Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp8966139rwl; Tue, 10 Jan 2023 22:58:06 -0800 (PST) X-Google-Smtp-Source: AMrXdXtozSaoKAttOLy/eDF2N6Fe2LCkUWIOLS2Immyw1NwDQ/mLTzCUStuEwF6JpYsjMqmsIZtQ X-Received: by 2002:a05:6a20:138b:b0:a0:462f:8e3e with SMTP id w11-20020a056a20138b00b000a0462f8e3emr106290910pzh.55.1673420285945; Tue, 10 Jan 2023 22:58:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673420285; cv=none; d=google.com; s=arc-20160816; b=gWpJPcRGi96JCxqdsDxv9oe2bqBhCIc7KCoPYxh4WxFrGCwXFpNmaPl+36bL34czmK WC4+ZRaiJkW1CHttrxhZbIJ/uCCz8n0nmvTt5Gdzz4fbJRxgj5K1Js2LD/BK5luzYOpl 63n5kMgrf/y0DHg0lbgSLOY69rkDZ1L3ue4oCku6nFBjnMx2OHekktSdOAphh83PJ9El 49c3dxwy7XfJ6iB43jdL/MK3llA6YqHylj6T3REQYHeHe13ueQy9v3ZStgpiiQhhRA/U DYXRNLiW1iLuXsFK37Z7Bu2H6aw2gCHp/SwJvD3+tnV4s/Db1Qoin2soR8rPYInuBjdK 5rpg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=DmMGT0gFhIvgeF5RxhN6fq6henUsowKYyfh5rgJDDOg=; b=TekUiZoP7pGHH2nr+In9C0gPuRAYEhdNmAOW69v7OvemaFvlX8zVG9ObCrYw/eDFnY hn1iplz+qbNfprTTgcxR0OoqUf4P+9x5X/h7CWyVcnl8qivQKKCsEFMPe7Oc/qe4gSVI ogCqQEIASVqkkmthNZTFiJ1fNMqogtXX9EyERx2GR1v7jdgn2fHBeeOl/KeEReowDjCX IJe1FcRY6Gnu+qXi3JPmKNMjqZ/ioNuSD7PZ0/b4tYXXDcItuh8eKV3hbT5L92gtvttq avV5IQ6iL66EVtHqQZJscCdCoQ/DD1tqNKFouEg4mvLMwedAJbf1rerdzUfPJ7XunNjk zKTw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=TbgCul9D; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n1-20020a639701000000b0049cd14d057csi14585629pge.117.2023.01.10.22.57.58; Tue, 10 Jan 2023 22:58:05 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=TbgCul9D; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230314AbjAKGh4 (ORCPT + 55 others); Wed, 11 Jan 2023 01:37:56 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48966 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230015AbjAKGhv (ORCPT ); Wed, 11 Jan 2023 01:37:51 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6EA08E099 for ; Tue, 10 Jan 2023 22:37:03 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1673419022; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=DmMGT0gFhIvgeF5RxhN6fq6henUsowKYyfh5rgJDDOg=; b=TbgCul9DTrnJR8rgmUXBAN3SrvKzVNt3dS0TPWFutprTtjVC+zUCtgS9/gGD6+uZOVY+yF 6RRTbk8r/r7DfwZ1+NMgaVSRiG+m8m7BwefZhhxCZwYRg9Fko5EQwYDRuV4R0/SHJME4SQ +5CVCTYW8WDxJpk5AAehLU6ls8eT+3c= Received: from mail-oa1-f71.google.com (mail-oa1-f71.google.com [209.85.160.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_128_GCM_SHA256) id us-mta-56-xEoXemsmPCWK-Qw0BNYctA-1; Wed, 11 Jan 2023 01:37:01 -0500 X-MC-Unique: xEoXemsmPCWK-Qw0BNYctA-1 Received: by mail-oa1-f71.google.com with SMTP id 586e51a60fabf-15a1e0ce4dbso3169218fac.21 for ; Tue, 10 Jan 2023 22:37:00 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=DmMGT0gFhIvgeF5RxhN6fq6henUsowKYyfh5rgJDDOg=; b=DkY/aqeck+QgFYu0cw3H0xKF6q4C7CF9E66ZRRPwgmRsvfSGHO2kGeu1T1u3qxzer8 uWwCzg4x/w8sD75yF4cbIqwLEFpnljmHSosNyuo01f7iOnJ3x3QIu+Ajla7sBcsfl1Xq jNI1UCzQBcZvdku8meXXnl5NgUyh8PYGB5jrRyLYll1czOVXv87aPBvzj/oX9kbeGIt6 U5Xdgnmnii7jsQ4d/p9OVmUkJwJpsilTU+MYqPufyCVcbuyZakCpqAK9uS87gbzY6AP1 Zlsi05lwciJs7amCrBN8xkcrBXYgT08q4lqJzNZmCoJ6BgbxUumedObHAWKf55t1SrWE moSw== X-Gm-Message-State: AFqh2kqm9TT0NWtOhfpOQM3E8lDNhR6XBEIfgrIVG7xcXyb3WqA3ZLyS