Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp4971152rwd; Tue, 30 May 2023 12:35:02 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ6ohIro36CxvxEdcKLfv9vSnZOg12GKrGw1nPu8OOU3zMXqCXPwug+MebrBv8PdOgUnRDfb X-Received: by 2002:a17:902:eccc:b0:1b0:2986:8a6b with SMTP id a12-20020a170902eccc00b001b029868a6bmr3947252plh.55.1685475302358; Tue, 30 May 2023 12:35:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685475302; cv=none; d=google.com; s=arc-20160816; b=ZXw0gAkQHJ8WHTP+slExb9ihIpNR9izLja51PV+zES+K1zRNb1JD47g1BatyZ6EPUy oR9Jh+FZ1aBYplqtoyAcZy9fTbjy/w3WjwqeBjOl8CCshKkBcmRPYaZgBQOq+E8Vu+o0 re0qWtDJr7hV5H7KKnNRvyqK+Gvn7cnYUmHmuW78C6lXxsxozcWu5b4MD6Wc5d9I1Xb9 tjKSrdpE0rbc3KvmTHlQNUqMKm4TsN96STPzIquvHhXfMaHGjjz58HdU/UhBQWb7yvMr 5MIbDsV+oYDPS/hAYqETdwmGRsygTmSIAA/WbxT45DuCKu41z6xTRhMZi1tv/8P5ybnC BB0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=fSmFtWgu65TksWT+Us90A+D3QMtRR1H00zZMfgSmti4=; b=RaHOPS3bT2EHI2gZ0En1yQtkC7ZDTscQouILd2qV6WA6N62c3SDcKyb4LShJVKzsLq udlS851Xv7ZOPEWtJ1w05/SuPp0+FjwHQueepbeYvdX6xcfCo2hllzXVDblrg47GWP+F ZY8IogylnXodvVRf+boosR0Oba7qQAe6/EaK8JTBJww+jrhiMxQaQqxGYkiDj+RWGTpr TUgFbwG2ZHUnMk4EkoJPDirXti2Mpyq4k5+PkQ33JJYZAseJkIq8VRGUky0j/xflcw1E /mEgnBGNNa3847aIFSL3PdI+7mOIyE63LlEclwt9aCqW4pzj7zAvsJ+76iixrS0/fJkB /fWQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=QzszITu9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d16-20020a170902ced000b001ae40e07fb3si3637618plg.563.2023.05.30.12.34.45; Tue, 30 May 2023 12:35:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=QzszITu9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232679AbjE3THo (ORCPT + 99 others); Tue, 30 May 2023 15:07:44 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48126 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231618AbjE3THm (ORCPT ); Tue, 30 May 2023 15:07:42 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6D139F7 for ; Tue, 30 May 2023 12:06:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1685473614; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=fSmFtWgu65TksWT+Us90A+D3QMtRR1H00zZMfgSmti4=; b=QzszITu9pKqNPFfMBBMa5xC9116n+6/rmfdzOhAMa7t33AK+aOrk/yp24XlOQgR6bE3CIU SZSY+cwSEGSQj5L9wikVJ7c3cOWYS+dfJBcM10jeim4ayA0Zky1tkv0q+zevG4IMtH44oi NvFZp2A9JCatBERWmsKNamUadFODUv4= Received: from mail-lf1-f72.google.com (mail-lf1-f72.google.com [209.85.167.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-635-g4BIxv5GMDu2uedCC5kgkA-1; Tue, 30 May 2023 15:06:52 -0400 X-MC-Unique: g4BIxv5GMDu2uedCC5kgkA-1 Received: by mail-lf1-f72.google.com with SMTP id 2adb3069b0e04-4f4b7b4e7c5so2560235e87.1 for ; Tue, 30 May 2023 12:06:52 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685473611; x=1688065611; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=fSmFtWgu65TksWT+Us90A+D3QMtRR1H00zZMfgSmti4=; b=ZfVOLwIpGBQN00DY+k2qOKNPJ6SmiQUwqlupk94mr58LcqJdeRksj/LQNdRowwTNUc Q/3GMeWK+p61sMTzo8CEf77gMsOmUwYfluOkl8F3C9klqWwRTTUMSln9M//OJBvtJT9+ IAQLDQQ9jyKgE9i2ThyhjKHGvoNacTQqAp4Qjmojf0IdQoctOcaYZtuySmO0877cGgA4 aX9t4ZFhhX4HFljhrF+wDDqmmVzStO4oDZOAB2Kj47oNCglnToS4FuwCRiI3+QUdkPRs cB2GG1izSgr5Di7Bbw4j7XSlGJ1JyFLf6mmV1ZfMd97x5KhCy5UxvMVVaJzBd3isdFg2 IJZA== X-Gm-Message-State: AC+VfDxBUzs/GAS7O3NeDeCaz+IfPUu2jilYQqCmnxJvaXYyfYESAaSz O3r7agg7QJoTRRaThdEIIFm9CM68xyQEFImKPSqOavfHvwnpDCK3PO/tJcyfNMH9KdBCHBEbtt5 NpPm7zSGrGq7ouqtUdTsj1wmf X-Received: by 2002:ac2:43c7:0:b0:4f3:a49b:121f with SMTP id u7-20020ac243c7000000b004f3a49b121fmr1286298lfl.40.1685473611538; Tue, 30 May 2023 12:06:51 -0700 (PDT) X-Received: by 2002:ac2:43c7:0:b0:4f3:a49b:121f with SMTP id