Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp2867126imm; Sun, 29 Jul 2018 05:20:52 -0700 (PDT) X-Google-Smtp-Source: AAOMgpfdl8sxchC7/+K5oK3IDCPwVp5rKjW0grUWQkWG0tx2CVzRpY81RmBgORRyWyynCJ5yKCRJ X-Received: by 2002:a63:4763:: with SMTP id w35-v6mr12541584pgk.140.1532866852033; Sun, 29 Jul 2018 05:20:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532866852; cv=none; d=google.com; s=arc-20160816; b=Z7Ry1Tt1+YDWyIHp4ChMAhvVHTUpu54PcbmDpCWIUdiJQFZ7mhqDsQtep4jCacaAP8 2+5Qbl/eiiBePRxqgkaYynco2znfwwCMSlayirS8oJ6+2b8pVdmRyTDd+2E1M6CLVUE2 +KZOd4ScLjYdaTPZBedYGzeXf4pSRJtlQNchIUCVT3FQ07Nua28oJO80yfrMWYkzi/d2 25iFxIM1jWe3LA2grVnG+rluhzj4bU6cKLXOtYHzr58SwLY/Ox06aO1PQyC0a7sl9zUJ xiHFSGR5XNP7tAooM0f5zEPf2E3+ZV6MornE8gFqHfoWFW9PiMatxgK5cZQKsgeCB1in T3mA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=PayeaPsdjFXjaAxTsbrnF67kb1oYchuI6DqgXDeLnQ0=; b=MXQFpTJABKcDhjnOX1hL/4cvg2EAzZ1Kh1TA44CD/Ep3GZBBqGzWmHAGq5Kcui2x76 jnL7MGVen2g9oTccJMcXFNUyJwuIre9ntOO09NbTJX8xbfLs1E7pCqktIByFcW0cpunG M1m+8Cllcrh7vKnYaEJx65mTC3ccp6s10xmHRG7JRz0bn0zWvowliAptYmVIPP7DFKYq JvEKUHrgsTFtZ8DYVB9l24STFW9P/oYyxMqwOLIOs4fcD3ashsKYybAUlw1xkqSjeAan ahy3EIUZl0nO9pRSpZEG6/FjQ2108Bqet+E01LuIVEVYjFd1+UsqZUuCe6BFo06VTmAZ gWPQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h14-v6si7917528pgg.540.2018.07.29.05.20.38; Sun, 29 Jul 2018 05:20:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726461AbeG2Ntk (ORCPT + 99 others); Sun, 29 Jul 2018 09:49:40 -0400 Received: from bmailout1.hostsharing.net ([83.223.95.100]:35327 "EHLO bmailout1.hostsharing.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726241AbeG2Ntk (ORCPT ); Sun, 29 Jul 2018 09:49:40 -0400 Received: from h08.hostsharing.net (h08.hostsharing.net [83.223.95.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.hostsharing.net", Issuer "COMODO RSA Domain Validation Secure Server CA" (not verified)) by bmailout1.hostsharing.net (Postfix) with ESMTPS id D422830000F26; Sun, 29 Jul 2018 14:19:21 +0200 (CEST) Received: by h08.hostsharing.net (Postfix, from userid 100393) id 8DE5BBDFF7; Sun, 29 Jul 2018 14:19:21 +0200 (CEST) Date: Sun, 29 Jul 2018 14:19:21 +0200 From: Lukas Wunner To: okaya@codeaurora.org Cc: linux-pci@vger.kernel.org, linux-arm-msm@vger.kernel.org, linux-arm-kernel@lists.infradead.org, Bjorn Helgaas , Oza Pawandeep , Keith Busch , open list Subject: Re: [PATCH V5 3/3] PCI: Mask and unmask hotplug interrupts during reset Message-ID: <20180729121921.GA4364@wunner.de> References: <1530571967-19099-1-git-send-email-okaya@codeaurora.org> <1530571967-19099-4-git-send-email-okaya@codeaurora.org> <20180703083447.GA2689@wunner.de> <8b6ce0f415858463d1c0588c29e30415@codeaurora.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <8b6ce0f415858463d1c0588c29e30415@codeaurora.org> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 03, 2018 at 07:30:28AM -0400, okaya@codeaurora.org wrote: > On 2018-07-03 04:34, Lukas Wunner wrote: > > On Mon, Jul 02, 2018 at 06:52:47PM -0400, Sinan Kaya wrote: > > > If a bridge supports hotplug and observes a PCIe fatal error, the > > > following events happen: > > > > > > 1. AER driver removes the devices from PCI tree on fatal error > > > 2. AER driver brings down the link by issuing a secondary bus reset > > > waits for the link to come up. > > > 3. Hotplug driver observes a link down interrupt > > > 4. Hotplug driver tries to remove the devices waiting for the rescan > > > lock but devices are already removed by the AER driver and AER > > > driver is waiting for the link to come back up. > > > 5. AER driver tries to re-enumerate devices after polling for the link > > > state to go up. > > > 6. Hotplug driver obtains the lock and tries to remove the devices > > > again. > > > > > > If a bridge is a hotplug capable bridge, mask hotplug interrupts > > > before the reset and unmask afterwards. > > > > Would it work for you if you just amended the AER driver to skip > > removal and re-enumeration of devices if the port is a hotplug bridge? > > Just check for is_hotplug_bridge in struct pci_dev. > > The reason why we want to remove devices before secondary bus reset is to > quiesce pcie bus traffic before issuing a reset. > > Skipping this step might cause transactions to be lost in the middle of > the reset as there will be active traffic flowing and drivers will > suddenly start reading ffs. That's par for the course for any hotplug bridge with support for surprise removal (e.g. Thunderbolt) and drivers must be able to cope with it. Nothing to worry about IMHO. Thanks, Lukas