xref: /openbmc/linux/arch/powerpc/kernel/eeh_driver.c (revision b0e55fef624e511e060fa05e4ca96cae6d902f04)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  * PCI Error Recovery Driver for RPA-compliant PPC64 platform.
4  * Copyright IBM Corp. 2004 2005
5  * Copyright Linas Vepstas <linas@linas.org> 2004, 2005
6  *
7  * Send comments and feedback to Linas Vepstas <linas@austin.ibm.com>
8  */
9 #include <linux/delay.h>
10 #include <linux/interrupt.h>
11 #include <linux/irq.h>
12 #include <linux/module.h>
13 #include <linux/pci.h>
14 #include <linux/pci_hotplug.h>
15 #include <asm/eeh.h>
16 #include <asm/eeh_event.h>
17 #include <asm/ppc-pci.h>
18 #include <asm/pci-bridge.h>
19 #include <asm/prom.h>
20 #include <asm/rtas.h>
21 
22 struct eeh_rmv_data {
23 	struct list_head removed_vf_list;
24 	int removed_dev_count;
25 };
26 
27 static int eeh_result_priority(enum pci_ers_result result)
28 {
29 	switch (result) {
30 	case PCI_ERS_RESULT_NONE:
31 		return 1;
32 	case PCI_ERS_RESULT_NO_AER_DRIVER:
33 		return 2;
34 	case PCI_ERS_RESULT_RECOVERED:
35 		return 3;
36 	case PCI_ERS_RESULT_CAN_RECOVER:
37 		return 4;
38 	case PCI_ERS_RESULT_DISCONNECT:
39 		return 5;
40 	case PCI_ERS_RESULT_NEED_RESET:
41 		return 6;
42 	default:
43 		WARN_ONCE(1, "Unknown pci_ers_result value: %d\n", (int)result);
44 		return 0;
45 	}
46 };
47 
48 static const char *pci_ers_result_name(enum pci_ers_result result)
49 {
50 	switch (result) {
51 	case PCI_ERS_RESULT_NONE:
52 		return "none";
53 	case PCI_ERS_RESULT_CAN_RECOVER:
54 		return "can recover";
55 	case PCI_ERS_RESULT_NEED_RESET:
56 		return "need reset";
57 	case PCI_ERS_RESULT_DISCONNECT:
58 		return "disconnect";
59 	case PCI_ERS_RESULT_RECOVERED:
60 		return "recovered";
61 	case PCI_ERS_RESULT_NO_AER_DRIVER:
62 		return "no AER driver";
63 	default:
64 		WARN_ONCE(1, "Unknown result type: %d\n", (int)result);
65 		return "unknown";
66 	}
67 };
68 
69 static enum pci_ers_result pci_ers_merge_result(enum pci_ers_result old,
70 						enum pci_ers_result new)
71 {
72 	if (eeh_result_priority(new) > eeh_result_priority(old))
73 		return new;
74 	return old;
75 }
76 
77 static bool eeh_dev_removed(struct eeh_dev *edev)
78 {
79 	return !edev || (edev->mode & EEH_DEV_REMOVED);
80 }
81 
82 static bool eeh_edev_actionable(struct eeh_dev *edev)
83 {
84 	if (!edev->pdev)
85 		return false;
86 	if (edev->pdev->error_state == pci_channel_io_perm_failure)
87 		return false;
88 	if (eeh_dev_removed(edev))
89 		return false;
90 	if (eeh_pe_passed(edev->pe))
91 		return false;
92 
93 	return true;
94 }
95 
96 /**
97  * eeh_pcid_get - Get the PCI device driver
98  * @pdev: PCI device
99  *
100  * The function is used to retrieve the PCI device driver for
101  * the indicated PCI device. Besides, we will increase the reference
102  * of the PCI device driver to prevent that being unloaded on
103  * the fly. Otherwise, kernel crash would be seen.
104  */
105 static inline struct pci_driver *eeh_pcid_get(struct pci_dev *pdev)
106 {
107 	if (!pdev || !pdev->driver)
108 		return NULL;
109 
110 	if (!try_module_get(pdev->driver->driver.owner))
111 		return NULL;
112 
113 	return pdev->driver;
114 }
115 
116 /**
117  * eeh_pcid_put - Dereference on the PCI device driver
118  * @pdev: PCI device
119  *
120  * The function is called to do dereference on the PCI device
121  * driver of the indicated PCI device.
122  */
123 static inline void eeh_pcid_put(struct pci_dev *pdev)
124 {
125 	if (!pdev || !pdev->driver)
126 		return;
127 
128 	module_put(pdev->driver->driver.owner);
129 }
130 
131 /**
132  * eeh_disable_irq - Disable interrupt for the recovering device
133  * @dev: PCI device
134  *
135  * This routine must be called when reporting temporary or permanent
136  * error to the particular PCI device to disable interrupt of that
137  * device. If the device has enabled MSI or MSI-X interrupt, we needn't
138  * do real work because EEH should freeze DMA transfers for those PCI
139  * devices encountering EEH errors, which includes MSI or MSI-X.
140  */
141 static void eeh_disable_irq(struct eeh_dev *edev)
142 {
143 	/* Don't disable MSI and MSI-X interrupts. They are
144 	 * effectively disabled by the DMA Stopped state
145 	 * when an EEH error occurs.
146 	 */
147 	if (edev->pdev->msi_enabled || edev->pdev->msix_enabled)
148 		return;
149 
150 	if (!irq_has_action(edev->pdev->irq))
151 		return;
152 
153 	edev->mode |= EEH_DEV_IRQ_DISABLED;
154 	disable_irq_nosync(edev->pdev->irq);
155 }
156 
157 /**
158  * eeh_enable_irq - Enable interrupt for the recovering device
159  * @dev: PCI device
160  *
161  * This routine must be called to enable interrupt while failed
162  * device could be resumed.
163  */
164 static void eeh_enable_irq(struct eeh_dev *edev)
165 {
166 	if ((edev->mode) & EEH_DEV_IRQ_DISABLED) {
167 		edev->mode &= ~EEH_DEV_IRQ_DISABLED;
168 		/*
169 		 * FIXME !!!!!
