Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp5797663ybp; Tue, 15 Oct 2019 05:18:49 -0700 (PDT) X-Google-Smtp-Source: APXvYqy+SulnMlSLRbf5vjeIYXZWCoHUOQw0lau8Va+3meGHM9pQxFkKMJhqzystdgFEaLHKvF/g X-Received: by 2002:a17:906:e82:: with SMTP id p2mr33621322ejf.237.1571141929377; Tue, 15 Oct 2019 05:18:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571141929; cv=none; d=google.com; s=arc-20160816; b=KROGd69vec20hXZF8d9wrcEsNehYyIBlpl4h/WpIyrurlWL7Fc5dYzBrQXi03wclRx KLf2EPhKMMqPXsNNy8UTyNe9/B3JUzJcn6dN1kSLiKjLn0kmH9wKG7hlTua1sCyCcy3k V9DyWwsBCg/8x5XEgn8LIklFw8jGZG1EHKKUPnaj8zyd3frjaM3ILYSB6N9qCdKAA/0T g1vnBzGZ1anRxWlyVCu2fuXrcLB6qC+bP56aAlvvOrM9SrBvwkOGoCfCcCaNPpYyNcT4 eivpkLEnqpKL3Emux5q5BUsE2I3x2Xs5zLOe+ZkbtbjQj9IonY66uBzV9fjvvTPMTNLe uGRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=2rFh15VrB4DEKcYfjt476nNyBnV2R8iO+x5S3m+Zx9s=; b=en0kxvL6UYSs93DMVZRRiryssAbTdxLfb3urjen9I1k0tp14QPXJAqsZNDBLuFkku+ lbyp2NwHO0RTHgXghXla9vaxriG9oAnlxKuXFtGFJNi31WIGA+fl7H2tjVb+PYuzvaQ1 8G+uDRaSYsxvmA1IXfor5r6N4FYZ6hwnfXEhz3tZWdE/OGyUZMoWdBIR5iAsQG209eRb rN88GBzogla6wgULiv6TxrcI1WmY8nNF9wOUVG8rYUL9EqeRkxddYeM0lAjol07Hl4Kh GMyxvu+YJ8WthE5NMz2pzryHwkLi7KNxLvUARm8AXwadkr0cEoFgR/93V5O2IaSAtxXb ljvA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=M44lzqYZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b8si12182069eju.351.2019.10.15.05.18.26; Tue, 15 Oct 2019 05:18:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=M44lzqYZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729395AbfJOLrK (ORCPT + 99 others); Tue, 15 Oct 2019 07:47:10 -0400 Received: from mail-wr1-f66.google.com ([209.85.221.66]:43704 "EHLO mail-wr1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726208AbfJOLrJ (ORCPT ); Tue, 15 Oct 2019 07:47:09 -0400 Received: by mail-wr1-f66.google.com with SMTP id j18so23447287wrq.10; Tue, 15 Oct 2019 04:47:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=2rFh15VrB4DEKcYfjt476nNyBnV2R8iO+x5S3m+Zx9s=; b=M44lzqYZ55PCUtw3DvsrdQZn/ARc2y7bf3Hs+7Tj2fei/jNSDBfdWh8cfXKTOAKsvY SHBv/u9sMAP43yNXWl6wBlr/leLB/Xuqni4a+YYvCQtR7yQN5R68epVhwzU+XsKyjeWL kGDErTlZZhuc9so36ovhMRIf6P1VE8xM7UIbrLULMmsYRLAoPO8t0zY/3eccNgWeyb3y qFSQfD69DPfuX3E/abCstS+DW5K6Ct+roBaizDHaBuUxincE2mpMvsMyieSsxvEcI04C JT+MHdwFI9OczZFDIFcpUYLaXxcO1NsgDFB+ZGEWFQew9k+NZAqaofjWtQy3iox9unY9 xLrw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=2rFh15VrB4DEKcYfjt476nNyBnV2R8iO+x5S3m+Zx9s=; b=p4uWHH7GymW+MzlBjqvFd7sGmfvQpo6/Hc8Dr0ytNW43uMVouz4TVkvRNcdBRK0VxC AlT5RUwUWWAkcVN7/qLxL1zowA4/hNbWlFs/9uECpxEbQNM1j2Fo5MDKGGWj349T0ykM mTEtc15tEQzu6IZ4A+IoPlW9whSN6ru83zEuDJpTVZtwVoONxsEqRhdu56oWEamlOeBZ ZX3wjVauxwmMRY5trKc+ViOK/Ht/BnMRDJESnJiINgG47JdgiFffyp5S/rPmJIM+FaRb 3Jh12pSeBYOZHoxxMNDZ92CYycOZEeC/2n3/ryX5SLALXEaScu1J1IQaO/IiPeRPwxzl Pegw== X-Gm-Message-State: APjAAAX83mIMumSqlw4KJYEE3KkYXblQdrfuI1iWgY94zPMK86Sj2mmJ TH+00ccSwbPqwiLgZtwaxQJDEAjJUaI3qw== X-Received: by 2002:a5d:540d:: with SMTP id g13mr26160793wrv.8.1571140026937; Tue, 15 Oct 2019 04:47:06 -0700 (PDT) Received: from andrea.corp.microsoft.com ([2a01:110:8012:1010:8d42:cc61:bfff:65c2]) by smtp.gmail.com with ESMTPSA id u11sm20237307wmd.32.2019.10.15.04.47.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 15 Oct 2019 04:47:05 -0700 (PDT) From: Andrea Parri To: linux-kernel@vger.kernel.org, linux-hyperv@vger.kernel.org Cc: "K . Y . Srinivasan" , Haiyang Zhang , Stephen Hemminger , Sasha Levin , Michael Kelley , Vitaly Kuznetsov , Dexuan Cui , Wei Liu , Andrea Parri Subject: [PATCH v3 0/3] Drivers: hv: vmbus: Miscellaneous improvements Date: Tue, 15 Oct 2019 13:46:43 +0200 Message-Id: <20191015114646.15354-1-parri.andrea@gmail.com> X-Mailer: git-send-email 2.23.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi all, The patchset: - refactors the VMBus negotiation code by introducing the table of VMBus protocol versions (patch 1/3), - enables VMBus protocol version 4.1, 5.1 and 5.2 (patch 2/3), - introduces a module parameter to cap the VMBus protocol versions which a guest can negotiate with the hypervisor (patch 3/3). Thanks, Andrea --- Changes since v2 ([1]): - refactor the loop exit path in vmbus_connect() (Michael Kelley) - do not rename VERSION_WIN10 (Michael Kelley) Changes since v1 ([2]): - remove the VERSION_INVAL macro (Vitaly Kuznetsov and Dexuan Cui) - make the table of VMBus protocol versions static (Dexuan Cui) - enable VMBus protocol version 4.1 (Michael Kelley) - introduce module parameter to cap the VMBus version (Dexuan Cui) [1] https://lkml.kernel.org/r/20191010154600.23875-1-parri.andrea@gmail.com [2] https://lkml.kernel.org/r/20191007163115.26197-1-parri.andrea@gmail.com Andrea Parri (3): Drivers: hv: vmbus: Introduce table of VMBus protocol versions Drivers: hv: vmbus: Enable VMBus protocol versions 4.1, 5.1 and 5.2 Drivers: hv: vmbus: Add module parameter to cap the VMBus version drivers/hv/connection.c | 72 +++++++++++++++++++++-------------------- drivers/hv/vmbus_drv.c | 3 +- include/linux/hyperv.h | 12 ++++--- 3 files changed, 45 insertions(+), 42 deletions(-) -- 2.23.0