From patchwork Thu May 25 13:35:18 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ding Tianhong X-Patchwork-Id: 9748387 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 1520D60246 for ; Thu, 25 May 2017 13:36:53 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 023AE28068 for ; Thu, 25 May 2017 13:36:53 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id E99DB2808F; Thu, 25 May 2017 13:36:52 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.9 required=2.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID autolearn=ham version=3.3.1 Received: from bombadil.infradead.org (bombadil.infradead.org [65.50.211.133]) (using TLSv1.2 with cipher AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id ECD6C28068 for ; Thu, 25 May 2017 13:36:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:Date: Message-ID:From:References:To:Subject:Reply-To:Content-ID:Content-Description :Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=C03YZdut92Wo1SIBu/xMzCOpdOA/dSmwwpBkCHwTM8k=; b=Pq9Tw2TxcKwJPh YBvZmC3J4sDDGlr7BLSwSUqUEW2+dMRFnxHFXEcL81NBI4npE/ZLdCPooxxxggFD7FY19uoyTpeHo 4R2HOwxNcZycYt3m/3OwK7dzZ8YVXo0FEZzu80VBc5KnSGmR1zxJ5WNUTpPHKMhQ6ba3nqW7+qxi5 XcNWzyATWDwuleU8RlA40OK2Z32CKEfrHsLky9ca4Fp+vPUtevGBzRvvwthxzkPTPt9tJ9QoP9CB3 H2Ik8Xr525NiBgE8Y8f3G1t53/6GE+zrpjNDZNzAYpZQxHRWM6EcjcB8ZT6hFc/ZDbNSYqmu5H6cW Nk5suL8RwY4cGwebjxBQ==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.87 #1 (Red Hat Linux)) id 1dDswd-0007Rx-LZ; Thu, 25 May 2017 13:36:51 +0000 Received: from szxga01-in.huawei.com ([45.249.212.187]) by bombadil.infradead.org with esmtps (Exim 4.87 #1 (Red Hat Linux)) id 1dDswZ-0007Pb-CB for linux-arm-kernel@lists.infradead.org; Thu, 25 May 2017 13:36:50 +0000 Received: from 172.30.72.54 (EHLO DGGEML404-HUB.china.huawei.com) ([172.30.72.54]) by dggrg01-dlp.huawei.com (MOS 4.4.6-GA FastPath queued) with ESMTP id APF06305; Thu, 25 May 2017 21:35:35 +0800 (CST) Received: from [127.0.0.1] (10.177.23.32) by DGGEML404-HUB.china.huawei.com (10.3.17.39) with Microsoft SMTP Server id 14.3.301.0; Thu, 25 May 2017 21:35:23 +0800 Subject: Re: [PATCH 1/2] PCI: Add new PCIe Fabric End Node flag, PCI_DEV_FLAGS_NO_RELAXED_ORDERING To: Casey Leedom , Alexander Duyck References: <758d0e431c732fe133e7b0e660bde5fc1beccdba.1493678834.git.leedom@chelsio.com> <20170502165329.GB26406@linux.intel.com> <22c46382-5778-022f-d0bd-74abec9e9c7c@huawei.com> From: Ding Tianhong Message-ID: <2eab1a1d-3444-fe11-7626-5b6459e954f8@huawei.com> Date: Thu, 25 May 2017 21:35:18 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.4.0 MIME-Version: 1.0 In-Reply-To: X-Originating-IP: [10.177.23.32] X-CFilter-Loop: Reflected X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A090203.5926DDA9.00BE, ss=1, re=0.000, recu=0.000, reip=0.000, cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2014-11-16 11:51:01, dmn=2013-03-21 17:37:32 X-Mirapoint-Loop-Id: 188ab0a44422ae6adf4e130bb2b62f71 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20170525_063648_778340_D79BB345 X-CRM114-Status: GOOD ( 41.66 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Mark Rutland , Gabriele Paoloni , Asit K Mallick , Catalin Marinas , Will Deacon , LinuxArm , "Raj, Ashok" , Bjorn Helgaas , Ganesh GR , Jeff Kirsher , Bob Shaw , Patrick J Cramer , "Arjun V." , Michael Werner , "linux-arm-kernel@lists.infradead.org" , Amir Ancel , Netdev , David Laight , Suravee Suthikulpanit , Robin Murphy , David Miller , h Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+patchwork-linux-arm=patchwork.kernel.org@lists.infradead.org X-Virus-Scanned: ClamAV using ClamSMTP On 2017/5/9 8:48, Casey Leedom wrote: > > | From: Alexander Duyck > | Date: Saturday, May 6, 2017 11:07 AM > | > | | From: Ding Tianhong > | | Date: Fri, May 5, 2017 at 8:08 PM > | | > | | According the suggestion, I could only think of this code: > | | .. > | > | This is a bit simplistic but it is a start. > > Yes, something