Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp783651ybt; Fri, 19 Jun 2020 13:42:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxdRk/68L2vupqay9ooD/IK2xOWcm3KnS9IdWNVf/cst2sAzPzkfwRitrF3JEA4njRDlNtH X-Received: by 2002:a17:906:f913:: with SMTP id lc19mr5233714ejb.286.1592599333898; Fri, 19 Jun 2020 13:42:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592599333; cv=none; d=google.com; s=arc-20160816; b=oKymwkKMyn08p1G/HBtUnh5INczPa3QxoVQnmHof6uGfhBQvk6DV6r2pmK4SbFR91m +PfVKYH9MaZOBAsKHL6tzmDaBQSXdvYWLPrvFSXeBiiIOFWRIw96kzAEhJTcCs4r4Mhh Yaay2Zc+61wYoG75sGZgZqNMc3XO4rpq+HB3jgXx++mCECUxSL4wqsO6drEVgMziYrbo g80cJe1UZ/vlyf0OQyUnN2hJ4WKWbzVPE69inlW/Fv3xRNw7y0i7oa9IOyf/agpT+WL+ 3v/Poes8IevnvobBnqHyWwJ+BZKG76nSEJGH4kQQqkYQjZysBzSKyM/ZeoOX6gmeuudX ZS2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=k4/85reCBuFtmc1BoY7/C+Za7O+1cxpqlWv1GBstalg=; b=bzo+t3rPjhbDJG2KrkM02vKLdOgK7mg1DcQ2mPxpbOKqsqr/TT2iW2Lq7S5c71jdUC Pi1kYaqXqeR/Z/pXB88Cm7FwA+hgNQTO+kYTrpP6fYURVbkuVj2li+nA0L0fWNYhcGBr B4VG9+atjQ98YqCZG8SrpGfnUjM57kPy3U2QuCgfn596WZfNwvbTAx8JFpL+jK4zzfcx sA016mvmKsu17JmybPatzlNx4FMIdvL7vvJamNQjKmjcOpgEsGVPLEv90T30vz5kPKw6 vwObLM/WJPrUQncfdD7b+eWSku57xMtg4wl1i/Mma4GNABY70PEej0fy6ov3slXk1fSR ncGg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=us6aRXz+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s2si4268511ejv.337.2020.06.19.13.41.50; Fri, 19 Jun 2020 13:42:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=us6aRXz+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389632AbgFSOxJ (ORCPT + 99 others); Fri, 19 Jun 2020 10:53:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:47364 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389690AbgFSOxH (ORCPT ); Fri, 19 Jun 2020 10:53:07 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BF06721852; Fri, 19 Jun 2020 14:53:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592578387; bh=wNE4d/y/KwReZvgM0w+QmOl4/gIlUfiYZGCFEF3hM5w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=us6aRXz+pV/UAQbaFy1Edtk7cnT7+wKHTwisnaxatPf4imjkt9WiCGmyIDbHGR51C IK7qhTALa/AkAH3ucDYpC0zstb6ogy4j26m+UANDHPNxOPJfANa25Kqr5KrS3x/aw2 XmPAnK83d1Q5k153iDm0iCbdUIkavHYn46AyTxKY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dave Jiang , Ashok Raj , Bjorn Helgaas Subject: [PATCH 4.14 162/190] PCI: Program MPS for RCiEP devices Date: Fri, 19 Jun 2020 16:33:27 +0200 Message-Id: <20200619141641.854318422@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200619141633.446429600@linuxfoundation.org> References: <20200619141633.446429600@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ashok Raj commit aa0ce96d72dd2e1b0dfd0fb868f82876e7790878 upstream. Root Complex Integrated Endpoints (RCiEPs) do not have an upstream bridge, so pci_configure_mps() previously ignored them, which may result in reduced performance. Instead, program the Max_Payload_Size of RCiEPs to the maximum supported value (unless it is limited for the PCIE_BUS_PEER2PEER case). This also affects the subsequent programming of Max_Read_Request_Size because Linux programs MRRS based on the MPS value. Fixes: 9dae3a97297f ("PCI: Move MPS configuration check to pci_configure_device()") Link: https://lore.kernel.org/r/1585343775-4019-1-git-send-email-ashok.raj@intel.com Tested-by: Dave Jiang Signed-off-by: Ashok Raj Signed-off-by: Bjorn Helgaas Cc: stable@vger.kernel.org Signed-off-by: Greg Kroah-Hartman --- drivers/pci/probe.c | 22 +++++++++++++++++++++- 1 file changed, 21 insertions(+), 1 deletion(-) --- a/drivers/pci/probe.c +++ b/drivers/pci/probe.c @@ -1557,13 +1557,33 @@ static void pci_configure_mps(struct pci struct pci_dev *bridge = pci_upstream_bridge(dev); int mps, p_mps, rc; - if (!pci_is_pcie(dev) || !bridge || !pci_is_pcie(bridge)) + if (!pci_is_pcie(dev)) return; /* MPS and MRRS fields are of type 'RsvdP' for VFs, short-circuit out */ if (dev->is_virtfn) return; + /* + * For Root Complex Integrated Endpoints, program the maximum + * supported value unless limited by the PCIE_BUS_PEER2PEER case. + */ + if (pci_pcie_type(dev) == PCI_EXP_TYPE_RC_END) { + if (pcie_bus_config == PCIE_BUS_PEER2PEER) + mps = 128; + else + mps = 128 << dev->pcie_mpss; + rc = pcie_set_mps(dev, mps); + if (rc) { + pci_warn(dev, "can't set Max Payload Size to %d; if necessary, use \"pci=pcie_bus_safe\" and report a bug\n", + mps); + } + return; + } + + if (!bridge || !pci_is_pcie(bridge)) + return; + mps = pcie_get_mps(dev); p_mps = pcie_get_mps(bridge);