Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp2437493pxu; Fri, 9 Oct 2020 18:01:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwvAeQHKtoTX/gUjikF1AhlPt/4SNK8GMSYDKC2zu8+DdeoYq4QFJ4N8dbA8hfXBcfLEwlR X-Received: by 2002:aa7:c3c7:: with SMTP id l7mr2050764edr.213.1602291713099; Fri, 09 Oct 2020 18:01:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602291713; cv=none; d=google.com; s=arc-20160816; b=ORPnxGkArPrgcN30TDHAeW3xP6VvOcB32FNEVTt25YxUk4Yu+MMAx8q8Eog3RrGev5 nMTK/etf2UH2Avrc8NH3gO/QyEFbBA4rqJbXambU+K74xcMcnCGTM/8xmCZLpL3cVP2E T258aMYNlop8YRkrWQbW5PPMaSLQZ8Nbz5Ou9IIzUogJTsQAOyisW9xVOqV+0WTQGptS YZS4f5WdS0U+ZP5lMTJF0e+sn+fiUK6T4D4sn6RLGJOEtI9QiM+SY1UWJRn0LXU6oVLQ 37QtuJBH8HPlZzBjTJNAoCRt7vwj979xa9lh2wsatjZ2TRxE/nR+dIoETXdwa4iRMCHt GXFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=m43w3+q1JpRA4dPSDaompR+gDVKyRT3NhAxNkqkKMgA=; b=R9M02U0XVqhHbjTNWP0fQTq/5o7buuxHikHC8PfS0pDeigKdlxllx1i7y4mQwuvRg6 cIH7VhVLCVwfAQRShiepIQWgPR8Y4M4jfvO3roSwGevwpNKrNPOZUqE7gzKN/UfbAhZG LATRbyWNZJ6cZhcaw1CXq+MB6c49Wv5Snj6o/wyvZKQ2OiZPipc9OGgCnOfGKD5Dd4Lm lsHneag5UzZtCVpwQynw0OUNK9UnOA9KbGjt6KHPMyfshdogpKzEXTJ5VoRIqW10gjO/ b6PFnMCwYw0oWoub+CW/F8XqdG4PSEFmMbTRcEdUL2e6JeVNYJgS4bzNMIKtP+uTrO9B F7sA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel-com.20150623.gappssmtp.com header.s=20150623 header.b=EHPVDfMv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d18si7257119ejr.713.2020.10.09.18.01.27; Fri, 09 Oct 2020 18:01:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@intel-com.20150623.gappssmtp.com header.s=20150623 header.b=EHPVDfMv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390629AbgJISeq (ORCPT + 99 others); Fri, 9 Oct 2020 14:34:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35062 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390579AbgJISeF (ORCPT ); Fri, 9 Oct 2020 14:34:05 -0400 Received: from mail-pg1-x541.google.com (mail-pg1-x541.google.com [IPv6:2607:f8b0:4864:20::541]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 71E33C0613D5 for ; Fri, 9 Oct 2020 11:34:05 -0700 (PDT) Received: by mail-pg1-x541.google.com with SMTP id r10so7859188pgb.10 for ; Fri, 09 Oct 2020 11:34:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=m43w3+q1JpRA4dPSDaompR+gDVKyRT3NhAxNkqkKMgA=; b=EHPVDfMvJMwo+loffAXkIYsANj3NB9HP6PvFzoORugFnMqFiZ5oeCZixsTdAhDZobQ l0HjDFWJvKOBELmCN/SR99Lsr1FufcPrE2aZCKnlOrG3NempSU8YEytcxRHhSJfxFVST kBDQhq4fqtMxXTCepu4+luKbWFChTJ5kq7PQlGAC80qNcP0L9jIKn4Dt/B89xEsbMpmH C3/abp8tRIZ/iTGC2VNXdaj5orfFwADkHJiFXxluh397WSJNe727OouX8i2J8EZHvHmC zQ+LqgdvY17RVALqYp2vjo3zLSBCfABxFCMRzDkbubyzHtDHjwMiUe7JSjnNVclPVWwd t+yg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=m43w3+q1JpRA4dPSDaompR+gDVKyRT3NhAxNkqkKMgA=; b=IroDsKEEHM5L0GdgiD3pM+lasPO7w5+K+L1ni5SkbFs3Ru2bjaRaYgATWjaup6N9nY AZ5n1nS/ysYAHJIkGrIa8JBgWHAkX5qXb2EHRGYwFcSChwcmu1VlFBRJIOO1qOnMRXIM bWUliIKMR2V/M/V1mbWKaVnhK7OEVCd+mf/LPEIzfQHZNU6B2CbJ69FO5Q/TyUFsyqRL 6cn8xyAlqWztS5lC1m0y0fahb0EIMIyMskj2CWqcu44oaf4oti19EDGVXkWRjy6JE3lB KLpY2ue+f92i80v9ZSP+dx44wS+bmidJ5Io9J2mu16q+aHyCkhWCDYR2+fhQ0k//n4Ye