Received: by 10.213.65.68 with SMTP id h4csp179642imn; Mon, 12 Mar 2018 10:24:16 -0700 (PDT) X-Google-Smtp-Source: AG47ELuX8IYdxQgVAtBkNSQj+QEmcxPcdgaWcyoib84pStFsl3pcrkG+RYHiqYnNiUgyKOYtbyTh X-Received: by 10.99.140.8 with SMTP id m8mr4326511pgd.320.1520875456173; Mon, 12 Mar 2018 10:24:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1520875456; cv=none; d=google.com; s=arc-20160816; b=t0UBDXdE0kVqDfPF69n9SocQuu3ctGKrPa58M/X/K03GFovGI/96Lx15XMaNHktEm5 CyP/FQuJ2azmWUHND3q1zt0n6mxpAZ9rO+1R/Uzhi8K63ddB5dznmCrISWgnKFtPmQVf 5PjOyVPLG0amS6VUjGrzXiUb+rMbwd60Scsv/blpgFBSUqh3QeRQaNviosDcgMhuvalg EYNFJhy1G5p4cN6JT4wMheacsHlUqsYj1iDwWVVPy5npw2CzSJAUkCeYWpo6/2f3gnxX k7uMSuqIhEZ7wdilnWfe2uvY3UfNIZzkNUCSTJX+DEJ1wJZ+cvaqrM5fy9RRyuw9yfrp sziA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:cc:to:from :subject:dkim-signature:arc-authentication-results; bh=GLbk1dPDPkbmVuSmBKN0IkqkTzu578dWEqiTnimtC1Q=; b=J10hlBN1rjwM/sSC9S6aioWIO0KUMNu4zZPo7MiaY4BA+mfsiG4cpUDZDjgsKI43eJ UJihIqlzc97hX/ROEyoKeke8CAksTPkLCAkXCVHB0/x2auBEBNqC/OnLngAXCX1OaNou l6/5Wt/Cvo9+MJlPvP0q480LaxmzEKICAbIvGFqdXJZn1yIC4MJfi1NvhxbshwFj/EVS rBaJuI1OOBGcJXE5OWmQStGT8h+5RRqSdmsto7V2CTO2M9kXbdMJKE4Fpp3YvfqfeehG x8j3ACz91iM+v0GFhHtAa93/MCANwIxLIoe/Cl52JnHfqEYsgpiE7mgYnec+QJlqs1Gf GGPA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=rCuYO3cu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n20si5278191pgv.214.2018.03.12.10.24.01; Mon, 12 Mar 2018 10:24:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=rCuYO3cu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932681AbeCLRXH (ORCPT + 99 others); Mon, 12 Mar 2018 13:23:07 -0400 Received: from mail-pf0-f196.google.com ([209.85.192.196]:45298 "EHLO mail-pf0-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932386AbeCLRXF (ORCPT ); Mon, 12 Mar 2018 13:23:05 -0400 Received: by mail-pf0-f196.google.com with SMTP id h19so4627626pfd.12; Mon, 12 Mar 2018 10:23:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:from:to:cc:date:message-id:in-reply-to:references :user-agent:mime-version:content-transfer-encoding; bh=GLbk1dPDPkbmVuSmBKN0IkqkTzu578dWEqiTnimtC1Q=; b=rCuYO3cuzaAM6Bcj5aDIkl1EWfucVtrTLkbFPltiVbMmk7+njQDpVdWVRRf8bc1gxv qepNR0UCMay8STtLAKcCTu+KGNuMwtMEfMPMUqbli4l29bn2lf6ac8+qdc8ZUF0ChCYm crscMWZ8NPAPRlOJDYS5n6WsjUGWUPBqSQHKC7VVlzR5qxGTZsMOKOSSdM7pD102Z/L/ tPQ0gn4SFN5hyPataJQmM+3sDATnN30tafBnWNFVgy5c8o0HoKy1a/yXtc2FVoHcv5f3 L+5GR6cbQe8SKzxJvy/a/DS7J5ejXix6GWLLCl3v3mLmsDfNN7Ism7Mtm4fyWJeoYgoq juzg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:from:to:cc:date:message-id:in-reply-to :references:user-agent:mime-version:content-transfer-encoding; bh=GLbk1dPDPkbmVuSmBKN0IkqkTzu578dWEqiTnimtC1Q=; b=p3kL122XZNtcnY2N8EuG7jIf8tuPRAi4bG8AqgrIEiKjIjavYVQikcUzIWiZQQMkmV KHWfd0sWJBrrrKtllxaPWcitjI++bhkGtX5NOYkxliG3LAZyXCRJoR1bHVtnrxyvu3dx ISRoWoSBm8DDtjbN3Y8FZteKtqDB+M3xbU+DOWBocl5AKG0xYZgAlI6o5Th0ezZto8ra WZNJoR9240PcYMuNdwB38n/CJKcOkJdrU3htZvrlRZSbl1G0/Kr3oUkIQRbmHcKORl7O CD6nm+ze0hVC/w3JTvFXV651UQ1rrLiHcV9ZfLv7Ubq6JxFAkolutoqUk15Upaa38uiV