Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1558862rwb; Fri, 18 Nov 2022 22:22:29 -0800 (PST) X-Google-Smtp-Source: AA0mqf5ScihPSA7MkJC3SCu7WnVArgSIfPIGqkKxWDcOlsOQJkHkLzskqBKCQpA+wgNKCycZU+M2 X-Received: by 2002:a65:588e:0:b0:470:18d5:b6a3 with SMTP id d14-20020a65588e000000b0047018d5b6a3mr9320364pgu.541.1668838949765; Fri, 18 Nov 2022 22:22:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668838949; cv=none; d=google.com; s=arc-20160816; b=W2CeHP4OindE+4ssCnHkuVmJlO8aoVhM8hlVWqbnB6c4oLQVajvp+/nulJm33tfZs7 zBbl8Q9EHzZIIgNqsmwNljV/w6ydtuTLBpr2QbY3fKQYfciKwSo61VQJHsNwDpPymGSP QIzcczYxwrs6dUD/tFUh+II0qWOipxDB/vbYz9bsHBom5cgeNR/Mb2SpKXVwveFCayB5 llqE8qlNqp9o7xNgkU94ituIXBz0UoDhR0VW/PYTql2yJNoecatT5IiZhLPhBAcHE7Ey 4EwLM3Hin8HUe4rPf87YUzzhPNgqLIoi/HpImGD/X8RiAFtNPBTGvzHpd9yrLP4X7vs5 lT8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=UeJiIK+dVRW2k/qsy4K7Q1FVsWTeWq4rsQMtQ8I7LZU=; b=aJ8Xk0dg7iAQl+hJRAsIQqeIEcO+62CynKVwwSJxB8MI7OD/6JUB4nx5dAd8R+Pc8v 4BM0qRk6mj+uCkRSHUbg5V5WKT0WogUNCOzTYGnc/kFmaIdOOFWnodRVDfyfAWVXnUvC 0y440AhBTJWxYhhDhYNURSbOpxSMSHRsFZ9NrUFtblYsx+09SxzgD5j57+Jxd0S2oJuq jr+vmmiRpb0TrML1HGemZWMY2dGgRYPTsKlUKgriPHZz3i1O6lgRld/l5tHZQC4WcAv/ Jdf0/sWXz9T9D/KLzrDUMvZeleRZzKn/kK7/6Ca2c94IuJPXNpBf0iJSFDj+KOglfI7A LSuw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=evd36TOU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w64-20020a638243000000b004772e485146si3460084pgd.6.2022.11.18.22.22.18; Fri, 18 Nov 2022 22:22:29 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=evd36TOU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229802AbiKSFu0 (ORCPT + 90 others); Sat, 19 Nov 2022 00:50:26 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37510 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229670AbiKSFuX (ORCPT ); Sat, 19 Nov 2022 00:50:23 -0500 Received: from mga02.intel.com (mga02.intel.com [134.134.136.20]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7F3DC88180; Fri, 18 Nov 2022 21:50:22 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1668837022; x=1700373022; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to:content-transfer-encoding; bh=57Lqm/wuibf3QMiyDiZ92zotlbErUw/46iJN0eQK2oo=; b=evd36TOUiUrf6nDK9IN/2MyWFNNEIdwKqZPNOxYoAQea4bHPuUIEzb+1 O7inbCLiC+z1a8qnX1HaIkmlnEoTmU86iLKndWorNv3DmFLNCmXGAvZDf MtEKdQ3EcT2C7dMTqQ2TfaFhw20ifH3zQ6dKKm6z8IDqsXn/idbb9etkj dVNMvJrf9uw6luMWUDH3KddPuZ0L+iI4uWIngpGQyWSMuhoadTDDpaImH n2afPEcTJkBTqhTKoxQ6ZCy0FsnXUbLVDS1cQJObgORDNLmgEWj8MGXVo a7PHCudBMchB+zjEaX+7tNw/TMecbOOn83Wyj2uAc6AzT/iE9j2E7Pg8E Q==; X-IronPort-AV: E=McAfee;i="6500,9779,10535"; a="300833270" X-IronPort-AV: E=Sophos;i="5.96,175,1665471600"; d="scan'208";a="300833270" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Nov 2022 21:50:22 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10535"; a="634663143" X-IronPort-AV: E=Sophos;i="5.96,175,1665471600"; d="scan'208";a="634663143" Received: from alsoller-mobl1.amr.corp.intel.com (HELO [10.212.166.83]) ([10.212.166.83]) by orsmga007-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Nov 2022 21:50:21 -0800 Message-ID: Date: Fri, 18 Nov 2022 21:50:21 -0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Firefox/102.0 Thunderbird/102.2.2 Subject: Re: [PATCH V8 RESEND 4/4] PCI: vmd: Add quirk to configure PCIe ASPM and LTR Content-Language: en-US To: "David E. Box" , nirmal.patel@linux.intel.com, jonathan.derrick@linux.dev, lorenzo.pieralisi@arm.com, hch@infradead.org, kw@linux.com, robh@kernel.org, bhelgaas@google.com, michael.a.bottini@intel.com, rafael@kernel.org, me@adhityamohan.in Cc: linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org References: <20221119021411.1383248-1-david.e.box@linux.intel.com> <20221119021411.1383248-5-david.e.box@linux.intel.com> From: Sathyanarayanan Kuppuswamy In-Reply-To: <20221119021411.1383248-5-david.e.box@linux.intel.