Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1759078ybz; Sat, 18 Apr 2020 07:55:02 -0700 (PDT) X-Google-Smtp-Source: APiQypL2dHJ+Ww+um+6DsXA7NvMOG4qxGu7TVMYD0a5LFEwqGD8xI/J7bbdS657XxlNy5H9RgWVa X-Received: by 2002:a17:906:38ca:: with SMTP id r10mr7783906ejd.278.1587221702643; Sat, 18 Apr 2020 07:55:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587221702; cv=none; d=google.com; s=arc-20160816; b=Xd2h46DoGG5myIoZdwWVoiQvyG+rgI5gkJSdGpK7ti5vCo3tjQL37y2anWnwH6AkrV GafWdzsu1oSa9rL0PjM59rl1Keam0J2IuO+LyMNxbdOiv/7Yh35HmnPGBdZreoyx1UvL qsUOTtPHcHNje0AiNTow0vV1axsUC1JPNfoHKIxOIaxFeWbqAoEF4vI0wuvzhSt1oaRT AuvIEOr/a7sS28qIupay9Xy5g1hHi6XqnPCET0An5yC+oYJP16qxHdlxq6BzgCEy/EXj LF9I6ZWfAL0fjKrwdwEz7lLql4S5OeTNSDXHFQzkDCpj7y0N1CkMqnY41nV84eT921CK Q5jA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=uLau7cnVrdEUktg/FDMfc8TDQQVTtYJukdgIPVRDRnM=; b=vqK3BnILuksiy1XH0dVj77XrQrnIDxvwdz0DwMRmw28+J84Y4gCFj90DvOLHB2PTlt WEdYfHCfEwOavVqX7NVDxNhkJct9d4cPI4I2h86ogcyYCSjw87mpOoZfamEniKfILbh+ QUYBNMA6fLB0DZDUHUvgppZGbdV/3ln6aeCDhooAfmd+0C7Hm7BzxPfPNTiWDrM4E+aa oRj1OWwKIAEBreMTLsIaCh7MVwDos48bvO7PqfPqZGo1IruFP0Q2IGvd42sisbvcdSOY gUssVDEi/OQ8QygS5nY370GZfj4pri4AdYBrGJSYZ+SRgDrsZCDDLulu2jnC6g+qjNbY hW6Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gZoI0R8F; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id de14si4228071edb.283.2020.04.18.07.54.40; Sat, 18 Apr 2020 07:55:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gZoI0R8F; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728287AbgDROwh (ORCPT + 99 others); Sat, 18 Apr 2020 10:52:37 -0400 Received: from mail.kernel.org ([198.145.29.99]:52122 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728277AbgDROmN (ORCPT ); Sat, 18 Apr 2020 10:42:13 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6582022253; Sat, 18 Apr 2020 14:42:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1587220933; bh=t8ELidcRfJWgFD6Yaefs6KTpIll3Zwk7H1XPAqtaCJE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gZoI0R8FsLcCcm++7S5a71C6VnzCoSwQMqxwGSBf99bc/Cs1BT0UroWjRSLYkusNz Yj6zZiIAJbz42S/sslInYCIE8dldHP4mwJ08HnZxGE/eZncS26hAQdY8WFkpHuqriM +Jh0j8/6U3rMmHLxSTL2SemodcS3nF+1ML2OsUl4= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Frederic Barrat , Andrew Donnellan , Michael Ellerman , Sasha Levin , linuxppc-dev@lists.ozlabs.org Subject: [PATCH AUTOSEL 5.4 69/78] powerpc/powernv/ioda: Fix ref count for devices with their own PE Date: Sat, 18 Apr 2020 10:40:38 -0400 Message-Id: <20200418144047.9013-69-sashal@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20200418144047.9013-1-sashal@kernel.org> References: <20200418144047.9013-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Frederic Barrat [ Upstream commit 05dd7da76986937fb288b4213b1fa10dbe0d1b33 ] The pci_dn structure used to store a pointer to the struct pci_dev, so taking a reference on the device was required. However, the pci_dev pointer was later removed from the pci_dn structure, but the reference was kept for the npu device. See commit 902bdc57451c ("powerpc/powernv/idoa: Remove unnecessary pcidev from pci_dn"). We don't need