Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp333228pxt; Thu, 5 Aug 2021 00:26:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzDtyQtZRTmO8/U2AeBscXX2oIFtPCst+neBXTauh7rRwF6W16P4w72IVDQIPGA4B73/fR8 X-Received: by 2002:a92:c52e:: with SMTP id m14mr127972ili.257.1628148374212; Thu, 05 Aug 2021 00:26:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628148374; cv=none; d=google.com; s=arc-20160816; b=T58G72WOpWKAdI3UgVvpZDKhJ0hNFmbUSDRf6LepH8O84Ep5XBnp5YjaQ/z/tOask1 xKM0XpmcgjfnRxSiKUxuyucerSUNB6NajpPpldafHYgRR4gVwX/fGj43kLbeEMbljEN1 0SoipOJjqd5VgvxIgTkWWpevX+wOQN7eGYcTKrNgC+Xew9/liKWivPwkTFUp7h1ZfxEO lB1KYjo2NbD4D10UR4rom7NGCN1aP9NJNBs5NKxCTsQCNx9V/Lqg1NLluQhE20jotuLm K5W4mOjV1US4OYXWxH+i1R9IZTFnAcM6ZBFOZ1HT1UqO7hnKOd7NzSKi/lNhCoDqwBHk oZwQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:dkim-signature:dkim-filter; bh=8ZS3qjGMVs6QTqYWCjbIVHJG68fUEK73WxNFX/N/e88=; b=Nbx8h0gMQ48i3um+TlR+Vee5g7ixMbMqjr5Rkl/3rlrC95Y+8YG+B4QlGEfgK2rKky TEVSf7OZnlfbGKNKjRl53ZA137jifP8oQ/SHe84P3eXJTDFAKoBcxvnrd+ISR4WTjdfD 9n+aDXCwPqRfCrcVQzSStZADPt/ZdLIp5j94CLGsOLkM2LQnjHmokHxapJxZ8mGacv5O fQcEc7tiN3jE7jpIUhEMetMoM4GJ4wwXyIt1rrDS4W0pnRIb59oB0InurfIq11ZPLFjK Qu7VhcOfdosw7MB8AkV5jezJ25GL2onwI2vObx9aQ89b2kUQqwwDInbSI3mSeS6Fw32/ r6Hw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxonhyperv.com header.s=default header.b="IL/3MfEA"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxonhyperv.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n8si4400914ili.154.2021.08.05.00.26.02; Thu, 05 Aug 2021 00:26:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxonhyperv.com header.s=default header.b="IL/3MfEA"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxonhyperv.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236608AbhHEHAr (ORCPT + 99 others); Thu, 5 Aug 2021 03:00:47 -0400 Received: from linux.microsoft.com ([13.77.154.182]:48604 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229869AbhHEHAq (ORCPT ); Thu, 5 Aug 2021 03:00:46 -0400 Received: by linux.microsoft.com (Postfix, from userid 1004) id 1B3C320B36E8; Thu, 5 Aug 2021 00:00:33 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 1B3C320B36E8 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linuxonhyperv.com; s=default; t=1628146833; bh=8ZS3qjGMVs6QTqYWCjbIVHJG68fUEK73WxNFX/N/e88=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=IL/3MfEA1NOR257CrrfTVGRpSUkPAFZRMwd3FYMIGU5S7MvIqSq9To7SsTALVeG31 uh4Vo/8UHV799RbMLhhw9j6SaHUnzazxG62fORkNyKIP7J6qLdWl3FdXQtk9rlDtnN GontWuq906VewSAtOv7zQ84jT9BBYmMHgorLLHMc= From: longli@linuxonhyperv.com To: linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, linux-hyperv@vger.kernel.org Cc: Long Li , "K. Y. Srinivasan" , Haiyang Zhang , Stephen Hemminger , Wei Liu , Dexuan Cui Subject: [Patch v5 1/3] Drivers: hv: vmbus: add support to ignore certain PCIE devices Date: Thu, 5 Aug 2021 00:00:10 -0700 Message-Id: <1628146812-29798-2-git-send-email-longli@linuxonhyperv.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1628146812-29798-1-git-send-email-longli@linuxonhyperv.com> References: <1628146812-29798-1-git-send-email-longli@linuxonhyperv.