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_MED, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org HI, On 11/18/22 6:14 PM, David E. Box wrote: > PCIe ports reserved for VMD use are not visible to BIOS and therefore not > configured to enable PCIe ASPM or LTR values (which BIOS will configure if > they are not set). Lack of this programming results in high power > consumption on laptops as reported in bugzilla. For affected products use > pci_enable_link_state to set the allowed link states for devices on the > root ports. Also set the LTR value to the maximum value needed for the SoC. > > This is a workaround for products from Rocket Lake through Alder Lake. > Raptor Lake, the latest product at this time, has already implemented LTR > configuring in BIOS. Future products will move ASPM configuration back to > BIOS as well. As this solution is intended for laptops, support is not > added for hotplug or for devices downstream of a switch on the root port. > > Link: https://bugzilla.kernel.org/show_bug.cgi?id=212355 > Link: https://bugzilla.kernel.org/show_bug.cgi?id=215063 > Link: https://bugzilla.kernel.org/show_bug.cgi?id=213717 > > Signed-off-by: Michael Bottini > Signed-off-by: David E. Box > Reviewed-by: Jon Derrick > Reviewed-by: Nirmal Patel > --- > V8 > - Removed struct vmd_device_data patch. Instead use #define for the LTR > value which is the same across all products needing the quirk. > V7 > - No change > V6 > - Set ASPM first before setting LTR. This is needed because some > devices may only have LTR set by BIOS and not ASPM > - Skip setting the LTR if the current LTR in non-zero. > V5 > - Provide the LTR value as driver data. > - Use DWORD for the config space write to avoid PCI WORD access bug. > - Set ASPM links firsts, enabling all link states, before setting a > default LTR if the capability is present > - Add kernel message that VMD is setting the device LTR. > V4 > - Refactor vmd_enable_apsm() to exit early, making the lines shorter > and more readable. Suggested by Christoph. > V3 > - No changes > V2 > - Use return status to print pci_info message if ASPM cannot be enabled. > - Add missing static declaration, caught by lkp@intel.com > > drivers/pci/controller/vmd.c | 64 ++++++++++++++++++++++++++++++++---- > 1 file changed, 58 insertions(+), 6 deletions(-) > > diff --git a/drivers/pci/controller/vmd.c b/drivers/pci/controller/vmd.c > index 86f3085db014..cba57e3091f6 100644 > --- a/drivers/pci/controller/vmd.c > +++ b/drivers/pci/controller/vmd.c > @@ -66,12 +66,22 @@ enum vmd_features { > * interrupt handling. > */ > VMD_FEAT_CAN_BYPASS_MSI_REMAP = (1 << 4), > + > + /* > + * Enable ASPM on the PCIE root ports and set the default LTR of the > + * storage devices on platforms where these values are not configured by > + * BIOS. This is needed for laptops, which require these settings for > + * proper power