to take a reference on the device when assigning the PE as the struct pnv_ioda_pe is cleaned up at the same time as the (physical) device is released. Doing so prevents the device from being released, which is a problem for opencapi devices, since we want to be able to remove them through PCI hotplug. Now the ugly part: nvlink npu devices are not meant to be released. Because of the above, we've always leaked a reference and simply removing it now is dangerous and would likely require more work. There's currently no release device callback for nvlink devices for example. So to be safe, this patch leaks a reference on the npu device, but only for nvlink and not opencapi. Signed-off-by: Frederic Barrat Reviewed-by: Andrew Donnellan Signed-off-by: Michael Ellerman Link: https://lore.kernel.org/r/20191121134918.7155-2-fbarrat@linux.ibm.com Signed-off-by: Sasha Levin --- arch/powerpc/platforms/powernv/pci-ioda.c | 19 ++++++++++++------- 1 file changed, 12 insertions(+), 7 deletions(-) diff --git a/arch/powerpc/platforms/powernv/pci-ioda.c b/arch/powerpc/platforms/powernv/pci-ioda.c index 058223233088e..e9cda7e316a50 100644 --- a/arch/powerpc/platforms/powernv/pci-ioda.c +++ b/arch/powerpc/platforms/powernv/pci-ioda.c @@ -1062,14 +1062,13 @@ static struct pnv_ioda_pe *pnv_ioda_setup_dev_PE(struct pci_dev *dev) return NULL; } - /* NOTE: We get only one ref to the pci_dev for the pdn, not for the - * pointer in the PE data structure, both should be destroyed at the - * same time. However, this needs to be looked at more closely again - * once we actually start removing things (Hotplug, SR-IOV, ...) + /* NOTE: We don't get a reference for the pointer in the PE + * data structure, both the device and PE structures should be + * destroyed at the same time. However, removing nvlink + * devices will need some work. * * At some point we want to remove the PDN completely anyways */ - pci_dev_get(dev); pdn->pe_number = pe->pe_number; pe->flags = PNV_IODA_PE_DEV; pe->pdev = dev; @@ -1084,7 +1083,6 @@ static struct pnv_ioda_pe *pnv_ioda_setup_dev_PE(struct pci_dev *dev) pnv_ioda_free_pe(pe); pdn->pe_number = IODA_INVALID_PE; pe->pdev = NULL; - pci_dev_put(dev); return NULL; } @@ -1205,6 +1203,14 @@ static struct pnv_ioda_pe *pnv_ioda_setup_npu_PE(struct pci_dev *npu_pdev) struct pci_controller *hose = pci_bus_to_host(npu_pdev->bus); struct pnv_phb *phb = hose->private_data; + /* + * Intentionally leak a reference on the npu device (for + * nvlink only; this is not an opencapi path) to make sure it + * never goes away, as it's been the case all along and some + * work is needed otherwise. + */ + pci_dev_get(npu_pdev); + /* * Due to a hardware errata PE#0 on the NPU is reserved for * error handling. This means we only have three PEs remaining @@ -1228,7 +1234,6 @@ static struct pnv_ioda_pe *pnv_ioda_setup_npu_PE(struct pci_dev *npu_pdev) */ dev_info(&npu_pdev->dev, "Associating to existing PE %x\n", pe_num); - pci_dev_get(npu_pdev); npu_pdn = pci_get_pdn(npu_pdev); rid = npu_pdev->bus->number << 8 | npu_pdn->devfn; npu_pdn->pe_number = pe_num; -- 2.20.1