Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp4464891pxu; Wed, 9 Dec 2020 18:51:38 -0800 (PST) X-Google-Smtp-Source: ABdhPJwxA6agl6OMU0Hi4aXMbmPY0jmbZ5sqWdEFUffA53s5utpTaQZToIL7mUFjB6Ka12/vPnYE X-Received: by 2002:a50:ed17:: with SMTP id j23mr4826331eds.218.1607568698508; Wed, 09 Dec 2020 18:51:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607568698; cv=none; d=google.com; s=arc-20160816; b=v9M2BWGSvIAQr7NdY9/QLvfO1iKu83J5D9tTyM9pApZ7jFbpk06kBtGhiuDAsICsVD Mjh2YCRb2oBtL3QL+ZaeUyBUfSYC3FlzUi/CiDYE586WSlTJZfdaMa6i1xQ2SQEtzuuF t9mOk1Tg5Z99qCq39xvzw1h3WDhUdJ3NBTya+gL7+y+LGS3i555AC3sVeApCmnrOQJ7W SrPj5ohpPkauCaUJMCNhc53BaCHobjvcQ5CAEt2BAxIWy+t9kFN3W2wmm5WKdJGgHnIv 3SXSWaVzgLwJFayyNLMqYFVPZSIUmANuLeU9ub3VARZk2jjLKKfultDv9wHkJ1Tedal2 od9Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=zWNVv4YMV2PFKpOMRhyBps+DMj5kRPCH4xGx94Vtlho=; b=eiz8XoYZvYiZKPz00U/9HwiG5bMUAf9UyjznfvpV5M/pBwGdW4MdfrEvNBK9vVUaL6 kWogPltuViQLfT03mxfUbs3IKqsV3oKt6XIKzWOimG5PezVS+KYqgWs0FNA7bb4f/TMv ueC2YoQHGKWYDRhxvWaVCiAgnIUi6k7QTEW5pyxeGom0+S8KC4os0vEzKRPEdizOzqyX oaHRvMxJeNvP4Q4vcLh7dg2XG8LHHAj6w0gEKnJhmJLEPEDbrSOf/prP5Kgibk8LnCF+ wdIlbPjfnqCFCyn/NbcvkASUqSO38s93QEExHi99QHRhG3TIgV2I6mTMIN/N3kKzpwO2 tbow== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=cW4DrQm+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id by4si1787715ejc.732.2020.12.09.18.51.15; Wed, 09 Dec 2020 18:51:38 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=cW4DrQm+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728478AbgLJCZY (ORCPT + 99 others); Wed, 9 Dec 2020 21:25:24 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34066 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726194AbgLJCZY (ORCPT ); Wed, 9 Dec 2020 21:25:24 -0500 Received: from mail-il1-x144.google.com (mail-il1-x144.google.com [IPv6:2607:f8b0:4864:20::144]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6DA21C0613CF; Wed, 9 Dec 2020 18:24:44 -0800 (PST) Received: by mail-il1-x144.google.com with SMTP id g1so3687283ilk.7; Wed, 09 Dec 2020 18:24:44 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=zWNVv4YMV2PFKpOMRhyBps+DMj5kRPCH4xGx94Vtlho=; b=cW4DrQm+BE61QXvszpPHu0CXGQce0kitrA7R64qCX0NNX4gkmSqWPDjmNN+WeW4eJK nrm8FIp9frb4NFcvS7iNo0aYM16F/atxfkIZGNJAU93XX6flp6Z4UliXuitHt/SBuqhp uKVJrDco4DNVMmBkSpI5jdCOUoioxeROd/XF7Nok6K/y9ugSNBIVUmPTycbQfA4kenUD kBLu2naj95Z4GGsg4DOjcmCxL2S41TB+eYJM63xfykzcriyMJDZnyqrMu+J+SdLY3mg2 UlC5KLHKjRsDMKP1CJ34ZMuMeLGQPX1eOGO5zps3/iLGjbUEA3s4ccbowrL6nAP0Jz3D SBtA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=zWNVv4YMV2PFKpOMRhyBps+DMj5kRPCH4xGx94Vtlho=; b=gM3l4DawcOWfYlHm0fRtO8rp0gv8covRvd9RujKJ4LA1eS3UKaeeojsmSdbtFBeOo6 hCz0pL+raNvFSEcm2T1If2i2SBC+B9GWCN0NuyGkWYilaFx2MOzHvk+23VA7+v6HhyW9 /Ab0VGJ0lz1Bx0j45yo0rlW7k+BHci40VOIwvteuQKwk1YjSCiogbUHpICZb3CzQUvh0 kndbaIoQaM7aThC3jjPo77UGaC3jkk2ZGRjf1oIoFtm3FVzI2qpFv0rptQrmoI9lxixM b9RBjiFynkpQz6CKxzH5PgTntxmibvfK59R3/DAaz1Z7c7RR+PBWHzabyFO2KNfP1Axm xHjw== X-Gm-Message-State: AOAM533PvkdrTXx1qIxNWSNu+g4qd6bxTvJd4BALaxjFItWl4nuDhN0s jSvZ3GMrdPZRv3cwaTEG0RtmBtmKtiMM46bJvNQ= X-Received: by 2002:a92:c682:: with SMTP id o2mr7157059ilg.97.1607567083485; Wed, 09 Dec 2020 18:24:43 -0800 (PST) MIME-Version: 1.0 References: <20201204200920.133780-1-mario.limonciello@dell.com> <383daf0d-8a9b-c614-aded-6e816f530dcd@intel.com> In-Reply-To: From: Alexander Duyck Date: Wed, 9 Dec 2020 18:24:32 -0800 Message-ID: Subject: Re: [PATCH v3 0/7] Improve s0ix flows for systems i219LM To: Hans de Goede Cc: "Neftin, Sasha" , "Limonciello, Mario" , Jeff Kirsher , Tony Nguyen , "intel-wired-lan@lists.osuosl.org" , "linux-kernel@vger.kernel.org" , Linux PM , Netdev , Jakub Kicinski , Aaron Brown , Stefan Assmann , David Miller , "darcari@redhat.com" , "Shen, Yijun" , "Yuan, Perry" , "anthony.wong@canonical.com" , viltaly.lifshits@intel.com Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Dec 9, 2020 at 6:44 AM Hans de Goede wrote: > > Hi, > > On 12/8/20 5:14 PM, Alexander Duyck wrote: > > On Tue, Dec 8, 2020 at 1:30 AM Hans de Goede wrot= e: > >> > >> Hi, > >> > >> On 12/8/20 6:08 AM, Neftin, Sasha wrote: > >>> On 12/7/2020 17:41, Limonciello, Mario wrote: > >>>>> First of all thank you for working on this. > >>>>> > >>>>> I must say though that I don't like the approach taken here very > >>>>> much. > >>>>> > >>>>> This is not so much a criticism of this series as it is a criticism > >>>>> of the earlier decision to simply disable s0ix on all devices > >>>>> with the i219-LM + and active ME. > >>>> > >>>> I was not happy with that decision either as it did cause regression= s > >>>> on all of the "named" Comet Lake laptops that were in the market at > >>>> the time. The "unnamed" ones are not yet released, and I don't feel > >>>> it's fair to call it a regression on "unreleased" hardware. > >>>> > >>>>> > >>>>> AFAIK there was a perfectly acceptable patch to workaround those > >>>>> broken devices, which increased a timeout: > >>>>> https://patchwork.ozlabs.org/project/intel-wired- > >>>>> lan/patch/20200323191639.48826-1-aaron.ma@canonical.com/ > >>>>> > >>>>> That patch was nacked because it increased the resume time > >>>>> *on broken devices*. > >>>>> > >>> Officially CSME/ME not POR for Linux and we haven't interface to the = ME. Nobody can tell how long (and why) ME will hold PHY access semaphore an= t just increasing the resuming time (ULP configure) won't be solve the prob= lem. This is not reliable approach. > >>> I would agree users can add ME system on their responsibilities. > >> > >> It is not clear to me what you are trying to say here. > > > > Based on the earlier thread you had referenced and his comment here it > > sounds like while adding time will work for most cases, it doesn't > > solve it for all cases. > > AFAIK there are 0 documented cases where the suspend/resume issue > continues to be a problem after the timeout has been increased. > > If you know of actual documented cases (rather then this just being > a theoretical problem), then please provide links to those cases. If there are such notes I wouldn't have access to them. Do we know if any sort of errata document has been posted for this issue by Intel? That would be where an explanation of the problems and the reasoning behind the workaround would be defined. Without that I am just speculating based off of what has been said here and in the other thread. > > The problem is as a vendor you are usually > > stuck looking for a solution that will work for all cases which can > > lead to things like having to drop features because they can be > > problematic for a few cases. > > I disagree, there will/might always be some broken corner case > laptop-model / hw-design out there on which a feature breaks. Simply > disabling all features which might cause problems in "a few cases" > would mean that we pretty much have to disable over half the features > in the kernel. > > Take for example SATA NCQ (command queing) this is know to not work > on some devices, up to the point of where with some buggy firmwares > it may cause full systems hangs and/or data-corruption. So this is > a much bigger problem then the "system won't suspend" issue we > are talking about here. Still the ATA subsys maintainers have enabled > this by default because it is an important feature to have and they > are using a deny-list to avoid enabling this on known broken hardware; > and yes every know and then we need to add a new model to the deny-list. > > And the same for SATA ALPM support (a power-management feature like s0ix) > that is enabled by default too, combined with a deny-list. > I'm very familiar with the ALPM case since I pushed of it being > enabled by default and I've done most of the maintenance work > of the deny-list since it was enabled by default. > > The kernel is full of this pattern, we don't disable an important > feature (and power-management is important) just because of this > causing issues in "a few cases". And again you say "a few cases" > but I know of 0 documented cases where this issue is still a problem > after bumping the timeout. It all comes down to who owns the maintenance in those cases. That is the heart of the issue. Last I knew Intel was maintaining the e1000e driver. So the decision to support this or not is up to them unless Dave or Jakub want to override. Basically the maintenance cost has to be assumed by whoever decides what route to go. I guess Intel for now is opting to require an allow-list rather than a deny-list for that reason. That way whoever adds a new device is on the hook to verify it works, rather than them having to fix things after something breaks. > >> Are you saying that you insist on keeping the e1000e_check_me check an= d > >> thus needlessly penalizing 100s of laptops models with higher > >> power-consumption unless these 100s of laptops are added manually > >> to an allow list for this? > >> > >> I'm sorry but that is simply unacceptable, the maintenance burden > >> of that is just way too high. > > > > Think about this the other way though. If it is enabled and there are > > cases where adding a delay doesn't resolve it then it still doesn't > > really solve the issue does it? > > Again AFAIK that is a theoretical "If it ..." and even if it is not > theoretical, then we can add a deny-list. Maintaining a deny list for > "a few cases" being broken is a lot easier then maintaining an allow > list for allother hardware out there. > > Let me put it this way, the allow-list will be orders of magnitude > longer then the deny lists. Which list would you rather manually > keep up2date? It all depends on the support model. An allow-list puts the onus on the vendors to validate their parts before they have access to the feature as we are seeing now from Dell. A deny-list would put the onus on the community and Intel as we would have to find and document the cases where this doesn't work. Ultimately it