Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4500408imu; Mon, 12 Nov 2018 12:06:31 -0800 (PST) X-Google-Smtp-Source: AJdET5fZl0Whz/Xlpjk/Msra9whIHq47ooqm4RoKw3nw5q45Dv4Zc+oXrUrlkvAdPfwaEQvZB3u0 X-Received: by 2002:a63:2315:: with SMTP id j21mr2032125pgj.297.1542053191424; Mon, 12 Nov 2018 12:06:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542053191; cv=none; d=google.com; s=arc-20160816; b=OjVM2L/ndGvyhEwH3kc7E41JF4VYG6sBqMERilcjI5lzsWfn1aBcVncvmreqaIycJj NRTkIkr/XL7hO1g55h0kqeGPwx997/89z3Diu/FdJPbh2EsGSFqIkFwzWRCFWgTQKe+r ZvWL5AKxDUvI+U0rfl5UsZmkx7Jz9ga6mHkNigeGy+2gjIQ9nkFrEvyhv0KR3A3PlVn8 J7O5+AibWEmNz20TOKCbp2a3cbubk1NZ54JfSXyfYJ1bXRGHlKgxJQhafa9aA0Duei0z BCeEF+OJGN5VvNI+qOnOq/qz7ueCkH1c7xR+JvsiBMPvL+bes8CRwPSk35kP4w9szI9S Emmw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-language:accept-language:references:message-id:date :thread-index:thread-topic:subject:to:from:cc:dkim-signature; bh=hEHoz3ZOkZ637vTJ8aGeISs0lGBMTuHJyYxqbDkw10M=; b=gCDYDjXFtI5wfyPv12bKSqvlYzanya3YZKRbCI3dx3gAunLfuj6kJ1V8b/0dHbSgjp FQwtfnX1L5Kh++ggmB2sEWYAgM57Nn/KXx/3G1uR63E8ityweR2fifneaiXKJ/aiJ4Za Ei4T3fLwMMmHPDyBrCPBM2alnHrU7sbr5M29oD5Xtyocdd+nkolIpfAtoYWOzBTfQlP6 ykXekQh7C/rtNqW1nsXP02mS35MhpyFSFmVFqlXkZniUEOwy6DaGEXy7kqGOS29iBmvr 9NjNs139d47MqSnlJIzhRJcYSXQxIoa5qDdWpNS76XXcsecuQxLrCqJ/goAcDf0te/bM ufcQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@dellteam.com header.s=smtpout header.b="F9IA4/9a"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b13-v6si20771781plm.316.2018.11.12.12.06.15; Mon, 12 Nov 2018 12:06:31 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@dellteam.com header.s=smtpout header.b="F9IA4/9a"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726612AbeKMGAb (ORCPT + 99 others); Tue, 13 Nov 2018 01:00:31 -0500 Received: from esa4.dell-outbound.iphmx.com ([68.232.149.214]:15683 "EHLO esa4.dell-outbound.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725832AbeKMGAb (ORCPT ); Tue, 13 Nov 2018 01:00:31 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=dellteam.com; i=@dellteam.com; q=dns/txt; s=smtpout; t=1542053146; x=1573589146; h=cc:from:to:subject:date:message-id:references: content-transfer-encoding:mime-version; bh=sbp8gIVMNq2z7wKV+Us/Oh58FM+BMMhE1vtMpIoI/NI=; b=F9IA4/9aKLO4NnV/HJWzpQB/avCaLTpo1D17iCc7Kg533vGxZybUyBZX u3/MP5xEhiuYrR1CrQW8fHfYxmQYsmwdc0Szp/av12dK3p79cu/3pbcOU ooaRMdiFu7b2EbILq86AiFgd37kh0yDuHRLVUEX3U901+SSwE5GdGknbO s=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A2EMAACO2+lbhiWd50NkGwEBAQEDAQE?= =?us-ascii?q?BBwMBAQGBUwQBAQELAYNrJwqMZYsbgg2XNRSBZgsBAYRsgzAiNgsNAQMBAQI?= =?us-ascii?q?BAQIBAQIQAQEBCgkLCCkvgjYigmMBAQEBAgESKD8QAgEIGB4QVwIEARIIFgS?= =?us-ascii?q?Cf4F6CJ1IAoEQiVgBAQGCHYotjACCFoERgxKESwESAQcGEiyFLwKKfpN8VQk?= =?us-ascii?q?FkRAggViFAoMihnSCdZRcAgQCBAUCFIFKB4EPcXCDPII1G44KQAExi1aBH4E?= =?us-ascii?q?fAQE?= X-IPAS-Result: =?us-ascii?q?A2EMAACO2+lbhiWd50NkGwEBAQEDAQEBBwMBAQGBUwQBA?= =?us-ascii?q?QELAYNrJwqMZYsbgg2XNRSBZgsBAYRsgzAiNgsNAQMBAQIBAQIBAQIQAQEBC?= =?us-ascii?q?gkLCCkvgjYigmMBAQEBAgESKD8QAgEIGB4QVwIEARIIFgSCf4F6CJ1IAoEQi?= =?us-ascii?q?VgBAQGCHYotjACCFoERgxKESwESAQcGEiyFLwKKfpN8VQkFkRAggViFAoMih?= =?us-ascii?q?nSCdZRcAgQCBAUCFIFKB4EPcXCDPII1G44KQAExi1aBH4EfAQE?= Received: from mx0b-00154901.pphosted.com ([67.231.157.37]) by esa4.dell-outbound.iphmx.com with ESMTP/TLS/AES256-SHA256; 12 Nov 2018 14:05:45 -0600 Received: from pps.filterd (m0144104.ppops.net [127.0.0.1]) by mx0b-00154901.