tells me that this is going to be more complicated than any > of us like ... > > | The other bit I was getting at is that we need to update the core PCIe > | code so that when we configure devices and the root complex reports no > | support for relaxed ordering it should be clearing the relaxed > | ordering bits in the PCIe configuration registers on the upstream > | facing devices. > > Of course, this can be written to by the Driver at any time ... and is in > the case of the cxgb4 Driver ... > > After a lot of rummaging around, it does look like KVM prohibits writes to > the PCIe Capability Device Control register in drivers/xen/xen-pciback/ > conf_space_capability.c and conf_space.c simply because writes aren't > allowed unless "permissive" is set. So it ~looks~ like a driver running in > a Virtual Machine can't turn Enable Relaxed Ordering back on ... > > | The last bit we need in all this is a way to allow for setups where > | peer-to-peer wants to perform relaxed ordering but for writes to the > | host we have to not use relaxed ordering. For that we need to enable a > | special case and that isn't handled right now in any of the solutions > | we have coded up so far. > > Yes, we do need this. > > > | From: Alexander Duyck > | Date: Saturday, May 8, 2017 08:22 AM > | > | The problem is we need to have something that can be communicated > | through a VM. Your change doesn't work in that regard. That was why I > | suggested just updating the code so that we when we initialized PCIe > | devices what we do is either set or clear the relaxed ordering bit in > | the PCIe device control register. That way when we direct assign an > | interface it could know just based on the bits int the PCIe > | configuration if it could use relaxed ordering or not. > | > | At that point the driver code itself becomes very simple since you > | could just enable the relaxed ordering by default in the igb/ixgbe > | driver and if the bit is set or cleared in the PCIe configuration then > | we are either sending with relaxed ordering requests or not and don't > | have to try and locate the root complex. > | > | So from the sound of it Casey has a special use case where he doesn't > | want to send relaxed ordering frames to the root complex, but instead > | would like to send them to another PCIe device. To do that he needs to > | have a way to enable the relaxed ordering bit in the PCIe > | configuration but then not send any to the root complex. Odds are that > | is something he might be able to just implement in the driver, but is > | something that may become a more general case in the future. I don't > | see our change here impacting it as long as we keep the solution > | generic and mostly confined to when we instantiate the devices as the > | driver could likely make the decision to change the behavior later. > > It's not just me. Intel has said that while RO directed at the Root > Complex Host Coherent Memory has a performance bug (not Data Corruption), > it's a performance win for Peer-to-Peer writes to MMIO Space. (I'll be very > interested in hearing what the bug is if we get that much detail. The very > same TLPs directed to the Root Complex Port without Relaxed Ordering set get > good performance. So this is essentially a bug in the hardware that was > ~trying~ to implement a performance win.) > > Meanwhile, I currently only know of a single PCIe End Point which causes > catastrophic results: the AMD A1100 ARM SoC ("SEATTLE"). And it's not even > clear that product is even alive anymore since I haven't been able to get > any responses from them for several months. > > What I'm saying is: let's try to architect a solution which doesn't throw > the baby out with the bath water ... > > I think that if a Device's Root Complex Port has problems with Relaxed > Ordering, it ~probably~ makes sense to turn off the PCIe Capability Device > Control[Enable Relaxed