From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.3 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,NICE_REPLY_A, SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 01E46C433B4 for ; Wed, 21 Apr 2021 07:54:52 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id BE2B661434 for ; Wed, 21 Apr 2021 07:54:51 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237499AbhDUHzX (ORCPT ); Wed, 21 Apr 2021 03:55:23 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:60720 "EHLO mx0b-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231463AbhDUHzV (ORCPT ); Wed, 21 Apr 2021 03:55:21 -0400 Received: from pps.filterd (m0127361.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 13L7YwmQ184653; Wed, 21 Apr 2021 03:54:28 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=subject : to : cc : references : from : message-id : date : mime-version : in-reply-to : content-type : content-transfer-encoding; s=pp1; bh=WOE3R1b3R7c75tHsejOc95dkQqk3TOGxsEnOEyMupvQ=; b=WlqwUZO58DjQwhOl6LwuyEUnCDzZSbmCCu5fnFchJoT+PEM5FRjFq/a0WI3GTeXNJmz8 4KXhzqNfAYtjr55+ZezxauSxtt9tNk4LqyJOt7FX60uSwaX5nWvySLFEfnBCXVKxTklU 36YgWToclpt0zNOk6VekfvZsLhxWNxsMLKapYSqVPYChXq900quhXuJ83BxQ0b0YtMkB lstuA4mXkep+Cwj/R++Lcd14ev5d8MGYttG32k3yMNCBN6xFUsAmWMUwP0qM8CryZ/We CgApxJowYz9QH9yTrK+uXFL5fsbLv8/DA1I1UP4+D8zN9A2ZBcDHCAlS79cz1RPk2rjq DQ== Received: from ppma04dal.us.ibm.com (7a.29.35a9.ip4.static.sl-reverse.com [169.53.41.122]) by mx0a-001b2d01.pphosted.com with ESMTP id 382espa62d-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 21 Apr 2021 03:54:28 -0400 Received: from pps.filterd (ppma04dal.us.ibm.com [127.0.0.1]) by ppma04dal.us.ibm.com (8.16.0.43/8.16.0.43) with SMTP id 13L7gdJi028644; Wed, 21 Apr 2021 07:54:27 GMT Received: from b03cxnp08027.gho.boulder.ibm.com (b03cxnp08027.gho.boulder.ibm.com [9.17.130.19]) by ppma04dal.us.ibm.com with ESMTP id 37yqaa0edu-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 21 Apr 2021 07:54:27 +0000 Received: from b03ledav001.gho.boulder.ibm.com (b03ledav001.gho.boulder.ibm.com [9.17.130.232]) by b03cxnp08027.gho.boulder.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 13L7sQnP31261332 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 21 Apr 2021 07:54:26 GMT Received: from b03ledav001.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 4E7DB6E04C; Wed, 21 Apr 2021 07:54:26 +0000 (GMT) Received: from b03ledav001.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 3A6536E050; Wed, 21 Apr 2021 07:54:24 +0000 (GMT) Received: from [9.160.109.21] (unknown [9.160.109.21]) by b03ledav001.gho.boulder.ibm.com (Postfix) with ESMTP; Wed, 21 Apr 2021 07:54:23 +0000 (GMT) Subject: Re: [PATCH V2 net] ibmvnic: Continue with reset if set link down failed To: Lijun Pan , Dany Madden Cc: David Miller , Jakub Kicinski , Tom Falcon , netdev@vger.kernel.org, paulus@samba.org, Sukadev Bhattiprolu , linuxppc-dev@lists.ozlabs.org References: <20210420213517.24171-1-drt@linux.ibm.com> <60C99F56-617D-455B-9ACF-8CE1EED64D92@linux.vnet.ibm.com> From: Rick Lindsley Message-ID: <51a63be8-9b24-3f72-71d0-111959649059@linux.vnet.ibm.com> Date: Wed, 21 Apr 2021 00:54:22 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.9.0 MIME-Version: 1.0 In-Reply-To: <60C99F56-617D-455B-9ACF-8CE1EED64D92@linux.vnet.ibm.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 X-Proofpoint-GUID: qoGb_kptybPMowIAmvtbiHa6dhgYhfzA X-Proofpoint-ORIG-GUID: qoGb_kptybPMowIAmvtbiHa6dhgYhfzA X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391,18.0.761 definitions=2021-04-21_02:2021-04-21,2021-04-21 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 mlxscore=0 malwarescore=0 impostorscore=0 bulkscore=0 adultscore=0 mlxlogscore=999 phishscore=0 clxscore=1011 suspectscore=0 lowpriorityscore=0 spamscore=0 priorityscore=1501 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2104060000 definitions=main-2104210060 Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org On 4/20/21 2:42 PM, Lijun Pan wrote: > > This v2 does not adddress the concerns mentioned in v1. > And I think it is better to exit with error from do_reset, and schedule a thorough > do_hard_reset if the the adapter is already in unstable state. But the point is that the testing and analysis has indicated that doing a full hard reset is not necessary. We are about to take the very action which will fix this situation, but currently do not. Please describe the advantage in deferring it further by routing it through do_hard_reset(). I don't see one. Rick