On Wed Mar 4, 2026 at 6:02 PM CET, Leon Romanovsky wrote:
> On Wed, Mar 04, 2026 at 12:45:51PM -0400, Jason Gunthorpe wrote:
>> On Wed, Mar 04, 2026 at 06:27:11PM +0200, Leon Romanovsky wrote:
>> > On Wed, Mar 04, 2026 at 03:57:57PM +0100, Danilo Krummrich wrote:
>> > > On Wed Mar 4, 2026 at 3:26 PM CET, Leon Romanovsky wrote:
>> > > > On Wed, Mar 04, 2026 at 10:18:52AM -0400, Jason Gunthorpe wrote:
>> > > >> On Wed, Mar 04, 2026 at 10:47:50AM +0200, Leon Romanovsky wrote:
>> > > >> > On Tue, Mar 03, 2026 at 04:15:20PM -0500, Peter Colberg wrote:
>> > > >> > > Add Rust abstractions for the Single Root I/O Virtualization 
>> > > >> > > (SR-IOV)
>> > > >> > > capability of a PCI device. Provide a minimal set of wrappers for 
>> > > >> > > the
>> > > >> > > SR-IOV C API to enable and disable SR-IOV for a device, and query 
>> > > >> > > if
>> > > >> > > a PCI device is a Physical Function (PF) or Virtual Function (VF).
>> > > >> > 
>> > > >> > <...>
>> > > >> > 
>> > > >> > > For PF drivers written in C, disabling SR-IOV on remove() may be 
>> > > >> > > opted
>> > > >> > > into by setting the flag managed_sriov in the pci_driver 
>> > > >> > > structure. For
>> > > >> > > PF drivers written in Rust, disabling SR-IOV on unbind() is 
>> > > >> > > mandatory.
>> > > >> > 
>> > > >> > Why? Could you explain the rationale behind this difference between 
>> > > >> > C and
>> > > >> > Rust? Let me remind you that SR‑IOV devices which do not disable 
>> > > >> > VFs do so
>> > > >> > for a practical and well‑established reason: maximizing hardware
>> > > >> > utilization.
>> > > >> 
>> > > >> Personally I think drivers doing this are wrong. That such a driver
>> > > >> bug was allowed to become UAPI is pretty bad. The rust approach is
>> > > >> better.
>> > > >
>> > > > We already had this discussion. I see this as a perfectly valid
>> > > > use-case.
>> > > 
>> > > Can you remind about a specific use-case for this please? (Ideally, one 
>> > > that
>> > > can't be solved otherwise.)
>> > 
>> > You create X VFs through sriov_configure, unbind PF, bind it to vfio
>> > instead and forward (X + 1) functions to different VMs.
>> 
>> No, illegal, and it doesn't even work right. When VFIO FLRs the PF it
>> will blow up the half baked SRIOV and break everything.
>
> The FLR can be disabled. For example, PCI_DEV_FLAGS_NO_FLR_RESET flag
> will do it.

But this is a quirk and not a feature, no? So, we shouldn't use it as a baseline
for actual features.

Reply via email to