From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-17.3 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_CR_TRAILER,INCLUDES_PATCH,MAILING_LIST_MULTI,NICE_REPLY_A, SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6462BC433ED for ; Mon, 12 Apr 2021 13:03:12 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 2EA1661003 for ; Mon, 12 Apr 2021 13:03:12 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241597AbhDLND3 (ORCPT ); Mon, 12 Apr 2021 09:03:29 -0400 Received: from mail-eopbgr750088.outbound.protection.outlook.com ([40.107.75.88]:17027 "EHLO NAM02-BL2-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S240831AbhDLND1 (ORCPT ); Mon, 12 Apr 2021 09:03:27 -0400 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Bd4DCsR/TY3kk5jSsZPdNP0XRpzBvb92Rc649CDqCi4WbWJf+hRLYAyIFpA9uD/65CpqTYW2ht7ZFoBkkLi2ESb6Ur/qr4ab2pVotHoJyE5EpdGZjXZfqLg/igZkXJvUOzgI955WzfxTwGxY7rB5edo8K6rdzSPBQRFljed5j4NIYXNYggOn4vDJdUVMDQvCcZZR422Bk6Bg5l4eZf8pPEamjXkkhSlQyQHEpx0vc6cD/sc/asPOVYvSElqLdrDvI46O0ISdOBAvoupPOR8KH9+riw/7jAGs6F9LnmU78Y7sjkP1uLgJhgeolSbXDh81T8OnutALIPE1KvKI0+PZRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sq8t+FBOGTjAhjk9dWbDVytwx4VgGpGHpd+imKimOfA=; b=RXPFc6EcISKAMliAnUdVWM68UqgKVE9zT11QxuaUCf1nsBBq+I/w/7JUwVERvoPCSaBozgqEHb9mjtltHgaHlhY4aRaG69k5sFd2JccIwyUMzmk9lzKvUHaDF79qB6LPLmW3mRrBjzW6w3TNQMbq+5Xdq9NzwFeqerC7+UxsbbQATYTD/xawFMT+qrEGyaBBWqArEgH9SRgSOAIcEfZ0TvnQKxGqWrYU0RxcMWGHJeqfNZL0+Pm7x8APaceae6nqtHeLhQXTbtmtatw+sFwx2Zs1AAmj3CQBIN/yyqxAUSglevd4uLqcAaaTEdReJTDusEVF0o3Xlaar+USmuviSCw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.112.34) smtp.rcpttodomain=redhat.com smtp.mailfrom=nvidia.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sq8t+FBOGTjAhjk9dWbDVytwx4VgGpGHpd+imKimOfA=; b=FGsMiG6tLOF5767lxqotZ8prz/S2OT62Rew4iRZkzuO/BI6gfbj/u0M/4F+uJhy182JmaGhgHVnUHToY05KHfjzXunFMdU76OhXUjENWDFq+aMc9AtC3ZFYkyj+rQ5Jk5dpXI+efjB1C252XjwB7+Npsup4/RtdeCmyVlLNHKMe7tuAqXNGQHCeMXPlRBtPCXvmC+l5APQNC7wcTxiq9kiMSLXd4VPd4IkQGgiyzcZTuGW5ahP1jHwmQ7+nKO8eRsuC/w8a8mVdiOxRL6jul+rycgFq4trz8pY7ucliXrhzKQDPanqtHZLUdg/HekxVwM1Q87ub1hnB1SPJtRHWr5A== Received: from BN9PR11CA0012.namprd11.prod.outlook.com (2603:10b6:408:10b::12) by BYAPR12MB2663.namprd12.prod.outlook.com (2603:10b6:a03:72::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4020.16; Mon, 12 Apr 2021 13:03:07 +0000 Received: from BN8NAM11FT063.eop-nam11.prod.protection.outlook.com (2603:10b6:408:10b:cafe::bd) by BN9PR11CA0012.outlook.office365.com (2603:10b6:408:10b::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4020.21 via Frontend Transport; Mon, 12 Apr 2021 13:03:07 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.112.34) smtp.mailfrom=nvidia.com; redhat.com; dkim=none (message not signed) header.d=none;redhat.com; dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.112.34 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.112.34; helo=mail.nvidia.com; Received: from mail.nvidia.com (216.228.112.34) by BN8NAM11FT063.mail.protection.outlook.com (10.13.177.110) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.4020.17 via Frontend Transport; Mon, 12 Apr 2021 13:03:07 +0000 Received: from [172.27.0.90] (172.20.145.6) by HQMAIL107.nvidia.com (172.20.187.13) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 12 Apr 2021 13:03:05 +0000 Subject: Re: [PATCH v2 1/3] virtio: update reset callback to return status To: "Michael S. Tsirkin" CC: Jason Wang , , , , , References: <20210408081109.56537-1-mgurtovoy@nvidia.com> <16fa0e31-a305-3b41-b0d3-ad76aa00177b@redhat.com> <1f134102-4ccb-57e3-858d-3922d851ce8a@nvidia.com> <20210408115524-mutt-send-email-mst@kernel.org> <31fa92ca-bce5-b71f-406d-8f3951b2143c@nvidia.com> <20210412080051-mutt-send-email-mst@kernel.org> From: Max Gurtovoy Message-ID: Date: Mon, 12 Apr 2021 16:03:02 +0300 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.9.1 MIME-Version: 1.0 In-Reply-To: <20210412080051-mutt-send-email-mst@kernel.org> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-Originating-IP: [172.20.145.6] X-ClientProxiedBy: HQMAIL105.nvidia.com (172.20.187.12) To HQMAIL107.nvidia.com (172.20.187.13) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 5816fb1f-48f9-4d90-e44c-08d8fdb3510d X-MS-TrafficTypeDiagnostic: BYAPR12MB2663: X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:8882; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 38wpF0NNdWpM/MVB3mWTd0c2r5IR+MA4gCDcusZaEwatWVLrLn+7LOX7d2K5wNeqGmHmwvi0BoKap5j11A62ZldtXzW27IU++u++/9l6WC+JXW2E3VF1x2qivsy3Lv2WicK62RRpXbNE5wTYgAQSUPdhQi2Uzvb4IDSxB15m2ud3UXZXMwHG83NZ1IJAgodOqA34yZNxhsBotffOuZmGp+k6AI+MMy/EM9ymJq9UdTdHHRQkfru1m3OsENFwGjl6kzeOMl3IvLqa29kFiAZ7IrzQtFikIOXoFS7VG0bp88HcXT/uq7NkDyAqp3e2fVQ+EPf0EepIKFw+dLsqrscGAqDejVA1wGDtGME2yVL+GHs5TmkqeUU0i41FJPv6/6tA1006CJiqVabfwAgPpYu6ovX7KCCXV7rTQXh4MBNsRaQDbqmfZY5ppknpglljRbRlmVCrfAU7ojLyrYxHEz9vj86yYc245dJ4LU+LGKmlCpUFVEnVxPRAWiu07DfY+05D07F5opFpdzBwaqEq2xq8zd9e1aTUYLdLB5M1K5kKFcKd9mdu8E/hlcNn2OJfWPUypMJjXpyAar+q3Z/c8uI7WBpfN1VaCLDKvMI9fPzMKNGvD6qXdoU3CjgOpxS/I3vQjSwTvpyys6xrn0Ne1LAFyr/6gRrsDX4tt1CWKGIMRQ5QZMQsjT8u1d5zsSnw0I6kIqz5TUwyT9VlBKckwHXCVQ== X-Forefront-Antispam-Report: CIP:216.228.112.34;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:mail.nvidia.com;PTR:schybrid03.nvidia.com;CAT:NONE;SFS:(4636009)(396003)(136003)(39860400002)(346002)(376002)(36840700001)(46966006)(31686004)(8676002)(336012)(186003)(36860700001)(54906003)(36906005)(70206006)(47076005)(16576012)(316002)(16526019)(86362001)(26005)(478600001)(8936002)(36756003)(7636003)(31696002)(82310400003)(53546011)(30864003)(15650500001)(426003)(2616005)(83380400001)(6916009)(356005)(6666004)(4326008)(5660300002)(2906002)(70586007)(82740400003)(60764002)(43740500002);DIR:OUT;SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Apr 2021 13:03:07.1984 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 5816fb1f-48f9-4d90-e44c-08d8fdb3510d X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a;Ip=[216.228.112.34];Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: BN8NAM11FT063.