170 		 *
171 		 * This is just ass backwards. This maze has
172 		 * unbalanced irq_enable/disable calls. So instead of
173 		 * finding the root cause it works around the warning
174 		 * in the irq_enable code by conditionally calling
175 		 * into it.
176 		 *
177 		 * That's just wrong.The warning in the core code is
178 		 * there to tell people to fix their asymmetries in
179 		 * their own code, not by abusing the core information
180 		 * to avoid it.
181 		 *
182 		 * I so wish that the assymetry would be the other way
183 		 * round and a few more irq_disable calls render that
184 		 * shit unusable forever.
185 		 *
186 		 *	tglx
187 		 */
188 		if (irqd_irq_disabled(irq_get_irq_data(edev->pdev->irq)))
189 			enable_irq(edev->pdev->irq);
190 	}
191 }
192 
193 static void eeh_dev_save_state(struct eeh_dev *edev, void *userdata)
194 {
195 	struct pci_dev *pdev;
196 
197 	if (!edev)
198 		return;
199 
200 	/*
201 	 * We cannot access the config space on some adapters.
202 	 * Otherwise, it will cause fenced PHB. We don't save
203 	 * the content in their config space and will restore
204 	 * from the initial config space saved when the EEH
205 	 * device is created.
206 	 */
207 	if (edev->pe && (edev->pe->state & EEH_PE_CFG_RESTRICTED))
208 		return;
209 
210 	pdev = eeh_dev_to_pci_dev(edev);
211 	if (!pdev)
212 		return;
213 
214 	pci_save_state(pdev);
215 }
216 
217 static void eeh_set_channel_state(struct eeh_pe *root, enum pci_channel_state s)
218 {
219 	struct eeh_pe *pe;
220 	struct eeh_dev *edev, *tmp;
221 
222 	eeh_for_each_pe(root, pe)
223 		eeh_pe_for_each_dev(pe, edev, tmp)
224 			if (eeh_edev_actionable(edev))
225 				edev->pdev->error_state = s;
226 }
227 
228 static void eeh_set_irq_state(struct eeh_pe *root, bool enable)
229 {
230 	struct eeh_pe *pe;
231 	struct eeh_dev *edev, *tmp;
232 
233 	eeh_for_each_pe(root, pe) {
234 		eeh_pe_for_each_dev(pe, edev, tmp) {
235 			if (!eeh_edev_actionable(edev))
236 				continue;
237 
238 			if (!eeh_pcid_get(edev->pdev))
239 				continue;
240 
241 			if (enable)
242 				eeh_enable_irq(edev);
243 			else
244 				eeh_disable_irq(edev);
245 
246 			eeh_pcid_put(edev->pdev);
247 		}
248 	}
249 }
250 
251 typedef enum pci_ers_result (*eeh_report_fn)(struct eeh_dev *,
252 					     struct pci_dev *,
253 					     struct pci_driver *);
254 static void eeh_pe_report_edev(struct eeh_dev *edev, eeh_report_fn fn,
255 			       enum pci_ers_result *result)
256 {
257 	struct pci_dev *pdev;
258 	struct pci_driver *driver;
259 	enum pci_ers_result new_result;
260 
261 	pci_lock_rescan_remove();
262 	pdev = edev->pdev;
263 	if (pdev)
264 		get_device(&pdev->dev);
265 	pci_unlock_rescan_remove();
266 	if (!pdev) {
267 		eeh_edev_info(edev, "no device");
268 		return;
269 	}
270 	device_lock(&pdev->dev);
271 	if (eeh_edev_actionable(edev)) {
272 		driver = eeh_pcid_get(pdev);
273 
274 		if (!driver)
275 			eeh_edev_info(edev, "no driver");
276 		else if (!driver->err_handler)
277 			eeh_edev_info(edev, "driver not EEH aware");
278 		else if (edev->mode & EEH_DEV_NO_HANDLER)
279 			eeh_edev_info(edev, "driver bound too late");
280 		else {
281 			new_result = fn(edev, pdev, driver);
282 			eeh_edev_info(edev, "%s driver reports: '%s'",
283 				      driver->name,
284 				      pci_ers_result_name(new_result));
285 			if (result)
286 				*result = pci_ers_merge_result(*result,
287 							       new_result);
288 		}
289 		if (driver)
290 			eeh_pcid_put(pdev);
291 	} else {
292 		eeh_edev_info(edev, "not actionable (%d,%d,%d)", !!pdev,
293 			      !eeh_dev_removed(edev), !eeh_pe_passed(edev->pe));
294 	}
295 	device_unlock(&pdev->dev);
296 	if (edev->pdev != pdev)
297 		eeh_edev_warn(edev, "Device changed during processing!\n");
298 	put_device(&pdev->dev);
299 }
300 
301 static void eeh_pe_report(const char *name, struct eeh_pe *root,
302 			  eeh_report_fn fn, enum pci_ers_result *result)
303 {
304 	struct eeh_pe *pe;
305 	struct eeh_dev *edev, *tmp;
306 
307 	pr_info("EEH: Beginning: '%s'\n", name);
308 	eeh_for_each_pe(root, pe) eeh_pe_for_each_dev(pe, edev, tmp)
309 		eeh_pe_report_edev(edev, fn, result);
310 	if (result)
311 		pr_info("EEH: Finished:'%s' with aggregate recovery state:'%s'\n",
312 			name, pci_ers_result_name(*result));
313 	else
314 		pr_info("EEH: Finished:'%s'", name);
315 }
316 
317 /**
318  * eeh_report_error - Report pci error to each device driver
319  * @edev: eeh device
320  * @driver: device's PCI driver
321  *
322  * Report an EEH error to each device driver.
