From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.0 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 20A3CC433E1 for ; Tue, 30 Jun 2020 17:00:26 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id F2A7620768 for ; Tue, 30 Jun 2020 17:00:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593536426; bh=OyZ+omFW90H968tlnQPxTsEGQ+ZnRPIJilI6YZvFABE=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=JwQ0DVRIhwW5/Vo7Mr89JFfGJBE7E+Pzy0W9s3j0IpG/GrgfmqM4Q9mVhUIzsB552 ESw/82KtCpa3MGE4/+TJ+BbMU1cULKcXS+1a0AFTT7CS3RQhAgY+J/6EHR65GjOUVZ eXBCL9jZBaxPo4eNU7LQycKAl2+8UGqm+R5MNIC0= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389893AbgF3RAZ (ORCPT ); Tue, 30 Jun 2020 13:00:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:54466 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727850AbgF3RAY (ORCPT ); Tue, 30 Jun 2020 13:00:24 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 86D562074D; Tue, 30 Jun 2020 17:00:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593536424; bh=OyZ+omFW90H968tlnQPxTsEGQ+ZnRPIJilI6YZvFABE=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=K45nhmz01hL7sCVhpvbNV5JtcuCc6hXl+kjXibX1Ykjsq5r+dfPQfJXmtFL/Tjt8A RKKacGE9MPcunFcTLy3SLGAGLhJuVahoFkd1l3GxQ3hpNOWP2HuvMz2vEdGCLLVEE6 vOKLRHIFxKeBGjKGSyYZwNfEMXAKP1uS4UeHxB2c= Date: Tue, 30 Jun 2020 19:00:12 +0200 From: Greg Kroah-Hartman To: "Rafael J. Wysocki" Cc: Rajat Jain , Heikki Krogerus , David Woodhouse , Lu Baolu , Joerg Roedel , Bjorn Helgaas , "Rafael J. Wysocki" , Len Brown , "open list:AMD IOMMU (AMD-VI)" , Linux Kernel Mailing List , Linux PCI , ACPI Devel Maling List , Raj Ashok , lalithambika.krishnakumar@intel.com, Mika Westerberg , Jean-Philippe Brucker , Prashant Malani , Benson Leung , Todd Broch , Alex Levin , Mattias Nissler , Rajat Jain , Bernie Keany , Aaron Durbin , Diego Rivas , Duncan Laurie , Furquan Shaikh , Jesse Barnes , Christian Kellner , Alex Williamson , Oliver O'Halloran , Saravana Kannan , Suzuki K Poulose , Arnd Bergmann Subject: Re: [PATCH v2 5/7] driver core: Add device location to "struct device" and expose it in sysfs Message-ID: <20200630170012.GB1894898@kroah.com> References: <20200630044943.3425049-1-rajatja@google.com> <20200630044943.3425049-6-rajatja@google.com> <20200630104948.GC856968@kuha.fi.intel.com> <20200630125216.GA1109228@kroah.com> <20200630153816.GD1785141@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-pci-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-pci@vger.kernel.org On Tue, Jun 30, 2020 at 06:08:31PM +0200, Rafael J. Wysocki wrote: > On Tue, Jun 30, 2020 at 5:38 PM Greg Kroah-Hartman > wrote: > > > > On Tue, Jun 30, 2020 at 03:00:34PM +0200, Rafael J. Wysocki wrote: > > > On Tue, Jun 30, 2020 at 2:52 PM Greg Kroah-Hartman > > > wrote: > > > > > > > > On Tue, Jun 30, 2020 at 01:49:48PM +0300, Heikki Krogerus wrote: > > > > > On Mon, Jun 29, 2020 at 09:49:41PM -0700, Rajat Jain wrote: > > > > > > Add a new (optional) field to denote the physical location of a device > > > > > > in the system, and expose it in sysfs. This was discussed here: > > > > > > https://lore.kernel.org/linux-acpi/20200618184621.GA446639@kroah.com/ > > > > > > > > > > > > (The primary choice for attribute name i.e. "location" is already > > > > > > exposed as an ABI elsewhere, so settled for "site"). Individual buses > > > > > > that want to support this new attribute can opt-in by setting a flag in > > > > > > bus_type, and then populating the location of device while enumerating > > > > > > it. > > > > > > > > > > So why not just call it "physical_location"? > > > > > > > > That's better, and will allow us to put "3rd blue plug from the left, > > > > 4th row down" in there someday :) > > > > > > > > All of this is "relative" to the CPU, right? But what CPU? Again, how > > > > are the systems with drawers of PCI and CPUs and memory that can be > > > > added/removed at any point in time being handled here? What is > > > > "internal" and "external" for them? > > > > > > > > What exactly is the physical boundry here that is attempting to be > > > > described? > > > > > > Also, where is the "physical location" information going to come from? > > > > Who knows? :) > > > > Some BIOS seem to provide this, but do you trust that? > > > > > If that is the platform firmware (which I suspect is the anticipated > > > case), there may be problems with reliability related to that. > > > > s/may/will/ > > > > which means making the kernel inact a policy like this patch series > > tries to add, will result in a lot of broken systems, which is why I > > keep saying that it needs to be done in userspace. > > > > It's as if some of us haven't been down this road before and just keep > > being ignored... > > > > {sigh} > > Well, to be honest, if you are a "vertical" vendor and you control the > entire stack, *including* the platform firmware, it would be kind of > OK for you to do that in a product kernel. > > However, this is not a practical thing to do in the mainline kernel > which must work for everybody, including people who happen to use > systems with broken or even actively unfriendly firmware on them. > > So I'm inclined to say that IMO this series "as is" would not be an > improvement from the mainline perspective. It can be, we have been using this for USB devices for many many years now, quite successfully. The key is not to trust that the platform firmware got it right :) > I guess it would make sense to have an attribute for user space to > write to in order to make the kernel reject device plug-in events > coming from a given port or connector, but the kernel has no reliable > means to determine *which* ports or connectors are "safe", and even if > there was a way for it to do that, it still may not agree with user > space on which ports or connectors should be regarded as "safe". Again, we have been doing this for USB devices for a very long time, PCI shouldn't be any different. Why people keep ignoring working solutions is beyond me, there's nothing "special" about PCI devices here for this type of "worry" or reasoning to try to create new solutions. So, again, I ask, go do what USB does, and to do that, take the logic out of the USB core, make it bus-agnositic, and _THEN_ add it to the PCI code. Why the original submitter keeps ignoring my request to do this is beyond me, I guess they like making patches that will get rejected :( thanks, greg k-h