Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp4671932iob; Sun, 8 May 2022 21:25:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy2RlAJL26FTqgRU6CL1qPgFgt+0iq9g5ANlZ7HpjhBt6jX2NdwT3C6Ale9cLXwszXtrld9 X-Received: by 2002:a63:310a:0:b0:3c5:f9ba:b010 with SMTP id x10-20020a63310a000000b003c5f9bab010mr11951617pgx.143.1652070315919; Sun, 08 May 2022 21:25:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652070315; cv=none; d=google.com; s=arc-20160816; b=R+ptSMi+fhvZdZcDCJHOhGhNZbyFL8pD+Oybkr5VY3LJHC05jyFVNmEKto7TkCM6ec /rerqm3iSJwPaeb9hzs+ABdwbKgrh6KCdWly86ZgU0VVgjTysNaSagLVMFd0Va77DqFD 13KoppgcjjDAkd62nzxz2+9KTubV/f0kaln8P0IXcDck5kjeiB96r9mSsaCz9Imzmf9y JaQ0vL+tKVd0TEAWPTecPcDX8deWssJWXiJI/sraCPOuBunPLQWMeI5KJbuLRlUma2oI OdfZeCnmo66LU2pGiRm5gWdrq0pB7Bwn9swy08QIatrJfuEymJbQg+umFG3N8UMnRo+9 +2SQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=VwXYyN3vHV1DK1beiuiobC4kWNWx3/usWKq+4sghCco=; b=P0w9etyxueVdFJ896uyh8hVo5LmhUrxHUoVnLddfv63pceLs70H3tVm5/KlGnLbOqL Q14Ak6JItSO101ojP/hvc5ltOHIxpin4vYuINoVOehev2oZJrlXAVdmEXOrCrKrgiw+L tdc3OdcdoxQj9mIn1N/pwf1gYS4SLHkFy93DdazIww0tSrwpUUzTJvcSdepq6QLNn9N2 OtkupSIazxvJXPX/PsudYqBtMzuWDfzz4rw2hTj/IIe8sNYCifPP3s0DQ1K9qnQv8nVt 4ryxWYuxgSXMIvfkdqEZVmQbiUBg9U37AGSXckKLNlL9cmiUVtN6b7WVDM9iguUQkM6Y l6Ow== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=POIqY7hR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id o11-20020a63730b000000b003c67d44fe78si7716945pgc.437.2022.05.08.21.25.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 08 May 2022 21:25:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=POIqY7hR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 741F5116C19; Sun, 8 May 2022 21:25:07 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1441858AbiEFNpC (ORCPT + 99 others); Fri, 6 May 2022 09:45:02 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43114 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1441814AbiEFNo3 (ORCPT ); Fri, 6 May 2022 09:44:29 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A68A32BE7; Fri, 6 May 2022 06:40:45 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id DF808B835AA; Fri, 6 May 2022 13:40:43 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5040EC385A8; Fri, 6 May 2022 13:40:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1651844442; bh=RT1F1zNAaJmkdaF49UnBjI25nZ5pYOQV7wKcebKfjIA=; h=From:To:Cc:Subject:Date:From; b=POIqY7hRPVqRnKVU7bJThf6D6fVf8sDOi3cAgufXdobV1guN0UAx5CuwtDzOr6hAg x5h2CV9WPv54Fi//9WoyVx/vkWq0vBDV1+UlxFtpnnffzktD3rVPwXXJLBcqcQIz3/ TRNCEU4YH2I2m1gI1Wum1gVnaBQmIjD7ERe5yr5U24DS5SKCPHG1XLHkDttoXqUAsu q9CFVaeXYz3BedK/5foq0NmU2AiyHqALDUe9MYJM3sDAUwSzJP8iJ463SO8h5VstVf kt2tREwT+cfKXkdKcVvMgw4sOcKbjL5LTA4dlK9ykOlACMnza6G7zS1KfjnySkh/6B oROnzoZTL0I5A== Received: by pali.im (Postfix) id 8180D1141; Fri, 6 May 2022 15:40:39 +0200 (CEST) From: =?UTF-8?q?Pali=20Roh=C3=A1r?= To: Thomas Gleixner , Marc Zyngier , Rob Herring , Bjorn Helgaas , Andrew Lunn , Gregory Clement , Sebastian Hesselbarth , Thomas Petazzoni , Lorenzo Pieralisi , =?UTF-8?q?Krzysztof=20Wilczy=C5=84ski?= , =?UTF-8?q?Marek=20Beh=C3=BAn?= Cc: linux-kernel@vger.kernel.org, devicetree@vger.kernel.org, linux-pci@vger.kernel.org, linux-arm-kernel@lists.infradead.org Subject: [PATCH 0/6] PCI: mvebu: Add support for PME and AER interrupts Date: Fri, 6 May 2022 15:40:23 +0200 Message-Id: <20220506134029.21470-1-pali@kernel.org> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.9 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org mvebu PCIe PME and AER interrupts are reported via PCIe summary interrupt. PCIe summary interrupt is reported via mvebu MPIC SoC error summary interrupt. And MPIC SoC error summary interrupt is reported via MPIC IRQ 4. This patch series implements support for interrupts in MPIC SoC error hierarchy in irq-armada-370-xp.c driver and support for interrupts in mvebu PCIe hierarchy in pci-mvebu.c. Finally PCIe PME and AER interrupts are routed to the correct PCIe Root Port, which allows kernel PME and AER drivers to take care of them. Tested on A385 board and kernel PME and AER drivers works correctly: [ 0.898482] pcieport 0000:00:01.0: PME: Signaling with IRQ 61 [ 0.904422] pcieport 0000:00:01.0: AER: enabled with IRQ 61 [ 0.910113] pcieport 0000:00:02.0: enabling device (0140 -> 0142) [ 0.916299] pcieport 0000:00:02.0: PME: Signaling with IRQ 62 [ 0.922216] pcieport 0000:00:02.0: AER: enabled with IRQ 62 [ 0.927917] pcieport 0000:00:03.0: enabling device (0140 -> 0142) [ 0.934090] pcieport 0000:00:03.0: PME: Signaling with IRQ 63 [ 0.940006] pcieport 0000:00:03.0: AER: enabled with IRQ 63 This change finally allows to debug PCIe issues on A385 boards. Pali Rohár (6): dt-bindings: irqchip: armada-370-xp: Update information about MPIC SoC Error irqchip/armada-370-xp: Implement SoC Error interrupts ARM: dts: armada-38x.dtsi: Add node for MPIC SoC Error IRQ controller dt-bindings: PCI: mvebu: Update information about summary interrupt PCI: mvebu: Implement support for interrupts on emulated bridge ARM: dts: armada-385.dtsi: Add definitions for PCIe summary interrupts .../marvell,armada-370-xp-mpic.txt | 9 + .../devicetree/bindings/pci/mvebu-pci.txt | 1 + arch/arm/boot/dts/armada-385.dtsi | 20 +- arch/arm/boot/dts/armada-38x.dtsi | 5 + drivers/irqchip/irq-armada-370-xp.c | 213 +++++++++++++++++- drivers/pci/controller/pci-mvebu.c | 208 +++++++++++++++-- 6 files changed, 426 insertions(+), 30 deletions(-) -- 2.20.1