Received: by 10.192.165.148 with SMTP id m20csp1130213imm; Thu, 10 May 2018 06:11:01 -0700 (PDT) X-Google-Smtp-Source: AB8JxZq5OIywwu4iMA0xE2UY2xzea3Id/rztys71N4lpFmduVxAY6ICP46YgdSgF706zb5Egjr7S X-Received: by 2002:a63:7e58:: with SMTP id o24-v6mr1138433pgn.325.1525957861324; Thu, 10 May 2018 06:11:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525957861; cv=none; d=google.com; s=arc-20160816; b=h2CuIjRxymUzg8wE1GYcj8EPrJtbQRNUCcs0lc/xrLCR8vjxgQtyAB+QmY24as5hgd uuG0eXhCCy+DwqOMlocuJUn1Ztw4OULqYdX0+WU4H0r6yaVnMQdfWRp1G57eCX+TDGa8 Q+sdChV3XjarRsW24+2g6ja0tUp7fYp8unEEpi3kFrUiqcp/x7EpOfBegO3v0hGsDuxJ DalYqL+6UNwHOsTigEWwsBxVpwtYFqPsUFk1YsbQtrFwP3fYHm+e63ZiWr4xL90T9acw VOXreppgD6ZBax1E8aJ05neGO6YLVyEJRn+LQLwCWWRhQ4VS6sj5uuC5XQtK7bEzZIHl YidQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=p/l8eDZohSn55K5m8/F1vN/8klvUPTIr6LF7I2lf6EE=; b=tRWx9HoCQDDEtw9Vn5XwWMZ9JCOB3KZM2raACa9Ew88/3B0103XPSyt3c6fEWGuaAR V6Rvx+9OfHVh8hEgjow8xYUoD/jnD3x2XgmTB7S3jS8xVGl5/FG0vKAull5HuDTva8Qw ZRQHur1WQian03aG4OzR2ZxAvDwcCr5ZfU9IJQs8oOzBNnxfKalXguRLjR8nRfpiMIpx bymyK6khDAkpRVnycrEzvjR15qTrXs2abZ+lS8d47UouHBWevyOZr5U83+l63v4b0uXP Ibaq5nIuQVnMVsotzimCzgGo6qJe80XaZ8RUwP4SIw7pBALs3i4xKcxCGUy3nHT4L7Wm m5kw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=sOOVMFim; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a12-v6si649865pgq.652.2018.05.10.06.10.45; Thu, 10 May 2018 06:11:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=sOOVMFim; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757285AbeEJNKa (ORCPT + 99 others); Thu, 10 May 2018 09:10:30 -0400 Received: from mail.kernel.org ([198.145.29.99]:47292 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757097AbeEJNK3 (ORCPT ); Thu, 10 May 2018 09:10:29 -0400 Received: from localhost (50-81-62-164.client.mchsi.com [50.81.62.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 56DAB21747; Thu, 10 May 2018 13:10:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1525957828; bh=WJDJpd5Hj85DnIpU8WI0XVDF9FH6hKz4tMtYO+OMl6M=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=sOOVMFimb12w+TSZ/m69iTis0n43uNYWyC5Tk1kinjqmUK8b1tbV6DdAJ+FxgyZNT dl0YaV+powhRCM3GBXmQV44rLeE77vf70Tn1x4PpU/Cm8qXnR7URzflrorImSMCDHM wELoEX58JOax//1PvHtju4TrVB8BxIu3y0SVGwcE= Date: Thu, 10 May 2018 08:10:27 -0500 From: Bjorn Helgaas To: poza@codeaurora.org Cc: Bjorn Helgaas , Philippe Ombredanne , Thomas Gleixner , Greg Kroah-Hartman , Kate Stewart , linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, Dongdong Liu , Keith Busch , Wei Zhang , Sinan Kaya , Timur Tabi , linux-pci-owner@vger.kernel.org Subject: Re: [PATCH v15 3/9] PCI/AER: Handle ERR_FATAL with removal and re-enumeration of devices Message-ID: <20180510131027.GB173327@bhelgaas-glaptop.roam.corp.google.com> References: <1525323838-1735-1-git-send-email-poza@codeaurora.org> <1525323838-1735-4-git-send-email-poza@codeaurora.org> <20180508235330.GN161390@bhelgaas-glaptop.roam.corp.google.com> <20180509130730.GA236548@bhelgaas-glaptop.roam.corp.google.com> <20180509232111.GA43216@bhelgaas-glaptop.roam.corp.google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 10, 2018 at 12:31:16PM +0530, poza@codeaurora.org wrote: > On 2018-05-10 04:51, Bjorn Helgaas wrote: > > On Wed, May 09, 2018 at 06:44:53PM +0530, poza@codeaurora.org wrote: > > > On 2018-05-09 18:37, Bjorn Helgaas wrote: > > > > On Tue, May 08, 2018 at 06:53:30PM -0500, Bjorn Helgaas wrote: > > > > > On Thu, May 03, 2018 at 01:03:52AM -0400, Oza Pawandeep wrote: > > > > > > This patch alters the behavior of handling of ERR_FATAL, where removal > > > > > > of devices is initiated, followed by reset link, followed by > > > > > > re-enumeration. > > > > > > > > > > > > So the errors are handled in a different way as follows: > > > > > > ERR_NONFATAL => call driver recovery entry points > > > > > > ERR_FATAL => remove and re-enumerate > > > > > > > > > > > > please refer to Documentation/PCI/pci-error-recovery.txt for more details. > > > > > > > > > > > > Signed-off-by: Oza Pawandeep > > > > > > > > > > > > diff --git a/drivers/pci/pcie/aer/aerdrv.c b/drivers/pci/pcie/aer/aerdrv.c > > > > > > index 779b387..206f590 100644 > > > > > > --- a/drivers/pci/pcie/aer/aerdrv.c > > > > > > +++ b/drivers/pci/pcie/aer/aerdrv.c > > > > > > @@ -330,6 +330,13 @@ static pci_ers_result_t aer_root_reset(struct pci_dev *dev) > > > > > > reg32 |= ROOT_PORT_INTR_ON_MESG_MASK; > > > > > > pci_write_config_dword(dev, pos + PCI_ERR_ROOT_COMMAND, reg32); > > > > > > > > > > > > + /* > > > > > > + * This function is called only on ERR_FATAL now, and since > > > > > > + * the pci_report_resume is called only in ERR_NONFATAL case, > > > > > > + * the clearing part has to be taken care here. > > > > > > + */ > > > > > > + aer_error_resume(dev); > > > > > > > > > > I don't understand this part. Previously the ERR_FATAL path looked > > > > > like > > > > > this: > > > > > > > > > > do_recovery > > > > > reset_link > > > > > driver->reset_link > > > > > aer_root_reset > > > > > pci_reset_bridge_secondary_bus # <-- reset > > > > > broadcast_error_message(..., report_resume) > > > > > pci_walk_bus(..., report_resume, ...) > > > > > report_resume > > > > > if (cb == report_resume) > > > > > pci_cleanup_aer_uncorrect_error_status > > > > > pci_write_config_dword(PCI_ERR_UNCOR_STATUS) # <-- clear > > > > > status > > > > > > > > > > After this patch, it will look like this: > > > > > > > > > > do_recovery > > > > > do_fatal_recovery > > > > > pci_cleanup_aer_uncorrect_error_status > > > > > pci_write_config_dword(PCI_ERR_UNCOR_STATUS) # <-- clear > > > > > status > > > > > reset_link > > > > > driver->reset_link > > > > > aer_root_reset > > > > > pci_reset_bridge_secondary_bus # <-- reset > > > > > aer_error_resume > > > > > pcie_capability_write_word(PCI_EXP_DEVSTA) # > > > > > <-- clear more > > > > > pci_write_config_dword(PCI_ERR_UNCOR_STATUS) # > > > > > <-- clear status > > > > > > > > > > So if I'm understanding correctly, the new path clears the status too > > > > > early, then clears it again (plus clearing DEVSTA, which we didn't do > > > > > before) later. > > > > > > > > > > I would think we would want to leave aer_root_reset() alone, and > > > > > just move > > > > > the pci_cleanup_aer_uncorrect_error_status() in do_fatal_recovery() > > > > > down so > > > > > it happens after we call reset_link(). That way the reset/clear > > > > > sequence > > > > > would be the same as it was before. > > > > > > > > I've been fiddling with this a bit myself and will post the results to > > > > see > > > > what you think. > > > > > > > > > ok so you are suggesting to move > > > pci_cleanup_aer_uncorrect_error_status down > > > which I can do. > > > > > > And not to call aer_error_resume, because you think its clearing the > > > status > > > again. > > > > > > following code: calls aer_error_resume. > > > pci_broadcast_error_message() > > > /* > > > * If the error is reported by an end point, we > > > think this > > > * error is related to the upstream link of the end > > > point. > > > */ > > > if (state == pci_channel_io_normal) > > > /* > > > * the error is non fatal so the bus is ok, > > > just > > > invoke > > > * the callback for the function that logged > > > the > > > error. > > > */ > > > cb(dev, &result_data); > > > else > > > pci_walk_bus(dev->bus, cb, &result_data); > > > > Holy crap, I thought this could not possibly get any more complicated, > > but you're right; we do actually call aer_error_resume() today via an > > extremely convoluted path: > > > > do_recovery(pci_dev) > > broadcast_error_message(..., error_detected, ...) > > if (AER_FATAL) > > reset_link(pci_dev) > > udev = BRIDGE ? pci_dev : pci_dev->bus->self > > driver->reset_link(udev) > > aer_root_reset(udev) > > if (CAN_RECOVER) > > broadcast_error_message(..., mmio_enabled, ...) > > if (NEED_RESET) > > broadcast_error_message(..., slot_reset, ...) > > broadcast_error_message(dev, ..., report_resume, ...) > > if (BRIDGE) > > report_resume > > driver->resume > > pcie_portdrv_err_resume > > device_for_each_child(..., resume_iter) > > resume_iter > > driver->error_resume > > aer_error_resume > > pci_cleanup_aer_uncorrect_error_status(pci_dev) # only if > > BRIDGE > > pci_write_config_dword(PCI_ERR_UNCOR_STATUS) > > > > aerdriver is the only port service driver that implements > > .error_resume(), and aerdriver only binds to root ports. I can't > > really believe all these device_for_each_child()/resume_iter() > > gyrations are necessary when this is AER code calling AER code. > > > > Bjorn > > here is the code of do_fatal_recovery, where I have moved the things down > and doing only if it is bridge. > let me know how this looks to you, so then I can post v16. This looks superficially OK. It is very difficult for me to verify that the behavior is equivalent to the current code, but that's not your fault; it's just a consequence of the existing design. I have a couple trivial comments elsewhere, and I'll respond to those patches individually. > static pci_ers_result_t do_fatal_recovery(struct pci_dev *dev, int severity) > { > struct pci_dev *udev; > struct pci_bus *parent; > struct pci_dev *pdev, *temp; > struct aer_broadcast_data result_data; > pci_ers_result_t result = PCI_ERS_RESULT_RECOVERED; > > > if (dev->hdr_type == PCI_HEADER_TYPE_BRIDGE) > udev = dev; > else > udev = dev->bus->self; > > parent = udev->subordinate; > pci_lock_rescan_remove(); > list_for_each_entry_safe_reverse(pdev, temp, &parent->devices, > bus_list) { > pci_dev_get(pdev); > pci_dev_set_disconnected(pdev, NULL); > if (pci_has_subordinate(pdev)) > pci_walk_bus(pdev->subordinate, > pci_dev_set_disconnected, NULL); > pci_stop_and_remove_bus_device(pdev); > pci_dev_put(pdev); > } > > result = reset_link(udev, severity); > if (severity == AER_FATAL && dev->hdr_type == > PCI_HEADER_TYPE_BRIDGE) { > pci_walk_bus(dev->subordinate, report_resume, &result_data); > pci_cleanup_aer_uncorrect_error_status(dev); > dev->error_state = pci_channel_io_normal; > } > if (result == PCI_ERS_RESULT_RECOVERED) > if (pcie_wait_for_link(udev, true)) > pci_rescan_bus(udev->bus); > > pci_unlock_rescan_remove(); > > return result; > } > > Regards, > Oza. > >