From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1B75CC433E7 for ; Mon, 12 Oct 2020 22:03:29 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id B7A192080D for ; Mon, 12 Oct 2020 22:03:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1602540208; bh=Kx9hqJT+lWZx8bfUCcU0kLaDrcmL3KSNc330gGz7jug=; h=Date:From:To:Cc:Subject:In-Reply-To:List-ID:From; b=UE1JWCw7mlmSIver1PNdx7uqVSjDtfu64dtL/NNoqmJvNRUWcLMfHaxiqCqUkpu8l wvx6+jiw1xq/7W1Zog+heWwzOy+sAhswfcyiCMGs44mZyP9zcR5OZaq24Jop8uBLAM Vr36PCKGDElL6vQNgkGJBstOzBtvE7sqPxM4kOmQ= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732171AbgJLWD2 (ORCPT ); Mon, 12 Oct 2020 18:03:28 -0400 Received: from mail.kernel.org ([198.145.29.99]:55752 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727457AbgJLWD2 (ORCPT ); Mon, 12 Oct 2020 18:03:28 -0400 Received: from localhost (170.sub-72-107-125.myvzw.com [72.107.125.170]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3FFAB2074F; Mon, 12 Oct 2020 22:03:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1602540207; bh=Kx9hqJT+lWZx8bfUCcU0kLaDrcmL3KSNc330gGz7jug=; h=Date:From:To:Cc:Subject:In-Reply-To:From; b=VOa7aWnYvs8p4CWXcLmbokyUagcJffbsSznjOnmtf9/YxI7TrIEYqeLXv2P/RTEaQ XBLQUpC/hGFvQ2z1uCBR7Vzd2aoYateSKeW5MMaqKZilDOiRyhkm4BnejGbJ0LRXlB vOH1iZGAeky1RFB+4qEh4YS9TXT6tPY34m4Kq1Jk= Date: Mon, 12 Oct 2020 17:03:25 -0500 From: Bjorn Helgaas To: "Jason A. Donenfeld" Cc: "Alex G." , linux-pci@vger.kernel.org, "Bolen, Austin" , Keith Busch Subject: Re: spammy dmesg about fluctuating pcie bandwidth on 5.9 Message-ID: <20201012220325.GA3752081@bjorn-Precision-5520> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-pci@vger.kernel.org On Fri, Oct 09, 2020 at 05:17:53PM +0200, Jason A. Donenfeld wrote: > Interestingly, some of the time that I run that lspci command, the > dmesg line is provoked. That sort of makes sense, since lspci is > communicating over the bus to gather all that info. I ran the command > a few times and stored the output, if you want to look at their diffs. > See attached. The dmesg logs from your initial report: pcieport 0000:04:00.0: 31.504 Gb/s available PCIe bandwidth, limited by 8.0 GT/s PCIe x4 link at 0000:00:1b.4 (capable of 1984.941 Gb/s with 32.0 GT/s PCIe x63 link) are almost certainly seeing ~0 responses to config reads of 04:00.0. That would happen if 04:00.0 were powered off or if the bridge leading to it (00:1b.4) were in Downstream Port Containment mode. 00:1b.4 does support DPC, but none of the lspci logs you attached show DPC being triggered. If it were, you should see some indication in dmesg as well, e.g., the "containment event, status:%#06x source:%#06x\n" message from dpc_process_error(). If you can collect the complete dmesg log, especially after you get the bandwidth notification spam, it might have a clue. Just to re-confirm: this happens with v5.8 but not with v5.9? (v5.9 had not been released at your initial report, so I assume you meant v5.9-rc8 or something?) If you can bisect, that would be the easiest way to identify the problem. Bjorn