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Long Li Under certain configurations when Hyper-v presents a device to VMBUS, it may have a VMBUS channel and a PCIe channel. The PCIe channel is not used in Linux and does not have a backing PCIE device on Hyper-v. For such devices, ignore those PCIe channels so they are not getting probed by the PCI subsystem. Cc: K. Y. Srinivasan Cc: Haiyang Zhang Cc: Stephen Hemminger Cc: Wei Liu Cc: Dexuan Cui Signed-off-by: Long Li --- drivers/hv/channel_mgmt.c | 48 +++++++++++++++++++++++++++++++++++++++++------ 1 file changed, 42 insertions(+), 6 deletions(-) diff --git a/drivers/hv/channel_mgmt.c b/drivers/hv/channel_mgmt.c index caf6d0c..705e95d 100644 --- a/drivers/hv/channel_mgmt.c +++ b/drivers/hv/channel_mgmt.c @@ -26,6 +26,21 @@ static void init_vp_index(struct vmbus_channel *channel); +/* + * For some VMBUS devices, Hyper-v also presents certain PCIE devices as + * part of the host device implementation. Those devices have no real + * PCI implementation in Hyper-V, and should be ignored and not presented + * to the PCI layer. + */ +static const guid_t vpci_ignore_instances[] = { + /* + * Azure Blob instance ID in VPCI + * {d4573da2-2caa-4711-a8f9-bbabf4ee9685} + */ + GUID_INIT(0xd4573da2, 0x2caa, 0x4711, 0xa8, 0xf9, + 0xbb, 0xab, 0xf4, 0xee, 0x96, 0x85), +}; + const struct vmbus_device vmbus_devs[] = { /* IDE */ { .dev_type = HV_IDE, @@ -187,20 +202,19 @@ static bool is_unsupported_vmbus_devs(const guid_t *guid) return false; } -static u16 hv_get_dev_type(const struct vmbus_channel *channel) +static u16 hv_get_dev_type(const guid_t *guid) { - const guid_t *guid = &channel->offermsg.offer.if_type; u16 i; - if (is_hvsock_channel(channel) || is_unsupported_vmbus_devs(guid)) + if (is_unsupported_vmbus_devs(guid)) return HV_UNKNOWN; for (i = HV_IDE; i < HV_UNKNOWN; i++) { if (guid_equal(guid, &vmbus_devs[i].guid)) - return i; + return vmbus_devs[i].dev_type; } pr_info("Unknown GUID: %pUl\n", guid); - return i; + return HV_UNKNOWN; } /** @@ -487,6 +501,16 @@ void vmbus_free_channels(void) } } +static bool ignore_pcie_device(guid_t *if_instance) +{ + int i; + + for (i = 0; i < ARRAY_SIZE(vpci_ignore_instances); i++) + if (guid_equal(&vpci_ignore_instances[i], if_instance)) + return true; + return false; +} + /* Note: the function can run concurrently for primary/sub channels. */ static void vmbus_add_channel_work(struct work_struct *work) { @@ -910,7 +934,11 @@ static void vmbus_setup_channel_state(struct vmbus_channel *channel, sizeof(struct vmbus_channel_offer_channel)); channel->monitor_grp = (u8)offer->monitorid / 32; channel->monitor_bit = (u8)offer->monitorid % 32; - channel->device_id = hv_get_dev_type(channel); + if (is_hvsock_channel(channel)) + channel->device_id = HV_UNKNOWN; + else + channel->device_id = + hv_get_dev_type(&channel->offermsg.offer.if_type); } /* @@ -972,6 +1000,14 @@ static void vmbus_onoffer(struct vmbus_channel_message_header *hdr) trace_vmbus_onoffer(offer); + /* Check to see if we should ignore this PCIe channel */ + if (hv_get_dev_type(&offer->offer.if_type) == HV_PCIE && + ignore_pcie_device(&offer->offer.if_instance)) { + pr_debug("Ignore instance %pUl over VPCI\n", + &offer->offer.if_instance); + return; + } + if (!vmbus_is_valid_device(&offer->offer.if_type)) { pr_err_ratelimited("Invalid offer %d from the host supporting isolation\n", offer->child_relid); -- 1.8.3.1