Received: by 10.192.165.148 with SMTP id m20csp4216480imm; Mon, 30 Apr 2018 14:03:36 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoa4hJLMRVTDDg7vb+YPPe23feS1Uo9LJOS28WdO384+lt429uPmb5ADPCVmX0Q3VwAUjE6 X-Received: by 2002:a17:902:9349:: with SMTP id g9-v6mr12483641plp.375.1525122216766; Mon, 30 Apr 2018 14:03:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525122216; cv=none; d=google.com; s=arc-20160816; b=jFqwiOelTpOVl2AAJmC4BHxfgU9wtKjC7rAcCCC9C/jo43/NSqVtbMoVpzO8qnNM+5 mqAWOlhUNNLCZepmb5NMYXWCuMweTEC2SC6wC96wjpbaOf0sk4/ZKgifUQOe5wauFSKL rkxIGRY163HhxY8VXH9+9IFJ5nKkAaIe7dPhrEeDxvvkTI3jUwfk+I/ITeP9rbvCbfKN KfEhtbKYl+aiwKvz0dQo98RoS6Bl/bso3JyLSyY8h795VKWbqYMPSNK379Z53wJQhzom 5ZGeQ+s7m9rymo9CpukTSahz+gNE+IYHmSHOWs6lvwnZR9W5MUS4oCCba7Boev23YkgN tbUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dmarc-filter:arc-authentication-results; bh=lnCq6gFutfU8q/qJm5kEiixEokGj5vTyNvcHdZy99ao=; b=oFtc0F7wzgg93N4zGccnqBeu7Txs4UU++1X4beQSVorJ8QbSSwoZf15wbcL16U3RWa X4nmPXLCHINPUTjkDg22t/9n6WPvSaruU6KPBQ4A1yMBMVHnK4Zc/VrMLJVG30PZnl6w x9sVxe0tynZycZfwysUaevz9jW7G0WPRJ1wSE3NMPb/J8MHl4UpT9iejh4B/XrH/PODr CA9Eos1AB0qW8vPBSRpMYf0Wx2SXpPuEjEplixoWY/D25/Uem6Jlk3EycfR4rxKCF1VG pkgv/oDnHo4BenJ1GplM7KBIt9iUc+j9T2FS0UhFwiT3aelibLUM7L+ubwiR1KSzom2R bJ1A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q23si8066675pfj.8.2018.04.30.14.03.21; Mon, 30 Apr 2018 14:03:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755253AbeD3VDC (ORCPT + 99 others); Mon, 30 Apr 2018 17:03:02 -0400 Received: from mail.kernel.org ([198.145.29.99]:48172 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755162AbeD3VC7 (ORCPT ); Mon, 30 Apr 2018 17:02:59 -0400 Received: from localhost (unknown [69.71.5.252]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5246122B37; Mon, 30 Apr 2018 21:02:58 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 5246122B37 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=helgaas@kernel.org Date: Mon, 30 Apr 2018 16:02:56 -0500 From: Bjorn Helgaas To: linux-pci@vger.kernel.org Cc: "Rafael J. Wysocki" , Sinan Kaya , Rajat Jain , Srinath Mannam , Ray Jui , Keith Busch , linux-acpi@vger.kernel.org, linux-nvme@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v1 0/2] PCI/ASPM: Tighten up ASPM L1.2 and LTR usage Message-ID: <20180430210256.GE95643@bhelgaas-glaptop.roam.corp.google.com> References: <152417080402.76853.4258398181136860884.stgit@bhelgaas-glaptop.roam.corp.google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <152417080402.76853.4258398181136860884.stgit@bhelgaas-glaptop.roam.corp.google.com> User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 19, 2018 at 04:05:19PM -0500, Bjorn Helgaas wrote: > The ASPM L1.2 substate depends on LTR information. Per the PCI > Firmware spec, the OS is supposed to negotiate with the platform for > control of the LTR feature, but previously we didn't do that. > > In addition, we must not enable LTR in an endpoint unless the Root > Complex and all intermediate switches also support LTR. We already > took care of that in pci_configure_ltr(), but we didn't ensure that > LTR was enabled before allowing ASPM L1.2 to be enabled. > > These patches fix both of these issues. Or rather, they *should* fix > them. I don't have hardware to test them, so any help with testing > would be appreciated. > > I think the most likely issue would be a platform where the hardware > supports LTR and the ASPM L1.2 substate, but the BIOS doesn't support > LTR in _OSC. In that case, we previously could have enabled ASPM L1.2 > (though it probably wouldn't work correctly), and after these patches, > we should not enable ASPM L1.2. > > You can look for issues by comparing dmesg and "lspci -vv" output > before and after these patches. > > It would also be interesting to collect an acpidump from platforms > that support LTR, even if there's no endpoint that supports ASPM L1.2. > The acpidump should show that _OSC supports LTR. > > I included some NVMe folks because these were motivated by Srinath's > recent report of LTR and ASPM issues with a Samsung NVMe SSD > Controller SM961/PM961 device, so this is sort of FYI in case you see > similar issues or are in a position to test these. > > --- > > Bjorn Helgaas (2): > PCI/ASPM: Disable ASPM L1.2 Substate if we don't have LTR > PCI/ACPI: Request LTR control from platform before using it > > > drivers/acpi/pci_root.c | 7 +++++++ > drivers/pci/pcie/aspm.c | 9 +++++++++ > drivers/pci/probe.c | 5 +++++ > include/linux/acpi.h | 3 ++- > include/linux/pci.h | 1 + > 5 files changed, 24 insertions(+), 1 deletion(-) Applied to pci/aspm for v4.18 with Rafael's reviewed-by and Srinath's tested-by (on first patch).