From patchwork Sun Apr 23 03:05:20 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Shawn Guo X-Patchwork-Id: 13221161 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 05F38C77B76 for ; Sun, 23 Apr 2023 03:07:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:MIME-Version:List-Subscribe:List-Help: List-Post:List-Archive:List-Unsubscribe:List-Id:Message-Id:Date:Subject:Cc:To :From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=Hm+852LDtwuN3LQaQDVu9lW1c7yaEG6LSIheTHkoVew=; b=yqQstGHyK/8EXr bXXpgoM9krQC+6BDaHWWSCEvuehlftNJuFU25BMLKAeSGlQ2UpHorLhpa9y1Xppo006Xu147W9xHk i08LFVRbUMnFuCTPw7A+SYuU/b71USFdHZs7XKwzLc2e1NyAadhaA6ccb81tXADnsSc1uAT46FSfN vd3SMZCT3zOwj9ui5/+W0/Mt7D6DxhFoeRw5GSRA84COwzqYG0Kcg/kqfEAioRHFTzXyg61a0mjDo 5EE44tAOYT11APErYOQsfGTxd6Lz7pqJKnnuP/gWSUJlvFhbb4Wv3pqkuTUIpXTskCdu/kkS0xqt7 Dgk5QOJjvoRO/4pdBwzA==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.96 #2 (Red Hat Linux)) id 1pqQ35-00Dgxa-1K; Sun, 23 Apr 2023 03:05:59 +0000 Received: from mail-pg1-x52f.google.com ([2607:f8b0:4864:20::52f]) by bombadil.infradead.org with esmtps (Exim 4.96 #2 (Red Hat Linux)) id 1pqQ31-00Dgwe-0F for linux-arm-kernel@lists.infradead.org; Sun, 23 Apr 2023 03:05:56 +0000 Received: by mail-pg1-x52f.google.com with SMTP id 41be03b00d2f7-51f3289d306so2610150a12.3 for ; Sat, 22 Apr 2023 20:05:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1682219149; x=1684811149; h=message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=crhg2BtmzV8z4fyeXuT3xLp41da6Pfmqjc/PTEndqFM=; b=G9xbbtwY9Pdx+xP4Mhg57gpO5BbHxpcuAkWKxKCn7dEPJHPJhscll/9jG19ZmVdxR3 Udga/B9CAWMVvUgWbIQhwVs0f6jJnlavvoIeolP6dPxPcP9a7gRPpfrDYru56hO5mL7M dyw4dDYxZm1hOJSPXhjCj7A6jOw3VZcZ/nEfdvyilyjnKfedvagcfVb3RMx/Q/t9K5JX f7y0dY6uZz3x0Dqs3Cyw6Fd2SF8N88mhujMpaxq2+0Jb9QB/7uD2b3HJDLm7BYUuutrQ 59e1Np4YhXK+lghsWsMmnEbcGgNiSU12Zr2RD1ZjhmYLaPeFcCbUmlnHdsf+dKJPEyrB C2uw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682219149; x=1684811149; h=message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=crhg2BtmzV8z4fyeXuT3xLp41da6Pfmqjc/PTEndqFM=; b=KGX3Z6vX+3J7KCw9gor0nfESTiG9Y7g6V24ZL7v4qCXPu5/1b0YipzgigOUtVILArV /vxBHImQ6x/+81o1SAaSjD7n5gelM722wmSJVPfbPDwh6UKMD8U3tDFfLWpUKzg02vaA y4NLsPN+x7Dsp6EcsYIDpKn2r4SDZYahtqOBgZ6M9/Oj6c1dpgto73bWwyDLhiG4VYi6 KWdFejC40XF7TuPXQoqZMZhiQs/sFV8issxwRv4rQtpo7ITznwwbZsYQtUX1NGxu8PzN WwtU213yrmIrAaxAmWJiDm+Sl5llmJhmxQgOO2B9mh3JTXj9hc0TSv85ESLTTVmUSqgU eIjQ== X-Gm-Message-State: AAQBX9fD43gvMIHNWxJosxHbJiPiZjPIN+aVy+Y6hjQeHBq9Wg1Agt02 kacuqLHfSRF3dtj2dDwh3XHq4g== X-Google-Smtp-Source: AKy350bTF3GschNC3Wp1o4THB7iil7PMwvgBN1IquHPj20l5TL4uIusprnmXUKNRHWp6mQ6pSorJEA== X-Received: by 2002:a17:902:d4ca:b0:1a6:523c:8583 with SMTP id o10-20020a170902d4ca00b001a6523c8583mr11670530plg.68.1682219148771; Sat, 22 Apr 2023 20:05:48 -0700 (PDT) Received: from localhost.localdomain (80.251.214.228.16clouds.com. [80.251.214.228]) by smtp.gmail.com with ESMTPSA id jb14-20020a170903258e00b001a6370bb33csm4584954plb.41.2023.04.22.20.05.42 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 22 Apr 2023 20:05:47 -0700 (PDT) From: Shawn Guo To: Lorenzo Pieralisi , Bjorn Helgaas Cc: Catalin Marinas , Will Deacon , Maximilian Luz , =?utf-8?q?Thomas_Wei=C3=9Fschuh?