Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp348693imm; Thu, 16 Aug 2018 22:07:59 -0700 (PDT) X-Google-Smtp-Source: AA+uWPyYEiPqDUDa6WJ17Fk+0tWuA3vn2cUOUSBVCshnJfyo8CKq2v7zva7FxOQN5IQnN2ig3SPl X-Received: by 2002:a62:9042:: with SMTP id a63-v6mr35375115pfe.52.1534482479699; Thu, 16 Aug 2018 22:07:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534482479; cv=none; d=google.com; s=arc-20160816; b=HK8HWcuu8Iv4xqsb0E6dSO1ZbsrCMAifZNKDZCmUZrVHvvEsfcOnWnlKoH4npxiHsy tKq5x9X+Ut8vHkzN+crK+cARuvJwllYgfApSmmUvMVDRpmGdsk776j4o9OHX8m+1/n5m hqdLXHZdVUiYcIcIkoItYiciGVhYZmVUaqE8GyjSx0FmChD/tlbMIyt4V/pDLCiTLk4B M+DSNKyasJhiFcpB7gwSX69YIIuZny44tTQNMsg05ECOusSWawuCql6RxFY+slfcoIkc ZTQTVLFlhh/IJXPhSiTnuIGwUE4PbS1PT2L8yMPYFC3EYXqgUnYyShsKeOWd10knznBr XT0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=j/CJJTo6J/h94X4c7vcW1FM3h4y6rwtCeopS4FllvVM=; b=k1CeSvGfIrGpkdlaacM6V5o+lRGdBVvqleFpTNuTq17WjJ8LJnfMRDwx9ykRuWDWt/ UX5QRMlLkFuUx06OcGfJeTH1Lv1lAT62a8eKmEq6n0wWf+dP7HRmejrgHzMGW+TZcEcS ZN6yMCX4pO3aoO7Ki7h33AGLJ78pg1W7Um/ToMAkirj4EpKhRveMbKFZJsCZnTdxJ+ss +/E/Nf4Qqf97I4e2X9LuSF2JmGgbAWklnZ5P9AN0ywcgkWb0ApcEdtCXk+nrbW8Zf9hM HIMS0dCMdImyBu6pZ9itu/yOrJM6qU5UOceP82uNXCSWTa3YWjqiHpQrgKkaV+D0hIBE vHnA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w19-v6si1223688plp.25.2018.08.16.22.07.44; Thu, 16 Aug 2018 22:07:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726392AbeHQIIf (ORCPT + 99 others); Fri, 17 Aug 2018 04:08:35 -0400 Received: from gate.crashing.org ([63.228.1.57]:41662 "EHLO gate.crashing.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726134AbeHQIIf (ORCPT ); Fri, 17 Aug 2018 04:08:35 -0400 Received: from pasglop.ozlabs.ibm.com (localhost.localdomain [127.0.0.1]) by gate.crashing.org (8.14.1/8.14.1) with ESMTP id w7H4nAsI017258; Thu, 16 Aug 2018 23:49:35 -0500 From: Benjamin Herrenschmidt To: Bjorn Helgaas , linux-pci@vger.kernel.org Cc: Hari Vyas , Ray Jui , Srinath Mannam , Guenter Roeck , Jens Axboe , Lukas Wunner , Konstantin Khlebnikov , Marta Rybczynska , Pierre-Yves Kerbrat , linux-kernel@vger.kernel.org, Benjamin Herrenschmidt Subject: [RFC PATCH 5/6] pci: Protect the enable/disable state of pci_dev using the state mutex Date: Fri, 17 Aug 2018 14:49:01 +1000 Message-Id: <20180817044902.31420-6-benh@kernel.crashing.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20180817044902.31420-1-benh@kernel.crashing.org> References: <20180817044902.31420-1-benh@kernel.crashing.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This protects enable/disable operations using the state mutex to avoid races with, for example, concurrent enables on a bridge. The bus hierarchy is walked first before taking the lock to avoid lock nesting (though it would be ok if we ensured that we always nest them bottom-up, it is better to just avoid the issue alltogether, especially as we might find cases where we want to take it top-down later). Signed-off-by: Benjamin Herrenschmidt --- drivers/pci/pci.c | 51 ++++++++++++++++++++++++++++++++--------------- 1 file changed, 35 insertions(+), 16 deletions(-) diff --git a/drivers/pci/pci.c b/drivers/pci/pci.c index 62591c153999..68152de2b5a0 100644 --- a/drivers/pci/pci.c +++ b/drivers/pci/pci.c @@ -1540,26 +1540,33 @@ static int do_pci_enable_device(struct pci_dev *dev, int bars) */ int pci_reenable_device(struct pci_dev *dev) { + int rc = 0; + + pci_dev_state_lock(dev); if (pci_is_enabled(dev)) - return do_pci_enable_device(dev, (1 << PCI_NUM_RESOURCES) - 1); - return 0; + rc = do_pci_enable_device(dev, (1 << PCI_NUM_RESOURCES) - 1); + pci_dev_state_unlock(dev); + return rc; } EXPORT_SYMBOL(pci_reenable_device); static void pci_enable_bridge(struct pci_dev *dev) { struct pci_dev *bridge; - int retval; + int retval, enabled; bridge = pci_upstream_bridge(dev); if (bridge) pci_enable_bridge(bridge); - if (pci_is_enabled(dev)) { - if (!dev->is_busmaster) - pci_set_master(dev); + /* Already enabled ? */ + pci_dev_state_lock(dev); + enabled = pci_is_enabled(dev); + if (enabled && !dev->is_busmaster) + pci_set_master(dev); + pci_dev_state_unlock(dev); + if (enabled) return; - } retval = pci_enable_device(dev); if (retval) @@ -1571,9 +1578,16 @@ static void pci_enable_bridge(struct pci_dev *dev) static int pci_enable_device_flags(struct pci_dev *dev, unsigned long flags) { struct pci_dev *bridge; - int err; + int err = 0; int i, bars = 0; + /* Handle upstream bridges first to avoid locking issues */ + bridge = pci_upstream_bridge(dev); + if (bridge) + pci_enable_bridge(bridge); + + pci_dev_state_lock(dev); + /* * Power state could be unknown at this point, either due to a fresh * boot or a device removal call. So get the current power state @@ -1586,12 +1600,9 @@ static int pci_enable_device_flags(struct pci_dev *dev, unsigned long flags) dev->current_state = (pmcsr & PCI_PM_CTRL_STATE_MASK); } + /* Already enabled ? */ if (atomic_inc_return(&dev->enable_cnt) > 1) - return 0; /* already enabled */ - - bridge = pci_upstream_bridge(dev); - if (bridge) - pci_enable_bridge(bridge); + goto bail; /* only skip sriov related */ for (i = 0; i <= PCI_ROM_RESOURCE; i++) @@ -1604,6 +1615,8 @@ static int pci_enable_device_flags(struct pci_dev *dev, unsigned long flags) err = do_pci_enable_device(dev, bars); if (err < 0) atomic_dec(&dev->enable_cnt); + bail: + pci_dev_state_unlock(dev); return err; } @@ -1820,12 +1833,16 @@ static void do_pci_disable_device(struct pci_dev *dev) * @dev: PCI device to disable * * NOTE: This function is a backend of PCI power management routines and is - * not supposed to be called drivers. + * not supposed to be called drivers. It will keep enable_cnt and is_busmaster + * unmodified so that the resume code knows how to restore the corresponding + * command register bits. */ void pci_disable_enabled_device(struct pci_dev *dev) { + pci_dev_state_lock(dev); if (pci_is_enabled(dev)) do_pci_disable_device(dev); + pci_dev_state_unlock(dev); } /** @@ -1849,12 +1866,14 @@ void pci_disable_device(struct pci_dev *dev) dev_WARN_ONCE(&dev->dev, atomic_read(&dev->enable_cnt) <= 0, "disabling already-disabled device"); + pci_dev_state_lock(dev); if (atomic_dec_return(&dev->enable_cnt) != 0) - return; + goto bail; do_pci_disable_device(dev); - dev->is_busmaster = 0; + bail: + pci_dev_state_unlock(dev); } EXPORT_SYMBOL(pci_disable_device); -- 2.17.1