Received: by 2002:a05:6358:bb9e:b0:b9:5105:a5b4 with SMTP id df30csp400903rwb; Fri, 2 Sep 2022 16:37:20 -0700 (PDT) X-Google-Smtp-Source: AA6agR526iPnw0VaLRUdukxSmo1FLHn1puNFbZWg1PaCy9MDDz5Fa+ykaaCSepjN+zzTjMs0h1WN X-Received: by 2002:a17:907:a410:b0:741:386b:17e4 with SMTP id sg16-20020a170907a41000b00741386b17e4mr23806296ejc.46.1662161839774; Fri, 02 Sep 2022 16:37:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662161839; cv=none; d=google.com; s=arc-20160816; b=l+dUr/RXN+Pl4wBsgjWiSJ0t1uMehypiyMWkhAm+2PWmcNvTceuNd7BveG52pKW8XG FM5t1jJ6vSBgOnp+gNmNk9tJFvFxEWUWiGt6qtTgeBleorUQGZErdinn1HGcIypixQMn qlu1kuX6bwYKrDgTG2H5PU6F8YEkXDqvIAEmwinyoC5TJXAZUK4m1HEH0DtB82v9QEMi brr2LwwUzFHe1LD9t13bQwoA0WfJdvZWbSqppFY+CVidqeB2uZ5GJaF+AfEFzrZnb1OF TzqVM1qaoUmWM7t1JvX5y+FaHU/fTITKIlsB5QOqTzR/4VQ0bmYkCamDRmwdztwbyKll 9jDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :message-id:subject:cc:to:from:date:dkim-signature; bh=VF75m/mNvw5DlzmZ0HcbKTB4JLeOrLToAQ24YBGRk6s=; b=0NP4tBLWW/Xa49ub6JMtkdEEKjdNr3P4XdZzgzu+dBUdy82kGDQecQUkYT4vjxBvqZ 0gPga726FXTTKyMLUpyPHHv6Jvp7PF4wUlYKqj9HTqhtvNHrdq2Sw3AEoct9BC/Ge8AG 2yPZ56F9dW8nk96/MGo9iDHTiq6cagDwPHnIrxixAEEtPW7WgEDteVxAey1Wh5iNEdUe x7nT32V5ED860pbPTeM3X02SL6aOdlCraBKRmt/GgB0m+kHs6n+MW+xr+NCgQecsAXda a5T6VpOCjA9FxmYHajK/AhSxZSdqPwsx+sPcAKC+55Ub3BFNpHcsNizm6BObkf0U9UCP p5Zg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="r/WhKay9"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d1-20020a50ea81000000b0043dff638b33si2343824edo.285.2022.09.02.16.36.54; Fri, 02 Sep 2022 16:37:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="r/WhKay9"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230138AbiIBXck (ORCPT + 99 others); Fri, 2 Sep 2022 19:32:40 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35508 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229517AbiIBXci (ORCPT ); Fri, 2 Sep 2022 19:32:38 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B8218FBA52; Fri, 2 Sep 2022 16:32:37 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 7BE85B82E09; Fri, 2 Sep 2022 23:32:36 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id EBFF4C433D6; Fri, 2 Sep 2022 23:32:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1662161555; bh=ql5z0DlbjgYQ4iRXGuQnGIo40H+DIE+ADXoJxnPR0oA=; h=Date:From:To:Cc:Subject:In-Reply-To:From; b=r/WhKay9QaAlFpfwSR8CPlw8+AkFRg41xzGrTlMtuw5HCnviRus2WqxD8UlT2dQU6 Rn9kJ5VaLpq55OdkbSdnJdu2T9v2fSBJWpAkC9YFO6kYfsFwWs6CEh59fvVHOKHiUW Ux7PxnvDxu1nlB8GaPOHm/hTIOf7ellSV80lwR18TomrnVjmoHf742PRAG2o9qKEsv 28PlRyovrUDbWJzJ47lK15poKSehnK3D07gEPIjpduKnJ/o73t+FjL/mkNuNx2FW+i Ohm7EKf7dclSfJN2cNnGZZKutBu6IH3F/Qdkz5MvnO1Ub3CAyi4QoW7KlnvSEcxSkx v4osYuZpEED4Q== Date: Fri, 2 Sep 2022 18:32:33 -0500 From: Bjorn Helgaas To: Sathyanarayanan Kuppuswamy Cc: Kai-Heng Feng , Rajvi Jingar , "Rafael J . Wysocki" , Koba Ko , Mika Westerberg , "David E . Box" , linux-pci@vger.kernel.org, linux-pm@vger.kernel.org, linux-kernel@vger.kernel.org, Bjorn Helgaas Subject: Re: [PATCH 1/4] PCI/PTM: Preserve PTM Root Select Message-ID: <20220902233233.GA390494@bhelgaas> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <44b33ce9-e0ed-976c-9a13-b154d32b200e@linux.intel.com> X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Sep 02, 2022 at 02:11:12PM -0700, Sathyanarayanan Kuppuswamy wrote: > On 9/2/22 1:38 PM, Bjorn Helgaas wrote: > > On Fri, Sep 02, 2022 at 10:24:05AM -0700, Sathyanarayanan Kuppuswamy wrote: > >> On 9/2/22 7:58 AM, Bjorn Helgaas wrote: > >>> From: Bjorn Helgaas > >>> > >>> When disabling PTM, there's no need to clear the Root Select bit. We > >>> disable PTM during suspend, and we want to re-enable it during resume. > >>> Clearing Root Select here makes re-enabling more complicated. > >> > >> Currently, it looks like we disable PCI_PTM_CTRL_ROOT in pci_disable_ptm(), > >> but not enable it in pci_enable_ptm(). Do you know this did not trigger an > >> issue? > ... > > Thanks for asking this, because it reminds me why I didn't add > > pci_enable_ptm() calls in the resume paths! That would make them > > parallel with the suspend paths, which would definitely be nice. But > > we would have to rework pci_enable_ptm() to work for Root Ports and > > Switch Ports as well. I think we *could* do that. What do you think? > > IMO, the code will look better if we keep the suspend and resume paths in > sync. Since we are calling pci_disable_ptm() in suspend path, it makes > sense to call pci_enable_ptm() in resume path. > > Making the pci_enable_ptm() handle root and upstream ports should not > be very complicated, right? I took a stab at it. pci_enable_ptm() is getting kind of ugly, but maybe it's better overall. I'll post it and you can see what you think.