Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp945594ybh; Wed, 22 Jul 2020 18:07:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxwOfdxiS8ihIwYT9yJd8PfOeHnnzCB0JFAOPBJxtl3ZQbA9MlpSRhKWcd9+YxM4ZbC8yny X-Received: by 2002:a50:852a:: with SMTP id 39mr1670481edr.107.1595466430475; Wed, 22 Jul 2020 18:07:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595466430; cv=none; d=google.com; s=arc-20160816; b=k+pTD9Wm4D62i3XESQXrkGEtv+6bwDKTIUG4W6/7kbRuLZpsSuyIbGOAxLl2dXktgg ASW9tCVgEqTBK3KYbKKa6p8ver9IjKn4Km9K2vhG8i39KJh6aqIVkJK5H8/IytzqTQ40 1o/uARDle4t/XduNhsMKxijwohKkvl1dUrYZBjjUE50d85LaKfAsqCTRrl6vTAyglChi HGwALpf2Ce79Wkw8JChrulTyvh2UgzwjyAx9ilK2OqXLkH7/WBbdgUU45Ammi2qjKcCH iaOoSChstRmDbMeYgsz+LvvaJlGL1yF1fP4PvCAkTFqsiWwl5k3dwhijSs7q6C1AvPlj nO1Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:message-id:subject:cc:to:from:date:dkim-signature; bh=aeD2dMFW2QLhn/XfjPi4eQHJSYFzc1y4Ua0/vdwVtyE=; b=KB56sxY4MvHT82ZH68DsPbNMHBvYSaRu/ijYH4cFP7L9zgHj+5OUkMFPh93olCQzII F1CgyZhjWSYLLd5Lo9wxZ5Be0pK4GHj0sbTmMkckQNgebby2FkGiVHVzRCfq66327eec dKsmqPDUSIQm8JhpJSIW6b0aTbJfAom9mruocsHU8kFx2u5uxnqOVMVaiC14LWfyflWl vejlXBYQ/cssBS7+/E2v/VmEUJznXQ68e/x5r2e9AhTTh7L1/sH6OkJNPq6ZbRJ9lhVG CJ6qCbGBwry5NFBskOSqwQyJeNCHIJOd008SqemVRCBdsrFGZL1Dt4VVrs9roEGkZNyV 1nmQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=MpOL3ZEw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w5si1012068ejb.404.2020.07.22.18.06.48; Wed, 22 Jul 2020 18:07:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=MpOL3ZEw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387554AbgGWBEi (ORCPT + 99 others); Wed, 22 Jul 2020 21:04:38 -0400 Received: from mail.kernel.org ([198.145.29.99]:51412 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1733221AbgGWBEi (ORCPT ); Wed, 22 Jul 2020 21:04:38 -0400 Received: from localhost (mobile-166-175-191-139.mycingular.net [166.175.191.139]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2304A2086A; Thu, 23 Jul 2020 01:04:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1595466277; bh=vuI1DM19pqZiO1W8ggE5LH1WTZ2Zpcgqkw+bo5G96Ck=; h=Date:From:To:Cc:Subject:In-Reply-To:From; b=MpOL3ZEwKycICyUmrC1pWvUtYaPqBRrm/poJm+Ttw+ilyCs2OunPnbiK0/+5wn6GA iSX9250ee4qncolPYrWXRTazw378B+mZOYLVwC6ST85WE6hdohzUUcDhbCzYnSjxVD 7+Q7zIhhuaxjOKax49rs2eFqF0bQfD3akrbJvs1o= Date: Wed, 22 Jul 2020 20:04:35 -0500 From: Bjorn Helgaas To: Robert Hancock Cc: linux-pci@vger.kernel.org, linux-kernel , Bjorn Helgaas , stable@vger.kernel.org, Puranjay Mohan Subject: Re: [PATCH] PCI: Disallow ASPM on ASMedia ASM1083/1085 PCIe-PCI bridge Message-ID: <20200723010435.GA1334095@bjorn-Precision-5520> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jul 22, 2020 at 06:46:06PM -0600, Robert Hancock wrote: > On Wed, Jul 22, 2020 at 11:40 AM Bjorn Helgaas wrote: > > On Tue, Jul 21, 2020 at 08:18:03PM -0600, Robert Hancock wrote: > > > Recently ASPM handling was changed to no longer disable ASPM on all > > > PCIe to PCI bridges. Unfortunately these ASMedia PCIe to PCI bridge > > > devices don't seem to function properly with ASPM enabled, as they > > > cause the parent PCIe root port to cause repeated AER timeout errors. > > > In addition to flooding the kernel log, this also causes the machine > > > to wake up immediately after suspend is initiated. > > > > Hi Robert, thanks a lot for the report of this problem > > (https://lore.kernel.org/r/CADLC3L1R2hssRjxHJv9yhdN_7-hGw58rXSfNp-FraZh0Tw+gRw@mail.gmail.com > > and https://bugzilla.redhat.com/show_bug.cgi?id=1853960). > > > > I'm pretty sure Linux ASPM support is missing some things. This > > problem might be a hardware problem where a quirk is the right > > solution, but it could also be that it's a result of a Linux defect > > that we should fix. > > > > Could you collect the dmesg log and "sudo lspci -vvxxxx" output > > somewhere (maybe a bugzilla.kernel.org issue)? I want to figure out > > whether this L1 PM substates are enabled on this link, and whether > > that's configured correctly. > > Created a Bugzilla entry and added dmesg and lspci output: > https://bugzilla.kernel.org/show_bug.cgi?id=208667 > > As I noted in that report, I subsequently found this page on ASMedia's > site: https://www.asmedia.com.tw/eng/e_show_products.php?cate_index=169&item=114 > which indicates this ASM1083 device has "No PCIe ASPM support". How nice. According to your lspci, the device itself claims to support ASPM: 02:00.0 ... ASMedia Technology Inc. ASM1083/1085 PCIe to PCI Bridge LnkCap: ... ASPM L0s L1 ... but the web page claims otherwise. That would mean the device is defective for claiming something that's not true. Or possibly those capability bits can be set by BIOS. > It's not clear why this problem isn't occurring on Windows however - > either it is not enabling ASPM, somehow it doesn't cause issues with > the PCIe link, or it is causing issues and just doesn't notify the > user in any way. I can try and check if this bridge device is ending > up with ASPM enabled under Windows 10 or not.. If Windows *does* manage to enable ASPM, that would be interesting. I don't know whether Windows has a similar quirk mechanism. I suppose they must have *some* way to work around defective devices. Bjorn