Received: by 10.192.165.148 with SMTP id m20csp4892998imm; Tue, 8 May 2018 16:55:03 -0700 (PDT) X-Google-Smtp-Source: AB8JxZraZ6Vb/9Bpa+OrXvSgfOZ9YT6j6fTY6ehCrZGpbR8229nyLJ9HR4oQbH28s1kk5MPq7Hqu X-Received: by 2002:a63:6d41:: with SMTP id i62-v6mr34214817pgc.233.1525823703110; Tue, 08 May 2018 16:55:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525823703; cv=none; d=google.com; s=arc-20160816; b=lDujjeku+X4Xh6um8BhMoIkgWA58Prk/kJSbo0ssIbpNhC8R7WfHv1sA+0q3A0klOL Q0FCE6bK2sFRHDbcrccQQwfxHN8yHaGVqMQwfIxNYPEcwX5sRG3G8JDNDc1AtbyOpdAD ZgSBvkT4dITcesBWhAVPMISldCMFQcqFbYdGBtmPv/qNR+MmfUWIPDFgHEg+vqLsRNBz cR7+Gn0qR7j/5uaoeB0uwGCwNB7zHL7nwuJvBM+Fm4hSoiNXrnNolq8FJPTvdipm3/lp ag5awaGGiaDY6P5vbUFs4J4ABxMmye3Sm1b5REEvSQG0QYV1du5BUGyFW5YscRc1WJgx p3Dw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=hP466augVnNKVifU13yQZPKpOWvAfQS1ENgvb9XjDoA=; b=W6764OviTCun5dGD3Bt4W+v5ZjVQqye9Wxri8mtXlN7NffMhG3BxVGAXkKPfEvzIR2 GPds73BH0Cri58QY34XmH89/fJQ9ARQdsT4mtlKvn539xsq6WW5UpZdDTcFyGaYOaqif Ml474nabNpRgGh4x0k8G6xSulDaIwydRo+Dj/sWnLI4Yd1Gk5Qe+1QBfYveS+xk50ti1 K3qVHwWntJb3SWmEkoW3uxRDaF7L63x6/HMIlDRT2bbX4Gzo2uG4Jxlgct/Zom5Nbd1y vMHYLH1WoOOFsBExOKC1g0WbuABbq+9v8drcGqUalVWqox8dmjF4p0Ly7+PF6ss0XR3M YIsg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1lDD7dI0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n20si20710301pff.370.2018.05.08.16.54.48; Tue, 08 May 2018 16:55:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1lDD7dI0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933261AbeEHXxe (ORCPT + 99 others); Tue, 8 May 2018 19:53:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:46104 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754148AbeEHXxc (ORCPT ); Tue, 8 May 2018 19:53:32 -0400 Received: from localhost (unknown [69.71.5.252]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 006922075C; Tue, 8 May 2018 23:53:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1525823612; bh=2KAMCRQQWkXqt4wXwowRLaENEPKdROS1yxz/362FpoI=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=1lDD7dI0oypoiBJDEtyBLuh/d8/slHGJs/ki+Q+Nby4B/rEMfbyVE9Yk06btozOzt nBqWNXOi1I7qdWhJ402kv5ZQBiR5ZEFYnJl14811S17nk74uwjja5ATZeY/PRcqSj6 vX+pd3jPTXUHHaN3D9vHpxoz0vxpSu7MHNFWBrfs= Date: Tue, 8 May 2018 18:53:30 -0500 From: Bjorn Helgaas To: Oza Pawandeep Cc: Bjorn Helgaas , Philippe Ombredanne , Thomas Gleixner , Greg Kroah-Hartman , Kate Stewart , linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, Dongdong Liu , Keith Busch , Wei Zhang , Sinan Kaya , Timur Tabi Subject: Re: [PATCH v15 3/9] PCI/AER: Handle ERR_FATAL with removal and re-enumeration of devices Message-ID: <20180508235330.GN161390@bhelgaas-glaptop.roam.corp.google.com> References: <1525323838-1735-1-git-send-email-poza@codeaurora.org> <1525323838-1735-4-git-send-email-poza@codeaurora.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1525323838-1735-4-git-send-email-poza@codeaurora.org> User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 03, 2018 at 01:03:52AM -0400, Oza Pawandeep wrote: > This patch alters the behavior of handling of ERR_FATAL, where removal > of devices is initiated, followed by reset link, followed by > re-enumeration. > > So the errors are handled in a different way as follows: > ERR_NONFATAL => call driver recovery entry points > ERR_FATAL => remove and re-enumerate > > please refer to Documentation/PCI/pci-error-recovery.txt for more details. > > Signed-off-by: Oza Pawandeep > > diff --git a/drivers/pci/pcie/aer/aerdrv.c b/drivers/pci/pcie/aer/aerdrv.c > index 779b387..206f590 100644 > --- a/drivers/pci/pcie/aer/aerdrv.c > +++ b/drivers/pci/pcie/aer/aerdrv.c > @@ -330,6 +330,13 @@ static pci_ers_result_t aer_root_reset(struct pci_dev *dev) > reg32 |= ROOT_PORT_INTR_ON_MESG_MASK; > pci_write_config_dword(dev, pos + PCI_ERR_ROOT_COMMAND, reg32); > > + /* > + * This function is called only on ERR_FATAL now, and since > + * the pci_report_resume is called only in ERR_NONFATAL case, > + * the