Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp681500pxf; Wed, 17 Mar 2021 13:17:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxbx6lB9Z4Vsb0ENFrhSj+3Cf2bdYN6M718NL0h0btf+scRwUwdiWHvjz8wK125VKJNkfMA X-Received: by 2002:aa7:dc4e:: with SMTP id g14mr44871196edu.114.1616012272630; Wed, 17 Mar 2021 13:17:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616012272; cv=none; d=google.com; s=arc-20160816; b=ySAea+vbk/6tOGZtpUJhft5tVqspYtL71jIJhLPBO5hxNl5RgbTYlrk7kzV+xyBS4P ZmCMS6dR1o8067vNJXkyz2jwEbHCA4jrefxkRC6ncvifBuXaORMq1CGouEaImSs8fblG zQmE8pjBHv/gRFRfF493VZJQ2v0t8Upic79zd5gd3iWgaVRWHug3dNVdlsz1F3Dmo9kh 30b7tcQbye8+FYkcy/Rcs1r/b6ikYgoHZ4yM/hpgqGrI/6aiemIkChU1ytqD792/5UMK rMfO3Sncv0HLQDvdg3cT8nKHzAqJNlFMLx+ONjNWOkg+iDsBYh+arStKpPqWmbACeFrp B4Vg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=+hoAThpa3DZYHqf8qm+B52rd0jKjjDcspoCTuVqT+7E=; b=EpHNs1l2WMA2sC5FM2rqy4acQLeXiGVovX1yXa5LthyF6LpN/yierL1THnvtqBUbnd TNRV2Cke1LbGqKSem9qqfe3jEEwvqm4NwfEu7ijkntGGz8wUF1MVhp1Vh4xRwTJK5clq DZY8L2YB7UA0zf7e8PdCp5OhEvaVUCDcvWEt3Z3gj7FWND6zQnfE1B/c2/8/wyBXhiSt 5xwoexuw3jp5nl45ygevx2NiCZPIxBXuqJKdOW3oPMZ94nCMoG0G+m3D/2tUzUX+i8Io QML93CPi9LkD0S+TvOTUXoACh+9ZyuDqXIZTQNqxb7gCyV9pqlVqrqCmqX130UXPlgBt xF8A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=CwoGws9v; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ho7si16531412ejc.686.2021.03.17.13.17.29; Wed, 17 Mar 2021 13:17:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=CwoGws9v; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232043AbhCQUNv (ORCPT + 99 others); Wed, 17 Mar 2021 16:13:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:49544 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231398AbhCQUNu (ORCPT ); Wed, 17 Mar 2021 16:13:50 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 754C364F04; Wed, 17 Mar 2021 20:13:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1616012029; bh=khQLFq23w2t02jejmWk4dHnPyu+tEJeOprEkv6/XtCY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=CwoGws9v3BGbaMh1QFzMJJfoRpRBgf8YXc8D6cH+OCeifnFFeKK6nUZs6stYSwkNO i7kTwppKAfvSoP6rBhyTEmobVydytTBWQlNp7Vhg2mCsnDpm/hpjdP8hcrjwWHW/9Q h3ihIpXytuASWpJS/+DaQM18iz1TGtMgOLpNpyrj0uVL4q4tzgssx/aBWW9Koo2fBq Gn8bOfFT4H4W14LFaFLDN/PHPa+jAIQTWAjvEWeLs82kaPk2GywrS/VKAJaRzd4wOB NBSCTlOZRcTOyI1jltQCUeqD46Ad0fdodjaM+/uzfPRPBOVWw4VNo6G98uyRj+BFPn AmRPBFvUMDAKQ== Received: by pali.im (Postfix) id 011138A9; Wed, 17 Mar 2021 21:13:46 +0100 (CET) Date: Wed, 17 Mar 2021 21:13:46 +0100 From: Pali =?utf-8?B?Um9ow6Fy?= To: Alex Williamson Cc: Amey Narkhede , bhelgaas@google.com, raphael.norwitz@nutanix.com, linux-kernel@vger.kernel.org, linux-pci@vger.kernel.org Subject: Re: [PATCH 4/4] PCI/sysfs: Allow userspace to query and set device reset mechanism Message-ID: <20210317201346.v6t4rde6nzmt7fwr@pali> References: <20210315135226.avwmnhkfsgof6ihw@pali> <20210315083409.08b1359b@x1.home.shazbot.org> <20210315145238.6sg5deblr2z2pupu@pali> <20210315090339.54546e91@x1.home.shazbot.org> <20210317190206.zrtzwgskxdogl7dz@pali> <20210317131536.38f398b0@omen.home.shazbot.org> <20210317192424.kpfybcrsen3ivr4f@pali> <20210317133245.7d95909c@omen.home.shazbot.org> <20210317194024.nkzrbbvi6utoznze@pali> <20210317140020.4375ba76@omen.home.shazbot.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20210317140020.4375ba76@omen.home.shazbot.org> User-Agent: NeoMutt/20180716 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wednesday 17 March 2021 14:00:20 Alex Williamson wrote: > On Wed, 17 Mar 2021 20:40:24 +0100 > Pali Rohár wrote: > > > On Wednesday 17 March 2021 13:32:45 Alex Williamson wrote: > > > On Wed, 17 Mar 2021 20:24:24 +0100 > > > Pali Rohár wrote: > > > > > > > On Wednesday 17 March 2021 13:15:36 Alex Williamson wrote: > > > > > On Wed, 17 Mar 2021 20:02:06 +0100 > > > > > Pali Rohár wrote: > > > > > > > > > > > On Monday 15 March 2021 09:03:39 Alex Williamson wrote: > > > > > > > On Mon, 15 Mar 2021 15:52:38 +0100 > > > > > > > Pali Rohár wrote: > > > > > > > > > > > > > > > On Monday 15 March 2021 08:34:09 Alex Williamson wrote: > > > > > > > > > On Mon, 15 Mar 2021 14:52:26 +0100 > > > > > > > > > Pali Rohár wrote: > > > > > > > > > > > > > > > > > > > On Monday 15 March 2021 19:13:23 Amey Narkhede wrote: > > > > > > > > > > > slot reset (pci_dev_reset_slot_function) and secondary bus > > > > > > > > > > > reset(pci_parent_bus_reset) which I think are hot reset and > > > > > > > > > > > warm reset respectively. > > > > > > > > > > > > > > > > > > > > No. PCI secondary bus reset = PCIe Hot Reset. Slot reset is just another > > > > > > > > > > type of reset, which is currently implemented only for PCIe hot plug > > > > > > > > > > bridges and for PowerPC PowerNV platform and it just call PCI secondary > > > > > > > > > > bus reset with some other hook. PCIe Warm Reset does not have API in > > > > > > > > > > kernel and therefore drivers do not export this type of reset via any > > > > > > > > > > kernel function (yet). > > > > > > > > > > > > > > > > > > Warm