Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp7300034pxb; Thu, 18 Feb 2021 06:42:48 -0800 (PST) X-Google-Smtp-Source: ABdhPJxRvBttrsWfPyIJ70jVA2CiAgHZLrwYWdf43ECMEByu54clMy9RM2Z1cz8RsMpJeZKm5Tf3 X-Received: by 2002:a17:907:16a2:: with SMTP id hc34mr4220021ejc.479.1613659367680; Thu, 18 Feb 2021 06:42:47 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1613659367; cv=pass; d=google.com; s=arc-20160816; b=ThD7UeIUGdZxnt+E58NrPitzb4qq0SR7P2aZjDS8RTmAZOBSfZG8ThowOOJd6qKsyh S2q0SH+128rPjsshMH5e5Td4H5RX+GJW90kyw8qFT20s+it0QZppKq7rQG0lJJuJViH9 /xZGjRTqEfuiC0ZU/o65AtZ0mSBwhrkMhTDyQ2NPvdkThcI5cPvzadiGQf6xZGMoABK8 C+tdlMkOWesJD5EkkJMo7gY8AUmWEwrEj+dSgIws5p6kcZBVxjSytKf/1nNh57iHXYJB 1+r3W5jH/eZTdZX8ppXUpTD+DPIVV8oQB3eNIU2dLaDCWv3SR6oFjFJkKQoVXcaYDvaU 6DJw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:content-language :content-transfer-encoding:in-reply-to:user-agent:date:message-id :organization:references:cc:to:subject:from:dkim-signature :dkim-signature; bh=g+IJDojLG7+BJsHSzvJcg1sz6+Pcyo6z3oOmNUCNwdE=; b=rdHcEY4HuSxab4FfCAia0+stPuOb5NLxC9u5V1nHJ9fHbVlc01hgoUyGDV+QkFUxdt 2d2oc6v5gPPCwDuAjcT1PFk87+B0FuQX/d5upR6lN3JDYWkKub84xUs3UFp0d4lWHWdg zjaNhDhSyT9dryxpfYliCjGCDsHdeP4V1rxnlbLQV59DPGUImg04bhSVqJuGTNbCmW0P Nc0Jd6H3PTPY/ZB29Sl5LzsbP/d2X7ty4fCb70UO2MV4xKr2W1T7crEEJ0D+SwjSeaA+ RksQnyd0ssACOssEVUQqoWRsvbrhEmLuoh0cvZfWvGAHL7bF47IPX/sofO8IG5NclleW gfdA== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2020-01-29 header.b=pzo+5tSZ; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b="noPL/nKl"; arc=pass (i=1 spf=pass spfdomain=oracle.com dkim=pass dkdomain=oracle.com dmarc=pass fromdomain=oracle.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y7si2172841ejm.72.2021.02.18.06.42.22; Thu, 18 Feb 2021 06:42:47 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2020-01-29 header.b=pzo+5tSZ; dkim=pass header.i=@oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b="noPL/nKl"; arc=pass (i=1 spf=pass spfdomain=oracle.com dkim=pass dkdomain=oracle.com dmarc=pass fromdomain=oracle.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230234AbhBROkD (ORCPT + 99 others); Thu, 18 Feb 2021 09:40:03 -0500 Received: from userp2120.oracle.com ([156.151.31.85]:48284 "EHLO userp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233180AbhBRMqM (ORCPT ); Thu, 18 Feb 2021 07:46:12 -0500 Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.42/8.16.0.42) with SMTP id 11ICeBNs001326; Thu, 18 Feb 2021 12:43:20 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : subject : to : cc : references : message-id : date : in-reply-to : content-type : content-transfer-encoding : mime-version; s=corp-2020-01-29; bh=g+IJDojLG7+BJsHSzvJcg1sz6+Pcyo6z3oOmNUCNwdE=; b=pzo+5tSZd+0U8lUzntc4zFziQKzPZSwNswHhfvJpZ7WP/U0aHuptj6vtULQszVzK+1ZK 0+RzlSvFY8EgEyU5cleL2DY6uLXxeHS5X37JYjh1qezqWexb46rlpCTWULv80bhLtpWI 56rO3cdDd4OpO+OsiiBzKYQ+d9wEdsGMd3qckPq6OPxgNZ/Ew7VXYARNZUZSxVsNo6PA IC5zSERWI0IxUTW+7qAxYJ9g6gj3EbS/S0UHQ5X4i9ptzJelutiFpCN/riUvbRBc7JcJ Ar1770zIFs5aVe70nuBwyNj1K2V+KsWeuFdmS5wa0dxnUUAF0aAmRwyUJxcskoJuz3JI fA== Received: from aserp3020.oracle.com (aserp3020.oracle.com [141.146.126.70]) by userp2120.oracle.com with ESMTP id 36p7dnnq04-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 18 Feb 2021 12:43:20 +0000 Received: from pps.filterd (aserp3020.oracle.com [127.0.0.1]) by aserp3020.oracle.com (8.16.0.42/8.16.0.42) with SMTP id 11ICeH77019729; Thu, 18 Feb 2021 12:43:19 GMT Received: from nam11-co1-obe.outbound.protection.outlook.com (mail-co1nam11lp2171.outbound.protection.outlook.com [104.47.56.171]) by aserp3020.oracle.com with ESMTP id 36prp1g65h-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 18 Feb 2021 12:43:19 