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id wACJwkkp072710; Mon, 12 Nov 2018 15:05:44 -0500 Received: from esa4.dell-outbound2.iphmx.com (esa4.dell-outbound2.iphmx.com [68.232.154.98]) by mx0b-00154901.pphosted.com with ESMTP id 2nqepsrg5k-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Mon, 12 Nov 2018 15:05:44 -0500 Cc: , , , , , , , , , , , Received: from ausc60pc101.us.dell.com ([143.166.85.206]) by esa4.dell-outbound2.iphmx.com with ESMTP/TLS/DHE-RSA-AES256-SHA256; 13 Nov 2018 02:05:42 +0600 X-LoopCount0: from 10.166.134.88 X-IronPort-AV: E=Sophos;i="5.54,496,1534827600"; d="scan'208";a="1324590346" From: To: , Subject: Re: [PATCH v2] PCI/MSI: Don't touch MSI bits when the PCI device is disconnected Thread-Topic: [PATCH v2] PCI/MSI: Don't touch MSI bits when the PCI device is disconnected Thread-Index: AQHUT50UQ290XPGvJEGnaSTTjbCF+g== Date: Mon, 12 Nov 2018 20:05:41 +0000 Message-ID: References: <20180918221501.13112-1-mr.nuke.me@gmail.com> <20181107234257.GC41183@google.com> <20181108200855.GE41183@google.com> <20181108220117.GA11466@kroah.com> <20181108223258.GD2932@localhost.localdomain> <20181108224255.GA20619@kroah.com> <20d68e586fff4dcca5616d5056f6fc21@ausx13mps321.AMER.DELL.COM> <20181108225109.GA3023@kroah.com> <16bf9d14bc5f4a90b2b88dd2eb165186@ausx13mps321.AMER.DELL.COM> <5da8d8aa9f3818af649b1ac547bc4e6062626ddf.camel@gmail.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.177.49.166] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-11-12_13:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1811120173 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/11/2018 11:50 PM, Oliver O'Halloran wrote:=0A= > =0A= > [EXTERNAL EMAIL]=0A= > Please report any suspicious attachments, links, or requests for sensitiv= e information.=0A= > =0A= > =0A= > On Thu, 2018-11-08 at 23:06 +0000, Alex_Gagniuc@Dellteam.com wrote:=0A= >> On 11/08/2018 04:51 PM, Greg KH wrote:=0A= >>> On Thu, Nov 08, 2018 at 10:49:08PM +0000, Alex_Gagniuc@Dellteam.com wro= te:=0A= >>>> In the case that we're trying to fix, this code executing is a result = of=0A= >>>> the device being gone, so we can guarantee race-free operation. I agre= e=0A= >>>> that there is a race, in the general case. As far as checking the resu= lt=0A= >>>> for all F's, that's not an option when firmware crashes the system as = a=0A= >>>> result of the mmio read/write. It's never pretty when firmware gets=0A= >>>> involved.=0A= >>>=0A= >>> If you have firmware that crashes the system when you try to read from = a=0A= >>> PCI device that was hot-removed, that is broken firmware and needs to b= e=0A= >>> fixed. The kernel can not work around that as again, you will never wi= n=0A= >>> that race.=0A= >>=0A= >> But it's not the firmware that crashes. It's linux as a result of a=0A= >> fatal error message from the firmware. And we can't fix that because FFS= =0A= >> handling requires that the system reboots [1].=0A= > =0A= > Do we know the exact circumsances that result in firmware requesting a=0A= > reboot? If it happen on any PCIe error I don't see what we can do to=0A= > prevent that beyond masking UEs entirely (are we even allowed to do=0A= > that on FFS systems?).=0A= =0A= Pull a drive out at an angle, push two drives in at the same time, pull =0A= out a drive really slow. If an error is even reported to the OS depends =0A= on PD state, and proprietary mechanisms and logic in the HW and FW. OS =0A= is not supposed to mask errors (touch AER bits) on FFS.=0A= =0A= Sadly, with FFS, behavior can and does change from BIOS version to BIOS =0A= version. On one product, for example, we eliminated a lot of crashes by =0A= simply not reporting some classes of PCIe errors to the OS.=0A= =0A= Alex=0A= =0A= >> If we're going to say that we don't want to support FFS because it's a= =0A= >> separate code path, and different flow, that's fine. I am myself, not a= =0A= >> fan of FFS. But if we're going to continue supporting it, I think we'll= =0A= >> continue to have to resolve these sort of unintended consequences.=0A= >>=0A= >> Alex=0A= >>=0A= >> [1] ACPI 6.2, 18.1 - Hardware Errors and Error Sources=0A= > =0A= > =0A= =0A=