Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp888462imm; Tue, 3 Jul 2018 01:36:07 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKxgsRFASqgn8xi2CjeiS3RIji7iO9liqEnq43MP4gKj7WL3iN80J/Iy8KRCClmGSdWV1iP X-Received: by 2002:a17:902:868b:: with SMTP id g11-v6mr28546909plo.305.1530606967928; Tue, 03 Jul 2018 01:36:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530606967; cv=none; d=google.com; s=arc-20160816; b=la8J1h2v3uDxiK66CGlRQFAgyamDcZ4yyflhsXJsWPlFVo4K2CILU/+jCHX+Inng+8 Ntnt8wLbCyrUiEbIKOAuTepSKNPZRVnYJwfiCFTj8WLN0dfIUZ5TTtR06NSSa+Fwnp15 +T0PSWntQfKtiVfwLdfj+q0sD6RI8dfURFp3so6uXMi3Ry/ysABu4+EtnqZh+p1Gq1f5 dap8Tq8NICBM4Ytz42Lj1RGnTHRImJAixlZLjK6+054DYT/cFlaNkCGFmI+WhCvBfPBc LC8TNt/uz8tk45lpWmNfNOFzu2t9Hqb8B2wkHwGoV5W2Q4hU0ljIqfoKwG3/Rcvk0wgg jg1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=tJ3/iHNPNB43RSZ61Jikdb33h/tQ/1nMyWxfIfW8TiM=; b=qEnrvzN19lKu6BRpWclEye1GbBhA2J9HBaZleINq3nxc7nVS0/HTx40RJol31CF1fc 9JsAZN20CEKDyBO3JufD2mago9jZFpk+B2lQOwtNVqyNvYBsaT0dK3JWcErtzFx13SCG 2c39X0Yhc/c7d1Wjx/dcF5f3vsnml99uu9pfc03eBvsUBznBCKq5a0XSScFkDoZ0Ij5o +VkjzAQ+nIQBzT67JGYP+j8JqPkbFrmBEnbv6olVDzwFtvjJr86LyHc9/u+m9sBnfFC2 JAIkytr3icNTVGBnTwrXr5srJE8Y/hZkpozjeUSESLzOhdA1nr4r32vB2/WdhL2Xt9E6 rEVQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 6-v6si586539pgg.366.2018.07.03.01.35.53; Tue, 03 Jul 2018 01:36:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933735AbeGCIew (ORCPT + 99 others); Tue, 3 Jul 2018 04:34:52 -0400 Received: from bmailout3.hostsharing.net ([176.9.242.62]:53473 "EHLO bmailout3.hostsharing.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932471AbeGCIeu (ORCPT ); Tue, 3 Jul 2018 04:34:50 -0400 Received: from h08.hostsharing.net (h08.hostsharing.net [83.223.95.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.hostsharing.net", Issuer "COMODO RSA Domain Validation Secure Server CA" (not verified)) by bmailout3.hostsharing.net (Postfix) with ESMTPS id 36391100FBEED; Tue, 3 Jul 2018 10:34:48 +0200 (CEST) Received: by h08.hostsharing.net (Postfix, from userid 100393) id CE00C1BE91; Tue, 3 Jul 2018 10:34:47 +0200 (CEST) Date: Tue, 3 Jul 2018 10:34:47 +0200 From: Lukas Wunner To: Sinan Kaya Cc: linux-pci@vger.kernel.org, linux-arm-msm@vger.kernel.org, linux-arm-kernel@lists.infradead.org, Bjorn Helgaas , Oza Pawandeep , Keith Busch , open list Subject: Re: [PATCH V5 3/3] PCI: Mask and unmask hotplug interrupts during reset Message-ID: <20180703083447.GA2689@wunner.de> References: <1530571967-19099-1-git-send-email-okaya@codeaurora.org> <1530571967-19099-4-git-send-email-okaya@codeaurora.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1530571967-19099-4-git-send-email-okaya@codeaurora.org> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 02, 2018 at 06:52:47PM -0400, Sinan Kaya wrote: > If a bridge supports hotplug and observes a PCIe fatal error, the following > events happen: > > 1. AER driver removes the devices from PCI tree on fatal error > 2. AER driver brings down the link by issuing a secondary bus reset waits > for the link to come up. > 3. Hotplug driver observes a link down interrupt > 4. Hotplug driver tries to remove the devices waiting for the rescan lock > but devices are already removed by the AER driver and AER driver is waiting > for the link to come back up. > 5. AER driver tries to re-enumerate devices after polling for the link > state to go up. > 6. Hotplug driver obtains the lock and tries to remove the devices again. > > If a bridge is a hotplug capable bridge, mask hotplug interrupts before the > reset and unmask afterwards. Would it work for you if you just amended the AER driver to skip removal and re-enumeration of devices if the port is a hotplug bridge? Just check for is_hotplug_bridge in struct pci_dev. That would seem like a much simpler solution, given that it is known that the link will flap on reset, causing the hotplug driver to remove and re-enumerate devices. That would also cover cases where hotplug is handled by a different driver than pciehp, or by the platform firmware. Thanks, Lukas