323  */
324 static enum pci_ers_result eeh_report_error(struct eeh_dev *edev,
325 					    struct pci_dev *pdev,
326 					    struct pci_driver *driver)
327 {
328 	enum pci_ers_result rc;
329 
330 	if (!driver->err_handler->error_detected)
331 		return PCI_ERS_RESULT_NONE;
332 
333 	eeh_edev_info(edev, "Invoking %s->error_detected(IO frozen)",
334 		      driver->name);
335 	rc = driver->err_handler->error_detected(pdev, pci_channel_io_frozen);
336 
337 	edev->in_error = true;
338 	pci_uevent_ers(pdev, PCI_ERS_RESULT_NONE);
339 	return rc;
340 }
341 
342 /**
343  * eeh_report_mmio_enabled - Tell drivers that MMIO has been enabled
344  * @edev: eeh device
345  * @driver: device's PCI driver
346  *
347  * Tells each device driver that IO ports, MMIO and config space I/O
348  * are now enabled.
349  */
350 static enum pci_ers_result eeh_report_mmio_enabled(struct eeh_dev *edev,
351 						   struct pci_dev *pdev,
352 						   struct pci_driver *driver)
353 {
354 	if (!driver->err_handler->mmio_enabled)
355 		return PCI_ERS_RESULT_NONE;
356 	eeh_edev_info(edev, "Invoking %s->mmio_enabled()", driver->name);
357 	return driver->err_handler->mmio_enabled(pdev);
358 }
359 
360 /**
361  * eeh_report_reset - Tell device that slot has been reset
362  * @edev: eeh device
363  * @driver: device's PCI driver
364  *
365  * This routine must be called while EEH tries to reset particular
366  * PCI device so that the associated PCI device driver could take
367  * some actions, usually to save data the driver needs so that the
368  * driver can work again while the device is recovered.
369  */
370 static enum pci_ers_result eeh_report_reset(struct eeh_dev *edev,
371 					    struct pci_dev *pdev,
372 					    struct pci_driver *driver)
373 {
374 	if (!driver->err_handler->slot_reset || !edev->in_error)
375 		return PCI_ERS_RESULT_NONE;
376 	eeh_edev_info(edev, "Invoking %s->slot_reset()", driver->name);
377 	return driver->err_handler->slot_reset(pdev);
378 }
379 
380 static void eeh_dev_restore_state(struct eeh_dev *edev, void *userdata)
381 {
382 	struct pci_dev *pdev;
383 
384 	if (!edev)
385 		return;
386 
387 	/*
388 	 * The content in the config space isn't saved because
389 	 * the blocked config space on some adapters. We have
390 	 * to restore the initial saved config space when the
391 	 * EEH device is created.
392 	 */
393 	if (edev->pe && (edev->pe->state & EEH_PE_CFG_RESTRICTED)) {
394 		if (list_is_last(&edev->entry, &edev->pe->edevs))
395 			eeh_pe_restore_bars(edev->pe);
396 
397 		return;
398 	}
399 
400 	pdev = eeh_dev_to_pci_dev(edev);
401 	if (!pdev)
402 		return;
403 
404 	pci_restore_state(pdev);
405 }
406 
407 /**
408  * eeh_report_resume - Tell device to resume normal operations
409  * @edev: eeh device
410  * @driver: device's PCI driver
411  *
412  * This routine must be called to notify the device driver that it
413  * could resume so that the device driver can do some initialization
414  * to make the recovered device work again.
415  */
416 static enum pci_ers_result eeh_report_resume(struct eeh_dev *edev,
417 					     struct pci_dev *pdev,
418 					     struct pci_driver *driver)
419 {
420 	if (!driver->err_handler->resume || !edev->in_error)
421 		return PCI_ERS_RESULT_NONE;
422 
423 	eeh_edev_info(edev, "Invoking %s->resume()", driver->name);
424 	driver->err_handler->resume(pdev);
425 
426 	pci_uevent_ers(edev->pdev, PCI_ERS_RESULT_RECOVERED);
427 #ifdef CONFIG_PCI_IOV
428 	if (eeh_ops->notify_resume && eeh_dev_to_pdn(edev))
429 		eeh_ops->notify_resume(eeh_dev_to_pdn(edev));
430 #endif
431 	return PCI_ERS_RESULT_NONE;
432 }
433 
434 /**
435  * eeh_report_failure - Tell device driver that device is dead.
436  * @edev: eeh device
437  * @driver: device's PCI driver
438  *
439  * This informs the device driver that the device is permanently
440  * dead, and that no further recovery attempts will be made on it.
441  */
442 static enum pci_ers_result eeh_report_failure(struct eeh_dev *edev,
443 					      struct pci_dev *pdev,
444 					      struct pci_driver *driver)
445 {
446 	enum pci_ers_result rc;
447 
448 	if (!driver->err_handler->error_detected)
449 		return PCI_ERS_RESULT_NONE;
450 
451 	eeh_edev_info(edev, "Invoking %s->error_detected(permanent failure)",
452 		      driver->name);
453 	rc = driver->err_handler->error_detected(pdev,
454 						 pci_channel_io_perm_failure);
455 
456 	pci_uevent_ers(pdev, PCI_ERS_RESULT_DISCONNECT);
457 	return rc;
458 }
459 
460 static void *eeh_add_virt_device(struct eeh_dev *edev)
461 {
462 	struct pci_driver *driver;
463 	struct pci_dev *dev = eeh_dev_to_pci_dev(edev);
464 
465 	if (!(edev->physfn)) {
466 		eeh_edev_warn(edev, "Not for VF\n");
467 		return NULL;
468 	}
469 
470 	driver = eeh_pcid_get(dev);
471 	if (driver) {
472 		if (driver->err_handler) {
473 			eeh_pcid_put(dev);
474 			return NULL;
475 		}
476 		eeh_pcid_put(dev);
477 	}
478 
479 #ifdef CONFIG_PCI_IOV
480 	pci_iov_add_virtfn(edev->physfn, eeh_dev_to_pdn(edev)->vf_index);
481 #endif
482 	return NULL;
483 }
484 
485 static void eeh_rmv_device(struct eeh_dev *edev, void *userdata)
486 {
487 	struct pci_driver *driver;
488 	struct pci_dev *dev = eeh_dev_to_pci_dev(edev);
489 	struct eeh_rmv_data *rmv_data = (struct eeh_rmv_data *)userdata;
490 
491 	/*
492 	 * Actually, we should remove the PCI bridges as well.
