Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp130164pxu; Wed, 14 Oct 2020 22:55:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxad1TUj4WHf2DrlMObZ5NoNunblZIVF4NFWjWOgybos7Lu5POt29Ndml9lMtm+uJIsLqoB X-Received: by 2002:a17:906:34c3:: with SMTP id h3mr2785831ejb.132.1602741343406; Wed, 14 Oct 2020 22:55:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602741343; cv=none; d=google.com; s=arc-20160816; b=RSc5/6li007RxnMtaj3A2cIDIXFLeKnO1XhoSYBIRQTQhr3mOM3yA2T6TxArMVqKap mbB33u9gEWC5lPazLkQlNMjfg3IEoe3PYpNnZXsGoDcI8dIhYSIYHrB5WBVAJWKVaz2Y yPCDR7R6JW+iz3uDTLbTfbZvwmVK4DQJ2Io/OALbnmCyKqfyH4lHEKPvSa5scUhtXAE5 u5kQJ8JhIjaFkrD5srJk2iqjHTrRnr6ikDCOPVXpLPtzx996iTQgr14IuLGiVBfz7QuY 8e+eKyNKqNAmIZjjYCfBZKAKWMECp4QcLk1h/dznfssbU9hrPWV8E0fHPPK8qCgtlsqw ghrg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:ironport-sdr:ironport-sdr; bh=5azCBcS+sbBGoDO6v33TIG/cZtQA/M1ZcgHbzSPsco0=; b=JerB4/NdIpo6lsD37LO83nUuzPHUPkRWniY7z7qb4rJDKrHqQlzHxqg8tDI3RU9fXM lAQ3InfibNs3Anww4TQJ0GlfqFeQm/uJx6Dt2UDRDH/Mf/h2hfGL48aPjLaX/WO4zuWA AtXtVo+pNvQktic6aY3mren4VEGo+4h3bHi+c0wN1kVarUui6Ck397qslaV7+ZQZpJ4f El8wYGirZB8vTL59YQTnMO7o4W/HG9Ko6VhaI7U+cEXIT/zp9JaSQR54ZGK+uNxWCynJ +bveU10WmJk4NCb5SHFvq6IyD4SksZmzxjpQzvahzN67plZcbX73ELbLFYm5nxs+r4bT PIKg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a2si1336894edr.352.2020.10.14.22.55.18; Wed, 14 Oct 2020 22:55:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728969AbgJOFxl (ORCPT + 99 others); Thu, 15 Oct 2020 01:53:41 -0400 Received: from mga02.intel.com ([134.134.136.20]:48678 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727397AbgJOFxk (ORCPT ); Thu, 15 Oct 2020 01:53:40 -0400 IronPort-SDR: vsAoAaa0q6ddtAmn6q3Mlw8OKyXDhIwzQw8cPLkJp+/JFG+F+1nfcz8vkwnxFpTK2Tyt+sGBXb kNQgZ6/OmKaw== X-IronPort-AV: E=McAfee;i="6000,8403,9774"; a="153202558" X-IronPort-AV: E=Sophos;i="5.77,377,1596524400"; d="scan'208";a="153202558" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga003.jf.intel.com ([10.7.209.27]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Oct 2020 22:53:40 -0700 IronPort-SDR: vBSyoiqwNjbXagE89Pehtg6BPIQNdTHgQCt47JJdrbkExEZgDd56D18VJ/EWd737vsJi6Y5EZI M9/F2KC1qp4A== X-IronPort-AV: E=Sophos;i="5.77,377,1596524400"; d="scan'208";a="314395200" Received: from shaunabu-mobl1.amr.corp.intel.com (HELO [10.254.101.5]) ([10.254.101.5]) by orsmga003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Oct 2020 22:53:38 -0700 Subject: Re: [PATCH v6 2/2] PCI/ERR: Split the fatal and non-fatal error recovery handling To: Ethan Zhao Cc: Kuppuswamy Sathyanarayanan , Bjorn Helgaas , Sinan Kaya , linux-pci , Linux Kernel Mailing List , Ashok Raj References: <546d346644654915877365b19ea534378db0894d.1602663397.git.sathyanarayanan.kuppuswamy@linux.intel.com> <17e142b8-b19a-0ec7-833b-7a4ac2e76d0d@linux.intel.com> From: "Kuppuswamy, Sathyanarayanan" Message-ID: Date: Wed, 14 Oct 2020 22:53:36 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/14/20 10:05 PM, Ethan Zhao wrote: > On Thu, Oct 15, 2020 at 11:04 AM Kuppuswamy, Sathyanarayanan > wrote: >> >> >> >> On 10/14/20 6:58 PM, Ethan Zhao wrote: >>> On Thu, Oct 15, 2020 at 1:06 AM