Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp1180395rwe; Thu, 25 Aug 2022 17:46:51 -0700 (PDT) X-Google-Smtp-Source: AA6agR4qet6/YgmYuicXle25ltIm/qRLkmD09N5k3sfujiWvTjK/atdChHGdxng33kHriNG/QN1g X-Received: by 2002:a05:6402:5108:b0:447:592:7ba5 with SMTP id m8-20020a056402510800b0044705927ba5mr5060359edd.156.1661474811292; Thu, 25 Aug 2022 17:46:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661474811; cv=none; d=google.com; s=arc-20160816; b=FG6EOsg0QAQOqu+vcQNhlV/J7PKz7TypwT5zjcInS6UtHW/ZW93VjSu2QX933pKGV4 7gTyBVfqrY+8tQ31cwE+keejMK/9bIafNo4ME3z73+XCpMVHmWAAR154VVxM40y1e7ty Pds0dhZ2zxVuRvNERA4Ty4AinLHrn2b0hJi4/7bpvCg1FmMPI+XX23DqeakJamuFhtH6 OzUTSziE2burEttxtqqgV9A3D2b3f0vMFoRDeLc18iFO2ioPBkF7Z+0qhsmCVuUWJsjM V6pnNkN7La97TQX5RNxKH2MczNO4xqSlnFiqTadPGNEMNue/AnaJOLpA7UCICY4dj75u izyA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=A0xOzfUKBvRwGfLarX93Futfxj9vz4izk3YQYNxSCSU=; b=XKe0OPuz4mx1iuprBR1WqjKCYT8EcwAVx8KwvsFNWMOR72tFpUG/t1JyBK3L4p7edV 1RmRah/GSZdSIpWYXePnPmcgtMq5CMVxXlHS3J5wiE6m6UKWE3Bj0hTxGdfMWKKxFhTV jE9tyWBG0s59L4sTyeImd7YDkcfuzu+NugkbhnPCJSvEXOjtsL5tXM8chry87vTr2GY1 MRQF/ujMhHy2ReeAqjsDjiwJTjqEWYuxTq3IOjv2Zg1cc5b6HIwIL7IAV1hmgxJW7HJz GZXTlCIN0f0Eh6CzPkHbzvc4yJ1ypLfvTYHA16zEU/yVAA5V3KaysY3ahSW1pQtPxPLo k+8Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=SIaZl4dG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a4-20020a1709066d4400b0073d328f840fsi391965ejt.51.2022.08.25.17.46.03; Thu, 25 Aug 2022 17:46:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=SIaZl4dG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231807AbiHZAZp (ORCPT + 99 others); Thu, 25 Aug 2022 20:25:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34566 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229462AbiHZAZn (ORCPT ); Thu, 25 Aug 2022 20:25:43 -0400 Received: from smtp-relay-canonical-1.canonical.com (smtp-relay-canonical-1.canonical.com [185.125.188.121]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 882F1402E1; Thu, 25 Aug 2022 17:25:42 -0700 (PDT) Received: from HP-EliteBook-840-G7.. (1-171-227-232.dynamic-ip.hinet.net [1.171.227.232]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-canonical-1.canonical.com (Postfix) with ESMTPSA id A2D073F3C0; Fri, 26 Aug 2022 00:25:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1661473539; bh=A0xOzfUKBvRwGfLarX93Futfxj9vz4izk3YQYNxSCSU=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=SIaZl4dG0fkFqNOkJuif3pAdhedTyhPTBXn7srjFXyC2ogFkZfrLynqT7CpLUz2Kh Jo9KGd3cVhOoU8aJbVFk/LY7Ulp1+XVyvuHJTBydlKpvVYFin6DRf0W8xKyoxaffh4 u2Lr8JplekW9sMNxeZzETfQBELdnCLQLtZ0zkXLS1emXZpz7jzWZa5SETTg950ZS6S eXAA8l/rJnCVOaSpK3Dx/JpbQPGoHARrspR0/KUB1jlrP1/IMW61eACtr3oi1LCeC8 Y4Cl+H4sBrv2qs6mO0jLc61UTHf1uZrYlTm91l9Ogffuzfp9U+cKNxpnkVhL/u9FUa Ue1E2mSLx/jPA== From: Kai-Heng Feng To: siva.kallam@broadcom.com, prashant@broadcom.com, mchan@broadcom.com Cc: Kai-Heng Feng , Josef Bacik , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v2] tg3: Disable tg3 device on system reboot to avoid triggering AER Date: Fri, 26 Aug 2022 08:25:30 +0800 Message-Id: <20220826002530.1153296-1-kai.heng.feng@canonical.com> X-Mailer: git-send-email 2.36.