Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4324908pxj; Tue, 8 Jun 2021 11:31:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxUTmp9YN5wH6JDqBTvtWigsI5r6iENkE7cdGcQ17kdlH2C/NPYvOwx9uyihWsMm+ShDw4I X-Received: by 2002:a05:6402:645:: with SMTP id u5mr27311773edx.293.1623177119295; Tue, 08 Jun 2021 11:31:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623177119; cv=none; d=google.com; s=arc-20160816; b=dgzFW6GNPk+9TboxbSGtm4pw5uI4q+Kvfm1c5d0zT2l7+JhScUSsKyVU/b7cZEDlxu 08wMovZMDxw9BUsynSyISHZdKvMipsjkC5twOvpDZxbINaQG/MZkn8nw0Cn4Ci05Oo4F E0ZB43sCL/OCJszcUfz5kTk5RRFne37NTDkoyc0jDfFgiyB188T5oSoZGJ3wcLtksgCT /OCaYzMOGiOSr3gaZYa5BWPUUUsqeCSTbVUWPXzgqxzI59nXe8K/U0Iyfgttkq1SDuWO rMAFDTITUweolE/yrkGDNI0QlC7gtOhKTvCeEkj3SimQGXFb75hbcH/hqRZzzS3hcmXr YPPg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=9Qsf1uQZQuJPZTNsafhZLXkGrJ7iMA5D96tBOYmfg28=; b=Pr6Vht2Jh6VoH/FSBePQtz8yqfrGb6/ZeFnQru6dJ8tsJy/c9wRLt5lI9ZjWlP3OGj r+oNlgtPjnjJlHTMaxWucXlldDYOPayV8OyaG4Otm9zCeME0SfBxSi2SYBB2vgpfsOiy aemip9e7RpbVUvNWbxxbd/1laO6r5IFvRZ184NGaInuOkY2gBGUKY5uCQ9AYlmH+3MkU xQa0bE0+FXkFLpt29FrSIhVKw18ZQonhkIn+mrR6RErkcQ+eFTUZqJwEiQh3OnK4Fg7X WdGd1GTI5RoOOtdyzQs4K7FvVRrrmDYbatMwqhNHX3TDeWAQvi5lCbjwev3a4HbcXIec iOvg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=uvWv+Bd6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ga2si359686ejb.249.2021.06.08.11.31.35; Tue, 08 Jun 2021 11:31:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=uvWv+Bd6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234217AbhFHSbp (ORCPT + 99 others); Tue, 8 Jun 2021 14:31:45 -0400 Received: from mail.kernel.org ([198.145.29.99]:56244 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234052AbhFHSbR (ORCPT ); Tue, 8 Jun 2021 14:31:17 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 1F37A613BE; Tue, 8 Jun 2021 18:29:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1623176964; bh=xVMsWp26lw0ReF/0QrK6B1Ds64/IDcKJGNXPTJopo9E=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=uvWv+Bd6N2xTOhOw3xhrX2sAMnErmzLmGiDXnWzKQ73NGtJAwr51kMYsZG/izGqoA vBlks+LtgDBBIetgsZCkJcLTaLP8KbOErYlR8vmCqoWtOk1E9epUBTlLgYikoQ4Rsy VCWCPJJUFYLOZeJSalACBP3s3Qw5TpGtEz5Evkh8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jan Beulich , Boris Ostrovsky , Juergen Gross Subject: [PATCH 4.4 23/23] xen-pciback: redo VF placement in the virtual topology Date: Tue, 8 Jun 2021 20:27:15 +0200 Message-Id: <20210608175927.282744265@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210608175926.524658689@linuxfoundation.org> References: <20210608175926.524658689@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jan Beulich The commit referenced below was incomplete: It merely affected what would get written to the vdev- xenstore node. The guest would still find the function at the original function number as long as __xen_pcibk_get_pci_dev() wouldn't be in sync. The same goes for AER wrt __xen_pcibk_get_pcifront_dev(). Undo overriding the function to zero and instead make sure that VFs at function zero remain alone in their slot. This has the added benefit of improving overall capacity, considering that there's only a total of 32 slots available right now (PCI segment and bus can both only ever be zero at present). This is upstream commit 4ba50e7c423c29639878c00573288869aa627068. Fixes: 8a5248fe10b1 ("xen PV passthru: assign SR-IOV virtual functions to separate virtual slots") Signed-off-by: Jan Beulich Reviewed-by: Boris Ostrovsky Link: https://lore.kernel.org/r/8def783b-404c-3452-196d-3f3fd4d72c9e@suse.com Signed-off-by: Juergen Gross Signed-off-by: Greg Kroah-Hartman --- drivers/xen/xen-pciback/vpci.c | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) --- a/drivers/xen/xen-pciback/vpci.c +++ b/drivers/xen/xen-pciback/vpci.c @@ -68,7 +68,7 @@ static int __xen_pcibk_add_pci_dev(struc struct pci_dev *dev, int devid, publish_pci_dev_cb publish_cb) { - int err = 0, slot, func = -1; + int err = 0, slot, func = PCI_FUNC(dev->devfn); struct pci_dev_entry *t, *dev_entry; struct vpci_dev_data *vpci_dev = pdev->pci_dev_data; @@ -93,23 +93,26 @@ static int __xen_pcibk_add_pci_dev(struc /* * Keep multi-function devices together on the virtual PCI bus, except - * virtual functions. + * that we want to keep virtual functions at func 0 on their own. They + * aren't multi-function devices and hence their presence at func 0 + * may cause guests to not scan the other functions. */ - if (!dev->is_virtfn) { + if (!dev->is_virtfn || func) { for (slot = 0; slot < PCI_SLOT_MAX; slot++) { if (list_empty(&vpci_dev->dev_list[slot])) continue; t = list_entry(list_first(&vpci_dev->dev_list[slot]), struct pci_dev_entry, list); + if (t->dev->is_virtfn && !PCI_FUNC(t->dev->devfn)) + continue; if (match_slot(dev, t->dev)) { pr_info("vpci: %s: assign to virtual slot %d func %d\n", pci_name(dev), slot, - PCI_FUNC(dev->devfn)); + func); list_add_tail(&dev_entry->list, &vpci_dev->dev_list[slot]); - func = PCI_FUNC(dev->devfn); goto unlock; } } @@ -122,7 +125,6 @@ static int __xen_pcibk_add_pci_dev(struc pci_name(dev), slot); list_add_tail(&dev_entry->list, &vpci_dev->dev_list[slot]); - func = dev->is_virtfn ? 0 : PCI_FUNC(dev->devfn); goto unlock; } }