On 03/08/2013 09:18 PM, Myron Stowe wrote:
On Thu, Mar 7, 2013 at 11:51 PM, Xiangliang Yu <yuxiangl@xxxxxxxxxxx> wrote:
Hi, Bjorn
Fix system hang issue: if first accessed resource file of BAR0 ~
BAR4, system will hang after executing lspci command
This needs more explanation. We've already read the BARs by the time
header quirks are run, so apparently it's not just the mere act of
accessing a BAR that causes a hang.
We need to know exactly what's going on here. For example, do BARs
0-4 exist? Does the device decode accesses to the regions described
by the BARs? The PCI core has to know what resources the device uses,
so if the device decodes accesses, we can't just throw away the
start/end information.
The BARs 0-4 is exist and the PCI device is enable IO space, but user access
the regions file by udevadm command with info parameter, the system will hang.
Like this: udevadmin info --attribut-walk
--path=/sys/device/pci-device/000:*.
Because the device is just AHCI host controller, don't need the BAR0 ~ 4 region
file.
Is my explanation ok for the patch?
No, I still don't know what causes the hang; I only know that udevadm
can trigger it. I don't want to just paper over the problem until we
know what the root cause is.
Does "lspci -H1 -vv" also cause a hang? What about "setpci -s<dev>
BASE_ADDRESS_0"? "setpci -H1 -s<dev> BASE_ADDRESS_0"?
The commands are ok because the commands can't find the device after accessing IO port.
Xiangliang:
Sorry but I didn't understand your response above, could you elaborate
a little more?
Are the first five BARs of the suspect device all mapping to I/O port
space - i.e. similar to something like this (a capture and inclusion
of an 'lspci' of the suspect device would be nice to see):
00:1f.2 SATA controller:
Region 0: I/O ports at 1860 [size=8]
Region 1: I/O ports at 1814 [size=4]
Region 2: I/O ports at 1818 [size=8]
Region 3: I/O ports at 1810 [size=4]
Region 4: I/O ports at 1840 [size=32]
Region 5: Memory at f2827000 (32-bit, non-prefetchable) [size=2K]
You have done a good job isolating the issue so far. As Bjorn noted;
it's looking as if the problem is with accessing the I/O port space
mapped by the suspect device's BAR(s), not with accessing the BAR(s)
in the device's configuration space.
It would seem so. My question is what is accessing the IO port space in
the first place. BAR5 is the MMIO region used by the AHCI driver. BARs
0-4 are the legacy SFF-compatible ATA ports. Nothing should be messing
with those IO ports while AHCI is enabled. It's expected that doing that
will break things.
If something in udev is randomly groveling around inside the resource
files for those BARs in sysfs, that seems like a really bad thing.
As you responded positively to earlier, as proposed the suspect device
will still actively be decoding accesses to the regions described by
the BARs. Because the device is actively decoding the PCI core can't
just throw away the BAR's corresponding resource regions, as the patch
is currently doing, due to the possibility of another device being
added at a later time.
If a subsequent device were added later, the core may need to try and
allocate resources for it and, in the worst case scenario, the core
could end up allocating resources that conflict with this suspect
device as a consequence of the suspect device's original resource
allocations having been silently thrown away. The result would be
both devices believing they each exclusively own the same set (or
subset) of I/O port mappings and thus both actively decoding accesses
to such which. A situation that would obviously be disastrous.
There is still something going on here that we still do not
understand. Could you please capture the following information to
help further isolate the issue:
A 'dmesg' log from the system which was booted using both the
"debug" and "ignore_loglevel" boot parameters, a 'lspci -xxx -s<dev>'
capture, and a 'lspci -vv' capture.
Thanks,
Myron
The root cause is that accessing of IO port will make the chip go bad. So, the point of the patch is don't export capability of the IO accessing.
---
drivers/pci/quirks.c | 15 +++++++++++++++
1 files changed, 15 insertions(+), 0 deletions(-)
diff --git a/drivers/pci/quirks.c b/drivers/pci/quirks.c
index 0369fb6..d49f8dc 100644
--- a/drivers/pci/quirks.c
+++ b/drivers/pci/quirks.c
@@ -44,6 +44,21 @@ static void quirk_mmio_always_on(struct pci_dev *dev)
DECLARE_PCI_FIXUP_CLASS_EARLY(PCI_ANY_ID, PCI_ANY_ID,
PCI_CLASS_BRIDGE_HOST, 8,
quirk_mmio_always_on);
+/* The BAR0 ~ BAR4 of Marvell 9125 device can't be accessed
+* by IO resource file, and need to skip the files
+*/
+static void quirk_marvell_mask_bar(struct pci_dev *dev)
+{
+ int i;
+
+ for (i = 0; i < 5; i++)
+ if (dev->resource[i].start)
+ dev->resource[i].start =
+ dev->resource[i].end = 0;
+}
+DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_MARVELL_EXT, 0x9125,
+ quirk_marvell_mask_bar);
+
/* The Mellanox Tavor device gives false positive parity errors
* Mark this device with a broken_parity_status, to allow
* PCI scanning code to "skip" this now blacklisted device.
--
1.7.5.4
--
To unsubscribe from this list: send the line "unsubscribe linux-pci" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
--
To unsubscribe from this list: send the line "unsubscribe linux-pci" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html