493 	 * However, that's lots of complexity to do that,
494 	 * particularly some of devices under the bridge might
495 	 * support EEH. So we just care about PCI devices for
496 	 * simplicity here.
497 	 */
498 	if (!eeh_edev_actionable(edev) ||
499 	    (dev->hdr_type == PCI_HEADER_TYPE_BRIDGE))
500 		return;
501 
502 	if (rmv_data) {
503 		driver = eeh_pcid_get(dev);
504 		if (driver) {
505 			if (driver->err_handler &&
506 			    driver->err_handler->error_detected &&
507 			    driver->err_handler->slot_reset) {
508 				eeh_pcid_put(dev);
509 				return;
510 			}
511 			eeh_pcid_put(dev);
512 		}
513 	}
514 
515 	/* Remove it from PCI subsystem */
516 	pr_info("EEH: Removing %s without EEH sensitive driver\n",
517 		pci_name(dev));
518 	edev->mode |= EEH_DEV_DISCONNECTED;
519 	if (rmv_data)
520 		rmv_data->removed_dev_count++;
521 
522 	if (edev->physfn) {
523 #ifdef CONFIG_PCI_IOV
524 		struct pci_dn *pdn = eeh_dev_to_pdn(edev);
525 
526 		pci_iov_remove_virtfn(edev->physfn, pdn->vf_index);
527 		edev->pdev = NULL;
528 
529 		/*
530 		 * We have to set the VF PE number to invalid one, which is
531 		 * required to plug the VF successfully.
532 		 */
533 		pdn->pe_number = IODA_INVALID_PE;
534 #endif
535 		if (rmv_data)
536 			list_add(&edev->rmv_entry, &rmv_data->removed_vf_list);
537 	} else {
538 		pci_lock_rescan_remove();
539 		pci_stop_and_remove_bus_device(dev);
540 		pci_unlock_rescan_remove();
541 	}
542 }
543 
544 static void *eeh_pe_detach_dev(struct eeh_pe *pe, void *userdata)
545 {
546 	struct eeh_dev *edev, *tmp;
547 
548 	eeh_pe_for_each_dev(pe, edev, tmp) {
549 		if (!(edev->mode & EEH_DEV_DISCONNECTED))
550 			continue;
551 
552 		edev->mode &= ~(EEH_DEV_DISCONNECTED | EEH_DEV_IRQ_DISABLED);
553 		eeh_rmv_from_parent_pe(edev);
554 	}
555 
556 	return NULL;
557 }
558 
559 /*
560  * Explicitly clear PE's frozen state for PowerNV where
561  * we have frozen PE until BAR restore is completed. It's
562  * harmless to clear it for pSeries. To be consistent with
563  * PE reset (for 3 times), we try to clear the frozen state
564  * for 3 times as well.
565  */
566 static int eeh_clear_pe_frozen_state(struct eeh_pe *root, bool include_passed)
567 {
568 	struct eeh_pe *pe;
569 	int i;
570 
571 	eeh_for_each_pe(root, pe) {
572 		if (include_passed || !eeh_pe_passed(pe)) {
573 			for (i = 0; i < 3; i++)
574 				if (!eeh_unfreeze_pe(pe))
575 					break;
576 			if (i >= 3)
577 				return -EIO;
578 		}
579 	}
580 	eeh_pe_state_clear(root, EEH_PE_ISOLATED, include_passed);
581 	return 0;
582 }
583 
584 int eeh_pe_reset_and_recover(struct eeh_pe *pe)
585 {
586 	int ret;
587 
588 	/* Bail if the PE is being recovered */
589 	if (pe->state & EEH_PE_RECOVERING)
590 		return 0;
591 
592 	/* Put the PE into recovery mode */
593 	eeh_pe_state_mark(pe, EEH_PE_RECOVERING);
594 
595 	/* Save states */
596 	eeh_pe_dev_traverse(pe, eeh_dev_save_state, NULL);
597 
598 	/* Issue reset */
599 	ret = eeh_pe_reset_full(pe, true);
600 	if (ret) {
601 		eeh_pe_state_clear(pe, EEH_PE_RECOVERING, true);
602 		return ret;
603 	}
604 
605 	/* Unfreeze the PE */
606 	ret = eeh_clear_pe_frozen_state(pe, true);
607 	if (ret) {
608 		eeh_pe_state_clear(pe, EEH_PE_RECOVERING, true);
609 		return ret;
610 	}
611 
612 	/* Restore device state */
613 	eeh_pe_dev_traverse(pe, eeh_dev_restore_state, NULL);
614 
615 	/* Clear recovery mode */
616 	eeh_pe_state_clear(pe, EEH_PE_RECOVERING, true);
617 
618 	return 0;
619 }
620 
621 /**
622  * eeh_reset_device - Perform actual reset of a pci slot
623  * @driver_eeh_aware: Does the device's driver provide EEH support?
624  * @pe: EEH PE
625  * @bus: PCI bus corresponding to the isolcated slot
626  * @rmv_data: Optional, list to record removed devices
627  *
628  * This routine must be called to do reset on the indicated PE.
629  * During the reset, udev might be invoked because those affected
630  * PCI devices will be removed and then added.
631  */
632 static int eeh_reset_device(struct eeh_pe *pe, struct pci_bus *bus,
633 			    struct eeh_rmv_data *rmv_data,
634 			    bool driver_eeh_aware)
635 {
636 	time64_t tstamp;
637 	int cnt, rc;
638 	struct eeh_dev *edev;
639 	struct eeh_pe *tmp_pe;
640 	bool any_passed = false;
641 
642 	eeh_for_each_pe(pe, tmp_pe)
643 		any_passed |= eeh_pe_passed(tmp_pe);
644 
645 	/* pcibios will clear the counter; save the value */
646 	cnt = pe->freeze_count;
647 	tstamp = pe->tstamp;
648 
649 	/*
650 	 * We don't remove the corresponding PE instances because
651 	 * we need the information afterwords. The attached EEH
652 	 * devices are expected to be attached soon when calling
653 	 * into pci_hp_add_devices().
