Received: by 10.192.165.148 with SMTP id m20csp3140605imm; Mon, 23 Apr 2018 00:59:40 -0700 (PDT) X-Google-Smtp-Source: AIpwx49O7voFSiiOA0WdowrOYDyCohVkXT+gGczFv/ieRjkR4oCY5B8DW9QFc2eFcLZ37pvizE5K X-Received: by 10.101.91.7 with SMTP id y7mr16045669pgq.396.1524470380832; Mon, 23 Apr 2018 00:59:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524470380; cv=none; d=google.com; s=arc-20160816; b=ZkeTTrz0qmxf2npsQKzqczQLLtpZHYSDrTJDImJ5kwqTUOlD6GFFJAaN4AGxtqwshO MFs35uGNxZbM71PZXMJmbpU6hjIGshSxNrcAd82m4o4yp6YzOSLKLAGum+RumRFfVxIV w9E+Z5QoMcH9C505p4c328eyw0cxheCczuvecMNePd5ZinXRcuRL+7/t3obLQGea70Ke M9t/wXb6CMrlZshfUS4/5TKv9iSfnFmWtJ446oeiIkljxBQkd3Bokju2cFa0Op8tI5V9 KR0zia6vU4IGT0RwRWdff6j4jPTHMzcAhfCmE+lUIpBKCxAeRvIXhh/pYAcZra1kqtJu F+fQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=ZCN0gLd52IkafJ12wLnCIgAiTa+Qx178rqC32FuOnDM=; b=iXPQygz66VMTwUksezvZZ34ktgHCCxLrcw1HWOT+cDS/c9LWb1jfayNy/zNx8CW+d/ mgJf6QbbCdYaG8/z+ZqQ/+H1KGHIMcplCNqqGxLdPbkP6/Qw9Mw/4pvcRHlpiLZkK4KU nZNCWv3uXhzZZBOFyw1D7J3bXIxO1qsWV2UBPDvXUBh9O9R9ym0gU4s8pGG+hnk+0wf3 cCR1d8amTdmMl2BwBc/41rvgL46EpuKrGYcksbuy5yu8IpIstyMYTKGno3oKWmw3UIX2 /GVN3FZWHfp3o4vkXT1yGt8OpsFxIbIOeGzumspKT0uV+zZeFvGudQFY0VVfctAkLI9s oHzw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b9si9194954pgu.157.2018.04.23.00.59.26; Mon, 23 Apr 2018 00:59:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754411AbeDWH5C (ORCPT + 99 others); Mon, 23 Apr 2018 03:57:02 -0400 Received: from cloudserver094114.home.pl ([79.96.170.134]:61192 "EHLO cloudserver094114.home.pl" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754382AbeDWH4z (ORCPT ); Mon, 23 Apr 2018 03:56:55 -0400 Received: from 79.184.254.176.ipv4.supernova.orange.pl (79.184.254.176) (HELO aspire.rjw.lan) by serwer1319399.home.pl (79.96.170.134) with SMTP (IdeaSmtpServer 0.83) id 64d283c2a60cff73; Mon, 23 Apr 2018 09:56:53 +0200 From: "Rafael J. Wysocki" To: Bjorn Helgaas Cc: linux-pci@vger.kernel.org, Sinan Kaya , Rajat Jain , Srinath Mannam , Ray Jui , Keith Busch , linux-acpi@vger.kernel.org, linux-nvme@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v1 0/2] PCI/ASPM: Tighten up ASPM L1.2 and LTR usage Date: Mon, 23 Apr 2018 09:56:46 +0200 Message-ID: <7042555.G8Gd07mvkX@aspire.rjw.lan> In-Reply-To: <152417080402.76853.4258398181136860884.stgit@bhelgaas-glaptop.roam.corp.google.com> References: <152417080402.76853.4258398181136860884.stgit@bhelgaas-glaptop.roam.corp.google.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thursday, April 19, 2018 11:05:19 PM CEST Bjorn Helgaas wrote: > The ASPM L1.2 substate depends on LTR information. Per the PCI > Firmware spec, the OS is supposed to negotiate with the platform for > control of the LTR feature, but previously we didn't do that. > > In addition, we must not enable LTR in an endpoint unless the Root > Complex and all intermediate switches also support LTR. We already > took care of that in pci_configure_ltr(), but we didn't ensure that > LTR was enabled before allowing ASPM L1.2 to be enabled. > > These patches fix both of these issues. Or rather, they *should* fix > them. I don't have hardware to test them, so any help with testing > would be appreciated. > > I think the most likely issue would be a platform where the hardware > supports LTR and the ASPM L1.2 substate, but the BIOS doesn't support > LTR in _OSC. In that case, we previously could have enabled ASPM L1.2 > (though it probably wouldn't work correctly), and after these patches, > we should not enable ASPM L1.2. > > You can look for issues by comparing dmesg and "lspci -vv" output > before and after these patches. > > It would also be interesting to collect an acpidump from platforms > that support LTR, even if there's no endpoint that supports ASPM L1.2. > The acpidump should show that _OSC supports LTR. > > I included some NVMe folks because these were motivated by Srinath's > recent report of LTR and ASPM issues with a Samsung NVMe SSD > Controller SM961/PM961 device, so this is sort of FYI in case you see > similar issues or are in a position to test these. > > --- > > Bjorn Helgaas (2): > PCI/ASPM: Disable ASPM L1.2 Substate if we don't have LTR > PCI/ACPI: Request LTR control from platform before using it For both: Reviewed-by: Rafael J. Wysocki