From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-16.7 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 392ACC43214 for ; Mon, 9 Aug 2021 17:37:37 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 2002260F25 for ; Mon, 9 Aug 2021 17:37:37 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234337AbhHIRh4 (ORCPT ); Mon, 9 Aug 2021 13:37:56 -0400 Received: from mail.kernel.org ([198.145.29.99]:40804 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233847AbhHIRhz (ORCPT ); Mon, 9 Aug 2021 13:37:55 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 92F40604DC; Mon, 9 Aug 2021 17:37:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1628530654; bh=cbIfJel7cACjBVzwojP9DeSm7DQJv+YksZDNa6ueOxM=; h=Date:From:To:Cc:Subject:In-Reply-To:From; b=fzTPdPoiXQ3j17O3lNNMOlm46QmqyaZYEZZDVHpyaMFldMqO19HHOYI0VIgyRD3sd Ur+KkhwbqU03ptgyGrdyqhGKzE9H5wSAvM2FiDZ5jd7+fgjat+/CYo8TKPbGXbe9hW YnnrKLV2EWJM3IY80yxo7YIephOd5nrUl8FcXoB7ftKXqOTYklajUM7+pybQ11hw9V /br3HbWznpzI//UKT36Dst584WUNCkeMrcGojZZkyoo7IHPo8klHf+qPPV9wERhh7l bcN30NaX9NwfTBGGC/J4guXiFVLZ52LYUtWU0UZz2uAb1gWGMLc6ntoBdYhqjHNlmF dLUUYsfE///lw== Date: Mon, 9 Aug 2021 12:37:33 -0500 From: Bjorn Helgaas To: Dongdong Liu Cc: hch@infradead.org, kw@linux.com, logang@deltatee.com, leon@kernel.org, linux-pci@vger.kernel.org, rajur@chelsio.com, hverkuil-cisco@xs4all.nl, linux-media@vger.kernel.org, netdev@vger.kernel.org Subject: Re: [PATCH V7 7/9] PCI/sysfs: Add a 10-Bit Tag sysfs file Message-ID: <20210809173733.GA2167121@bjorn-Precision-5520> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <68b85d0a-37d2-f83d-99ba-cd3936af4005@huawei.com> Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org On Sat, Aug 07, 2021 at 03:01:56PM +0800, Dongdong Liu wrote: > > On 2021/8/5 23:31, Bjorn Helgaas wrote: > > On Thu, Aug 05, 2021 at 04:37:39PM +0800, Dongdong Liu wrote: > > > > > > > > > On 2021/8/5 7:49, Bjorn Helgaas wrote: > > > > On Wed, Aug 04, 2021 at 09:47:06PM +0800, Dongdong Liu wrote: > > > > > PCIe spec 5.0 r1.0 section 2.2.6.2 says that if an Endpoint supports > > > > > sending Requests to other Endpoints (as opposed to host memory), the > > > > > Endpoint must not send 10-Bit Tag Requests to another given Endpoint > > > > > unless an implementation-specific mechanism determines that the Endpoint > > > > > supports 10-Bit Tag Completer capability. Add a 10bit_tag sysfs file, > > > > > write 0 to disable 10-Bit Tag Requester when the driver does not bind > > > > > the device if the peer device does not support the 10-Bit Tag Completer. > > > > > This will make P2P traffic safe. the 10bit_tag file content indicate > > > > > current 10-Bit Tag Requester Enable status. > > > > > > > > > > Signed-off-by: Dongdong Liu > > > > > --- > > > > > Documentation/ABI/testing/sysfs-bus-pci | 16 +++++++- > > > > > drivers/pci/pci-sysfs.c | 69 +++++++++++++++++++++++++++++++++ > > > > > 2 files changed, 84 insertions(+), 1 deletion(-) > > > > > > > > > > diff --git a/Documentation/ABI/testing/sysfs-bus-pci b/Documentation/ABI/testing/sysfs-bus-pci > > > > > index 793cbb7..0e0c97d 100644 > > > > > --- a/Documentation/ABI/testing/sysfs-bus-pci > > > > > +++ b/Documentation/ABI/testing/sysfs-bus-pci > > > > > @@ -139,7 +139,7 @@ Description: > > > > > binary file containing the Vital Product Data for the > > > > > device. It should follow the VPD format defined in > > > > > PCI Specification 2.1 or 2.2, but users should consider > > > > > - that some devices may have incorrectly formatted data. > > > > > + that some devices may have incorrectly formatted data. > > > > > If the underlying VPD has a writable section then the > > > > > corresponding section of this file will be writable. > > > > > > > > > > @@ -407,3 +407,17 @@ Description: > > > > > > > > > > The file is writable if the PF is bound to a driver that > > > > > implements ->sriov_set_msix_vec_count(). > > > > > + > > > > > +What: /sys/bus/pci/devices/.../10bit_tag > > > > > +Date: August 2021 > > > > > +Contact: Dongdong Liu > > > > > +Description: > > > > > + If a PCI device support 10-Bit Tag Requester, will create the > > > > > + 10bit_tag sysfs file. The file is readable, the value > > > > > + indicate current 10-Bit Tag Requester Enable. > > > > > + 1 - enabled, 0 - disabled. > > > > > + > > > > > + The file is also writeable, the value only accept by write 0 > > > > > + to disable 10-Bit Tag Requester when the driver does not bind > > > > > + the deivce. The typical use case is for p2pdma when the peer > > > > > + device does not support 10-BIT Tag Completer. > > > > > > > +static ssize_t pci_10bit_tag_store(struct device *dev, > > > > > + struct device_attribute *attr, > > > > > + const char *buf, size_t count) > > > > > +{ > > > > > + struct pci_dev *pdev = to_pci_dev(dev); > > > > > + bool enable; > > > > > + > > > > > + if (kstrtobool(buf, &enable) < 0) > > > > > + return -EINVAL; > > > > > + > > > > > + if (enable != false ) > > > > > + return -EINVAL; > > > > > > > > Is this the same as "if (enable)"? > > > Yes, Will fix. > > > > I actually don't like the one-way nature of this. When the hierarchy > > supports 10-bit tags, we automatically enable them during enumeration. > > > > Then we provide this sysfs file, but it can only *disable* 10-bit > > tags. There's no way to re-enable them except by rebooting (or using > > setpci, I guess). > > > > Why can't we allow *enabling* them here if they're supported in this > > hierarchy? > Yes, we can also provide this sysfs to enable 10-bit tag for EP devices > when the hierarchy supports 10-bit tags. > > I do not want to provide sysfs to enable/disable 10-bit tag for RP > devices as I can not tell current if the the Function has outstanding > Non-Posted Requests, may need to unbind all the EP drivers under the > RP, and current seems no scenario need to do this. This will make things > more complex. You mean "no scenario requires disabling 10-bit tags and then re-enabling them"? That may be true, but I'm still hesitant to provide a switch than can only be reversed by rebooting. This is similar to the issue Leon raised that it's not practical to reboot machines. Maybe we accept a one-way switch if the sole purpose is to work around a hardware defect. Or maybe a kernel parameter that disables 10-bit tags completely is the defect mitigation. I think we probably need such a parameter in case a defect prevents us from booting far enough to use the sysfs switch.