654 	 */
655 	eeh_pe_state_mark(pe, EEH_PE_KEEP);
656 	if (any_passed || driver_eeh_aware || (pe->type & EEH_PE_VF)) {
657 		eeh_pe_dev_traverse(pe, eeh_rmv_device, rmv_data);
658 	} else {
659 		pci_lock_rescan_remove();
660 		pci_hp_remove_devices(bus);
661 		pci_unlock_rescan_remove();
662 	}
663 
664 	/*
665 	 * Reset the pci controller. (Asserts RST#; resets config space).
666 	 * Reconfigure bridges and devices. Don't try to bring the system
667 	 * up if the reset failed for some reason.
668 	 *
669 	 * During the reset, it's very dangerous to have uncontrolled PCI
670 	 * config accesses. So we prefer to block them. However, controlled
671 	 * PCI config accesses initiated from EEH itself are allowed.
672 	 */
673 	rc = eeh_pe_reset_full(pe, false);
674 	if (rc)
675 		return rc;
676 
677 	pci_lock_rescan_remove();
678 
679 	/* Restore PE */
680 	eeh_ops->configure_bridge(pe);
681 	eeh_pe_restore_bars(pe);
682 
683 	/* Clear frozen state */
684 	rc = eeh_clear_pe_frozen_state(pe, false);
685 	if (rc) {
686 		pci_unlock_rescan_remove();
687 		return rc;
688 	}
689 
690 	/* Give the system 5 seconds to finish running the user-space
691 	 * hotplug shutdown scripts, e.g. ifdown for ethernet.  Yes,
692 	 * this is a hack, but if we don't do this, and try to bring
693 	 * the device up before the scripts have taken it down,
694 	 * potentially weird things happen.
695 	 */
696 	if (!driver_eeh_aware || rmv_data->removed_dev_count) {
697 		pr_info("EEH: Sleep 5s ahead of %s hotplug\n",
698 			(driver_eeh_aware ? "partial" : "complete"));
699 		ssleep(5);
700 
701 		/*
702 		 * The EEH device is still connected with its parent
703 		 * PE. We should disconnect it so the binding can be
704 		 * rebuilt when adding PCI devices.
705 		 */
706 		edev = list_first_entry(&pe->edevs, struct eeh_dev, entry);
707 		eeh_pe_traverse(pe, eeh_pe_detach_dev, NULL);
708 		if (pe->type & EEH_PE_VF) {
709 			eeh_add_virt_device(edev);
710 		} else {
711 			if (!driver_eeh_aware)
712 				eeh_pe_state_clear(pe, EEH_PE_PRI_BUS, true);
713 			pci_hp_add_devices(bus);
714 		}
715 	}
716 	eeh_pe_state_clear(pe, EEH_PE_KEEP, true);
717 
718 	pe->tstamp = tstamp;
719 	pe->freeze_count = cnt;
720 
721 	pci_unlock_rescan_remove();
722 	return 0;
723 }
724 
725 /* The longest amount of time to wait for a pci device
726  * to come back on line, in seconds.
727  */
728 #define MAX_WAIT_FOR_RECOVERY 300
729 
730 
731 /* Walks the PE tree after processing an event to remove any stale PEs.
732  *
733  * NB: This needs to be recursive to ensure the leaf PEs get removed
734  * before their parents do. Although this is possible to do recursively
735  * we don't since this is easier to read and we need to garantee
736  * the leaf nodes will be handled first.
737  */
738 static void eeh_pe_cleanup(struct eeh_pe *pe)
739 {
740 	struct eeh_pe *child_pe, *tmp;
741 
742 	list_for_each_entry_safe(child_pe, tmp, &pe->child_list, child)
743 		eeh_pe_cleanup(child_pe);
744 
745 	if (pe->state & EEH_PE_KEEP)
746 		return;
747 
748 	if (!(pe->state & EEH_PE_INVALID))
749 		return;
750 
751 	if (list_empty(&pe->edevs) && list_empty(&pe->child_list)) {
752 		list_del(&pe->child);
753 		kfree(pe);
754 	}
755 }
756 
757 /**
758  * eeh_check_slot_presence - Check if a device is still present in a slot
759  * @pdev: pci_dev to check
760  *
761  * This function may return a false positive if we can't determine the slot's
762  * presence state. This might happen for for PCIe slots if the PE containing
763  * the upstream bridge is also frozen, or the bridge is part of the same PE
764  * as the device.
765  *
766  * This shouldn't happen often, but you might see it if you hotplug a PCIe
767  * switch.
768  */
769 static bool eeh_slot_presence_check(struct pci_dev *pdev)
770 {
771 	const struct hotplug_slot_ops *ops;
772 	struct pci_slot *slot;
773 	u8 state;
774 	int rc;
775 
776 	if (!pdev)
777 		return false;
778 
779 	if (pdev->error_state == pci_channel_io_perm_failure)
780 		return false;
781 
782 	slot = pdev->slot;
783 	if (!slot || !slot->hotplug)
784 		return true;
785 
786 	ops = slot->hotplug->ops;
787 	if (!ops || !ops->get_adapter_status)
788 		return true;
789 
790 	/* set the attention indicator while we've got the slot ops */
791 	if (ops->set_attention_status)
792 		ops->set_attention_status(slot->hotplug, 1);
793 
794 	rc = ops->get_adapter_status(slot->hotplug, &state);
795 	if (rc)
796 		return true;
797 
798 	return !!state;
799 }
800 
801 static void eeh_clear_slot_attention(struct pci_dev *pdev)
802 {
803 	const struct hotplug_slot_ops *ops;
804 	struct pci_slot *slot;
805 
806 	if (!pdev)
807 		return;
808 
809 	if (pdev->error_state == pci_channel_io_perm_failure)
810 		return;
811 
812 	slot = pdev->slot;
813 	if (!slot || !slot->hotplug)
814 		return;
815 
816 	ops = slot->hotplug->ops;
817 	if (!ops || !ops->set_attention_status)
818 		return;
819 
820 	ops->set_attention_status(slot->hotplug, 0);
821 }
822 
823 /**
824  * eeh_handle_normal_event - Handle EEH events on a specific PE
825  * @pe: EEH PE - which should not be used after we return, as it may
826  * have been invalidated.