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR12MB2663 Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org On 4/12/2021 3:04 PM, Michael S. Tsirkin wrote: > On Mon, Apr 12, 2021 at 02:55:27PM +0300, Max Gurtovoy wrote: >> On 4/8/2021 6:56 PM, Michael S. Tsirkin wrote: >>> On Thu, Apr 08, 2021 at 12:56:52PM +0300, Max Gurtovoy wrote: >>>> On 4/8/2021 11:58 AM, Jason Wang wrote: >>>>> 在 2021/4/8 下午4:11, Max Gurtovoy 写道: >>>>>> The reset device operation, usually is an operation that might fail from >>>>>> various reasons. For example, the controller might be in a bad state and >>>>>> can't answer to any request. Usually, the paravirt SW based virtio >>>>>> devices always succeed in reset operation but this is not the case for >>>>>> HW based virtio devices. >>>>> I would like to know under what condition that the reset operation may >>>>> fail (except for the case of a bugg guest). >>>> The controller might not be ready or stuck. This is a real use case for many >>>> PCI devices. >>>> >>>> For real devices the FW might be in a bad state and it can happen also for >>>> paravirt device if you have a bug in the controller code or if you entered >>>> some error flow (Out of memory). >>>> >>>> You don't want to be stuck because of one bad device. >>> OK so maybe we can do more to detect the bad device. >>> Won't we get all 1's on a read in this case? >> No. how can we guarantee it ? >> > Well this is what you tend to get if e.g. you disable device memory. > > Anyway, you know about hardware, I don't ... It's not returning 0 after > reset as it should ... what does it return? Hopefully not random noise - > I don't think it's very practical to write a driver for a device that > starts doing that at random times ... The device may return 0x40 (NEEDS_RESET). It doesn't have to return all 1's. For paravirt devices, think of a situation that you can't allocate some internal buffers (malloc failed) and you want to wait for few seconds until the system memory will free some pages. So you may return NEEDS_RESET that indicates some error state of the device. Once the system memory freed by other application for example, your internal virtio device malloc succeeded and you may return 0. In this case, you don't want to stall the other virtio devices to probe (they might be real HW devices that driven by the same driver), right ? > >>> >>>>>> This commit is also a preparation for adding a timeout mechanism for >>>>>> resetting virtio devices. >>>>>> >>>>>> Signed-off-by: Max Gurtovoy >>>>>> --- >>>>>> >>>>>> changes from v1: >>>>>>   - update virtio_ccw.c (Cornelia) >>>>>>   - update virtio_uml.c >>>>>>   - update mlxbf-tmfifo.c >>>>> Note that virtio driver may call reset, so you probably need to convert >>>>> them. >>>> I'm sure I understand. >>>> >>>> Convert