Received: by 10.223.176.46 with SMTP id f43csp1214132wra; Fri, 19 Jan 2018 08:24:19 -0800 (PST) X-Google-Smtp-Source: ACJfBosFVg4ZZgB2rPO/nO+x3pvAIrO+9p7HPKaaOK3yQd3Dh0TQC0CNQb7mWEelwlJn0CZn6kSl X-Received: by 10.98.60.132 with SMTP id b4mr43164937pfk.120.1516379059603; Fri, 19 Jan 2018 08:24:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516379059; cv=none; d=google.com; s=arc-20160816; b=wxx23PM65Jy3EoYjzAY7Psqy9qlFLUmIHT4Ff9/nklyPcVuqAQ3x76P8oxeEMOgd7Q tvpW1axmwhhGywByqrIs/cuS58TBotcmWBM08B4Bt9vMILVsyol2DVaJXo4Wy1m7VoKT T+2oaLi+ddKP+Igtf/cJRjxQpM105fTObxSWDSFi5ldWhojr4o/Hc+ap4BhNOpQeX70Q 8sNrPsM7jhhskEXmrxIAxydF/p0cMj1B7h2fuiGxjnl9HJjlNaHiVxPyjKqimicGunYR B/RDLxnsEBVv0PbGWmnPy93mVf6F2bXVMOEmGdfJrek/T3duQLw2SB3wPRFY2HvAZ7Ak ubYg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=1Juj7zYn9TMZyGIEjKNb00S1iqcWHG8lM5TnMYdIHUA=; b=Pc9cMjsBLdy54UVkWSUZK/3xHeM7czW9muJbPp1Nce9kaVA1DPLQAluN8ggxIm4YbZ 4uqMBbnF3O0b0EWFXl17aicpYZXuRneWpAwRVbG3nQf9mHHZ6v2Z8pouyuDX7ZBLYsL3 4duaMzT/0R47RYLsopt4ZbuL0a2KRomhbJH6Lx8NWaoevBLlHCQSAjbt4/k/nfoRkqZQ c3GkWQTp/C4zPBpfVIdTY3xLb/fAx9uz6J1bq8H8zPh0xWib8SalPIXkZwYX4xOtbsHt stzEbFlZQubVQ0kIH6yhui8brXDaUaRSpA03XgVx9fSK0WmgpEorv2XY7b2Mwq6ESrdN SO/A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ZFBS9kn4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i134si8595401pgc.127.2018.01.19.08.24.05; Fri, 19 Jan 2018 08:24:19 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ZFBS9kn4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756116AbeASQXC (ORCPT + 99 others); Fri, 19 Jan 2018 11:23:02 -0500 Received: from mail-qt0-f180.google.com ([209.85.216.180]:43820 "EHLO mail-qt0-f180.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755734AbeASQWx (ORCPT ); Fri, 19 Jan 2018 11:22:53 -0500 Received: by mail-qt0-f180.google.com with SMTP id s3so5072216qtb.10; Fri, 19 Jan 2018 08:22:53 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=1Juj7zYn9TMZyGIEjKNb00S1iqcWHG8lM5TnMYdIHUA=; b=ZFBS9kn4a6GICCO9QRO+BkbuJFEJiv7MIhu6dpIhTp26iv5Rh3wm86cUn8mIUTQH8s hzWJ/szcsLCfx8CC5QSSsVbSWQEhhouJwq8RbEY2wuWXauXkMgn9NNkLqud/Lm7Bxfzt gyBlGrPz9oSpK0Q0rZVRYh4wApyHIX3T+r4Aoiwm6NXJp8TrrDoFSXPFetdknyL0Swx1 PUwnMlHybre6QZWmFdCMTkh1fZ9CH+U54d73iWxKs3gLFuHDrhy833uEutMbaHd3xObt IOhFIdIeHd5oeMhdWiGS+izxUKr4B18Kbp5e4qATyOivP6QL2QB706kjMshr4ZFo1m5l BfJw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=1Juj7zYn9TMZyGIEjKNb00S1iqcWHG8lM5TnMYdIHUA=; b=ubz09XsaBMK4cqkIDP6JZKiA+e9JVZ0tn9gHlAYjD4mZ5Shiw18jvthiTsOplHaWDr Wif/Ak6iMZpdtz420w+OI/Y2heK3N4qwEkNdfwAkldHzKZgs3z44+626ZfBir0mIg246 iZ4fLyoqPi6FgiwaVLZClIFcXhnNpelt8URt2c6lJggVCMlImCRRxr4JeHv3RJdOhrlw /Vet5JSg2WzAUbxeL6QFzF5FKmjBC9lc9T4RV1fFkPCOoXAgmgDQ3O4CEG9+LWk0GpY8 ExJFH3ZodKiH7vJU5Tys4Bir95q6My2Krf1VPotvSdn7Rtlyx9Q1fkL9aBw2T1DoJzCf WHLA== X-Gm-Message-State: AKwxytdAeSAR6Vq9Kb5zyuaukIeBSrIvogybDQ+olaiq54ks07uw2xJ8 UIexAtF9f77akebZFn0C4Lt7xBy0+arXITfoRxynmYFf X-Received: by 10.55.175.134 with SMTP id y128mr66330410qke.222.1516378972792; Fri, 19 Jan 2018 08:22:52 -0800 (PST) MIME-Version: 1.0 Received: by 10.140.89.199 with HTTP; Fri, 19 Jan 2018 08:22:52 -0800 (PST) In-Reply-To: <20180119133648.s5nbm4gvby6c33av@f1.synalogic.ca> References: <20180118065054.29844-1-bpoirier@suse.com> <20180119085952.u63kius4ud34lleq@f1.synalogic.ca> <20180119133648.s5nbm4gvby6c33av@f1.synalogic.ca> From: Alexander Duyck Date: Fri, 19 Jan 2018 08:22:52 -0800 Message-ID: Subject: Re: [Intel-wired-lan] [RFC