reset is beyond the scope of this series, but could be implemented > > > > > > > > > in a compatible way to fit within the pci_reset_fn_methods[] array > > > > > > > > > defined here. > > > > > > > > > > > > > > > > Ok! > > > > > > > > > > > > > > > > > Note that with this series the resets available through > > > > > > > > > pci_reset_function() and the per device reset attribute is sysfs remain > > > > > > > > > exactly the same as they are currently. The bus and slot reset > > > > > > > > > methods used here are limited to devices where only a single function is > > > > > > > > > affected by the reset, therefore it is not like the patch you proposed > > > > > > > > > which performed a reset irrespective of the downstream devices. This > > > > > > > > > series only enables selection of the existing methods. Thanks, > > > > > > > > > > > > > > > > > > Alex > > > > > > > > > > > > > > > > > > > > > > > > > But with this patch series, there is still an issue with PCI secondary > > > > > > > > bus reset mechanism as exported sysfs attribute does not do that > > > > > > > > remove-reset-rescan procedure. As discussed in other thread, this reset > > > > > > > > let device in unconfigured / broken state. > > > > > > > > > > > > > > No, there's not: > > > > > > > > > > > > > > int pci_reset_function(struct pci_dev *dev) > > > > > > > { > > > > > > > int rc; > > > > > > > > > > > > > > if (!dev->reset_fn) > > > > > > > return -ENOTTY; > > > > > > > > > > > > > > pci_dev_lock(dev); > > > > > > > >>> pci_dev_save_and_disable(dev); > > > > > > > > > > > > > > rc = __pci_reset_function_locked(dev); > > > > > > > > > > > > > > >>> pci_dev_restore(dev); > > > > > > > pci_dev_unlock(dev); > > > > > > > > > > > > > > return rc; > > > > > > > } > > > > > > > > > > > > > > The remove/re-scan was discussed primarily because your patch performed > > > > > > > a bus reset regardless of what devices were affected by that reset and > > > > > > > it's difficult to manage the scope where multiple devices are affected. > > > > > > > Here, the bus and slot reset functions will fail unless the scope is > > > > > > > limited to the single device triggering this reset. Thanks, > > > > > > > > > > > > > > Alex > > > > > > > > > > > > > > > > > > > I was thinking a bit more about it and I'm really sure how it would > > > > > > behave with hotplugging PCIe bridge. > > > > > > > > > > > > On aardvark PCIe controller I have already tested that secondary bus > > > > > > reset bit is triggering Hot Reset event and then also Link Down event. > > > > > > These events are not handled by aardvark driver yet (needs to > > > > > > implemented into kernel's emulated root bridge code). > > > > > > > > > > > > But I'm not sure how it would behave on real HW PCIe hotplugging bridge. > > > > > > Kernel has already code which removes PCIe device if it changes presence > > > > > > bit (and inform via interrupt). And Link Down event triggers this > > > > > > change. > > > > > > > > > > This is the difference between slot and bus resets, the slot reset is > > > > > implemented by the hotplug controller and disables presence detection > > > > > around the bus reset. Thanks, > > > > > > > > Yes, but I'm talking about bus reset, not about slot reset. > > > > > > > > I mean: to use bus reset via sysfs on hardware which supports slots and > > > > hotplugging. > > > > > > > > And if I'm reading code correctly, this combination is allowed, right? > > > > Via these new patches it is possible to disable slot reset and enable > > > > bus reset. > > > > > > That's true, a slot reset is simply a bus reset wrapped around code > > > that prevents the device from getting ejected. > > > > Yes, this makes slot reset "safe". But bus reset is "unsafe". > > > > > Maybe it would make > > > sense to combine the two as far as this interface is concerned, ie. a > > > single "bus" reset method that will always use slot reset when > > > available. Thanks, > > > > That should work when slot reset is available. > > > > Other option is that mentioned remove-reset-rescan procedure. > > That's not something we can introduce to the pci_reset_function() path > without a fair bit of collateral in using it through vfio-pci. > > > But quick search in drivers/pci/hotplug/ results that not all hotplug > > drivers implement reset_slot method. > > > > So there is a possible issue with hotplug driver which may eject device > > during bus reset (because e.g. slot reset is not implemented)? > > People aren't reporting it, so maybe those controllers aren't being > used for this use case. Or maybe introducing this patch will make > these reset methods more readily accessible for testing. We can fix or > blacklist those controllers for bus reset when reports come in. Thanks, Ok! I do not know neither if those controllers are used, but looks like that there are still changes in hotplug code. So I guess with these patches people can test it and report issues when such thing happen.