q6BQ== X-Gm-Message-State: AOAM531CrPj8wKJ54wXk9DwG+n1XipF+PPLonX/iYvWpZY3hpELJRFBR nm424I4vsC6GaXYh1stShmmntQ+5d43uEg== X-Received: by 2002:a62:8845:0:b029:153:74e1:94e8 with SMTP id l66-20020a6288450000b029015374e194e8mr13591589pfd.39.1602268444902; Fri, 09 Oct 2020 11:34:04 -0700 (PDT) Received: from [10.213.166.37] (fmdmzpr03-ext.fm.intel.com. [192.55.54.38]) by smtp.gmail.com with ESMTPSA id d128sm11866991pfd.94.2020.10.09.11.34.02 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Fri, 09 Oct 2020 11:34:04 -0700 (PDT) From: "Sean V Kelley" To: "Bjorn Helgaas" Cc: "Sean V Kelley" , bhelgaas@google.com, Jonathan.Cameron@huawei.com, rafael.j.wysocki@intel.com, ashok.raj@intel.com, tony.luck@intel.com, sathyanarayanan.kuppuswamy@intel.com, qiuxu.zhuo@intel.com, linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v8 11/14] PCI/RCEC: Add RCiEP's linked RCEC to AER/ERR Date: Fri, 09 Oct 2020 11:34:01 -0700 X-Mailer: MailMate (1.13.2r5673) Message-ID: In-Reply-To: <41B2B0A9-80B0-41DA-9FF3-A5D9465E6E08@intel.com> References: <20201009175745.GA3489710@bjorn-Precision-5520> <41B2B0A9-80B0-41DA-9FF3-A5D9465E6E08@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 9 Oct 2020, at 11:26, Sean V Kelley wrote: > Hi Bjorn, > > On 9 Oct 2020, at 10:57, Bjorn Helgaas wrote: > >> On Fri, Oct 02, 2020 at 11:47:32AM -0700, Sean V Kelley wrote: >>> From: Qiuxu Zhuo >>> >>> When attempting error recovery for an RCiEP associated with an RCEC >>> device, >>> there needs to be a way to update the Root Error Status, the >>> Uncorrectable >>> Error Status and the Uncorrectable Error Severity of the parent >>> RCEC. >>> In some non-native cases in which there is no OS visible device >>> associated with the RCiEP, there is nothing to act upon as the >>> firmware >>> is acting before the OS. So add handling for the linked 'rcec' in >>> AER/ERR >>> while taking into account non-native cases. >>> >>> Co-developed-by: Sean V Kelley >>> Signed-off-by: Sean V Kelley >>> Signed-off-by: Qiuxu Zhuo >>> Reviewed-by: Jonathan Cameron >>> --- >>> drivers/pci/pcie/aer.c | 9 +++++---- >>> drivers/pci/pcie/err.c | 39 ++++++++++++++++++++++++++++----------- >>> 2 files changed, 33 insertions(+), 15 deletions(-) >>> >>> diff --git a/drivers/pci/pcie/aer.c b/drivers/pci/pcie/aer.c >>> index 65dff5f3457a..dccdba60b5d9 100644 >>> --- a/drivers/pci/pcie/aer.c >>> +++ b/drivers/pci/pcie/aer.c >>> @@ -1358,17 +1358,18 @@ static int aer_probe(struct pcie_device >>> *dev) >>> static pci_ers_result_t aer_root_reset(struct pci_dev *dev) >>> { >>> int aer = dev->aer_cap; >>> + int rc = 0; >>> u32 reg32; >>> - int rc; >>> - >>> >>> /* Disable Root's interrupt in response to error messages */ >>> pci_read_config_dword(dev, aer + PCI_ERR_ROOT_COMMAND, ®32); >>> reg32 &= ~ROOT_PORT_INTR_ON_MESG_MASK; >>> pci_write_config_dword(dev, aer + PCI_ERR_ROOT_COMMAND, reg32); >>> >>> - rc = pci_bus_error_reset(dev); >>> - pci_info(dev, "Root Port link has been reset\n"); >>> + if (pci_pcie_type(dev) != PCI_EXP_TYPE_RC_EC) { >>> + rc = pci_bus_error_reset(dev); >>> + pci_info(dev, "Root Port link has been reset\n"); >>> + } >>> >>> /* Clear Root Error Status */ >>> pci_read_config_dword(dev, aer + PCI_ERR_ROOT_STATUS, ®32); >>> diff --git a/drivers/pci/pcie/err.c b/drivers/pci/pcie/err.c >>> index 38abd7984996..956ad4c86d53 100644 >>> --- a/drivers/pci/pcie/err.c >>> +++ b/drivers/pci/pcie/err.c >>> @@ -149,7 +149,8 @@ static int report_resume(struct pci_dev *dev, >>> void *data) >>> /** >>> * pci_walk_bridge - walk bridges potentially AER affected >>> * @bridge bridge which may be an RCEC with associated RCiEPs, >>> - * an RCiEP associated with an RCEC, or a Port. >>> + * or a Port. >>> + * @dev an RCiEP lacking an associated RCEC. >>> * @cb callback to be called for each device found >>> * @userdata arbitrary pointer to be passed to callback. >>> * >>> @@ -160,13 +161,20 @@ static int report_resume(struct pci_dev *dev, >>> void *data) >>> * If the device provided has no subordinate bus, call the provided >>> * callback on the device itself. >>> */ >>> -static void pci_walk_bridge(struct pci_dev *bridge, int >>> (*cb)(struct pci_dev *, void *), >>> +static void pci_walk_bridge(struct pci_dev *bridge, struct pci_dev >>> *dev, >>> + int (*cb)(struct pci_dev *, void *), >>> void *userdata) >>> { >>> - if (bridge->subordinate) >>> + /* >>> + * In a non-native case where there is no OS-visible reporting >>> + * device the bridge will be NULL, i.e., no RCEC, no PORT. >>> + */ >>> + if (bridge && bridge->subordinate) >>> pci_walk_bus(bridge->subordinate, cb, userdata); >>> - else >>> + else if (bridge) >>> cb(bridge, userdata); >>> + else >>> + cb(dev, userdata); >>> } >>> >>> static pci_ers_result_t flr_on_rciep(struct pci_dev *dev) >>> @@ -196,16 +204,25 @@ pci_ers_result_t pcie_do_recovery(struct >>> pci_dev *dev, >>> type = pci_pcie_type(dev); >>> if (type == PCI_EXP_TYPE_ROOT_PORT || >>> type == PCI_EXP_TYPE_DOWNSTREAM || >>> - type == PCI_EXP_TYPE_RC_EC || >>> - type == PCI_EXP_TYPE_RC_END) >>> + type == PCI_EXP_TYPE_RC_EC) >>> bridge = dev; >>> + else if (type == PCI_EXP_TYPE_RC_END) >>> + bridge = dev->rcec; >>> else >>> bridge = pci_upstream_bridge(dev); >>> >>> pci_dbg(dev, "broadcast error_detected message\n"); >>> if (state == pci_channel_io_frozen) { >>> - pci_walk_bridge(bridge, report_frozen_detected, &status); >>> + pci_walk_bridge(bridge, dev, report_frozen_detected, &status); >>> if (type == PCI_EXP_TYPE_RC_END) { >>> + /* >>> + * The callback only clears the Root Error Status >>> + * of the RCEC (see aer.c). Only perform this for the >>> + * native case, i.e., an RCEC is present. >>> + */ >>> + if (bridge) >>> + reset_subordinate_devices(bridge); >> >> Help me understand this. There are lots of callbacks in this >> picture, >> but I guess this "callback only clears Root Error Status" must refer >> to aer_root_reset(), i.e., the reset_subordinate_devices pointer? > > The ‘bridge’ in this case will always be dev->rcec, the event > collector for the associated RC_END. And that’s what’s being > cleared in aer.c via aer_root_reset() as