZptC5UFjs/cfBZytY46jwYeYIeOgX8YlFX5niasZc6RHFuro3nI+JP9yzJqAS6po1i vqVUu3XAHbqU4gAgOSrtd5UxpzDv7N3QbqZfGslHyDWeYyleMNLP4FHtmpEeD6JhzJRK UtBSkmEyd7b/kX3BAIroWgD2jCw05pi9ZHx9yAVFFn5OtY72J0207yKFdFaq6BLUnzYH MOKQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=EcrxJBfP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e21si30959771ejd.669.2021.07.22.07.43.35; Thu, 22 Jul 2021 07:43:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=EcrxJBfP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232447AbhGVOAN (ORCPT + 99 others); Thu, 22 Jul 2021 10:00:13 -0400 Received: from mail.kernel.org ([198.145.29.99]:47592 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231374AbhGVOAL (ORCPT ); Thu, 22 Jul 2021 10:00:11 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id D412F6120D; Thu, 22 Jul 2021 14:40:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1626964846; bh=9tR+kRwyug5hAo8l1aHHZ0emwfS+l+16NwfPpvcJKF8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=EcrxJBfPY7jMYJkTX5AQip5uVW8EfvWcsZZOoZuSHlraqspVCHo/rhvrNdgbxO8YE 8TxsM92bH4xqOq+XTF4eKJZt4VQmw9RW9yG6LdrS+JlKwMnO8mTlB3OxlZEw3p6fRf IQ23jW0cAqKcT92VN90IySobX0KpL+k9ko7XsgdhU8pmg5fGHRPHzItMaolHQxNSul aZdKbUfhDM0MAd8g0VVLnksyZYZ1qgdXcx24S1Esay27f3hxNK2Ci2oKHWZnAinxlX nrfr5/TmdZk03FCd/f5HROAnqeUVFPNb7Rl4gKsePNyGlJ8CZDpedlQSUI4e0mt7TG qqGWTglXqt1uQ== Received: by pali.im (Postfix) id DA36112D9; Thu, 22 Jul 2021 16:40:43 +0200 (CEST) From: =?UTF-8?q?Pali=20Roh=C3=A1r?= To: Lorenzo Pieralisi , Thomas Petazzoni , Bjorn Helgaas Cc: =?UTF-8?q?Marek=20Beh=C3=BAn?= , linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, Evan Wang , Victor Gu Subject: [PATCH v2 1/4] PCI: aardvark: Fix checking for PIO status Date: Thu, 22 Jul 2021 16:40:38 +0200 Message-Id: <20210722144041.12661-2-pali@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210722144041.12661-1-pali@kernel.org> References: <20210624213345.3617-1-pali@kernel.org> <20210722144041.12661-1-pali@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Evan Wang There is an issue that when PCIe switch is connected to an Armada 3700 board, there will be lots of warnings about PIO errors when reading the config space. According to Aardvark PIO read and write sequence in HW specification, the current way to check PIO status has the following issues: 1) For PIO read operation, it reports the error message, which should be avoided according to HW specification. 2) For PIO read and write operations, it only checks PIO operation complete status, which is not enough, and error status should also be checked. This patch aligns the code with Aardvark PIO read and write sequence in HW specification on PIO status check and fix the warnings when reading config space. Signed-off-by: Evan Wang Reviewed-by: Victor Gu Tested-by: Victor Gu [pali: Fix CRS handling when CRSSVE is not enabled] Signed-off-by: Pali Rohár Reviewed-by: Marek Behún Cc: stable@vger.kernel.org # b1bd5714472c ("PCI: aardvark: Indicate error in 'val' when config read fails") --- Changes in v2: * Fixed CRS handling when CRSSVE is not enabled (which is by default as support for CRSSVE is in followup patch) --- drivers/pci/controller/pci-aardvark.c | 62 +++++++++++++++++++++++---- 1 file changed, 54 insertions(+), 8 deletions(-) diff --git a/drivers/pci/controller/pci-aardvark.c b/drivers/pci/controller/pci-aardvark.c index 2f8380a1f84f..a74ac8addeae 100644 --- a/drivers/pci/controller/pci-aardvark.c +++ b/drivers/pci/controller/pci-aardvark.c @@ -58,6 +58,7 @@ #define PIO_COMPLETION_STATUS_CRS 2 #define PIO_COMPLETION_STATUS_CA 4 #define PIO_NON_POSTED_REQ BIT(10) +#define PIO_ERR_STATUS BIT(11) #define