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=lHrCnP/rCQAE83vk0cTiEL0Fh763TddTIBtdyUl1ipcmbNEewhtMpc/G+2xuBnkoArsbI3rWJ8pVsqRbFR0DHTR3JsRzBUHARUpaPsrcU9zp3gxBUwhUAOmIoBavGmok2AWbmOW+eTKyKG7+aVS5bjopzKyia9EkWhY7jtAjaalMLrC5k/E6URZWe1QCQ0srJguy2zfqLNCemt/528cCMWgW1O2R2imYxOYzas1n4nJQ5UAVKplyunOFZsqOlxMnuxcrJFZg2gxOBGY5X0emDlYnvX40HB2s86eEHW/TihkSXVuDsAu5v6qnQtKyB1NmZrzLDivDPHSdqrWqUHdcLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=g+IJDojLG7+BJsHSzvJcg1sz6+Pcyo6z3oOmNUCNwdE=; b=RbYFebq6XRvFgaySt97mDnhpY+U8sIEny/vA3z40I36aJYCRxp1WIYHI81tmiN/qT3d8ZbqZ+vmp8teA3ewNhEblH0we4WsYlFefOB5Ton4hiPz77EFxkxlyVKwpFYG9XB+Cp+5UdBczEnV1qmOwYMkFVjSbFl+fHwbF8a2rRSN+kJH1GHyTovPZBfTY4fTxkTkVau2Hk3Ualh+gFPJvI/6h1QYBFLuL0AgCafynVkslUT0a9tduuK0doZOlucSzS8mTnxKZB3LTgSd6qYCtH6cIV+zH79bp1R97Zv12M2qIomNGMinpArIwW8yvUgGr+uqQql5kSm0oLpuGEM3tKQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=g+IJDojLG7+BJsHSzvJcg1sz6+Pcyo6z3oOmNUCNwdE=; b=noPL/nKlgEQN77JxBk7QflHNle3RRB/faT0fImz5jaHWf0it91wwyqjNyWKd9XA1W2+EM4ZqBguhe60M9m7/nqYOW8pVVQouYpMkddoDk/6XzsiKBrFsSUsId9T8S8ic/7b7V5C64ZjEPd5hEn1dX1caD+AMkTgoAlgu4xS/eOw= Authentication-Results: redhat.com; dkim=none (message not signed) header.d=none;redhat.com; dmarc=none action=none header.from=oracle.com; Received: from BYAPR10MB3287.namprd10.prod.outlook.com (2603:10b6:a03:15c::11) by BY5PR10MB4002.namprd10.prod.outlook.com (2603:10b6:a03:1b0::31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.29; Thu, 18 Feb 2021 12:43:16 +0000 Received: from BYAPR10MB3287.namprd10.prod.outlook.com ([fe80::45b5:49d:d171:5359]) by BYAPR10MB3287.namprd10.prod.outlook.com ([fe80::45b5:49d:d171:5359%5]) with mapi id 15.20.3846.042; Thu, 18 Feb 2021 12:43:16 +0000 From: Si-Wei Liu Subject: Re: [PATCH v1] vdpa/mlx5: Restore the hardware used index after change map To: Jason Wang , Eli Cohen Cc: mst@redhat.com, virtualization@lists.linux-foundation.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, lulu@redhat.com References: <20210204073618.36336-1-elic@nvidia.com> <81f5ce4f-cdb0-26cd-0dce-7ada824b1b86@oracle.com> <20210208063736.GA166546@mtl-vdi-166.wap.labs.mlnx> <0d592ed0-3cea-cfb0-9b7b-9d2755da3f12@redhat.com> <20210208100445.GA173340@mtl-vdi-166.wap.labs.mlnx> <379d79ff-c8b4-9acb-1ee4-16573b601973@redhat.com> <20210209061232.GC210455@mtl-vdi-166.wap.labs.mlnx> <411ff244-a698-a312-333a-4fdbeb3271d1@redhat.com> <24d383db-e65c-82ff-9948-58ead3fc502b@oracle.com> <740b4f73-c668-5e0e-5af2-ebea7528d7a2@redhat.com> Organization: Oracle Corporation Message-ID: <9243c03b-8490-523c-2b78-928d1bcb0ddd@oracle.com> Date: Thu, 18 Feb 2021 04:43:12 -0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.6.1 In-Reply-To: <740b4f73-c668-5e0e-5af2-ebea7528d7a2@redhat.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-Originating-IP: [73.189.186.83] X-ClientProxiedBy: BYAPR05CA0048.namprd05.prod.outlook.com (2603:10b6:a03:74::25) To BYAPR10MB3287.namprd10.prod.outlook.com (2603:10b6:a03:15c::11) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from [192.168.0.19] (73.189.186.83) by BYAPR05CA0048.namprd05.prod.outlook.com (2603:10b6:a03:74::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3868.12 via Frontend Transport; Thu, 18 Feb 2021 12:43:15 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 1e64c674-9417-4e89-9315-08d8d40ac35a X-MS-TrafficTypeDiagnostic: BY5PR10MB4002: X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:9508; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR10MB3287.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(376002)(39860400002)(366004)(136003)(346002)(396003)(16526019)(8936002)(478600001)(36756003)(8676002)(53546011)(31696002)(956004)(30864003)(83380400001)(16576012)(6486002)(31686004)(66946007)(186003)(66556008)(66476007)(2616005)(6666004)(2906002)(5660300002)(36916002)(86362001)(4326008)(110136005)(316002)(26005)(43740500002)(45980500001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData: =?utf-8?B?R0hrbHlOQWNmQ25TcjY5VWV6QlM5RSswTDJRbzZoTVh6V09oTFFreXZRMFZr?= =?utf-8?B?akNpUDhZY1RRUHJxaWxHS2V0UHFETFN4Q3VuYlJqcU80OVNjVm4yRmNVb1pS?= =?utf-8?B?V1JLd3ZhMCsvWmNqZnNPZGR5eUlsY2JaZ3grSjB5RTRCa0JmZjRZT0RLNzZV?= =?utf-8?B?VVZ4RTRKZmNvRFdHY2FEc2ltS1pEdW9kZTBNbXdhUW9UMzJ2cEcwbDVLRUJy?= =?utf-8?B?TEtHTVdBZVkrVk1IUVNZZGtYOFlyVDV1d244QVE4QUJEYlV2Q2VBWlVqYUZ2?= =?utf-8?B?ZkphcWhrbXlmVWFkdm50OVhSV3JJQnkrSUZIWkMzQ2JIOE9lVHAvczI5U1U5?