the callback. It’s also > being checked for native/non-native here. > >> >> Of course, the caller of pcie_do_recovery() supplied that pointer. >> And we can infer that it must be aer_root_reset(), not >> dpc_reset_link(), because RCECs and RCiEPs are not allowed to >> implement DPC. > > Correct. > >> >> I wish we didn't have either this assumption about what >> reset_subordinate_devices points to, or the assumption about what >> aer_root_reset() does. They both seem a little bit tenuous. > > Agree. It’s the relationship between the RC_END and the RC_EC. > >> >> We already made aer_root_reset() smart enough to check for RCECs. >> Can >> we put the FLR there, too? Then we wouldn't have this weird >> situation >> where reset_subordinate_devices() does a reset and clears error >> status, EXCEPT for this case where it only clears error status and we >> do the reset here? > > We could add the smarts to aer_root_reset() to check for an RC_END in > that callback and perform the clear there on its RC_EC. We just > wouldn’t map ‘bridge’ to dev->rcec for RC_END in > pcie_do_recovery() which would simplify things. > > Further, the FLR in the case of flr_on_rciep() below is specific to > the RCiEP itself. So it could be performed either in aer_root_reset() > or remain in the pcie_do_recovery(). > > That should work. > > Sean Thinking more on this, you could still pass dev->rcec to the callback (eventually aer_root_reset()), but you won’t have the ability to handle the FLR there without the pointer to the RC_END. That’s why I suggested passing the RC_END and checking for its RC_EC in aer_root_reset() if you want to also handle FLR there too from below. Sean > > >> >>> status = flr_on_rciep(dev); >>> if (status != PCI_ERS_RESULT_RECOVERED) { >>> pci_warn(dev, "function level reset failed\n"); >>> @@ -219,13 +236,13 @@ pci_ers_result_t pcie_do_recovery(struct >>> pci_dev *dev, >>> } >>> } >>> } else { >>> - pci_walk_bridge(bridge, report_normal_detected, &status); >>> + pci_walk_bridge(bridge, dev, report_normal_detected, &status); >>> } >>> >>> if (status == PCI_ERS_RESULT_CAN_RECOVER) { >>> status = PCI_ERS_RESULT_RECOVERED; >>> pci_dbg(dev, "broadcast mmio_enabled message\n"); >>> - pci_walk_bridge(bridge, report_mmio_enabled, &status); >>> + pci_walk_bridge(bridge, dev, report_mmio_enabled, &status); >>> } >>> >>> if (status == PCI_ERS_RESULT_NEED_RESET) { >>> @@ -236,14 +253,14 @@ pci_ers_result_t pcie_do_recovery(struct >>> pci_dev *dev, >>> */ >>> status = PCI_ERS_RESULT_RECOVERED; >>> pci_dbg(dev, "broadcast slot_reset message\n"); >>> - pci_walk_bridge(bridge, report_slot_reset, &status); >>> + pci_walk_bridge(bridge, dev, report_slot_reset, &status); >>> } >>> >>> if (status != PCI_ERS_RESULT_RECOVERED) >>> goto failed; >>> >>> pci_dbg(dev, "broadcast resume message\n"); >>> - pci_walk_bridge(bridge, report_resume, &status); >>> + pci_walk_bridge(bridge, dev, report_resume, &status); >>> >>> if (type == PCI_EXP_TYPE_ROOT_PORT || >>> type == PCI_EXP_TYPE_DOWNSTREAM || >>> -- >>> 2.28.0 >>>