to what ? >>>> >>>> Thanks. >>>> >>>>> Thanks >>>>> >>>>> >>>>>> --- >>>>>>   arch/um/drivers/virtio_uml.c             |  4 +++- >>>>>>   drivers/platform/mellanox/mlxbf-tmfifo.c |  4 +++- >>>>>>   drivers/remoteproc/remoteproc_virtio.c   |  4 +++- >>>>>>   drivers/s390/virtio/virtio_ccw.c         |  9 ++++++--- >>>>>>   drivers/virtio/virtio.c                  | 22 +++++++++++++++------- >>>>>>   drivers/virtio/virtio_mmio.c             |  3 ++- >>>>>>   drivers/virtio/virtio_pci_legacy.c       |  4 +++- >>>>>>   drivers/virtio/virtio_pci_modern.c       |  3 ++- >>>>>>   drivers/virtio/virtio_vdpa.c             |  4 +++- >>>>>>   include/linux/virtio_config.h            |  5 +++-- >>>>>>   10 files changed, 43 insertions(+), 19 deletions(-) >>>>>> >>>>>> diff --git a/arch/um/drivers/virtio_uml.c b/arch/um/drivers/virtio_uml.c >>>>>> index 91ddf74ca888..b6e66265ed32 100644 >>>>>> --- a/arch/um/drivers/virtio_uml.c >>>>>> +++ b/arch/um/drivers/virtio_uml.c >>>>>> @@ -827,11 +827,13 @@ static void vu_set_status(struct virtio_device >>>>>> *vdev, u8 status) >>>>>>       vu_dev->status = status; >>>>>>   } >>>>>>   -static void vu_reset(struct virtio_device *vdev) >>>>>> +static int vu_reset(struct virtio_device *vdev) >>>>>>   { >>>>>>       struct virtio_uml_device *vu_dev = to_virtio_uml_device(vdev); >>>>>>         vu_dev->status = 0; >>>>>> + >>>>>> +    return 0; >>>>>>   } >>>>>>     static void vu_del_vq(struct virtqueue *vq) >>>>>> diff --git a/drivers/platform/mellanox/mlxbf-tmfifo.c >>>>>> b/drivers/platform/mellanox/mlxbf-tmfifo.c >>>>>> index bbc4e71a16ff..c192b8ac5d9e 100644 >>>>>> --- a/drivers/platform/mellanox/mlxbf-tmfifo.c >>>>>> +++ b/drivers/platform/mellanox/mlxbf-tmfifo.c >>>>>> @@ -980,11 +980,13 @@ static void >>>>>> mlxbf_tmfifo_virtio_set_status(struct virtio_device *vdev, >>>>>>   } >>>>>>     /* Reset the device. Not much here for now. */ >>>>>> -static void mlxbf_tmfifo_virtio_reset(struct virtio_device *vdev) >>>>>> +static int mlxbf_tmfifo_virtio_reset(struct virtio_device *vdev) >>>>>>   { >>>>>>       struct mlxbf_tmfifo_vdev *tm_vdev = mlxbf_vdev_to_tmfifo(vdev); >>>>>>         tm_vdev->status = 0; >>>>>> + >>>>>> +    return 0; >>>>>>   } >>>>>>     /* Read the value of a configuration field. */ >>>>>> diff --git a/drivers/remoteproc/remoteproc_virtio.c >>>>>> b/drivers/remoteproc/remoteproc_virtio.c >>>>>> index 0cc617f76068..ca9573c62c3d 100644 >>>>>> --- a/drivers/remoteproc/remoteproc_virtio.c >>>>>> +++ b/drivers/remoteproc/remoteproc_virtio.c >>>>>> @@ -191,7 +191,7 @@ static void rproc_virtio_set_status(struct >>>>>> virtio_device *vdev, u8 status) >>>>>>       dev_dbg(&vdev->dev, "status: %d\n", status); >>>>>>   } >>>>>>   -static void rproc_virtio_reset(struct virtio_device *vdev) >>>>>> +static int rproc_virtio_reset(struct virtio_device *vdev) >>>>>>   { >>>>>>       struct rproc_vdev *rvdev = vdev_to_rvdev(vdev); >>>>>>       struct fw_rsc_vdev *rsc; >>>>>> @@ -200,6 +200,8 @@ static void rproc_virtio_reset(struct >>>>>> virtio_device *vdev) >>>>>>         rsc->status = 0; >>>>>>       dev_dbg(&vdev->dev, "reset !