Received: by 10.192.165.148 with SMTP id m20csp1211639imm; Thu, 10 May 2018 07:19:24 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoauGfBT6lMW6chG1lReQniwy0o3MYl/DdDOpO8v7/Y+qshX/FajpP436VKBdAYlr2p608i X-Received: by 2002:a17:902:462:: with SMTP id 89-v6mr1558797ple.300.1525961964494; Thu, 10 May 2018 07:19:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525961964; cv=none; d=google.com; s=arc-20160816; b=GVf68j0AwcKvlcrXiVKah93+kp6M/hdm2QhnmP2Aa5ahBxzu7IKUe2xIFFc6b90Cey 5Ri5WGMSdPEoanH21sBBHdd9tcPgLwIm4xqEgZGgSalL++Rj94dEznVrJ/lPqbfL6iek y6oaR3VWsyNE/phRNTnRRWi9rBT2xes5UJTkqFd5+K0h3jnZFM9bkYvrvJ7mnKacB5xC g4od1xFiOROyDVAONfrmpwY6dDcKPEFhNJrW6DHACuD2L4DKQiskrcqZCYaFGl4MI42t gVhF8LzYwdpapRFNE6smHbBGqYi5BHdWnucMBtLwz1GDyFTH2tW0Ob1Ee98ZP3EA/VIy pqiA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:message-id:references :in-reply-to:subject:cc:to:from:date:content-transfer-encoding :mime-version:dkim-signature:dkim-signature :arc-authentication-results; bh=2n008YK47DE/0EYFuMDRLghGgoKNv2OcNCZi1rOLNlY=; b=nX2Q6x/OHuRm+gzTCTZ3vXOg9B/17m6PrnE08QR+jF6Imag85SKcHR0yIe1vT1OWDf Fb8RAIbT2MRCXGLO9pAnwbFt6NdZXrW7P7VQP9az5kxeQbKPXXr0kYYydAq/3WdBNHtJ I+GJvsv0IT69EXUocYbISkCIQK0ax9ntEIm62kUnH3P05feXpiflz0i9qCkEMh0NbX3v PlpBh7I3pOr8mnBI0ghUsHKpUUz7cdIvmWVmF1g8aMvjzYWm/5KXk6xfZaqCeNE6+vED VbvyhRdIQXMfbAZdqDxvhpMl2IDls1pcFPjgc8liCJsTzH0v3mT476m5KBrDquc+WJ21 zNqA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=Wj/35lNp; dkim=pass header.i=@codeaurora.org header.s=default header.b=aV0I5Txz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x1-v6si819807plv.520.2018.05.10.07.19.09; Thu, 10 May 2018 07:19:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=Wj/35lNp; dkim=pass header.i=@codeaurora.org header.s=default header.b=aV0I5Txz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965354AbeEJOSw (ORCPT + 99 others); Thu, 10 May 2018 10:18:52 -0400 Received: from smtp.codeaurora.org ([198.145.29.96]:49184 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934609AbeEJOSu (ORCPT ); Thu, 10 May 2018 10:18:50 -0400 Received: by smtp.codeaurora.org (Postfix, from userid 1000) id F0DC560C65; Thu, 10 May 2018 14:18:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1525961930; bh=RYvGVsGRXE06oQs2avNW3Q399ZBJ/Al0jArhJYkbbxA=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=Wj/35lNpVJyJTH1kztD0glXSWyHDvX7GaMZtEm7mYrA5g8l48nK4rhOUitc3T7oX/ r/832uglQsfXjhkX64bJH47lclfVo3528ORmkIAYzmI6Ap8PHGztYQMm5HJde4FxzG qQBSKHOU4MAj6yeeX8p86lmzSV2+9ST+xqw63kJw= X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on pdx-caf-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.8 required=2.0 tests=ALL_TRUSTED,BAYES_00, DKIM_SIGNED,T_DKIM_INVALID autolearn=no autolearn_force=no version=3.4.0 Received: from mail.