From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.6 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FAKE_REPLY_C,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 86BCAC43603 for ; Fri, 13 Dec 2019 21:07:11 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id C3CB42467F for ; Fri, 13 Dec 2019 21:07:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1576271230; bh=+Kbq946pLpBFZ/ZRLDIAH/9uhSYYVh8GR73ctHhEEIk=; h=Date:From:To:Cc:Subject:In-Reply-To:List-ID:From; b=gx5z+NFYFp28qwE1VaL4eyWbfVerqAFASudmrQ8XSvh/CQYrW5UV2+lU/tnRT9cGM zrwOcgXP2LD+p5/HtpRtu4uzkOWs43zVvc98Xenly7x6GpErNSabRI3k79bpnV1NZw qfrMSq8Usf/rI5snKv1DyjlbNOYDOxOJ73e6voKw= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726735AbfLMVHK (ORCPT ); Fri, 13 Dec 2019 16:07:10 -0500 Received: from mail.kernel.org ([198.145.29.99]:46230 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725937AbfLMVHK (ORCPT ); Fri, 13 Dec 2019 16:07:10 -0500 Received: from localhost (mobile-166-170-223-177.mycingular.net [166.170.223.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 66C7B24671; Fri, 13 Dec 2019 21:07:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1576271228; bh=+Kbq946pLpBFZ/ZRLDIAH/9uhSYYVh8GR73ctHhEEIk=; h=Date:From:To:Cc:Subject:In-Reply-To:From; b=cfL67DjS188dqDBrbIjTGxh0OEx4ZaWEyJ1x1nOpkCkeFPncNCj7pVekbVRMuvWTf +1jk0dF9FupZsVS0G0LbpXYfdD8/Bc9J6We0kJThpgRPTuP/uct1DZckkUcC7shiHC Z1K7jBQSUg4CKyGjnGrBHaf+WlR74KXIi+olHx0g= Date: Fri, 13 Dec 2019 15:07:07 -0600 From: Bjorn Helgaas To: Andre Przywara Cc: Lorenzo Pieralisi , Andrew Murray , "Rafael J . Wysocki" , Len Brown , Will Deacon , Catalin Marinas , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linux-pci@vger.kernel.org, linux-acpi@vger.kernel.org Subject: Re: [PATCH] pcie: Add quirk for the Arm Neoverse N1SDP platform Message-ID: <20191213150031.GA229369@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <9ad40b55-0d31-a7b7-9f99-ea281fd4ad7d@arm.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-pci-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-pci@vger.kernel.org On Thu, Dec 12, 2019 at 11:05:31AM +0000, Andre Przywara wrote: > On 11/12/2019 20:17, Bjorn Helgaas wrote: > > On Wed, Dec 11, 2019 at 11:00:49AM +0000, Andre Przywara wrote: > >> On Tue, 10 Dec 2019 08:41:15 -0600 > >> Bjorn Helgaas wrote: > >>> On Mon, Dec 09, 2019 at 04:06:38PM +0000, Andre Przywara wrote: > >>>> From: Deepak Pandey > >>>> > >>>> The Arm N1SDP SoC suffers from some PCIe integration issues, most > >>>> prominently config space accesses to not existing BDFs being answered > >>>> with a bus abort, resulting in an SError. > >>> > >>> Can we tease this apart a little more? Linux doesn't program all the > >>> bits that control error signaling, so even on hardware that works > >>> perfectly, much of this behavior is determined by what firmware did. > >>> I wonder if Linux could be more careful about this. > >>> > >>> "Bus abort" is not a term used in PCIe. > >> > >> Yes, sorry, that was my sloppy term, also aiming more at the CPU > >> side of the bus, between the cores and the RC. > >> > >>> IIUC, a config read to a > >>> device that doesn't exist should terminate with an Unsupported Request > >>> completion, e.g., see the implementation note in PCIe r5.0 sec 2.3.1. > >> > >> Yes, that's what Lorenzo mentioned as well. > >> > >>> The UR should be an uncorrectable non-fatal error (Table 6-5), and > >>> Figures 6-2 and 6-3 show how it should be handled and when it should > >>> be signaled as a system error. In case you don't have a copy of the > >>> spec, I extracted those two figures and put them at [1]. > >> > >> Thanks for that. > >> So in the last few months we tossed several ideas around how to > >> work-around this without kernel intervention, all of them turned out > >> to be not working. There are indeed registers in the RC that > >> influence error reporting to the CPU side, but even if we could > >> suppress (or catch) the SError, we can't recover and fixup the read > >> transaction to the CPU. Even Lorenzo gave up on this ;-) As far as I > >> understood this, there are gates missing which are supposed to > >> translate this specific UR into a valid "all-1s" response. > > > > But the commit log says firmware scanned the bus (catching the > > SErrors). Shouldn't Linux be able to catch them the same way? > > Not really. The scanning is done by the SCP management processor, > which is a Cortex-M class core on the same bus. So it's a simple, > single core running very early after power-on, when the actual AP > cores are still off. The SError handler is set to just increase a > value, then to return. This value is then checked before and after a > config space access for a given BDF: > https://git.linaro.org/landing-teams/working/arm/n1sdp-pcie-quirk.git/tree/scp > > On the AP cores that run Linux later on this is quite different: The > SError is asynchronous, imprecise (inexact) and has no syndrome > information. That means we can't attribute this anymore to the > faulting instruction, we don't even know if it happened due to this > config space access. The CPU might have executed later instructions > already, so the state is broken at this point. SError basically > means: the system is screwed up. Because this is quite common for > SErrors, we don't even allow to register SError handlers in arm64 > Linux. > > So even if we could somehow handle this is in Linux, it would be a > much greater and intrusive hack, so I'd rather stick with this > version. The problem is that from a PCIe point of view, UR is something we should be able to tolerate. It happens during enumeration and also during hotplug. It definitely does not mean "the system is screwed up and must be rebooted." To go back to Figure 6-3, I'm getting the impression that the "System Error" shown at the top is *not* the "SError" you're referring to. If they were the same, the Root Control enable bits should gate it, but according to your lspci, those enable bits are cleared, yet you still take SErrors. SError is asynchronous and imprecise. Is there no way to do the config access in a way that makes it precise, by adding some kind of sync? There's no reason we can't single-thread config accesses and maybe even MMIO/IO port accesses as well if necessary. Bjorn