Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp3694787ybv; Mon, 10 Feb 2020 04:51:53 -0800 (PST) X-Google-Smtp-Source: APXvYqzH2NvEsSdrwcslqlku0NpbLA4I5Bi1bd60/3CisVRvM+Uh6KKfbbJSdX0e+85p5m6cZAjx X-Received: by 2002:aca:1913:: with SMTP id l19mr674641oii.47.1581339113399; Mon, 10 Feb 2020 04:51:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581339113; cv=none; d=google.com; s=arc-20160816; b=xcxF4hJZfhZFqjHGPZoK/ZXHbe/2TMHFJjTyU/C/mSsc/7SASx0NW7kzFJn4rSKmIx KQdiwreLCpiX/XFlVJWlYcnWvAolbo0a55W7OrJzCPZDUtPgKnEaCoElWGyfwBwtqZH5 R/SZ4RsyPWUDxoPA26aNILWjouN0By7iM0oAzwavNk7eVa5cLQTo4RYgr2lvSJ4bwojv MRQ9qqBtQlX7JuVaL0mGxp/uPBz1FzdzseC4fOGD+I1MzOL7dcmudvAiZIaeY7gf921O GT1b+uACXRenDzKESCGJIKm52EkawtLCoYo6K7WKwExz7iR75DjrlnMximPBqxPMAQok k/6A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=4Z4etUeJetF0MymI2ybQ5B1/Uk5qqMurFW5Pjvzedjg=; b=K/PsE0Pd+MoOuBDSlsSUDDPDRdgclnGZtP2r59AweK9Q/w8H8UHE4bmGeYI/vnpDbC M3gSyOfCxuu+XXJTeE85YVuMckC/lev0u1MHIj3zbcZaoK/xf25tg/p/tMf5uvloub4O hCvTIpDxG3X21cSeVvCKti7sb+hBlqqnltnqfsMT3WJhA+PO8GhNuSTD3PTJbnjFJ06c gJMySif4qhju/2FoDvZeyVsQxlqAYBzA/j8sYsjFYsK2guoL2ZX06O6yyiIj6b/EuXmr HOjkqtez3/3IuEx6m1gEqF3Wif6K36nPDql6Fyu47myCYlz2wzw0RwAmkJNg9HE5GSd9 xWfw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jqfsfimJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r8si134834ota.288.2020.02.10.04.51.41; Mon, 10 Feb 2020 04:51:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jqfsfimJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730441AbgBJMnb (ORCPT + 99 others); Mon, 10 Feb 2020 07:43:31 -0500 Received: from mail.kernel.org ([198.145.29.99]:38920 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729573AbgBJMj5 (ORCPT ); Mon, 10 Feb 2020 07:39:57 -0500 Received: from localhost (unknown [209.37.97.194]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B454324650; Mon, 10 Feb 2020 12:39:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1581338396; bh=BSn5R7azljg7e9o9BU85gK//ULJ7l3w8oNS873dz39k=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=jqfsfimJaGYl5g/Vefm9+/Nh9Dz893qEeKqWLybS8WY0ZdhL7A+Ckl/6gt0Y6zFwD 7CCSdL57b/rKKBlCHfFQP8hExNIUlfxIW8fnrQU4a3VmiYvlWoZYAnuEIYAhZRl3a1 WMw5RIYS5NkzlleuI/r87rcu4YeheDLK7C1xc3bM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Yurii Monakov , Lorenzo Pieralisi , Andrew Murray Subject: [PATCH 5.5 092/367] PCI: keystone: Fix link training retries initiation Date: Mon, 10 Feb 2020 04:30:05 -0800 Message-Id: <20200210122432.860321951@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200210122423.695146547@linuxfoundation.org> References: <20200210122423.695146547@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Yurii Monakov commit 6df19872d881641e6394f93ef2938cffcbdae5bb upstream. ks_pcie_stop_link() function does not clear LTSSM_EN_VAL bit so link training was not triggered more than once after startup. In configurations where link can be unstable during early boot, for example, under low temperature, it will never be established. Fixes: 0c4ffcfe1fbc ("PCI: keystone: Add TI Keystone PCIe driver") Signed-off-by: Yurii Monakov Signed-off-by: Lorenzo Pieralisi Acked-by: Andrew Murray Cc: stable@vger.kernel.org Signed-off-by: Greg Kroah-Hartman --- drivers/pci/controller/dwc/pci-keystone.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/pci/controller/dwc/pci-keystone.c +++ b/drivers/pci/controller/dwc/pci-keystone.c @@ -510,7 +510,7 @@ static void ks_pcie_stop_link(struct dw_ /* Disable Link training */ val = ks_pcie_app_readl(ks_pcie, CMD_STATUS); val &= ~LTSSM_EN_VAL; - ks_pcie_app_writel(ks_pcie, CMD_STATUS, LTSSM_EN_VAL | val); + ks_pcie_app_writel(ks_pcie, CMD_STATUS, val); } static int ks_pcie_start_link(struct dw_pcie *pci)