From patchwork Tue Feb 4 13:54:02 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mykyta Poturai X-Patchwork-Id: 13959278 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id CEA9AC02196 for ; Tue, 4 Feb 2025 13:54:17 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.881479.1291619 (Exim 4.92) (envelope-from ) id 1tfJNO-0007PL-MO; Tue, 04 Feb 2025 13:54:06 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 881479.1291619; Tue, 04 Feb 2025 13:54:06 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfJNO-0007PE-JK; Tue, 04 Feb 2025 13:54:06 +0000 Received: by outflank-mailman (input) for mailman id 881479; Tue, 04 Feb 2025 13:54:05 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfJNN-0007P3-IB for xen-devel@lists.xenproject.org; Tue, 04 Feb 2025 13:54:05 +0000 Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on20616.outbound.protection.outlook.com [2a01:111:f403:2612::616]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 7eaf51cf-e2ff-11ef-a0e7-8be0dac302b0; Tue, 04 Feb 2025 14:54:04 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by AS8PR03MB7494.eurprd03.prod.outlook.com (2603:10a6:20b:2e2::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8398.25; Tue, 4 Feb 2025 13:54:02 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971%7]) with mapi id 15.20.8398.021; Tue, 4 Feb 2025 13:54:02 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 7eaf51cf-e2ff-11ef-a0e7-8be0dac302b0 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=G1xk/Csr6sWrFaz1ZuFj7M1r3OPxnOeA4y4DWtnXfdYlWH8Hh/b7hfdFvzhAG6NhJJGMAgF1Ssk75omx39HCw09X18o6Lyi49dBMjGTaKiiAlhKwhT9crfROFThD5sRyax0m/xNzjaiZuPKAcPX1K3YLSnkZLJlNqf3wWqmIBeSyX62aQQjYkzkPtlM9xbuMCfhuuwibFsCxiacDtyVOqn12eIPNg999z8t+4qLj1II9M9g36PubTjyYCfwBNXEAMY73fXTCC4nO4Akuqui2y6+huVnhv+bA5eWguc7YPZ95I0JNEzEWsNMpoct3K4cP8/AHAv6zZumMf6Zyk/N71Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=cG1gEnUonuBncBYKrYEztMAxoL05fqUpUbEmPaIDu84=; b=D45u3CuYof50S+pCZXoauGq32PHotBXtTOozqB3PpBfjAk+mS5CzXTAIR+aoYLP9s3hv8HKL4W51RRyBdGGYfm/sIUUd0XlGkRBkFAwNJVNp/hwkmI+SfMGcOVc0XGiG9PsbH56N01wnQKCCEmPJK3Sjg2c+6L0SgTwQRz3HIs6Q5oZbMx51gQ59DjgcOLtaVlX7HCkxvsp/oh602kdUqKEmcXkbGeV2OBObi3mcvJi3WEELdOYo5dF+ORYazKzjFy5ptrztuEJ6w7/S5/774raU2fThRclxIiZjkasGHCzZVSHHGAW/KBhKoN+NIH3zWHYXBzczOvU+Sa/j7uJzNw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=cG1gEnUonuBncBYKrYEztMAxoL05fqUpUbEmPaIDu84=; b=qvCWW6XfaENNulsfC8H/a4tjfBjBQSaGwlqpKC/EsF/W5n4VyR2AUF1skx53+KIFT5qvzj/xn77uPjQA/CXu87WpCvgPXylOmcUO/XNo0ePRqehnjswNupoUUFtdwOVY8nNRdItwqpjJwJliyOHnpnDMwLE8FIv/UcwdOMIl0O+EN93jp3Ux2MH6IhwO8SWGgG4SZ5peVfwaLwWCAXPERUJ6TEqhNgffoWj8tBlXwhgWumekrIR8f51A/ItRRfJkI9ScqUECG9d2gJZ0xMnkjDnKJgbwrNClVoTGw1fb3iRFx0mmM1ANV4GujfdS51M2+F4i6c8LYchkQV95HSGqhg== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Stewart Hildebrand , Oleksandr Tyshchenko , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Jan Beulich , =?iso-8859-1?q?Roger_Pau_Monn=E9?= , Mykyta Poturai , Julien Grall Subject: [PATCH v7 1/8] iommu/arm: Add iommu_dt_xlate() Thread-Topic: [PATCH v7 1/8] iommu/arm: Add iommu_dt_xlate() Thread-Index: AQHbdww/QlqQCIk8+U+5HZnqhslnRw== Date: Tue, 4 Feb 2025 13:54:02 +0000 Message-ID: <224570237ae19d10c554a14c6d8e34f171a3ce11.1738665272.git.mykyta_poturai@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|AS8PR03MB7494:EE_ x-ms-office365-filtering-correlation-id: 8df5758f-b041-49c4-7b8c-08dd452361f1 x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|1800799024|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?q?FBBWtVf4zCCWncNK/VbblfduCf?= =?iso-8859-1?q?5yS3/KZQEMyhRUEAS5DJo1OUXJWbaaPu3EolhS0ETLtTBMl80Vd++iA55Irs?= =?iso-8859-1?q?xX8JwPxm/wjhfl0iQ4tU/pjjrxqRVrvja5f4j4LyAkU0vtp23QvYQLEF6uwu?= =?iso-8859-1?q?jXSo+jGfrK179zK7IR6JAd9e497J6alexrSb5zevQHq5wAu6ySq2Ejx0KnOh?= =?iso-8859-1?q?GLKRFQPlWnU1H11HaWGOlQbHOK/e2/4YcxWTUgLSa8lOTpMk20qqvr6VI77N?= =?iso-8859-1?q?2yCMMmDuQjh+FWM1da+/MNN4q73Z//4s+i0myltOUrJtpWr4+jsKavjo/CXR?= =?iso-8859-1?q?OG9UmHPhdyLqaT81RaqpiHlcm7ooHeSCEvGkoFZ/QSb5wtd+4AcKzj1C4qzN?= =?iso-8859-1?q?cD+7+XtwkIOdqsG6vh+so0kdUQ/8SVNt2QhBIgntRRTOFQa1kb5wgJpDJwqZ?= =?iso-8859-1?q?IzENgZXul2tZisDeBbhhmGNeevgehGqawqUEgKhy10bXr9Z9vt7qpUEWnX+e?= =?iso-8859-1?q?inoyAH3eGMA1U0UlSAi1mE8yWPrhEMnoECtY/RekzNDz1Ks8Rf/XwnAXtnFy?= =?iso-8859-1?q?rvdgP+VrT7zXRpoMR48dWvChO3O8Me2Ia13/BtQzM/XaAab7AvkbeGCc6lzC?= =?iso-8859-1?q?1l9QxfcW3LF5rL3/1N1uePE8DpPZnJ/950upFE6pvQ2We2Cog6QmAcFq9KVr?= =?iso-8859-1?q?QuGDu+hxZrw/GadoR7G84PA8J06zcxNm61fuqw3QrU4a7ZZZt2gVsUjXaQDT?= =?iso-8859-1?q?gVk13gywAPw0SmRNOQSytYtzrEDCRD85oL3PawnRtCDC3mdemAVnZFiDFEbj?= =?iso-8859-1?q?Trklspt+OPRqpj9lIJ9mb5O2egSYtQuUdaSo94uYkdDVODZsnz783eaf8YVg?= =?iso-8859-1?q?0xLKCqfqx2Msxqr2nzVj4tgBsjmNH9ZIZSqbP2Pl2LUnb0DIOU8e5yeGT8V7?= =?iso-8859-1?q?fgfp+zKODnDM2k34kRCdzyFC+COU4qLLZKTxMB1YT3CzOOOV2puH67Jk4fdR?= =?iso-8859-1?q?UNjzFDIxWt6WKTPCOIMVYtMTuM9eXZmXCfzuTbSWkGgWSCDYmEyNKsz81gUK?= =?iso-8859-1?q?uqHHvPRQj1xgbI1Wa9pltN0dOn+5OQTSEhYlw7el4YJyoRYvMm3zb01KJU6a?= =?iso-8859-1?q?Zz354qpTh7VPKdxBfEgLMqRcdUUgWRKemzh6hqOQmMxwqbTRUfyUGuAtfTWW?= =?iso-8859-1?q?Yu2qDqORjLYwZT2KjZod6DtV4JNaHttJ5x6qtkjNdDW3YiW7oOUKP5qyWUns?= =?iso-8859-1?q?KVRMtZg6heGvbKGk8JUC7d7cj80InEr6bD4PxJiMjw/6y8cJ0nYq86PFspzU?= =?iso-8859-1?q?NHEWpG8kWrviAL/8Hcy2Js7PgFpC3F69O8I56JolRA4+DQM6/Ej9mXNH2GhQ?= =?iso-8859-1?q?7MKN0vw0Bmjkak+07TnfAzL6jftzH3uo9eYUkUK6zd2MLW+Dyrep0QZN7jw+?= =?iso-8859-1?q?/TW4yBBp9XRjViYvmqwf0oOF82cHU/85Qf5l1iAlFOitG4v2ARJrSXzyIWW+?= =?iso-8859-1?q?4jTV5A?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?q?NL7/SRBF5PudTIAEeMRenpR?= =?iso-8859-1?q?R05DnKPfYexVg8J9XHJU8yTMf6LUVHzswTIq6+n+v1qaFCQebKoOOic6nh8o?= =?iso-8859-1?q?YcaQ/elGuL7JNaAfRuyA7yOxwqzxy1E6QnR76z1sC6eJzCZLReELi7pLvnU/?= =?iso-8859-1?q?+O7OcbjJN0fU1MZiNbNieJmamKZ80xTqtbk3fj4s7kQHjTUA7qwpfCEJBTXS?= =?iso-8859-1?q?YmBmnExARj13dZn0dbEseogNaAYMF1FSxW56hIvTP4xzl08AOhgzQ86mUjrd?= =?iso-8859-1?q?yUC2ap2j2qzcm/DATh70gYdB2u989PIYrTzr3OvcoGGR/P/sOoDgMqEynsRq?= =?iso-8859-1?q?qZjZ4RrNqsFZI+pO8x4owuadqUSk8DeAj3zUuUzCOf3WGSreGdP/Q7OZDIhT?= =?iso-8859-1?q?UsIKiYnhnv+LNJS/PrLq0WBtqKbk99uyJ5j8NpayJ23GJ84fkh4Tmhfic4p1?= =?iso-8859-1?q?Kj59eL/eSS38NlDUtfkAiHR5AOMr52AixosTGLCDaEb9CG3XK8QaS24GaiCz?= =?iso-8859-1?q?YZwtYOxY3qylcjdrowWgF5YzfJmr4oTSwOlvGHuVSQ9A7nNDhezcvz4iAfxb?= =?iso-8859-1?q?7VUj1OToQrQcGT5zDrjnrliFZBsJ7SJrqq1ZwvV1OP5RHJq5apXedZ+WdCpV?= =?iso-8859-1?q?jZ1DHG6yrm0KEMHOKn5+1ZQdz2FVhtjryXOi0JaWkceIfilM/GtKy3DjwgrJ?= =?iso-8859-1?q?yfWbvdCpSyF/jwO5RVoDLHooIZNiJwz20jhNSLz7JFI4U0MH7IPEv4SoVITp?= =?iso-8859-1?q?eB5GzQUsdRiiIlZ5l33wavtY8zWFsoOmiDXu4iOoe6upg2BiU1Wrm3iGZw78?= =?iso-8859-1?q?yiRamLn1swPZqpRPdh2bemW2ODDivvB/WcWhln69GbEwuaJL24jRpGxModsI?= =?iso-8859-1?q?jsUD1dKZMH81IkMwlZ8CQXUFjYEX5/4jSF7SomzQm4/moi6JNLxUeSAYz+Q/?= =?iso-8859-1?q?mZKL2MXTgCa1EupX3VFRrK5mBOJTU4jFrVwfwEZ9Hx/2zPKTlv3OL7hxXaK8?= =?iso-8859-1?q?BOrS1Z0elHX0RobsbSqyQhS8vtPYGj6bcK5pA6ZNHkWUoMMalDu45MjPIhku?= =?iso-8859-1?q?PWjSfYFF717DFObNgWt5q20W0nvACfr4dyjpywuzHE9T7VMSj31nHl4NH8fj?= =?iso-8859-1?q?65QkIc3IaccgoLy9MMt2ioUjcex8fjuBbvLpZQK1/jbGVTPU/zJU2mT8DXWL?= =?iso-8859-1?q?bhJFQAr5BzSA87jislZHQ2QBHuCA9ywGSNOLGO9io7d0q/pls6NHKwCKI71V?= =?iso-8859-1?q?0jhCrk4St7wH5I1Vn5WG8Xtjv6oDSW+h8gFTJnX/cPo4rx6gCaGdQKSooxbO?= =?iso-8859-1?q?6niRy38U7mfSju8Hy+Y/UO9LJBl2c+JDjMKsGPlM6+2nLf7eiqAX7Lw0y10z?= =?iso-8859-1?q?5POeKXWmDQX7IN1P0f9pSgj6hDkGTRwVh+lBPOT8FTuzYAZr90QP1QGeI0NP?= =?iso-8859-1?q?XGK1n3V1Mikin1/MeAGn6qF9cYYaiqOLJUYldyDsSFYsQNnuyn8rrbXoHAbD?= =?iso-8859-1?q?Kppj6yWr+Z92PySvgVoCP0E6f9tsCezzuxPaz8EIPQcYdTxmTBnEZcBxhUQR?= =?iso-8859-1?q?Z1Ve4T/j4dQY7k2rWbckg49AXR61IarlqvhQ6vDyCnDnLNYBcpmd04ewuy0R?= =?iso-8859-1?q?lza/KqJX4xZpYVQxcj5mMZgtWjErm1zASDTT0kA=3D=3D?= MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 8df5758f-b041-49c4-7b8c-08dd452361f1 X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Feb 2025 13:54:02.5186 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 2ym0NX/LFE8q+kkmk49bPfXHvCdF9qSGWoAxGD7pQRYRKWA+hFE17h7qUjcb1gfCLAt8ipuDizZQqz73lf/hcg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR03MB7494 From: Oleksandr Tyshchenko Move code for processing DT IOMMU specifier to a separate helper. This helper will be re-used for adding PCI devices by the subsequent patches as we will need exact the same actions for processing DT PCI-IOMMU specifier. While at it introduce NO_IOMMU to avoid magic "1". Signed-off-by: Oleksandr Tyshchenko Signed-off-by: Stewart Hildebrand Signed-off-by: Mykyta Poturai Reviewed-by: Julien Grall --- v6->v7: * explained NO_IOMMU in comments v5->v6: * pass ops parameter to iommu_dt_xlate() * add Julien's R-b v4->v5: * rebase on top of "dynamic node programming using overlay dtbo" series * move #define NO_IOMMU 1 to header * s/these/this/ inside comment v3->v4: * make dt_phandle_args *iommu_spec const * move !ops->add_device check to helper v2->v3: * no change v1->v2: * no change downstream->v1: * trivial rebase * s/dt_iommu_xlate/iommu_dt_xlate/ (cherry picked from commit c26bab0415ca303df86aba1d06ef8edc713734d3 from the downstream branch poc/pci-passthrough from https://gitlab.com/xen-project/people/bmarquis/xen-arm-poc.git) --- xen/drivers/passthrough/device_tree.c | 48 +++++++++++++++++---------- xen/include/xen/iommu.h | 3 ++ 2 files changed, 33 insertions(+), 18 deletions(-) diff --git a/xen/drivers/passthrough/device_tree.c b/xen/drivers/passthrough/device_tree.c index 075fb25a37..4c35281d98 100644 --- a/xen/drivers/passthrough/device_tree.c +++ b/xen/drivers/passthrough/device_tree.c @@ -137,6 +137,30 @@ int iommu_release_dt_devices(struct domain *d) return 0; } +static int iommu_dt_xlate(struct device *dev, + const struct dt_phandle_args *iommu_spec, + const struct iommu_ops *ops) +{ + int rc; + + if ( !ops->dt_xlate ) + return -EINVAL; + + if ( !dt_device_is_available(iommu_spec->np) ) + return NO_IOMMU; + + rc = iommu_fwspec_init(dev, &iommu_spec->np->dev); + if ( rc ) + return rc; + + /* + * Provide DT IOMMU specifier which describes the IOMMU master + * interfaces of that device (device IDs, etc) to the driver. + * The driver is responsible to decide how to interpret them. + */ + return ops->dt_xlate(dev, iommu_spec); +} + int iommu_remove_dt_device(struct dt_device_node *np) { const struct iommu_ops *ops = iommu_get_ops(); @@ -146,7 +170,7 @@ int iommu_remove_dt_device(struct dt_device_node *np) ASSERT(rw_is_locked(&dt_host_lock)); if ( !iommu_enabled ) - return 1; + return NO_IOMMU; if ( !ops ) return -EOPNOTSUPP; @@ -187,12 +211,12 @@ int iommu_add_dt_device(struct dt_device_node *np) const struct iommu_ops *ops = iommu_get_ops(); struct dt_phandle_args iommu_spec; struct device *dev = dt_to_dev(np); - int rc = 1, index = 0; + int rc = NO_IOMMU, index = 0; ASSERT(system_state < SYS_STATE_active || rw_is_locked(&dt_host_lock)); if ( !iommu_enabled ) - return 1; + return NO_IOMMU; if ( !ops ) return -EINVAL; @@ -215,27 +239,15 @@ int iommu_add_dt_device(struct dt_device_node *np) { /* * The driver which supports generic IOMMU DT bindings must have - * these callback implemented. + * this callback implemented. */ - if ( !ops->add_device || !ops->dt_xlate ) + if ( !ops->add_device ) { rc = -EINVAL; goto fail; } - if ( !dt_device_is_available(iommu_spec.np) ) - break; - - rc = iommu_fwspec_init(dev, &iommu_spec.np->dev); - if ( rc ) - break; - - /* - * Provide DT IOMMU specifier which describes the IOMMU master - * interfaces of that device (device IDs, etc) to the driver. - * The driver is responsible to decide how to interpret them. - */ - rc = ops->dt_xlate(dev, &iommu_spec); + rc = iommu_dt_xlate(dev, &iommu_spec, ops); if ( rc ) break; diff --git a/xen/include/xen/iommu.h b/xen/include/xen/iommu.h index b928c67e19..c3b8df9815 100644 --- a/xen/include/xen/iommu.h +++ b/xen/include/xen/iommu.h @@ -238,6 +238,9 @@ int iommu_do_dt_domctl(struct xen_domctl *domctl, struct domain *d, */ int iommu_remove_dt_device(struct dt_device_node *np); +/* Error code for reporting no IOMMU is present */ +#define NO_IOMMU 1 + #endif /* HAS_DEVICE_TREE */ struct page_info; From patchwork Tue Feb 4 13:54:02 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mykyta Poturai X-Patchwork-Id: 13959279 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 2297EC02194 for ; Tue, 4 Feb 2025 13:54:17 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.881481.1291635 (Exim 4.92) (envelope-from ) id 1tfJNQ-0007h7-Cw; Tue, 04 Feb 2025 13:54:08 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 881481.1291635; Tue, 04 Feb 2025 13:54:08 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfJNQ-0007fP-5f; Tue, 04 Feb 2025 13:54:08 +0000 Received: by outflank-mailman (input) for mailman id 881481; Tue, 04 Feb 2025 13:54:07 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfJNP-0007P3-7j for xen-devel@lists.xenproject.org; Tue, 04 Feb 2025 13:54:07 +0000 Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on20616.outbound.protection.outlook.com [2a01:111:f403:2612::616]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 7f73919b-e2ff-11ef-a0e7-8be0dac302b0; Tue, 04 Feb 2025 14:54:05 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by AS8PR03MB7494.eurprd03.prod.outlook.com (2603:10a6:20b:2e2::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8398.25; Tue, 4 Feb 2025 13:54:03 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971%7]) with mapi id 15.20.8398.021; Tue, 4 Feb 2025 13:54:03 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 7f73919b-e2ff-11ef-a0e7-8be0dac302b0 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=l6NAciO1rGWv2E5zOf7+2zB7TvUY3ULPV7GpH6XuJjeZ0raik34O+c3IhBjIAvEgx5SgAeC3gmfz3fKhnr+2N5DQRuIgIX4Cq0OF8Ui/9BRni3BTTMlLM6M6w0BDYTDma+ClCD9mefc/VL1Jz+IaTN0JH+hbh5FxNy8rKqcQQWUojWRCPO+tv9FepI6oU22PXS36EjRjfvE3BbWYh0yRJ4/6eilvq+OsKjBk/WpfJ1N8+Ao4/hoHbWpchrtOJLGFG75wQYsIsGuWqFwTdfJLKy2tjdHcrJs9LINfqJ9m/Nhc91p2FKPe6J8kh4DQsZdBPzwBR/Itro5bjKArH5AgIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=rcDxDDzV0nXc3Oe/VjJpBckwCTeLIyuU4o2H6BVgetE=; b=PH7tPutksOc2T46sqJ0cGBOGhr8rKfgL2aiYpbPPP4swKpeURNomQOsWSiohgx8Hq9ThLoZekYWU8Jdjmpa/WY8FQoUSiEbh5lMFBOhFxci0KhCk3RDfzvJVXwNbLxp4If6X96DY9GfN2YJkrlf9uP4kHK6PA25yJBESm5e2I/a1szpuWp/5YeBzAixzOOQE4leOcgXnwy9qnbALq2SNrd3BoscATqUut2q5D+/hnka8s20fDDpmUdQ8DJrMvgSW8bGPwe/yX1e2y2+1/TlGC8BmfwUsLpO5KSQGYDHf4cYC/eXl8zHiVwzZMM9aIYo9JBzatSiTX05yks377PcMaA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rcDxDDzV0nXc3Oe/VjJpBckwCTeLIyuU4o2H6BVgetE=; b=L5D1oCMcyCdMU1BLvgC//hSWwp3vE6P+tlRaqCmzxotbNRtl0zSCxb0enIPH4bLQ1ZQT4QWOuG0OopAvuOMDJFH0lJnmXfpQo7p5I1/rcb8GtwuVcaZamT9PBHARxjkAVYtm+t0kHnZJB+3JAyxLpyh02iBYKhNDE2MG1F4P26SlwC0X15giWCMVD8/8G1lyJmv29V7uSwzyD0EXV96djw68pf2U3FVDHOLJcjBgHBpzkvAFz/wrhIBA02tZlVQJJmwf98ViHzppOTThDuB27ecZnanedXNctcuhTC7Cup/XfX/Sa6fIuoxUFvWIajzU2Pfk244oTUhV+WpcYNqKFQ== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Stewart Hildebrand , Oleksandr Tyshchenko , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Jan Beulich , =?iso-8859-1?q?Roger_Pau_Monn=E9?= , Mykyta Poturai Subject: [PATCH v7 2/8] iommu/arm: Introduce iommu_add_dt_pci_sideband_ids API Thread-Topic: [PATCH v7 2/8] iommu/arm: Introduce iommu_add_dt_pci_sideband_ids API Thread-Index: AQHbdww/qCT0TCxV3UKquqIUpSdYjQ== Date: Tue, 4 Feb 2025 13:54:02 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|AS8PR03MB7494:EE_ x-ms-office365-filtering-correlation-id: 1ff38ae0-7632-4e25-0bca-08dd45236231 x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|1800799024|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?q?tYXa6m0CSuJXAJyea45NstWy/Z?= =?iso-8859-1?q?4RtypWIDejuZrg99Y195vnTmElD7Xdt97MlO0IoN8bpMWlnfLgUnRPxthco0?= =?iso-8859-1?q?9HXd2UAvHa9yCSTzAJJpGypSSYa962Ibt4MztwH91g896O/Gn8yeJxsnz08y?= =?iso-8859-1?q?cyyeWU84cUv4U1cHOq0OPRLqKmHgNVGV10O2fa+zFVLXHGHcQUEn/8hYknMJ?= =?iso-8859-1?q?eziNgGII2nEET5pEBW2/xHTRXNoIhm9mRL9L3zazbW7tVhHpE6YyA3FC02fw?= =?iso-8859-1?q?dICuK198fGuZ3kelwK5FOZlknf0Ss5wyjmBLsqRan3isFgpWyhu18PKl+NQv?= =?iso-8859-1?q?LjTtZWYbSSd+ne4Vefdry27Kk7YEzG+9DXGr1EvroQ5s9e2PC9u1FKyCvAae?= =?iso-8859-1?q?xrRX2JxuW/lyHiaKchmq+bSYh5A+W3apKlNsOZuEmTq+mSv1hDDMnSLWCGSo?= =?iso-8859-1?q?w4IU/ae0S30yJlrWPEMpQsx5Qgs42XWNigNrItNHK/aImed62eCiGXoLKuzL?= =?iso-8859-1?q?JBMUkWHpuvLr76BWMSchGi1HoL8ERHbFtk5jZnyFgG/EuKiBe91S+lMfMnhT?= =?iso-8859-1?q?Yc/vmFHd+Ss8IaFFudEng7IyhQeY//WnY7UVGCz6/JKhyNk/7hJyYVLA77Nb?= =?iso-8859-1?q?XHTvyxQlBrqzXEHlZs/78y79mbfNOHU43/iXP0I2MPeiePOjccr6j1I9S4eE?