Received: by 2002:a05:7412:e794:b0:fa:551:50a7 with SMTP id o20csp1486601rdd; Thu, 11 Jan 2024 00:02:21 -0800 (PST) X-Google-Smtp-Source: AGHT+IEKTygUpxC4TGTWkgN21nAd4YHzC//rO9+zrs6NWiWdZ7Iq0tEly7yGeA+WOzbnU2bU7FKE X-Received: by 2002:a05:6a00:3925:b0:6db:337f:2595 with SMTP id fh37-20020a056a00392500b006db337f2595mr1092206pfb.0.1704960141716; Thu, 11 Jan 2024 00:02:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704960141; cv=none; d=google.com; s=arc-20160816; b=c+urjss/E3XibWaTmzbRdlG/qxgnvulQ+yfpz3cDHIt/AEh7wUeCCpl2JRcjNI+DhE fGKZtVGg7JVspexJXe/rmO6lsa2n0Zy4yevxNm49s2UerGHb83tSeDkzlRF6uUurJ0WM /0rMETX/YBZyvCkfvE0XV0YLsvTRMWFyBGjfqQQ8gqoR28oc8z2+csj2alWQT8o4fe+a dkU7Hqu6MVWJGyhoAvcvr0VSjoRBH0TghvAr7+c9cpFE/y6kjEMehn7rqa8JcyYzSRdr SDs+89QmbuMntkVBXcWCM6sQ1cG1Xutcd/yvCMAb2IauRhI3037Bje3sQJrZwBlB8ITe lZQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :references:message-id:subject:cc:to:from:date; bh=LGFfHxdlWqQa0+MoqXHVUV1a0bVFbZtwIy2l1YIa89g=; fh=LDoQbX3Q+0FNZGKsWz/6TKYzn+mx24SmqmwHEpMtiJ8=; b=dSkVmHtbBTwRNDy2MpCJnm49lTrpEGeo2l7OYYabiSRQLy3uhw/5Z+gHjySre7/hAd nALW5a2F6sfdjwTm7QLMuyRZj7FSas9sharcK5ajdFZHERT/n4b13GHKFt7Bes5z8xah EIRdT0XuRMrl2O36+8KRGoGgpGMxd5Gg/+gK+VCgEp4dvmmuce6CTmWDUtrf7Fi/bPMV 1UgVgg9eLJ0NjI7SWPz7W9jCOW1aBtl00++Ag0yIzI16VfjtGiXj2L/PQ3yDSwFfEab0 RYvCcNXE5VFrBJLC9ArcJgpzuFLXMkI+QdXCfx7IBpkVYbndjXqsv8jkFJLQnZYuDLOA uEpg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel+bounces-23176-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-23176-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id f23-20020a635557000000b005cdfaccba35si555000pgm.665.2024.01.11.00.02.21 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 11 Jan 2024 00:02:21 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-23176-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel+bounces-23176-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-23176-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 5DBC7282FD1 for ; Thu, 11 Jan 2024 08:02:21 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id B51B1D512; Thu, 11 Jan 2024 08:02:13 +0000 (UTC) Received: from server.atrad.com.au (server.atrad.com.au [150.101.241.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5879CDDA8; Thu, 11 Jan 2024 08:02:07 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=just42.net Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=just42.net Received: from marvin.atrad.com.au (marvin.atrad.com.au [192.168.0.2]) by server.atrad.com.au (8.17.2/8.17.2) with ESMTPS id 40B80IuY005806 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Thu, 11 Jan 2024 18:30:19 +1030 Date: Thu, 11 Jan 2024 18:30:18 +1030 From: Jonathan Woithe To: Igor Mammedov Cc: Ilpo =?iso-8859-1?Q?J=E4rvinen?= , linux-pci@vger.kernel.org, Bjorn Helgaas , Lorenzo Pieralisi , Rob Herring , Krzysztof =?utf-8?Q?Wilczy=C5=84ski?= , Lukas Wunner , Mika Westerberg , Andy Shevchenko , "Rafael J . Wysocki" , linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 0/7] PCI: Solve two bridge window sizing issues Message-ID: References: <20231228165707.3447-1-ilpo.jarvinen@linux.intel.com> <20240104131210.71f44d4b@imammedo.users.ipa.redhat.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-MIMEDefang-action: accept X-Scanned-By: MIMEDefang 2.86 on 192.168.0.1 On Thu, Jan 04, 2024 at 10:48:53PM +1030, Jonathan Woithe wrote: > On Thu, Jan 04, 2024 at 01:12:10PM +0100, Igor Mammedov wrote: > > On Thu, 28 Dec 2023 18:57:00 +0200 > > Ilpo J?rvinen wrote: > > > > > Hi all, > > > > > > Here's a series that contains two fixes to PCI bridge window sizing > > > algorithm. Together, they should enable remove & rescan cycle to work > > > for a PCI bus that has PCI devices with optional resources and/or > > > disparity in BAR sizes. > > > > > > For the second fix, I chose to expose find_empty_resource_slot() from > > > kernel/resource.c because it should increase accuracy of the cannot-fit > > > decision (currently that function is called find_resource()). In order > > > to do that sensibly, a few improvements seemed in order to make its > > > interface and name of the function sane before exposing it. Thus, the > > > few extra patches on resource side. > > > > > > Unfortunately I don't have a reason to suspect these would help with > > > the issues related to the currently ongoing resource regression > > > thread [1]. > > > > Jonathan, > > can you test this series on affected machine with broken kernel to see if > > it's of any help in your case? > > Certainly, but it will have to wait until next Thursday (11 Jan 2024). I'm > still on leave this week, and when at work I only have physical access to > the machine concerned on Thursdays at present. > > Which kernel would you prefer I apply the series to? I was very short of time today but I did apply the above series to the 5.15.y branch (since I had this source available), resulting in version 5.15.141+. Unfortunately, in the rush I forgot to do a clean after the bisect reset, so the resulting kernel was not correctly built. It booted but thought it was a different version and therefore none of the modules could be found. As a result, the test is invalid. I will try again in a week when I next have physical access to the system. Apologies for the delay. In the meantime, if there's a specific kernel I should apply the patch series against please let me know. As I understand it, you want it applied to one of the kernels which failed, making 5.15.y (for y < 145) a reasonable choice. Regards jonathan