VA5CSn0RTmjPEqqnr3ix/jI3CrTMTN+ldft2Om+BjRpsNOjLkd3ESc+V114yxkUHGaYYPIFw20+ ZFKeI7iVeVIUTHJ9dduWsUu60V/Id+WHkj7yca/0/ X-Received: by 2002:a05:6870:9e9a:b0:15b:96b5:9916 with SMTP id pu26-20020a0568709e9a00b0015b96b59916mr682780oab.280.1673419020251; Tue, 10 Jan 2023 22:37:00 -0800 (PST) X-Received: by 2002:a05:6870:9e9a:b0:15b:96b5:9916 with SMTP id pu26-20020a0568709e9a00b0015b96b59916mr682777oab.280.1673419019963; Tue, 10 Jan 2023 22:36:59 -0800 (PST) MIME-Version: 1.0 References: <20221207145428.31544-1-gautam.dawar@amd.com> <20221207145428.31544-9-gautam.dawar@amd.com> In-Reply-To: From: Jason Wang Date: Wed, 11 Jan 2023 14:36:48 +0800 Message-ID: Subject: Re: [PATCH net-next 08/11] sfc: implement device status related vdpa config operations To: Gautam Dawar Cc: Gautam Dawar , linux-net-drivers@amd.com, netdev@vger.kernel.org, eperezma@redhat.com, tanuj.kamde@amd.com, Koushik.Dutta@amd.com, harpreet.anand@amd.com, Edward Cree , Martin Habets , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jan 9, 2023 at 6:21 PM Gautam Dawar wrote: > > > On 12/14/22 12:15, Jason Wang wrote: > > Caution: This message originated from an External Source. Use proper caution when opening attachments, clicking links, or responding. > > > > > > On Wed, Dec 7, 2022 at 10:57 PM Gautam Dawar wrote: > >> vDPA config opertions to handle get/set device status and device > >> reset have been implemented. > >> > >> Signed-off-by: Gautam Dawar > >> --- > >> drivers/net/ethernet/sfc/ef100_vdpa.c | 7 +- > >> drivers/net/ethernet/sfc/ef100_vdpa.h | 1 + > >> drivers/net/ethernet/sfc/ef100_vdpa_ops.c | 133 ++++++++++++++++++++++ > >> 3 files changed, 140 insertions(+), 1 deletion(-) > >> > >> diff --git a/drivers/net/ethernet/sfc/ef100_vdpa.c b/drivers/net/ethernet/sfc/ef100_vdpa.c > >> index 04d64bfe3c93..80bca281a748 100644 > >> --- a/drivers/net/ethernet/sfc/ef100_vdpa.c > >> +++ b/drivers/net/ethernet/sfc/ef100_vdpa.c > >> @@ -225,9 +225,14 @@ static int vdpa_allocate_vis(struct efx_nic *efx, unsigned int *allocated_vis) > >> > >> static void ef100_vdpa_delete(struct efx_nic *efx) > >> { > >> + struct vdpa_device *vdpa_dev; > >> + > >> if (efx->vdpa_nic) { > >> + vdpa_dev = &efx->vdpa_nic->vdpa_dev; > >> + ef100_vdpa_reset(vdpa_dev); > > Any reason we need to reset during delete? > ef100_reset_vdpa_device() does the necessary clean-up including freeing > irqs, deleting filters and deleting the vrings which is required while > removing the vdpa device or unloading the driver. That's fine but the name might be a little bit confusing since vDPA reset is not necessary here. > > > >> + > >> /* replace with _vdpa_unregister_device later */ > >> - put_device(&efx->vdpa_nic->vdpa_dev.dev); > >> + put_device(&vdpa_dev->dev); > >> efx->vdpa_nic = NULL; > >> } > >> efx_mcdi_free_vis(efx); > >> diff --git a/drivers/net/ethernet/sfc/ef100_vdpa.h b/drivers/net/ethernet/sfc/ef100_vdpa.h > >> index a33edd6dda12..1b0bbba88154 100644 > >> --- a/drivers/net/ethernet/sfc/ef100_vdpa.h > >> +++ b/drivers/net/ethernet/sfc/ef100_vdpa.h > >> @@ -186,6 +186,7 @@ int ef100_vdpa_add_filter(struct ef100_vdpa_nic *vdpa_nic, > >> enum ef100_vdpa_mac_filter_type type); > >> int ef100_vdpa_irq_vectors_alloc(struct