Received: by 2002:a05:6358:489b:b0:bb:da1:e618 with SMTP id x27csp2002478rwn; Fri, 16 Sep 2022 04:22:51 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6Gnhp9yddKc1XtPHs1+bcLi/aVArUn4IOtzzaPtNisMPfiOTyg4jJ1VA+5PKwHvJ4s/TP+ X-Received: by 2002:a05:6402:454:b0:447:59a8:fc7d with SMTP id p20-20020a056402045400b0044759a8fc7dmr3684086edw.68.1663327370932; Fri, 16 Sep 2022 04:22:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663327370; cv=none; d=google.com; s=arc-20160816; b=ECgjbFu938osdUJYwaEa59Dnuqma7zQVVmIsXqx38/EylMwxeKN1hw3tte0vKaBoPn 9zc9sgWGz6uZiBgO3CjGFHFXe4WtJH+3QjCuftWaIbnn6tH5YctPSOu0DRdo6CVdvz8L 8yKfPoil8npBzvnvkIGzdteMTsOc45anztocp1Xj9FMrBKny12SXfS9pzHuhxkVcdqyg b0BlRx6oo+e/snXY0/VQkR7ETFfykQ/m4kXbE1GSiY53U4c4z7uZLI50Dq9PLr6i8rLT TKDAQh6nuH9ej4HhqymXgeTTLENrsrcou4ULBS+cdSMevgzaQQvfiL0wY5J8WDBi6fu8 qsRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=pAYjp1A4rt62hcXdpowXA+H2D6Do7mwj2buHmvDpRvk=; b=yUrexQvy5wZtVK5fVKmlnnpbdBuCeWvHDZHwDCUT73qGhIVVZiDwaJEc2d+PlrWWsI epMezgmUgDKj1DgLymMA6DpRsEdRPqSWKcwgD4dyUMNE5qXU82M38nkbRwOntD3pYyOp vcjbw+MHjJ3Ia9xh+Vpb+/RFemarxd4H0Uw68fgNXBYNUMie2cR66k/NMYoL6AIi9yzz ZU6lDYXMytpprHOds4roP/fmh7g+BpQAioqIUef/9QERsUdHARloT5PiMm+3Y9fKKD6E qVUUJobnQkkuUeWuhpuEzXQCO1HkR/mQzU+jTot4WBZXnLqD92UOPXk1AeTKNgUYezuA +AQQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=v2ktemmW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y20-20020a056402271400b0044792d4876asi2285843edd.291.2022.09.16.04.22.25; Fri, 16 Sep 2022 04:22:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=v2ktemmW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231651AbiIPKX3 (ORCPT + 99 others); Fri, 16 Sep 2022 06:23:29 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36828 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231493AbiIPKWg (ORCPT ); Fri, 16 Sep 2022 06:22:36 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6CBD8AE23F; Fri, 16 Sep 2022 03:14:07 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 8E80EB82548; Fri, 16 Sep 2022 10:13:49 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C5EF7C433D6; Fri, 16 Sep 2022 10:13:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1663323228; bh=hO6OnjOLMpBlQOdX6Zg7g1wYZUjhfe6qJ1j0yf0dlD4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=v2ktemmWxOmZ722eQCh7C3Ga7LA6lzM2I8xsRBOgQ0mclnlhoDHWnJLd7saG3D4yK 8QJh5iORoMzjS7C6DAzPXYQ1jLWQkQkTGuoGoDhJ1A9HFJPAVDmxqWexEpvSG6g7eP Ox5DT50UhBV6R5EHjFlzwNsN3hnpFdsH7lhNmjjg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Josef Bacik , Kai-Heng Feng , Michael Chan , Jakub Kicinski , Sasha Levin Subject: [PATCH 5.19 18/38] tg3: Disable tg3 device on system reboot to avoid triggering AER Date: Fri, 16 Sep 2022 12:08:52 +0200 Message-Id: <20220916100449.234722835@linuxfoundation.org> X-Mailer: git-send-email 2.37.3 In-Reply-To: <20220916100448.431016349@linuxfoundation.org> References: <20220916100448.431016349@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Kai-Heng Feng [ Upstream