From: Bjorn Helgaas <helgaas@kernel.org>
To: Manivannan Sadhasivam <manivannan.sadhasivam@linaro.org>
Cc: lpieralisi@kernel.org, kw@linux.com, robh@kernel.org,
bhelgaas@google.com, linux-arm-msm@vger.kernel.org,
linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org,
Vidya Sagar <vidyas@nvidia.com>,
Jon Hunter <jonathanh@nvidia.com>
Subject: Re: [PATCH] PCI: qcom-ep: Move controller cleanups to qcom_pcie_perst_deassert()
Date: Fri, 16 Aug 2024 14:12:22 -0500 [thread overview]
Message-ID: <20240816191222.GA69867@bhelgaas> (raw)
In-Reply-To: <20240816050029.GA2331@thinkpad>
On Fri, Aug 16, 2024 at 10:30:29AM +0530, Manivannan Sadhasivam wrote:
> On Thu, Aug 15, 2024 at 05:47:17PM -0500, Bjorn Helgaas wrote:
> > [+cc Vidya, Jon since tegra194 does similar things]
> >
> > On Mon, Jul 29, 2024 at 05:52:45PM +0530, Manivannan Sadhasivam wrote:
> > > Currently, the endpoint cleanup function dw_pcie_ep_cleanup() and EPF
> > > deinit notify function pci_epc_deinit_notify() are called during the
> > > execution of qcom_pcie_perst_assert() i.e., when the host has asserted
> > > PERST#. But quickly after this step, refclk will also be disabled by the
> > > host.
> > >
> > > All of the Qcom endpoint SoCs supported as of now depend on the refclk from
> > > the host for keeping the controller operational. Due to this limitation,
> > > any access to the hardware registers in the absence of refclk will result
> > > in a whole endpoint crash. Unfortunately, most of the controller cleanups
> > > require accessing the hardware registers (like eDMA cleanup performed in
> > > dw_pcie_ep_cleanup(), powering down MHI EPF etc...). So these cleanup
> > > functions are currently causing the crash in the endpoint SoC once host
> > > asserts PERST#.
> > >
> > > One way to address this issue is by generating the refclk in the endpoint
> > > itself and not depending on the host. But that is not always possible as
> > > some of the endpoint designs do require the endpoint to consume refclk from
> > > the host (as I was told by the Qcom engineers).
> > >
> > > So let's fix this crash by moving the controller cleanups to the start of
> > > the qcom_pcie_perst_deassert() function. qcom_pcie_perst_deassert() is
> > > called whenever the host has deasserted PERST# and it is guaranteed that
> > > the refclk would be active at this point. So at the start of this function,
> > > the controller cleanup can be performed. Once finished, rest of the code
> > > execution for PERST# deassert can continue as usual.
> >
> > What makes this v6.11 material? Does it fix a problem we added in
> > v6.11-rc1?
>
> No, this is not a 6.11 material, but the rest of the patches I
> shared offline.
For reference, the patches you shared offline are:
PCI: qcom: Use OPP only if the platform supports it
PCI: qcom-ep: Do not enable resources during probe()
PCI: qcom-ep: Disable MHI RAM data parity error interrupt for SA8775P SoC
PCI: qcom-ep: Move controller cleanups to qcom_pcie_perst_deassert()
> > Is there a Fixes: commit?
>
> Hmm, the controller addition commit could be the valid fixes tag.
>
> > This patch essentially does this:
> >
> > qcom_pcie_perst_assert
> > - pci_epc_deinit_notify
> > - dw_pcie_ep_cleanup
> > qcom_pcie_disable_resources
> >
> > qcom_pcie_perst_deassert
> > + if (pcie_ep->cleanup_pending)
> > + pci_epc_deinit_notify(pci->ep.epc);
> > + dw_pcie_ep_cleanup(&pci->ep);
> > dw_pcie_ep_init_registers
> > pci_epc_init_notify
> >
> > Maybe it makes sense to call both pci_epc_deinit_notify() and
> > pci_epc_init_notify() from the PERST# deassert function, but it makes
> > me question whether we really need both.
>
> There is really no need to call pci_epc_deinit_notify() during the first
> deassert (i.e., during the ep boot) because there are no cleanups to be done.
> It is only needed during a successive PERST# assert + deassert.
>
> > pcie-tegra194.c has a similar structure:
> >
> > pex_ep_event_pex_rst_assert
> > pci_epc_deinit_notify
> > dw_pcie_ep_cleanup
> >
> > pex_ep_event_pex_rst_deassert
> > dw_pcie_ep_init_registers
> > pci_epc_init_notify
> >
> > Is there a reason to make them different, or could/should a similar
> > change be made to tegra?
>
> Design wise both drivers are similar, so it could apply. I didn't
> spin a patch because if testing of tegra driver gets delayed (I've
> seen this before), then I do not want to stall merging the whole
> series.
It can and should be separate patches, one per driver. But I don't
want to end up with the drivers being needlessly different.
> For Qcom it is important to get this merged asap to avoid
> the crash.
If this is not v6.11 material, there's time to work this out.
> > > + if (pcie_ep->cleanup_pending) {
> >
> > Do we really need this flag? I assume the cleanup functions could
> > tell whether any previous setup was done?
>
> Not so. Some cleanup functions may trigger a warning if attempted to do it
> before 'setup'. I think dw_edma_remove() that is part of dw_pcie_ep_cleanup()
> does that IIRC.
It looks safe to me:
dw_pcie_ep_cleanup
dw_pcie_edma_remove
dw_edma_remove(chip = &pci->edma) # struct dw_pcie *pci
dev = chip->dev
dw = chip->dw
if (!dw)
return -ENODEV
but if not, it could probably be made safe by adding a NULL pointer
check and/or a "chip->dw = NULL" at the right spot.
We hardly have any cleanup functions affected by "cleanup_pending", so
I think we can decide that they should be safe before 'setup' and just
make it so.
Bjorn
next prev parent reply other threads:[~2024-08-16 19:12 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-07-29 12:22 [PATCH] PCI: qcom-ep: Move controller cleanups to qcom_pcie_perst_deassert() Manivannan Sadhasivam
2024-07-29 12:28 ` Krishna Chaitanya Chundru
2024-07-29 13:55 ` Manivannan Sadhasivam
2024-07-31 4:31 ` Krishna Chaitanya Chundru
2024-08-13 20:28 ` Krzysztof Wilczyński
2024-08-21 21:43 ` Bjorn Helgaas
2024-09-01 16:35 ` Krzysztof Wilczyński
2024-08-15 22:47 ` Bjorn Helgaas
2024-08-16 5:00 ` Manivannan Sadhasivam
2024-08-16 19:12 ` Bjorn Helgaas [this message]
2024-08-17 2:01 ` Manivannan Sadhasivam
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20240816191222.GA69867@bhelgaas \
--to=helgaas@kernel.org \
--cc=bhelgaas@google.com \
--cc=jonathanh@nvidia.com \
--cc=kw@linux.com \
--cc=linux-arm-msm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-pci@vger.kernel.org \
--cc=lpieralisi@kernel.org \
--cc=manivannan.sadhasivam@linaro.org \
--cc=robh@kernel.org \
--cc=vidyas@nvidia.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox