Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp578160pxf; Thu, 18 Mar 2021 07:26:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzQ8QM83nkIgtnujFnDgWlCQQRTUBwe7I6SdXnx55S0Rpla4Zia8JlZ2fKggFxNo2c32L+z X-Received: by 2002:a17:906:819:: with SMTP id e25mr42134116ejd.292.1616077561442; Thu, 18 Mar 2021 07:26:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616077561; cv=none; d=google.com; s=arc-20160816; b=NDrhm03Wkg7fGsyggHGleVdx4xnQ4YgEBaJ9GS+sOkexBygTrSdodj46Mi1ZA3vNX6 ds6r5bl409FprWyuVf1i/oxY5dQp7R8PHnSR5CIdlVmzrA+0TbeDqz/6WlYfSCaYOEyA 9K2e3Cz/ihKL5bvMWijHZcybnaeG7cYLsnjOs8dPwIkLEAZ/cbGnxNRpHPqYnCd237Fu 64CEpgRmKR43e4OCLT5tjCt9/c5xrsmfuKep4z+B0ZzC3z1Y8M2ADgKcm4x+1JyZOWYU dIytJRlnvsxdp9/2LqSyMVTFUX01ZAKsMgICkoabUCSIj/yIQ9rRjBorK9vI+qVERD5N 9GJQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=i4OoD5oVv3vyCIfLjVD86PLwweLZj2W4qyc3rfITy6k=; b=eK+iDSIogVOBUJ4x3tNc+h3to61mWx/asv5tV7/2LJvt/50KTc6sPuIsKZLQmzN475 5jX7u6y8yISsOPKWT49y2N0Kl+kKwWMjR7vP1QVHNNUA5IR8ub8HM0nOYiw5pCriQz+b D9pRhJGKMaTCEQcQEQJaGo49kGYJAIdh8ulw+IMegcehXPIteh2B3lfOaEzmqTCdpDvN YfNo02ORh4qRGMdv17jx3LBRHhNBI4maKBYs7qI/OMNPzxPPzCZglYRIUUkO0ILrSp9a FDYZaC9St9H5wa0q2ZJDy0iqTrsq44mIQi0swb93E+l/C5jsk4rHxHS7wYWLsi2rCfWk RseQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=TditEaOQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j19si1577395edp.531.2021.03.18.07.25.38; Thu, 18 Mar 2021 07:26:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=TditEaOQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230507AbhCROYG (ORCPT + 99 others); Thu, 18 Mar 2021 10:24:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53328 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230248AbhCROXh (ORCPT ); Thu, 18 Mar 2021 10:23:37 -0400 Received: from mail-pf1-x42b.google.com (mail-pf1-x42b.google.com [IPv6:2607:f8b0:4864:20::42b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7D890C06175F; Thu, 18 Mar 2021 07:23:37 -0700 (PDT) Received: by mail-pf1-x42b.google.com with SMTP id q5so3602754pfh.10; Thu, 18 Mar 2021 07:23:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to; bh=i4OoD5oVv3vyCIfLjVD86PLwweLZj2W4qyc3rfITy6k=; b=TditEaOQ1ySN7lEkZrOL6dxur5eZdHqL2NdFqbf00JEW4zWDmZU8QzaDnE9Li7gcTu Kuon8/ZGnqHbC88IfKeMiFUZ7nwKgHihimAvUdNzI6sGpFChZh+hoOswq3x9FboXMvat mWE5iGOEbJdtcj0PsHYidy8VjoOPzOerEZ8uqR2aStYcZZrdxaFp/HvTBveOx/W3lKIZ 8ZBgr+XnqUAkm6sSJ8kd2PAmu0DK8TgWAH+MK98iiSshh6aV1XgBaFVq9pfoBtDyfGDQ 9pYmmflCjAw7772kr19/mhTXig42qyNaz6fqHemWlhrsA+7QwLlJmoLjn2QaqKM9LJQ0 Zd+g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to; bh=i4OoD5oVv3vyCIfLjVD86PLwweLZj2W4qyc3rfITy6k=; b=DpR5X3/L9EFtoVlhbkaQ5edqBB+EXcS7LUXDMf3RSKGiZIFMJVhDhobIK5ZoJAUsXJ OZSsZ8ttO7rHQVdEITWwMXof+7t8C7lbEGfPNqaOnpw60X+etxbezK3P9zmQgnOCPrRA Bsulx5Yy1pthbD+/U+oqaF0Hhj4XC31s/J87XIn3333927k3daJy+2mPdavbsQzv5VEX Ee2cChnr0pRqPlfpFuIW5Qoj3cXrfmSQI5xIbe+f+QU+5RNbmAn4Y7/ynAbuN2jdb1CJ G7ctth5t+oDpor/q7dVc6yI36fCqAKI1KzTFz94M6J44JAEKWrQLw187zLbg/8/pYzsT LmcQ== X-Gm-Message-State: AOAM5328YfmRTlF7KtqToSBFUVqEBKUSk7SFaWihyx2zlJ+2SNIXMxja BHcq1kOBF2/vlHDQimBodD0= X-Received: by 2002:a63:f350:: with SMTP id t16mr7394615pgj.441.1616077416925; Thu, 18 Mar 2021 07:23:36 -0700 (PDT) Received: from localhost ([103.248.31.158]) by smtp.gmail.com with ESMTPSA id i4sm2814162pfo.14.2021.03.18.07.23.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 18 Mar 2021 07:23:36 -0700 (PDT) Date: Thu, 18 Mar 2021 19:52:52 +0530 From: Amey Narkhede To: Leon Romanovsky Cc: alex.williamson@redhat.com, raphael.norwitz@nutanix.com, linux-pci@vger.kernel.org, bhelgaas@google.com, linux-kernel@vger.kernel.org, alay.shah@nutanix.com, suresh.gumpula@nutanix.com, shyam.rajendran@nutanix.com, felipe@nutanix.com Subject: Re: [PATCH 4/4] PCI/sysfs: Allow userspace to query and set device reset mechanism Message-ID: <20210318142252.fqi3das3mtct4yje@archlinux> References: <20210315183226.GA14801@raphael-debian-dev> <20210317102447.73no7mhox75xetlf@archlinux> <20210317112309.nborigwfd26px2mj@archlinux> <20210317131718.3uz7zxnvoofpunng@archlinux> <20210317113140.3de56d6c@omen.home.shazbot.org> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 21/03/18 11:09AM, Leon Romanovsky wrote: > On Wed, Mar 17, 2021 at 