Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp408586rdg; Tue, 10 Oct 2023 14:08:18 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEhsxZqx9g722NRGJy9s1lFHk7n6bdggFYm5rywHXPtMpGp82/2tCF5dtitdXW/1skW96tD X-Received: by 2002:a17:90a:a38b:b0:274:99e7:217e with SMTP id x11-20020a17090aa38b00b0027499e7217emr15577120pjp.16.1696972097912; Tue, 10 Oct 2023 14:08:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696972097; cv=none; d=google.com; s=arc-20160816; b=Vji9msk7KAB9NssrEj3RpCzyOmQwlz6mVFsKCnpobT4ssW+rkbB923vCMhINEZXWgp E2zl4bbEQOMbSfhRd+zfGyC4VAMFG+gG8eVAWpPuZI/paazVSZZGWbnuXWAe2HHqNUhT 2PKYq82IzaUNDZyO2m9MG5DWdUKNTltZgJu5k+vAeVKJEqx1D7V6nIUoZfEwbFo1TLx/ NdioOO8sQPAOFnNs2xhq4JTLO/n9lb/NvAnGN+WG0mScsysQae8DLuNq7tA6TqpoREcX ZkzbpsMqvjPswzDgSWz20tmrapgkAHKu603nYB9pVWqvtpl5KjQy8SmWeoTZTYAx8TzF GDng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :message-id:subject:cc:to:from:date:dkim-signature; bh=BjVlL8X0YqWi63pOfCSi4xsJf0Uq/kScd8k290A69Zw=; fh=SlrGJFzqoiWa1CCjM7Xk2Tue5rqPH5l7fQgiL/JUGcM=; b=YgYa/S2N1O6E2ravd1w4psBQPr8+6DpizU/29bfYCYwVwkyTHjIp7H6W+UI2cR1ILM KDOfLKNT9i5PmZF69wa+N1Gp7FcaZ54pOW9kHV/yzwXFRffU5+mjjiNM4QK/eJBnFQbb N9xd0B8sPc4hEbTyuAW/O4cGYdgzE0jg+TpJZfQMRK43JexUob+AFdbiJ+Flz7mZ0uQJ XGVKSdUqYMzqxsgD3+U5+2gOvLsPo99v4LL4v/1XKoG6nSjTjxDOdHCAG1sFLjWC5yBj MUVDiw8Up6L51ljMCY7O8vEEfE8F0yAg1ih17yrGcz42i5G8HD2GcP66tZ/ulQ8nx5ot r/mQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=isUiRpRB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from howler.vger.email (howler.vger.email. [2620:137:e000::3:4]) by mx.google.com with ESMTPS id nn11-20020a17090b38cb00b002791d79bbf9si15771860pjb.187.2023.10.10.14.08.17 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 14:08:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) client-ip=2620:137:e000::3:4; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=isUiRpRB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id 4937880B18A6; Tue, 10 Oct 2023 14:08:12 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231768AbjJJVIB (ORCPT + 99 others); Tue, 10 Oct 2023 17:08:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52472 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230510AbjJJVH7 (ORCPT ); Tue, 10 Oct 2023 17:07:59 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F10CB94; Tue, 10 Oct 2023 14:07:57 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5B931C433C8; Tue, 10 Oct 2023 21:07:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1696972077; bh=WOQLnp9OZimnlVYwjQ9u/FUvuftBKb+9EfbOzORuj5E=; h=Date:From:To:Cc:Subject:In-Reply-To:From; b=isUiRpRBAalueHWgAzUMeK9hXTvNBRQ35JqxsC6/jNn4Ri8feBR8mdhQeAujMWoX1 Cim4okGhyTHy3cLYOeiTE/y/DnoFXxzOdxLxYC+I3qkbvwTOsTYMGmEDv9J2DOl/K4 dn9cbrd7xH1Ouy2rgthPkwu0NNnESEG7Ll8Gv8lCd2ueWbjP3TBAt7R1tf2awdO0Qz +Ilpk5kZpFGAO51TMnEGhtIGPVkm2BV0cEHmH4m7nktZUZsweQgmGZZpyMYRLOhxxx q95cnf9hnZMve5qAUdgx0wm8t6i3ACASdpkFqDjWMF2JHvK7KuyGJeJh4cd2G9h8q4 DkLA8KPlysymA== Date: Tue, 10 Oct 2023 16:07:55 -0500 From: Bjorn Helgaas To: linux-pci@vger.kernel.org Cc: Ilpo =?utf-8?B?SsOkcnZpbmVu?