Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp877247iog; Wed, 29 Jun 2022 12:02:27 -0700 (PDT) X-Google-Smtp-Source: AGRyM1s5MPqFk6PBCar4xJPqTiLg4jNynigGeo2Kb33x1+sk0OEjZYbpu5ZyznOR6SbmPNLg8j3v X-Received: by 2002:a17:903:2284:b0:16a:6ffa:c674 with SMTP id b4-20020a170903228400b0016a6ffac674mr11851362plh.121.1656529347341; Wed, 29 Jun 2022 12:02:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1656529347; cv=none; d=google.com; s=arc-20160816; b=yh+0rhQuns2kJIN9VCJj9D47ftzWaSGFrRjK8NDiPftvSRoRaH8vk3zRxD3hXi8c+F KqQTfxevhtzhMn9aA94R5JDIGdY6X01VS37Tjg0SJyypwkM4KhKEKlImtBDVHuWXQK6s 0j3UDO2GICvSrr/pLmUaOO6VfgJ7vIaMcq0Q9nUIoctLrmPBcVADCftpqc65iUxeiqjG tVox2YD51VFHk3Htnn/+uZdoXYLy75q+42kqihB9XYJINN5A4yVNLMHOqD04kEr3VZF3 VtOAZbLMtejBMCOGkbitSQfPZ+rzEIz9Cd7nSAG9vlkOnpFVf4Il19j92v8rG9vucomg tdXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=o4CBsNA92Z9M6wN1xqT+tfQ/QKi8msl9I3a/4jxvE+Q=; b=BIf8VFzLXWrObF3s2kI6l5XHcdwglEIk9DDahFxF6Mmgf56Y5faVYK1tqqtdQGfXrC BI2oXgmxrkivqt5a1JI0jAwwjafG89XOiU976nE2qP+eYOgT0oF+6tgpXk8e10JNrURk emJ6r02FERqY55zFIp32gY4KjGNFAvN/SdZrO3UOt3ANDvi+FiDDH7oGotmSJsvm8B67 nQyiMYRBNJczyTdBLTjoZi4WSCjDsf0hquUbk7bdNa2binc+K7X7QG0nwB0fhfnSOXrs kqxoejAgDTA40Vpxj9Y4yjFpcRCQ4mcQmuGq83BdGXATsy9OhL0zfZeGjZqS01PWWrlJ gECw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f15-20020a17090a120f00b001e33f4c1493si3662318pja.150.2022.06.29.12.02.13; Wed, 29 Jun 2022 12:02:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229615AbiF2SfI (ORCPT + 99 others); Wed, 29 Jun 2022 14:35:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48852 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230035AbiF2SfD (ORCPT ); Wed, 29 Jun 2022 14:35:03 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 63448381B7 for ; Wed, 29 Jun 2022 11:35:02 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 6316E1480; Wed, 29 Jun 2022 11:35:02 -0700 (PDT) Received: from bogus (unknown [10.57.39.193]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id E91213F5A1; Wed, 29 Jun 2022 11:34:59 -0700 (PDT) Date: Wed, 29 Jun 2022 19:33:48 +0100 From: Sudeep Holla To: Conor.Dooley@microchip.com Cc: linux-kernel@vger.kernel.org, gregkh@linuxfoundation.org, atishp@atishpatra.org, atishp@rivosinc.com, vincent.guittot@linaro.org, dietmar.eggemann@arm.com, wangqing@vivo.com, robh+dt@kernel.org, rafael@kernel.org, ionela.voinescu@arm.com, pierre.gondois@arm.com, linux-arm-kernel@lists.infradead.org, linux-riscv@lists.infradead.org, gshan@redhat.com, Valentina.FernandezAlanis@microchip.com Subject: Re: [PATCH v5 09/19] arch_topology: Use the last level cache information from the cacheinfo Message-ID: <20220629183348.ga7gbcsba57dzf2t@bogus> References: <20220627165047.336669-1-sudeep.holla@arm.com> <20220627165047.336669-10-sudeep.holla@arm.com> <3656a067-cc3f-fd5b-e339-5925a856cce1@microchip.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <3656a067-cc3f-fd5b-e339-5925a856cce1@microchip.com> X-Spam-Status: No, score=-6.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 29, 2022 at 06:18:25PM +0000, Conor.Dooley@microchip.com wrote: > On 29/06/2022 18:49, Conor.Dooley@microchip.com wrote: > > EXTERNAL EMAIL: Do not click links or open attachments unless you know the content is safe > > > > On 27/06/2022 17:50, Sudeep Holla wrote: > >> EXTERNAL EMAIL: Do not click links or open attachments unless you know the content is safe > >> > >> The cacheinfo is now initialised early along with the CPU topology > >> initialisation. Instead of relying on the LLC ID information parsed > >> separately only with ACPI PPTT elsewhere, migrate to use the similar > >> information from the cacheinfo. > >> > >> This is generic for both DT and ACPI systems. The ACPI LLC ID information > >> parsed separately can now be removed from arch specific code. > > > > Hey Sudeep, > > I bisected broken boot on PolarFire SoC to this patch in next-20220629 :/ > > I suspect the issue is a missing "next-level-cache" in the the dt: > > arch/riscv/boot/dts/microchip/mpfs.dtsi > > > > Adding next-level-cache = <&cctrllr> fixes the boot. > If the above is missing, even the existing cacheinfo will be incorrect on that system. But we must end up with L1 as LLC, I need to check if that breaks the boot. > No, no it doesn't. Not sure what I was thinking there. > Prob tested that on the the last commit that bisect tested > rather than the one it pointed out the problem was with. > So can I assume the pointed commit is where the boot breaks ? > Either way, boot is broken in -next. > OK, that's bad. > > Not sure what the resolution here is, old devicetrees are meant to keep > > booting, right? > > Ideally yes. But with this, I assume the cacheinfo to userspace is also broken on this platform and I guess that needs fixing which can happen with DT update only. -- Regards, Sudeep