linux-pci.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Bjorn Helgaas <helgaas@kernel.org>
To: Robin McCorkell <robin@mccorkell.me.uk>
Cc: linux-pci@vger.kernel.org,
	"Christian König" <christian.koenig@amd.com>,
	"Nirmoy Das" <nirmoy.das@amd.com>
Subject: Re: [PATCH] Limit AMD Radeon rebar hack to a single revision
Date: Tue, 26 Oct 2021 16:28:35 -0500	[thread overview]
Message-ID: <20211026212835.GA167500@bhelgaas> (raw)
In-Reply-To: <20211026204639.21178-1-robin@mccorkell.me.uk>

[+cc Christian, Nirmoy, authors of 907830b0fc9e]

Subject line should look like previous ones for this file, e.g.,

  88769e64cf99 ("PCI: Add ACS quirk for Pericom PI7C9X2G switches")
  e3f4bd3462f6 ("PCI: Mark Atheros QCA6174 to avoid bus reset")
  60b78ed088eb ("PCI: Add AMD GPU multi-function power dependencies")
  8304a3a199ee ("PCI: Set dma-can-stall for HiSilicon chips")
  8c09e896cef8 ("PCI: Allow PASID on fake PCIe devices without TLP prefixes")
  32837d8a8f63 ("PCI: Add ACS quirks for Cavium multi-function devices")
  e0bff4322092 ("PCI: Increase D3 delay for AMD Renoir/Cezanne XHCI")
  ...
  907830b0fc9e ("PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse")

Would be good to mention "Sapphire RX 5600 XT Pulse" explicitly since
that's what 907830b0fc9e said.

On Tue, Oct 26, 2021 at 09:46:38PM +0100, Robin McCorkell wrote:
> A particular RX 5600 device requires a hack in the rebar logic, but the
> current branch is too general and catches other devices too, breaking
> them. This patch changes the branch to be more selective on the
> particular revision.
> 
> See also: https://gitlab.freedesktop.org/drm/amd/-/issues/1707

There's a lot of legwork in the bug report to bisect this, but no
explanation of what the root cause turned out to be.

907830b0fc9e says RX 5600 XT Pulse advertises 256MB-1GB BAR 0 sizes but
actually supports up to 8GB.

Does this patch mean your RX 5600 XT Pulse supports fewer sizes and 
advertises them correctly?  And consequently we resize BAR 0 to
something that's too big, and something fails when we try to access
the part the isn't actually implemented by the device? 

It would be useful to attach your "lspci -vv" output to the bug
report.

> This patch fixes intermittent freezes on other RX 5600 devices where the
> hack is unnecessary. Credit to all contributors in the linked issue on
> the AMD bug tracker.

Thanks.  This would need a signed-off-by [1].

We should also include a "Fixes:" line for the commit the problem was
bisected to, 907830b0fc9e ("PCI: Add a REBAR size quirk for Sapphire
RX 5600 XT Pulse"), if I understand correctly, e.g.,

  Fixes: 907830b0fc9e ("PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse")

And probably a stable tag, since 907830b0fc9e appeared in v5.12, e.g.,

  Cc: stable@vger.kernel.org	# v5.12+

If stable maintainers backported 907830b0fc9e to earlier kernels, as
it appears they have, it's up to them to watch for fixes to
907830b0fc9e.

[1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/Documentation/process/submitting-patches.rst?id=v5.14#n365

> ---
>  drivers/pci/pci.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/drivers/pci/pci.c b/drivers/pci/pci.c
> index ce2ab62b64cf..1fe75243019e 100644
> --- a/drivers/pci/pci.c
> +++ b/drivers/pci/pci.c
> @@ -3647,7 +3647,7 @@ u32 pci_rebar_get_possible_sizes(struct pci_dev *pdev, int bar)
>  
>  	/* Sapphire RX 5600 XT Pulse has an invalid cap dword for BAR 0 */
>  	if (pdev->vendor == PCI_VENDOR_ID_ATI && pdev->device == 0x731f &&
> -	    bar == 0 && cap == 0x7000)
> +	    pdev->revision == 0xC1 && bar == 0 && cap == 0x7000)

I'd like to get the AMD folks to chime in and confirm that revision
0xC1 is the only one that requires this quirk.

>  		cap = 0x3f000;
>  
>  	return cap >> 4;
> -- 
> 2.31.1
> 

  reply	other threads:[~2021-10-26 21:28 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-10-26 20:46 [PATCH] Limit AMD Radeon rebar hack to a single revision Robin McCorkell
2021-10-26 21:28 ` Bjorn Helgaas [this message]
2021-10-26 21:44   ` [PATCH v2] PCI: Limit REBAR quirk to just Sapphire RX 5600 XT Pulse Robin McCorkell
2021-10-27  9:47     ` Krzysztof Wilczyński
2021-11-01 21:55     ` Bjorn Helgaas
2021-11-02 12:27       ` Christian König
2021-10-26 21:49   ` [PATCH] Limit AMD Radeon rebar hack to a single revision Robin McCorkell
2021-10-27  6:38     ` Christian König

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20211026212835.GA167500@bhelgaas \
    --to=helgaas@kernel.org \
    --cc=christian.koenig@amd.com \
    --cc=linux-pci@vger.kernel.org \
    --cc=nirmoy.das@amd.com \
    --cc=robin@mccorkell.me.uk \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).