Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp83319imm; Thu, 31 May 2018 19:10:01 -0700 (PDT) X-Google-Smtp-Source: ADUXVKJsHWpZabuzmNy5eWccaeEPxqdkuWS/e90lav9+C32oHVH8gz7q0elxS/MgSWwun5IYZQlC X-Received: by 2002:a63:8848:: with SMTP id l69-v6mr7474681pgd.149.1527819001267; Thu, 31 May 2018 19:10:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527819001; cv=none; d=google.com; s=arc-20160816; b=ESHueKxyBi13Bx7lB4Ok+ue2Tl76U1lOk90ybGALa2nrK9eiesRzFh1kuAfVvXbLbT dS2rt6If9tsIf/N2sYYdjHsbszzMiuKsuEaU54fd95t2yyzUQKxDIQO69Wgd5d9oc6Ob 2yP1ixFDGoOM7HHblRRmyyKNhHzVgpShI2wIG4nxr5nEGyao8btfKrkEuZ/HfkME+rI8 xNJAbFbV3ZdBkVxzRbhhBohMa5o6gfhJ8OLja/yQEmpSjKZP4UegMFB0E2SluQV4wp31 GQ09KzOoLj2LGZZh6R/Xwl9MWwZ0dJ+g+0evCifpPR17OlQbzK3+w7bdjyla5/hg0TWq V6aQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=MLHHL6XuDBE+oepn8V44r8BSJA1uMz9LpHZQ3UuzCCU=; b=Q325AIek7H8ynzZM9yCwjioe4xmEfqkGty7LnM+6dpg01phyvqbLvv3SIcPFUluDE/ DopvQmil/iaIbQK6pZEVRYqFctJO9d6u5F/aTy4ogR4udsDjPRodudQsNB318qlBntkZ 716I1sETu7scKZ+JFsKLpciqomZz0wKAFWf8yJ28XxP4S/asCJHsxJZZPaJJpApctQvi gDcwBZW430/6KT6PCmBJHkmE0/AM0fjnrixGL/lqTRvCTMXUs+YKoH6apAtaBlLqR+7G m+XmME/RSMngqAPLdvl9zSM1wGCZBxEU0/tfOdMYLe0dvOl4oFAGAFHvybQMzC9Ytjx6 FGcg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f8-v6si15588147pgu.6.2018.05.31.19.09.46; Thu, 31 May 2018 19:10:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1750927AbeFACJS (ORCPT + 99 others); Thu, 31 May 2018 22:09:18 -0400 Received: from mga06.intel.com ([134.134.136.31]:13887 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750796AbeFACJR (ORCPT ); Thu, 31 May 2018 22:09:17 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by orsmga104.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 31 May 2018 19:09:16 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.49,464,1520924400"; d="scan'208";a="43801925" Received: from debian.sh.intel.com ([10.67.104.203]) by fmsmga007.fm.intel.com with ESMTP; 31 May 2018 19:09:14 -0700 From: Tiwei Bie To: mst@redhat.com, bhelgaas@google.com, virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org, virtio-dev@lists.oasis-open.org, linux-pci@vger.kernel.org Cc: dan.daly@intel.com, mark.d.rustad@intel.com, alexander.h.duyck@intel.com, cunming.liang@intel.com, zhihong.wang@intel.com Subject: [PATCH v2] virtio_pci: support enabling VFs Date: Fri, 1 Jun 2018 10:09:21 +0800 Message-Id: <20180601020921.30957-1-tiwei.bie@intel.com> X-Mailer: git-send-email 2.17.0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org There is a new feature bit allocated in virtio spec to support SR-IOV (Single Root I/O Virtualization): https://github.com/oasis-tcs/virtio-spec/issues/11 This patch enables the support for this feature bit in virtio driver. Signed-off-by: Tiwei Bie Acked-by: Stefan Hajnoczi Acked-by: Michael S. Tsirkin --- v2: - Disable VFs when unbinding the driver (Alex, MST); - Don't use pci_sriov_configure_simple (Alex); drivers/virtio/virtio_pci_common.c | 30 ++++++++++++++++++++++++++++++ drivers/virtio/virtio_pci_modern.c | 14 ++++++++++++++ include/uapi/linux/virtio_config.h | 7 ++++++- 3 files changed, 50 insertions(+), 1 deletion(-) diff --git a/drivers/virtio/virtio_pci_common.c b/drivers/virtio/virtio_pci_common.c index 48d4d1cf1cb6..1d4467b2dc31 100644 --- a/drivers/virtio/virtio_pci_common.c +++ b/drivers/virtio/virtio_pci_common.c @@ -577,6 +577,8 @@ static void virtio_pci_remove(struct pci_dev *pci_dev) struct virtio_pci_device *vp_dev = pci_get_drvdata(pci_dev); struct device *dev = get_device(&vp_dev->vdev.dev); + pci_disable_sriov(pci_dev); + unregister_virtio_device(&vp_dev->vdev); if (vp_dev->ioaddr) @@ -588,6 +590,33 @@ static void virtio_pci_remove(struct pci_dev *pci_dev) put_device(dev); } +static int virtio_pci_sriov_configure(struct pci_dev *pci_dev, int num_vfs) +{ + struct virtio_pci_device *vp_dev = pci_get_drvdata(pci_dev); + struct virtio_device *vdev = &vp_dev->vdev; + int ret; + + if (!(vdev->config->get_status(vdev) & VIRTIO_CONFIG_S_DRIVER_OK)) + return -EBUSY; + + if (!__virtio_test_bit(vdev, VIRTIO_F_SR_IOV)) + return -EINVAL; + + if (pci_vfs_assigned(pci_dev)) + return -EPERM; + + if (num_vfs == 0) { + pci_disable_sriov(pci_dev); + return 0; + } + + ret = pci_enable_sriov(pci_dev, num_vfs); + if (ret < 0) + return ret; + + return num_vfs; +} + static struct pci_driver virtio_pci_driver = { .name = "virtio-pci", .id_table = virtio_pci_id_table, @@ -596,6 +625,7 @@ static struct pci_driver virtio_pci_driver = { #ifdef CONFIG_PM_SLEEP .driver.pm = &virtio_pci_pm_ops, #endif + .sriov_configure = virtio_pci_sriov_configure, }; module_pci_driver(virtio_pci_driver); diff --git a/drivers/virtio/virtio_pci_modern.c b/drivers/virtio/virtio_pci_modern.c index 2555d80f6eec..07571daccfec 100644 --- a/drivers/virtio/virtio_pci_modern.c +++ b/drivers/virtio/virtio_pci_modern.c @@ -153,14 +153,28 @@ static u64 vp_get_features(struct virtio_device *vdev) return features; } +static void vp_transport_features(struct virtio_device *vdev, u64 features) +{ + struct virtio_pci_device *vp_dev = to_vp_device(vdev); + struct pci_dev *pci_dev = vp_dev->pci_dev; + + if ((features & BIT_ULL(VIRTIO_F_SR_IOV)) && + pci_find_ext_capability(pci_dev, PCI_EXT_CAP_ID_SRIOV)) + __virtio_set_bit(vdev, VIRTIO_F_SR_IOV); +} + /* virtio config->finalize_features() implementation */ static int vp_finalize_features(struct virtio_device *vdev) { struct virtio_pci_device *vp_dev = to_vp_device(vdev); + u64 features = vdev->features; /* Give virtio_ring a chance to accept features. */ vring_transport_features(vdev); + /* Give virtio_pci a chance to accept features. */ + vp_transport_features(vdev, features); + if (!__virtio_test_bit(vdev, VIRTIO_F_VERSION_1)) { dev_err(&vdev->dev, "virtio: device uses modern interface " "but does not have VIRTIO_F_VERSION_1\n"); diff --git a/include/uapi/linux/virtio_config.h b/include/uapi/linux/virtio_config.h index 308e2096291f..b7c1f4e7d59e 100644 --- a/include/uapi/linux/virtio_config.h +++ b/include/uapi/linux/virtio_config.h @@ -49,7 +49,7 @@ * transport being used (eg. virtio_ring), the rest are per-device feature * bits. */ #define VIRTIO_TRANSPORT_F_START 28 -#define VIRTIO_TRANSPORT_F_END 34 +#define VIRTIO_TRANSPORT_F_END 38 #ifndef VIRTIO_CONFIG_NO_LEGACY /* Do we get callbacks when the ring is completely used, even if we've @@ -71,4 +71,9 @@ * this is for compatibility with legacy systems. */ #define VIRTIO_F_IOMMU_PLATFORM 33 + +/* + * Does the device support Single Root I/O Virtualization? + */ +#define VIRTIO_F_SR_IOV 37 #endif /* _UAPI_LINUX_VIRTIO_CONFIG_H */ -- 2.17.0