From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.6 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 46528C433FF for ; Wed, 7 Aug 2019 23:17:19 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 129A221871 for ; Wed, 7 Aug 2019 23:17:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565219839; bh=K1FJY/IQnp3Rp2g6nct/42+G5hsZ3RWLWUgCgs6+SaQ=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=JXY8PW8R+LqtfvWta/CrDJ34ymZPbG4lNSfxJX8j5rHvVGIRVAtfdJ8NQjYBt/bdP UNrI5WrGaHapIgQ1f2qk/wMyPEheRD4HevOtH6Sgp+x8u8WQRtAjqH+E/CE5aG6u2c GA4VYdBT/EZrBQdMocDejuly3K6jWq27SCqa2ifI= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729960AbfHGXRS (ORCPT ); Wed, 7 Aug 2019 19:17:18 -0400 Received: from mail.kernel.org ([198.145.29.99]:42996 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729219AbfHGXRS (ORCPT ); Wed, 7 Aug 2019 19:17:18 -0400 Received: from localhost (unknown [69.71.4.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F0B31217F5; Wed, 7 Aug 2019 23:17:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565219837; bh=K1FJY/IQnp3Rp2g6nct/42+G5hsZ3RWLWUgCgs6+SaQ=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=ODbxlCebJsygJ1/G3zlnObtY2Y5GSrOCMNOKt1jzIQGZOvAy8obmibl9XQRf2iCeU uvMLbkRDS0jRDqLlNQgI7ApTT6yVJAl+CkBdJsO0L4UOWN/wHCG8o6Kady5/4131jV KFT6jRwp2ia8DtQvtfkZ+ASyFopRNIAYpP6ZYs7U= Date: Wed, 7 Aug 2019 18:17:13 -0500 From: Bjorn Helgaas To: Sumit Saxena Cc: Christian.Koenig@amd.com, linux-pci@vger.kernel.org, stable@vger.kernel.org Subject: Re: [PATCH V2] PCI: set BAR size bits correctly in Resize BAR control register Message-ID: <20190807231713.GB151852@google.com> References: <20190725192552.24295-1-sumit.saxena@broadcom.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190725192552.24295-1-sumit.saxena@broadcom.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-pci-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-pci@vger.kernel.org On Fri, Jul 26, 2019 at 12:55:52AM +0530, Sumit Saxena wrote: > In Resize BAR control register, bits[8:12] represents size of BAR. > As per PCIe specification, below is encoded values in register bits > to actual BAR size table: > > Bits BAR size > 0 1 MB > 1 2 MB > 2 4 MB > 3 8 MB > -- > > For 1 MB BAR size, BAR size bits should be set to 0 but incorrectly > these bits are set to "1f". Latest megaraid_sas and mpt3sas adapters > which support Resizable BAR with 1 MB BAR size fails to initialize > during system resume from S3 sleep. > > Fix: Correctly calculate BAR size bits for Resize BAR control register. > > V2: > -Simplified calculation of BAR size bits as suggested by Christian Koenig. > > CC: stable@vger.kernel.org # v4.16+ Also, d3252ace0bc6 ("PCI: Restore resized BAR state on resume") didn't appear until v4.19. I updated this to "v4.19+"; let me know if that's wrong. > Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=203939 > Fixes: d3252ace0bc652a1a244455556b6a549f969bf99 ("PCI: Restore resized BAR state on resume") I updated this to conventional format as above (12-char SHA1). > Signed-off-by: Sumit Saxena > --- > drivers/pci/pci.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/drivers/pci/pci.c b/drivers/pci/pci.c > index 29ed5ec1ac27..e59921296125 100644 > --- a/drivers/pci/pci.c > +++ b/drivers/pci/pci.c > @@ -1438,7 +1438,7 @@ static void pci_restore_rebar_state(struct pci_dev *pdev) > pci_read_config_dword(pdev, pos + PCI_REBAR_CTRL, &ctrl); > bar_idx = ctrl & PCI_REBAR_CTRL_BAR_IDX; > res = pdev->resource + bar_idx; > - size = order_base_2((resource_size(res) >> 20) | 1) - 1; > + size = order_base_2(resource_size(res) >> 20); > ctrl &= ~PCI_REBAR_CTRL_BAR_SIZE; > ctrl |= size << PCI_REBAR_CTRL_BAR_SHIFT; > pci_write_config_dword(pdev, pos + PCI_REBAR_CTRL, ctrl); > -- > 2.18.1 >