= , linux-pci@vger.kernel.org, linux-acpi@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Shawn Guo Subject: [PATCH v2] arm64: PCI: Add quirk for Qualcomm WoA devices Date: Sun, 23 Apr 2023 11:05:20 +0800 Message-Id: <20230423030520.9570-1-shawn.guo@linaro.org> X-Mailer: git-send-email 2.17.1 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20230422_200555_121323_7AC9F608 X-CRM114-Status: GOOD ( 15.39 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Commit 8fd4391ee717 ("arm64: PCI: Exclude ACPI "consumer" resources from host bridge windows") introduced a check to remove host bridge register resources for all arm64 platforms, with the assumption that the PNP0A03 _CRS resources would always be host bridge registers and never as windows on arm64 platforms. The assumption stands true until Qualcomm WoA (Windows on ARM) devices emerge. These devices describe host bridge windows in PNP0A03 _CRS resources instead. For example, the Microsoft Surface Pro X has host bridges defined as Name (_HID, EisaId ("PNP0A08") /* PCI Express Bus */) // _HID: Hardware ID Name (_CID, EisaId ("PNP0A03") /* PCI Bus */) // _CID: Compatible ID Method (_CRS, 0, NotSerialized) // _CRS: Current Resource Settings { Name (RBUF, ResourceTemplate () { Memory32Fixed (ReadWrite, 0x60200000, // Address Base 0x01DF0000, // Address Length ) WordBusNumber (ResourceProducer, MinFixed, MaxFixed, PosDecode, 0x0000, // Granularity 0x0000, // Range Minimum 0x0001, // Range Maximum 0x0000, // Translation Offset 0x0002, // Length ,, ) }) Return (RBUF) /* \_SB_.PCI0._CRS.RBUF */ } The Memory32Fixed holds a host bridge window, but it's not properly defined as a "producer" resource. Consequently the resource gets removed by kernel, and the BAR allocation fails later on: [ 0.150731] pci 0002:00:00.0: BAR 14: no space for [mem size 0x00100000] [ 0.150744] pci 0002:00:00.0: BAR 14: failed to assign [mem size 0x00100000] [ 0.150758] pci 0002:01:00.0: BAR 0: no space for [mem size 0x00004000 64bit] [ 0.150769] pci 0002:01:00.0: BAR 0: failed to assign [mem size 0x00004000 64bit] This eventually prevents the PCIe NVME drive from being accessible. Add a quirk for these devices to avoid the resource being removed. Signed-off-by: Shawn Guo --- Changes for v2: - Match devices using PPTT instead of DSDT to avoid maintenance burden. Hope this is an acceptable compromise. - Add const delaration to qcom_platlist[]. v1 link: https://lore.kernel.org/lkml/20230227021221.17980-1-shawn.guo@linaro.org/ arch/arm64/kernel/pci.c | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) diff --git a/arch/arm64/kernel/pci.c b/arch/arm64/kernel/pci.c index 2276689b5411..2ff2f3befa76 100644 --- a/arch/arm64/kernel/pci.c +++ b/arch/arm64/kernel/pci.c @@ -109,16 +109,44 @@ int pcibios_root_bridge_prepare(struct pci_host_bridge *bridge) return 0; } +#define QCOM_PCI_QUIRK "Host bridge windows in PNP0A03 _CRS" + +/* + * Ideally DSDT (Differentiated System Description Table) should be used to + * match the platforms, as the quirk is in there. But devices from different + * manufacturers usually have different oem_id and oem_table_id in DSDT, + * so matching DSDT makes the list a maintenance burden. As a compromise, + * PPTT (Processor Properties Topology Table) is used instead to work + * around this quirk for the most Qualcomm WoA (Windows on ARM) devices. + */ +static const struct acpi_platform_list qcom_platlist[] = { + { "QCOM ", "QCOMEDK2", 0, ACPI_SIG_PPTT, all_versions, QCOM_PCI_QUIRK }, + { } +}; + static int pci_acpi_root_prepare_resources(struct acpi_pci_root_info *ci) { struct resource_entry *entry, *tmp; int status; + int idx; status = acpi_pci_probe_root_resources(ci); + + /* + * Instead of describing host bridge registers in PNP0A03 _CRS + * resources, Qualcomm WoA devices describe host bridge windows in + * there. We do not want to destroy the resources on these platforms. + */ + idx = acpi_match_platform_list(qcom_platlist); + if (idx >= 0) + goto done; + resource_list_for_each_entry_safe(entry, tmp, &ci->resources) { if (!(entry->res->flags & IORESOURCE_WINDOW)) resource_list_destroy_entry(entry); } + +done: return status; }