= =?iso-8859-1?q?s81ycDvMdUapEZ9kNY694irEjnbWCQG2U/K0pds7WNaxcLwzPZ+SUVKsUeX/?= =?iso-8859-1?q?VVzOxYxVzKMMlGpSWbMerGvBre3dBCYTw9rdnPZA1wUltxSTaYllN/llbRjR?= =?iso-8859-1?q?nBGbp0zSFPq5ReVYq4G1FbM8xYp/4JZJmxBGOcDl4h0tJPDQl2OtaSljR5FG?= =?iso-8859-1?q?ErEP/2QLY4qN3/cZWifJd6PRnVnBMcutqsq/8JPibm71OSszjE0niGlb09Jy?= =?iso-8859-1?q?KFBsaexsjbhNV4iTf6d+nrgWHJR3MPQ4Ct/JIxZO77QNi1EqXFm73NJcD/Mw?= =?iso-8859-1?q?wnwcDyzLv3kBw+wX6cy2/bE1PjFTaGKbDYilY4fiO9B4gMZpFrxVLx5WZZm2?= =?iso-8859-1?q?G4hb7CaBSmDpBeiJzDOVuErijd1MVgiJPZ7rJPVNwCEmTxV1Qa31ISmkcbRh?= =?iso-8859-1?q?iylU+iwvovcYQO+7PRzhcwkUsE36jHkdOFWQ2F+dE/E1C/yuyYu4yoNoeEhp?= =?iso-8859-1?q?ZenWN39Xt2V4KWiC2qmZgWzA727N3adD2GAMf+3hyPGlXMlZEdqdb+6nlG0f?= =?iso-8859-1?q?ArpVN0wV61phQ6S4dJkTDouAD8QwfNOllLPjyJfuDZ14An6PbM6px5dAPaYe?= =?iso-8859-1?q?3iG2gP574u80m0Kud3Yq7tirgboTK+hBIjbf94o3eGrBC2HRZrVHXmzjGW1b?= =?iso-8859-1?q?9SSys5AU3Er5rJjo+lKIsEW7Q/FcFBqWjDceMyimg1sSKGXyPVK7kk4yYv3O?= =?iso-8859-1?q?RpmzeJvH0laoA4Xb/1Co6Cu+4qOxvjTk4cpl+uNzWKAwkdVkErGEmXawdcS+?= =?iso-8859-1?q?Z4n68M?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?q?hpV2+EAZUXS1viqgozEW4uZ?= =?iso-8859-1?q?IP7KftYbwdMd4tGRUA1k4xg9bKxd/OfqVUY9jIMVeovXMcB7rGZTY4N5h7Ub?= =?iso-8859-1?q?FcTuiH92saBX03EhtuSW3lBo/L0gJJ1a9Q1b5Au8o+Asg1o30hGYi6Q/SGLi?= =?iso-8859-1?q?6OujtF6OXDWrkQkzOmd+Yj4ncrei0jq2OA7/K4zokkHa5p89UqzC5p1LrvjG?= =?iso-8859-1?q?YR6ccbJpL1Ljf9DN5Nn6mjM5Q86JsSkxBIj9cywQYUBYXq5Tcw9RX8tirNfW?= =?iso-8859-1?q?eef+15AsKv5VkryjLrZ053gSPocRbAc7sMLE4IB7rDEogNSEmIR2y7CvqFYb?= =?iso-8859-1?q?K/oE6o5VjgNYIZfChKBvN++X9BGm0zP+ly1FbPqf6p3oPil87znj9IQI36LO?= =?iso-8859-1?q?K8hk0V11iP/KDQ/1tPjTb9AzcLy6I64WgTPZ0016793qv2fzcEl/cZOTgxIL?= =?iso-8859-1?q?nseRMbhLc7TVhmvyXYKvQmylbMsfEy923mqEYiMBK3b4hg19G3+zpleD+g0W?= =?iso-8859-1?q?Xb7SggLIGKD5dKV/rdTcyuP9j50kSiRvtxdLUN9X5ZR5a8H+360CxJUB79I5?= =?iso-8859-1?q?8/RnS0vuhwekHkptjcFsVnSq7bRNAlUF/qJsTLTWJXaog5jw1yeGkwXJz0Nd?= =?iso-8859-1?q?IKZCpvtZjUBVhPWTqdzSAAj7YJEgassvcoEJsvC+bD9OGkXrGW2iLNhS/OU4?= =?iso-8859-1?q?ubWIqk6tpHLxFU7HkjtI/bLraulzZa+v4ig3o7nXFn9QA9XZ9NSJGWWEJoqR?= =?iso-8859-1?q?p+ymSSYToUDw9DqNNyhrOyMQldw9ymeqpGvpmjB8JDOwBfPpO4zAHUSl/u4c?= =?iso-8859-1?q?DlbIgEaMSu+lE6bt4ZlMB9hMPPT4ixaSxPLnpL9pqYZo6a77F0zrOsdq4DMw?= =?iso-8859-1?q?ok0WYQ916vN+g58BP5uZbq7hR+vhsapM8udkF4kgVII4hjElpIsGNIsV2UkP?= =?iso-8859-1?q?Uk99W11tQsD3eVgK8C03OKjJXgTTs8HGCQoStPGwZKQkh2GTZYEbUODMjh02?= =?iso-8859-1?q?h90JVcVX4LeElr+45bML2RKC3XlGBn37UO9DRWb3oQqfE8sqhcu4B8OvqGhJ?= =?iso-8859-1?q?PUo/4i6CGPigQilN4/XOWNAhjcNkwSK0j9RTsT0AbvO3fMr1qm8hIr7EyjkJ?= =?iso-8859-1?q?6abmQQ21ZG/NIsIGqExd7tGMl+Co+Hf5hni1u03BqopUgVwTf1J3WE1XNQms?= =?iso-8859-1?q?+BYlIi+tITS0yLnnFYSkyfLYqAw99zOP5y9A/WtqVkurl8XYH3CtjQqTaply?= =?iso-8859-1?q?miU4h07HBeld2RQhkPKZ/vxnsTjntYVDxR+8LBfwDMAb+nUWGDlvAdjY6NJV?= =?iso-8859-1?q?YXqFRJUUEsadmF96WC23i486BXn7sWTdKwQ2ir7ZDaUdmf7zW1OENomAOG1+?= =?iso-8859-1?q?OfXx77zcBmdqcLQccOgFCYATWdkG9oyYIHcsolowKGx2bGYDFRWOS+M002yy?= =?iso-8859-1?q?sqIxChqu03sFDVaKPhFTu2uAVbrIwBpiplTeqJI3fH59cTB0qFwMnk9Ii5JH?= =?iso-8859-1?q?SieDETtLNmYG+is67vIjEvVLXvw4NSTSwfQnAD964BS+ApcJXXsWCQ42jYaO?= =?iso-8859-1?q?a1a/5gTQu7xiECtYON0SC9ovtpSoqY91NrQMH/4h5EXdDNPFxUMP2DzpBa0j?= =?iso-8859-1?q?xnqqg9KHGB+AhGr4bQFYXCIuAFwvKbE3MW4RP/w=3D=3D?= MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 1ff38ae0-7632-4e25-0bca-08dd45236231 X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Feb 2025 13:54:02.9629 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: S7EyCONp79Y7SmNSgoEIfPKx155Pu8szRrHkpXqjEwwb+D2VBa6LLA2wVJ1kqVUb6sv0J5kfD30xOmTu7cGOww== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR03MB7494 From: Oleksandr Tyshchenko The main purpose of this patch is to add a way to register PCI device (which is behind the IOMMU) using the generic PCI-IOMMU DT bindings [1] before assigning that device to a domain. This behaves similarly to the existing iommu_add_dt_device API, except it handles PCI devices, and it is to be invoked from the add_device hook in the SMMU driver. The function dt_map_id to translate an ID through a downstream mapping (which is also suitable for mapping Requester ID) was borrowed from Linux (v5.10-rc6) and updated according to the Xen code base. [1] https://www.kernel.org/doc/Documentation/devicetree/bindings/pci/pci-iommu.txt Signed-off-by: Oleksandr Tyshchenko Signed-off-by: Stewart Hildebrand Signed-off-by: Mykyta Poturai --- Regarding pci_for_each_dma_alias question: getting host bridge node directly seems like a simpler solution with the same result. AFAIU with pci_for_each_dma_alias in linux we would arrive to the host brige node anyway, but also try to call dt_map_id for each device along the way. I am not sure why exactly it is done this way in linux, as according to the pci-iommu.txt, iommu-map node can only be present in the PCI root. v6->v7: * put iommu_add_pci_sideband_ids under ifdef * remove ifdef CONFIG_APCI * style: add newline for symmetry v5->v6: * pass ops to iommu_dt_xlate() v4->v5: * style: add newlines after variable declarations and before return in iommu.h * drop device_is_protected() check in iommu_add_dt_pci_sideband_ids() * rebase on top of ("dynamic node programming using overlay dtbo") series * fix typo in commit message * remove #ifdef around dt_map_id() prototype * move dt_map_id() to xen/common/device_tree.c * add function name in error prints * use dprintk for debug prints * use GENMASK and #include * fix typo in comment * remove unnecessary (int) cast in loop condition * assign *id_out and return success in case of no translation in dt_map_id() * don't initialize local variable unnecessarily * return error in case of ACPI/no DT in iommu_add_{dt_}pci_sideband_ids() v3->v4: * wrap #include and if ( acpi_disabled ) in #ifdef CONFIG_ACPI * fix Michal's remarks about style, parenthesis, and print formats * remove !ops->dt_xlate check since it is already in iommu_dt_xlate helper * rename s/iommu_dt_pci_map_id/dt_map_id/ because it is generic, not specific to iommu * update commit description v2->v3: * new patch title (was: iommu/arm: Introduce iommu_add_dt_pci_device API) * renamed function from: iommu_add_dt_pci_device to: iommu_add_dt_pci_sideband_ids * removed stale ops->add_device check * iommu.h: add empty stub iommu_add_dt_pci_sideband_ids for !HAS_DEVICE_TREE * iommu.h: add iommu_add_pci_sideband_ids helper * iommu.h: don't wrap prototype in #ifdef CONFIG_HAS_PCI * s/iommu_fwspec_free(pci_to_dev(pdev))/iommu_fwspec_free(dev)/ v1->v2: * remove extra devfn parameter since pdev fully describes the device * remove ops->add_device() call from iommu_add_dt_pci_device(). Instead, rely on the existing iommu call in iommu_add_device(). * move the ops->add_device and ops->dt_xlate checks earlier downstream->v1: * rebase * add const qualifier to struct dt_device_node *np arg in dt_map_id() * add const qualifier to struct dt_device_node *np declaration in iommu_add_pci_device() * use stdint.h types instead of u8/u32/etc... * rename functions: s/dt_iommu_xlate/iommu_dt_xlate/ s/dt_map_id/iommu_dt_pci_map_id/ s/iommu_add_pci_device/iommu_add_dt_pci_device/ * add device_is_protected check in iommu_add_dt_pci_device * wrap prototypes in CONFIG_HAS_PCI (cherry picked from commit 734e3bf6ee77e7947667ab8fa96c25b349c2e1da from the downstream branch poc/pci-passthrough from https://gitlab.com/xen-project/people/bmarquis/xen-arm-poc.git) --- xen/common/device-tree/device-tree.c | 91 +++++++++++++++++++++++++++ xen/drivers/passthrough/device_tree.c | 42 +++++++++++++ xen/include/xen/device_tree.h | 23 +++++++ xen/include/xen/iommu.h | 28 ++++++++- 4 files changed, 183 insertions(+), 1 deletion(-) diff --git a/xen/common/device-tree/device-tree.c b/xen/common/device-tree/device-tree.c index d0528c5825..3de7858df6 100644 --- a/xen/common/device-tree/device-tree.c +++ b/xen/common/device-tree/device-tree.c @@ -10,6 +10,7 @@ * published by the Free Software Foundation. */ +#include #include #include #include @@ -2243,6 +2244,96 @@ int dt_get_pci_domain_nr(struct dt_device_node *node) return (u16)domain; } +int dt_map_id(const struct dt_device_node *np, uint32_t id, + const char *map_name, const char *map_mask_name, + struct dt_device_node **target, uint32_t *id_out) +{ + uint32_t map_mask, masked_id, map_len; + const __be32 *map = NULL; + + if ( !np || !map_name || (!target && !id_out) ) + return -EINVAL; + + map = dt_get_property(np, map_name, &map_len); + if ( !map ) + { + if ( target ) + return -ENODEV; + + /* Otherwise, no map implies no translation */ + *id_out = id; + return 0; + } + + if ( !map_len || (map_len % (4 * sizeof(*map))) ) + { + printk(XENLOG_ERR "%s(): %s: Error: Bad %s length: %u\n", __func__, + np->full_name, map_name, map_len); + return -EINVAL; + } + + /* The default is to select all bits. */ + map_mask = GENMASK(31, 0); + + /* + * Can be overridden by "{iommu,msi}-map-mask" property. + * If dt_property_read_u32() fails, the default is used. + */ + if ( map_mask_name ) + dt_property_read_u32(np, map_mask_name, &map_mask); + + masked_id = map_mask & id; + for ( ; map_len > 0; map_len -= 4 * sizeof(*map), map += 4 ) + { + struct dt_device_node *phandle_node; + uint32_t id_base = be32_to_cpup(map + 0); + uint32_t phandle = be32_to_cpup(map + 1); + uint32_t out_base = be32_to_cpup(map + 2); + uint32_t id_len = be32_to_cpup(map + 3); + + if ( id_base & ~map_mask ) + { + printk(XENLOG_ERR "%s(): %s: Invalid %s translation - %s-mask (0x%"PRIx32") ignores id-base (0x%"PRIx32")\n", + __func__, np->full_name, map_name, map_name, map_mask, + id_base); + return -EFAULT; + } + + if ( (masked_id < id_base) || (masked_id >= (id_base + id_len)) ) + continue; + + phandle_node = dt_find_node_by_phandle(phandle); + if ( !phandle_node ) + return -ENODEV; + + if ( target ) + { + if ( !*target ) + *target = phandle_node; + + if ( *target != phandle_node ) + continue; + } + + if ( id_out ) + *id_out = masked_id - id_base + out_base; + + dprintk(XENLOG_DEBUG, "%s: %s, using mask %08"PRIx32", id-base: %08"PRIx32", out-base: %08"PRIx32", length: %08"PRIx32", id: %08"PRIx32" -> %08"PRIx32"\n", + np->full_name, map_name, map_mask, id_base, out_base, id_len, id, + masked_id - id_base + out_base); + return 0; + } + + dprintk(XENLOG_DEBUG, "%s: no %s translation for id 0x%"PRIx32" on %s\n", + np->full_name, map_name, id, + (target && *target) ? (*target)->full_name : NULL); + + if ( id_out ) + *id_out = id; + + return 0; +} + /* * Local variables: * mode: C diff --git a/xen/drivers/passthrough/device_tree.c b/xen/drivers/passthrough/device_tree.c index 4c35281d98..edbd3f17ad 100644 --- a/xen/drivers/passthrough/device_tree.c +++ b/xen/drivers/passthrough/device_tree.c @@ -161,6 +161,48 @@ static int iommu_dt_xlate(struct device *dev, return ops->dt_xlate(dev, iommu_spec); } +#ifdef CONFIG_HAS_PCI +int iommu_add_dt_pci_sideband_ids(struct pci_dev *pdev) +{ + const struct iommu_ops *ops = iommu_get_ops(); + struct dt_phandle_args iommu_spec = { .args_count = 1 }; + struct device *dev = pci_to_dev(pdev); + const struct dt_device_node *np; + int rc; + + if ( !iommu_enabled ) + return NO_IOMMU; + + if ( !ops ) + return -EINVAL; + + if ( dev_iommu_fwspec_get(dev) ) + return -EEXIST; + + np = pci_find_host_bridge_node(pdev); + if ( !np ) + return -ENODEV; + + /* + * According to the Documentation/devicetree/bindings/pci/pci-iommu.txt + * from Linux. + */ + rc = dt_map_id(np, PCI_BDF(pdev->bus, pdev->devfn), "iommu-map", + "iommu-map-mask", &iommu_spec.np, iommu_spec.args); + if ( rc ) + return (rc == -ENODEV) ? NO_IOMMU : rc; + + rc = iommu_dt_xlate(dev, &iommu_spec, ops); + if ( rc < 0 ) + { + iommu_fwspec_free(dev); + return -EINVAL; + } + + return rc; +} +#endif /* CONFIG_HAS_PCI */ + int iommu_remove_dt_device(struct dt_device_node *np) { const struct iommu_ops *ops = iommu_get_ops(); diff --git a/xen/include/xen/device_tree.h b/xen/include/xen/device_tree.h index 5ff763bb80..9254204af6 100644 --- a/xen/include/xen/device_tree.h +++ b/xen/include/xen/device_tree.h @@ -946,6 +946,29 @@ int dt_count_phandle_with_args(const struct dt_device_node *np, */ int dt_get_pci_domain_nr(struct dt_device_node *node); +/** + * dt_map_id - Translate an ID through a downstream mapping. + * @np: root complex device node. + * @id: device ID to map. + * @map_name: property name of the map to use. + * @map_mask_name: optional property name of the mask to use. + * @target: optional pointer to a target device node. + * @id_out: optional pointer to receive the translated ID. + * + * Given a device ID, look up the appropriate implementation-defined + * platform ID and/or the target device which receives transactions on that + * ID, as per the "iommu-map" and "msi-map" bindings. Either of @target or + * @id_out may be NULL if only the other is required. If @target points to + * a non-NULL device node pointer, only entries targeting that node will be + * matched; if it points to a NULL value, it will receive the device node of + * the first matching target phandle, with a reference held. + * + * Return: 0 on success or a standard error code on failure. + */ +int dt_map_id(const struct dt_device_node *np, uint32_t id, + const char *map_name, const char *map_mask_name, + struct dt_device_node **target, uint32_t *id_out); + struct dt_device_node *dt_find_node_by_phandle(dt_phandle handle); #ifdef CONFIG_DEVICE_TREE_DEBUG diff --git a/xen/include/xen/iommu.h b/xen/include/xen/iommu.h index c3b8df9815..d2b9f04f81 100644 --- a/xen/include/xen/iommu.h +++ b/xen/include/xen/iommu.h @@ -27,6 +27,7 @@ #include #include #include +#include #include TYPE_SAFE(uint64_t, dfn); @@ -215,7 +216,8 @@ int iommu_dt_domain_init(struct domain *d); int iommu_release_dt_devices(struct domain *d); /* - * Helper to add master device to the IOMMU using generic IOMMU DT bindings. + * Helpers to add master device to the IOMMU using generic (PCI-)IOMMU + * DT bindings. * * Return values: * 0 : device is protected by an IOMMU @@ -224,6 +226,7 @@ int iommu_release_dt_devices(struct domain *d); * (IOMMU is not enabled/present or device is not connected to it). */ int iommu_add_dt_device(struct dt_device_node *np); +int iommu_add_dt_pci_sideband_ids(struct pci_dev *pdev); int iommu_do_dt_domctl(struct xen_domctl *domctl, struct domain *d, XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl); @@ -241,8 +244,31 @@ int iommu_remove_dt_device(struct dt_device_node *np); /* Error code for reporting no IOMMU is present */ #define NO_IOMMU 1 +#else /* !HAS_DEVICE_TREE */ +static inline int iommu_add_dt_pci_sideband_ids(struct pci_dev *pdev) +{ + return -ENOSYS; +} + #endif /* HAS_DEVICE_TREE */ +#ifdef CONFIG_HAS_PCI +static inline int iommu_add_pci_sideband_ids(struct pci_dev *pdev) +{ + int ret = -ENOSYS; + + if ( acpi_disabled ) + ret = iommu_add_dt_pci_sideband_ids(pdev); + + return ret; +} +#else /* !HAS_PCI */ +static inline int iommu_add_pci_sideband_ids(struct pci_dev *pdev) +{ + return -ENOSYS; +} +#endif + struct page_info; /* From patchwork Tue Feb 4 13:54:03 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mykyta Poturai X-Patchwork-Id: 13959281 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 1D95AC02197 for ; Tue, 4 Feb 2025 13:54:18 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.881482.1291650 (Exim 4.92) (envelope-from ) id 1tfJNR-00088G-Nq; Tue, 04 Feb 2025 13:54:09 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 881482.1291650; Tue, 04 Feb 2025 13:54:09 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfJNR-00087w-J4; Tue, 04 Feb 2025 13:54:09 +0000 Received: by outflank-mailman (input) for mailman id 881482; Tue, 04 Feb 2025 13:54:08 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfJNP-0007bp-Ti for xen-devel@lists.xenproject.org; Tue, 04 Feb 2025 13:54:07 +0000 Received: from EUR03-DBA-obe.outbound.protection.outlook.com (mail-dbaeur03on20630.outbound.protection.outlook.com [2a01:111:f403:260d::630]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 7f97726e-e2ff-11ef-99a4-01e77a169b0f; Tue, 04 Feb 2025 14:54:06 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by AS8PR03MB10120.eurprd03.prod.outlook.com (2603:10a6:20b:57f::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8398.24; Tue, 4 Feb 2025 13:54:04 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971%7]) with mapi id 