Received: by 2002:a05:6a10:8395:0:0:0:0 with SMTP id n21csp174951pxh; Tue, 9 Nov 2021 23:35:34 -0800 (PST) X-Google-Smtp-Source: ABdhPJys6LeyDNVXJ6JjPw8/ji2DWL3MKx2GEUjNlaHeztWn8qhMNCiwufSLLrhHaSJbgqMDP6Kq X-Received: by 2002:a5d:9751:: with SMTP id c17mr9330967ioo.61.1636529734392; Tue, 09 Nov 2021 23:35:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1636529734; cv=none; d=google.com; s=arc-20160816; b=rK9/Mg3b+o0niG6SykSMPIZCzIc33r6XIqwWjKC56g0AFV2T4HX8syW7j9YOjD0kSK oSxSanmkxLYTc4EWwj6Yd2U1a3FryIvCh+6Woc7A95bHAqs/uSvNus1KI2OESx49k9Z3 Ktl/1hhk4JVh/7p4xOuXsvhJ9vFXxdN8iENAJOCceDSyJx/lUI/kIab9QaHfLBcJGK6s 5HhVgIkSxqD9hcW2U7DDGA9QEuSPvW/jiHpYLyzC6U4IQuQvGT/bRroCiHNWE7FOssU+ +X5exh1RaVXkCBeiOAuwKuyQrr6OAbSTYhNRYnqkUl34kQWiip5Iqmyyjhh40vqcB92K q2mg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=MEBUaleoK0z/qGjLb6abG3y1/ihAKFWw3z1FEVJfRDg=; b=qjB9+PwtiGHH50UjaPC7Vkt0oFF2Z6V9W9bT9jEViZCRxr4XC6lnLedRfbMxgQ8MJ4 H1078FVRjf3U8tR8jEIHJ8TkGs60J0KluVilZDDi70RUJCvXoHAl3TC16VQl28XAcjUB 3YLU8OCayVQQII/si34ERGHoUuPs2puCGJeFCUDLR3wc4f5eS4LU13idxpLf7YRhgPEx KrLVwRe0r65/PnDcGVmcx4/CzNIuuw5Ysw61XmP9SRZRCQjzgiI5RvF7lJ1BfyEI69E4 pf+JbCt6edcY1I++/cLZOeSWLQzLuNdW6yNg3N/Y0DZOxKUSJwkkLxjfTDu4XTMNVVpD V0IQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b=hPKhOSlg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m15si27697182jaj.25.2021.11.09.23.35.22; Tue, 09 Nov 2021 23:35:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b=hPKhOSlg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229832AbhKJHgp (ORCPT + 99 others); Wed, 10 Nov 2021 02:36:45 -0500 Received: from lelv0143.ext.ti.com ([198.47.23.248]:55340 "EHLO lelv0143.ext.ti.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229749AbhKJHgo (ORCPT ); Wed, 10 Nov 2021 02:36:44 -0500 Received: from lelv0265.itg.ti.com ([10.180.67.224]) by lelv0143.ext.ti.com (8.15.2/8.15.2) with ESMTP id 1AA7Xpmd126035; Wed, 10 Nov 2021 01:33:51 -0600 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com; s=ti-com-17Q1; t=1636529631; bh=MEBUaleoK0z/qGjLb6abG3y1/ihAKFWw3z1FEVJfRDg=; h=From:To:CC:Subject:Date:In-Reply-To:References; b=hPKhOSlgHD7vPj3UFJ8dPf0riRArPwQnrRwpgLnTNjt8N9kFtLaNYgFsNBvd8gkF5 sgF3+d7i7iUSu4JsBLOAwWWt625pNeWQnsAROl37lemSbHmBMruOBpVveLLYRWqZJZ Nf8VIHD4dLMYCA9mRs+9hPZLjZ+mqw8SYEHYXxCA= Received: from DLEE100.ent.ti.com (dlee100.ent.ti.com [157.170.170.30]) by lelv0265.itg.ti.com (8.15.2/8.15.2) with ESMTPS id 1AA7Xpmt059025 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=FAIL); Wed, 10 Nov 2021 01:33:51 -0600 Received: from DLEE111.ent.ti.com (157.170.170.22) by DLEE100.ent.ti.com (157.170.170.30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2308.14; Wed, 10 Nov 2021 01:33:50 -0600 Received: from lelv0327.itg.ti.com (10.180.67.183) by DLEE111.ent.ti.com (157.170.170.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2308.14 via Frontend Transport; Wed, 10 Nov 2021 01:33:51 -0600 Received: from a0393678-lt.ent.ti.com (ileax41-snat.itg.ti.com [10.172.224.153]) by lelv0327.itg.ti.com (8.15.2/8.15.2) with ESMTP id 1AA7XiT2020054; Wed, 10 Nov 2021 01:33:48 -0600 From: Kishon Vijay Abraham I To: Lorenzo Pieralisi , Rob Herring , =?UTF-8?q?Krzysztof=20Wilczy=C5=84ski?= , Bjorn Helgaas CC: , , Kishon Vijay Abraham I Subject: [PATCH 1/3] PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) Date: Wed, 10 Nov 2021 13:03:41 +0530 Message-ID: <20211110073343.12396-2-kishon@ti.