827  *
828  * Attempts to recover the given PE.  If recovery fails or the PE has failed
829  * too many times, remove the PE.
830  *
831  * While PHB detects address or data parity errors on particular PCI
832  * slot, the associated PE will be frozen. Besides, DMA's occurring
833  * to wild addresses (which usually happen due to bugs in device
834  * drivers or in PCI adapter firmware) can cause EEH error. #SERR,
835  * #PERR or other misc PCI-related errors also can trigger EEH errors.
836  *
837  * Recovery process consists of unplugging the device driver (which
838  * generated hotplug events to userspace), then issuing a PCI #RST to
839  * the device, then reconfiguring the PCI config space for all bridges
840  * & devices under this slot, and then finally restarting the device
841  * drivers (which cause a second set of hotplug events to go out to
842  * userspace).
843  */
844 void eeh_handle_normal_event(struct eeh_pe *pe)
845 {
846 	struct pci_bus *bus;
847 	struct eeh_dev *edev, *tmp;
848 	struct eeh_pe *tmp_pe;
849 	int rc = 0;
850 	enum pci_ers_result result = PCI_ERS_RESULT_NONE;
851 	struct eeh_rmv_data rmv_data =
852 		{LIST_HEAD_INIT(rmv_data.removed_vf_list), 0};
853 	int devices = 0;
854 
855 	bus = eeh_pe_bus_get(pe);
856 	if (!bus) {
857 		pr_err("%s: Cannot find PCI bus for PHB#%x-PE#%x\n",
858 			__func__, pe->phb->global_number, pe->addr);
859 		return;
860 	}
861 
862 	/*
863 	 * When devices are hot-removed we might get an EEH due to
864 	 * a driver attempting to touch the MMIO space of a removed
865 	 * device. In this case we don't have a device to recover
866 	 * so suppress the event if we can't find any present devices.
867 	 *
868 	 * The hotplug driver should take care of tearing down the
869 	 * device itself.
870 	 */
871 	eeh_for_each_pe(pe, tmp_pe)
872 		eeh_pe_for_each_dev(tmp_pe, edev, tmp)
873 			if (eeh_slot_presence_check(edev->pdev))
874 				devices++;
875 
876 	if (!devices) {
877 		pr_debug("EEH: Frozen PHB#%x-PE#%x is empty!\n",
878 			pe->phb->global_number, pe->addr);
879 		goto out; /* nothing to recover */
880 	}
881 
882 	/* Log the event */
883 	if (pe->type & EEH_PE_PHB) {
884 		pr_err("EEH: Recovering PHB#%x, location: %s\n",
885 			pe->phb->global_number, eeh_pe_loc_get(pe));
886 	} else {
887 		struct eeh_pe *phb_pe = eeh_phb_pe_get(pe->phb);
888 
889 		pr_err("EEH: Recovering PHB#%x-PE#%x\n",
890 		       pe->phb->global_number, pe->addr);
891 		pr_err("EEH: PE location: %s, PHB location: %s\n",
892 		       eeh_pe_loc_get(pe), eeh_pe_loc_get(phb_pe));
893 	}
894 
895 #ifdef CONFIG_STACKTRACE
896 	/*
897 	 * Print the saved stack trace now that we've verified there's
898 	 * something to recover.
899 	 */
900 	if (pe->trace_entries) {
901 		void **ptrs = (void **) pe->stack_trace;
902 		int i;
903 
904 		pr_err("EEH: Frozen PHB#%x-PE#%x detected\n",
905 		       pe->phb->global_number, pe->addr);
906 
907 		/* FIXME: Use the same format as dump_stack() */
908 		pr_err("EEH: Call Trace:\n");
909 		for (i = 0; i < pe->trace_entries; i++)
910 			pr_err("EEH: [%pK] %pS\n", ptrs[i], ptrs[i]);
911 
912 		pe->trace_entries = 0;
913 	}
914 #endif /* CONFIG_STACKTRACE */
915 
916 	eeh_pe_update_time_stamp(pe);
917 	pe->freeze_count++;
918 	if (pe->freeze_count > eeh_max_freezes) {
919 		pr_err("EEH: PHB#%x-PE#%x has failed %d times in the last hour and has been permanently disabled.\n",
920 		       pe->phb->global_number, pe->addr,
921 		       pe->freeze_count);
922 		result = PCI_ERS_RESULT_DISCONNECT;
923 	}
924 
925 	eeh_for_each_pe(pe, tmp_pe)
926 		eeh_pe_for_each_dev(tmp_pe, edev, tmp)
927 			edev->mode &= ~EEH_DEV_NO_HANDLER;
928 
929 	/* Walk the various device drivers attached to this slot through
930 	 * a reset sequence, giving each an opportunity to do what it needs
931 	 * to accomplish the reset.  Each child gets a report of the
932 	 * status ... if any child can't handle the reset, then the entire
933 	 * slot is dlpar removed and added.
934 	 *
935 	 * When the PHB is fenced, we have to issue a reset to recover from
936 	 * the error. Override the result if necessary to have partially
937 	 * hotplug for this case.
938 	 */
939 	if (result != PCI_ERS_RESULT_DISCONNECT) {
940 		pr_warn("EEH: This PCI device has failed %d times in the last hour and will be permanently disabled after %d failures.\n",
941 			pe->freeze_count, eeh_max_freezes);
942 		pr_info("EEH: Notify device drivers to shutdown\n");
943 		eeh_set_channel_state(pe, pci_channel_io_frozen);
944 		eeh_set_irq_state(pe, false);
945 		eeh_pe_report("error_detected(IO frozen)", pe,
946 			      eeh_report_error, &result);
947 		if ((pe->type & EEH_PE_PHB) &&
948 		    result != PCI_ERS_RESULT_NONE &&
949 		    result != PCI_ERS_RESULT_NEED_RESET)
950 			result = PCI_ERS_RESULT_NEED_RESET;
951 	}
952 
953 	/* Get the current PCI slot state. This can take a long time,
954 	 * sometimes over 300 seconds for certain systems.