11:31:40AM -0600, Alex Williamson wrote: > > On Wed, 17 Mar 2021 15:58:40 +0200 > > Leon Romanovsky wrote: > > > > > On Wed, Mar 17, 2021 at 06:47:18PM +0530, Amey Narkhede wrote: > > > > On 21/03/17 01:47PM, Leon Romanovsky wrote: > > > > > On Wed, Mar 17, 2021 at 04:53:09PM +0530, Amey Narkhede wrote: > > > > > > On 21/03/17 01:02PM, Leon Romanovsky wrote: > > > > > > > On Wed, Mar 17, 2021 at 03:54:47PM +0530, Amey Narkhede wrote: > > > > > > > > On 21/03/17 06:20AM, Leon Romanovsky wrote: > > > > > > > > > On Mon, Mar 15, 2021 at 06:32:32PM +0000, Raphael Norwitz wrote: > > > > > > > > > > On Mon, Mar 15, 2021 at 10:29:50AM -0600, Alex Williamson wrote: > > > > > > > > > > > On Mon, 15 Mar 2021 21:03:41 +0530 > > > > > > > > > > > Amey Narkhede wrote: > > > > > > > > > > > > > > > > > > > > > > > On 21/03/15 05:07PM, Leon Romanovsky wrote: > > > > > > > > > > > > > On Mon, Mar 15, 2021 at 08:34:09AM -0600, Alex Williamson wrote: > > > > > > > > > > > > > > On Mon, 15 Mar 2021 14:52:26 +0100 > > > > > > > > > > > > > > Pali Roh?r wrote: > > > > > > > > > > > > > > > > > > > > > > > > > > > > > On Monday 15 March 2021 19:13:23 Amey Narkhede wrote: > > > > > > > > > > > > > > > > slot reset (pci_dev_reset_slot_function) and secondary bus > > > > > > > > > > > > > > > > reset(pci_parent_bus_reset) which I think are hot reset and > > > > > > > > > > > > > > > > warm reset respectively. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > No. PCI secondary bus reset = PCIe Hot Reset. Slot reset is just another > > > > > > > > > > > > > > > type of reset, which is currently implemented only for PCIe hot plug > > > > > > > > > > > > > > > bridges and for PowerPC PowerNV platform and it just call PCI secondary > > > > > > > > > > > > > > > bus reset with some other hook. PCIe Warm Reset does not have API in > > > > > > > > > > > > > > > kernel and therefore drivers do not export this type of reset via any > > > > > > > > > > > > > > > kernel function (yet). > > > > > > > > > > > > > > > > > > > > > > > > > > > > Warm reset is beyond the scope of this series, but could be implemented > > > > > > > > > > > > > > in a compatible way to fit within the pci_reset_fn_methods[] array > > > > > > > > > > > > > > defined here. Note that with this series the resets available through > > > > > > > > > > > > > > pci_reset_function() and the per device reset attribute is sysfs remain > > > > > > > > > > > > > > exactly the same as they are currently. The bus and slot reset > > > > > > > > > > > > > > methods used here are limited to devices where only a single function is > > > > > > > > > > > > > > affected by the reset, therefore it is not like the patch you proposed > > > > > > > > > > > > > > which performed a reset irrespective of the downstream devices. This > > > > > > > > > > > > > > series only enables selection of the existing methods. Thanks, > > > > > > > > > > > > > > > > > > > > > > > > > > Alex, > > > > > > > > > > > > > > > > > > > > > > > > > > I asked the patch author here [1], but didn't get any response, maybe > > > > > > > > > > > > > you can answer me. What is the use case scenario for this functionality? > > > > > > > > > > > > > > > > > > > > > > > > > > Thanks > > > > > > > > > > > > > > > > > > > > > > > > > > [1] https://lore.kernel.org/lkml/YE389lAqjJSeTolM@unreal/ > > > > > > > > > > > > > > > > > > > > > > > > > Sorry for not responding immediately. There were some buggy wifi cards > > > > > > > > > > > > which needed FLR explicitly not sure if that behavior is fixed in > > > > > > > > > > > > drivers. Also there is use a case at Nutanix but the engineer who > > > > > > > > > > > > is involved is on PTO that is why I did not respond immediately as > > > > > > > > > > > > I don't know the details yet. > > > > > > > > > > > > > > > > > > > > > > And more generally, devices continue to have reset issues and we > > > > > > > > > > > impose a fixed priority in our ordering. We can and probably should > > > > > > > > > > > continue to quirk devices when we find broken resets so that we have > > > > > > > > > > > the best default behavior, but it's currently not easy for an end user > > > > > > > > > > > to