Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp733505ybi; Fri, 14 Jun 2019 02:25:10 -0700 (PDT) X-Google-Smtp-Source: APXvYqyfwru8l8lacvtTLD+BDpBNuRcZbyzGbJ1VMiR0eYpuYNrbNOor0si9Fqf8wiOEhUuZ48zs X-Received: by 2002:a17:902:246:: with SMTP id 64mr21603402plc.311.1560504310151; Fri, 14 Jun 2019 02:25:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560504310; cv=none; d=google.com; s=arc-20160816; b=hZVmFyR3wM7cpdHy695hutqSjnNVkDHGdI0VIVGRWyU6SNLqtbUSMo1RRhEyLBqOmz wQmQlEAj5rHWPMH6WQpHO4oSzixAhTMyljQDQVUniBa36Zn0tm4sLk8tyYZsMz5bWD12 Un40bqOqX7kK7062Nonvom2K1o+gkiktFvVcFi+yjAX7nkuSWSPBQX2IjjZwVzHeTC+7 zRFPDrwwr/82QMaDyk0z/1vkh9f4cS+S7EAlGSlYD3M61HQitBPPI720gcWwMlGV8kVd Fg3oSekTNXj6GzyzWIsw0gQkWCBI92J4Dx1CBKCLKa9S1neHLGeDAWVZgIt25LFzh+OI aEBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=fgOHPTKjJuZbdB0v0u0oAxg7s3rUa/VeOZJa0DNE+Io=; b=EfCPYOp0JYygn9CVeXgL2TIk9HKfYQ9AUZf4U1MIJezRLTUurzlsiUMCCKAitkSPo0 2DdwtWc/lD7JumkTssviuGLDf20lZ2IAvAQlfe+VhQarZUCaReeaFifPQ4UNyOOz0Z/Q 5jiyyYoDJz4N3KYiKd1RZbYQmDsmhaRYCjMg8BrTd06d0KOGgXSfc777dNQji/6FmzMT EStOSgllpm3tjp24EVAyUg/FDiJXm9vnvmM1B5Ncq7+D3Fxivz6vFuo0TN0xtLtuEh41 OSACsgoPienfFhjUsiFNxdVv9qOJ6pGiyM8qBCnsEEwbp6sV9594xQNeFWv+9ggCkUgp TBgw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 206si2131182pga.414.2019.06.14.02.24.53; Fri, 14 Jun 2019 02:25:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727014AbfFNJXk (ORCPT + 99 others); Fri, 14 Jun 2019 05:23:40 -0400 Received: from relay1-d.mail.gandi.net ([217.70.183.193]:34117 "EHLO relay1-d.mail.gandi.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726953AbfFNJXk (ORCPT ); Fri, 14 Jun 2019 05:23:40 -0400 X-Originating-IP: 88.190.179.123 Received: from localhost (unknown [88.190.179.123]) (Authenticated sender: repk@triplefau.lt) by relay1-d.mail.gandi.net (Postfix) with ESMTPSA id 2E5FE240018; Fri, 14 Jun 2019 09:23:34 +0000 (UTC) Date: Fri, 14 Jun 2019 11:33:21 +0200 From: Remi Pommarel To: Thomas Petazzoni Cc: Lorenzo Pieralisi , Bjorn Helgaas , Ellie Reeves , linux-pci@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2] PCI: aardvark: Fix PCI_EXP_RTCTL conf register writing Message-ID: <20190614093320.GC12859@voidbox.localdomain> References: <20190614064225.24434-1-repk@triplefau.lt> <20190614105854.4c2f270f@windsurf> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190614105854.4c2f270f@windsurf> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, On Fri, Jun 14, 2019 at 10:58:54AM +0200, Thomas Petazzoni wrote: > Hello, > > On Fri, 14 Jun 2019 08:42:25 +0200 > Remi Pommarel wrote: > > > PCI_EXP_RTCTL is used to activate PME interrupt only, so writing into it > > should not modify other interrupts' mask. The ISR mask polarity was also > > inverted, when PCI_EXP_RTCTL_PMEIE is set PCIE_MSG_PM_PME_MASK mask bit > > should actually be cleared. > > > > Fixes: 6302bf3ef78d ("PCI: Init PCIe feature bits for managed host bridge alloc") > > Are you sure about this Fixes tag ? This commit seems unrelated. > > The commit introducing this issue is 8a3ebd8de328301aacbe328650a59253be2ac82c. The 6302bf3ef78d commit fixes PCI bridge's PME flag which introduces the configuration of PCI_EXP_RTCTL register (which wasn't used before). So, yes, PCI_EXP_RTCTL conf was flawed since 8a3ebd8de328 but the infinite interrupt loop happens only since that 6302bf3ef78d has fixed this PME flag bug. I chose to use 6302bf3ef78d because it was the one commit triggering the bug during my bisect process, but yes maybe using the commit that introduced (even if it was silently) the problem makes more sense. So if you want I can do a v3 with this Fixes tag modification. -- Remi