= =?utf-8?B?OE5qVnd6emx2TlludmxkRmNuM3BlelJBclRGaENUMXJSd0NzWGNHM2V4RHVE?= =?utf-8?B?bEVhNDZWeFA2aGFBMEl0Zml1VGcrNTlod0d0OTFLZGNFQXNtOGlSMFV4cllH?= =?utf-8?B?S1YvK2xUVXpTck9Xa1I2cTVmazJhWVFJRWYxZjExOEpwN0NUVDAxRzBpU1Fa?= =?utf-8?B?a3NWV3hhTmpYNTRMZzdwSWVLbUlnSjJoWmsyVDJXNXJGcUoxYWR0NkdmOVR2?= =?utf-8?B?bndlUnEyWGtid0V5U0ZreXJ4RkIwY0EvbHdzWnhsSW9WTzhvdk5vRHV0STVR?= =?utf-8?B?UTRlSlhOc3FhRVZYYWFhN2Q2T2JINjFZalVFS2duS0Z5d1lLdGYvd2FQSDhO?= =?utf-8?B?U2V5a3JVall0L0NGbmV0cFRydXc1dU01dXN4SXZ2c3ZRUG5rZk4vUnRoakFN?= =?utf-8?B?TmhuZVJCbWhrL3VKMGFmVU9PMldwZHRFcnpQc1J0REVlTzJta1JIaHhjVWto?= =?utf-8?B?VUV3RU1qVVNkZGh0ODRtUWZMKzhWMVdoaWZOL1pFODJRTERzTnhzcjdJR2lS?= =?utf-8?B?SWxNWTlCcjA3cGdFYkg4aVBxOUVmYVZJVzJGRnlCazhXZ2lHRDd5bjJ1aTNm?= =?utf-8?B?TkJFbEtFUE5IOUhvRy92ZkhGd1VSdFBHcExTZlNaSXV4L2NTZjVXVWdUeTkr?= =?utf-8?B?T0F2N0ZBdGpuTUNCaWtrSEdnMkNpNm1XS1hrZnl1cGo2K2lMU2N0dDNhTDJI?= =?utf-8?B?dThRNjRJWVZOVElmb005WHB5d1FwS0I2em9lSTdJTXhUMm1iWnJSZ0ZyYlBK?= =?utf-8?B?QUF3YWlQUSt5eWxNTkpBcnlQb1VYbHpQWkE0Y0tzcDN3RkFsVHM3R0I0Y2o5?= =?utf-8?B?bnkxajJ4anczckt0V28xTVBZTHNWaGRLa3ozdlQzMUJVamxBTmpUSG1aQUVj?= =?utf-8?B?bkRyNzVwaW9tOXZscUNCMlZBTHNlOUpJRnA3YWthUCtPaVI1Y3RnbXV6WlIw?= =?utf-8?B?Y2YyYkFQR0lKOTk2eDFCN29va2JHK2dzSDhxYk9aR0trcHZTenY1ZVE2Z1J1?= =?utf-8?B?MEIrZ2ZZbHZWSTFqa1RvYm1BREEvQ0RWMWVudzhFbWhHVUlsL0FEbTdGaklr?= =?utf-8?B?eU5uUTJFUk9ZSGh1QVJJRXlLTHZ4eW9QNUROTCtyRG5JaWRHeWNEazZHekdo?= =?utf-8?B?SUlsc2hIWmxaNTh4QkU0VlVPMU56eUZIa2JIUWNUNlRHZjl0akNoSEl6bEFF?= =?utf-8?B?VUpzL0g1M1RlUEhzUmkrR2Q1aHYyWld6UmJwK2cxVkRibHFOb2JvVEh6RmVp?= =?utf-8?B?WHFPUFhIWlpBZlhTSlFXVDhyUHNPbUNiRnk1TEFiVFVuSXJlSzRDdm5ZUjdC?= =?utf-8?B?WW52L3dBWWdBYlRUMEM4aHNUcklja3VPUEtiVjY0R05mTHRVQTVJRWNpQ056?= =?utf-8?Q?ZKWm44/7v6gnYb3IaJp3e+b4130nkCoNB21hv0C?= X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 1e64c674-9417-4e89-9315-08d8d40ac35a X-MS-Exchange-CrossTenant-AuthSource: BYAPR10MB3287.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Feb 2021 12:43:16.8857 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: wflKHK8f5BUmHSn4MGIQ0/uTL8+pzSpWdlE1y8WeVP9R7qWh9o5PTJH5vgxvbthSCfV3f64dMSPGj9AdpJlVmw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR10MB4002 X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=9898 signatures=668683 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 mlxlogscore=999 bulkscore=0 suspectscore=0 spamscore=0 malwarescore=0 mlxscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2102180111 X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=9898 signatures=668683 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 bulkscore=0 suspectscore=0 mlxscore=0 phishscore=0 spamscore=0 adultscore=0 clxscore=1015 impostorscore=0 priorityscore=1501 lowpriorityscore=0 malwarescore=0 mlxlogscore=999 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2102180111 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2/17/2021 8:44 PM, Jason Wang wrote: > > On 2021/2/10 下午4:59, Si-Wei Liu wrote: >> >> >> On 2/9/2021 7:53 PM, Jason Wang wrote: >>> >>> On 2021/2/10 上午10:30, Si-Wei Liu wrote: >>>> >>>> >>>> On 2/8/2021 10:37 PM, Jason Wang wrote: >>>>> >>>>> On 2021/2/9 下午2:12, Eli Cohen wrote: >>>>>> On Tue, Feb 09, 2021 at 11:20:14AM +0800, Jason Wang wrote: >>>>>>> On 2021/2/8 下午6:04, Eli Cohen wrote: >>>>>>>> On Mon, Feb 08, 2021 at 05:04:27PM +0800, Jason Wang wrote: >>>>>>>>> On 2021/2/8 下午2:37, Eli Cohen wrote: >>>>>>>>>> On Mon, Feb 08, 2021 at 12:27:18PM +0800, Jason Wang wrote: >>>>>>>>>>> On 2021/2/6 上午7:07, Si-Wei Liu wrote: >>>>>>>>>>>> On 2/3/2021 11:36 PM, Eli Cohen wrote: >>>>>>>>>>>>> When a change of memory map occurs, the hardware resources >>>>>>>>>>>>> are destroyed >>>>>>>>>>>>> and then re-created again with the new memory map. In such >>>>>>>>>>>>> case, we need >>>>>>>>>>>>> to restore the hardware available and used indices. The >>>>>>>>>>>>> driver failed to >>>>>>>>>>>>> restore the used index which is added here. >>>>>>>>>>>>> >>>>>>>>>>>>> Also, since the driver also fails to reset the available >>>>>>>>>>>>> and used >>>>>>>>>>>>> indices upon