Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp9347772rwr; Thu, 11 May 2023 13:37:34 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5xa+GqyMcfIeDXiEkSmGyF9Ue5kkv502ZFsgJhChRaU+gQMCEtnfiSnCtr4HFzEbHbQf1m X-Received: by 2002:a05:6a20:7f92:b0:100:b126:dd27 with SMTP id d18-20020a056a207f9200b00100b126dd27mr18160995pzj.15.1683837454326; Thu, 11 May 2023 13:37:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683837454; cv=none; d=google.com; s=arc-20160816; b=imFRgSsWGqsdkbK7/yFIz8r5GCg7jtA6d/eQMFTWVihlW5BaPXILfrvgn4udXL6ql2 bvispY83pSrR7ut0ccKBXVrxSfbcfaV48vuhuPa8ctQM0NDE/jZW4lMUFHyq95iVZ8gd qaJBGwgw4yp7o94CsbIJ0lS3dHDH0v3bNaF/qQKY3qlcWbr42GbbT2G2f/TX39F1P82k 9U+D5ghWrrIsuKaGok/O3G6nORjGFJJqXY/hXz7TXKUC4tLq7UEB/KAaL2fhMdyH2Myv Q+PY8aVLDXGHuQHqREK+SNRCmwAOco7sJW7TA+clYxMrDRGacKpsca8SXgzfTXzV+4Eo E9pA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=1Pz2j5Z93aNTXBG8dwUuYnI5992pfsLWg7flqCI7+hI=; b=0+arnCIb2EV+WF79rjdX/RQlzWXBYmUy0OATxJr2qQ7tyF5e4up5SILXuOrWxVJc7J IJaNEu/Bm8n7B2M79rAKKGgTefDq7+K0GeROv8UdyNn9qTZgaIFZbGqUaC07laPJd/DE PROE2YN6Pngmr1JbEYsyFQeyRGlRq8+EeRVcQbszBgnBc27yo7T3EWfYOgZ376KJ9Ajb 18QFpubCvemX7H2KB9UokW9J8+W/vGunTsWqnoYWGATlPREa9gy+wH06tKzH3xgpXqwa 7/3Ro6+A3KzUcI37Carhd8rp0cFikBwsJs5xJz7V2kG/7Bwgew5OIFoxk+qmqR3sXbp5 WhuQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z17-20020aa79f91000000b0063d3387b4a3si8904393pfr.303.2023.05.11.13.37.22; Thu, 11 May 2023 13:37:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239209AbjEKUHP (ORCPT + 99 others); Thu, 11 May 2023 16:07:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54976 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239066AbjEKUHN (ORCPT ); Thu, 11 May 2023 16:07:13 -0400 X-Greylist: delayed 17024 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Thu, 11 May 2023 13:07:12 PDT Received: from bmailout1.hostsharing.net (bmailout1.hostsharing.net [83.223.95.100]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4AD2410EC; Thu, 11 May 2023 13:07:12 -0700 (PDT) Received: from h08.hostsharing.net (h08.hostsharing.net [IPv6:2a01:37:1000::53df:5f1c:0]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "*.hostsharing.net", Issuer "RapidSSL Global TLS RSA4096 SHA256 2022 CA1" (verified OK)) by bmailout1.hostsharing.net (Postfix) with ESMTPS id 034D2300002CB; Thu, 11 May 2023 22:07:11 +0200 (CEST) Received: by h08.hostsharing.net (Postfix, from userid 100393) id E8B9C57CF0; Thu, 11 May 2023 22:07:10 +0200 (CEST) Date: Thu, 11 May 2023 22:07:10 +0200 From: Lukas Wunner To: Ilpo =?iso-8859-1?Q?J=E4rvinen?= Cc: Bjorn Helgaas , linux-pci@vger.kernel.org, Rob Herring , Lorenzo Pieralisi , Krzysztof Wilczy?ski , Bjorn Helgaas , LKML Subject: Re: [PATCH 01/17] PCI: Add concurrency safe clear_and_set variants for LNKCTL{,2} Message-ID: <20230511200710.GB31598@wunner.de> References: <1d5aaff-c7b5-39f6-92ca-319fad6c7fc5@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1d5aaff-c7b5-39f6-92ca-319fad6c7fc5@linux.intel.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-2.4 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 11, 2023 at 10:58:40PM +0300, Ilpo J?rvinen wrote: > On Thu, 11 May 2023, Bjorn Helgaas wrote: > > Many of these are ASPM-related updates that IMHO should not be in > > drivers at all. Drivers should use PCI core interfaces so the core > > doesn't get confused. > > Ah, yes. I forgot to mention it in the cover letter but I noticed that > some of those seem to be workarounds for the cases where core refuses to > disable ASPM. Some sites even explicit have a comment about that after > the call to pci_disable_link_state(): [...] > That kinda feels something that would want a force disable quirk that is > reliable. There are quirks for some devices which try to disable it but > could fail for reasons mentioned in that comment. (But I'd prefer to make > another series out of it rather than putting it into this one.) I'm wondering if it's worth cleaning up ASPM handling in drivers first as the locking issue may then largely solve itself. The locking could probably be kept internal to ASPM core code then. Thanks, Lukas