Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp4419163rwe; Tue, 30 Aug 2022 09:44:05 -0700 (PDT) X-Google-Smtp-Source: AA6agR7Ce3VLTyNLo+zXLq498GsUBW+2rqwgI8SOnP+zmE28sQTubUDTxsFWpBT0Xz8speHn+aWt X-Received: by 2002:a63:451f:0:b0:42c:5a26:d7cc with SMTP id s31-20020a63451f000000b0042c5a26d7ccmr6209204pga.199.1661877845325; Tue, 30 Aug 2022 09:44:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661877845; cv=none; d=google.com; s=arc-20160816; b=OcYc1csLXfbRoXWyr7Ih2CcnsdjpPjvzI3Olnizg94+VYC6AMPavxrqlgXfWKn2gnq +xw/tNB0+aSjFfu56N0H0xPjtbK0jyPwZvyu7NuE0b/q4Jh3Ka7FPRHXgmB+DDB4/mn+ T+FHzgAz6iGGr2NJl0XRIFpXEXjYWrJzGTlTOXC91JyyomgsMCHzDF679ZTa3f0BXPa2 d0rfefcjVRlESrXPAK9GmYoNlkh4GkJfjFKxk3sk1LBAK4XdnJz/kJAE6DFA+n7hhnPL q+2/AN0eVS66envZL3iEFpkDHoWNoKQH6EGSaLFfNVcm1SYd5POiIZ5h7EovBlCz1dOh KCEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :message-id:subject:cc:to:from:date:dkim-signature; bh=o2BelkSP8qvIrb/xrxZZyFbF1rp98lBDEVXtbPdVH3w=; b=ZOI971fxnnPQNjkSoSIJVMPrR5QcDbKkQAqqwBrLlm1ggDMlMLtDyyfw2lGdN29uF2 c60IpnzXwy2SESdOvr8+zjFliOrChd8HSPpvdvg7hv2QCMSDIep3LXAaMSqr7dh1Ct/D 0bERDCUSOQvjrBAPzvPwRXmLDSaR4byJ0UGA9hwZWeO4kwsOgSOblCIJVfDvtq43GK+g ILZlv2cMF5vlB2LnlOiE3ikwLCEIb/I//ZOKYO1G0wz8uYluCxwySh58HOI1HOiOMfhQ i3VglOjI/24UrliIqtrK/P0MhuMYw4ov6JQm6CoK2p1gTxePAA6P5BAtp02E2qjRgW9M oB7Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="gWSU5o/B"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n5-20020a638f05000000b0042b438eeee1si2495129pgd.148.2022.08.30.09.43.54; Tue, 30 Aug 2022 09:44:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="gWSU5o/B"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229764AbiH3QZf (ORCPT + 99 others); Tue, 30 Aug 2022 12:25:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52010 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229453AbiH3QZe (ORCPT ); Tue, 30 Aug 2022 12:25:34 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9208D7F13B; Tue, 30 Aug 2022 09:25:32 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 308D4616EC; Tue, 30 Aug 2022 16:25:32 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5DEC3C433D6; Tue, 30 Aug 2022 16:25:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1661876731; bh=fX7lFkw2y3pdMg4VZBDhdTZbmlADf2lW89e/h6BNv1Q=; h=Date:From:To:Cc:Subject:In-Reply-To:From; b=gWSU5o/BDYQwHOOxA02WWMV7MiZJmwdgbPkYtqDMwpL9jaf4xEeUh8/W3mjsKlwV9 536yo7lJeLyxr6edq9HHeX1l+Qw2bAyNIMPUBP413iGqYGOO2TVOrKwmZJjoHi/+vN mS1OyMzZ187YZEvSlxBCmmgRVIVIJc/pyLt+8qQIyvqnC2f47W3HUVWcTGIr7ZzkN4 B/BWvbqo/ipODa3NCTJ31jYqVmrbJ6J7h9PHuwqyJm+cfm08ra3+Jth+EfK82jHVoz PjJTtjLoNm/4xzm2C5Y8CH2tCfnSCGKKyWtdCN0xijCiGElR1Svfs0vVHnpr1uwJPP TpzxXPI0GR5ag== Date: Tue, 30 Aug 2022 11:25:29 -0500 From: Bjorn Helgaas To: Rajvi Jingar Cc: rafael.j.wysocki@intel.com, bhelgaas@google.com, david.e.box@linux.intel.com, linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, linux-pm@vger.kernel.org, Kai-Heng