device reset, fix this here to avoid >>>>>>>>>>>>> regression caused by >>>>>>>>>>>>> the fact that used index may not be zero upon device reset. >>>>>>>>>>>>> >>>>>>>>>>>>> Fixes: 1a86b377aa21 ("vdpa/mlx5: Add VDPA driver for >>>>>>>>>>>>> supported mlx5 >>>>>>>>>>>>> devices") >>>>>>>>>>>>> Signed-off-by: Eli Cohen >>>>>>>>>>>>> --- >>>>>>>>>>>>> v0 -> v1: >>>>>>>>>>>>> Clear indices upon device reset >>>>>>>>>>>>> >>>>>>>>>>>>>      drivers/vdpa/mlx5/net/mlx5_vnet.c | 18 >>>>>>>>>>>>> ++++++++++++++++++ >>>>>>>>>>>>>      1 file changed, 18 insertions(+) >>>>>>>>>>>>> >>>>>>>>>>>>> diff --git a/drivers/vdpa/mlx5/net/mlx5_vnet.c >>>>>>>>>>>>> b/drivers/vdpa/mlx5/net/mlx5_vnet.c >>>>>>>>>>>>> index 88dde3455bfd..b5fe6d2ad22f 100644 >>>>>>>>>>>>> --- a/drivers/vdpa/mlx5/net/mlx5_vnet.c >>>>>>>>>>>>> +++ b/drivers/vdpa/mlx5/net/mlx5_vnet.c >>>>>>>>>>>>> @@ -87,6 +87,7 @@ struct mlx5_vq_restore_info { >>>>>>>>>>>>>          u64 device_addr; >>>>>>>>>>>>>          u64 driver_addr; >>>>>>>>>>>>>          u16 avail_index; >>>>>>>>>>>>> +    u16 used_index; >>>>>>>>>>>>>          bool ready; >>>>>>>>>>>>>          struct vdpa_callback cb; >>>>>>>>>>>>>          bool restore; >>>>>>>>>>>>> @@ -121,6 +122,7 @@ struct mlx5_vdpa_virtqueue { >>>>>>>>>>>>>          u32 virtq_id; >>>>>>>>>>>>>          struct mlx5_vdpa_net *ndev; >>>>>>>>>>>>>          u16 avail_idx; >>>>>>>>>>>>> +    u16 used_idx; >>>>>>>>>>>>>          int fw_state; >>>>>>>>>>>>>            /* keep last in the struct */ >>>>>>>>>>>>> @@ -804,6 +806,7 @@ static int create_virtqueue(struct >>>>>>>>>>>>> mlx5_vdpa_net >>>>>>>>>>>>> *ndev, struct mlx5_vdpa_virtque >>>>>>>>>>>>>            obj_context = >>>>>>>>>>>>> MLX5_ADDR_OF(create_virtio_net_q_in, in, >>>>>>>>>>>>> obj_context); >>>>>>>>>>>>>          MLX5_SET(virtio_net_q_object, obj_context, >>>>>>>>>>>>> hw_available_index, >>>>>>>>>>>>> mvq->avail_idx); >>>>>>>>>>>>> +    MLX5_SET(virtio_net_q_object, obj_context, >>>>>>>>>>>>> hw_used_index, >>>>>>>>>>>>> mvq->used_idx); >>>>>>>>>>>>>          MLX5_SET(virtio_net_q_object, obj_context, >>>>>>>>>>>>> queue_feature_bit_mask_12_3, >>>>>>>>>>>>> get_features_12_3(ndev->mvdev.actual_features)); >>>>>>>>>>>>>          vq_ctx = MLX5_ADDR_OF(virtio_net_q_object, >>>>>>>>>>>>> obj_context, >>>>>>>>>>>>> virtio_q_context); >>>>>>>>>>>>> @@ -1022,6 +1025,7 @@ static int connect_qps(struct >>>>>>>>>>>>> mlx5_vdpa_net >>>>>>>>>>>>> *ndev, struct mlx5_vdpa_virtqueue *m >>>>>>>>>>>>>      struct mlx5_virtq_attr { >>>>>>>>>>>>>          u8 state; >>>>>>>>>>>>>          u16 available_index; >>>>>>>>>>>>> +    u16 used_index; >>>>>>>>>>>>>      }; >>>>>>>>>>>>>        static int query_virtqueue(struct mlx5_vdpa_net >>>>>>>>>>>>> *ndev, struct >>>>>>>>>>>>> mlx5_vdpa_virtqueue *mvq, >>>>>>>>>>>>> @@ -1052,6 +1056,7 @@ static int query_virtqueue(struct >>>>>>>>>>>>> mlx5_vdpa_net *ndev, struct mlx5_vdpa_virtqueu >>>>>>>>>>>>>          memset(attr, 0, sizeof(*attr)); >>>>>>>>>>>>>          attr->state = MLX5_GET(virtio_net_q_object, >>>>>>>>>>>>> obj_context, state); >>>>>>>>>>>>>          attr->available_index = >>>>>>>>>>>>> MLX5_GET(virtio_net_q_object, >>>>>>>>>>>>> obj_context, hw_available_index); >>>>>>>>>>>>> +    attr->used_index = MLX5_GET(virtio_net_q_object, >>>>>>>>>>>>> obj_context, >>>>>>>>>>>>> hw_used_index); >>>>>>>>>>>>>          kfree(out); >>>>>>>>>>>>>          return 0; >>>>>>>>>>>>>      @@ -1535,6 +1540,16 @@ static void >>>>>>>>>>>>> teardown_virtqueues(struct >>>>>>>>>>>>> mlx5_vdpa_net *ndev) >>>>>>>>>>>>>          } >>>>>>>>>>>>>      } >>>>>>>>>>>>>      +static void clear_virtqueues(struct mlx5_vdpa_net >>>>>>>>>>>>> *ndev) >>>>>>>>>>>>> +{ >>>>>>>>>>>>> +    int i; >>>>>>>>>>>>> + >>>>>>>>>>>>> +    for (i = ndev->mvdev.max_vqs - 1; i >= 0; i--) { >>>>>>>>>>>>> +        ndev->vqs[i].avail_idx = 0; >>>>>>>>>>>>> +        ndev->vqs[i].used_idx = 0; >>>>>>>>>>>>> +    } >>>>>>>>>>>>> +} >>>>>>>>>>>>> + >>>>>>>>>>>>>      /* TODO: cross-endian support */ >>>>>>>>>>>>>      static