Received: by 2002:a25:5b86:0:0:0:0:0 with SMTP id p128csp1286275ybb; Fri, 29 Mar 2019 01:11:00 -0700 (PDT) X-Google-Smtp-Source: APXvYqxOw5LzlZXwGomuxcBRKp78MxcHFcYZXWzxOPDskbq/XshthUAyL1wZ93em+yKHC5p2Q7pp X-Received: by 2002:a63:720c:: with SMTP id n12mr1042214pgc.348.1553847059962; Fri, 29 Mar 2019 01:10:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553847059; cv=none; d=google.com; s=arc-20160816; b=saQkfQhrgqHSoHY/YmYuZsRfjJ6BzoGWmVE71IhvaCAZTCADzssmLVB1jMuX9Gk8pu FVUMY90sXMOs9r1hfghRSXlkudCOht6svNdoHgkojpJiNiFMTYEkNHAD+MjRTWkbaVvw FeSDO/VHP6WopmjSlI2dzAOVIeMu25Hls47WthLYsO/dKfxB8dM1xSuftUWgYRKWiipD E9eME4qOZ1h+jMstQzncmdfPUHmfwAKeYwwMYMJAuo9lwJNfZC+HyHyiSkecc1Gy4Yh1 oYux9s/hoY5c/HheJWCEEZs6Z9TaMCNvH8zXM/1obPql70cjTPVLNS5D9JW4YjycXn2+ 2oEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=zGYqP9NkrLiKnZ17QPW4c7YaxBXKAUrDO5LR1gNW2qg=; b=QMqIMmaYbuPS+3TZM88QSf+0Zd1DZ+trvou+TMP6rCD2ecjXctQ8vHNtGxBcvBjI/F lhha89lV55fCk1MK6xYt1FD4O/GdAfNygtN1cxDK2ZXyonaIUUxzin1rGwUC171dqTOE yYmsXJWwOLyPhDOkvtW+L+EbkWeowH6AtKNrbLk5ANmu244ZJaqz9hAB4BbORAF4HjM6 /xQPskePr+hyi38yn3Qc1p2bUuclqtSN1k72pblerD90tAPoxA5WWkY0QNgRWfrzTGdz kuA93BZX4z5BnZp4n8TJzbLimw36gZTJ1beSmfkiAgsl0pFrtL6ak/XpXWQCYTtI7Htu cmPA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f22si1232123pfd.79.2019.03.29.01.10.41; Fri, 29 Mar 2019 01:10:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728993AbfC2IKB (ORCPT + 99 others); Fri, 29 Mar 2019 04:10:01 -0400 Received: from p-mail-ext.rd.orange.com ([161.106.1.9]:39112 "EHLO p-mail-ext.rd.orange.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728955AbfC2IKB (ORCPT ); Fri, 29 Mar 2019 04:10:01 -0400 X-Greylist: delayed 416 seconds by postgrey-1.27 at vger.kernel.org; Fri, 29 Mar 2019 04:10:00 EDT Received: from p-mail-ext.rd.orange.com (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id B584C5615A8; Fri, 29 Mar 2019 09:02:43 +0100 (CET) Received: from p-mail-int.rd.francetelecom.fr (p-mail-int.rd.francetelecom.fr [10.192.117.12]) by p-mail-ext.rd.orange.com (Postfix) with ESMTP id 5F5D8561643; Fri, 29 Mar 2019 09:02:36 +0100 (CET) Received: from p-mail-int.rd.francetelecom.fr (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 13804181605; Fri, 29 Mar 2019 09:02:37 +0100 (CET) Received: from yd-CZC9059FTQ.rd.francetelecom.fr (yd-CZC9059FTQ.rd.francetelecom.fr [10.193.71.88]) by p-mail-int.rd.francetelecom.fr (Postfix) with ESMTP id 8D1261815EE; Fri, 29 Mar 2019 09:02:36 +0100 (CET) From: =?UTF-8?q?Pierre=20Cr=C3=A9gut?= To: bhelgaas@google.com Cc: linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, =?UTF-8?q?Pierre=20Cr=C3=A9gut?= Subject: [PATCH] PCI/IOV: update num_VFs earlier Date: Fri, 29 Mar 2019 09:00:58 +0100 Message-Id: <20190329080058.21736-1-pierre.cregut@orange.