= , Jonathan Cameron , Krzysztof =?utf-8?Q?Wilczy=C5=84ski?= , Lorenzo Pieralisi , linux-kernel@vger.kernel.org, Bjorn Helgaas Subject: Re: [PATCH 03/10] PCI/ASPM: Use FIELD_GET() Message-ID: <20231010210755.GA1001553@bhelgaas> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231010204436.1000644-4-helgaas@kernel.org> X-Spam-Status: No, score=2.4 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RCVD_IN_SBL_CSS,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on howler.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Tue, 10 Oct 2023 14:08:12 -0700 (PDT) X-Spam-Level: ** On Tue, Oct 10, 2023 at 03:44:29PM -0500, Bjorn Helgaas wrote: > From: Bjorn Helgaas > > Add #defines for T_POWER_ON in the L1 PM Substates Capability and use > FIELD_PREP() and FIELD_GET() when possible. These remove the need for > explicit shifts. No functional change intended. > > Signed-off-by: Bjorn Helgaas I see this is identical to your patch at https://lore.kernel.org/r/20230915155752.84640-3-ilpo.jarvinen@linux.intel.com, Ilpo, so I'll drop this one. > --- > drivers/pci/pcie/aspm.c | 31 ++++++++++++++++++------------- > include/uapi/linux/pci_regs.h | 2 ++ > 2 files changed, 20 insertions(+), 13 deletions(-) > > diff --git a/drivers/pci/pcie/aspm.c b/drivers/pci/pcie/aspm.c > index 1bf630059264..06f175d8dee5 100644 > --- a/drivers/pci/pcie/aspm.c > +++ b/drivers/pci/pcie/aspm.c > @@ -7,6 +7,7 @@ > * Copyright (C) Shaohua Li (shaohua.li@intel.com) > */ > > +#include > #include > #include > #include > @@ -267,7 +268,7 @@ static void pcie_aspm_configure_common_clock(struct pcie_link_state *link) > /* Convert L0s latency encoding to ns */ > static u32 calc_l0s_latency(u32 lnkcap) > { > - u32 encoding = (lnkcap & PCI_EXP_LNKCAP_L0SEL) >> 12; > + u32 encoding = FIELD_GET(PCI_EXP_LNKCAP_L0SEL, lnkcap); > > if (encoding == 0x7) > return (5 * 1000); /* > 4us */ > @@ -285,7 +286,7 @@ static u32 calc_l0s_acceptable(u32 encoding) > /* Convert L1 latency encoding to ns */ > static u32 calc_l1_latency(u32 lnkcap) > { > - u32 encoding = (lnkcap & PCI_EXP_LNKCAP_L1EL) >> 15; > + u32 encoding = FIELD_GET(PCI_EXP_LNKCAP_L1EL, lnkcap); > > if (encoding == 0x7) > return (65 * 1000); /* > 64us */ > @@ -371,11 +372,11 @@ static void pcie_aspm_check_latency(struct pci_dev *endpoint) > link = endpoint->bus->self->link_state; > > /* Calculate endpoint L0s acceptable latency */ > - encoding = (endpoint->devcap & PCI_EXP_DEVCAP_L0S) >> 6; > + encoding = FIELD_GET(PCI_EXP_DEVCAP_L0S, endpoint->devcap); > acceptable_l0s = calc_l0s_acceptable(encoding); > > /* Calculate endpoint L1 acceptable latency */ > - encoding = (endpoint->devcap & PCI_EXP_DEVCAP_L1) >> 9; > + encoding = FIELD_GET(PCI_EXP_DEVCAP_L1, endpoint->devcap); > acceptable_l1 = calc_l1_acceptable(encoding); > > while (link) { > @@ -446,22 +447,24 @@ static void aspm_calc_l12_info(struct pcie_link_state *link, > u32 pl1_2_enables, cl1_2_enables; > > /* Choose the greater of the two Port Common_Mode_Restore_Times */ > - val1 = (parent_l1ss_cap & PCI_L1SS_CAP_CM_RESTORE_TIME) >> 8; > - val2 = (child_l1ss_cap & PCI_L1SS_CAP_CM_RESTORE_TIME) >> 8; > + val1 = FIELD_GET(PCI_L1SS_CAP_CM_RESTORE_TIME, parent_l1ss_cap); > + val2 = FIELD_GET(PCI_L1SS_CAP_CM_RESTORE_TIME, child_l1ss_cap); > t_common_mode = max(val1, val2); > > /* Choose the greater of the two Port T_POWER_ON times */ > - val1 = (parent_l1ss_cap & PCI_L1SS_CAP_P_PWR_ON_VALUE) >> 19; > - scale1 = (parent_l1ss_cap & PCI_L1SS_CAP_P_PWR_ON_SCALE) >> 16; > - val2 = (child_l1ss_cap & PCI_L1SS_CAP_P_PWR_ON_VALUE) >> 19; > - scale2 = (child_l1ss_cap & PCI_L1SS_CAP_P_PWR_ON_SCALE) >> 16; > + val1 = FIELD_GET(PCI_L1SS_CAP_P_PWR_ON_VALUE, parent_l1ss_cap); > + scale1 = FIELD_GET(PCI_L1SS_CAP_P_PWR_ON_SCALE, parent_l1ss_cap); > + val2 = FIELD_GET(PCI_L1SS_CAP_P_PWR_ON_VALUE, child_l1ss_cap); > + scale2 = FIELD_GET(PCI_L1SS_CAP_P_PWR_ON_SCALE, child_l1ss_cap); > > if (calc_l12_pwron(parent, scale1, val1) > > calc_l12_pwron(child, scale2, val2)) { > - ctl2 |= scale1 | (val1 << 3); > + ctl2 |= FIELD_PREP(PCI_L1SS_CTL2_T_PWR_ON_SCALE, scale1) | > + FIELD_PREP(PCI_L1SS_CTL2_T_PWR_ON_VALUE, val1); > t_power_on = calc_l12_pwron(parent, scale1, val1); > } else { > - ctl2 |= scale2 | (val2 << 3); > + ctl2 |= FIELD_PREP(PCI_L1SS_CTL2_T_PWR_ON_SCALE, scale2) | > + FIELD_PREP(PCI_L1SS_CTL2_T_PWR_ON_VALUE, val2); > t_power_on = calc_l12_pwron(child, scale2, val2); > } > > @@ -477,7 +480,9 @@ static void aspm_calc_l12_info(struct pcie_link_state *link, > */ > l1_2_threshold = 2 + 4 + t_common_mode + t_power_on; > encode_l12_threshold(l1_2_threshold, &scale, &value); > - ctl1 |= t_common_mode << 8 | scale << 29 | value << 16; > + ctl1 |= FIELD_PREP(PCI_L1SS_CTL1_CM_RESTORE_TIME, t_common_mode) | > + FIELD_PREP(PCI_L1SS_CTL1_LTR_L12_TH_VALUE, value) | > + FIELD_PREP(PCI_L1SS_CTL1_LTR_L12_TH_SCALE, scale); > > /* Some broken devices only support dword access to L1 SS */ > pci_read_config_dword(parent, parent->l1ss + PCI_L1SS_CTL1, &pctl1); > diff --git a/include/uapi/linux/pci_regs.h b/include/uapi/linux/pci_regs.h > index e5f558d96493..34bf037993f3 100644 > --- a/include/uapi/linux/pci_regs.h > +++ b/include/uapi/linux/pci_regs.h > @@ -1088,6 +1088,8 @@ > #define PCI_L1SS_CTL1_LTR_L12_TH_VALUE 0x03ff0000 /* LTR_L1.2_THRESHOLD_Value */ > #define PCI_L1SS_CTL1_LTR_L12_TH_SCALE 0xe0000000 /* LTR_L1.2_THRESHOLD_Scale */ > #define PCI_L1SS_CTL2 0x0c /* Control 2 Register */ > +#define PCI_L1SS_CTL2_T_PWR_ON_SCALE 0x00000003 /* T_POWER_ON Scale */ > +#define PCI_L1SS_CTL2_T_PWR_ON_VALUE 0x000000f8 /* T_POWER_ON Value */ > > /* Designated Vendor-Specific (DVSEC, PCI_EXT_CAP_ID_DVSEC) */ > #define PCI_DVSEC_HEADER1 0x4 /* Designated Vendor-Specific Header1 */ > -- > 2.34.1 >