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit d60cd06331a3 ("PM: ACPI: reboot: Use S5 for reboot") caused a reboot hang on one Dell servers so the commit was reverted. Someone managed to collect the AER log and it's caused by MSI: [ 148.762067] ACPI: Preparing to enter system sleep state S5 [ 148.794638] {1}[Hardware Error]: Hardware error from APEI Generic Hardware Error Source: 5 [ 148.803731] {1}[Hardware Error]: event severity: recoverable [ 148.810191] {1}[Hardware Error]: Error 0, type: fatal [ 148.816088] {1}[Hardware Error]: section_type: PCIe error [ 148.822391] {1}[Hardware Error]: port_type: 0, PCIe end point [ 148.829026] {1}[Hardware Error]: version: 3.0 [ 148.834266] {1}[Hardware Error]: command: 0x0006, status: 0x0010 [ 148.841140] {1}[Hardware Error]: device_id: 0000:04:00.0 [ 148.847309] {1}[Hardware Error]: slot: 0 [ 148.852077] {1}[Hardware Error]: secondary_bus: 0x00 [ 148.857876] {1}[Hardware Error]: vendor_id: 0x14e4, device_id: 0x165f [ 148.865145] {1}[Hardware Error]: class_code: 020000 [ 148.870845] {1}[Hardware Error]: aer_uncor_status: 0x00100000, aer_uncor_mask: 0x00010000 [ 148.879842] {1}[Hardware Error]: aer_uncor_severity: 0x000ef030 [ 148.886575] {1}[Hardware Error]: TLP Header: 40000001 0000030f 90028090 00000000 [ 148.894823] tg3 0000:04:00.0: AER: aer_status: 0x00100000, aer_mask: 0x00010000 [ 148.902795] tg3 0000:04:00.0: AER: [20] UnsupReq (First) [ 148.910234] tg3 0000:04:00.0: AER: aer_layer=Transaction Layer, aer_agent=Requester ID [ 148.918806] tg3 0000:04:00.0: AER: aer_uncor_severity: 0x000ef030 [ 148.925558] tg3 0000:04:00.0: AER: TLP Header: 40000001 0000030f 90028090 00000000 The MSI is probably raised by incoming packets, so power down the device and disable bus mastering to stop the traffic, as user confirmed this approach works. In addition to that, be extra safe and cancel reset task if it's running. Cc: Josef Bacik Link: https://lore.kernel.org/all/b8db79e6857c41dab4ef08bdf826ea7c47e3bafc.1615947283.git.josef@toxicpanda.com/ BugLink: https://bugs.launchpad.net/bugs/1917471 Signed-off-by: Kai-Heng Feng --- v2: - Move tg3_reset_task_cancel() outside of rtnl_lock() to prevent deadlock. drivers/net/ethernet/broadcom/tg3.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/drivers/net/ethernet/broadcom/tg3.c b/drivers/net/ethernet/broadcom/tg3.c index db1e9d810b416..89889d8150da1 100644 --- a/drivers/net/ethernet/broadcom/tg3.c +++ b/drivers/net/ethernet/broadcom/tg3.c @@ -18076,16 +18076,20 @@ static void tg3_shutdown(struct pci_dev *pdev) struct net_device *dev = pci_get_drvdata(pdev); struct tg3 *tp = netdev_priv(dev); + tg3_reset_task_cancel(tp); + rtnl_lock(); + netif_device_detach(dev); if (netif_running(dev)) dev_close(dev); - if (system_state == SYSTEM_POWER_OFF) - tg3_power_down(tp); + tg3_power_down(tp); rtnl_unlock(); + + pci_disable_device(pdev); } /** -- 2.36.1