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-PMX-Version: 6.4.6.2792898, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2019.3.29.75716, AntiVirus-Engine: 5.60.0, AntiVirus-Data: 2019.3.28.5600001 X-PMX-Spam: Gauge=IIIIIIII, Probability=8%, Report=' MULTIPLE_RCPTS 0.1, HTML_00_01 0.05, HTML_00_10 0.05, BODYTEXTP_SIZE_3000_LESS 0, BODY_SIZE_1800_1899 0, BODY_SIZE_2000_LESS 0, BODY_SIZE_5000_LESS 0, BODY_SIZE_7000_LESS 0, CT_TEXT_PLAIN_UTF8_CAPS 0, LEGITIMATE_SIGNS 0, MULTIPLE_REAL_RCPTS 0, SINGLE_URI_IN_BODY 0, URI_WITH_PATH_ONLY 0, __ANY_URI 0, __CC_NAME 0, __CC_NAME_DIFF_FROM_ACC 0, __CC_REAL_NAMES 0, __CP_URI_IN_BODY 0, __CT 0, __CTE 0, __CT_TEXT_PLAIN 0, __FRAUD_MONEY_CURRENCY 0, __FRAUD_MONEY_CURRENCY_DOLLAR 0, __FROM_DOMAIN_IN_ANY_CC1 0, __FROM_DOMAIN_IN_RCPT 0, __FROM_UTF_Q 0, __HAS_CC_HDR 0, __HAS_FROM 0, __HAS_MSGID 0, __HAS_X_MAILER 0, __HTTPS_URI 0, __MIME_TEXT_ONLY 0, __MIME_TEXT_P 0, __MIME_TEXT_P1 0, __MIME_VERSION 0, __MULTIPLE_RCPTS_CC_X2 0, __NO_HTML_TAG_RAW 0, __PHISH_SPEAR_SUBJ_PREDICATE 0, __SANE_MSGID 0, __SINGLE_URI_TEXT 0, __SUBJ_ALPHA_END 0, __TO_MALFORMED_2 0, __TO_NO_NAME 0, __URI_IN_BODY 0, __URI_NOT_IMG 0, __URI_NO_WWW 0, __URI_NS , __URI_WITH_PATH 0' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Ensure that iov->num_VFs is set before a netlink message is sent when the number of VFs is changed. Only the path for num_VFs > 0 is affected. The path for num_VFs = 0 is already correct. Monitoring programs can relie on netlink messages to track interface change and query their state in /sys. But when sriov_numvfs is set to a positive value, the netlink message is sent before the value is available in sysfs. The value read after the message is received is always zero. Link: https://bugzilla.kernel.org/show_bug.cgi?id=202991 Signed-off-by: Pierre Crégut --- note: the behaviour can be tested with the following shell script also available on the bugzilla (d being the phy device name): ip monitor dev $d | grep --line-buffered "^[0-9]*:" | \ while read line; do cat /sys/class/net/$d/device/sriov_numvfs; done drivers/pci/iov.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/pci/iov.c b/drivers/pci/iov.c index 3aa115ed3a65..a9655c10e87f 100644 --- a/drivers/pci/iov.c +++ b/drivers/pci/iov.c @@ -351,6 +351,7 @@ static int sriov_enable(struct pci_dev *dev, int nr_virtfn) goto err_pcibios; } + iov->num_VFs = nr_virtfn; pci_iov_set_numvfs(dev, nr_virtfn); iov->ctrl |= PCI_SRIOV_CTRL_VFE | PCI_SRIOV_CTRL_MSE; pci_cfg_access_lock(dev); @@ -363,7 +364,6 @@ static int sriov_enable(struct pci_dev *dev, int nr_virtfn) goto err_pcibios; kobject_uevent(&dev->dev.kobj, KOBJ_CHANGE); - iov->num_VFs = nr_virtfn; return 0; @@ -379,6 +379,7 @@ static int sriov_enable(struct pci_dev *dev, int nr_virtfn) if (iov->link != dev->devfn) sysfs_remove_link(&dev->dev.kobj, "dep_link"); + iov->num_VFs = 0; pci_iov_set_numvfs(dev, 0); return rc; } -- 2.17.1