Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp2987954ybt; Mon, 29 Jun 2020 12:12:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzRxexRjxP5ZBwAHf2pvV0uevt9bekortimhOsQ6R/5yYhGY1rawbc/4Lt6DZ0e3Lgo0SWi X-Received: by 2002:a17:906:c1d9:: with SMTP id bw25mr15866778ejb.271.1593457954997; Mon, 29 Jun 2020 12:12:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593457954; cv=none; d=google.com; s=arc-20160816; b=SelicpVtgMV5ilV/g8vtC1A1XWSpoJb4iqofwH4FkXmT48/CSFJVRo4kj1Mx4QEOIa 4MRWJzr1/Q1rLIkZYGLxC2Pohl2vkE8R4TODIokxTI8DUhs1aqX0DPd489KitK7ikzGR zmQ421Tb82NdicZyYSIIbFKzS9EXR00cCWpy1ZUnqHhzVFsGvCLe1q7p5FeEwmiHRlJb eOTt+YygIYTZC7mhLoz8laXfCAaxwSJ2TqFytAgHnfo/lnXdmaphpQFKmipOMYs6lRn7 XGtdkGYAUp282p2/S69E5KbwogOIT9Qv9EVXO5LXhF0y2cuIZEjP2XTPHoi82iQ1gmd/ 9fxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=qWdAjsOwzfJEKIhWh+IlMg6bhx85USito/ywN1L/1cU=; b=ARd/mbGQBFLGuZOIVuVruGE2lqFfTlBVHCcZspiYBYypZkVPW2JGlPUsCqF6ioivPq zNwtQ+WK7zBIJb/+jquzOxBm0IKPnhEsysAWMWdSN6zBTSDNF0ReS0/nnEusnkavALxw jl3Z0c8Amz//HJD7ZdhA0CXneWq1TAH/5MujpT5t30vxu/OnhTdbfvnRtscpfE+kOgKl yn8TRWdGy9uDbj0gnx7vm3Nv+aIHF1oKddWzml5swXDH+xJfx/rqNVmjW5RhTtDohJQQ Fkv9w5LAAQ22h5dSDrkprwPZTtBqp4ieIaBLRguB6uJK89yPtBgC/LGudxH8HRN/voU+ uukA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="1o/qfgFc"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r8si288904ejs.462.2020.06.29.12.12.11; Mon, 29 Jun 2020 12:12:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="1o/qfgFc"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730481AbgF2TLK (ORCPT + 99 others); Mon, 29 Jun 2020 15:11:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:53708 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730973AbgF2TKT (ORCPT ); Mon, 29 Jun 2020 15:10:19 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A6112254C4; Mon, 29 Jun 2020 15:53:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593446019; bh=QpvwHBJOh/g++ypUVCQNAMKgvB8pEASrQgk44lV4wTo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=1o/qfgFcUg6/l8wj0F3F9306YVzPxMzweR9lYFeGCB7LUXfeADnzCe63UlcbmrA7x o4k2hePAPRQL/GrWcGjrV7wZZlaGplMO2u2dmvqBWWGxeqq1CDrBw0T04p06vNrcRs DbwEDkeGLAUCxjde5s5ipw3fT1oOg8BSykDKBnuw= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Kai-Heng Feng , Bjorn Helgaas , Mika Westerberg , Sasha Levin Subject: [PATCH 4.4 026/135] PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges Date: Mon, 29 Jun 2020 11:51:20 -0400 Message-Id: <20200629155309.2495516-27-sashal@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200629155309.2495516-1-sashal@kernel.org> References: <20200629155309.2495516-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.229-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.4.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.4.229-rc1 X-KernelTest-Deadline: 2020-07-01T15:53+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Kai-Heng Feng [ Upstream commit 66ff14e59e8a30690755b08bc3042359703fb07a ] 7d715a6c1ae5 ("PCI: add PCI Express ASPM support") added the ability for Linux to enable ASPM, but for some undocumented reason, it didn't enable ASPM on links where the downstream component is a PCIe-to-PCI/PCI-X Bridge. Remove this exclusion so we can enable ASPM on these links. The Dell OptiPlex 7080 mentioned in the bugzilla has a TI XIO2001 PCIe-to-PCI Bridge. Enabling ASPM on the link leading to it allows the Intel SoC to enter deeper Package C-states, which is a significant power savings. [bhelgaas: commit log] Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=207571 Link: https://lore.kernel.org/r/20200505173423.26968-1-kai.heng.feng@canonical.com Signed-off-by: Kai-Heng Feng Signed-off-by: Bjorn Helgaas Reviewed-by: Mika Westerberg Signed-off-by: Sasha Levin --- drivers/pci/pcie/aspm.c | 10 ---------- 1 file changed, 10 deletions(-) diff --git a/drivers/pci/pcie/aspm.c b/drivers/pci/pcie/aspm.c index c6a012b5ba390..966b6947e5656 100644 --- a/drivers/pci/pcie/aspm.c +++ b/drivers/pci/pcie/aspm.c @@ -388,16 +388,6 @@ static void pcie_aspm_cap_init(struct pcie_link_state *link, int blacklist) /* Setup initial capable state. Will be updated later */ link->aspm_capable = link->aspm_support; - /* - * If the downstream component has pci bridge function, don't - * do ASPM for now. - */ - list_for_each_entry(child, &linkbus->devices, bus_list) { - if (pci_pcie_type(child) == PCI_EXP_TYPE_PCI_BRIDGE) { - link->aspm_disable = ASPM_STATE_ALL; - break; - } - } /* Get and check endpoint acceptable latencies */ list_for_each_entry(child, &linkbus->devices, bus_list) { -- 2.25.1