15.20.8398.021; Tue, 4 Feb 2025 13:54:03 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 7f97726e-e2ff-11ef-99a4-01e77a169b0f ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=cGZL0ZMd3bsoeEyN70EuVVLItPh8YH+wsxE/mSwL/Ri1eGUr8VBcKQ2g5Nxh3DFF64bM5O2bvTGdsWOdvFweOAuyeBPLFn4izZ57Uwe2Q31ryS5Y/VXHFrxei5OsoHFulyeXxT8eGTViiZXHZvioZJruW3fLEHUJ8PeOmzYFaZpeHpFhSfO9RPjcnu1/yWzcyVw8pA8S6W1r49g4dmI6anhDTf6Mt1UT5P7EC52AD/qVStucRCbd115vE3x8DVbbXwkPSV5IOUiBjfdc/y2sXpF+Mw1esJMajhXBkG5B5rLs2PAG6l4YW/meRkGT2m53k+XHmqcAsFNSC7dqlO2GEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=xKTBm2RZE0pMVnRAxDCvI2tXHKoAe5L9tuqQ8B6N5H4=; b=p0bDjq3LrenkrAlWLwXxUvW3JnroixD/en0rBZzpaRIznwbhxlEwD+tFeOvRzhK4pf5wAfwlIGerCGWRuiDP4cZxiaR4JGXZSG8qgISmUGpyvast56oFAF/k8BYTVd8tNBBCH4pu2PIZjzF1xXnsLkS2snscrhP7gnKmR307csKhK9IoqcWoSdXA84R+BC/sE7jofExesVQQ7qq/rd9ssupeHQsZUa1UgyC8GwZPlB7m9x13EYnLdWZDGHV9jHaWINBFUYE1SJa/Czr7aLoiq7JByKBHBpPfe71XMJta0V3peECYjic0MC+XQGV2EMnTZ1XmoE9NWhPFQYF6Vd+fuw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=xKTBm2RZE0pMVnRAxDCvI2tXHKoAe5L9tuqQ8B6N5H4=; b=Mcpy4rHY46EVMe4DndCtPrElFeLJoUZUPjTWwhxBKAkIdYDXUaV4l8crGWmX+VrsZFjbYWMi6BDV8HvjeGoGrMbOA1x+Dt7PqQdzQQ+Ca2U3qaMpo4KPFFVU6z/VmQZDs7H6TNW15yyrKFdJulVBpSNZua1uVFhYDUC87pdit2bsE9CCPEs/sMhYfPqlPdNPu5aJHs3JwsB/B/4kLUuazM4kMd1TYrQ1DZ3yFiz0HCeQtzYzXuGko8M5EUmtH3B2H8OS2VKFKZdB808go08gP7OYpnPYS21bWm/w1moUHAJwhXX64Hblc3ua1VR8OH2BSUWG2vhk75qiodWeWHCxew== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Stewart Hildebrand , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel Subject: [PATCH v7 3/8] iommu/arm: iommu_add_dt_pci_sideband_ids phantom handling Thread-Topic: [PATCH v7 3/8] iommu/arm: iommu_add_dt_pci_sideband_ids phantom handling Thread-Index: AQHbdww/vF8UEX8f+Eqe/gBBXDD4hg== Date: Tue, 4 Feb 2025 13:54:03 +0000 Message-ID: <67c485e674b2828e15660baf1d4c050e734cbb59.1738665272.git.mykyta_poturai@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|AS8PR03MB10120:EE_ x-ms-office365-filtering-correlation-id: 4f585b5f-d899-4515-ca54-08dd45236262 x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|376014|366016|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?q?T+t9j3eoZ5J9lmsMNEOnXqup79?= =?iso-8859-1?q?TMFx5jfsalao0P1fOxm9dAF0qSBNq2LqhlNGmZkLh0n5vU8NVashPV5y9yi6?= =?iso-8859-1?q?QSAFbMPPsIkM9aTu7uCKdmwFDT5AfPr8XdfRYrJhoXDp8BAMZTd0gjoKPtGU?= =?iso-8859-1?q?RSeJmdOZ3ywtPjMhBMJz+EGMBDCIGDo+FYIkbEi8lb65QwgqOVFsICbEn3z1?= =?iso-8859-1?q?fDFPsZ8r3V7+pIDm/RV1GxgPL90UYDs7unT39ABXKYkmbGaV0MC4gKFWzMqG?= =?iso-8859-1?q?4gNHwEpCzlTz8uZX8oUljvf4AoMK/798tThpYvJRzJhy4klPmRY+7Hwc9x7B?= =?iso-8859-1?q?bP6deDSYr9akv2qep8RC+FtJJiw4LBsWibpJfVl8ZLDUEfkTakijFRbmjs1U?= =?iso-8859-1?q?vCLC2rabT3/ZZB1LzmqWYSwtfg86vOq14wO/h39kereXxEt/D/f+AUGo1cGB?= =?iso-8859-1?q?rdkeeOp5m8XGZPqoM8Y0uIJHFwiEGKvYyVnTnXcIRnMT48Vy6+YnsCRf+DlP?= =?iso-8859-1?q?O/KgeKzqYdA0RP4ZsIfeMmFsDp6TlgAOEcPSu6vWONepygPc1NcyyUk5NphY?= =?iso-8859-1?q?ZMzClJU90WJqda96QxkSSO5w3OZ9uRqfwqtWem3dvLsGYL0iyAGHj7VsmGnN?= =?iso-8859-1?q?JI4yrwowsd9wdVuzPYkh9oTB/uCkYjXHT96J0AuBDHawJ0/3mhDxU913YVMe?= =?iso-8859-1?q?BntVq6PKwinZp6AoUdB6Q/nwhoCd1Y/+ryLK0sQ2ZuOv4C4GvG8st+56FD0h?= =?iso-8859-1?q?SMZBl/TwP2kCCQmR+3dcUShe5w0FNxYS8RHoq1OfTW3biA7uyxXMl/PewWOl?= =?iso-8859-1?q?4GkgRZqWyEH2sy1xl1zUQk5pKiQ7jQC2C0iCJ6Xvw7e0RpHOutfK7EZMC2lE?= =?iso-8859-1?q?XodvKaothDAHLlVeGyNzqmz8vGOa1bBGA3jZWsl2yjYUAA3QM++qcgAoB+QZ?= =?iso-8859-1?q?33Ettu9AOPAKebdaxMGLIbYdQErCLZ+9BowisQ6jqn3qw9R/IzQnXLI2h4Qp?= =?iso-8859-1?q?QZtg2IvjtbGRzzjhPtx/H9aRNvlmKlgpFdc4GcjENVIN38/jP3jK7hqPvysy?= =?iso-8859-1?q?m/2GDmcz0629v3iWh8yor2xj9oo93w2JDL9NS6Nau53e95C6Or57aSxHHiU1?= =?iso-8859-1?q?92hifQmWKe+paS1V/srhGAxwF5IL2V6zocGn5AjzTNPbBczcJ+lEv98H7+Hr?= =?iso-8859-1?q?M0HX3P4UIpOpWwmoGvgtsGDI5eyybWWyWI5mG0KHzv4irTPS1TSqm5zn1ufG?= =?iso-8859-1?q?6zowqxGkZjDWCKjD+NnFphQhJS2qpELH0CUvBhCwQucLgTNwh1yi752+6MLv?= =?iso-8859-1?q?aFBI8EDBb4NEgj/2w/TYBS/wmQt05ZPTVn2GQEWCK0Xo4ooFeZZo/t6RntLA?= =?iso-8859-1?q?J5m0ulM9rb02Ua4iGgFpF3R2lab06qtpLaJjTl+9EaTydsTidhriTst/X46j?= =?iso-8859-1?q?X8X3KF9uk/eXkIXYY7M4L6KBRWVtEiO3K9GBBB1K6eDTgKeF0GXdaMfnv342?= =?iso-8859-1?q?O+dwlW?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?q?T4RrpF9CRnxIbPei6iKNWcG?= =?iso-8859-1?q?+dggk37AzldAwUHX4H1YZIctfJmwnOV6RRKgWS56tTFllAoqz7lMLcATM4tH?= =?iso-8859-1?q?EPO22yeKoRNBZscVMMW871RVEvGrvDhgkcL00HRPSSFH9CowEOF7P85vxpC1?= =?iso-8859-1?q?MD2NUouHeUUc5T/dlhtGXxFAW4CPEx+RWer1nzxzS8w09qAF+GUNVUMFMjTE?= =?iso-8859-1?q?vpnj8AV4NaZbapLIvEL245l8T05RuwWQKWbc3P4MAhc0tX4bymO90Vf77HBE?= =?iso-8859-1?q?4fVlrYh4R9pYRzzSgWFOkTpM+DKPKe/Jp0LT3SCMbJhpgilf898WzDTKdybY?= =?iso-8859-1?q?oWiDi5AA+CXQbPQBJFrtK9HGAFFgJaB2iKSgJDm2FL2KGpiM0pCuSTFVQIEI?= =?iso-8859-1?q?OOxrQzEzr4pOQV75wRwptz+szTOUxiYG45GrvLG3W2Es4rXfWDA0bL1Y1WIW?= =?iso-8859-1?q?nZEexAE+JXcHgc+Mdz1WqtLemlTkcia+VyusZ3M7xsAxAb4SYCEAcZrhZ7ZU?= =?iso-8859-1?q?Mevyqikno72pdSYEi7wMoHo+jCjMTsnQi0i+MdwubNOInxP7JPhz8/nAiycE?= =?iso-8859-1?q?i9i/mrQYuRz4PMRuKvhXDYKDCY3hvU8end9nokKSj5oMaNshTMH5OEUmFF/G?= =?iso-8859-1?q?3vhCc9u9DD/RrzlNmBBMIWbMuyhow/o5ZhCZmFMS9c+Ql0WBbiX/3qrzhe9s?= =?iso-8859-1?q?66f1Xr3aXeiHXRqlyB7X0D2FXQ17gjw3KqiAAspTtxrsAln4FCPFgFt6uiEZ?= =?iso-8859-1?q?o8n4IuiMRqElQLfy5xIT13gta51Kd+vpsWIkNhHm6u6K0h2przWvK8XYAWy0?= =?iso-8859-1?q?ij7eF7S4uhTyLDD8SaJCoO2xBo2Rwf4RL226N+2g/fJ381SfqHYlvCTLoOti?= =?iso-8859-1?q?pRuGGuo0E/ZLTcqYSEa4TnjlWEZcu03TgxpMssax89jtE4AXCqplPJyoyeI8?= =?iso-8859-1?q?/CqrPpiRr4/m+M3zn7cMKJOIjHhOx/+5IYRKYvWZ+4273oSa2sOKk87saKq0?= =?iso-8859-1?q?PJblLeBS5vTdY1YCKgFm/+huOoX/Q8y+qT9LyKjj8O/wn4sO9NSZLyKQB7Dj?= =?iso-8859-1?q?40QB0eXXK39Of6/S3PfOv/E/B3wEFApdoIM/caeFho51XiWripho969mPVou?= =?iso-8859-1?q?LP0TBmSds+Q8H6h2xdNDv6Igm2R9xqKD95MWXAKjh5YCoIF64PRGT7PxRbX4?= =?iso-8859-1?q?vtpItHzxj1aUKtZzJFNt+Y5LvGg/fVYbLTMszURzH2mEbjVAlZ2Ly7LZYsfR?= =?iso-8859-1?q?e0/UUBWylm956UW2gs7me5LahikXqoAiFswFshwLNBRPYzHAfOhoCOsNEvkO?= =?iso-8859-1?q?IDZnQSWzlvib0DUa7Ozot9VA6hELW6PDvKuv0IZdZ3G6CS2O8nelmJSJMm5U?= =?iso-8859-1?q?Hr+a13bMycea/hDAusqBEp9BvioJ+2B8guU9fJsj9Hd2sHuJpF70xbIKK5An?= =?iso-8859-1?q?vbCTBxdxnZqY7+B6yRFFt5wGCisy69oUwKLlLIKlvSFx7WV9TBzarji1m0zh?= =?iso-8859-1?q?3vKz9jKUHIHjGTxTFK+6bhipFKJ/RMx6h1sSeu75ffq7hzaUkYcfIRTzCU77?= =?iso-8859-1?q?bDWTV07Vug3bMcbgv1Mu843m9/qgE0VpVXCPvwUslUiq7u+nIEHfg/RkP1LR?= =?iso-8859-1?q?ZTUYvxAL4Yz+OyoWKkenLXYOLbduX07qBSFSp9Q=3D=3D?= MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 4f585b5f-d899-4515-ca54-08dd45236262 X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Feb 2025 13:54:03.2790 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 4o3AlzrRC0EbagDZqj9WFgHxfSJOd647BuUWtDleX85OXECdjduCf+NP/wcUwlucW2WD7t3PpW9h291gwrtRJw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR03MB10120 From: Stewart Hildebrand Handle phantom functions in iommu_add_dt_pci_sideband_ids(). Each phantom function will have a unique requestor ID (RID)/BDF. On ARM, we need to map/translate the RID/BDF to an AXI stream ID for each phantom function according to the pci-iommu device tree mapping [1]. The RID/BDF -> AXI stream ID mapping in DT could allow phantom devices (i.e. devices with phantom functions) to use different AXI stream IDs based on the (phantom) function. [1] https://www.kernel.org/doc/Documentation/devicetree/bindings/pci/pci-iommu.txt Signed-off-by: Stewart Hildebrand --- v6->v7: * no change v5->v6: * no change v4->v5: * no change v3->v4: * s/iommu_dt_pci_map_id/dt_map_id/ v2->v3: * new patch title (was: iommu/arm: iommu_add_dt_pci_device phantom handling) * rework loop to reduce duplication * s/iommu_fwspec_free(pci_to_dev(pdev))/iommu_fwspec_free(dev)/ v1->v2: * new patch --- TODO: investigate Jan's comment [2] [2] https://lore.kernel.org/xen-devel/806a2978-19fb-4d31-ab6a-35ea7317c8de@suse.com/ --- xen/drivers/passthrough/device_tree.c | 33 ++++++++++++++++----------- 1 file changed, 20 insertions(+), 13 deletions(-) diff --git a/xen/drivers/passthrough/device_tree.c b/xen/drivers/passthrough/device_tree.c index edbd3f17ad..eba1a5bac7 100644 --- a/xen/drivers/passthrough/device_tree.c +++ b/xen/drivers/passthrough/device_tree.c @@ -169,6 +169,7 @@ int iommu_add_dt_pci_sideband_ids(struct pci_dev *pdev) struct device *dev = pci_to_dev(pdev); const struct