inline bool mlx5_vdpa_is_little_endian(struct >>>>>>>>>>>>> mlx5_vdpa_dev >>>>>>>>>>>>> *mvdev) >>>>>>>>>>>>>      { >>>>>>>>>>>>> @@ -1610,6 +1625,7 @@ static int save_channel_info(struct >>>>>>>>>>>>> mlx5_vdpa_net *ndev, struct mlx5_vdpa_virtqu >>>>>>>>>>>>>              return err; >>>>>>>>>>>>>            ri->avail_index = attr.available_index; >>>>>>>>>>>>> +    ri->used_index = attr.used_index; >>>>>>>>>>>>>          ri->ready = mvq->ready; >>>>>>>>>>>>>          ri->num_ent = mvq->num_ent; >>>>>>>>>>>>>          ri->desc_addr = mvq->desc_addr; >>>>>>>>>>>>> @@ -1654,6 +1670,7 @@ static void >>>>>>>>>>>>> restore_channels_info(struct >>>>>>>>>>>>> mlx5_vdpa_net *ndev) >>>>>>>>>>>>>                  continue; >>>>>>>>>>>>>                mvq->avail_idx = ri->avail_index; >>>>>>>>>>>>> +        mvq->used_idx = ri->used_index; >>>>>>>>>>>>>              mvq->ready = ri->ready; >>>>>>>>>>>>>              mvq->num_ent = ri->num_ent; >>>>>>>>>>>>>              mvq->desc_addr = ri->desc_addr; >>>>>>>>>>>>> @@ -1768,6 +1785,7 @@ static void mlx5_vdpa_set_status(struct >>>>>>>>>>>>> vdpa_device *vdev, u8 status) >>>>>>>>>>>>>          if (!status) { >>>>>>>>>>>>>              mlx5_vdpa_info(mvdev, "performing device >>>>>>>>>>>>> reset\n"); >>>>>>>>>>>>>              teardown_driver(ndev); >>>>>>>>>>>>> +        clear_virtqueues(ndev); >>>>>>>>>>>> The clearing looks fine at the first glance, as it aligns >>>>>>>>>>>> with the other >>>>>>>>>>>> state cleanups floating around at the same place. However, >>>>>>>>>>>> the thing is >>>>>>>>>>>> get_vq_state() is supposed to be called right after to get >>>>>>>>>>>> sync'ed with >>>>>>>>>>>> the latest internal avail_index from device while vq is >>>>>>>>>>>> stopped. The >>>>>>>>>>>> index was saved in the driver software at vq suspension, >>>>>>>>>>>> but before the >>>>>>>>>>>> virtq object is destroyed. We shouldn't clear the >>>>>>>>>>>> avail_index too early. >>>>>>>>>>> Good point. >>>>>>>>>>> >>>>>>>>>>> There's a limitation on the virtio spec and vDPA framework >>>>>>>>>>> that we can not >>>>>>>>>>> simply differ device suspending from device reset. >>>>>>>>>>> >>>>>>>>>> Are you talking about live migration where you reset the >>>>>>>>>> device but >>>>>>>>>> still want to know how far it progressed in order to continue >>>>>>>>>> from the >>>>>>>>>> same place in the new VM? >>>>>>>>> Yes. So if we want to support live migration at we need: >>>>>>>>> >>>>>>>>> in src node: >>>>>>>>> 1) suspend the device >>>>>>>>> 2) get last_avail_idx via get_vq_state() >>>>>>>>> >>>>>>>>> in the dst node: >>>>>>>>> 3) set last_avail_idx via set_vq_state() >>>>>>>>> 4) resume the device >>>>>>>>> >>>>>>>>> So you can see, step 2 requires the device/driver not to >>>>>>>>> forget the >>>>>>>>> last_avail_idx. >>>>>>>>> >>>>>>>> Just to be sure, what really matters here is the used index. >>>>>>>> Becuase the >>>>>>>> vriqtueue itself is copied from the src VM to the dest VM. The >>>>>>>> available >>>>>>>> index is alreay there and we know the hardware reads it from >>>>>>>> there. >>>>>>> >>>>>>> So for "last_avail_idx" I meant the hardware internal avail >>>>>>> index. It's not >>>>>>> stored in the virtqueue so we must migrate it from src to dest >>>>>>> and set them >>>>>>> through set_vq_state(). Then in the destination, the virtqueue >>>>>>> can be >>>>>>> restarted from that index. >>>>>>> >>>>>> Consider this case: driver posted buffers till avail index >>>>>> becomes the >>>>>> value 50. Hardware is executing but made it till 20 when >>>>>> virtqueue was >>>>>> suspended due to live migration - this is indicated by hardware used >>>>>> index equal 20. >>>>> >>>>> >>>>> So in this case the used index in the virtqueue should be 20? >>>>> Otherwise we need not sync used index itself but all the used >>>>> entries that is not committed to the used ring. >>>> >>>> In other word, for mlx5 vdpa there's no such internal >>>> last_avail_idx stuff maintained by the hardware, right? >>> >>> >>> For each device