\n"); >>>>>> + >>>>>> +    return 0; >>>>>>   } >>>>>>     /* provide the vdev features as retrieved from the firmware */ >>>>>> diff --git a/drivers/s390/virtio/virtio_ccw.c >>>>>> b/drivers/s390/virtio/virtio_ccw.c >>>>>> index 54e686dca6de..52b32555e746 100644 >>>>>> --- a/drivers/s390/virtio/virtio_ccw.c >>>>>> +++ b/drivers/s390/virtio/virtio_ccw.c >>>>>> @@ -732,14 +732,15 @@ static int virtio_ccw_find_vqs(struct >>>>>> virtio_device *vdev, unsigned nvqs, >>>>>>       return ret; >>>>>>   } >>>>>>   -static void virtio_ccw_reset(struct virtio_device *vdev) >>>>>> +static int virtio_ccw_reset(struct virtio_device *vdev) >>>>>>   { >>>>>>       struct virtio_ccw_device *vcdev = to_vc_device(vdev); >>>>>>       struct ccw1 *ccw; >>>>>> +    int ret; >>>>>>         ccw = ccw_device_dma_zalloc(vcdev->cdev, sizeof(*ccw)); >>>>>>       if (!ccw) >>>>>> -        return; >>>>>> +        return -ENOMEM; >>>>>>         /* Zero status bits. */ >>>>>>       vcdev->dma_area->status = 0; >>>>>> @@ -749,8 +750,10 @@ static void virtio_ccw_reset(struct >>>>>> virtio_device *vdev) >>>>>>       ccw->flags = 0; >>>>>>       ccw->count = 0; >>>>>>       ccw->cda = 0; >>>>>> -    ccw_io_helper(vcdev, ccw, VIRTIO_CCW_DOING_RESET); >>>>>> +    ret = ccw_io_helper(vcdev, ccw, VIRTIO_CCW_DOING_RESET); >>>>>>       ccw_device_dma_free(vcdev->cdev, ccw, sizeof(*ccw)); >>>>>> + >>>>>> +    return ret; >>>>>>   } >>>>>>     static u64 virtio_ccw_get_features(struct virtio_device *vdev) >>>>>> diff --git a/drivers/virtio/virtio.c b/drivers/virtio/virtio.c >>>>>> index 4b15c00c0a0a..ddbfd5b5f3bd 100644 >>>>>> --- a/drivers/virtio/virtio.c >>>>>> +++ b/drivers/virtio/virtio.c >>>>>> @@ -338,7 +338,7 @@ int register_virtio_device(struct virtio_device >>>>>> *dev) >>>>>>       /* Assign a unique device index and hence name. */ >>>>>>       err = ida_simple_get(&virtio_index_ida, 0, 0, GFP_KERNEL); >>>>>>       if (err < 0) >>>>>> -        goto out; >>>>>> +        goto out_err; >>>>>>         dev->index = err; >>>>>>       dev_set_name(&dev->dev, "virtio%u", dev->index); >>>>>> @@ -349,7 +349,9 @@ int register_virtio_device(struct virtio_device >>>>>> *dev) >>>>>>         /* We always start by resetting the device, in case a previous >>>>>>        * driver messed it up.  This also tests that code path a >>>>>> little. */ >>>>>> -    dev->config->reset(dev); >>>>>> +    err = dev->config->reset(dev); >>>>>> +    if (err) >>>>>> +        goto out_ida; >>>>>>         /* Acknowledge that we've seen the device. */ >>>>>>       virtio_add_status(dev, VIRTIO_CONFIG_S_ACKNOWLEDGE); >>>>>> @@ -362,10 +364,14 @@ int register_virtio_device(struct >>>>>> virtio_device *dev) >>>>>>        */ >>>>>>       err = device_add(&dev->dev); >>>>>>       if (err) >>>>>> -        ida_simple_remove(&virtio_index_ida, dev->index); >>>>>> -out: >>>>>> -    if (err) >>>>>> -        virtio_add_status(dev, VIRTIO_CONFIG_S_FAILED); >>>>>> +        goto out_ida; >>>>>> + >>>>>> +    return 0; >>>>>> + >>>>>> +out_ida: >>>>>> +    ida_simple_remove(&virtio_index_ida, dev->index); >>>>>> +out_err: >>>>>> +    virtio_add_status(dev, VIRTIO_CONFIG_S_FAILED); >>>>>>       return err; >>>>>>   } >>>>>>   EXPORT_SYMBOL_GPL(register_virtio_device); >>>>>> @@ -408,7 +414,9 @@ int virtio_device_restore(struct virtio_device *dev) >>>>>>         /* We always start by resetting the device, in case a previous >>>>>>        * driver messed it up. */ >>>>>> -    dev->config->reset(dev); >>>>>> +    ret = dev->config->reset(dev); >>>>>> +    if (ret) >>>>>> +        goto err; >>>>>>         /* Acknowledge that we've seen the device. */ >>>>>>       virtio_add_status(dev, VIRTIO_CONFIG_S_ACKNOWLEDGE); >>>>>> diff --git a/drivers/virtio/virtio_mmio.c b/drivers/virtio/virtio_mmio.c >>>>>> index 56128b9c46eb..12b8f048c48d 100644 >>>>>> --- a/drivers/virtio/virtio_mmio.c >>>>>> +++ b/drivers/virtio/virtio_mmio.c >>>>>> @@ -256,12 +256,13 @@ static void vm_set_status(struct virtio_device >>>>>> *vdev, u8 status) >>>>>>       writel(status, vm_dev->base + VIRTIO_MMIO_STATUS); >>>>>>   } >>>>>>   -static void vm_reset(struct virtio_device *vdev) >>>>>> +static int vm_reset(struct virtio_device *vdev) >>>>>>   { >>>>>>       struct virtio_mmio_device *vm_dev = to_virtio_mmio_device(vdev); >>>>>>         /* 0 status means a reset. */ >>>>>>       writel(0, vm_dev->base + VIRTIO_MMIO_STATUS); >>>>>> +    return 0; >>>>>>   } >>>>>>     diff --git a/drivers/virtio/virtio_pci_legacy.c >>>>>> b/drivers/virtio/virtio_pci_legacy.c >>>>>> index d62e9835aeec..0b5d95e3efa1 100644 >>>>>> --- a/drivers/virtio/virtio_pci_legacy.c >>>>>> +++ b/drivers/virtio/virtio_pci_legacy.c >>>>>> @@ -89,7 +89,7 @@ static void vp_set_status(struct virtio_device >>>>>> *vdev, u8 status) >>>>>>       iowrite8(status, vp_dev->ioaddr + VIRTIO_PCI_STATUS); >>>>>>   } >>>>>>   -static void vp_reset(struct virtio_device *vdev) >>>>>> +static int vp_reset(struct virtio_device *vdev) >>>>>>   { >>>>>>       struct virtio_pci_device *vp_dev = to_vp_device(vdev); >>>>>>       /* 0 status means a reset. */ >>>>>> @@ -99,6 +99,8 @@ static void vp_reset(struct virtio_device *vdev) >>>>>>       ioread8(vp_dev->ioaddr + VIRTIO_PCI_STATUS); >>>>>>       /* Flush pending VQ/configuration callbacks. */ >>>>>>       vp_synchronize_vectors(vdev); >>>>>> + >>>>>> +    return 0; >>>>>>   } >>>>>>     static u16 vp_config_vector(struct virtio_pci_device *vp_dev, >>>>>> u16 vector) >>>>>> diff --git a/drivers/virtio/virtio_pci_modern.c >>>>>> b/drivers/virtio/virtio_pci_modern.c >>>>>> index fbd4ebc00eb6..cc3412a96a17 100644 >>>>>> --- a/drivers/virtio/virtio_pci_modern.c >>>>>> +++ b/drivers/virtio/virtio_pci_modern.c >>>>>> @@ -158,7 +158,7 @@ static void vp_set_status(struct virtio_device >>>>>> *vdev, u8 status) >>>>>>       vp_modern_set_status(&vp_dev->mdev, status); >>>>>>   } >>>>>>   -static void vp_reset(struct virtio_device *vdev) >>>>>> +static int vp_reset(struct virtio_device *vdev) >>>>>>   { >>>>>>       struct virtio_pci_device *vp_dev = to_vp_device(vdev); >>>>>>       struct virtio_pci_modern_device *mdev = &vp_dev->mdev; >>>>>> @@ -174,6 +174,7 @@ static void vp_reset(struct virtio_device *vdev) >>>>>>           msleep(1); >>>>>>       /* Flush pending VQ/configuration callbacks. */ >>>>>>       vp_synchronize_vectors(vdev); >>>>>> +    return 0; >>>>>>   } >>>>>>     static u16 vp_config_vector(struct virtio_pci_device *vp_dev, >>>>>> u16 vector) >>>>>> diff --git a/drivers/virtio/virtio_vdpa.c b/drivers/virtio/virtio_vdpa.c >>>>>> index e28acf482e0c..5fd4e627a9b0 100644 >>>>>> --- a/drivers/virtio/virtio_vdpa.c >>>>>> +++ b/drivers/virtio/virtio_vdpa.c >>>>>> @@ -97,11 +97,13 @@ static void virtio_vdpa_set_status(struct >>>>>> virtio_device *vdev, u8 status) >>>>>>       return ops->set_status(vdpa, status); >>>>>>   } >>>>>>   -static void virtio_vdpa_reset(struct virtio_device *vdev) >>>>>> +static int virtio_vdpa_reset(struct virtio_device *vdev) >>>>>>   { >>>>>>       struct vdpa_device *vdpa = vd_get_vdpa(vdev); >>>>>>         vdpa_reset(vdpa); >>>>>> + >>>>>> +    return 0; >>>>>>   } >>>>>>     static bool virtio_vdpa_notify(struct virtqueue *vq) >>>>>> diff --git a/include/linux/virtio_config.h >>>>>> b/include/linux/virtio_config.h >>>>>> index 8519b3ae5d52..d2b0f1699a75 100644 >>>>>> --- a/include/linux/virtio_config.h >>>>>> +++ b/include/linux/virtio_config.h >>>>>> @@ -44,9 +44,10 @@ struct virtio_shm_region { >>>>>>    *    status: the new status byte >>>>>>    * @reset: reset the device >>>>>>    *    vdev: the virtio device >>>>>> - *    After this, status and feature negotiation must be done again >>>>>> + *    Upon success, status and feature negotiation must be done again >>>>>>    *    Device must not be reset from its vq/config callbacks, or in >>>>>>    *    parallel with being added/removed. >>>>>> + *    Returns 0 on success or error status. >>>>>>    * @find_vqs: find virtqueues and instantiate them. >>>>>>    *    vdev: the virtio_device >>>>>>    *    nvqs: the number of virtqueues to find >>>>>> @@ -82,7 +83,7 @@ struct virtio_config_ops { >>>>>>       u32 (*generation)(struct virtio_device *vdev); >>>>>>       u8 (*get_status)(struct virtio_device *vdev); >>>>>>       void (*set_status)(struct virtio_device *vdev, u8 status); >>>>>> -    void (*reset)(struct virtio_device *vdev); >>>>>> +    int (*reset)(struct virtio_device *vdev); >>>>>>       int (*find_vqs)(struct virtio_device *, unsigned nvqs, >>>>>>               struct virtqueue *vqs[], vq_callback_t *callbacks[], >>>>>>               const char * const names[], const bool *ctx,