Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp366010pxf; Thu, 18 Mar 2021 02:11:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwMVi+TWEfGEo/pjo72fEhC+FMRY/Ieoz7N11qijOieNOZthiasaZ3tls7Row1pcocaSGax X-Received: by 2002:a17:907:75c2:: with SMTP id jl2mr40407431ejc.334.1616058703719; Thu, 18 Mar 2021 02:11:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616058703; cv=none; d=google.com; s=arc-20160816; b=eKC2wUQP0ZCJjiQ+/SwXfv9IYL1EMz+mghL7QnYoG/FhWEnJ0+taY3Usqo5UbbIRIx ALuZRxmvkoMBvf0QDOIi6x3zTQamtP9tU/sELfKC0XLtI5eh0Qgbn2ah9aK7ozEq4aIv LXvBoeMxxLKakDaP90T95TyDnOutvZfilwojg0Zse/dLR2hqpKh2fia444ZixbWtItPL ezRbjxqACXOHCiSlJJJUV9y1PW1lWmQoYkKnwDG6DfL73OBtA8LCrBtpcs+c9DUWHLf7 H56fWfkjWklYf7PTt7fMnBQHt154PgtndEEOC7MYk74ok00uQhgc1FuAzwghLTPExDEh 43cA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=Gtl6rvGc2aYUUBopmy41+NpMA0Flb5maV/dSJjeMK60=; b=kIBIu6GDSnYXfXpgm3U9b9tWONwdWJAjVB2liQ4H6MrQ9e6U6cHo1Xo48Z5MMX/XW6 po3UkFU3E2HX59AVLey+JnoN7Q3KFtXQmihOREE2l7BoZzL9k8YG1Esf3Hnn1lTsKwoj 1QnmfySUg9MY+foSsAEDNtTLuLHLdjDQ8QVfiYifmzO9j2OKtt1gv1m9aCB3mpJewnH1 h+TcqZlM6k5h1GIZuiiMqlOrLxahTbzazH7ZqTAlUVuTT5utXnE8/RcYqTft2Zy5V2jY Ig9FOJcJhjuQcduHqkjRwjGADQPTu9zgqfdWqLvBfu2GlL+miKIio0NiwsvuQ57eFyUP oQtg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=KO1BquUf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q2si1104708ejf.708.2021.03.18.02.11.20; Thu, 18 Mar 2021 02:11:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=KO1BquUf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229780AbhCRJJo (ORCPT + 99 others); Thu, 18 Mar 2021 05:09:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:56968 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229736AbhCRJJi (ORCPT ); Thu, 18 Mar 2021 05:09:38 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 7582364E81; Thu, 18 Mar 2021 09:09:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1616058578; bh=ISretiPabpeLIGpp8sP1kDYLR78gWkoukYXmjEKTP0g=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=KO1BquUfYGcBRCOpvx77wpisie+kSzEhDvGAZTI1iXlZEHNDmPQAsux7yHJIeVCmz AqIUsahMtqGxVi6Nx7mRTwfrGvpDC9LAIHq19SmeEwU1DP/VQpu4naCYDM3O4CsasD KqwMGlkzfw9tk0Cqcgv1KWKZL8MuP5elU0g6If/MPv860MxCDD3QoTwHgHjzd1BsY0 VVpfrKaUjjTAi3QWvpymL6kHhAJTwB1SsHMrOm7NWWHUYu2L1kzDhhLpfpk701BM51 67RQiOKXiEe61lDmqxKZZnXEAtQiMUSYjD7AhMK5ba9q/iwifn4QqM5/FO4PgXSE6R 1okHjV9EwoaTQ== Date: Thu, 18 Mar 2021 11:09:34 +0200 From: Leon Romanovsky To: Alex Williamson Cc: Amey Narkhede , raphael.norwitz@nutanix.com, linux-pci@vger.kernel.org, bhelgaas@google.com, linux-kernel@vger.kernel.org, alay.shah@nutanix.com, suresh.gumpula@nutanix.com, shyam.rajendran@nutanix.com, felipe@nutanix.com Subject: Re: [PATCH 4/4] PCI/sysfs: Allow userspace to query and set device reset mechanism Message-ID: References: <20210315102950.230de1d6@x1.home.shazbot.org> <20210315183226.GA14801@raphael-debian-dev> <20210317102447.73no7mhox75xetlf@archlinux> <20210317112309.nborigwfd26px2mj@archlinux> <20210317131718.3uz7zxnvoofpunng@archlinux> <20210317113140.3de56d6c@omen.home.shazbot.org> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20210317113140.3de56d6c@omen.home.shazbot.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Mar 17, 2021 at 11:31:40AM -0600, Alex Williamson wrote: > On Wed, 17 Mar 2021 15:58:40 +0200 > Leon Romanovsky wrote: > > > On Wed, Mar 17, 2021 at 06:47:18PM +0530, Amey Narkhede wrote: > > > On 21/03/17 01:47PM, Leon Romanovsky wrote: > > > > On Wed, Mar 17, 2021 at 04:53:09PM +0530, Amey Narkhede wrote: > > > > > On 21/03/17 01:02PM, Leon Romanovsky wrote: > > > > > > On Wed, Mar 17, 2021 at 03:54:47PM +0530, Amey Narkhede wrote: > > > > > > > On 21/03/17 06:20AM, Leon Romanovsky wrote: > > > > > > > > On Mon, Mar 15, 2021 at 06:32:32PM +0000, Raphael Norwitz wrote: > > > > > > > > > On Mon, Mar 15, 2021 at 10:29:50AM -0600, Alex Williamson wrote: > > > > > > > > > > On Mon, 15 Mar 2021 21:03:41 +0530 > > > > > > > > > > Amey Narkhede wrote: > > > > > > > > > > > > > > > > > > > > > On 21/03/15 05:07PM, Leon Romanovsky wrote: > > > > > > > > > > > > On Mon, Mar 15, 2021 at 08:34:09AM -0600, Alex Williamson wrote: > > > > > > > > > > > > > On Mon, 15 Mar 2021 14:52:26 +0100 > > > > > > > > > > > > > Pali Roh?r wrote: > > > > > > > > > > > > > > > > > > > > > > > > > > > On Monday 15 March 2021 19:13:23 Amey Narkhede wrote: > > > > > > > > > > > > > > > slot reset (pci_dev_reset_slot_function) and secondary bus > > > > > > > > > > > > > > > reset(pci_parent_bus_reset) which I think are hot reset and > > > > > > > > > > > > > > > warm reset respectively. > > > > > > > > > > > > > > > > > > > > > > > > > > > > No. PCI secondary bus reset = PCIe Hot Reset. Slot reset is just another > > > > > > > > > > > > > > type of reset, which is currently implemented only for PCIe hot plug > > > > > > > > > > > > > > bridges and for PowerPC PowerNV platform and it just call PCI secondary > > > > > > > > > > > > > > bus reset with some other hook. PCIe Warm Reset does not have API in > > > > > > > > > > > > > > kernel and therefore drivers do not export this type of reset via any > > > > > > > > > > > > > > kernel function (yet). > > > > > > > > > > > > > > > > > > > > > > > > > > Warm reset is beyond the scope of this series, but could be implemented > > > > > > > > > > > > > in a compatible way to fit within the pci_reset_fn_methods[] array > > > > > > > > > > > > > defined here. Note that with this series the resets available through > > > > > > > > > > > > > pci_reset_function() and the per device reset attribute is sysfs remain > > > > > > > > > > > > > exactly the same as they are currently. The bus and slot reset > > > > > > > > > > > > > methods used here are limited to devices where only a single function is > > > > > > > > > > > > > affected by the reset, therefore it is not like the patch you proposed > > > > > > > > > > > > > which performed a reset irrespective of the downstream devices. This > > > > > > > > > > > > > series only enables selection of the existing methods. Thanks, > > > > > > > > > > > > > > > > > > > > > > > > Alex, > > > > > > > > > > > > > > > > > > > > > > > > I asked the patch author here [1], but didn't get any response, maybe > > > > > > > > > > > > you can answer me. What is the use case scenario for this functionality? > > > > > > > > > > > > > > > > > > > > > > > > Thanks > > > > > > > > > > > > > > > > > > > > > > > > [1] https://lore.kernel.org/lkml/YE389lAqjJSeTolM@unreal/ > > > > > > > > > > > > > > > > > > > > > > > Sorry for not responding immediately. There were some buggy wifi cards > > > > > > > > > > > which needed FLR explicitly not sure if that behavior is fixed in > > > > > > > > > > > drivers. Also there is use a case at Nutanix but the engineer who > > > > > > > > > > > is involved is on PTO that is why I did not respond immediately as > > > > > > > > > > > I don't know the details yet. > > > > > > > > > > > > > > > > > > > > And more generally, devices continue to have reset issues and we > > > > > > > > > > impose a fixed priority in our ordering. We can and probably should > > > > > > > > > > continue to quirk devices when we find broken resets so that we have > > > > > > > > > > the best default behavior, but it's currently not easy for an end user > > > > > > > > > > to experiment, ie. this reset works, that one doesn't. We might also > > > > > > > > > > have platform issues where a given reset works better on a certain > > > > > > > > > > platform. Exposing a way to test these things might lead to better > > > > > > > > > > quirks. In the case I think Pali was looking for, they wanted a > > > > > > > > > > mechanism to force a bus reset, if this was in reference to a single > > > > > > > > > > function device, this could be accomplished by setting a priority for > > > > > > > > > > that mechanism, which would translate to not only the sysfs reset > > > > > > > > > > attribute, but also the reset mechanism used by vfio-pci. Thanks, > > > > > > > > > > > > > > > > > > > > Alex > > > > > > > > > > > > > > > > > > > > > > > > > > > > To confirm from our end - we have seen many such instances where default > > > > > > > > > reset methods have not worked well on our platform. Debugging these > > > > > > > > > issues is painful in practice, and this interface would make it far > > > > > > > > > easier. > > > > > > > > > > > > > > > > > > Having an interface like this would also help us better communicate the > > > > > > > > > issues we find with upstream. Allowing others to more easily test our > > > > > > > > > (or other entities') findings should give better visibility into > > > > > > > > > which issues apply to the device in general and which are platform > > > > > > > > > specific. In disambiguating the former from the latter, we should be > > > > > > > > > able to better quirk devices for everyone, and in the latter cases, this > > > > > > > > > interface allows for a safer and more elegant solution than any of the > > > > > > > > > current alternatives. > > > > > > > > > > > > > > > > So to summarize, we are talking about test and debug interface to > > > > > > > > overcome HW bugs, am I right? > > > > > > > > > > > > > > > > My personal experience shows that once the easy workaround exists > > > > > > > > (and write to generally available sysfs is very simple), the vendors > > > > > > > > and users desire for proper fix decreases drastically. IMHO, we will > > > > > > > > see increase of copy/paste in SO and blog posts, but reduce in quirks. > > > > > > > > > > > > > > > > My 2-cents. > > > > > > > > > > > > > > > I agree with your point but at least it gives the userspace ability > > > > > > > to use broken device until bug is fixed in upstream. > > > > > > > > > > > > As I said, I don't expect many fixes once "userspace" will be able to > > > > > > use cheap workaround. There is no incentive to fix it. > > We can increase the annoyance factor of using a modified set of reset > methods, but ultimately we can only control what goes into our kernel, > other kernels might take v1 of this series and incorporate it > regardless of what happens here. > > > > > > > > This is also applicable for obscure devices without upstream > > > > > > > drivers for example custom FPGA based devices. > > > > > > > > > > > > This is not relevant to upstream kernel. Those vendors ship everything > > > > > > custom, they don't need upstream, we don't need them :) > > > > > > > > > > > By custom I meant hobbyists who could tinker with their custom FPGA. > > > > > > > > I invite such hobbyists to send patches and include their FPGA in > > > > upstream kernel. > > This is potentially another good use case, how receptive are we going > to be to an FPGA design that botches a reset. Do they have a valid > device ID for us to base a quirk on, are they just squatting on one, or > using the default from a library. Maybe the next bitstream will > resolve it, maybe without any external indication. IOW, what would the > quality level be for that quirk versus using this as a workaround, > where the user probably wouldn't mind a kernel nag? It is worth to solve it when the need arises. > > > > > > > > Another main application which I forgot to mention is virtualization > > > > > > > where vmm wants to reset the device when the