it should have one otherwise it won't work correctly >>> during stop/resume. See the codes mlx5_vdpa_get_vq_state() which >>> calls query_virtqueue() that build commands to query >>> "last_avail_idx" from the hardware: >>> >>>     MLX5_SET(general_obj_in_cmd_hdr, cmd_hdr, opcode, >>> MLX5_CMD_OP_QUERY_GENERAL_OBJECT); >>>     MLX5_SET(general_obj_in_cmd_hdr, cmd_hdr, obj_type, >>> MLX5_OBJ_TYPE_VIRTIO_NET_Q); >>>     MLX5_SET(general_obj_in_cmd_hdr, cmd_hdr, obj_id, mvq->virtq_id); >>>     MLX5_SET(general_obj_in_cmd_hdr, cmd_hdr, uid, >>> ndev->mvdev.res.uid); >>>     err = mlx5_cmd_exec(ndev->mvdev.mdev, in, sizeof(in), out, outlen); >>>     if (err) >>>         goto err_cmd; >>> >>>     obj_context = MLX5_ADDR_OF(query_virtio_net_q_out, out, >>> obj_context); >>>     memset(attr, 0, sizeof(*attr)); >>>     attr->state = MLX5_GET(virtio_net_q_object, obj_context, state); >>>     attr->available_index = MLX5_GET(virtio_net_q_object, >>> obj_context, hw_available_index); >>> >> Eli should be able to correct me, but this hw_available_index might >> just be a cached value of virtqueue avail_index in the memory from >> the most recent sync. > > > It should not, otherwise it will be a bug. The hw_available_index not showing the correct last_avail_index value is technically a firmware bug, as Eli alluded to. That's why I had the original question for how this entire synchronization scheme could work if just saving and restoring this cached value. In my observation, the hw_available_index was seen far off from the hw_used_index post vq suspension, I just pointed out the fact that this hardware value is neither last_avail_idx nor last_used_idx that is useful to represent vq state. However, the core question I'm having is should we care about fixing this in the firmware interface level (actually, the hardware implementation), or rather, just as said, some devices e.g. network device could live with the simplified form of assumption (used_idx ==  last_used_idx  == last_avail_idx) where pending requests can be drained and completed before device is stopped or suspended. Despite of what device behavior would be expected or defined in the virtio spec, the get/set_vq_state() API should have very clear semantics: whether both forms (i.e. restore either one of used_idx or last_avail_idx is fine) are acceptable, or it needs to be religious to restore vq state via last_avail_idx only. In the latter case, both the mlx5 vdpa net driver and the firmware interface needs to be fixed to accommodate the stricter API requirement. FWIW I don't think network (Ethernet) device should always assume (used_idx ==  last_used_idx  == last_avail_idx) while being stopped (were there virtio RDMA device in reality this assumption would break): it could well follow the golden rules in virtio S/W implementation to have separate last_used_idx and last_avail_idx in the hardware, then it'll be 100% API compliant.. But we know that such implementation is unnecessarily complicated for Ethernet device. Hence I thought there could be sort of reliefs for some driver/device and it's totally up to the device/driver to choose the implementation. > > >> I doubt it's the one you talked about in software implementation. > > > Actually not, it's a virtio general issue: > > Consider there's not indices wrap. And: > - used_idx is the used index in the virtqueue > - last_used_idx is the used index maintained by the device, it points > to the location where to put the next done requests to the used_ring > - avail_idx is the available index in the virtqueue > - last_avail_idx is the index maintained by the device, it points to > the location where device need to read from the available. > > So bascially, from device POV, it only cares the buffer that belong to > itself which are [used_idx, avail_idx). So we have: > > [used_idx, last_used_idx) The requests that have been completed by the > device but not completed to the used ring (or at least used_idx is not > updated). > [last_used_idx, last_avail_idx) The