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20211110073343.12396-1-kishon@ti.com> References: <20211110073343.12396-1-kishon@ti.com> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-EXCLAIMER-MD-CONFIG: e1e8a2fd-e40a-4ac6-ac9b-f7e9cc9ee180 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Errata #i2037 in AM65x/DRA80xM Processors Silicon Revision 1.0 (SPRZ452D–July 2018–Revised December 2019 [1]) mentions when an inbound PCIe TLP spans more than two internal AXI 128-byte bursts, the bus may corrupt the packet payload and the corrupt data may cause associated applications or the processor to hang. The workaround for Errata #i2037 is to limit the maximum read request size and maximum payload size to 128 bytes. Add workaround for Errata #i2037 here. The errata and workaround is applicable only to AM65x SR 1.0 and later versions of the silicon will have this fixed. [1] -> https://www.ti.com/lit/er/sprz452f/sprz452f.pdf Signed-off-by: Kishon Vijay Abraham I --- drivers/pci/controller/dwc/pci-keystone.c | 42 +++++++++++++++++++++++ 1 file changed, 42 insertions(+) diff --git a/drivers/pci/controller/dwc/pci-keystone.c b/drivers/pci/controller/dwc/pci-keystone.c index 865258d8c53c..38ab1d3f144d 100644 --- a/drivers/pci/controller/dwc/pci-keystone.c +++ b/drivers/pci/controller/dwc/pci-keystone.c @@ -35,6 +35,11 @@ #define PCIE_DEVICEID_SHIFT 16 /* Application registers */ +#define PID 0x000 +#define RTL GENMASK(15, 11) +#define RTL_SHIFT 11 +#define AM6_PCI_PG1_RTL_VER 0x15 + #define CMD_STATUS 0x004 #define LTSSM_EN_VAL BIT(0) #define OB_XLAT_EN_VAL BIT(1) @@ -105,6 +110,8 @@ #define to_keystone_pcie(x) dev_get_drvdata((x)->dev) +#define PCI_DEVICE_ID_TI_AM654X 0xb00c + struct ks_pcie_of_data { enum dw_pcie_device_mode mode; const struct dw_pcie_host_ops *host_ops; @@ -528,7 +535,11 @@ static int ks_pcie_start_link(struct dw_pcie *pci) static void ks_pcie_quirk(struct pci_dev *dev) { struct pci_bus *bus = dev->bus; + struct keystone_pcie *ks_pcie; + struct device *bridge_dev; struct pci_dev *bridge; + u32 val; + static const struct pci_device_id rc_pci_devids[] = { { PCI_DEVICE(PCI_VENDOR_ID_TI, PCIE_RC_K2HK), .class = PCI_CLASS_BRIDGE_PCI << 8, .class_mask = ~0, }, @@ -540,6 +551,11 @@ static void ks_pcie_quirk(struct pci_dev *dev) .class = PCI_CLASS_BRIDGE_PCI << 8, .class_mask = ~0, }, { 0, }, }; + static const struct pci_device_id am6_pci_devids[] = { + { PCI_DEVICE(PCI_VENDOR_ID_TI, PCI_DEVICE_ID_TI_AM654X), + .class = PCI_CLASS_BRIDGE_PCI << 8, .class_mask = ~0, }, + { 0, }, + }; if (pci_is_root_bus(bus)) bridge = dev; @@ -565,6 +581,32 @@ static void ks_pcie_quirk(struct pci_dev *dev) pcie_set_readrq(dev, 256); } } + + /* + * Memory transactions fail with PCI controller in AM654 PG1.0 + * when MRRS is set to more than 128 bytes. Force the MRRS to + * 128 bytes in all downstream devices. + */ + if (pci_match_id(am6_pci_devids, bridge)) { + bridge_dev = pci_get_host_bridge_device(dev); + if (!bridge_dev && !bridge_dev->parent) + return; + + ks_pcie = dev_get_drvdata(bridge_dev->parent); + if (!ks_pcie) + return; + + val = ks_pcie_app_readl(ks_pcie, PID); + val &= RTL; + val >>= RTL_SHIFT; + if (val != AM6_PCI_PG1_RTL_VER) + return; + + if (pcie_get_readrq(dev) > 128) { + dev_info(&dev->dev, "limiting MRRS to 128 bytes\n"); + pcie_set_readrq(dev, 128); + } + } } DECLARE_PCI_FIXUP_ENABLE(PCI_ANY_ID, PCI_ANY_ID, ks_pcie_quirk); -- 2.17.1