From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752733AbdLKOWf convert rfc822-to-8bit (ORCPT ); Mon, 11 Dec 2017 09:22:35 -0500 Received: from mga14.intel.com ([192.55.52.115]:30391 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751602AbdLKOWd (ORCPT ); Mon, 11 Dec 2017 09:22:33 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.45,391,1508828400"; d="scan'208";a="183238050" From: "Wang, Liang-min" To: Alex Williamson , Alexander Duyck CC: "Kirsher, Jeffrey T" , "kvm@vger.kernel.org" , "linux-pci@vger.kernel.org" , "linux-kernel@vger.kernel.org" , Bjorn Helgaas , "Duyck, Alexander H" Subject: RE: [PATCH v2] Enable SR-IOV instantiation through /sys file Thread-Topic: [PATCH v2] Enable SR-IOV instantiation through /sys file Thread-Index: AQHTcG4+8zIZEue7s0i4nOb7VL3wjqM6lT8AgAAF8QCAAARigIADlRNA Date: Mon, 11 Dec 2017 14:22:30 +0000 Message-ID: References: <20171208214758.6959-1-jeffrey.t.kirsher@intel.com> <20171208155802.4d1159c5@t450s.home> <20171208163459.00fc5b20@t450s.home> In-Reply-To: <20171208163459.00fc5b20@t450s.home> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-version: 11.0.0.116 dlp-reaction: no-action x-originating-ip: [10.1.200.106] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > -----Original Message----- > From: Alex Williamson [mailto:alex.williamson@redhat.com] > Sent: Friday, December 08, 2017 6:35 PM > To: Alexander Duyck > Cc: Kirsher, Jeffrey T ; Wang, Liang-min min.wang@intel.com>; kvm@vger.kernel.org; linux-pci@vger.kernel.org; linux- > kernel@vger.kernel.org; Bjorn Helgaas ; Duyck, > Alexander H > Subject: Re: [PATCH v2] Enable SR-IOV instantiation through /sys file > > On Fri, 8 Dec 2017 15:19:18 -0800 > Alexander Duyck wrote: > > > On Fri, Dec 8, 2017 at 2:58 PM, Alex Williamson > > wrote: > > > On Fri, 8 Dec 2017 13:47:58 -0800 > > > Jeff Kirsher wrote: > > > > > >> From: Liang-Min Wang > > >> > > >> When a SR-IOV capable device is bound with vfio-pci, the > > >> device loses capability of creating SR-IOV instances through /sy/bus/ > > >> pci/devices/.../sriov_numvfs. This patch re-activates this capability > > >> for a PCIe device that is SR-IOV capable and is bound with vfio-pci.ko. > > >> This patch also disables drivers_autoprobe attribute of SR-IOV devices > > >> created from vfio-pci bound device by default, so user-space PF device > > >> can coordinate the bring-up of SR-IOV devices > > >> > > >> Signed-off-by: Liang-Min Wang > > >> --- > > >> drivers/pci/pci-driver.c | 12 ++++++++++++ > > >> drivers/vfio/pci/vfio_pci.c | 22 ++++++++++++++++++++++ > > >> include/linux/pci.h | 1 + > > >> 3 files changed, 35 insertions(+) > > >> > > >> diff --git a/drivers/pci/pci-driver.c b/drivers/pci/pci-driver.c > > >> index 7f47bb7..19522fe 100644 > > >> --- a/drivers/pci/pci-driver.c > > >> +++ b/drivers/pci/pci-driver.c > > >> @@ -1467,6 +1467,18 @@ void pci_dev_put(struct pci_dev *dev) > > >> } > > >> EXPORT_SYMBOL(pci_dev_put); > > >> > > >> +/** > > >> + * pci_dev_sriov_autoprobe_set - set device sriov driver autoprobe > > >> + * @dev: device with which sriov autoprobe will be set > > >> + * > > >> + */ > > >> +void pci_dev_sriov_autoprobe_set(struct pci_dev *dev, bool autoprobe) > > >> +{ > > >> + if (dev && dev->sriov) > > >> + dev->sriov->drivers_autoprobe = autoprobe; > > >> +} > > >> +EXPORT_SYMBOL(pci_dev_sriov_autoprobe_set); > > > > > > _GPL? > > > > > > It'd also be best to separate the pci and vfio changes into different > > > patches. Bjorn would need to at least ack this PCI interface. > > > > > >> + > > >> static int pci_uevent(struct device *dev, struct kobj_uevent_env *env) > > >> { > > >> struct pci_dev *pdev; > > >> diff --git a/drivers/vfio/pci/vfio_pci.c b/drivers/vfio/pci/vfio_pci.c > > >> index f041b1a..004836c 100644 > > >> --- a/drivers/vfio/pci/vfio_pci.c > > >> +++ b/drivers/vfio/pci/vfio_pci.c > > >> @@ -1213,6 +1213,8 @@ static int vfio_pci_probe(struct pci_dev *pdev, > const struct pci_device_id *id) > > >> return -ENOMEM; > > >> } > > >> > > >> + /* disable sriov automatic driver attachment */ > > >> + pci_dev_sriov_autoprobe_set(pdev, false); > > > > > > This looks stateful, VF autoprobe is not restored on release. Also, > > > how would we know the initial state to restore it to? > > > > The initial state is whatever the user set it to. It is something that > > can be toggled on and off via sysfs, and it defaults to true at > > initialization. In this case we are opting to toggle it off when VFIO > > is attached to the device. Restoring it after unloading the driver > > might be even more confusing since it is something the user could > > toggle at any time so a restore would end up overwriting that. > > I'm not really willing to sign up for the inevitable bug reports when > users can't figure out how to make their VFs work again in the host > after they've used the PF for userspace drivers with vfio-pci. I > agree, both options are confusing, how do we make it not confusing? > Can PCI core reset the autoprobe attribute to the default at some > obvious point? Thanks, > I would like to confirm the scenario discussed here is to unload PF driver, right? Since users need to release all SR-IOV from PF driver first before PF driver is released, does it make sense to restore autoprobe when VFs are released? > Alex