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.codeaurora.org (Postfix) with ESMTP id 73C566085F; Thu, 10 May 2018 14:18:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1525961928; bh=RYvGVsGRXE06oQs2avNW3Q399ZBJ/Al0jArhJYkbbxA=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=aV0I5Txz6OZ9uM94F2zcTTOvwMsaoaxf/bTmgsVTsa2Bf2/T0Q51YWTJ9ByVCgYG9 b+LbWB3UqSVcM3P4Bs1GsePbcOLZgM1DoqgrJy3fDozCJ3x4ptWTUHxt54p9AYw84a roqdlBq0Eg/oePRoUSR4ZwY9DFrUv4FX0/xzOkNQ= MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Thu, 10 May 2018 19:48:48 +0530 From: poza@codeaurora.org To: okaya@codeaurora.org Cc: Bjorn Helgaas , Bjorn Helgaas , Philippe Ombredanne , Thomas Gleixner , Greg Kroah-Hartman , Kate Stewart , linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, Dongdong Liu , Keith Busch , Wei Zhang , Timur Tabi , linux-pci-owner@vger.kernel.org Subject: Re: [PATCH v15 3/9] PCI/AER: Handle ERR_FATAL with removal and re-enumeration of devices In-Reply-To: <3cb8c2046967fd9a81a8f846dbafaa82@codeaurora.org> References: <1525323838-1735-1-git-send-email-poza@codeaurora.org> <1525323838-1735-4-git-send-email-poza@codeaurora.org> <20180508235330.GN161390@bhelgaas-glaptop.roam.corp.google.com> <20180509130730.GA236548@bhelgaas-glaptop.roam.corp.google.com> <20180509232111.GA43216@bhelgaas-glaptop.roam.corp.google.com> <20180510131027.GB173327@bhelgaas-glaptop.roam.corp.google.com> <3cb8c2046967fd9a81a8f846dbafaa82@codeaurora.org> Message-ID: <13b86ad03bd859dd4863766d984fcd04@codeaurora.org> X-Sender: poza@codeaurora.org User-Agent: Roundcube Webmail/1.2.5 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2018-05-10 18:45, okaya@codeaurora.org wrote: > On 2018-05-10 14:10, Bjorn Helgaas wrote: >> On Thu, May 10, 2018 at 12:31:16PM +0530, poza@codeaurora.org wrote: >>> On 2018-05-10 04:51, Bjorn Helgaas wrote: >>> > On Wed, May 09, 2018 at 06:44:53PM +0530, poza@codeaurora.org wrote: >>> > > On 2018-05-09 18:37, Bjorn Helgaas wrote: >>> > > > On Tue, May 08, 2018 at 06:53:30PM -0500, Bjorn Helgaas wrote: >>> > > > > On Thu, May 03, 2018 at 01:03:52AM -0400, Oza Pawandeep wrote: >>> > > > > > This patch alters the behavior of handling of ERR_FATAL, where removal >>> > > > > > of devices is initiated, followed by reset link, followed by >>> > > > > > re-enumeration. >>> > > > > > >>> > > > > > So the errors are handled in a different way as follows: >>> > > > > > ERR_NONFATAL => call driver recovery entry points >>> > > > > > ERR_FATAL => remove and re-enumerate >>> > > > > > >>> > > > > > please refer to Documentation/PCI/pci-error-recovery.txt for more details. >>> > > > > > >>> > > > > > Signed-off-by: Oza Pawandeep >>> > > > > > >>> > > > > > diff --git a/drivers/pci/pcie/aer/aerdrv.c b/drivers/pci/pcie/aer/aerdrv.c >>> > > > > > index 779b387..206f590 100644 >>> > > > > > --- a/drivers/pci/pcie/aer/aerdrv.c >>> > > > > > +++ b/drivers/pci/pcie/aer/aerdrv.c >>> > > > > > @@ -330,6 +330,13 @@ static pci_ers_result_t aer_root_reset(struct pci_dev *dev) >>> > > > > > reg32 |= ROOT_PORT_INTR_ON_MESG_MASK; >>> > > > > > pci_write_config_dword(dev, pos + PCI_ERR_ROOT_COMMAND, reg32); >>> > > > > > >>> > > > > > + /* >>> > > > > > + * This function is called only on ERR_FATAL now, and since >>> > > > > > + * the pci_report_resume is called only in ERR_NONFATAL case, >>> > > > > > + * the clearing part has to be taken care here. >>> > > > > > + */ >>> > > > > > + aer_error_resume(dev); >>> > > > > >>> > > > > I don't understand this part. Previously the ERR_FATAL path looked >>> > > > > like >>> > > > > this: >>> > > > > >>> > > > > do_recovery >>> > > > > reset_link >>> > > > > driver->reset_link >>> > > > > aer_root_reset >>> > > > > pci_reset_bridge_secondary_bus # <-- reset >>> > > > > broadcast_error_message(..., report_resume) >>> > > > > pci_walk_bus(..., report_resume, ...) >>> > > > > report_resume >>> > > > > if (cb == report_resume) >>> > > > > pci_cleanup_aer_uncorrect_error_status >>> > > > > pci_write_config_dword(PCI_ERR_UNCOR_STATUS) # <-- clear >>> > > > > status >>> > > > > >>> > > > > After this patch, it will look like this: >>> > > > > >>> > > > > do_recovery >>> > > > > do_fatal_recovery >>> > > > > pci_cleanup_aer_uncorrect_error_status >>> > > > > pci_write_config_dword(PCI_ERR_UNCOR_STATUS) # <-- clear >>> > > > > status >>> > > > > reset_link >>> > > > > driver->reset_link >>> > > > > aer_root_reset >>> > > > > pci_reset_bridge_secondary_bus # <-- reset >>> > > > > aer_error_resume >>> > > > > pcie_capability_write_word(PCI_EXP_DEVSTA) # >>> > > > > <-- clear more >>> > > > > pci_write_config_dword(PCI_ERR_UNCOR_STATUS) # >>> > > > > <-- clear status >>> > > > > >>> > > > > So if I'm understanding correctly, the new path clears the status too >>> > > > > early, then clears it again (plus clearing DEVSTA, which we didn't do >>> > > > > before) later. >>> > > > > >>> > > > > I would think we would want to leave aer_root_reset() alone, and >>> > > > > just move >>> > > > > the pci_cleanup_aer_uncorrect_error_status() in do_fatal_recovery() >>> > > > > down so >>> > > > > it happens after we call reset_link(). That way the reset/clear >>> > > > > sequence >>> > > > > would be the same as it was before. >>> > > > >>> > > > I've been fiddling with this a bit myself and will post the results to >>> > > > see >>> > > > what you think. >>> > > >>> > > >>> > > ok so you are suggesting to move >>> > > pci_cleanup_aer_uncorrect_error_status down >>> > > which I can do. >>> > > >>> > > And not to call aer_error_resume, because you think its clearing the >>> > > status >>> > > again. >>> > > >>> > > following code: calls aer_error_resume. >>> > > pci_broadcast_error_message() >>> > > /* >>> > > * If the error is reported by an end point, we >>> > > think this >>> > > * error is related to the upstream link of the end >>> > > point. >>> > > */ >>> > > if (state == pci_channel_io_normal) >>> > > /* >>> > > * the error is non fatal so the bus is ok, >>> > > just >>> > > invoke >>> > > * the callback for the function that logged >>> > > the >>> > > error. >>> > > */ >>> > > cb(dev, &result_data); >>> > > else >>> > > pci_walk_bus(dev->bus, cb, &result_data); >>> > >>> > Holy crap, I thought this could not possibly get any more complicated, >>> > but you're right; we do actually call aer_error_resume() today via an >>> > extremely convoluted path: >>> > >>> > do_recovery(pci_dev) >>> > broadcast_error_message(..., error_detected, ...) >>> > if (AER_FATAL) >>> > reset_link(pci_dev) >>> > udev = BRIDGE ? pci_dev : pci_dev->bus->self >>> > driver->reset_link(udev) >>> > aer_root_reset(udev) >>> > if (CAN_RECOVER) >>> > broadcast_error_message(..., mmio_enabled, ...) >>> > if (NEED_RESET) >>> > broadcast_error_message(..., slot_reset, ...) >>> > broadcast_error_message(dev, ..., report_resume, ...) >>> > if (BRIDGE) >>> > report_resume >>> > driver->resume >>> > pcie_portdrv_err_resume >>> > device_for_each_child(..., resume_iter) >>> > resume_iter >>> > driver->error_resume >>> > aer_error_resume >>> > pci_cleanup_aer_uncorrect_error_status(pci_dev) # only if >>> > BRIDGE >>> > pci_write_config_dword(PCI_ERR_UNCOR_STATUS) >>> > >>> > aerdriver is the only port service driver that implements >>> > .error_resume(), and aerdriver only binds to root ports. I can't >>> > really believe all these device_for_each_child()/resume_iter() >>> > gyrations are necessary when this is AER code calling AER code. >>> > >>> > Bjorn >>> >>> here is the code of do_fatal_recovery, where I have moved the things >>> down >>> and doing only if it is bridge. >>> let me know how this looks to you, so then I can post v16. >> >> This looks superficially OK. It is very difficult for me to verify >> that >> the behavior is equivalent to the current code, but that's not your >> fault; >> it's just a consequence of the existing design. >> >> I have a couple trivial comments elsewhere, and I'll respond to those >> patches individually. >> >>> static pci_ers_result_t do_fatal_recovery(struct pci_dev *dev, int >>> severity) >>> { >>> struct pci_dev *udev; >>> struct pci_bus *parent; >>> struct pci_dev *pdev, *temp; >>> struct aer_broadcast_data result_data; >>> pci_ers_result_t result = PCI_ERS_RESULT_RECOVERED; >>> >>> >>> if (dev->hdr_type == PCI_HEADER_TYPE_BRIDGE) >>> udev = dev; >>> else >>> udev = dev->bus->self; >>> >>> parent = udev->subordinate; >>> pci_lock_rescan_remove(); >>> list_for_each_entry_safe_reverse(pdev, temp, >>> &parent->devices, >>> bus_list) { >>> pci_dev_get(pdev); >>> pci_dev_set_disconnected(pdev, NULL); >>> if (pci_has_subordinate(pdev)) >>> pci_walk_bus(pdev->subordinate, >>> pci_dev_set_disconnected, NULL); >>> pci_stop_and_remove_bus_device(pdev); >>> pci_dev_put(pdev); >>> } >>> >>> result = reset_link(udev, severity); >>> if (severity == AER_FATAL && dev->hdr_type == >>> PCI_HEADER_TYPE_BRIDGE) { >>> pci_walk_bus(dev->subordinate, report_resume, >>> &result_data); > > Why are we calling resume? the reason we have to call resume here, because we are not calling aer_resume() any more in root_reset. and we have to call resume only in bridge case. please have a look at couple of conversation back with Bjorn. the objective is to align the sequence close to the current code. > >>> pci_cleanup_aer_uncorrect_error_status(dev); >>> dev->error_state = pci_channel_io_normal; >>> } >>> if (result == PCI_ERS_RESULT_RECOVERED) >>> if (pcie_wait_for_link(udev, true)) >>> pci_rescan_bus(udev->bus); >>> >>> pci_unlock_rescan_remove(); >>> >>> return result; >>> } >>> >>> Regards, >>> Oza. >>> >>>