dt_device_node *np; int rc; + unsigned int devfn = pdev->devfn; if ( !iommu_enabled ) return NO_IOMMU; @@ -183,21 +184,27 @@ int iommu_add_dt_pci_sideband_ids(struct pci_dev *pdev) if ( !np ) return -ENODEV; - /* - * According to the Documentation/devicetree/bindings/pci/pci-iommu.txt - * from Linux. - */ - rc = dt_map_id(np, PCI_BDF(pdev->bus, pdev->devfn), "iommu-map", - "iommu-map-mask", &iommu_spec.np, iommu_spec.args); - if ( rc ) - return (rc == -ENODEV) ? NO_IOMMU : rc; + do { + /* + * According to the Documentation/devicetree/bindings/pci/pci-iommu.txt + * from Linux. + */ + rc = dt_map_id(np, PCI_BDF(pdev->bus, devfn), "iommu-map", + "iommu-map-mask", &iommu_spec.np, iommu_spec.args); + if ( rc ) + return (rc == -ENODEV) ? NO_IOMMU : rc; - rc = iommu_dt_xlate(dev, &iommu_spec, ops); - if ( rc < 0 ) - { - iommu_fwspec_free(dev); - return -EINVAL; + rc = iommu_dt_xlate(dev, &iommu_spec, ops); + if ( rc < 0 ) + { + iommu_fwspec_free(dev); + return -EINVAL; + } + + devfn += pdev->phantom_stride; } + while ( (devfn != pdev->devfn) && + (PCI_SLOT(devfn) == PCI_SLOT(pdev->devfn)) ); return rc; } From patchwork Tue Feb 4 13:54:03 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mykyta Poturai X-Patchwork-Id: 13959282 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 5FDDEC02198 for ; Tue, 4 Feb 2025 13:54:19 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.881483.1291660 (Exim 4.92) (envelope-from ) id 1tfJNS-0008OZ-Vz; Tue, 04 Feb 2025 13:54:10 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 881483.1291660; Tue, 04 Feb 2025 13:54:10 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfJNS-0008ON-Sl; Tue, 04 Feb 2025 13:54:10 +0000 Received: by outflank-mailman (input) for mailman id 881483; Tue, 04 Feb 2025 13:54:09 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfJNR-0007bp-9s for xen-devel@lists.xenproject.org; Tue, 04 Feb 2025 13:54:09 +0000 Received: from EUR03-DBA-obe.outbound.protection.outlook.com (mail-dbaeur03on20630.outbound.protection.outlook.com [2a01:111:f403:260d::630]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 80ba3ec8-e2ff-11ef-99a4-01e77a169b0f; Tue, 04 Feb 2025 14:54:07 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by AS8PR03MB10120.eurprd03.prod.outlook.com (2603:10a6:20b:57f::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8398.24; Tue, 4 Feb 2025 13:54:04 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971%7]) with mapi id 15.20.8398.021; Tue, 4 Feb 2025 13:54:04 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 80ba3ec8-e2ff-11ef-99a4-01e77a169b0f ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=iZzjasSgxhDvYo8iZ2WzC3sNfdM7oeHP7CX0B8zBC8Y4KW9y29zCTT4J0igc1ZmXGsHyDsS8dkBi8aXUuwtOiyh+Pw7/WysAogHDU7UQUK9otBZk8pa75UWKGsPiGZ7lkwAkoiUf7FrM+ASo8eCsOzXIZdnsmQHILa7AHB7cGJeXFCSz4oqHA6FJZCyy9741SgmxIL/P4OQxHVCK4NccTpYnmf0hzMqWSsMwhkU09l0K+Z20aBpRFnZUuNdM+vOkWGcGnWoKnoACm4pc0WVyHuZWzQcYpss6Vofxqml0Nf4vB2z27AnGyP9Rqd8wPoYC72cdKF+1YEHDkyhSiKolaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=7lOCv8zHloXloczKwDCOTV2sKz+Z1GzU7wAw3bdi1Ok=; b=XwxR1UP1ILs04TuL4C8K+dgkfyPUz6Es/umZ9YsEUu+hPOIqN4Po36DsTIHg97UtpkDj0F1OH2YjPEb87Qi9Nl+ctw9sc1g5uDUycT+C0Pyd6+tS3E6uz4ZI60B643sfs20hLEsOnb+V3Xl1bDqK0HfJ/k34SmP3lHuPSgFKw3inyYf93aNc4N81Lmu/+wpFodovlUj8ZZKMoHir5n3XnIXyP1bbZQy0yAssgG8yNxvEWdrHsQA0TVtkI2lVQB2pNMGC+/M2pKIiSADHqFPJvueWTz61ijeBHk6DciU0yoOuf6dxTO22DgTgPXdmqgKH4QqZRJAZt5wDVGU03lKXdA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7lOCv8zHloXloczKwDCOTV2sKz+Z1GzU7wAw3bdi1Ok=; b=rjT0x1MHCESZTL7s8GfqpHHsWsLR3st7CXVChevNAr4/gh0urE29EZemPaNzXMxmF2w31/Oe/r0xB8qDFxqGMKCcyzcUTBajUIzRy3nFPsVHuqW8n33tmcQeDo0luaK6M1xMWHyUQzdqBfRjJRUtgX7iCf/ulln355I4CJvrKvzVMaWS72DMLgyg1gqlu+OK/r3cZvojPYD4PX6jDOHAoQDr+vMbRcizyIaeu2rwUKSnctp1buYGdU6i0iqTpXbBste+C+/inmD+b3vcNpGnjPONhbMd3Gj5m3KZX6m+ygzzy8mJo5yK2Pv9Luj0QLglIR4etMLAiVXUKPgUi7iz2w== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Stewart Hildebrand , Oleksandr Andrushchenko , Julien Grall , Rahul Singh , Stefano Stabellini , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk , Oleksandr Tyshchenko , Mykyta Poturai Subject: [PATCH v7 4/8] xen/arm: smmuv2: Add PCI devices support for SMMUv2 Thread-Topic: [PATCH v7 4/8] xen/arm: smmuv2: Add PCI devices support for SMMUv2 Thread-Index: AQHbdwxAjvatoQuLmUGc7gGfIraVwA== Date: Tue, 4 Feb 2025 13:54:03 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|AS8PR03MB10120:EE_ x-ms-office365-filtering-correlation-id: 9d83a466-cb4e-41b4-86a9-08dd452362ee x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|376014|366016|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?q?ovdUm4XUauanYyfEBc+vl6pOuh?= =?iso-8859-1?q?3RHlU3ym16M4JGSAA6+bgfJskjavtcMlthDB7D49cj5bmKA9nVHxsF7VM2dv?= =?iso-8859-1?q?7WZJDtlD2gimOrixUJjTMICHWDpoy+8AuNp7FrlTbw0BxLS+86xn62bZuEHG?= =?iso-8859-1?q?+Q/iYaa7x1zBH6i8ySBGH8HP6WJW7qEI/0+S4KVvR/DIZsgHKTLEh1lMcTGw?= =?iso-8859-1?q?o/q2WTTwLneeZZWmLTqQKAmch08c3rZQhxmBWatsRaKj/tV2iVhvFfJ2KlLG?= =?iso-8859-1?q?jYwJx4iGn6gMfYSVetNjh8J3lJmB0Eapj7f2iIuVmF6WTeZijg9LpmZSjxQv?= =?iso-8859-1?q?qUTqV2oyj1SpwaCtD6rKnp5M5Q0RhaFlq0uxLLD/Dm3oFfOvWk+HHh0oqQ/+?= =?iso-8859-1?q?sgPWHsJrpO16EinSBuheOPyT4jIdl2kuVcbsiuIHr1LBIzl8bNnoPzTujr2R?= =?iso-8859-1?q?PGZe4mu/AavVcasEFxVggM9DKIjWifigQX2oeMgT7XT0b3xvB5v+xIjsMOwL?= =?iso-8859-1?q?jfzl9glb/1GFWy6WHTUPPOTCmnG+VXAs6PCs9XjwbAcm+e/RdhIL8nvdZomX?= =?iso-8859-1?q?LlazWisvAsxmetSmR9qdXF17e9T8ioNaYiJ9O9M4dt2wgBRCajFkk8swYi5U?= =?iso-8859-1?q?49wzR0i3N8ROwvBEwrkXJo9J03O5sSrbTbg5tVk4bS0yydP98QSOprBe0Vbi?= =?iso-8859-1?q?Xx0HMXkVLGL0TaMzepFHZXcbSmDu6+rgXy5VBL3fScoG8ZuhgkS7s2J+l2F5?= =?iso-8859-1?q?nKzO/kQnv7FMux8yGcEfv4xryLiQN3h1m55yA0Z+m6wIGlQoBpkBmia1sJPN?= =?iso-8859-1?q?N9Bv7nUEhiaQMHBKNQTi/7IT/te4ITxrR9HdkgUeKA9oyMNUL4bpQYIoF4Px?= =?iso-8859-1?q?VJmv3yD4Dz6cXyd93aTab2WOSfshB2rolJzx5e5cTXOe5f2LLpgJxujdWxY0?= =?iso-8859-1?q?p+lrqpI9VUBsNTQn+AE442KV27mImBJdExQVEpequKoHpFvbrG09JnqXaPkT?= =?iso-8859-1?q?gxg4P+H+OWo5T7ab+lxx9XglutVFuYvDYgFKVJliXTLCHnvW2TOkD7gc5WkO?= =?iso-8859-1?q?eqDsyD6HeKlpHHlU9FOIGKNgT+8g1NgSiWNtQm1lzi5IrWEreTvO7PTViQMX?= =?iso-8859-1?q?I/DzSxwl8b4q9an3GDw/xDNRuaW+gUFvxwQuaytfqCVRefZEUuvyXXfkqBUX?= =?iso-8859-1?q?GHy2ShldLpQ2Ge0tYGke1n2Um8z3IhIgE69qZMeDWURqLsUPFLJvkfijqxIR?= =?iso-8859-1?q?BLfAxZonFV1P7I239TgbXjylbNMzFvsXbTLS20dbEeo+k185PBE7zhxbPR+0?= =?iso-8859-1?q?+qgtwnBJM8bcnH+gOYzu4indNoixRu8+GuAC+PJlyKKHQ1KHo+lgHNNY4iOY?= =?iso-8859-1?q?8Gl10NAJ9hf8t88nN/hrzajXAM2BfV80TBJkeIWje53AJAY5QgGAYVv0M76q?= =?iso-8859-1?q?pL?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?q?UTIgingT1mqyiYybcUwVumH?= =?iso-8859-1?q?QTRaPBdraZulgmNxE8ErJwBfjk+w9L+oE/TtUncVn0suin+d4pOsx1rgmagI?= =?iso-8859-1?q?whd0xgpEonmuDhJX9aZ+RfZjGwD5Fvedt5SJ75ekXKsve1L5VgbVFSa+hKpM?= =?iso-8859-1?q?RQHGiMCot6MBCrWeLa4g3Wx9zVqRe8fwAvoDL6QUwE5SK0TrVHwdAGm+yjq4?= =?iso-8859-1?q?BKrZePZ1BLsQxT6PUxweTif5BQk+09VP4pHGoeHLS+LCC5gLKgJQPVWe2T/J?= =?iso-8859-1?q?5MIM+vziqd2mYMIGHeH+lPpFNaT7dWZoKQ7HXJZo3czZ7Ch9DHNR/uOB7ikO?= =?iso-8859-1?q?e7YtCws14WqVpyKqx/A9dzVB+upVNIpj0ug4bMJ4hzTHvBKHyck+na1/H3kI?= =?iso-8859-1?q?ALhaqLaKnvabRzaN5gp9+wu6OvHPIl+wvb16+hUbCUMUzIpABfT4D1rgW++h?= =?iso-8859-1?q?y/QLcqHRMPb4wtIiUJyFw3oyRRn6JqA/lruEF65E5Jn6H0UknVTBiCgWL9q+?= =?iso-8859-1?q?4jv12X6rVgVTanMG/658pDnJ4SgQPHV/9dkAaqxYfyGT7aJ3w0Kn4RyBvFsw?= =?iso-8859-1?q?8C5yuBccP55TteSY+f/gf4vrrbH3Wi0U9JGIMFEtdOD4UCr89NAA2YzvXsv1?= =?iso-8859-1?q?5nh/CB/6vQkjfxERjgS7uLHVusH7cnFuVWz8YfAsLo/3MDbhRtUeOUC2G/GD?= =?iso-8859-1?q?EDao3XyfAoAj8cSIpvYk0yDfEZC54QOiukLhEOrhK6L7f28B2lnc5uMVUlea?= =?iso-8859-1?q?kNJicA1pZfYz55a3bRkHwKH93KZctTUh6nYQaaecF2qdFUt4B+Wdsd0cZTDF?= =?iso-8859-1?q?WP0EcLn+nLGbztST4o1tEUqOit31caL7VKB4inhUsi4wWQURq6jM1WWCNhGO?= =?iso-8859-1?q?1PaBnuw1ADlD9HSRdwUJ+lQhIf/DaB3IJEupTrK0X3ZGzLZ1UIt6+CyLq7Uq?= =?iso-8859-1?q?tj8Gnnn8Y6NYOSW58udfLfPxw1aAoxwtK4u8KMdnzvMFi5VeGwsPCtDjoc09?= =?iso-8859-1?q?w03HZHxu1GBoUpfufhUD893rdVu7/USp8IChX8CtIgMVp6WBCy5roa0Osiz7?= =?iso-8859-1?q?opLj3Kv+WwrnZzGF+CjHt0Ke2hSt08/ycVHv1rbOxiqQWCbWeI/umY2JE/94?= =?iso-8859-1?q?gscvP9yM8zY8CQ7/pkxb0haa/0NTGisUKWavYlLs90RLLfyt9MHbD6amZxYl?= =?iso-8859-1?q?ejEZPeRSpsxVeeL1ICV0y9kkun6YjAvfYxnN2iy70NVj0TExTyPUl4R513iw?