Kuppuswamy, Sathyanarayanan >>> wrote: >>>> >>>> >>>> >>>> On 10/14/20 8:07 AM, Ethan Zhao wrote: >>>>> On Wed, Oct 14, 2020 at 5:00 PM Kuppuswamy Sathyanarayanan >>>>> wrote: >>>>>> >>>>>> Commit bdb5ac85777d ("PCI/ERR: Handle fatal error recovery") >>>>>> merged fatal and non-fatal error recovery paths, and also made >>>>>> recovery code depend on hotplug handler for "remove affected >>>>>> device + rescan" support. But this change also complicated the >>>>>> error recovery path and which in turn led to the following >>>>>> issues. >>>>>> >>>>>> 1. We depend on hotplug handler for removing the affected >>>>>> devices/drivers on DLLSC LINK down event (on DPC event >>>>>> trigger) and DPC handler for handling the error recovery. Since >>>>>> both handlers operate on same set of affected devices, it leads >>>>>> to race condition, which in turn leads to NULL pointer >>>>>> exceptions or error recovery failures.You can find more details >>>>>> about this issue in following link. >>>>>> >>>>>> https://lore.kernel.org/linux-pci/20201007113158.48933-1-haifeng.zhao@intel.com/T/#t >>>>>> >>>>>> 2. For non-hotplug capable devices fatal (DPC) error recovery >>>>>> is currently broken. Current fatal error recovery implementation >>>>>> relies on PCIe hotplug (pciehp) handler for detaching and >>>>>> re-enumerating the affected devices/drivers. So when dealing with >>>>>> non-hotplug capable devices, recovery code does not restore the state >>>>>> of the affected devices correctly. You can find more details about >>>>>> this issue in the following links. >>>>>> >>>>>> https://lore.kernel.org/linux-pci/20200527083130.4137-1-Zhiqiang.Hou@nxp.com/ >>>>>> https://lore.kernel.org/linux-pci/12115.1588207324@famine/ >>>>>> https://lore.kernel.org/linux-pci/0e6f89cd6b9e4a72293cc90fafe93487d7c2d295.1585000084.git.sathyanarayanan.kuppuswamy@linux.intel.com/ >>>>>> >>>>>> In order to fix the above two issues, we should stop relying on hotplug >>>>> Yes, it doesn't rely on hotplug handler to remove and rescan the device, >>>>> but it couldn't prevent hotplug drivers from doing another replicated >>>>> removal/rescanning. >>>>> it doesn't make sense to leave another useless removal/rescanning there. >>>>> Maybe that's why these two paths were merged to one and made it rely on >>>>> hotplug. >>>> No, as per PCIe spec, hotplug and DPC has no functional dependency. Hence >>>> depending on it to handle some of its recovery function is in-correct and >>>> would lead to issues in non-hotplug capable platforms (which is true >>>> currently). >>>>> >> > >>> Though pciehp is not so hot/scalable and performance critical, but there >>> is per cpu thread to handle hot-plug operation. synchronize all threads >>> make them walk backwards for scalability. >> DPC events does not happen in high frequency. So I don't think we should > It's holding global lock, once malfunction happens to one device and > it's driver, > the whole system, everyone holds it, would be blocked to work. >> worry about the performance here. Even hotplug handler will hold this lock >> when adding/removing the devices. So adding/removing devices is a serialized > You don't worry about performance, but if there is a requirement needs > more scalable > and reliable hotplug, the effect will be much harder. what to do then ? choose > another OS ? As I have mentioned, all device creation/removal in PCI core code is already protected by this lock (including hotplug code). So the multidomain performance impact you mentioned should exist even now. All I am doing is, using the same lock for protecting device removal/rescan in error recovery code. drivers/pci/xen-pcifront.c:477: pci_lock_rescan_remove(); drivers/pci/xen-pcifront.c:567: pci_lock_rescan_remove(); drivers/pci/xen-pcifront.c:1064: pci_lock_rescan_remove(); drivers/pci/hotplug/rpaphp_core.c:498: pci_lock_rescan_remove(); drivers/pci/hotplug/rpaphp_core.c:520: pci_lock_rescan_remove(); drivers/pci/hotplug/s390_pci_hpc.c:70: pci_lock_rescan_remove(); drivers/pci/hotplug/shpchp_pci.c:31: pci_lock_rescan_remove(); drivers/pci/hotplug/shpchp_pci.c:73: pci_lock_rescan_remove(); drivers/pci/hotplug/pciehp_pci.c:39: pci_lock_rescan_remove(); drivers/pci/hotplug/pciehp_pci.c:96: pci_lock_rescan_remove(); drivers/pci/hotplug/acpiphp_glue.c:762: pci_lock_rescan_remove(); drivers/pci/hotplug/acpiphp_glue.c:787: pci_lock_rescan_remove(); drivers/pci/hotplug/acpiphp_glue.c:975: pci_lock_rescan_remove(); drivers/pci/hotplug/acpiphp_glue.c:1026: pci_lock_rescan_remove(); drivers/pci/hotplug/cpqphp_pci.c:75: pci_lock_rescan_remove(); drivers/pci/hotplug/cpqphp_pci.c:120: pci_lock_rescan_remove(); drivers/pci/hotplug/rpadlpar_core.c:361: pci_lock_rescan_remove(); drivers/pci/hotplug/pnv_php.c:513: pci_lock_rescan_remove(); drivers/pci/hotplug/pnv_php.c:582: pci_lock_rescan_remove(); drivers/pci/hotplug/ibmphp_core.c:668: pci_lock_rescan_remove(); drivers/pci/hotplug/ibmphp_core.c:738: pci_lock_rescan_remove(); drivers/pci/hotplug/cpci_hotplug_pci.c:245: pci_lock_rescan_remove(); drivers/pci/hotplug/cpci_hotplug_pci.c:298: pci_lock_rescan_remove(); drivers/pci/controller/pci-hyperv.c:1866: pci_lock_rescan_remove(); drivers/pci/controller/pci-hyperv.c:2135: pci_lock_rescan_remove(); drivers/pci/controller/pci-hyperv.c:2313: pci_lock_rescan_remove(); drivers/pci/controller/pci-hyperv.c:3300: pci_lock_rescan_remove(); drivers/pci/controller/pci-host-common.c:91: pci_lock_rescan_remove(); drivers/pci/remove.c:123: pci_lock_rescan_remove(); drivers/pci/pci-sysfs.c:410: pci_lock_rescan_remove(); drivers/pci/pci-sysfs.c:444: pci_lock_rescan_remove(); drivers/pci/pci-sysfs.c:479: pci_lock_rescan_remove(); drivers/pci/probe.c:3231:void pci_lock_rescan_remove(void) drivers/pci/probe.c:3235:EXPORT_SYMBOL_GPL(pci_lock_rescan_remove); > To be honest, I don't like the global lock/ pci_lock_rescan_remove(). > > BTW, I didn't try the FATAL errors brute force injection on your > patch, duplicated > removal will work naturally because it was removed ? > > Thanks, > Ethan >> operation. >>> >> >>>> >>>>>> -- >>>>>> 2.17.1 >>>>>> >>>> >>>> -- >>>> Sathyanarayanan Kuppuswamy >>>> Linux Kernel Developer >> >> -- >> Sathyanarayanan Kuppuswamy >> Linux Kernel Developer -- Sathyanarayanan Kuppuswamy Linux Kernel Developer