Feng Subject: Re: [RESEND PATCH v3 2/2] PCI/PTM: fix to maintain pci_dev->ptm_enabled Message-ID: <20220830162529.GA106073@bhelgaas> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220830104913.1620539-2-rajvi.jingar@linux.intel.com> X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [+cc Kai-Heng] On Tue, Aug 30, 2022 at 03:49:13AM -0700, Rajvi Jingar wrote: > pci_dev->ptm_enabled needs to be maintained to reflect the current PTM > state of the device. In pci_ptm_disable(), clear ptm_enabled from > 'struct pci_dev' on disabling PTM state for the device. > In pci_restore_ptm_state(), set dev->ptm_enabled based on the restored > PTM state of the device. > > In pci_ptm_disable(), perform ptm_enabled check to avoid config space > access in case if PTM is already disabled for the device. ptm_enabled > won't be set for non-PCIe devices so pci_is_pcie(dev) check is not > needed anymore. This one sounds like it's supposed to fix something, but I'm not clear exactly what. I have a vague memory of config accesses messing up a low power state. But this is still completely magical and unmaintainable since AFAIK there is nothing in the PCIe spec about avoiding config accesses when PTM is disabled. At the very least, we would need more details in the commit log and a hint in the code about this. > Signed-off-by: Rajvi Jingar > Reviewed-by: Rafael J. Wysocki > --- > v1->v2: > - add ptm_enabled check in pci_ptm_disable(). > - set the dev->ptm_enabled value in pci_restore_ptm_state(). > v2->v3: > - remove pci_is_pcie(dev) check in pci_ptm_disable(). > - add Reviewed-by tag in commit message > --- > drivers/pci/pcie/ptm.c | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > > diff --git a/drivers/pci/pcie/ptm.c b/drivers/pci/pcie/ptm.c > index 368a254e3124..1ce241d4538f 100644 > --- a/drivers/pci/pcie/ptm.c > +++ b/drivers/pci/pcie/ptm.c > @@ -34,7 +34,7 @@ void pci_disable_ptm(struct pci_dev *dev) > int ptm; > u16 ctrl; > > - if (!pci_is_pcie(dev)) > + if (!dev->ptm_enabled) > return; This will conflict with a change Kai-Heng Feng and I have been working on, but I can resolve it when applying. > ptm = pci_find_ext_capability(dev, PCI_EXT_CAP_ID_PTM); > @@ -44,6 +44,7 @@ void pci_disable_ptm(struct pci_dev *dev) > pci_read_config_word(dev, ptm + PCI_PTM_CTRL, &ctrl); > ctrl &= ~(PCI_PTM_CTRL_ENABLE | PCI_PTM_CTRL_ROOT); > pci_write_config_word(dev, ptm + PCI_PTM_CTRL, ctrl); > + dev->ptm_enabled = 0; > } > > void pci_save_ptm_state(struct pci_dev *dev) > @@ -83,6 +84,7 @@ void pci_restore_ptm_state(struct pci_dev *dev) > > cap = (u16 *)&save_state->cap.data[0]; > pci_write_config_word(dev, ptm + PCI_PTM_CTRL, *cap); > + dev->ptm_enabled = !!(*cap & PCI_PTM_CTRL_ENABLE); > } > > void pci_ptm_init(struct pci_dev *dev) > -- > 2.25.1 >