Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp3691imm; Thu, 28 Jun 2018 12:47:01 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLGUjEOj27ROm1v69VEXP9ukW4PRkGP8UIP8KNS+xIIfUvq4MwB7EdaNAlPsmrzwcf2JgBx X-Received: by 2002:a17:902:b706:: with SMTP id d6-v6mr11799719pls.105.1530215221122; Thu, 28 Jun 2018 12:47:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530215221; cv=none; d=google.com; s=arc-20160816; b=U2v/y5MDDOUlAdDBCuZ/9w7yLw2xwPjGdVarZRzM6jWQqRXXPKDlQbT8xm/aF8SJ2d k4BhAwCghE3YZulykss58KYsPVEvYiBrKy5iM7bnE7oaHpZJdYkXWNlsfdlOXolvr3Ci iUYr/WB2KJIlRSsVO8TU/m+3EgYNtbRdx8S5RQDUfi0ZZRSb2mOyjy7eGXGBfqLr2fTN fp9lrKUXiC2FiOL701xh9ABZdWemg5D8xbmuxCZa4TKliZ2qX7KttrxagiXNsyUOQuP1 md98l2cl24UCaof/pYfOaKG/5DJyyRnul1icxierhqvnneOZs4P4G8p0Ud0JE4xKNQYh vuZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dmarc-filter:dkim-signature:dkim-signature :arc-authentication-results; bh=eacjsQJkOuVNlyo3lr5oFDZlFyPXWlCRyzZm0cp/QVo=; b=lEdQk7Y+laWrbqPpPuiJEerR8stmim1FOuLJIgDYUTvNyHH4fHk2YjnEzYUoiuv4FV RY5erfwyOD69czrnDSZziy2jB7DOw1EhokpurSXjdiXeHnSLnKxXRJxjPxkneBMxYq57 ZT+GqCFAWOeMg68OnIq2oNNoCa01R/rE+z801qOTy4ADKqiEthIltbjuCPbkFfa8TJSg ENW8NuemRVS3XKXcnobJnqPek+Rvq50WaoUEgoygZEZ3bmDEMgv7pU1DPSvp8FszfyLa sfqg+VdtknX1wnDY5GRz7VoBPeTz//OCQK4KAoBp71n8D6a7zG3k4dnANWMxLLoPny1Z gQhQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=FU5XUN1M; dkim=pass header.i=@codeaurora.org header.s=default header.b=Bos6iCbZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u13-v6si6885299plm.99.2018.06.28.12.46.46; Thu, 28 Jun 2018 12:47:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=FU5XUN1M; dkim=pass header.i=@codeaurora.org header.s=default header.b=Bos6iCbZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1030499AbeF1SaR (ORCPT + 99 others); Thu, 28 Jun 2018 14:30:17 -0400 Received: from smtp.codeaurora.org ([198.145.29.96]:35992 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S967916AbeF1SaN (ORCPT ); Thu, 28 Jun 2018 14:30:13 -0400 Received: by smtp.codeaurora.org (Postfix, from userid 1000) id A37E160B28; Thu, 28 Jun 2018 18:29:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1530210612; bh=2Z4UElKE37gxoSIzK+0WUeRpyeRK1kx3iqXRA1vOugo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=FU5XUN1MqncN5seuALff6b/ZsNN4QfP/JvPM79rsmnFcN7VZUh2wg8mEyxa7oJ/mx B3SewrpiKKTskbAfsamGPnk9rQOUoco7IHanUMZ+YpnEsRipxhup8oh6HFPTZqaDoX QbNmF6PYvb3dGV8ss6MKZYbPjihDGKj4X9AoO81M= X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on pdx-caf-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.8 required=2.0 tests=ALL_TRUSTED,BAYES_00, DKIM_SIGNED,T_DKIM_INVALID autolearn=no autolearn_force=no version=3.4.0 Received: from drakthul.qualcomm.com (global_nat1_iad_fw.qualcomm.com [129.46.232.65]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: okaya@smtp.codeaurora.org) by smtp.codeaurora.org (Postfix) with ESMTPSA id 9ECED60B10; Thu, 28 Jun 2018 18:29:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1530210584; bh=2Z4UElKE37gxoSIzK+0WUeRpyeRK1kx3iqXRA1vOugo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Bos6iCbZNIAzt4yeKynHLCh/zCIw71I2SCr6oiiaNCM8Qm8/QBU9IKQMAcYZP3Gbt 6a8DLLXMS0SZLoQ1SGTdpT+PGYAwnBXYuScch//cxRFpQSep7P/EwUQJXAbz45I0V1 bew/uMPg6ne8KwL3W6GetEJwduXuUnRH3De3DXns= DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org 9ECED60B10 Authentication-Results: pdx-caf-mail.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: pdx-caf-mail.web.codeaurora.org; spf=none smtp.mailfrom=okaya@codeaurora.org From: Sinan Kaya To: linux-pci@vger.kernel.org Cc: linux-arm-msm@vger.kernel.org, linux-arm-kernel@lists.infradead.org, Sinan Kaya , Bjorn Helgaas , Alex Williamson , Alexey Kardashevskiy , Peter Xu , Kirti Wankhede , linux-kernel@vger.kernel.org (open list), kvm@vger.kernel.org (open list:VFIO DRIVER) Subject: [PATCH V3 3/6] PCI: Unify try slot and bus reset API Date: Thu, 28 Jun 2018 14:28:23 -0400 Message-Id: <1530210507-9287-3-git-send-email-okaya@codeaurora.