Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp367212ybk; Wed, 20 May 2020 01:31:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzvSblgVAyY9aRiz8588tLKtRjsG3S2FgY+aX9tPIkmnLuZE4F8d+APTKeSuXf30NMQIq0T X-Received: by 2002:a17:906:9383:: with SMTP id l3mr2846381ejx.520.1589963480561; Wed, 20 May 2020 01:31:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589963480; cv=none; d=google.com; s=arc-20160816; b=AXcSvERf7gt8+rxooVcJ1Ei9eCxbZI68YLxylH8M9HTJJ53Dyw+CRHL1R2qcKRRpVN jO1doKS0tosKISyQvnIAMf8lQq6uFinDrwBQDAsorDkK/5Wi5F+FEGhA99aoySS39QPt g+NKKZLLkSKLjOwu6Vy+M1825eli3EBLQWLwx/OVjcmh1yw8jFmqiKumq2GmANQ8P0ER /0a7Y3SZYtMHjhGimhu7GxF+TzuCU/JY6ksiv98by1bEMTDVTT5wGZ+k0rCWsog3f9xg YhR9GioIv/cGZGonAZaX1NGuiD/2cKM1igs1OpQi7eAKoWsoq0oEnNRPHdhtSuIZZmO6 aMRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:cc:references:to :subject; bh=iY/7sT2V+zK8WTyItQojBThoeLYa8cTNwhYUMfi7/MA=; b=gRRKCUNpxp39uCT6hSn+p894CLrab2cc+ua+gjaikGpqW4Sjytjx2T4Ii7kjkR2m1e gfeRWsdMHx9F8qMqUbjevGxeOQCRnwvx8WcMuT2Zr/BZenwhiJBJQdkMkuhBDjmktBUR gCDEwYuBHXUAla1iVnSJMSK4hWJc+/W7mSjBSf7R9qw8859ODv6TGc5Hc6ZQZ17tQwz5 VggLaCF1Ct1HnDkQYInmkQVwZLiKTn795HOHFCa16DP18mlJ1OnjnMbNc+CfMennzurB bS8Q5iCtXXBlHcyugiPVD9aP/0htlLYlmiEEVrasG3HbExlaDQf/Xn0GyJz6GRxdg0ze 7oSA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id de21si1041895edb.304.2020.05.20.01.30.57; Wed, 20 May 2020 01:31:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726905AbgETI1z (ORCPT + 99 others); Wed, 20 May 2020 04:27:55 -0400 Received: from szxga05-in.huawei.com ([45.249.212.191]:4824 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726832AbgETI1x (ORCPT ); Wed, 20 May 2020 04:27:53 -0400 Received: from DGGEMS409-HUB.china.huawei.com (unknown [172.30.72.60]) by Forcepoint Email with ESMTP id C55E4DC67C5329500D04; Wed, 20 May 2020 16:27:45 +0800 (CST) Received: from [10.65.58.147] (10.65.58.147) by DGGEMS409-HUB.china.huawei.com (10.3.19.209) with Microsoft SMTP Server id 14.3.487.0; Wed, 20 May 2020 16:27:42 +0800 Subject: Re: [PATCH v1 1/1] PCI/ERR: Handle fatal error recovery for non-hotplug capable devices To: , References: <18609.1588812972@famine> CC: , , , From: Yicong Yang Message-ID: Date: Wed, 20 May 2020 16:28:18 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.7.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="windows-1252" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.65.58.147] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020/5/7 11:32, sathyanarayanan.kuppuswamy@linux.intel.com wrote: > From: Kuppuswamy Sathyanarayanan > > If there are non-hotplug capable devices connected to a given > port, then during the fatal error recovery(triggered by DPC or > AER), after calling reset_link() function, we cannot rely on > hotplug handler to detach and re-enumerate the device drivers > in the affected bus. Instead, we will have to let the error > recovery handler call report_slot_reset() for all devices in > the bus to notify about the reset operation. Although this is > only required for non hot-plug capable devices, doing it for > hotplug capable devices should not affect the functionality. > > Along with above issue, this fix also applicable to following > issue. > > Commit 6d2c89441571 ("PCI/ERR: Update error status after > reset_link()") added support to store status of reset_link() > call. Although this fixed the error recovery issue observed if > the initial value of error status is PCI_ERS_RESULT_DISCONNECT > or PCI_ERS_RESULT_NO_AER_DRIVER, it also discarded the status > result from report_frozen_detected. This can cause a failure to > recover if _NEED_RESET is returned by report_frozen_detected and > report_slot_reset is not invoked. > > Such an event can be induced for testing purposes by reducing the > Max_Payload_Size of a PCIe bridge to less than that of a device > downstream from the bridge, and then initiating I/O through the > device, resulting in oversize transactions. In the presence of DPC, > this results in a containment event and attempted reset and recovery > via pcie_do_recovery. After 6d2c89441571 report_slot_reset is not > invoked, and the device does not recover. > > [original patch is from jay.vosburgh@canonical.com] > [original patch link https://lore.kernel.org/linux-pci/18609.1588812972@famine/] > Fixes: 6d2c89441571 ("PCI/ERR: Update error status after reset_link()") > Signed-off-by: Jay Vosburgh > Signed-off-by: Kuppuswamy Sathyanarayanan > --- > drivers/pci/pcie/err.c | 19 +++++++++++++++---- > 1 file changed, 15 insertions(+), 4 deletions(-) > > diff --git a/drivers/pci/pcie/err.c b/drivers/pci/pcie/err.c > index 14bb8f54723e..db80e1ecb2dc 100644 > --- a/drivers/pci/pcie/err.c > +++ b/drivers/pci/pcie/err.c > @@ -165,13 +165,24 @@ pci_ers_result_t pcie_do_recovery(struct pci_dev *dev, > pci_dbg(dev, "broadcast error_detected message\n"); > if (state == pci_channel_io_frozen) { > pci_walk_bus(bus, report_frozen_detected, &status); > - status = reset_link(dev); > - if (status != PCI_ERS_RESULT_RECOVERED) { > + status = PCI_ERS_RESULT_NEED_RESET; > + } else { > + pci_walk_bus(bus, report_normal_detected, &status); > + } > + > + if (status == PCI_ERS_RESULT_NEED_RESET) { > + if (reset_link) { > + if (reset_link(dev) != PCI_ERS_RESULT_RECOVERED) we'll call reset_link() only if link is frozen. so it may have problem here. Thanks, Yicong > + status = PCI_ERS_RESULT_DISCONNECT; > + } else { > + if (pci_bus_error_reset(dev)) > + status = PCI_ERS_RESULT_DISCONNECT; > + } > + > + if (status == PCI_ERS_RESULT_DISCONNECT) { > pci_warn(dev, "link reset failed\n"); > goto failed; > } > - } else { > - pci_walk_bus(bus, report_normal_detected, &status); > } > > if (status == PCI_ERS_RESULT_CAN_RECOVER) {