955 	 */
956 	if (result != PCI_ERS_RESULT_DISCONNECT) {
957 		rc = eeh_wait_state(pe, MAX_WAIT_FOR_RECOVERY*1000);
958 		if (rc < 0 || rc == EEH_STATE_NOT_SUPPORT) {
959 			pr_warn("EEH: Permanent failure\n");
960 			result = PCI_ERS_RESULT_DISCONNECT;
961 		}
962 	}
963 
964 	/* Since rtas may enable MMIO when posting the error log,
965 	 * don't post the error log until after all dev drivers
966 	 * have been informed.
967 	 */
968 	if (result != PCI_ERS_RESULT_DISCONNECT) {
969 		pr_info("EEH: Collect temporary log\n");
970 		eeh_slot_error_detail(pe, EEH_LOG_TEMP);
971 	}
972 
973 	/* If all device drivers were EEH-unaware, then shut
974 	 * down all of the device drivers, and hope they
975 	 * go down willingly, without panicing the system.
976 	 */
977 	if (result == PCI_ERS_RESULT_NONE) {
978 		pr_info("EEH: Reset with hotplug activity\n");
979 		rc = eeh_reset_device(pe, bus, NULL, false);
980 		if (rc) {
981 			pr_warn("%s: Unable to reset, err=%d\n",
982 				__func__, rc);
983 			result = PCI_ERS_RESULT_DISCONNECT;
984 		}
985 	}
986 
987 	/* If all devices reported they can proceed, then re-enable MMIO */
988 	if (result == PCI_ERS_RESULT_CAN_RECOVER) {
989 		pr_info("EEH: Enable I/O for affected devices\n");
990 		rc = eeh_pci_enable(pe, EEH_OPT_THAW_MMIO);
991 
992 		if (rc < 0) {
993 			result = PCI_ERS_RESULT_DISCONNECT;
994 		} else if (rc) {
995 			result = PCI_ERS_RESULT_NEED_RESET;
996 		} else {
997 			pr_info("EEH: Notify device drivers to resume I/O\n");
998 			eeh_pe_report("mmio_enabled", pe,
999 				      eeh_report_mmio_enabled, &result);
1000 		}
1001 	}
1002 
1003 	/* If all devices reported they can proceed, then re-enable DMA */
1004 	if (result == PCI_ERS_RESULT_CAN_RECOVER) {
1005 		pr_info("EEH: Enabled DMA for affected devices\n");
1006 		rc = eeh_pci_enable(pe, EEH_OPT_THAW_DMA);
1007 
1008 		if (rc < 0) {
1009 			result = PCI_ERS_RESULT_DISCONNECT;
1010 		} else if (rc) {
1011 			result = PCI_ERS_RESULT_NEED_RESET;
1012 		} else {
1013 			/*
1014 			 * We didn't do PE reset for the case. The PE
1015 			 * is still in frozen state. Clear it before
1016 			 * resuming the PE.
1017 			 */
1018 			eeh_pe_state_clear(pe, EEH_PE_ISOLATED, true);
1019 			result = PCI_ERS_RESULT_RECOVERED;
1020 		}
1021 	}
1022 
1023 	/* If any device called out for a reset, then reset the slot */
1024 	if (result == PCI_ERS_RESULT_NEED_RESET) {
1025 		pr_info("EEH: Reset without hotplug activity\n");
1026 		rc = eeh_reset_device(pe, bus, &rmv_data, true);
1027 		if (rc) {
1028 			pr_warn("%s: Cannot reset, err=%d\n",
1029 				__func__, rc);
1030 			result = PCI_ERS_RESULT_DISCONNECT;
1031 		} else {
1032 			result = PCI_ERS_RESULT_NONE;
1033 			eeh_set_channel_state(pe, pci_channel_io_normal);
1034 			eeh_set_irq_state(pe, true);
1035 			eeh_pe_report("slot_reset", pe, eeh_report_reset,
1036 				      &result);
1037 		}
1038 	}
1039 
1040 	if ((result == PCI_ERS_RESULT_RECOVERED) ||
1041 	    (result == PCI_ERS_RESULT_NONE)) {
1042 		/*
1043 		 * For those hot removed VFs, we should add back them after PF
1044 		 * get recovered properly.
1045 		 */
1046 		list_for_each_entry_safe(edev, tmp, &rmv_data.removed_vf_list,
1047 					 rmv_entry) {
1048 			eeh_add_virt_device(edev);
1049 			list_del(&edev->rmv_entry);
1050 		}
1051 
1052 		/* Tell all device drivers that they can resume operations */
1053 		pr_info("EEH: Notify device driver to resume\n");
1054 		eeh_set_channel_state(pe, pci_channel_io_normal);
1055 		eeh_set_irq_state(pe, true);
1056 		eeh_pe_report("resume", pe, eeh_report_resume, NULL);
1057 		eeh_for_each_pe(pe, tmp_pe) {
1058 			eeh_pe_for_each_dev(tmp_pe, edev, tmp) {
1059 				edev->mode &= ~EEH_DEV_NO_HANDLER;
1060 				edev->in_error = false;
1061 			}
1062 		}
1063 
1064 		pr_info("EEH: Recovery successful.\n");
1065 	} else  {
1066 		/*
1067 		 * About 90% of all real-life EEH failures in the field
1068 		 * are due to poorly seated PCI cards. Only 10% or so are
1069 		 * due to actual, failed cards.
1070 		 */
1071 		pr_err("EEH: Unable to recover from failure from PHB#%x-PE#%x.\n"
1072 		       "Please try reseating or replacing it\n",
1073 			pe->phb->global_number, pe->addr);
1074 
1075 		eeh_slot_error_detail(pe, EEH_LOG_PERM);
1076 
1077 		/* Notify all devices that they're about to go down. */
1078 		eeh_set_channel_state(pe, pci_channel_io_perm_failure);
1079 		eeh_set_irq_state(pe, false);
1080 		eeh_pe_report("error_detected(permanent failure)", pe,
1081 			      eeh_report_failure, NULL);
1082 
1083 		/* Mark the PE to be removed permanently */
1084 		eeh_pe_state_mark(pe, EEH_PE_REMOVED);
1085 
1086 		/*
1087 		 * Shut down the device drivers for good. We mark
1088 		 * all removed devices correctly to avoid access
1089 		 * the their PCI config any more.
