Received: by 10.223.185.116 with SMTP id b49csp268858wrg; Thu, 22 Feb 2018 21:28:49 -0800 (PST) X-Google-Smtp-Source: AH8x225zniJyhJewrA5DGy5sKKijimZJF3skKPaKr5HGXOq/yhdqwp/Y7FieIr1UQRU+V46fF1nA X-Received: by 10.101.70.133 with SMTP id h5mr494607pgr.166.1519363729753; Thu, 22 Feb 2018 21:28:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519363729; cv=none; d=google.com; s=arc-20160816; b=WfJnRSn8Y2K5nW4COdHp3I9bOg1q1E0UbliTWHvPH/M7OOc6o8XJNxuSwQ6a66aDm7 l3iwbjy64It74Zo/HDQmKdUP2WSd8/ERGlaz0ZSIfFmpus3Ce7lad48ahJp7D92kfzpC FtS4TYElb0xdzO0uB7ywVT1aY3/VhaX+Cu3RM1PZOE0m6xtwAtOpmx1fGGHfLMxGNtsT fEpehnZeWQvfiHbc6qqtV4zXFqC3NrfcFM7wd1zHSqnDwFoT3PyM/AFEUvlGNqs7s3DQ iesXLFkEa/ma1Bkgs/o7A15F9EGOw3AdrEhABlvdG9P34laYXqSHLPvDP6egttgS/XNT 1xNw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:message-id:references :in-reply-to:subject:cc:to:from:date:content-transfer-encoding :mime-version:dkim-signature:dkim-signature :arc-authentication-results; bh=vHGlYwWdEPw3LsuEbVmfh4mIMbtzlw8KhEW4FE35WGg=; b=B6QU+JSMJD47WurAAdwcGp8r82j7DX0ObHBdGEpAhu737jc00VWbBWNOpOuqSNYrhE Y7Sb0rSwclkPW/L61JQcNoM7EGy33PdyasJTIJ6TvSbCO/AgwA1E2jLGZSKCuHJWPIxf mo1qEpF7BXzFY44WdAAQORjOOjzI6/sQ03ThFkB9o7S3p7v9kyIBewa8SAOjHj4W2NO4 IutgtSgXyagXpJ1XES9kehkNKURYV3xMg9n4cTF68BRj8tYw4waiLu774u4vmUpKuRzo CbSUxHUIQ2P6wQQX7HW2N7SkFZPjOImg99SFWjivPr+OnPP57tRya/tShXXddVP0NnGm 09XA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=HmwR+hMV; dkim=pass header.i=@codeaurora.org header.s=default header.b=eSW4PSGd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x87si353755pff.17.2018.02.22.21.28.35; Thu, 22 Feb 2018 21:28:49 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=HmwR+hMV; dkim=pass header.i=@codeaurora.org header.s=default header.b=eSW4PSGd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751470AbeBWF14 (ORCPT + 99 others); Fri, 23 Feb 2018 00:27:56 -0500 Received: from smtp.codeaurora.org ([198.145.29.96]:59464 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750962AbeBWF1y (ORCPT ); Fri, 23 Feb 2018 00:27:54 -0500 Received: by smtp.codeaurora.org (Postfix, from userid 1000) id 2090860867; Fri, 23 Feb 2018 05:27:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1519363674; bh=hjZMCgHHO4JfOJRcTVse22WWSxUdkGr3knoalpTKDbI=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=HmwR+hMVQHZpLmM6R2/vALQDAdopg4P0lAFcsC+1v4oErXGX8StqV4uUS3MjW9PFA WvSdI+XinuHQZb8/pWf7qouX7RH1rJ4T929TaEdz8CNRGtE8jgW4Ozba7t6c2+h+vk yv8+MOAx8ExxluklDPOY2tqRU2bYVCbjKzLBT+w0= X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on pdx-caf-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.8 required=2.0 tests=ALL_TRUSTED,BAYES_00, DKIM_SIGNED,T_DKIM_INVALID autolearn=no autolearn_force=no version=3.4.0 Received: from mail.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.codeaurora.org (Postfix) with ESMTP id 4365A60540; Fri, 23 Feb 2018 05:27:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1519363673; bh=hjZMCgHHO4JfOJRcTVse22WWSxUdkGr3knoalpTKDbI=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=eSW4PSGddgwK1HzKai0eo3fG7ukx3dGwWrUtIngQiZrJqK/dQhAD/w1fHWRG5CdXM P6valsVafU6c2qu/udQmgB/zhd1bq0WW8Qs4e5dUPvghljjtqc0bwUKMlaKbDbs5CW s2ya3uVdRoYhFGdl6AHWC+g0xpvdqx4TeeDX+CLQ= MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Fri, 23 Feb 2018 10:57:53 +0530 From: poza@codeaurora.org To: Christoph Hellwig Cc: Bjorn Helgaas , Philippe Ombredanne , Thomas Gleixner , Greg Kroah-Hartman , Kate Stewart , linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, Dongdong Liu , Keith Busch , Wei Zhang , Sinan Kaya , Timur Tabi Subject: Re: [PATCH v10 3/7] PCI/ERR: add mutex to synchronize recovery In-Reply-To: <20180222183602.GC6267@infradead.org> References: <1519315332-26852-1-git-send-email-poza@codeaurora.org> <1519315332-26852-4-git-send-email-poza@codeaurora.org> <20180222183602.GC6267@infradead.org> Message-ID: <2f79e5c643858e13f5ac9d6aef6e536c@codeaurora.org> X-Sender: poza@codeaurora.org User-Agent: Roundcube Webmail/1.2.5 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2018-02-23 00:06, Christoph Hellwig wrote: > On Thu, Feb 22, 2018 at 09:32:08PM +0530, Oza Pawandeep wrote: >> This patch protects pci_do_recovery with mutex. > > Do we really want a global mutex for this and not one per root complex > at very least? This protects pcie_do_recovery, which is called by port service drivers. mainly aer and dpc as of now. so the association is not root complex agents instead service drivers who attempts to do link recovery. so I think we are good here.