Received: by 2002:a05:7412:b130:b0:e2:908c:2ebd with SMTP id az48csp2070783rdb; Mon, 20 Nov 2023 00:34:13 -0800 (PST) X-Google-Smtp-Source: AGHT+IG8v6y7v+XtzI4/XbO32bV8aa66zKp9D49RNGDQT4F4dLJgw/Nh76/azTjqsfiMZWcXs8y/ X-Received: by 2002:a17:90b:17c8:b0:283:2d65:f216 with SMTP id me8-20020a17090b17c800b002832d65f216mr6544064pjb.39.1700469252956; Mon, 20 Nov 2023 00:34:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700469252; cv=none; d=google.com; s=arc-20160816; b=BzjradWQWzNpYanmkwaBy2GOouXBmMoMJvnsBY4/x0WDWTyQwewD6dW4JjCfbhjbhD 1g2XxAoely8IU9eJQTDee/tABu2PFj9ILsmFqguUJCeUsRiFp8t8LeGmkWr6kKRjFan9 v+0u7uQ7JSUIZB+3cPrqAjiYmrpgEH0mzoVHV5CoL5BQlBDNY+Ebo3A2neYdLZUbDb7t QljlSNtm1cxGWrrOSWtMyfzZgKhiwl6J5OtveIkfduWC/Iz3IJB5EUIUXvWyDKWm5SIy gfJv1q5n+jdrnTeCGoZp4/nxQM7DcJOVAO6UD+ViUQ0vraVj5la0oIjoO8FCHTO50fuQ T1vw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=bMWxMXmZ4oTuPRJ3erYW6Z3F/q24pII+Blemx5awJXc=; fh=gYqxZ9UgEwekJ2pbHfqe/ZP+NWmHRlP8FJH9jC+FSRM=; b=wiEY9ILcV3g+CR6FKSJ+txQov1/YrXUfaI1pCfzQp100c/zD6rBG1c609JYciGOZW3 1u/4W7mMphmAKNWZsqTm/CDLb6NqGajE5XCL6bfIsJZxhUt4ug3ED5EJC8PGQiBsKnRr XQkQO+BaOK+Cprc2de5DANo04xZ3kXl6tIJOcWByOY0llgtz2yDyLBsA3NKx+D4rdcag H9BYocfaYwoQczNJ25twMBSh34RDfvgd3XRRzD87oiZ8Sv3e8pd58xNC4li/vPmaoR16 eOj0oiUxSmbQ2GuklYn/xqhjkBARXkWs3wSrQuDZGaJrBKK34eXMg+d8iO0PqdPeLuyH 7D/g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=GMmOiQtD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id ms20-20020a17090b235400b0028518de44ddsi1542270pjb.1.2023.11.20.00.34.12 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 20 Nov 2023 00:34:12 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=GMmOiQtD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 2973280AC591; Mon, 20 Nov 2023 00:34:10 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232206AbjKTId4 (ORCPT + 99 others); Mon, 20 Nov 2023 03:33:56 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48446 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231948AbjKTIdz (ORCPT ); Mon, 20 Nov 2023 03:33:55 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D13C690; Mon, 20 Nov 2023 00:33:51 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5FCF3C433C7; Mon, 20 Nov 2023 08:33:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1700469231; bh=tU2UJjlqk1vQaTQxeEVyYUCg/68DHf+RHTSnEAzmp30=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=GMmOiQtDqsyX2qx/w3rA46nOXMSMvnjqG5phU3YtYOZ2YLebRcqXPID1lN4qDQS8l R2ReKsdlGBapdPH9C9PkhLilqBqGhz2cH2A9xEDMak0zXCKfvTZVBKL99Fr4myfZdc U2YzIdwsHsanLy+Cqj0lPDUngTA0izxoHjfRB/HX/eGM2JA+vStGuD5ZwwPB+o2wKT 91qx+9oUL8M6mae8O7nODkHTS1UWhGM/zKVw7GxldU4ZgR9IxENyiXkP8eIRtZ61HM q7lj2lHs0s5iP7APHfq80VV6nHfvh9jdq5revRID+DVb1GC8ODnqedpC4pHrKRuDxZ ryr8KSdsohzrw== Received: from johan by xi.lan with local (Exim 4.96.2) (envelope-from ) id 1r4zjD-0008NN-2v; Mon, 20 Nov 2023 09:33:59 +0100 Date: Mon, 20 Nov 2023 09:33:59 +0100 From: Johan Hovold To: "David E. Box" Cc: Johan Hovold , Lorenzo Pieralisi , Krzysztof =?utf-8?Q?Wilczy=C5=84ski?= , Bjorn Helgaas , Andy Gross , Bjorn Andersson , Konrad Dybcio , Manivannan Sadhasivam , Rob Herring , Nirmal Patel , Jonathan Derrick , linux-arm-msm@vger.kernel.org, linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org Subject: Re: [PATCH 1/6] PCI/ASPM: Add locked helper for enabling link state Message-ID: References: <20231114135553.32301-1-johan+linaro@kernel.org> <20231114135553.32301-2-johan+linaro@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Mon, 20 Nov 2023 00:34:10 -0800 (PST) On Fri, Nov 17, 2023 at 04:00:46PM -0800, David E. Box wrote: > On Tue, 2023-11-14 at 14:55 +0100, Johan Hovold wrote: > > Add a helper for enabling link states that can be used in contexts where > > a pci_bus_sem read lock is already held (e.g. from pci_walk_bus()). > > > > This helper will be used to fix a couple of potential deadlocks where > > the current helper is called with the lock already held, hence the CC > > stable tag. > This solution is similar to the original one I proposed [1]. It just creates a > separate locked function rather than using a flag. While the API is consistent > with pci_disable_link_state_locked(), its usage is not. The vmd driver calls > pci_enable_link_state() from pci_walk_bus() which was problematic for Bjorn [2]. > I owed an attempt to implement this as a fixup. However, now > qcom_pcie_enabled_aspm() is also using it from pci_walk_bus(). The fixup could > make sense for VMD since there it's fixing missing BIOS settings, but I'm not > sure about qcom. Bjorn, do you still see issues with the use in pci_bus_walk()? We need this for Qualcomm platforms where the boot firmware does not enable ASPM, and the hotplug inconsistency was also discussed with Bjorn here: https://lore.kernel.org/linux-pci/20231018164731.GA1365588@bhelgaas/ > [1] > https://lore.kernel.org/lkml/20230321233849.3408339-1-david.e.box@linux.intel.com/ > > [2] https://lore.kernel.org/lkml/20230322205702.GA2493123@bhelgaas/ Johan