On 07/31/2014 08:56 AM, Edward Cree wrote: > On 31/07/14 16:21, Alexander Duyck wrote: >> However if you are wanting to use this as a way to disable SR-IOV for a >> device I wouldn't recommend it. Based on what you have described I >> would suggest dropping the fix in drivers/pci/quirks that would clear >> dev->is_physfn if you are in the PF-IOV mode. That way the SR-IOV >> functionality should be fully disabled. > I still don't see how this can go in drivers/pci/quirks, because PF-IOV > mode can only be detected at driver probe time. The way we find out > that the NIC is in PF-IOV mode is that a request to the MC (the > Management CPU on the card) to create a vswitch fails. But maybe I'm > wrong about what quirks can do - is there any relevant documentation? If this PF-IOV mode is enabled what would be the layout of the PF devices? It seems like you should be able to scan for multiple PFs all showing up on the same bus with a certain stride if you wanted to detect it. > Clearing dev->is_physfn in the driver probe routine isn't safe: > dev->sriov memory can get leaked, for example, as sriov_init will get > called at device add, but sriov_release won't be called at removal. Thanks for pointing that out. It seems like that is a bug. We should probably be checking for dev->sriov, not dev->is_physfn before calling sriov_release. I might see about submitting a patch to address that. > I'm also unconvinced that having !(dev->is_physfn || dev->is_virtfn) is > a valid state; but maybe I'm misunderstanding and "is_physfn" doesn't > actually mean "is a physical function", but rather "has SR-IOV capability". is_physfn is typically used to indicate the device is capable of acting as a physical function. So a non-IOV device will not set either is_physfn or is_virtfn. >> In addition this solution would >> also resolve the fact that the driver wouldn't actually have to be >> loaded for it to work so if someone were to load a driver that didn't >> contain the fix they would be blocked from enabling SR-IOV as well. > The current driver fails to probe the PF because it assumes the vswitch > creation failure is fatal. There should never be a driver that knows it > can live without the vswitch but doesn't know that that breaks SR-IOV. > > -Edward Is the vswitch a hard requirement for something other than SR-IOV? If not then maybe you should consider modifying the driver so it simply disabled SR-IOV if you cannot allocate the vswitch instead of blocking probe. Thanks, Alex P.S. You should really consider changing your email signature. The bit about "you may not use, copy or disclose to anyone this message" kind of goes against the whole point of submitting patches to an open source project. -- To unsubscribe from this list: send the line "unsubscribe linux-pci" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html