experiment, ie. this reset works, that one doesn't. We might also > > > > > > > > > > > have platform issues where a given reset works better on a certain > > > > > > > > > > > platform. Exposing a way to test these things might lead to better > > > > > > > > > > > quirks. In the case I think Pali was looking for, they wanted a > > > > > > > > > > > mechanism to force a bus reset, if this was in reference to a single > > > > > > > > > > > function device, this could be accomplished by setting a priority for > > > > > > > > > > > that mechanism, which would translate to not only the sysfs reset > > > > > > > > > > > attribute, but also the reset mechanism used by vfio-pci. Thanks, > > > > > > > > > > > > > > > > > > > > > > Alex > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > To confirm from our end - we have seen many such instances where default > > > > > > > > > > reset methods have not worked well on our platform. Debugging these > > > > > > > > > > issues is painful in practice, and this interface would make it far > > > > > > > > > > easier. > > > > > > > > > > > > > > > > > > > > Having an interface like this would also help us better communicate the > > > > > > > > > > issues we find with upstream. Allowing others to more easily test our > > > > > > > > > > (or other entities') findings should give better visibility into > > > > > > > > > > which issues apply to the device in general and which are platform > > > > > > > > > > specific. In disambiguating the former from the latter, we should be > > > > > > > > > > able to better quirk devices for everyone, and in the latter cases, this > > > > > > > > > > interface allows for a safer and more elegant solution than any of the > > > > > > > > > > current alternatives. > > > > > > > > > > > > > > > > > > So to summarize, we are talking about test and debug interface to > > > > > > > > > overcome HW bugs, am I right? > > > > > > > > > > > > > > > > > > My personal experience shows that once the easy workaround exists > > > > > > > > > (and write to generally available sysfs is very simple), the vendors > > > > > > > > > and users desire for proper fix decreases drastically. IMHO, we will > > > > > > > > > see increase of copy/paste in SO and blog posts, but reduce in quirks. > > > > > > > > > > > > > > > > > > My 2-cents. > > > > > > > > > > > > > > > > > I agree with your point but at least it gives the userspace ability > > > > > > > > to use broken device until bug is fixed in upstream. > > > > > > > > > > > > > > As I said, I don't expect many fixes once "userspace" will be able to > > > > > > > use cheap workaround. There is no incentive to fix it. > > > > We can increase the annoyance factor of using a modified set of reset > > methods, but ultimately we can only control what goes into our kernel, > > other kernels might take v1 of this series and incorporate it > > regardless of what happens here. > > > > > > > > > > This is also applicable for obscure devices without upstream > > > > > > > > drivers for example custom FPGA based devices. > > > > > > > > > > > > > > This is not relevant to upstream kernel. Those vendors ship everything > > > > > > > custom, they don't need upstream, we don't need them :) > > > > > > > > > > > > > By custom I meant hobbyists who could tinker with their custom FPGA. > > > > > > > > > > I invite such hobbyists to send patches and include their FPGA in > > > > > upstream kernel. > > > > This is potentially another good use case, how receptive are we going > > to be to an FPGA design that botches a reset. Do they have a valid > > device ID for us to base a quirk on, are they just squatting on one, or > > using the default from a library. Maybe the next bitstream will > > resolve it, maybe without any external indication. IOW, what would the > > quality level be for that quirk versus using this as a workaround, > > where the user probably wouldn't mind a kernel nag? > > It is worth to solve it when the need arises. > > > > > > > > > > > Another main application which I forgot to mention is virtualization > > > > > > > > where vmm wants to reset the device when the guest is reset, > > > > > > > > to emulate machine