Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp3378691ybp; Sun, 6 Oct 2019 10:37:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqxljcjsEzjRo5tAbErBenaFYB7yHD62DfgXtTjVTb2WKMCr6nBzKA+LmZq9kCJk2bnzgKV4 X-Received: by 2002:a05:6402:1501:: with SMTP id f1mr25508891edw.76.1570383451067; Sun, 06 Oct 2019 10:37:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570383451; cv=none; d=google.com; s=arc-20160816; b=rA+ylGBs8ZQay6205Wv0Cqhn41HEZ+msbtf1l4cGKxTgRl6hMQgo39MHB8bo0UtK72 dc+ZAu7+fV4/jC8klPPylhpYZJ7Rf82FEKWYlsad6dtIDyqdAXloCBi9mYiB2jGWN2dJ YKsWM0Q1Bf7kT4+jTbNZHIySsKQCy0l5I03MEl8jh7tWWqD5PuvW9J4IE7MR/6GIa4DF ZofsGhu2okytTE5vAcXaSVhL6jxe46RiCCnS5xFUTnGvExeJS50E+PrQyFEtrsPvozvW mDjhhPaJz3JbV9kyHGR4ACcW6ANnHdOvw3lyciTPj3YYmGlwLsdMKM7rCAqWYvUCxCJw mZNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=5fW/b31cKAbcl3O4qcDyKpct+4EVDT/dXGCsdtF4HJI=; b=ZbZbYRaUMmIQH/buFyZU1DjfPctKt2YOpxO9FY2FvGDf5Wjwu1pXf5mrMq8FcE+g8s 3kkKYaEGkgL2vY7EwO8DN+NZqF0SCZZrzzQTVq7dJEFPOT53Q4l3Y+lfmDzJsCdCepkY SYXvsZofACbQZz5lJlLt43qW1YCpNt/BDXAkuK1xVEIWhsynjMNl2lSCeJdTyNXFvx+w XDCUxF3HMiYWQ3chMP3ktjohUVq6TZ25dd5zFaTHf0VKd+uuwcnn/Gshsil2SCFjiWEj XMIXgqOkJoF3EXzNAUYXSdBl6d6nIjvIIxuExXvP65XQddAXcYu1dNl5Z0/YngeNjHpX 72AQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zHgqQDX3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c31si7517450edb.309.2019.10.06.10.37.06; Sun, 06 Oct 2019 10:37:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zHgqQDX3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730111AbfJFRfZ (ORCPT + 99 others); Sun, 6 Oct 2019 13:35:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:34024 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730087AbfJFRfX (ORCPT ); Sun, 6 Oct 2019 13:35:23 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9537420700; Sun, 6 Oct 2019 17:35:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570383322; bh=jujcImgHDYGHQ7uDDwkXOSgG2q4SgjbpIX6MY4h8sRk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=zHgqQDX3zJJul7W+7CY++Dhn4AXcbZDcP0cSOm5NDqdMJ/D3oto5hFiKYb4ihJFFK awwD1XF0Bg7upLDhYuSWUFiSZTW1JV8jbkMtvVG/ceiQHAK2sVVifCuK0Nfnh8HiJH gJQSGLTsuFMIV7mO6rCg/5NK/jFkNuvMJSM8THuk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sam Bobroff , Michael Ellerman , Sasha Levin Subject: [PATCH 5.2 061/137] powerpc/eeh: Clear stale EEH_DEV_NO_HANDLER flag Date: Sun, 6 Oct 2019 19:20:45 +0200 Message-Id: <20191006171213.631387675@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191006171209.403038733@linuxfoundation.org> References: <20191006171209.403038733@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sam Bobroff [ Upstream commit aa06e3d60e245284d1e55497eb3108828092818d ] The EEH_DEV_NO_HANDLER flag is used by the EEH system to prevent the use of driver callbacks in drivers that have been bound part way through the recovery process. This is necessary to prevent later stage handlers from being called when the earlier stage handlers haven't, which can be confusing for drivers. However, the flag is set for all devices that are added after boot time and only cleared at the end of the EEH recovery process. This results in hot plugged devices erroneously having the flag set during the first recovery after they are added (causing their driver's handlers to be incorrectly ignored). To remedy this, clear the flag at the beginning of recovery processing. The flag is still cleared at the end of recovery processing, although it is no longer really necessary. Also clear the flag during eeh_handle_special_event(), for the same reasons. Signed-off-by: Sam Bobroff Signed-off-by: Michael Ellerman Link: https://lore.kernel.org/r/b8ca5629d27de74c957d4f4b250177d1b6fc4bbd.1565930772.git.sbobroff@linux.ibm.com Signed-off-by: Sasha Levin --- arch/powerpc/kernel/eeh_driver.c | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/arch/powerpc/kernel/eeh_driver.c b/arch/powerpc/kernel/eeh_driver.c index 89623962c7275..1fbe541856f5e 100644 --- a/arch/powerpc/kernel/eeh_driver.c +++ b/arch/powerpc/kernel/eeh_driver.c @@ -793,6 +793,10 @@ void eeh_handle_normal_event(struct eeh_pe *pe) result = PCI_ERS_RESULT_DISCONNECT; } + eeh_for_each_pe(pe, tmp_pe) + eeh_pe_for_each_dev(tmp_pe, edev, tmp) + edev->mode &= ~EEH_DEV_NO_HANDLER; + /* Walk the various device drivers attached to this slot through * a reset sequence, giving each an opportunity to do what it needs * to accomplish the reset. Each child gets a report of the @@ -981,7 +985,8 @@ void eeh_handle_normal_event(struct eeh_pe *pe) */ void eeh_handle_special_event(void) { - struct eeh_pe *pe, *phb_pe; + struct eeh_pe *pe, *phb_pe, *tmp_pe; + struct eeh_dev *edev, *tmp_edev; struct pci_bus *bus; struct pci_controller *hose; unsigned long flags; @@ -1050,6 +1055,10 @@ void eeh_handle_special_event(void) (phb_pe->state & EEH_PE_RECOVERING)) continue; + eeh_for_each_pe(pe, tmp_pe) + eeh_pe_for_each_dev(tmp_pe, edev, tmp_edev) + edev->mode &= ~EEH_DEV_NO_HANDLER; + /* Notify all devices to be down */ eeh_pe_state_clear(pe, EEH_PE_PRI_BUS, true); eeh_set_channel_state(pe, pci_channel_io_perm_failure); -- 2.20.1