clearing part has to be taken care here. > + */ > + aer_error_resume(dev); I don't understand this part. Previously the ERR_FATAL path looked like this: do_recovery reset_link driver->reset_link aer_root_reset pci_reset_bridge_secondary_bus # <-- reset broadcast_error_message(..., report_resume) pci_walk_bus(..., report_resume, ...) report_resume if (cb == report_resume) pci_cleanup_aer_uncorrect_error_status pci_write_config_dword(PCI_ERR_UNCOR_STATUS) # <-- clear status After this patch, it will look like this: do_recovery do_fatal_recovery pci_cleanup_aer_uncorrect_error_status pci_write_config_dword(PCI_ERR_UNCOR_STATUS) # <-- clear status reset_link driver->reset_link aer_root_reset pci_reset_bridge_secondary_bus # <-- reset aer_error_resume pcie_capability_write_word(PCI_EXP_DEVSTA) # <-- clear more pci_write_config_dword(PCI_ERR_UNCOR_STATUS) # <-- clear status So if I'm understanding correctly, the new path clears the status too early, then clears it again (plus clearing DEVSTA, which we didn't do before) later. I would think we would want to leave aer_root_reset() alone, and just move the pci_cleanup_aer_uncorrect_error_status() in do_fatal_recovery() down so it happens after we call reset_link(). That way the reset/clear sequence would be the same as it was before. > return PCI_ERS_RESULT_RECOVERED; > } > > diff --git a/drivers/pci/pcie/aer/aerdrv_core.c b/drivers/pci/pcie/aer/aerdrv_core.c > index 0ea5acc..655d4e8 100644 > --- a/drivers/pci/pcie/aer/aerdrv_core.c > +++ b/drivers/pci/pcie/aer/aerdrv_core.c > @@ -20,6 +20,7 @@ > #include > #include > #include "aerdrv.h" > +#include "../../pci.h" > > #define PCI_EXP_AER_FLAGS (PCI_EXP_DEVCTL_CERE | PCI_EXP_DEVCTL_NFERE | \ > PCI_EXP_DEVCTL_FERE | PCI_EXP_DEVCTL_URRE) > @@ -474,6 +475,44 @@ static pci_ers_result_t reset_link(struct pci_dev *dev) > return status; > } > > +static pci_ers_result_t do_fatal_recovery(struct pci_dev *dev, int severity) > +{ > + struct pci_dev *udev; > + struct pci_bus *parent; > + struct pci_dev *pdev, *temp; > + pci_ers_result_t result = PCI_ERS_RESULT_RECOVERED; > + > + if (severity == AER_FATAL) > + pci_cleanup_aer_uncorrect_error_status(dev); > + > + if (dev->hdr_type == PCI_HEADER_TYPE_BRIDGE) > + udev = dev; > + else > + udev = dev->bus->self; > + > + parent = udev->subordinate; > + pci_lock_rescan_remove(); > + list_for_each_entry_safe_reverse(pdev, temp, &parent->devices, > + bus_list) { > + pci_dev_get(pdev); > + pci_dev_set_disconnected(pdev, NULL); > + if (pci_has_subordinate(pdev)) > + pci_walk_bus(pdev->subordinate, > + pci_dev_set_disconnected, NULL); > + pci_stop_and_remove_bus_device(pdev); > + pci_dev_put(pdev); > + } > + > + result = reset_link(udev); > + if (result == PCI_ERS_RESULT_RECOVERED) > + if (pcie_wait_for_link(udev, true)) > + pci_rescan_bus(udev->bus); > + > + pci_unlock_rescan_remove(); > + > + return result; > +} > + > /** > * do_recovery - handle nonfatal/fatal error recovery process > * @dev: pointer to a pci_dev data structure of agent detecting an error > @@ -485,11 +524,15 @@ static pci_ers_result_t reset_link(struct pci_dev *dev) > */ > static void do_recovery(struct pci_dev *dev, int severity) > { > - pci_ers_result_t status, result = PCI_ERS_RESULT_RECOVERED; > + pci_ers_result_t status; > enum pci_channel_state state; > > - if (severity == AER_FATAL) > - state = pci_channel_io_frozen; > + if (severity == AER_FATAL) { > + status = do_fatal_recovery(dev, severity); > + if (status != PCI_ERS_RESULT_RECOVERED) > + goto failed; > + return; > + } > else > state = pci_channel_io_normal; > > @@ -498,12 +541,6 @@ static void do_recovery(struct pci_dev *dev, int severity) > "error_detected", > report_error_detected); > > - if (severity == AER_FATAL) { > - result = reset_link(dev); > - if (result != PCI_ERS_RESULT_RECOVERED) > - goto failed; > - } > - > if (status == PCI_ERS_RESULT_CAN_RECOVER) > status = broadcast_error_message(dev, > state, > -- > 2.7.4 >