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1530210507-9287-1-git-send-email-okaya@codeaurora.org> References: <1530210507-9287-1-git-send-email-okaya@codeaurora.org> MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Drivers are expected to call pci_try_reset_slot() or pci_try_reset_bus() by querying if a system supports hotplug or not. A survey showed that most drivers don't do this and we are leaking hotplug capability to the user. Hide pci_try_slot_reset() from drivers and embed into pci_try_bus_reset(). Change pci_try_reset_bus() parameter from struct pci_bus to struct pci_dev. Signed-off-by: Sinan Kaya --- drivers/pci/pci.c | 26 +++++++++++++++++++++----- drivers/vfio/pci/vfio_pci.c | 6 ++---- include/linux/pci.h | 3 +-- 3 files changed, 24 insertions(+), 11 deletions(-) diff --git a/drivers/pci/pci.c b/drivers/pci/pci.c index 236220c..79a1566 100644 --- a/drivers/pci/pci.c +++ b/drivers/pci/pci.c @@ -4817,12 +4817,12 @@ int pci_reset_slot(struct pci_slot *slot) EXPORT_SYMBOL_GPL(pci_reset_slot); /** - * pci_try_reset_slot - Try to reset a PCI slot + * __pci_try_reset_slot - Try to reset a PCI slot * @slot: PCI slot to reset * * Same as above except return -EAGAIN if the slot cannot be locked */ -int pci_try_reset_slot(struct pci_slot *slot) +static int __pci_try_reset_slot(struct pci_slot *slot) { int rc; @@ -4843,7 +4843,6 @@ int pci_try_reset_slot(struct pci_slot *slot) return rc; } -EXPORT_SYMBOL_GPL(pci_try_reset_slot); static int pci_bus_reset(struct pci_bus *bus, int probe) { @@ -4906,12 +4905,12 @@ int pci_reset_bus(struct pci_bus *bus) EXPORT_SYMBOL_GPL(pci_reset_bus); /** - * pci_try_reset_bus - Try to reset a PCI bus + * __pci_try_reset_bus - Try to reset a PCI bus * @bus: top level PCI bus to reset * * Same as above except return -EAGAIN if the bus cannot be locked */ -int pci_try_reset_bus(struct pci_bus *bus) +static int __pci_try_reset_bus(struct pci_bus *bus) { int rc; @@ -4932,6 +4931,23 @@ int pci_try_reset_bus(struct pci_bus *bus) return rc; } + +/** + * pci_try_reset_bus - Try to reset a PCI bus + * @pdev: top level PCI device to reset via slot/bus + * + * Same as above except return -EAGAIN if the bus cannot be locked + */ +int pci_try_reset_bus(struct pci_dev *pdev) +{ + bool slot = false; + + if (!pci_probe_reset_slot(pdev->slot)) + slot = true; + + return slot ? __pci_try_reset_slot(pdev->slot) : + __pci_try_reset_bus(pdev->bus); +} EXPORT_SYMBOL_GPL(pci_try_reset_bus); /** diff --git a/drivers/vfio/pci/vfio_pci.c b/drivers/vfio/pci/vfio_pci.c index b423a30..71018ec 100644 --- a/drivers/vfio/pci/vfio_pci.c +++ b/drivers/vfio/pci/vfio_pci.c @@ -1010,8 +1010,7 @@ static long vfio_pci_ioctl(void *device_data, &info, slot); if (!ret) /* User has access, do the reset */ - ret = slot ? pci_try_reset_slot(vdev->pdev->slot) : - pci_try_reset_bus(vdev->pdev->bus); + ret = pci_try_reset_bus(vdev->pdev); hot_reset_release: for (i--; i >= 0; i--) @@ -1373,8 +1372,7 @@ static void vfio_pci_try_bus_reset(struct vfio_pci_device *vdev) } if (needs_reset) - ret = slot ? pci_try_reset_slot(vdev->pdev->slot) : - pci_try_reset_bus(vdev->pdev->bus); + ret = pci_try_reset_bus(vdev->pdev); put_devs: for (i = 0; i < devs.cur_index; i++) { diff --git a/include/linux/pci.h b/include/linux/pci.h index 6b12ce2..f5c85b6 100644 --- a/include/linux/pci.h +++ b/include/linux/pci.h @@ -1096,10 +1096,9 @@ int pci_reset_function_locked(struct pci_dev *dev); int pci_try_reset_function(struct pci_dev *dev); int pci_probe_reset_slot(struct pci_slot *slot); int pci_reset_slot(struct pci_slot *slot); -int pci_try_reset_slot(struct pci_slot *slot); int pci_probe_reset_bus(struct pci_bus *bus); int pci_reset_bus(struct pci_bus *bus); -int pci_try_reset_bus(struct pci_bus *bus); +int pci_try_reset_bus(struct pci_dev *dev); void pci_reset_secondary_bus(struct pci_dev *dev); void pcibios_reset_secondary_bus(struct pci_dev *dev); void pci_update_resource(struct pci_dev *dev, int resno); -- 2.7.4