1090 		 */
1091 		if (pe->type & EEH_PE_VF) {
1092 			eeh_pe_dev_traverse(pe, eeh_rmv_device, NULL);
1093 			eeh_pe_dev_mode_mark(pe, EEH_DEV_REMOVED);
1094 		} else {
1095 			eeh_pe_state_clear(pe, EEH_PE_PRI_BUS, true);
1096 			eeh_pe_dev_mode_mark(pe, EEH_DEV_REMOVED);
1097 
1098 			pci_lock_rescan_remove();
1099 			pci_hp_remove_devices(bus);
1100 			pci_unlock_rescan_remove();
1101 			/* The passed PE should no longer be used */
1102 			return;
1103 		}
1104 	}
1105 
1106 out:
1107 	/*
1108 	 * Clean up any PEs without devices. While marked as EEH_PE_RECOVERYING
1109 	 * we don't want to modify the PE tree structure so we do it here.
1110 	 */
1111 	eeh_pe_cleanup(pe);
1112 
1113 	/* clear the slot attention LED for all recovered devices */
1114 	eeh_for_each_pe(pe, tmp_pe)
1115 		eeh_pe_for_each_dev(tmp_pe, edev, tmp)
1116 			eeh_clear_slot_attention(edev->pdev);
1117 
1118 	eeh_pe_state_clear(pe, EEH_PE_RECOVERING, true);
1119 }
1120 
1121 /**
1122  * eeh_handle_special_event - Handle EEH events without a specific failing PE
1123  *
1124  * Called when an EEH event is detected but can't be narrowed down to a
1125  * specific PE.  Iterates through possible failures and handles them as
1126  * necessary.
1127  */
1128 void eeh_handle_special_event(void)
1129 {
1130 	struct eeh_pe *pe, *phb_pe, *tmp_pe;
1131 	struct eeh_dev *edev, *tmp_edev;
1132 	struct pci_bus *bus;
1133 	struct pci_controller *hose;
1134 	unsigned long flags;
1135 	int rc;
1136 
1137 
1138 	do {
1139 		rc = eeh_ops->next_error(&pe);
1140 
1141 		switch (rc) {
1142 		case EEH_NEXT_ERR_DEAD_IOC:
1143 			/* Mark all PHBs in dead state */
1144 			eeh_serialize_lock(&flags);
1145 
1146 			/* Purge all events */
1147 			eeh_remove_event(NULL, true);
1148 
1149 			list_for_each_entry(hose, &hose_list, list_node) {
1150 				phb_pe = eeh_phb_pe_get(hose);
1151 				if (!phb_pe) continue;
1152 
1153 				eeh_pe_mark_isolated(phb_pe);
1154 			}
1155 
1156 			eeh_serialize_unlock(flags);
1157 
1158 			break;
1159 		case EEH_NEXT_ERR_FROZEN_PE:
1160 		case EEH_NEXT_ERR_FENCED_PHB:
1161 		case EEH_NEXT_ERR_DEAD_PHB:
1162 			/* Mark the PE in fenced state */
1163 			eeh_serialize_lock(&flags);
1164 
1165 			/* Purge all events of the PHB */
1166 			eeh_remove_event(pe, true);
1167 
1168 			if (rc != EEH_NEXT_ERR_DEAD_PHB)
1169 				eeh_pe_state_mark(pe, EEH_PE_RECOVERING);
1170 			eeh_pe_mark_isolated(pe);
1171 
1172 			eeh_serialize_unlock(flags);
1173 
1174 			break;
1175 		case EEH_NEXT_ERR_NONE:
1176 			return;
1177 		default:
1178 			pr_warn("%s: Invalid value %d from next_error()\n",
1179 				__func__, rc);
1180 			return;
1181 		}
1182 
1183 		/*
1184 		 * For fenced PHB and frozen PE, it's handled as normal
1185 		 * event. We have to remove the affected PHBs for dead
1186 		 * PHB and IOC
1187 		 */
1188 		if (rc == EEH_NEXT_ERR_FROZEN_PE ||
1189 		    rc == EEH_NEXT_ERR_FENCED_PHB) {
1190 			eeh_pe_state_mark(pe, EEH_PE_RECOVERING);
1191 			eeh_handle_normal_event(pe);
1192 		} else {
1193 			pci_lock_rescan_remove();
1194 			list_for_each_entry(hose, &hose_list, list_node) {
1195 				phb_pe = eeh_phb_pe_get(hose);
1196 				if (!phb_pe ||
1197 				    !(phb_pe->state & EEH_PE_ISOLATED) ||
1198 				    (phb_pe->state & EEH_PE_RECOVERING))
1199 					continue;
1200 
1201 				eeh_for_each_pe(pe, tmp_pe)
1202 					eeh_pe_for_each_dev(tmp_pe, edev, tmp_edev)
1203 						edev->mode &= ~EEH_DEV_NO_HANDLER;
1204 
1205 				/* Notify all devices to be down */
1206 				eeh_pe_state_clear(pe, EEH_PE_PRI_BUS, true);
1207 				eeh_set_channel_state(pe, pci_channel_io_perm_failure);
1208 				eeh_pe_report(
1209 					"error_detected(permanent failure)", pe,
1210 					eeh_report_failure, NULL);
1211 				bus = eeh_pe_bus_get(phb_pe);
1212 				if (!bus) {
1213 					pr_err("%s: Cannot find PCI bus for "
1214 					       "PHB#%x-PE#%x\n",
1215 					       __func__,
1216 					       pe->phb->global_number,
1217 					       pe->addr);
1218 					break;
1219 				}
1220 				pci_hp_remove_devices(bus);
1221 			}
1222 			pci_unlock_rescan_remove();
1223 		}
1224 
1225 		/*
1226 		 * If we have detected dead IOC, we needn't proceed
1227 		 * any more since all PHBs would have been removed
1228 		 */
1229 		if (rc == EEH_NEXT_ERR_DEAD_IOC)
1230 			break;
1231 	} while (rc != EEH_NEXT_ERR_NONE);
1232 }
1233