pci_dev *pci_dev, u16 nvqs); > >> void ef100_vdpa_irq_vectors_free(void *data); > >> +int ef100_vdpa_reset(struct vdpa_device *vdev); > >> > >> static inline bool efx_vdpa_is_little_endian(struct ef100_vdpa_nic *vdpa_nic) > >> { > >> diff --git a/drivers/net/ethernet/sfc/ef100_vdpa_ops.c b/drivers/net/ethernet/sfc/ef100_vdpa_ops.c > >> index 132ddb4a647b..718b67f6da90 100644 > >> --- a/drivers/net/ethernet/sfc/ef100_vdpa_ops.c > >> +++ b/drivers/net/ethernet/sfc/ef100_vdpa_ops.c > >> @@ -251,6 +251,62 @@ static bool is_qid_invalid(struct ef100_vdpa_nic *vdpa_nic, u16 idx, > >> return false; > >> } > >> > >> +static void ef100_reset_vdpa_device(struct ef100_vdpa_nic *vdpa_nic) > >> +{ > >> + int i; > >> + > >> + WARN_ON(!mutex_is_locked(&vdpa_nic->lock)); > >> + > >> + if (!vdpa_nic->status) > >> + return; > >> + > >> + vdpa_nic->vdpa_state = EF100_VDPA_STATE_INITIALIZED; > >> + vdpa_nic->status = 0; > >> + vdpa_nic->features = 0; > >> + for (i = 0; i < (vdpa_nic->max_queue_pairs * 2); i++) > >> + reset_vring(vdpa_nic, i); > >> +} > >> + > >> +/* May be called under the rtnl lock */ > >> +int ef100_vdpa_reset(struct vdpa_device *vdev) > >> +{ > >> + struct ef100_vdpa_nic *vdpa_nic = get_vdpa_nic(vdev); > >> + > >> + /* vdpa device can be deleted anytime but the bar_config > >> + * could still be vdpa and hence efx->state would be STATE_VDPA. > >> + * Accordingly, ensure vdpa device exists before reset handling > >> + */ > >> + if (!vdpa_nic) > >> + return -ENODEV; > >> + > >> + mutex_lock(&vdpa_nic->lock); > >> + ef100_reset_vdpa_device(vdpa_nic); > >> + mutex_unlock(&vdpa_nic->lock); > >> + return 0; > >> +} > >> + > >> +static int start_vdpa_device(struct ef100_vdpa_nic *vdpa_nic) > >> +{ > >> + int rc = 0; > >> + int i, j; > >> + > >> + for (i = 0; i < (vdpa_nic->max_queue_pairs * 2); i++) { > >> + if (can_create_vring(vdpa_nic, i)) { > >> + rc = create_vring(vdpa_nic, i); > > So I think we can safely remove the create_vring() in set_vq_ready() > > since it's undefined behaviour if set_vq_ready() is called after > > DRIVER_OK. > Is this (undefined) behavior documented in the virtio spec? This part is kind of tricky: PCI transport has a queue_enable field. And recently, VIRTIO_F_RING_RESET was introduced. Let's start without that first: In 4.1.4.3.2 Driver Requirements: Common configuration structure layout It said: "The driver MUST configure the other virtqueue fields before enabling the virtqueue with queue_enable." and "The driver MUST NOT write a 0 to queue_enable." My understanding is that: 1) Write 0 is forbidden 2) Write 1 after DRIVER_OK is undefined behaviour (or need to clarify) With VIRTIO_F_RING_RESET is negotiated: " If VIRTIO_F_RING_RESET has been negotiated, after the driver writes 1 to queue_reset to reset the queue, the driver MUST NOT consider queue reset to be complete until it reads back 0 in queue_reset. The driver MAY re-enable the queue by writing 1 to queue_enable after ensuring that other virtqueue fields have been set up correctly. The driver MAY set driver-writeable queue configuration values to different values than those that were used before the queue reset. (see 2.6.1). " Write 