PATCH] e1000e: Remove Other from EIAC. To: Benjamin Poirier Cc: Shrikrishna Khare , Jeff Kirsher , Netdev , intel-wired-lan , linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jan 19, 2018 at 5:36 AM, Benjamin Poirier wrote: > On 2018/01/19 17:59, Benjamin Poirier wrote: >> On 2018/01/18 07:51, Alexander Duyck wrote: >> > On Wed, Jan 17, 2018 at 10:50 PM, Benjamin Poirier wrote: >> > > It was reported that emulated e1000e devices in vmware esxi 6.5 Build >> > > 7526125 do not link up after commit 4aea7a5c5e94 ("e1000e: Avoid receiver >> > > overrun interrupt bursts", v4.15-rc1). Some tracing shows that after >> > > e1000e_trigger_lsc() is called, ICR reads out as 0x0 in e1000_msix_other() >> > > on emulated e1000e devices. In comparison, on real e1000e 82574 hardware, >> > > icr=0x80000004 (_INT_ASSERTED | _OTHER) in the same situation. >> > >> > Isn't 0x80000004 (_INT_ASSERTED | _LSC)? The assumption I based my >> >> Yes. The numeric value is correct. I made a mistake when writing down >> the flag names. >> >> > patch on was that the VMware code was sending _OTHER instead of _LSC >> > to trigger LSC events. As such in my version of the workaround I just >> >> It's not so deterministic, sadly. In my tests, upon entry into >> e1000_msix_other() after e1000e_trigger_lsc(), with no workaround patch >> I've seen: >> icr=0x0 >> icr=0x3d >> Reserved RXDMT0 Reserved LSC TXDW >> icr=0x46 >> RXO LSC TXQE >> and someone else reported: >> icr=0x3c >> Reserved RXDMT0 Reserved LSC >> >> > went through and did the testing if the _RXO bit was set, otherwise I >> > assumed that whatever event was received must have been meant to >> > trigger an _LSC type event since that worked in the past. > ^... > > Re-reading that part, my thoughts are that it worked in the past, before > 16ecba59bc33 ("e1000e: Do not read ICR in Other interrupt", v4.5-rc1), > because (presumably) Other was not set in EIAC. It worked after > 16ecba59bc33 but before 4aea7a5c5e94 ("e1000e: Avoid receiver overrun > interrupt bursts", v4.15-rc1) because e1000_msix_other() didn't read the > value of icr. If it had, it would've found a bogus value, which is > what's happening after 4aea7a5c5e94. I wonder if we're not just getting > some uninitialized value from the emulation code... which makes me kind > of uneasy about your approach of trying to make sense of the value. > Maybe Shrikrishna can clarify where the icr value is coming from when > Other is set in EIAC. For now I still say we let my current patch go as-is in order to address the immediate issue. We can follow-up and do a more refined version of things once we get the final word from VMware on how this actually works. If nothing else the current patch appears to resolve the currently reported issue and is already submitted. I'm of the mind that we need to cut down on the code thrash. This driver is supposed to have been in a "maintenance" mode for the last year or so as there aren't being any new parts added is my understanding. As-is I don't see any reason why 16ecba59bc33 ("e1000e: Do not read ICR in Other interrupt", v4.5-rc1) was submitted or accepted in the first place. I don't see any notes about it fixing any bug or addressing any issue and it seems like that is the start of all the issues we have been having recently with RXO triggering more interrupts, various link issues, and this most recent VMware issue. - Alex