On Tue, 2023-11-07 at 16:30 -0600, Bjorn Helgaas wrote: > [+cc Rafael, just FYI re 04b12ef163d1 ("PCI: vmd: Honor ACPI _OSC on > PCIe features")] > > On Tue, Nov 07, 2023 at 02:50:57PM -0700, Nirmal Patel wrote: > > On Thu, 2023-11-02 at 16:49 -0700, Nirmal Patel wrote: > > > On Thu, 2023-11-02 at 15:41 -0500, Bjorn Helgaas wrote: > > > > On Thu, Nov 02, 2023 at 01:07:03PM -0700, Nirmal Patel wrote: > > > > > On Wed, 2023-11-01 at 17:20 -0500, Bjorn Helgaas wrote: > > > > > > On Tue, Oct 31, 2023 at 12:59:34PM -0700, Nirmal Patel > > > > > > wrote: > > > > > > > On Tue, 2023-10-31 at 10:31 -0500, Bjorn Helgaas wrote: > > > > > > > > On Mon, Oct 30, 2023 at 04:16:54PM -0400, Nirmal Patel > > > > > > > > wrote: > > > > > > > > > VMD Hotplug should be enabled or disabled based on > > > > > > > > > VMD > > > > > > > > > rootports' Hotplug configuration in BIOS. > > > > > > > > > is_hotplug_bridge > > > > > > > > > is set on each VMD rootport based on Hotplug capable > > > > > > > > > bit > > > > > > > > > in > > > > > > > > > SltCap in probe.c. Check is_hotplug_bridge and > > > > > > > > > enable or > > > > > > > > > disable native_pcie_hotplug based on that value. > > > > > > > > > > > > > > > > > > Currently VMD driver copies ACPI settings or platform > > > > > > > > > configurations for Hotplug, AER, DPC, PM, etc and > > > > > > > > > enables > > > > > > > > > or > > > > > > > > > disables these features on VMD bridge which is not > > > > > > > > > correct > > > > > > > > > in case of Hotplug. > > > > > > > > > > > > > > > > This needs some background about why it's correct to > > > > > > > > copy > > > > > > > > the > > > > > > > > ACPI settings in the case of AER, DPC, PM, etc, but > > > > > > > > incorrect > > > > > > > > for hotplug. > > > > > > > > > > > > > > > > > Also during the Guest boot up, ACPI settings along > > > > > > > > > with > > > > > > > > > VMD > > > > > > > > > UEFI driver are not present in Guest BIOS which > > > > > > > > > results > > > > > > > > > in > > > > > > > > > assigning default values to Hotplug, AER, DPC, etc. > > > > > > > > > As a > > > > > > > > > result Hotplug is disabled on VMD in the Guest OS. > > > > > > > > > > > > > > > > > > This patch will make sure that Hotplug is enabled > > > > > > > > > properly > > > > > > > > > in Host as well as in VM. > > > > > > > > > > > > > > > > Did we come to some consensus about how or whether _OSC > > > > > > > > for > > > > > > > > the host bridge above the VMD device should apply to > > > > > > > > devices > > > > > > > > in the separate domain below the VMD? > > > > > > > > > > > > > > We are not able to come to any consensus. Someone > > > > > > > suggested > > > > > > > to > > > > > > > copy either all _OSC flags or none. But logic behind that > > > > > > > assumption is that the VMD is a bridge device which is > > > > > > > not > > > > > > > completely true. VMD is an endpoint device and it owns > > > > > > > its > > > > > > > domain. > > > > > > > > > > > > Do you want to facilitate a discussion in the PCI firmware > > > > > > SIG > > > > > > about this? It seems like we may want a little text in the > > > > > > spec > > > > > > about how to handle this situation so platforms and OSes > > > > > > have > > > > > > the > > > > > > same expectations. > > > > > > > > > > The patch 04b12ef163d1 broke intel VMD's hotplug capabilities > > > > > and > > > > > author did not test in VM environment impact. > > > > > We can resolve the issue easily by > > > > > > > > > > #1 Revert the patch which means restoring VMD's original > > > > > functionality > > > > > and author provide better fix. > > > > > > > > > > or > > > > > > > > > > #2 Allow the current change to re-enable VMD hotplug inside > > > > > VMD > > > > > driver. > > > > > > > > > > There is a significant impact for our customers hotplug use > > > > > cases > > > > > which > > > > > forces us to apply the fix in out-of-box drivers for > > > > > different > > > > > OSs. > > > > > > > > I agree 100% that there's a serious problem here and we need to > > > > fix > > > > it, there's no argument there. > > > > > > > > I guess you're saying it's obvious that an _OSC above VMD does > > > > not > > > > apply to devices below VMD, and therefore, no PCI Firmware SIG > > > > discussion or spec clarification is needed? > > > > > > Yes. By design VMD is an endpoint device to OS and its domain is > > > privately owned by VMD only. I believe we should revert back to > > > original design and not impose _OSC settings on VMD domain which > > > is > > > also a maintainable solution. > > > > I will send out revert patch. The _OSC settings shouldn't apply > > to private VMD domain. > > I assume you mean to revert 04b12ef163d1 ("PCI: vmd: Honor ACPI _OSC > on PCIe features"). That appeared in v5.17, and it fixed (or at > least > prevented) an AER message flood. We can't simply revert 04b12ef163d1 > unless we first prevent that AER message flood in another way. Hi Bjorn, The patch 04b12ef163d1 has broken the VMD driver for HyperVisor guest. However We dont need to revert AER issue which was fixed in v5.17 to fix current broken VMD driver for VM. The proposed solution is cleanest and easiest to maintain because of the following reasons. There is only one separate setting for Hotplug for VMD and this patch honors that while also keeping AER, DPC settings same as global BIOS settings or _OSC settings. Also sltCap is passed in both Host and Guest OS which means Hotplug is enabled and/or disabled correctly without HyperVisor's interference. And Hotplug functionality works both in VM and Host. Also keep in mind _OSC flags are not passed in VM from HyperVisor. The AER issue is seen only in Client system because client BIOS doesn't expose globale AER settings. So the patch 04b12ef163d1 helps us with this limitation by copying _OSC flags. I also tried different solutions since your last response but none of them are as clean as the proposed patch. #1 VMD UEFI driver writes nvram EFI variable and VMD Linux driver readsit and configure all the flags. But this solution requires VMD driver to call efivar_get_variable and make VMD driver dependent on EFI module which is not good also with VMD UEFI driver changes. Also reading this variable in VM adds another challenge. This solution is not backword compatible since efivar_get_variable was added a couple of years ago. #2 I also looked at sysfs knob solution suggested by Kai-heng but it requires user access to the driver and driver reload in addition to sysfs knob not being persistent across reboots. #3 Boot parameter - Adding boot parameters for all the flags require at least 5 new parameters and not a good solution. #4 Write a value for AER,DPC, Hotplug in to the VMD scratchpad registers and read them during bootup to configure all the functionalities. This adds more complexity in VMD UEFI driver since it has to read global BIOS settings and write them in scratchpad registers. VMD Linux driver needs to know if it is in VM or not and read the scratchpad register to configure Hotplug, AER, DPC, etc. Thanks nirmal > > Bjorn > > > Even the patch 04b12ef163d1 needs more changes to make sure _OSC > > settings are passed on from Host BIOS to Guest BIOS which means > > involvement of ESXi, Windows HyperV, KVM.