1 to queue_enable after DRIVER_OK and after the queue is reset is allowed. Thanks > If so, can > you please point me to the section of virtio spec that calls this order > (set_vq_ready() after setting DRIVER_OK) undefined? Is it just that the > queue can't be enabled after DRIVER_OK or the reverse (disabling the > queue) after DRIVER_OK is not allowed? > > > >> + if (rc) > >> + goto clear_vring; > >> + } > >> + } > >> + vdpa_nic->vdpa_state = EF100_VDPA_STATE_STARTED; > >> + return rc; > >> + > >> +clear_vring: > >> + for (j = 0; j < i; j++) > >> + if (vdpa_nic->vring[j].vring_created) > >> + delete_vring(vdpa_nic, j); > >> + return rc; > >> +} > >> + > >> static int ef100_vdpa_set_vq_address(struct vdpa_device *vdev, > >> u16 idx, u64 desc_area, u64 driver_area, > >> u64 device_area) > >> @@ -568,6 +624,80 @@ static u32 ef100_vdpa_get_vendor_id(struct vdpa_device *vdev) > >> return EF100_VDPA_VENDOR_ID; > >> } > >> > >> +static u8 ef100_vdpa_get_status(struct vdpa_device *vdev) > >> +{ > >> + struct ef100_vdpa_nic *vdpa_nic = get_vdpa_nic(vdev); > >> + u8 status; > >> + > >> + mutex_lock(&vdpa_nic->lock); > >> + status = vdpa_nic->status; > >> + mutex_unlock(&vdpa_nic->lock); > >> + return status; > >> +} > >> + > >> +static void ef100_vdpa_set_status(struct vdpa_device *vdev, u8 status) > >> +{ > >> + struct ef100_vdpa_nic *vdpa_nic = get_vdpa_nic(vdev); > >> + u8 new_status; > >> + int rc; > >> + > >> + mutex_lock(&vdpa_nic->lock); > >> + if (!status) { > >> + dev_info(&vdev->dev, > >> + "%s: Status received is 0. Device reset being done\n", > >> + __func__); > >> + ef100_reset_vdpa_device(vdpa_nic); > >> + goto unlock_return; > >> + } > >> + new_status = status & ~vdpa_nic->status; > >> + if (new_status == 0) { > >> + dev_info(&vdev->dev, > >> + "%s: New status same as current status\n", __func__); > >> + goto unlock_return; > >> + } > >> + if (new_status & VIRTIO_CONFIG_S_FAILED) { > >> + ef100_reset_vdpa_device(vdpa_nic); > >> + goto unlock_return; > >> + } > >> + > >> + if (new_status & VIRTIO_CONFIG_S_ACKNOWLEDGE && > >> + vdpa_nic->vdpa_state == EF100_VDPA_STATE_INITIALIZED) { > > As replied before, I think there's no need to check > > EF100_VDPA_STATE_INITIALIZED, otherwise it could be a bug somewhere. > Ok. Will remove the check against EF100_VDPA_STATE_INITIALIZED. > >> + vdpa_nic->status |= VIRTIO_CONFIG_S_ACKNOWLEDGE; > >> + new_status &= ~VIRTIO_CONFIG_S_ACKNOWLEDGE; > >> + } > >> + if (new_status & VIRTIO_CONFIG_S_DRIVER && > >> + vdpa_nic->vdpa_state == EF100_VDPA_STATE_INITIALIZED) { > >> + vdpa_nic->status |= VIRTIO_CONFIG_S_DRIVER; > >> + new_status &= ~VIRTIO_CONFIG_S_DRIVER; > >> + } > >> + if (new_status & VIRTIO_CONFIG_S_FEATURES_OK && > >> + vdpa_nic->vdpa_state == EF100_VDPA_STATE_INITIALIZED) { > >> + vdpa_nic->status |= VIRTIO_CONFIG_S_FEATURES_OK; > >> + vdpa_nic->vdpa_state = EF100_VDPA_STATE_NEGOTIATED; > > I think we can simply map EF100_VDPA_STATE_NEGOTIATED to > > VIRTIO_CONFIG_S_FEATURES_OK. > > > > E.g the code doesn't fail the feature negotiation by clearing the > > VIRTIO_CONFIG_S_FEATURES_OK when ef100_vdpa_set_driver_feature fails? > Ok. > > > > Thanks > > Regards, > > Gautam >