= =?iso-8859-1?q?RSvdIaYki9LDjVewuy6j75vIa2kggSnU3LoRzvUBpf6c4XpOCHZYaIgcWQVe?= =?iso-8859-1?q?qF6Y5JTZOSyO71+YVIRHjSBH/7rbbwgWOqLkn+nzpAAQ5setV0F2z6htb9K4?= =?iso-8859-1?q?OVfHbwrhDyK4Egq3Em1OMQmFoFkosO2sRPRRGhM3G5qj43Dm62VKnntkn4dm?= =?iso-8859-1?q?zNsyH8j2laB/q3vmAAvUm9xFVJ7OVknGF9t5PX1kfcFeeN+iSP3ovqHBGf9S?= =?iso-8859-1?q?7NKPrLM1FyfKZF0BDEBE9xWNMwJEjB/msl8d4J8IHlEbYNZSRgv50aUJiDfU?= =?iso-8859-1?q?NLghF4BmH7BqeBL1QInq+kjMETJeTxQ3tpxJsvtZsGjkCxxw2HfaunaCygqV?= =?iso-8859-1?q?LgMO35T+kA2MJyzf7+jeit5XaV7LBtXrIBBINtw=3D=3D?= MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9d83a466-cb4e-41b4-86a9-08dd452362ee X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Feb 2025 13:54:03.6975 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: eCb5sUt8Ou8oYBLaJpcQ33TbviOQihttPZ7ULNfKPjfhVZnhQmcoVS8DW7c/FepWsU1HDoBE5I4pqMhDUrpPWA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR03MB10120 From: Oleksandr Andrushchenko Implement support for PCI devices in the SMMU driver. Make arm_smmu_master structure to hold a pointer to the device to allow it to hold PCI devices. Trigger iommu-map parsing when new PCI device is added. Add checks to assign/deassign functions to ensure PCI devices are handled correctly. Implement basic quarantining. All pci devices are automatically assigned to hardware domain if it exists to ensure it can probe them. TODO: Implement scratch page quarantining support. Signed-off-by: Oleksandr Tyshchenko Signed-off-by: Oleksandr Andrushchenko Signed-off-by: Stewart Hildebrand Signed-off-by: Mykyta Poturai --- v6->v7: * use d->pci_lock in arm_smmu_assign_dev() * remove !is_hardware_domain and pdev->domain == d checks in assign to support future dom0less use case when dom0 is using vPCI * remove stale todo in dev_get_dev_node * don't print "" * remove redundant dt_device_is_protected check * remove assign/deassing prints * change assign logic to remove reassign reimplementation * check if pdev->domain exists before assigning to it * explain pdev->devfn check * make reassign check stricter and update comment v5->v6: * check for hardware_domain == NULL (dom0less test case) * locking: assign pdev->domain before list_add() v4->v5: * assign device to pdev->domain (usually dom0) by default in add_device() hook * deassign from hwdom * rebase on top of ("dynamic node programming using overlay dtbo") series * remove TODO in comment about device prints * add TODO regarding locking * fixup after dropping ("xen/arm: Move is_protected flag to struct device") v3->v4: * add new device_is_protected check in add_device hook to match SMMUv3 and IPMMU-VMSA drivers v2->v3: * invoke iommu_add_pci_sideband_ids() from add_device hook v1->v2: * ignore add_device/assign_device/reassign_device calls for phantom functions (i.e. devfn != pdev->devfn) downstream->v1: * wrap unused function in #ifdef 0 * remove the remove_device() stub since it was submitted separately to the list [XEN][PATCH v6 12/19] xen/smmu: Add remove_device callback for smmu_iommu ops https://lists.xenproject.org/archives/html/xen-devel/2023-05/msg00204.html * arm_smmu_(de)assign_dev: return error instead of crashing system * update condition in arm_smmu_reassign_dev * style fixup * add && !is_hardware_domain(d) into condition in arm_smmu_assign_dev() (cherry picked from commit 0c11a7f65f044c26d87d1e27ac6283ef1f9cfb7a from the downstream branch spider-master from https://github.com/xen-troops/xen.git) --- xen/drivers/passthrough/arm/smmu.c | 190 ++++++++++++++++++++++------- 1 file changed, 147 insertions(+), 43 deletions(-) diff --git a/xen/drivers/passthrough/arm/smmu.c b/xen/drivers/passthrough/arm/smmu.c index 03d22bce1e..cfddcbb1ad 100644 --- a/xen/drivers/passthrough/arm/smmu.c +++ b/xen/drivers/passthrough/arm/smmu.c @@ -132,11 +132,21 @@ enum irqreturn { typedef enum irqreturn irqreturn_t; -/* Device logger functions - * TODO: Handle PCI - */ -#define dev_print(dev, lvl, fmt, ...) \ - printk(lvl "smmu: %s: " fmt, dt_node_full_name(dev_to_dt(dev)), ## __VA_ARGS__) +/* Device logger functions */ +#ifndef CONFIG_HAS_PCI +#define dev_print(dev, lvl, fmt, ...) \ + printk(lvl "smmu: %s: " fmt, dev_name(dev), ## __VA_ARGS__) +#else +#define dev_print(dev, lvl, fmt, ...) ({ \ + if ( !dev_is_pci((dev)) ) \ + printk(lvl "smmu: %s: " fmt, dev_name((dev)), ## __VA_ARGS__); \ + else \ + { \ + struct pci_dev *pdev = dev_to_pci((dev)); \ + printk(lvl "smmu: %pp: " fmt, &pdev->sbdf, ## __VA_ARGS__); \ + } \ +}) +#endif #define dev_dbg(dev, fmt, ...) dev_print(dev, XENLOG_DEBUG, fmt, ## __VA_ARGS__) #define dev_notice(dev, fmt, ...) dev_print(dev, XENLOG_INFO, fmt, ## __VA_ARGS__) @@ -188,6 +198,7 @@ static void __iomem *devm_ioremap_resource(struct device *dev, * Xen: PCI functions * TODO: It should be implemented when PCI will be supported */ +#if 0 /* unused */ #define to_pci_dev(dev) (NULL) static inline int pci_for_each_dma_alias(struct pci_dev *pdev, int (*fn) (struct pci_dev *pdev, @@ -197,6 +208,7 @@ static inline int pci_for_each_dma_alias(struct pci_dev *pdev, BUG(); return 0; } +#endif /* Xen: misc */ #define PHYS_MASK_SHIFT PADDR_BITS @@ -631,7 +643,7 @@ struct arm_smmu_master_cfg { for (i = 0; idx = (cfg)->smendx[i], (i) < (num); ++(i)) struct arm_smmu_master { - struct device_node *of_node; + struct device *dev; struct rb_node node; struct arm_smmu_master_cfg cfg; }; @@ -723,7 +735,7 @@ arm_smmu_get_fwspec(struct arm_smmu_master_cfg *cfg) { struct arm_smmu_master *master = container_of(cfg, struct arm_smmu_master, cfg); - return dev_iommu_fwspec_get(&master->of_node->dev); + return dev_iommu_fwspec_get(master->dev); } static void parse_driver_options(struct arm_smmu_device *smmu) @@ -742,21 +754,11 @@ static void parse_driver_options(struct arm_smmu_device *smmu) static struct device_node *dev_get_dev_node(struct device *dev) { -#if 0 /* Xen: TODO: Add support for PCI */ - if (dev_is_pci(dev)) { - struct pci_bus *bus = to_pci_dev(dev)->bus; - - while (!pci_is_root_bus(bus)) - bus = bus->parent; - return bus->bridge->parent->of_node; - } -#endif - return dev->of_node; } static struct arm_smmu_master *find_smmu_master(struct arm_smmu_device *smmu, - struct device_node *dev_node) + struct device *dev) { struct rb_node *node = smmu->masters.rb_node; @@ -765,9 +767,9 @@ static struct arm_smmu_master *find_smmu_master(struct arm_smmu_device *smmu, master = container_of(node, struct arm_smmu_master, node); - if (dev_node < master->of_node) + if (dev < master->dev) node = node->rb_left; - else if (dev_node > master->of_node) + else if (dev > master->dev) node = node->rb_right; else return master; @@ -802,9 +804,9 @@ static int insert_smmu_master(struct arm_smmu_device *smmu, = container_of(*new, struct arm_smmu_master, node); parent = *new; - if (master->of_node < this->of_node) + if (master->dev < this->dev) new = &((*new)->rb_left); - else if (master->of_node > this->of_node) + else if (master->dev > this->dev) new = &((*new)->rb_right); else return -EEXIST; @@ -836,28 +838,30 @@ static int arm_smmu_dt_add_device_legacy(struct arm_smmu_device *smmu, struct arm_smmu_master *master; struct device_node *dev_node = dev_get_dev_node(dev); - master = find_smmu_master(smmu, dev_node); + master = find_smmu_master(smmu, dev); if (master) { dev_err(dev, - "rejecting multiple registrations for master device %s\n", - dev_node->name); + "rejecting multiple registrations for master device\n"); return -EBUSY; } master = devm_kzalloc(dev, sizeof(*master), GFP_KERNEL); if (!master) return -ENOMEM; - master->of_node = dev_node; + master->dev = dev; - /* Xen: Let Xen know that the device is protected by an SMMU */ - dt_device_set_protected(dev_node); + if ( !dev_is_pci(dev) ) + { + /* Xen: Let Xen know that the device is protected by an SMMU */ + dt_device_set_protected(dev_node); + } for (i = 0; i < fwspec->num_ids; ++i) { if (!