Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933805Ab0FRRQq (ORCPT ); Fri, 18 Jun 2010 13:16:46 -0400 Received: from cpoproxy1-pub.bluehost.com ([69.89.21.11]:60859 "HELO cpoproxy1-pub.bluehost.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S933739Ab0FRRQp (ORCPT ); Fri, 18 Jun 2010 13:16:45 -0400 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=virtuousgeek.org; h=Received:Date:From:To:Cc:Subject:Message-ID:In-Reply-To:References:X-Mailer:Mime-Version:Content-Type:Content-Transfer-Encoding:X-Identified-User; b=VMc3Az1GCIih9x7c+8pffms9zpK4TzG8u3WqBJb/SvxhRUU3moDRmgnWEbuXJmk/ZwQK8CkhXngHwOx53V8raoHKuoDXDPzkEX/nmJ2yCIpRJGNZhCJ6L3vW4bqM77sW; Date: Fri, 18 Jun 2010 10:15:06 -0700 From: Jesse Barnes To: Maxim Levitsky Cc: Matthew Garrett , Jussi Kivilinna , "Luis R. Rodriguez" , linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] pci: Don't enable aspm before drivers have had a chance to veto it Message-ID: <20100618101506.0c585617@virtuousgeek.org> In-Reply-To: <1276880742.23783.7.camel@maxim-laptop> References: <1276113907-22432-1-git-send-email-mjg@redhat.com> <1276862811.19918.10.camel@maxim-laptop> <20100618091255.2db036ea@virtuousgeek.org> <1276880742.23783.7.camel@maxim-laptop> X-Mailer: Claws Mail 3.7.5 (GTK+ 2.18.9; x86_64-redhat-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Identified-User: {10642:box514.bluehost.com:virtuous:virtuousgeek.org} {sentby:smtp auth 75.110.194.140 authed with jbarnes@virtuousgeek.org} Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2511 Lines: 59 On Fri, 18 Jun 2010 20:05:42 +0300 Maxim Levitsky wrote: > On Fri, 2010-06-18 at 09:12 -0700, Jesse Barnes wrote: > > On Fri, 18 Jun 2010 15:06:51 +0300 > > Maxim Levitsky wrote: > > > > > On Wed, 2010-06-09 at 16:05 -0400, Matthew Garrett wrote: > > > > The aspm code will currently set the configured aspm policy before drivers > > > > have had an opportunity to indicate that their hardware doesn't support it. > > > > Unfortunately, putting some hardware in L0 or L1 can result in the hardware > > > > no longer responding to any requests, even after aspm is disabled. It makes > > > > more sense to leave aspm policy at the BIOS defaults at initial setup time, > > > > reconfiguring it after pci_enable_device() is called. This allows the > > > > driver to blacklist individual devices beforehand. > > > > > > > > Signed-off-by: Matthew Garrett > > > > --- > > > > > > Hi, > > > > > > I recently discovered that my aspire one wireless troubles (card just > > > dies after a while) are caused by ASPM L0S state. > > > The device (AR5001) seems to have a hardware bug, and it also disables > > > L0S in windows driver. > > > > > > Unfortenuly BIOS (news at 11) enables L0S. > > > > > > Its easy to disable ASPM from driver. It just a matter of calling > > > pci_disable_link_state. > > > > > > However, that depends on CONFIG_PCIEASPM. > > > > > > How about making pci_disable_link_state always available or even better, > > > just make CONFIG_PCIEASPM unconditional? > > > > The former is ok with me. Care to post a patch? > It not that simple at first glance. > This functions uses plenty of code from the aspm.c, therefore care > should be taken to do that properly. > > Of course the easy solution is to compile all code in always, and just > disable it by runtime switch (it even exists, aspm_disabled) > Or, another easy solution is to make ath5k depend on CONFIG_PCIEASPM > > What do you think? So unless a device is *really* broken, it seems like the default policy should be ok across the board. So let's get a CONFIG_PCIEASPM removal patch into the 2.6.36 merge window early to flush out any potential problems. -- Jesse Barnes, Intel Open Source Technology Center -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/