Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757468Ab0FIOKi (ORCPT ); Wed, 9 Jun 2010 10:10:38 -0400 Received: from mx1.redhat.com ([209.132.183.28]:56841 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755810Ab0FIOKg (ORCPT ); Wed, 9 Jun 2010 10:10:36 -0400 From: Matthew Garrett To: linux-pci@vger.kernel.org Cc: jbarnes@virtuousgeek.org, linux-kernel@vger.kernel.org, Matthew Garrett Subject: [RFC] pci: Don't enable aspm before drivers have had a chance to veto it Date: Wed, 9 Jun 2010 10:10:18 -0400 Message-Id: <1276092618-18591-1-git-send-email-mjg@redhat.com> X-SA-Do-Not-Run: Yes X-SA-Exim-Connect-IP: 209.6.34.250 X-SA-Exim-Mail-From: mjg@redhat.com X-SA-Exim-Scanned: No (on cavan.codon.org.uk); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2131 Lines: 57 The aspm code will currently set the configured aspm policy before drivers have had an opportunity to indicate that their hardware doesn't support it. Unfortunately, putting some hardware in L0 or L1 can result in the hardware no longer responding to any requests, even after aspm is disabled. It makes more sense to leave aspm policy at the BIOS defaults at initial setup time, reconfiguring it after pci_enable_device() is called. This allows the driver to blacklist individual devices beforehand. Signed-off-by: Matthew Garrett --- drivers/pci/pcie/aspm.c | 13 +++++++++++++ 1 files changed, 13 insertions(+), 0 deletions(-) diff --git a/drivers/pci/pcie/aspm.c b/drivers/pci/pcie/aspm.c index be53d98..223b39e 100644 --- a/drivers/pci/pcie/aspm.c +++ b/drivers/pci/pcie/aspm.c @@ -562,6 +562,7 @@ void pcie_aspm_init_link_state(struct pci_dev *pdev) { struct pcie_link_state *link; int blacklist = !!pcie_aspm_sanity_check(pdev); + int orig_policy = aspm_policy; if (aspm_disabled || !pci_is_pcie(pdev) || pdev->link_state) return; @@ -588,11 +589,23 @@ void pcie_aspm_init_link_state(struct pci_dev *pdev) * update through pcie_aspm_cap_init(). */ pcie_aspm_cap_init(link, blacklist); + + /* + * At this stage drivers haven't had an opportunity to change the + * link policy setting. Enabling ASPM on broken hardware can cripple + * it even before the driver has had a chance to disable ASPM, so + * default to a safe level right now. The real policy will be enabled + * once pci_enable_device is called. + */ + if (aspm_policy == POLICY_POWERSAVE) + aspm_policy = POLICY_DEFAULT; pcie_config_aspm_path(link); /* Setup initial Clock PM state */ pcie_clkpm_cap_init(link, blacklist); pcie_set_clkpm(link, policy_to_clkpm_state(link)); + aspm_policy = orig_policy; + unlock: mutex_unlock(&aspm_lock); out: -- 1.7.0.1 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/