requests that are being processed > by the device. > [last_avail_idx, avail_idx) The requests that are made available by > the driver but not processed by the device. > > During device stop/suspend, the device should: > > - stop reading new request from available ring (or read until the end > of descriptor chain) > - sync used_idx with last_used_idx. Otherwise we need a complicated > but not necessary API to sync last_used_idx and the indices that are > not committed to used ring (since device may complete the request out > of order) > > So we know used_idx == last_used_idx in this case, so we have: > > [used_idx/last_used_idx, last_avail_idx) The requests that are being > processed. > [last_avail_idx, avail_idx) The requests that are available for the > driver but not yet processed. > > For networking device, it's sufficient to think the requests are > completed when TX/RX DMA are finished. So there's no requests that are > being processed after the stop. In this case we had: used_idx == > last_used_idx == last_avail_idx. Then we only had: > > [used_idx/last_used_idx/last_avail_idx, avail_idx] The requests that > are made available by the driver but not processed by the device. > That's why you may think only used_idx matters here. > > For block device, the completion of the request might require the > communication with the remote backend, so we can't assume > last_used_idx is equal to the last_avail_idx. Whether or not to wait > for the drain the request is still being discussed[1]. I guess this requirement is very subject to the specific storage setup (networked v.s. local) including the guest app/configuration (retry v.s. time out). IMHO there shouldn't be a definite yes-or-no answer here. But in general, for req-ack type of request if the completion (ack) cannot simply replicate across live migration, it should wait until the pending requests are completely drained. > > So you can see, for all the cases, what really matters is the > last_avail_idx. The device should know where it need to start reading > for the next request, and it is not necessarily equal to last_used_idx > or used_idx. What makes things a little bit easier is the networking > device whose last_used_idx is equal to last_avail_idx. > > >> If I understand Eli correctly, hardware will always reload the latest >> avail_index from memory whenever it's being sync'ed again. >> >> >> The hardware always goes to read the available index from memory. The >> requirement to configure it when creating a new object is still a >> requirement defined by the interface so I must not violate interface >> requirments. >> >> >> If the hardware does everything perfectly that is able to flush >> pending requests, update descriptors, rings plus used indices all at >> once before the suspension, there's no need for hardware to maintain >> a separate internal index than the h/w used_index. The hardware can >> get started from the saved used_index upon resuming. I view this is >> of (hardware) implementation choices and thought it does not violate >> the virtio spec? > > > Yes, but as you said, it has a lot of assumptions which may not work > for other type of devices. So what I refer "last_avail_idx" is > probably the "used_idx" in your description here. It might be the same > in this case for networking device. > > >> >> >>> >>> >>> >>>> And the used_idx in the virtqueue is always in sync with the >>>> hardware used_index, and hardware is supposed to commit pending >>>> used buffers to the ring while bumping up the hardware used_index >>>> (and also committed to memory) altogether prior to suspension, is >>>> my understanding correct here? Double checking if this is the >>>> expected semantics of what >>>> modify_virtqueue(MLX5_VIRTIO_NET_Q_OBJECT_STATE_SUSPEND) should >>>> achieve. >>>> >>>> If the above is true, then it looks to me for mlx5 vdpa we should >>>> really return h/w used_idx rather than the last_avail_idx through >>>> get_vq_state(), in order to reconstruct the virt queue state