reboot as closely as possible. > > > > > > > > > > > > > > It can work in very narrow case, because reset will cause to device > > > > > > > reprobe and most likely the driver will be different from the one that > > > > > > > started reset. I can imagine that net devices will lose their state and > > > > > > > config after such reset too. > > > > > > > > > > > > > Not sure if I got that 100% right. The pci_reset_function() function > > > > > > saves and restores device state over the reset. > > > > > > > > > > I'm talking about netdev state, but whatever given the existence of > > > > > sysfs reset knob. > > > > > > > > > > > > > > > > > > IMHO, it will be saner for everyone if virtualization don't try such resets. > > > > That would cause a massive regression in device assignment support. As > > with other sysfs attributes, triggering them alongside a running driver > > is probably not going to end well. However, pci_reset_function() is > > extremely useful for stopping devices and returning them to a default > > state, when either rebooting a VM or returning the device to the host. > > The device is not removed and re-probed when this occurs, vfio-pci is > > able to hold onto the device across these actions. Sure, don't reset a > > netdev device when it's in use, that's not what these are used for. > > > > > > > > The exists reset sysfs attribute was added for exactly this case > > > > > > though. > > > > > > > > > > I didn't know the rationale behind that file till you said and I > > > > > googled libvirt discussion, so ok. Do you propose that libvirt > > > > > will manage database of devices and their working reset types? > > > > > > > > > I don't have much idea about internals of libvirt but why would > > > > it need to manage database of working reset types? It could just > > > > read new reset_methods attribute to get the list of supported reset > > > > methods. > > > > > > Because the idea of this patch is to read all supported reset types and > > > allow to the user to chose the working one. The user will do it with > > > help from StackOverflow, but libvirt will need to have some sort of > > > database, otherwise it won't be different from simple "echo 1 > reset" > > > which will iterate over all supported resets anyway. > > > > AFAIK, libvirt no longer attempts to do resets itself, or is at least > > moving in that direction. vfio-pci will reset as device when they're > > opened by a user (when available) or triggered via the API. > > <...> > > > > The difference here is that this is a workaround to solve bugs that > > > should be fixed in the kernel. > > > > If we want to discourage using this as a primary means to resolve reset > > issues on a device then we can create log warnings any time it's used. > > Downstreams that really want this functionality are going to take this > > patch from the list whether we accept it or not. As above, it seems > > there are valid use cases. Even with mainstream vfio in QEMU, I go > > through some hoops trying to determine if I can do a secondary bus > > reset rather than a PM reset because it's not specified anywhere what a > > "soft reset" means for any given device. This sort of interface could > > make it easier to apply a system policy that a pci_reset_function() > > should always perform a secondary bus reset if the only other option is > > a PM reset. Maybe that policy mostly makes sense for a VM use case, so > > we'd want one policy by default and another when the device is used for > > this functionality. How could we accomplish that with a quirk? Thanks, > > I'm lost here, does vfio-pci use sysfs interface or internal to the kernel API? > > If it is latter then we don't really need sysfs, if not, we still need > some sort of DB to create second policy, because "supported != working". > What am I missing? > > Thanks > Can you explain bit more about why supported != working? Why would hardware indicate that it supports specific reset method if it doesn't work? There is only an unsual quirk for intel 82599 which supports FLR but only reports in PF DEVCAP not in VF DEVCAP so we need to directly call FLR without checking if it is supported. Thanks, Amey