Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp3729575pxb; Mon, 4 Oct 2021 08:23:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwLvVt+8XQAKqr1oocXddlPZ/CpSQ/LcSGRlNIgETjmtOqEV3O8tRCbHtHwBH4cZjQqsjDH X-Received: by 2002:a63:df0d:: with SMTP id u13mr11460132pgg.417.1633361028033; Mon, 04 Oct 2021 08:23:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633361028; cv=none; d=google.com; s=arc-20160816; b=fkYUe4pV2Jy01rw2Wa0Rp2oO1yK4Y7UGsPOqgzgu4t/u6iQo/TJNkDGiKeulAXBSZm G2gtK7d9qfpsV9WjIjk/GiZDypQQoWEz+f9V+ql82eklGEHClS6gvcloygAgUjwiYEuE UVRH84GNgeacc5/QLaYLIRrUH8GTlE0dlV7AAoe6ArwYnS3M44+qwAA4CxeRRdNjCdxr EYpx5bLc0huY4kPlJ1bkEUq1NoU7qgB7bfQaij+fWVtxifBqaWZxE50LCTCBhJhjqNWp bUwC4wAMk+LDkhqGmwjBBuytUwf3X7k31Edp9NMNcg8Vt5kXOJ99+Dtd29wGrN0F+btW Zb4A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Y9nrK2M8bqI+5ZFHgW41GRM+gmOzS3ALu6DVI2+Gzo4=; b=elQ+fkJQiOd5hV3YHKaj5hQ417faBCHrG7QBHjEsobfpLeAClUySon/QwzD1OMlOtj 3nPlUyDBrSn2TeuGbTojAQgHG6lbUDEW9FnZE9BqgVI256qVxqHhjQTj+HwwIRRMCX7r lDFumNxWnjD7OENH7hufTQOSY3GZjmSAhCcSqAKZXMSSO/UFAkUHhrwyNYLAG2tkbi0J vWsbDw1JSIIr6K7kQD+4ososPVqrNxzZD+PLzfNxCCHRM60up1KzBgbK2jmb8BUkrsVE q+7ZfMROYz0yVuQ7s85rq0x7rQvy7dIuK2mEYnvzyVxTQodaZdipIB4s9HFl+uSyX6SW dtpA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=O0wJkWXX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u6si21026960pfk.23.2021.10.04.08.23.24; Mon, 04 Oct 2021 08:23:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=O0wJkWXX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234279AbhJDNLx (ORCPT + 99 others); Mon, 4 Oct 2021 09:11:53 -0400 Received: from mail.kernel.org ([198.145.29.99]:46566 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235277AbhJDNJO (ORCPT ); Mon, 4 Oct 2021 09:09:14 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id A9CDC61B26; Mon, 4 Oct 2021 13:03:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1633352602; bh=a1zDJQagVkTNOsCzhgbuKwxLpzOKPEaeeOtm2Xbxqbw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=O0wJkWXXyRyiywGkUudqngDRnJ/5aeKyDEQlpEHSblhVYcja49x0HZZoiRyR/kfFb ux0AaqR7PiUbR2TTTkjCZkQqKAewDudFQjWvsNRxtdaydX39CiZQ9NVjJEV8PyG+IQ vFUfHobF6hyD3bYBEbN9T61BhxKVfQ6dnhLVOv+4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Victor Gu , Evan Wang , =?UTF-8?q?Pali=20Roh=C3=A1r?= , Lorenzo Pieralisi , =?UTF-8?q?Marek=20Beh=C3=BAn?= Subject: [PATCH 4.19 49/95] PCI: aardvark: Fix checking for PIO status Date: Mon, 4 Oct 2021 14:52:19 +0200 Message-Id: <20211004125035.180678965@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20211004125033.572932188@linuxfoundation.org> References: <20211004125033.572932188@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Evan Wang commit fcb461e2bc8b83b7eaca20cb2221e8b940f2189c upstream. There is an issue that when PCIe switch is connected to an Armada 3700 board, there will be lots of warnings about PIO errors when reading the config space. According to Aardvark PIO read and write sequence in HW specification, the current way to check PIO status has the following issues: 1) For PIO read operation, it reports the error message, which should be avoided according to HW specification. 2) For PIO read and write operations, it only checks PIO operation complete status, which is not enough, and error status should also be checked. This patch aligns the code with Aardvark PIO read and write sequence in HW specification on PIO status check and fix the warnings when reading config space. [pali: Fix CRS handling when CRSSVE is not enabled] Link: https://lore.kernel.org/r/20210722144041.12661-2-pali@kernel.org Tested-by: Victor Gu Signed-off-by: Evan Wang Signed-off-by: Pali Rohár Signed-off-by: Lorenzo Pieralisi Reviewed-by: Victor Gu Reviewed-by: Marek Behún Cc: stable@vger.kernel.org # b1bd5714472c ("PCI: aardvark: Indicate error in 'val' when config read fails") Signed-off-by: Greg Kroah-Hartman --- drivers/pci/controller/pci-aardvark.c | 62 +++++++++++++++++++++++++++++----- 1 file changed, 54 insertions(+), 8 deletions(-) --- a/drivers/pci/controller/pci-aardvark.c +++ b/drivers/pci/controller/pci-aardvark.c @@ -55,6 +55,7 @@ #define PIO_COMPLETION_STATUS_CRS 2 #define PIO_COMPLETION_STATUS_CA 4 #define PIO_NON_POSTED_REQ BIT(10) +#define PIO_ERR_STATUS BIT(11) #define PIO_ADDR_LS (PIO_BASE_ADDR + 0x8) #define PIO_ADDR_MS (PIO_BASE_ADDR + 0xc) #define PIO_WR_DATA (PIO_BASE_ADDR + 0x10) @@ -330,7 +331,7 @@ static void advk_pcie_setup_hw(struct ad advk_writel(pcie, reg, PCIE_CORE_CMD_STATUS_REG); } -static void advk_pcie_check_pio_status(struct advk_pcie *pcie) +static int advk_pcie_check_pio_status(struct advk_pcie *pcie, u32 *val) { struct device *dev = &pcie->pdev->dev; u32 reg; @@ -341,14 +342,49 @@ static void advk_pcie_check_pio_status(s status = (reg & PIO_COMPLETION_STATUS_MASK) >> PIO_COMPLETION_STATUS_SHIFT; - if (!status) - return; - + /* + * According to HW spec, the PIO status check sequence as below: + * 1) even if COMPLETION_STATUS(bit9:7) indicates successful, + * it still needs to check Error Status(bit11), only when this bit + * indicates no error happen, the operation is successful. + * 2) value Unsupported Request(1) of COMPLETION_STATUS(bit9:7) only + * means a PIO write error, and for PIO read it is successful with + * a read value of 0xFFFFFFFF. + * 3) value Completion Retry Status(CRS) of COMPLETION_STATUS(bit9:7) + * only means a PIO write error, and for PIO read it is successful + * with a read value of 0xFFFF0001. + * 4) value Completer Abort (CA) of COMPLETION_STATUS(bit9:7) means + * error for both PIO read and PIO write operation. + * 5) other errors are indicated as 'unknown'. + */ switch (status) { + case PIO_COMPLETION_STATUS_OK: + if (reg & PIO_ERR_STATUS) { + strcomp_status = "COMP_ERR"; + break; + } + /* Get the read result */ + if (val) + *val = advk_readl(pcie, PIO_RD_DATA); + /* No error */ + strcomp_status = NULL; + break; case PIO_COMPLETION_STATUS_UR: strcomp_status = "UR"; break; case PIO_COMPLETION_STATUS_CRS: + /* PCIe r4.0, sec 2.3.2, says: + * If CRS Software Visibility is not enabled, the Root Complex + * must re-issue the Configuration Request as a new Request. + * A Root Complex implementation may choose to limit the number + * of Configuration Request/CRS Completion Status loops before + * determining that something is wrong with the target of the + * Request and taking appropriate action, e.g., complete the + * Request to the host as a failed transaction. + * + * To simplify implementation do not re-issue the Configuration + * Request and complete the Request as a failed transaction. + */ strcomp_status = "CRS"; break; case PIO_COMPLETION_STATUS_CA: @@ -359,6 +395,9 @@ static void advk_pcie_check_pio_status(s break; } + if (!strcomp_status) + return 0; + if (reg & PIO_NON_POSTED_REQ) str_posted = "Non-posted"; else @@ -366,6 +405,8 @@ static void advk_pcie_check_pio_status(s dev_err(dev, "%s PIO Response Status: %s, %#x @ %#x\n", str_posted, strcomp_status, reg, advk_readl(pcie, PIO_ADDR_LS)); + + return -EFAULT; } static int advk_pcie_wait_pio(struct advk_pcie *pcie) @@ -467,10 +508,13 @@ static int advk_pcie_rd_conf(struct pci_ if (ret < 0) return PCIBIOS_SET_FAILED; - advk_pcie_check_pio_status(pcie); + /* Check PIO status and get the read result */ + ret = advk_pcie_check_pio_status(pcie, val); + if (ret < 0) { + *val = 0xffffffff; + return PCIBIOS_SET_FAILED; + } - /* Get the read result */ - *val = advk_readl(pcie, PIO_RD_DATA); if (size == 1) *val = (*val >> (8 * (where & 3))) & 0xff; else if (size == 2) @@ -530,7 +574,9 @@ static int advk_pcie_wr_conf(struct pci_ if (ret < 0) return PCIBIOS_SET_FAILED; - advk_pcie_check_pio_status(pcie); + ret = advk_pcie_check_pio_status(pcie, NULL); + if (ret < 0) + return PCIBIOS_SET_FAILED; return PCIBIOS_SUCCESSFUL; }