YU8Q== X-Gm-Message-State: AElRT7Eo9sOPZSYhb0vIhpqlLtW7rDRZe1kxgDn6IRRFGd80pbVLEXdM fLOMXDMxT+UjECJWcoxdGZw= X-Received: by 10.98.33.76 with SMTP id h73mr8651697pfh.144.1520875384238; Mon, 12 Mar 2018 10:23:04 -0700 (PDT) Received: from localhost.localdomain ([2001:470:b:9c3:9e5c:8eff:fe4f:f2d0]) by smtp.gmail.com with ESMTPSA id r30sm18391118pff.7.2018.03.12.10.23.03 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 12 Mar 2018 10:23:03 -0700 (PDT) Subject: [pci PATCH v5 2/4] virtio_pci: Add support for unmanaged SR-IOV on virtio_pci devices From: Alexander Duyck To: bhelgaas@google.com, alexander.h.duyck@intel.com, linux-pci@vger.kernel.org Cc: virtio-dev@lists.oasis-open.org, kvm@vger.kernel.org, netdev@vger.kernel.org, dan.daly@intel.com, linux-kernel@vger.kernel.org, linux-nvme@lists.infradead.org, keith.busch@intel.com, netanel@amazon.com, mheyne@amazon.de, liang-min.wang@intel.com, mark.d.rustad@intel.com, dwmw2@infradead.org, hch@lst.de, dwmw@amazon.co.uk Date: Mon, 12 Mar 2018 10:23:02 -0700 Message-ID: <20180312172136.3487.95702.stgit@localhost.localdomain> In-Reply-To: <20180312171813.3487.94803.stgit@localhost.localdomain> References: <20180312171813.3487.94803.stgit@localhost.localdomain> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alexander Duyck Hardware-realized virtio_pci devices can implement SR-IOV, so this patch enables its use. The device in question is an upcoming Intel NIC that implements both a virtio_net PF and virtio_net VFs. These are hardware realizations of what has been up to now been a software interface. The device in question has the following 4-part PCI IDs: PF: vendor: 1af4 device: 1041 subvendor: 8086 subdevice: 15fe VF: vendor: 1af4 device: 1041 subvendor: 8086 subdevice: 05fe The patch currently needs no check for device ID, because the callback will never be made for devices that do not assert the capability or when run on a platform incapable of SR-IOV. One reason for this patch is because the hardware requires the vendor ID of a VF to be the same as the vendor ID of the PF that created it. So it seemed logical to simply have a fully-functioning virtio_net PF create the VFs. This patch makes that possible. Signed-off-by: Mark Rustad Signed-off-by: Alexander Duyck --- v4: Dropped call to pci_disable_sriov in virtio_pci_remove function v5: Replaced call to pci_sriov_configure_unmanaged with pci_sriov_configure_simple drivers/virtio/virtio_pci_common.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/drivers/virtio/virtio_pci_common.c b/drivers/virtio/virtio_pci_common.c index 48d4d1cf1cb6..41938d36b0cb 100644 --- a/drivers/virtio/virtio_pci_common.c +++ b/drivers/virtio/virtio_pci_common.c @@ -596,6 +596,9 @@ static void virtio_pci_remove(struct pci_dev *pci_dev) #ifdef CONFIG_PM_SLEEP .driver.pm = &virtio_pci_pm_ops, #endif +#ifdef CONFIG_PCI_IOV + .sriov_configure = pci_sriov_configure_simple, +#endif }; module_pci_driver(virtio_pci_driver);