commit 2ca1c94ce0b65a2ce7512b718f3d8a0fe6224bca ] Commit d60cd06331a3 ("PM: ACPI: reboot: Use S5 for reboot") caused a reboot hang on one Dell servers so the commit was reverted. Someone managed to collect the AER log and it's caused by MSI: [ 148.762067] ACPI: Preparing to enter system sleep state S5 [ 148.794638] {1}[Hardware Error]: Hardware error from APEI Generic Hardware Error Source: 5 [ 148.803731] {1}[Hardware Error]: event severity: recoverable [ 148.810191] {1}[Hardware Error]: Error 0, type: fatal [ 148.816088] {1}[Hardware Error]: section_type: PCIe error [ 148.822391] {1}[Hardware Error]: port_type: 0, PCIe end point [ 148.829026] {1}[Hardware Error]: version: 3.0 [ 148.834266] {1}[Hardware Error]: command: 0x0006, status: 0x0010 [ 148.841140] {1}[Hardware Error]: device_id: 0000:04:00.0 [ 148.847309] {1}[Hardware Error]: slot: 0 [ 148.852077] {1}[Hardware Error]: secondary_bus: 0x00 [ 148.857876] {1}[Hardware Error]: vendor_id: 0x14e4, device_id: 0x165f [ 148.865145] {1}[Hardware Error]: class_code: 020000 [ 148.870845] {1}[Hardware Error]: aer_uncor_status: 0x00100000, aer_uncor_mask: 0x00010000 [ 148.879842] {1}[Hardware Error]: aer_uncor_severity: 0x000ef030 [ 148.886575] {1}[Hardware Error]: TLP Header: 40000001 0000030f 90028090 00000000 [ 148.894823] tg3 0000:04:00.0: AER: aer_status: 0x00100000, aer_mask: 0x00010000 [ 148.902795] tg3 0000:04:00.0: AER: [20] UnsupReq (First) [ 148.910234] tg3 0000:04:00.0: AER: aer_layer=Transaction Layer, aer_agent=Requester ID [ 148.918806] tg3 0000:04:00.0: AER: aer_uncor_severity: 0x000ef030 [ 148.925558] tg3 0000:04:00.0: AER: TLP Header: 40000001 0000030f 90028090 00000000 The MSI is probably raised by incoming packets, so power down the device and disable bus mastering to stop the traffic, as user confirmed this approach works. In addition to that, be extra safe and cancel reset task if it's running. Cc: Josef Bacik Link: https://lore.kernel.org/all/b8db79e6857c41dab4ef08bdf826ea7c47e3bafc.1615947283.git.josef@toxicpanda.com/ BugLink: https://bugs.launchpad.net/bugs/1917471 Signed-off-by: Kai-Heng Feng Reviewed-by: Michael Chan Link: https://lore.kernel.org/r/20220826002530.1153296-1-kai.heng.feng@canonical.com Signed-off-by: Jakub Kicinski Signed-off-by: Sasha Levin --- drivers/net/ethernet/broadcom/tg3.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/drivers/net/ethernet/broadcom/tg3.c b/drivers/net/ethernet/broadcom/tg3.c index c28f8cc00d1cf..a9cc85882b315 100644 --- a/drivers/net/ethernet/broadcom/tg3.c +++ b/drivers/net/ethernet/broadcom/tg3.c @@ -18076,16 +18076,20 @@ static void tg3_shutdown(struct pci_dev *pdev) struct net_device *dev = pci_get_drvdata(pdev); struct tg3 *tp = netdev_priv(dev); + tg3_reset_task_cancel(tp); + rtnl_lock(); + netif_device_detach(dev); if (netif_running(dev)) dev_close(dev); - if (system_state == SYSTEM_POWER_OFF) - tg3_power_down(tp); + tg3_power_down(tp); rtnl_unlock(); + + pci_disable_device(pdev); } /** -- 2.35.1