Received: by 10.213.65.68 with SMTP id h4csp4306483imn; Tue, 10 Apr 2018 12:40:26 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/uWx3XTLaIoUkdFz9POH9vnLzYkDQN2LHP66cKYcCfHdDzSTGF9Rc+WArnSyncH9LihumW X-Received: by 10.99.176.12 with SMTP id h12mr1206670pgf.448.1523389226028; Tue, 10 Apr 2018 12:40:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523389225; cv=none; d=google.com; s=arc-20160816; b=cUAWkPI1nTs4pMIJ+YG7m2/cTlMkrsfGV0qDMGz5MewFMTG8HSzPMqyrBXFuka4tGZ D4eV+lE9U5HK+l6eH3mYSPqpoRdAjigdK3X1xmBqbAN30fDFoifJ9Hwh/WPhwBfqwBgZ x9/vjwWpnwatQITMMDDyYDyT4J9lmgibc3wu6oKyxw2///oIP4pwr5lPWt5gTH/TAO7d pDuNQ/jr6maZ9jFzML8Q9WNeCeASsekp718tw0hdXvEVhjBtRBE/ZDDdB3u5YgfDdgc6 WgcrG+BHjR34VI6ssCylztqk19A+Vfhj8cvU1WxJoJi/k6rau1HrkvW2JPcbufckkNSg jSiQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dmarc-filter:arc-authentication-results; bh=NF9u+z5DijecKbMP1byaf1KTRzVBTYKk1QDGHwbU+tU=; b=E+pilTgAYbZNFDONZePDb18DxIAqz046bm3POR7+HVZUs8QzsiSonIMP4EBygmaMa1 jJvBG1rKttQJKTEQk2XSk8nJKe3LkxBm0rvO8zWvCvn/oBrXQlgCisi9cQ+58d40xHbw 2eHXwkO4S8wxf+5kVdbitopqIFu796oEXqjt+kDSiXefv6WbJ/8gzNvjfeen7RIY5akH GY2qWUmU+S9V9bQP441ABVTdHAZ6PgTP5xd4AoqkeRQkuXxA0voxkVTE78OYSTdHS/L1 gsF16e5J2ZDYin4lKrrTOyQqmDAJpdsanASXXYRyvltc46fch+hfWX4rW+iSUddRfbCL i6vw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l11si2666871pfi.200.2018.04.10.12.39.48; Tue, 10 Apr 2018 12:40:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753182AbeDJTgg (ORCPT + 99 others); Tue, 10 Apr 2018 15:36:36 -0400 Received: from mail.kernel.org ([198.145.29.99]:52462 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753154AbeDJTge (ORCPT ); Tue, 10 Apr 2018 15:36:34 -0400 Received: from localhost (50-81-22-222.client.mchsi.com [50.81.22.222]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 15446217BA; Tue, 10 Apr 2018 19:36:33 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 15446217BA Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=helgaas@kernel.org Date: Tue, 10 Apr 2018 14:36:31 -0500 From: Bjorn Helgaas To: "Desnes A. Nunes do Rosario" Cc: linux-kernel@vger.kernel.org, linux-pci@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, bhelgaas@google.com Subject: Re: [PATCH, RESEND, pci, v2] pci: Delete PCI disabling informational messages Message-ID: <20180410193631.GC54986@bhelgaas-glaptop.roam.corp.google.com> References: <20180404151035.12140-1-desnesn@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180404151035.12140-1-desnesn@linux.vnet.ibm.com> User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 04, 2018 at 12:10:35PM -0300, Desnes A. Nunes do Rosario wrote: > The disabling informational messages on the PCI subsystem should be deleted > since they do not represent any real value for the system logs. > > These messages are either not presented, or presented for all PCI devices > (e.g., powerpc now realigns all PCI devices to its page size). Thus, they > are flooding system logs and can be interpreted as a false positive for > total PCI failure on the system. > > [root@system user]# dmesg | grep -i disabling > [ 0.692270] pci 0000:00:00.0: Disabling memory decoding and releasing memory resources > [ 0.692324] pci 0000:00:00.0: disabling bridge mem windows > [ 0.729134] pci 0001:00:00.0: Disabling memory decoding and releasing memory resources > [ 0.737352] pci 0001:00:00.0: disabling bridge mem windows > [ 0.776295] pci 0002:00:00.0: Disabling memory decoding and releasing memory resources > [ 0.784509] pci 0002:00:00.0: disabling bridge mem windows > ... and goes on for all PCI devices on the system ... > > Fixes: 38274637699 ("powerpc/powernv: Override pcibios_default_alignment() to force PCI devices to be page aligned") > Signed-off-by: Desnes A. Nunes do Rosario Applied to pci/resource for v4.18, thanks! I should have gotten this in for v4.17, but I didn't; sorry about that. > --- > drivers/pci/pci.c | 1 - > drivers/pci/setup-res.c | 2 -- > 2 files changed, 3 deletions(-) > > diff --git a/drivers/pci/pci.c b/drivers/pci/pci.c > index 8c71d1a66cdd..1563ce1ee091 100644 > --- a/drivers/pci/pci.c > +++ b/drivers/pci/pci.c > @@ -5505,7 +5505,6 @@ void pci_reassigndev_resource_alignment(struct pci_dev *dev) > return; > } > > - pci_info(dev, "Disabling memory decoding and releasing memory resources\n"); > pci_read_config_word(dev, PCI_COMMAND, &command); > command &= ~PCI_COMMAND_MEMORY; > pci_write_config_word(dev, PCI_COMMAND, command); > diff --git a/drivers/pci/setup-res.c b/drivers/pci/setup-res.c > index 369d48d6c6f1..6bd35e8e7cde 100644 > --- a/drivers/pci/setup-res.c > +++ b/drivers/pci/setup-res.c > @@ -172,8 +172,6 @@ EXPORT_SYMBOL(pci_claim_resource); > > void pci_disable_bridge_window(struct pci_dev *dev) > { > - pci_info(dev, "disabling bridge mem windows\n"); > - > /* MMIO Base/Limit */ > pci_write_config_dword(dev, PCI_MEMORY_BASE, 0x0000fff0); > > -- > 2.14.3 >