fixes broken start for virtual functions:

 kvm: -device vfio-pci,host=0000:07:10.0,id=hostpci0,bus=pci.0,addr=0x10: vfio 
0000:07:10.0: error getting device from group 23: Permission denied
 Verify all devices in group 23 are bound to vfio-<bus> or pci-stub and not 
already in use

and for nvidia vgpu:
 kvm: -device vfio-pci,host=0000:21:00.4,id=hostpci0,bus=pci.0,addr=0x10: vfio 
0000:21:00.4: error getting device info: Input/output error

Signed-off-by: Dominik Csapak <d.csa...@proxmox.com>
---
this can probably be cherry picked for trixie

 ...me-PM-on-devices-that-don-t-support-.patch | 57 +++++++++++++++++++
 1 file changed, 57 insertions(+)
 create mode 100644 
patches/kernel/0014-PCI-Set-up-runtime-PM-on-devices-that-don-t-support-.patch

diff --git 
a/patches/kernel/0014-PCI-Set-up-runtime-PM-on-devices-that-don-t-support-.patch
 
b/patches/kernel/0014-PCI-Set-up-runtime-PM-on-devices-that-don-t-support-.patch
new file mode 100644
index 0000000..3f271ef
--- /dev/null
+++ 
b/patches/kernel/0014-PCI-Set-up-runtime-PM-on-devices-that-don-t-support-.patch
@@ -0,0 +1,57 @@
+From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
+From: Mario Limonciello <mario.limoncie...@amd.com>
+Date: Wed, 11 Jun 2025 18:31:16 -0500
+Subject: [PATCH] PCI: Set up runtime PM on devices that don't support PCI PM
+
+commit 4d4c10f763d7 ("PCI: Explicitly put devices into D0 when
+initializing") intended to put PCI devices into D0, but in doing so
+unintentionally changed runtime PM initialization not to occur on
+devices that don't support PCI PM.  This caused a regression in vfio-pci
+due to an imbalance with it's use.
+
+Adjust the logic in pci_pm_init() so that even if PCI PM isn't supported
+runtime PM is still initialized.
+
+Cc: Alex Williamson <alex.william...@redhat.com>
+Reported-by: Giovanni Cabiddu <giovanni.cabi...@intel.com>
+Closes: 
https://lore.kernel.org/linux-pci/20250424043232.1848107-1-supe...@kernel.org/T/#m7e8929d6421690dc8bd6dc639d86c2b4db27cbc4
+Reported-by: Nicolas Dichtel <nicolas.dich...@6wind.com>
+Closes: 
https://lore.kernel.org/linux-pci/20250424043232.1848107-1-supe...@kernel.org/T/#m40d277dcdb9be64a1609a82412d1aa906263e201
+Tested-by: Giovanni Cabiddu <giovanni.cabi...@intel.com>
+Fixes: 4d4c10f763d7 ("PCI: Explicitly put devices into D0 when initializing")
+Signed-off-by: Mario Limonciello <mario.limoncie...@amd.com>
+(backported from 
https://lore.kernel.org/all/20250611233117.61810-1-supe...@kernel.org/)
+Signed-off-by: Dominik Csapak <d.csa...@proxmox.com>
+---
+ drivers/pci/pci.c | 5 +++--
+ 1 file changed, 3 insertions(+), 2 deletions(-)
+
+diff --git a/drivers/pci/pci.c b/drivers/pci/pci.c
+index 1358f4c17209..5d9208977665 100644
+--- a/drivers/pci/pci.c
++++ b/drivers/pci/pci.c
+@@ -3217,14 +3217,14 @@ void pci_pm_init(struct pci_dev *dev)
+       /* find PCI PM capability in list */
+       pm = pci_find_capability(dev, PCI_CAP_ID_PM);
+       if (!pm)
+-              return;
++              goto poweron;
+       /* Check device's ability to generate PME# */
+       pci_read_config_word(dev, pm + PCI_PM_PMC, &pmc);
+ 
+       if ((pmc & PCI_PM_CAP_VER_MASK) > 3) {
+               pci_err(dev, "unsupported PM cap regs version (%u)\n",
+                       pmc & PCI_PM_CAP_VER_MASK);
+-              return;
++              goto poweron;
+       }
+ 
+       dev->pm_cap = pm;
+@@ -3269,6 +3269,7 @@ void pci_pm_init(struct pci_dev *dev)
+       pci_read_config_word(dev, PCI_STATUS, &status);
+       if (status & PCI_STATUS_IMM_READY)
+               dev->imm_ready = 1;
++poweron:
+       pci_pm_power_up_and_verify_state(dev);
+       pm_runtime_forbid(&dev->dev);
+       pm_runtime_set_active(&dev->dev);
-- 
2.39.5



_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

Reply via email to