Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755976AbdLOTR1 (ORCPT ); Fri, 15 Dec 2017 14:17:27 -0500 Received: from mail-bn3nam01on0133.outbound.protection.outlook.com ([104.47.33.133]:38909 "EHLO NAM01-BN3-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1755655AbdLOTR0 (ORCPT ); Fri, 15 Dec 2017 14:17:26 -0500 From: Casey Leedom To: Dmitry Torokhov CC: Greg Kroah-Hartman , Eric Dumazet , Eric Dumazet , Tariq Toukan , "David S . Miller" , "Komali Katari" , "Luis R. Rodriguez" , "linux-kernel@vger.kernel.org" Subject: Re: [PATCH] kobject: fix suppressing modalias in uevents delivered over netlink Thread-Topic: [PATCH] kobject: fix suppressing modalias in uevents delivered over netlink Thread-Index: AQHTdGkfcsnV1jK2KE+O7UiPv0BG86NDRuq8gAAFjICAABE0noAAAwuAgAAFyPeAAVDHQoAAC9EAgAAAyuU= Date: Fri, 15 Dec 2017 19:17:22 +0000 Message-ID: References: <20171213232122.5ztmwume5kylh4mz@dtor-ws> , In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=leedom@chelsio.com; x-originating-ip: [12.32.117.8] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1;DM5PR12MB1226;6:p9X8eh9AyNtTaRzAdorcYd23GpqCah7RhVXEuIifaNiBZuWKNIqtgfDQMfKc2wCWEyuCf/QPAyFrg109kibrQ0c8E8xwk4X+OBPS8Y7rfVidRRU5H/hKoEYPXgddd+uQqbFDY6Tk/ffRwTGYUhEyl6hh4qqWzxdtj5CCqUvOU3p+a0ewGSpDMB1W0z2Ty2XuxUKej7c1nc8yMLY6x4ggsj8VNWs6axPe6V4OOnUWWbMnUwXnjS5HdUGtMXydtmnUA0E2mKjN6Kv9tKgBbulXlhRULQ5TS7ziz9/hW2YJkDmYUivfxybANf3pHFhutvSiPwo7xPYeG3O8jL4Gzk0hsEEib4vFJEsOSHvRQinbF3k=;5:Y4LV+06wjIkpcBwEpl6Lf52Q9zNvdglmMKFAMLxySgwqekp1FBhF8JOadNOAHFr3Qol0MItRhrJRwguMfMqxjHVKK9CzBW4OHIqpub9RuHiJYQYFlx2AY4CjlqAQWDVh5vrasWqpkEmqYB31S0f4xU9r0bvGlaaCsjp5vXuRS7c=;24:SmKtmKUVG16eH0XeiPZYLqERNyYQvsbhMBV6EqgN7TFtmcSlqhE+wldfrpK1FDohkz0pFpqWuyZuzYw2mXxfso2qTfmnVab8wtktvT6y69c=;7:bcNkAldcq0HAj/G7aK17ouAiU+UmNyUST1K4F/ehX2pvaDC6fvdHGf+rtnXiRS1fWmFvpV0X6iRnImKWmA+HXR7UZ8jsRJ3aDTNq9qqtkMFKTtMWcQl+Xn13BHXUUcF+94IfAXwc0Xn6FQLARdTOl/wwH+eBz46PlAyg4OjNiTloCvo2OXaKoONAR8sdWn4i9HxUJ9KqV24pDOvaaKx6G/BDNNuibqucEbsdK6MjGMseHfiSYnJ6oLLFLTqA2rLR x-ms-exchange-antispam-srfa-diagnostics: SSOS;SSOR; x-forefront-antispam-report: SFV:SKI;SCL:-1;SFV:NSPM;SFS:(10019020)(39840400004)(376002)(346002)(396003)(366004)(199004)(189003)(2906002)(3280700002)(77096006)(53936002)(4326008)(99286004)(3660700001)(8936002)(6436002)(9686003)(55016002)(2900100001)(6246003)(6506007)(105586002)(68736007)(25786009)(81166006)(86362001)(14454004)(81156014)(8676002)(478600001)(76176011)(7696005)(74316002)(5660300001)(97736004)(54906003)(316002)(6916009)(66066001)(39060400002)(229853002)(102836003)(106356001)(3846002)(93886005)(6116002)(7736002)(33656002)(305945005)(2950100002);DIR:OUT;SFP:1102;SCL:1;SRVR:DM5PR12MB1226;H:SN1PR12MB0352.namprd12.prod.outlook.com;FPR:;SPF:None;PTR:InfoNoRecords;A:1;MX:1;LANG:en; x-ms-office365-filtering-correlation-id: 9d073005-9beb-49ae-1b6b-08d543f0784a x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(5600026)(4604075)(4534020)(4602075)(4603075)(4627115)(201702281549075)(2017052603307);SRVR:DM5PR12MB1226; x-ms-traffictypediagnostic: DM5PR12MB1226: x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:; x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(6040450)(2401047)(8121501046)(5005006)(10201501046)(3231023)(3002001)(93006095)(93001095)(6041248)(20161123558100)(20161123560025)(20161123564025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123555025)(2016111802025)(20161123562025)(6043046)(6072148)(201708071742011);SRVR:DM5PR12MB1226;BCL:0;PCL:0;RULEID:(100000803101)(100110400095);SRVR:DM5PR12MB1226; x-forefront-prvs: 05220145DE spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="iso-8859-1" MIME-Version: 1.0 X-OriginatorOrg: chelsio.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9d073005-9beb-49ae-1b6b-08d543f0784a X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Dec 2017 19:17:23.0096 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 065db76d-a7ae-4c60-b78a-501e8fc17095 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR12MB1226 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by nfs id vBFJHWGV008304 Content-Length: 2032 Lines: 51 | From: Dmitry Torokhov | Sent: Friday, December 15, 2017 10:53 AM | | Hmm, can she collect output of 'udevadm monitor -p' at the time you | assign the adapter to the VM? Sure. I'll have Komali report on that. | Also, do you have any udev rules that is specific to cxgb? Or any other | custom udev rules? I don't ~think~ so, but I'm not super familiar with udev stuff. Point me at a place to look and I can get this information for you. [[ Komali is hopefully at home in bed sound asleep looking forward to a fun weekend of adventures! ]] | Also, we only suppress the modalias string on driver unbind, could it be | that for you module loading is happening when driver is bound to the | device? What Komali is saying is that when she first instantiates the SR-IOV Virtual Functions, cxgb4vf gets automatically loaded as the VFs come into existence. This has been happening forever and the only way to prevent this from happening is to blacklist the cxgb4vf module. That's fine and normal behavior and she manually does a "rmmod cxgb4vf" to get rid of it. But now, after doing the "rmmod cxgb4vf", when she assigns a VF to a Virtual Machine and brings the VM up, cxgb4vf gets reloaded again. This is the new behavior which got introduced with kernel.org commit 1455cf8dbfd06aa7651dcfccbadb7a093944ca65 ... | Actually, as far as I can see, you share PCI IDs between cxgb4 and cxgb4vf | drivers, so they have similar modalias entries. How do you normally decide | what driver is to be loaded for a given device? The PCI Device IDs for the VFs aren't quite the same as those for the base adapter Physical Functions. Our PCI Device IDs look like: PF0..3 0x{T}0{DD} PF4 0x{T}4{DD} PF5 0x{T}5{DD} PF6 0x{T}6{DD} PF0..3/VF1..16 0x{T}8{DD} Where: {T} is 4, 5, 6, ... the adapter chip base {DD} is the adapter Device ID for that chip base implementation So the VFs PCI Device IDs are in fact different from any of the PFs. Casey