guest is reset, > > > > > > > to emulate machine reboot as closely as possible. > > > > > > > > > > > > It can work in very narrow case, because reset will cause to device > > > > > > reprobe and most likely the driver will be different from the one that > > > > > > started reset. I can imagine that net devices will lose their state and > > > > > > config after such reset too. > > > > > > > > > > > Not sure if I got that 100% right. The pci_reset_function() function > > > > > saves and restores device state over the reset. > > > > > > > > I'm talking about netdev state, but whatever given the existence of > > > > sysfs reset knob. > > > > > > > > > > > > > > > IMHO, it will be saner for everyone if virtualization don't try such resets. > > That would cause a massive regression in device assignment support. As > with other sysfs attributes, triggering them alongside a running driver > is probably not going to end well. However, pci_reset_function() is > extremely useful for stopping devices and returning them to a default > state, when either rebooting a VM or returning the device to the host. > The device is not removed and re-probed when this occurs, vfio-pci is > able to hold onto the device across these actions. Sure, don't reset a > netdev device when it's in use, that's not what these are used for. > > > > > > The exists reset sysfs attribute was added for exactly this case > > > > > though. > > > > > > > > I didn't know the rationale behind that file till you said and I > > > > googled libvirt discussion, so ok. Do you propose that libvirt > > > > will manage database of devices and their working reset types? > > > > > > > I don't have much idea about internals of libvirt but why would > > > it need to manage database of working reset types? It could just > > > read new reset_methods attribute to get the list of supported reset > > > methods. > > > > Because the idea of this patch is to read all supported reset types and > > allow to the user to chose the working one. The user will do it with > > help from StackOverflow, but libvirt will need to have some sort of > > database, otherwise it won't be different from simple "echo 1 > reset" > > which will iterate over all supported resets anyway. > > AFAIK, libvirt no longer attempts to do resets itself, or is at least > moving in that direction. vfio-pci will reset as device when they're > opened by a user (when available) or triggered via the API. <...> > > The difference here is that this is a workaround to solve bugs that > > should be fixed in the kernel. > > If we want to discourage using this as a primary means to resolve reset > issues on a device then we can create log warnings any time it's used. > Downstreams that really want this functionality are going to take this > patch from the list whether we accept it or not. As above, it seems > there are valid use cases. Even with mainstream vfio in QEMU, I go > through some hoops trying to determine if I can do a secondary bus > reset rather than a PM reset because it's not specified anywhere what a > "soft reset" means for any given device. This sort of interface could > make it easier to apply a system policy that a pci_reset_function() > should always perform a secondary bus reset if the only other option is > a PM reset. Maybe that policy mostly makes sense for a VM use case, so > we'd want one policy by default and another when the device is used for > this functionality. How could we accomplish that with a quirk? Thanks, I'm lost here, does vfio-pci use sysfs interface or internal to the kernel API? If it is latter then we don't really need sysfs, if not, we still need some sort of DB to create second policy, because "supported != working". What am I missing? Thanks > > Alex >