Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp699434ybv; Thu, 13 Feb 2020 07:59:57 -0800 (PST) X-Google-Smtp-Source: APXvYqzBoPw4f6h6MzggVam0Njte3E+t1+XbUT6FA00aRRjAqei7k6L56fTlxlvP66L7ijWXYUEC X-Received: by 2002:a05:6830:c7:: with SMTP id x7mr13291760oto.272.1581609597134; Thu, 13 Feb 2020 07:59:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581609597; cv=none; d=google.com; s=arc-20160816; b=cwderb5JGtjsaAJj2wCQ3aKykjngrc/K+YIzCuTkfhgDUtRYQ4JUfNnsINYA3NZ0rm E5NU+Omamw9cSwpCXhaRCX1HgCmcvgQIrkzUG+IWWhy4c6VDp97uZNVdCUI+K1X22JR4 Vx2IAk9kYfiWI4fzG8h33JZWJmJjyn9DyRibk9g6MWVH5Dj/0wz6pUCB5n4UShZkKXyz 53wl+ibCCp64t/q5XN0D8X3HWxJzVZFRjpbETyMuVgOJ1HsKPNv/A2gAZiK7x0wi0lNK Kp4ZgWz5LiqQH4JiaLC56+eKdzQ05NQYy3L7mWx2vgMUP0Ggl7Jx5YabY32SLi+AxXJe bliw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=gxDxDr9yflFk7DBy9pzM3KshWDHPOh3Dv6jDyHOJ9I8=; b=x7g1BkEqgqeREvI4ZxUERmEMuNwed4+9wzNBRHjtYBgfBq0JG5SSIbd9Tr/ZQGSJ3n zReNcDx3t5BpWfygIMDIa21uLQt8kX7XT9mLTjFZWK9QC/jmOKX+ej9qvbrycv0hm9Pn mM2Ds3/QwZ02barpHV92lglThOo6pANzIoGaDgE/5zGO3suV2uCHp6lvlxb1wSt7XA5x ZSlilq2TnnwMGMOd7RAOBBgt0k6wO/MhrpBdNVrpxHLBMlrgLYYbvAO7g4Hc8sYjYmq0 KnTXUnJ6zxdlzJKQ7xKSRa4C66VHQj7yfQNuX0fYnXec4OJWKCCyjQ4H+ge2NJIhIJxF bPXA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2rG0zJjw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z14si1181183oth.15.2020.02.13.07.59.44; Thu, 13 Feb 2020 07:59:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2rG0zJjw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728824AbgBMPYv (ORCPT + 99 others); Thu, 13 Feb 2020 10:24:51 -0500 Received: from mail.kernel.org ([198.145.29.99]:34670 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728388AbgBMPX2 (ORCPT ); Thu, 13 Feb 2020 10:23:28 -0500 Received: from localhost (unknown [104.132.1.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7ED2F2469A; Thu, 13 Feb 2020 15:23:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1581607407; bh=h1jvcIZdjodHYjLypghcVkFJ+zkW2H7PdFtEX+iSY20=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2rG0zJjwmX26fT/yBsZezx9owal79C6Zhf6GNdyy7+TkULLTFFoxpaAuTPRwlh7sO ozv6Jcvi603QF2FTr9pK+1uMfpueMqdDT6s3adJNNu9H6R4SECx/L7Dm0AcMAKCk2z xZAZbMEViRqFwhAHiwYvAEnSNFZlCyTx4o5KB8nI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Yurii Monakov , Lorenzo Pieralisi , Andrew Murray , Sasha Levin Subject: [PATCH 4.9 027/116] PCI: keystone: Fix link training retries initiation Date: Thu, 13 Feb 2020 07:19:31 -0800 Message-Id: <20200213151853.493272633@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200213151842.259660170@linuxfoundation.org> References: <20200213151842.259660170@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Yurii Monakov [ Upstream commit 6df19872d881641e6394f93ef2938cffcbdae5bb ] ks_pcie_stop_link() function does not clear LTSSM_EN_VAL bit so link training was not triggered more than once after startup. In configurations where link can be unstable during early boot, for example, under low temperature, it will never be established. Fixes: 0c4ffcfe1fbc ("PCI: keystone: Add TI Keystone PCIe driver") Signed-off-by: Yurii Monakov Signed-off-by: Lorenzo Pieralisi Acked-by: Andrew Murray Cc: stable@vger.kernel.org Signed-off-by: Sasha Levin --- drivers/pci/host/pci-keystone-dw.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/pci/host/pci-keystone-dw.c b/drivers/pci/host/pci-keystone-dw.c index 9397c46671062..f011a8780ff53 100644 --- a/drivers/pci/host/pci-keystone-dw.c +++ b/drivers/pci/host/pci-keystone-dw.c @@ -502,7 +502,7 @@ void ks_dw_pcie_initiate_link_train(struct keystone_pcie *ks_pcie) /* Disable Link training */ val = ks_dw_app_readl(ks_pcie, CMD_STATUS); val &= ~LTSSM_EN_VAL; - ks_dw_app_writel(ks_pcie, CMD_STATUS, LTSSM_EN_VAL | val); + ks_dw_app_writel(ks_pcie, CMD_STATUS, val); /* Initiate Link Training */ val = ks_dw_app_readl(ks_pcie, CMD_STATUS); -- 2.20.1