Received: by 2002:a25:ca44:0:0:0:0:0 with SMTP id a65csp1515099ybg; Wed, 29 Jul 2020 16:45:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwzoRpZeSfk8uKaw8zX5fn58zq1xKiyXLfy2VM4oQHJ5cwq1VMMdzbSaCS3SPgHWGPORUZT X-Received: by 2002:aa7:d58c:: with SMTP id r12mr214483edq.160.1596066326533; Wed, 29 Jul 2020 16:45:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596066326; cv=none; d=google.com; s=arc-20160816; b=VGvxZC9RBiQ7SP5g/lHk084Ec/gh9vxCiQVjIebCRU2kAeDyJVWzJ1+J/ExpVPNbw3 fby+1KJdACmDc1qZDMZJ+JFKPWlMwA8n+GGrCCaWinHooX3xiCt91285bRXQxhmtStjf BxX8sHhhwqVPWmnpF7789aYMmAivYZY2cqyRQJuXszAs5IGHwS69CKVqA4AGEwVO9lTk UtYjrcRRfSLm+Me+en6T2OXcNrddzhKjcwFxuj82fewpMTVrNTNEmy13/WpIkOAM5Dsm JnDFA/iwco9z7NDSHkxleX4TCsDDMMIWZrAZllU0boggL/P+sKVoRpp3L2TjFHq/oWLj LyZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:message-id:subject:cc:to:from:date:dkim-signature; bh=LN+tSLntMPvAauj8WAUM41iPs3VBfRnw6nhP1hwGBRY=; b=X0WO6RC7RSarNsLsRDaWZI8X1aTSImT/MgoUPfSGEfKMbtOPlhdSSTgaDjhCczBt0P dqvubjokiYoq7QWsdQhPORDAP3mxmx0RZMupTOiVpDL0XCkIfzyF6KnfXhB6IDeMneTh m1/SWMV7rDlIxvG0wL2exVo5otmjpdRblsj3q5zOO6t1MRhF73vpXbG743x0FNouxIU/ mEL9r5Wl30wzvsokz99FrWB421cKdqFq+0dQkH53KJ+cRxpX/H34kvP0w1OBpgpeCSsX OoqP31rg9YgWX9FEn/sZw/jQmF2odLOjVmlPUJNrck2JA/5IgqCgryJWVCq+Ur6WPiu3 ke4g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=W3q62+6S; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y19si1997094ejc.397.2020.07.29.16.45.04; Wed, 29 Jul 2020 16:45:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=W3q62+6S; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728076AbgG2XnK (ORCPT + 99 others); Wed, 29 Jul 2020 19:43:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:57982 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727072AbgG2XnK (ORCPT ); Wed, 29 Jul 2020 19:43:10 -0400 Received: from localhost (mobile-166-175-62-240.mycingular.net [166.175.62.240]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 50AE02074B; Wed, 29 Jul 2020 23:43:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1596066189; bh=J4o9KJnDavuZtqTw30BUp/XAeVD31Zav05Kpfm5YbMU=; h=Date:From:To:Cc:Subject:In-Reply-To:From; b=W3q62+6SvHxB9kPFEDBw06ARSwxy5PkFKQlzKijG6niWMScQFnYEMugK3olxRDR8w v6HCZXcXnGWWTBNmgHmNf+mbFCrwkrUUaUz5tLE2DZSTYrC/5F7E6qr+p1RaS1ESWa +hjR927ybX/SEKUWV9Ik7iGzlQHpNheo/fps418c= Date: Wed, 29 Jul 2020 18:43:07 -0500 From: Bjorn Helgaas To: Robert Hancock Cc: linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, Bjorn Helgaas , stable@vger.kernel.org Subject: Re: [PATCH] PCI: Disallow ASPM on ASMedia ASM1083/1085 PCIe-PCI bridge Message-ID: <20200729234307.GA1978955@bjorn-Precision-5520> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200722021803.17958-1-hancockrwd@gmail.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 21, 2020 at 08:18:03PM -0600, Robert Hancock wrote: > Recently ASPM handling was changed to no longer disable ASPM on all > PCIe to PCI bridges. Unfortunately these ASMedia PCIe to PCI bridge > devices don't seem to function properly with ASPM enabled, as they > cause the parent PCIe root port to cause repeated AER timeout errors. > In addition to flooding the kernel log, this also causes the machine > to wake up immediately after suspend is initiated. > > Fixes: 66ff14e59e8a ("PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges") > Cc: stable@vger.kernel.org > Signed-off-by: Robert Hancock I applied this to for-linus for v5.8, since 66ff14e59e8a was merged for v5.8. Thanks very much for finding, debugging, and fixing this! 66ff14e59e8a wasn't marked for stable, so if it *was* backported to stable kernels, I assume whatever process backported it will also catch this because of the Fixes: tag. > --- > drivers/pci/quirks.c | 13 +++++++++++++ > 1 file changed, 13 insertions(+) > > diff --git a/drivers/pci/quirks.c b/drivers/pci/quirks.c > index 812bfc32ecb8..e5713114f2ab 100644 > --- a/drivers/pci/quirks.c > +++ b/drivers/pci/quirks.c > @@ -2330,6 +2330,19 @@ DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_INTEL, 0x10f1, quirk_disable_aspm_l0s); > DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_INTEL, 0x10f4, quirk_disable_aspm_l0s); > DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_INTEL, 0x1508, quirk_disable_aspm_l0s); > > +static void quirk_disable_aspm_l0s_l1(struct pci_dev *dev) > +{ > + pci_info(dev, "Disabling ASPM L0s/L1\n"); > + pci_disable_link_state(dev, PCIE_LINK_STATE_L0S | PCIE_LINK_STATE_L1); > +} > + > +/* > + * ASM1083/1085 PCIe-PCI bridge devices cause AER timeout errors on the > + * upstream PCIe root port when ASPM is enabled. At least L0s mode is affected, > + * disable both L0s and L1 for now to be safe. > + */ > +DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_ASMEDIA, 0x1080, quirk_disable_aspm_l0s_l1); > + > /* > * Some Pericom PCIe-to-PCI bridges in reverse mode need the PCIe Retrain > * Link bit cleared after starting the link retrain process to allow this > -- > 2.26.2 >