Ordering] when we assign a device to a Virtual > Machine since the Device Driver can no longer query the Relaxed Ordering > Support of the Root Complex Port. The only down side of this would be if we > assigned two Peers to a VM in an application which wanted to do Peer-to-Peer > transfers. But that seems like a hard application to support in any case > since the PCI Bus:Slot.Function IDs for assigned Devices within a VM don't > match the actual values. > > For Devices running in the base OS/Hypervisor, their Drivers can query the > Relaxed Ordering Support for the Root Complex Port or a Peer Device. So a > simple flag within the (struct pci_dev *)->dev_flags would serve for that > along with a per-Architecture/Platform mechanism for setting it ... > > Casey > I have take a time to talk to our kvm team about how to distinguish the relaxed ordering in the VM for some vf just like 82599-vf, the probe routine looks like could work like this: 1) QEMU could emulate the platform by the Vender ID and device ID which could be read from the host. 2) The QEMU could create a virtual PCIe dev complex and recognize the PCIe bus address which come and detach from the host to the guest. 3) the PCI quirk could enable the Relaxed Ordering by the Vendor ID and Device ID. 4) The VF drivers could read the flag and set to the hw. So I think we could set the PCI_DEV_FLAGS_RELAXED_ORDERING_ENABLED for some special platform and don't enable by default, if I miss something, please not hesitate to enlighten me :) -------------------------------------------------------------- Ding > . > diff --git a/drivers/pci/quirks.c b/drivers/pci/quirks.c index 085fb78..74bcc25 100644 --- a/drivers/pci/quirks.c +++ b/drivers/pci/quirks.c @@ -4664,3 +4664,22 @@ static void quirk_intel_no_flr(struct pci_dev *dev) } DECLARE_PCI_FIXUP_EARLY(PCI_VENDOR_ID_INTEL, 0x1502, quirk_intel_no_flr); DECLARE_PCI_FIXUP_EARLY(PCI_VENDOR_ID_INTEL, 0x1503, quirk_intel_no_flr); + +/* + * Some devices have problems with Transaction Layer Packets with the Relaxed + * Ordering Attribute set, so we should disable Relaxed Ordering by default + * and only enable it when some devices has mark themselves and other + * Device Drivers should check before sending TLPs with RO set. + */ +static void quirk_relaxedordering_enable(struct pci_dev *dev) +{ + dev->dev_flags &= ~PCI_DEV_FLAGS_RELAXED_ORDERING_ENABLED; +} + +/* + * Hisilicon Root Complex could support relaxed ordering which can + * improve performance with Upstream Transaction Layer Packets with + * Relaxed Ordering set. + */ +DECLARE_PCI_FIXUP_CLASS_EARLY(PCI_VENDOR_ID_HUAWEI, 0x1610, PCI_CLASS_NOT_DEFINED, 8, + quirk_relaxedordering_enable); diff --git a/include/linux/pci.h b/include/linux/pci.h index 33c2b0b..f7d8d6f 100644 --- a/include/linux/pci.h +++ b/include/linux/pci.h @@ -183,6 +183,8 @@ enum pci_dev_flags { PCI_DEV_FLAGS_BRIDGE_XLATE_ROOT = (__force pci_dev_flags_t) (1 << 9), /* Do not use FLR even if device advertises PCI_AF_CAP */ PCI_DEV_FLAGS_NO_FLR_RESET = (__force pci_dev_flags_t) (1 << 10), + /* Use Relaxed Ordering for TLPs directed at this device */ + PCI_DEV_FLAGS_RELAXED_ORDERING_ENABLED = (__force pci_dev_flags_t) (1 << 11), }; enum pci_irq_reroute_variant { @@ -2203,6 +2205,20 @@ static inline bool pci_is_thunderbolt_attached(struct pci_dev *pdev) return false; } +/** + * pci_is_dev_relaxed_ordering_enabled - whether device could support Relaxed + * Ordering for TLPs directed. + * @pdev: PCI device to check + * + * This function could return the value indicates that whether Relaxed Ordering + * Attribute could be used on Transaction Layer Packets destined for the PCIe + * End Node. + */ +static inline boot pci_is_dev_relaxed_ordering_enabled(struct pci_dev *pdev) +{ + return (pdev->dev_flags & PCI_DEV_FLAGS_RELAXED_ORDERING_ENABLED) == + PCI_DEV_FLAGS_RELAXED_ORDERING_ENABLED; /* provide the legacy pci_dma_* API */ #include Thanks