management of the SoC. > + */ > + VMD_FEAT_BIOS_PM_QUIRK = (1 << 5), > }; > > #define VMD_FEATS_CLIENT (VMD_FEAT_HAS_MEMBAR_SHADOW_VSCAP | \ > VMD_FEAT_HAS_BUS_RESTRICTIONS | \ > VMD_FEAT_OFFSET_FIRST_VECTOR) > > +#define VMD_BIOS_PM_QUIRK_LTR 0x1003 /* 3145728 ns */ > + > static DEFINE_IDA(vmd_instance_ida); > > /* > @@ -713,6 +723,46 @@ static void vmd_copy_host_bridge_flags(struct pci_host_bridge *root_bridge, > vmd_bridge->native_dpc = root_bridge->native_dpc; > } > > +/* > + * Enable ASPM and LTR settings on devices that aren't configured by BIOS. > + */ > +static int vmd_pm_enable_quirk(struct pci_dev *pdev, void *userdata) > +{ > + unsigned long features = *(unsigned long *)userdata; > + u16 ltr = VMD_BIOS_PM_QUIRK_LTR; > + u32 ltr_reg; > + int pos; > + > + if (!(features & VMD_FEAT_BIOS_PM_QUIRK)) > + return 0; > + > + pci_enable_link_state(pdev, PCIE_LINK_STATE_ALL); > + > + pos = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_LTR); > + if (!pos) > + return 0; > + > + /* > + * Skip if the max snoop LTR is non-zero, indicating BIOS has set it > + * so the LTR quirk is not needed. > + */ > + pci_read_config_dword(pdev, pos + PCI_LTR_MAX_SNOOP_LAT, <r_reg); > + if (!!(ltr_reg & (PCI_LTR_VALUE_MASK | PCI_LTR_SCALE_MASK))) > + return 0; > + > + /* > + * Set the default values to the maximum required by the platform to > + * allow the deepest power management savings. Write as a DWORD where > + * the lower word is the max snoop latency and the upper word is the > + * max non-snoop latency. > + */ > + ltr_reg = (ltr << 16) | ltr; > + pci_write_config_dword(pdev, pos + PCI_LTR_MAX_SNOOP_LAT, ltr_reg); > + pci_info(pdev, "VMD: Default LTR value set by driver\n"); > + > + return 0; > +} > + > static int vmd_enable_domain(struct vmd_dev *vmd, unsigned long features) > { > struct pci_sysdata *sd = &vmd->sysdata; > @@ -867,6 +917,8 @@ static int vmd_enable_domain(struct vmd_dev *vmd, unsigned long features) > pci_reset_bus(child->self); > pci_assign_unassigned_bus_resources(vmd->bus); > > + pci_walk_bus(vmd->bus, vmd_pm_enable_quirk, &features); > + > /* > * VMD root buses are virtual and don't return true on pci_is_pcie() > * and will fail pcie_bus_configure_settings() early. It can instead be > @@ -1005,17 +1057,17 @@ static const struct pci_device_id vmd_ids[] = { > VMD_FEAT_HAS_BUS_RESTRICTIONS | > VMD_FEAT_CAN_BYPASS_MSI_REMAP,}, > {PCI_VDEVICE(INTEL, 0x467f), > - .driver_data = VMD_FEATS_CLIENT,}, > + .driver_data = VMD_FEATS_CLIENT | VMD_FEAT_BIOS_PM_QUIRK,}, > {PCI_VDEVICE(INTEL, 0x4c3d), > - .driver_data = VMD_FEATS_CLIENT,}, > + .driver_data = VMD_FEATS_CLIENT | VMD_FEAT_BIOS_PM_QUIRK,}, > {PCI_VDEVICE(INTEL, 0xa77f), > - .driver_data = VMD_FEATS_CLIENT,}, > + .driver_data = VMD_FEATS_CLIENT | VMD_FEAT_BIOS_PM_QUIRK,}, > {PCI_VDEVICE(INTEL, 0x7d0b), > - .driver_data = VMD_FEATS_CLIENT,}, > + .driver_data = VMD_FEATS_CLIENT | VMD_FEAT_BIOS_PM_QUIRK,}, > {PCI_VDEVICE(INTEL, 0xad0b), > - .driver_data = VMD_FEATS_CLIENT,}, > + .driver_data = VMD_FEATS_CLIENT | VMD_FEAT_BIOS_PM_QUIRK,}, > {PCI_VDEVICE(INTEL, PCI_DEVICE_ID_INTEL_VMD_9A0B), > - .driver_data = VMD_FEATS_CLIENT,}, > + .driver_data = VMD_FEATS_CLIENT | VMD_FEAT_BIOS_PM_QUIRK,}, Why not add VMD_FEAT_BIOS_PM_QUIRK part of VMD_FEATS_CLIENT? > {0,} > }; > MODULE_DEVICE_TABLE(pci, vmd_ids); -- Sathyanarayanan Kuppuswamy Linux Kernel Developer