u7-20020ac243c7000000b004f3a49b121fmr1286284lfl.40.1685473611189; Tue, 30 May 2023 12:06:51 -0700 (PDT) Received: from redhat.com ([176.12.143.106]) by smtp.gmail.com with ESMTPSA id d10-20020ac24c8a000000b004f252f48e5fsm429049lfl.40.2023.05.30.12.06.47 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 30 May 2023 12:06:50 -0700 (PDT) Date: Tue, 30 May 2023 15:06:45 -0400 From: "Michael S. Tsirkin" To: Bjorn Helgaas Cc: Igor Mammedov , linux-kernel@vger.kernel.org, rafael@kernel.org, lenb@kernel.org, bhelgaas@google.com, linux-acpi@vger.kernel.org, linux-pci@vger.kernel.org, mika.westerberg@linux.intel.com Subject: Re: [PATCH v2] PCI: acpiphp: Reassign resources on bridge if necessary Message-ID: <20230530150019-mutt-send-email-mst@kernel.org> References: <20230530141321-mutt-send-email-mst@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-2.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 30, 2023 at 01:55:12PM -0500, Bjorn Helgaas wrote: > On Tue, May 30, 2023 at 02:16:36PM -0400, Michael S. Tsirkin wrote: > > On Tue, May 30, 2023 at 12:12:44PM -0500, Bjorn Helgaas wrote: > > > On Mon, Apr 24, 2023 at 09:15:57PM +0200, Igor Mammedov wrote: > > > > When using ACPI PCI hotplug, hotplugging a device with > > > > large BARs may fail if bridge windows programmed by > > > > firmware are not large enough. > > > > > > > > Reproducer: > > > > $ qemu-kvm -monitor stdio -M q35 -m 4G \ > > > > -global ICH9-LPC.acpi-pci-hotplug-with-bridge-support=on \ > > > > -device id=rp1,pcie-root-port,bus=pcie.0,chassis=4 \ > > > > disk_image > > > > > > > > wait till linux guest boots, then hotplug device > > > > (qemu) device_add qxl,bus=rp1 > > > > > > > > hotplug on guest side fails with: > > > > pci 0000:01:00.0: [1b36:0100] type 00 class 0x038000 > > > > pci 0000:01:00.0: reg 0x10: [mem 0x00000000-0x03ffffff] > > > > pci 0000:01:00.0: reg 0x14: [mem 0x00000000-0x03ffffff] > > > > pci 0000:01:00.0: reg 0x18: [mem 0x00000000-0x00001fff] > > > > pci 0000:01:00.0: reg 0x1c: [io 0x0000-0x001f] > > > > pci 0000:01:00.0: BAR 0: no space for [mem size 0x04000000] > > > > pci 0000:01:00.0: BAR 0: failed to assign [mem size 0x04000000] > > > > pci 0000:01:00.0: BAR 1: no space for [mem size 0x04000000] > > > > pci 0000:01:00.0: BAR 1: failed to assign [mem size 0x04000000] > > > > pci 0000:01:00.0: BAR 2: assigned [mem 0xfe800000-0xfe801fff] > > > > pci 0000:01:00.0: BAR 3: assigned [io 0x1000-0x101f] > > > > qxl 0000:01:00.0: enabling device (0000 -> 0003) > > > > > > Ugh, I just noticed that we turned on PCI_COMMAND_MEMORY even though > > > BARs 0 and 1 haven't been assigned. How did that happen? It looks > > > like pci_enable_resources() checks for that, but there must be a hole > > > somewhere. > > > > Maybe because BAR2 was assigned? I think pci_enable_resources just > > does > > if (r->flags & IORESOURCE_MEM) > > cmd |= PCI_COMMAND_MEMORY; > > in a loop so if any memory BARs are assigned then PCI_COMMAND_MEMORY > > is set. > > It does, but it also bails out if it finds IORESOURCE_UNSET: > > pci_enable_resources() > { > ... > pci_dev_for_each_resource(dev, r, i) { > ... > if (r->flags & IORESOURCE_UNSET) { > pci_err(dev, "can't enable device: BAR %d %pR not assigned\n"); > return -EINVAL; > } > ... > if (r->flags & IORESOURCE_MEM) > cmd |= PCI_COMMAND_MEMORY; > } > ... > } > > I expected that IORESOURCE_UNSET would still be there from > pci_assign_resource(), since we saw the "failed to assign" messages, > but there must be more going on. > > Bjorn Oh you are right. I donnu. -- MST