all comes down to who has to do the work. > >> Testing on the models where the timeout issue was first hit has > >> shown that increasing the timeout does actually fix it on those > >> models. Sure in theory the ME on some buggy model could hold the > >> semaphore even longer, but then the right thing would be to > >> have a deny-list for s0ix where we can add those buggy models > >> (none of which we have encountered sofar). Just like we have > >> denylist for buggy hw in other places in the kernel. > > > > This would actually have a higher maintenance burden then just > > disabling the feature. Having to individually test for and deny-list > > every one-off system with this bad configuration would be a pretty > > significant burden. That also implies somebody would have access to > > such systems and that is not normally the case. Even Intel doesn't > > have all possible systems that would include this NIC. > > > >> Maintaining an ever growing allow list for the *theoretical* > >> case of encountering a model where things do not work with > >> the increased timeout is not a workable and this not an > >> acceptable solution. > > > > I'm not a fan of the allow-list either, but it is preferable to a > > deny-list where you have to first trigger the bug before you realize > > it is there. > > IIRC, if the bug is there the system does not suspend, and the e1000e > driver logs an error that it is the culprit. So this is very easy to spot= / > detect by end users when they hit it. > > Again the kernel is full of deny lists to disable some features > on broken hardware, with sometimes hitting the buggy/broken hw > scenario having much worse consequences. Yet this is how this is > done everywhere. > > The e1000e driver really is not all that special that it should > get an exception to how this is normally done. Actually allow-lists are not all that uncommon when it comes to the network tree. The fact is there are a number of PHYs and the like that are supported only by allow-list if I recall on the Intel parts. Basically the model depends on the issue. If you want to be able to test and verify something before you add support for it normally an allow-list is the way to go. > > Ideally there should be another solution in which the ME > > could somehow set a flag somewhere in the hardware to indicate that it > > is alive and the driver could read that order to determine if the ME > > is actually alive and can skip this workaround. Then this could all be > > avoided and it can be safely assumed the system is working correctly. > > > >> The initial addition of the e1000e_check_me check instead > >> of just going with the confirmed fix of bumping the timeout > >> was already highly controversial and should IMHO never have > >> been done. > > > > How big was the sample size for the "confirmed" fix? How many > > different vendors were there within the mix? The problem is while it > > may have worked for the case you encountered you cannot say with > > certainty that it worked in all cases unless you had samples of all > > the different hardware out there. > > > >> Combining this with an ever-growing allow-list on which every > >> new laptop model needs to be added separately + a new > >> "s0ix-enabled" ethertool flag, which existence is basically > >> an admission that the allow-list approach is flawed goes > >> from controversial to just plain not acceptable. > > > > I don't view this as problematic, however this is some overhead to it. > > One thing I don't know is if anyone has looked at is if the issue only > > applies to a few specific system vendors. Currently the allow-list is > > based on the subdevice ID. One thing we could look at doing is > > enabling it based on the subvendor ID in which case we could > > allow-list in large swaths of hardware with certain trusted vendors. > > The only issue is that it pulls in any future parts as well so it puts > > the onus on that manufacturer to avoid misconfiguring things in the > > future. > > If we go this route, we will likely get Dell, Lenovo (which had > the issue without the increased timeout) and maybe HP on the > allow-list, probably with a finer grained deny-list on top to > opt out on some models from these vendors where things turn > out to be buggy after all. > > This: > > 1. Still requires a deny-list on top (at least this is very likely) > 2. Leaves users of all but the 3 big vendors in the cold which > really is not a nice way to deal with this. Well the beauty about the kernel is that you are always welcome to submit a patch and we can debate it. I know in the case of the Intel 10G NIC there was a patch that added a module parameter for overriding the PHY allow-list so that the NIC would try to enable whatever PHY was connected to it. Perhaps you could submit a similar patch that would allow your timer approach and add a warning indicating that if you see PHY hangs the s0ix issue may be responsible.