PIO_ADDR_LS (PIO_BASE_ADDR + 0x8) #define PIO_ADDR_MS (PIO_BASE_ADDR + 0xc) #define PIO_WR_DATA (PIO_BASE_ADDR + 0x10) @@ -461,7 +462,7 @@ static void advk_pcie_setup_hw(struct advk_pcie *pcie) advk_writel(pcie, reg, PCIE_CORE_CMD_STATUS_REG); } -static void advk_pcie_check_pio_status(struct advk_pcie *pcie) +static int advk_pcie_check_pio_status(struct advk_pcie *pcie, u32 *val) { struct device *dev = &pcie->pdev->dev; u32 reg; @@ -472,14 +473,49 @@ static void advk_pcie_check_pio_status(struct advk_pcie *pcie) status = (reg & PIO_COMPLETION_STATUS_MASK) >> PIO_COMPLETION_STATUS_SHIFT; - if (!status) - return; - + /* + * According to HW spec, the PIO status check sequence as below: + * 1) even if COMPLETION_STATUS(bit9:7) indicates successful, + * it still needs to check Error Status(bit11), only when this bit + * indicates no error happen, the operation is successful. + * 2) value Unsupported Request(1) of COMPLETION_STATUS(bit9:7) only + * means a PIO write error, and for PIO read it is successful with + * a read value of 0xFFFFFFFF. + * 3) value Completion Retry Status(CRS) of COMPLETION_STATUS(bit9:7) + * only means a PIO write error, and for PIO read it is successful + * with a read value of 0xFFFF0001. + * 4) value Completer Abort (CA) of COMPLETION_STATUS(bit9:7) means + * error for both PIO read and PIO write operation. + * 5) other errors are indicated as 'unknown'. + */ switch (status) { + case PIO_COMPLETION_STATUS_OK: + if (reg & PIO_ERR_STATUS) { + strcomp_status = "COMP_ERR"; + break; + } + /* Get the read result */ + if (val) + *val = advk_readl(pcie, PIO_RD_DATA); + /* No error */ + strcomp_status = NULL; + break; case PIO_COMPLETION_STATUS_UR: strcomp_status = "UR"; break; case PIO_COMPLETION_STATUS_CRS: + /* PCIe r4.0, sec 2.3.2, says: + * If CRS Software Visibility is not enabled, the Root Complex + * must re-issue the Configuration Request as a new Request. + * A Root Complex implementation may choose to limit the number + * of Configuration Request/CRS Completion Status loops before + * determining that something is wrong with the target of the + * Request and taking appropriate action, e.g., complete the + * Request to the host as a failed transaction. + * + * To simplify implementation do not re-issue the Configuration + * Request and complete the Request as a failed transaction. + */ strcomp_status = "CRS"; break; case PIO_COMPLETION_STATUS_CA: @@ -490,6 +526,9 @@ static void advk_pcie_check_pio_status(struct advk_pcie *pcie) break; } + if (!strcomp_status) + return 0; + if (reg & PIO_NON_POSTED_REQ) str_posted = "Non-posted"; else @@ -497,6 +536,8 @@ static void advk_pcie_check_pio_status(struct advk_pcie *pcie) dev_err(dev, "%s PIO Response Status: %s, %#x @ %#x\n", str_posted, strcomp_status, reg, advk_readl(pcie, PIO_ADDR_LS)); + + return -EFAULT; } static int advk_pcie_wait_pio(struct advk_pcie *pcie) @@ -734,10 +775,13 @@ static int advk_pcie_rd_conf(struct pci_bus *bus, u32 devfn, return PCIBIOS_SET_FAILED; } - advk_pcie_check_pio_status(pcie); + /* Check PIO status and get the read result */ + ret = advk_pcie_check_pio_status(pcie, val); + if (ret < 0) { + *val = 0xffffffff; + return PCIBIOS_SET_FAILED; + } - /* Get the read result */ - *val = advk_readl(pcie, PIO_RD_DATA); if (size == 1) *val = (*val >> (8 * (where & 3))) & 0xff; else if (size == 2) @@ -801,7 +845,9 @@ static int advk_pcie_wr_conf(struct pci_bus *bus, u32 devfn, if (ret < 0) return PCIBIOS_SET_FAILED; - advk_pcie_check_pio_status(pcie); + ret = advk_pcie_check_pio_status(pcie, NULL); + if (ret < 0) + return PCIBIOS_SET_FAILED; return PCIBIOS_SUCCESSFUL; } -- 2.20.1