post >>>> live migration. For the set_map case, the internal last_avail_idx >>>> really doesn't matter, although both indices are saved and restored >>>> transparently as-is. >>> >>> >>> Right, a subtle thing here is that: for the device that might have >>> can't not complete all virtqueue requests during vq suspending, the >>> "last_avail_idx" might not be equal to the hardware used_idx. Thing >>> might be true for the storage devices that needs to connect to a >>> remote backend. But this is not the case of networking device, so >>> last_avail_idx should be equal to hardware used_idx here. >> Eli, since it's your hardware, does it work this way? i.e. does the >> firmware interface see a case where virtqueue requests can't be >> completed before suspending vq? > > > For storage device, I think it can happen. > > >> >>> But using the "last_avail_idx" or hardware avail_idx should always >>> be better in this case since it's guaranteed to correct and will >>> have less confusion. We use this convention in other types of vhost >>> backends (vhost-kernel, vhost-user). >>> >>> So looking at mlx5_set_vq_state(), it probably won't work since it >>> doesn't not set either hardware avail_idx or hardware used_idx: >> The saved mvq->avail_idx will be used to recreate hardware virtq >> object and the used index in create_virtqueue(), once status >> DRIVER_OK is set. I suspect we should pass the index to mvq->used_idx >> in mlx5_vdpa_set_vq_state() below instead. >> > > It depends on what did mvq->used_idx meant? If it's last_used_idx, it > should be the same with mvq->avail_idx for networking device. It's the last_used_idx. Note, Eli already posted a patch ("vdpa/mlx5: Fix suspend/resume index restoration") to repurpose set_vq_state() to restore both used_idx and avail_idx (both indices should be conceptually equal in that device model) across reset. Which implies the simplified assumption I mentioned earlier. The requirement of set_vq_state() API should make it clear if this kind of assumption is acceptable. Thanks, -Siwei > > Thanks > > >> >> Thanks, >> -Siwei >>> >>> static int mlx5_vdpa_set_vq_state(struct vdpa_device *vdev, u16 idx, >>>                   const struct vdpa_vq_state *state) >>> { >>>     struct mlx5_vdpa_dev *mvdev = to_mvdev(vdev); >>>     struct mlx5_vdpa_net *ndev = to_mlx5_vdpa_ndev(mvdev); >>>     struct mlx5_vdpa_virtqueue *mvq = &ndev->vqs[idx]; >>> >>>     if (mvq->fw_state == MLX5_VIRTIO_NET_Q_OBJECT_STATE_RDY) { >>>         mlx5_vdpa_warn(mvdev, "can't modify available index\n"); >>>         return -EINVAL; >>>     } >>> >>>     mvq->avail_idx = state->avail_index; >>>     return 0; >>> } >>> >>> Depends on the hardware, we should either set hardware used_idx or >>> hardware avail_idx here. >>> >>> I think we need to clarify how device is supposed to work in the >>> virtio spec. >>> >>> Thanks >>> >>> >>>> >>>> -Siwei >>>> >>>>> >>>>> >>>>>> Now the vritqueue is copied to the new VM and the >>>>>> hardware now has to continue execution from index 20. We need to >>>>>> tell >>>>>> the hardware via configuring the last used_index. >>>>> >>>>> >>>>> If the hardware can not sync the index from the virtqueue, the >>>>> driver can do the synchronization by make the last_used_idx equals >>>>> to used index in the virtqueue. >>>>> >>>>> Thanks >>>>> >>>>> >>>>>>   So why don't we >>>>>> restore the used index? >>>>>> >>>>>>>> So it puzzles me why is set_vq_state() we do not communicate >>>>>>>> the saved >>>>>>>> used index. >>>>>>> >>>>>>> We don't do that since: >>>>>>> >>>>>>> 1) if the hardware can sync its internal used index from the >>>>>>> virtqueue >>>>>>> during device, then we don't need it >>>>>>> 2) if the hardware can not sync its internal used index, the >>>>>>> driver (e.g as >>>>>>> you did here) can do that. >>>>>>> >>>>>>> But there's no way for the hardware to deduce the internal avail >>>>>>> index from >>>>>>> the virtqueue, that's why avail index is sycned. >>>>>>> >>>>>>> Thanks >>>>>>> >>>>>>> >>>>> >>>> >>> >> >