(smmu->features & ARM_SMMU_FEAT_STREAM_MATCH) && (fwspec->ids[i] >= smmu->num_mapping_groups)) { dev_err(dev, - "stream ID for master device %s greater than maximum allowed (%d)\n", - dev_node->name, smmu->num_mapping_groups); + "SMMU stream ID %d is greater than maximum allowed (%d)\n", + fwspec->ids[i], smmu->num_mapping_groups); return -ERANGE; } master->cfg.smendx[i] = INVALID_SMENDX; @@ -872,7 +876,7 @@ static int arm_smmu_dt_remove_device_legacy(struct arm_smmu_device *smmu, struct device_node *dev_node = dev_get_dev_node(dev); int ret; - master = find_smmu_master(smmu, dev_node); + master = find_smmu_master(smmu, dev); if (master == NULL) { dev_err(dev, "No registrations found for master device %s\n", @@ -884,8 +888,9 @@ static int arm_smmu_dt_remove_device_legacy(struct arm_smmu_device *smmu, if (ret) return ret; - /* Protected by dt_host_lock and dtdevs_lock as caller holds these locks. */ - dev_node->is_protected = false; + if ( !dev_is_pci(dev) ) + /* Protected by dt_host_lock and dtdevs_lock as caller holds these locks. */ + dev_node->is_protected = false; kfree(master); return 0; @@ -914,6 +919,12 @@ static int register_smmu_master(struct arm_smmu_device *smmu, fwspec); } +/* Forward declaration */ +static int arm_smmu_assign_dev(struct domain *d, u8 devfn, + struct device *dev, u32 flag); +static int arm_smmu_deassign_dev(struct domain *d, uint8_t devfn, + struct device *dev); + /* * The driver which supports generic IOMMU DT bindings must have this * callback implemented. @@ -938,6 +949,23 @@ static int arm_smmu_dt_add_device_generic(u8 devfn, struct device *dev) { struct arm_smmu_device *smmu; struct iommu_fwspec *fwspec; + int ret; + +#ifdef CONFIG_HAS_PCI + if ( dev_is_pci(dev) ) + { + struct pci_dev *pdev = dev_to_pci(dev); + int ret; + + /* Ignore calls for phantom functions */ + if ( devfn != pdev->devfn ) + return 0; + + ret = iommu_add_pci_sideband_ids(pdev); + if ( ret < 0 ) + iommu_fwspec_free(dev); + } +#endif fwspec = dev_iommu_fwspec_get(dev); if (fwspec == NULL) @@ -947,7 +975,25 @@ static int arm_smmu_dt_add_device_generic(u8 devfn, struct device *dev) if (smmu == NULL) return -ENXIO; - return arm_smmu_dt_add_device_legacy(smmu, dev, fwspec); + ret = arm_smmu_dt_add_device_legacy(smmu, dev, fwspec); + if ( ret ) + return ret; + +#ifdef CONFIG_HAS_PCI + if ( dev_is_pci(dev) ) + { + struct pci_dev *pdev = dev_to_pci(dev); + + /* + * During PHYSDEVOP_pci_device_add, Xen does not assign the + * device, so we must do it here. + */ + if ( pdev->domain ) + ret = arm_smmu_assign_dev(pdev->domain, devfn, dev, 0); + } +#endif + + return ret; } static int arm_smmu_dt_xlate_generic(struct device *dev, @@ -970,11 +1016,10 @@ static struct arm_smmu_device *find_smmu_for_device(struct device *dev) { struct arm_smmu_device *smmu; struct arm_smmu_master *master = NULL; - struct device_node *dev_node = dev_get_dev_node(dev); spin_lock(&arm_smmu_devices_lock); list_for_each_entry(smmu, &arm_smmu_devices, list) { - master = find_smmu_master(smmu, dev_node); + master = find_smmu_master(smmu, dev); if (master) break; } @@ -2066,6 +2111,7 @@ static bool arm_smmu_capable(enum iommu_cap cap) } #endif +#if 0 /* Not used */ static int __arm_smmu_get_pci_sid(struct pci_dev *pdev, u16 alias, void *data) { *((u16 *)data) = alias; @@ -2076,6 +2122,7 @@ static void __arm_smmu_release_pci_iommudata(void *data) { kfree(data); } +#endif static int arm_smmu_add_device(struct device *dev) { @@ -2083,12 +2130,13 @@ static int arm_smmu_add_device(struct device *dev) struct arm_smmu_master_cfg *cfg; struct iommu_group *group; void (*releasefn)(void *data) = NULL; - int ret; smmu = find_smmu_for_device(dev); if (!smmu) return -ENODEV; + /* There is no need to distinguish here, thanks to PCI-IOMMU DT bindings */ +#if 0 if (dev_is_pci(dev)) { struct pci_dev *pdev = to_pci_dev(dev); struct iommu_fwspec *fwspec; @@ -2113,10 +2161,12 @@ static int arm_smmu_add_device(struct device *dev) &fwspec->ids[0]); releasefn = __arm_smmu_release_pci_iommudata; cfg->smmu = smmu; - } else { + } else +#endif + { struct arm_smmu_master *master; - master = find_smmu_master(smmu, dev->of_node); + master = find_smmu_master(smmu, dev); if (!master) { return -ENODEV; } @@ -2784,6 +2834,42 @@ static int arm_smmu_assign_dev(struct domain *d, u8 devfn, return -ENOMEM; } +#ifdef CONFIG_HAS_PCI + if ( dev_is_pci(dev) ) + { + struct pci_dev *pdev = dev_to_pci(dev); + + /* Ignore calls for phantom functions */ + if ( devfn != pdev->devfn ) + return 0; + + ASSERT(pcidevs_locked()); + + write_lock(&pdev->domain->pci_lock); + list_del(&pdev->domain_list); + write_unlock(&pdev->domain->pci_lock); + + pdev->domain = d; + + write_lock(&d->pci_lock); + list_add(&pdev->domain_list, &d->pdev_list); + write_unlock(&d->pci_lock); + + /* dom_io is used as a sentinel for quarantined devices */ + if ( d == dom_io ) + { + struct iommu_domain *domain = dev_iommu_domain(dev); + if ( !iommu_quarantine ) + return 0; + + if ( domain && domain->priv ) + arm_smmu_deassign_dev(domain->priv->cfg.domain, devfn, dev); + + return 0; + } + } +#endif + if (!dev_iommu_group(dev)) { ret = arm_smmu_add_device(dev); if (ret) @@ -2833,11 +2919,27 @@ out: return ret; } -static int arm_smmu_deassign_dev(struct domain *d, struct device *dev) +static int arm_smmu_deassign_dev(struct domain *d, uint8_t devfn, + struct device *dev) { struct iommu_domain *domain = dev_iommu_domain(dev); struct arm_smmu_xen_domain *xen_domain; +#ifdef CONFIG_HAS_PCI + if ( dev_is_pci(dev) ) + { + struct pci_dev *pdev = dev_to_pci(dev); + + /* Ignore calls for phantom functions */ + if ( devfn != pdev->devfn ) + return 0; + + /* dom_io is used as a sentinel for quarantined devices */ + if ( d == dom_io ) + return 0; + } +#endif + xen_domain = dom_iommu(d)->arch.priv; if (!domain || domain->priv->cfg.domain != d) { @@ -2864,14 +2966,16 @@ static int arm_smmu_reassign_dev(struct domain *s, struct domain *t, { int ret = 0; - /* Don't allow remapping on other domain than hwdom */ - if ( t && !is_hardware_domain(t) ) + /* Don't allow remapping on other domain than hwdom + * or dom_io for PCI devices + */ + if ( t && !is_hardware_domain(t) && (t != dom_io || !dev_is_pci(dev)) ) return -EPERM; if (t == s) return 0; - ret = arm_smmu_deassign_dev(s, dev); + ret = arm_smmu_deassign_dev(s, devfn, dev); if (ret) return ret; From patchwork Tue Feb 4 13:54:04 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mykyta Poturai X-Patchwork-Id: 13959283 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id DA52CC0219B for ; Tue, 4 Feb 2025 13:54:19 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.881484.1291666 (Exim 4.92) (envelope-from ) id 1tfJNT-00005F-M1; Tue, 04 Feb 2025 13:54:11 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 881484.1291666; Tue, 04 Feb 2025 13:54:11 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfJNT-0008Uq-Eq; Tue, 04 Feb 2025 13:54:11 +0000 Received: by outflank-mailman (input) for mailman id 881484; Tue, 04 Feb 2025 13:54:11 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfJNS-0007bp-RW for xen-devel@lists.xenproject.org; Tue, 04 Feb 2025 13:54:10 +0000 Received: from EUR03-DBA-obe.outbound.protection.outlook.com (mail-dbaeur03on20630.outbound.protection.outlook.com [2a01:111:f403:260d::630]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 81bd75d7-e2ff-11ef-99a4-01e77a169b0f; Tue, 04 Feb 2025 14:54:09 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by AS8PR03MB10120.eurprd03.prod.outlook.com (2603:10a6:20b:57f::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8398.24; Tue, 4 Feb 2025 13:54:04 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971%7]) with mapi id 15.20.8398.021; Tue, 4 Feb 2025 13:54:04 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 81bd75d7-e2ff-11ef-99a4-01e77a169b0f ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Sp1p61tVokaBL06B1HQvSy9aVcEX1YZMc2tCv8/DYRzH2pcxp/5gOTVMnCQf/SdiSI5uLKRNptmMj+G8nPwwFyFzqgKVasKUquH9w9hYeMotKdFmGOjgaR4Jj14BC1kaXUxB6hpYlJ/ejMHAACrw6lTYgsi41WUCsdugEezVIHPaNS7Hb7UAt3Kie4Ijxj+Xc4EzZqP8WDrWMg1ZsR8Q6XGL6hlSsulm9u0YTFhTXb9zLZ5mADfn9lCaN78GmSbbbF02ucXzGfWKOCWCw6IokPf9wKY6zn7PGL/z6dwKk5cYDI0TjnW5BLzw9VZs9He0Wfhf1soMhEb4zzuJIfFt/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=fSwUIuX/M6++bKUnXBVsSIP1yPfNpCUPLwGuNZ2HAX0=; b=jMTfQg/RbWyNeIp4aSu0yD3JWS1jlnQmtstTxWrdzA1L2cdRGa7ZcHkdowvS8CkGDAmeigtT9RP4+69YhHMxdzL3hk2BZP/WraNGhAGkF21fKrRjuBsko4fgrKW2q36CC00J1RFuifHXzDCJmLMC2suOmU9mJl77MGFS3twDJu3ijgWv8wj7i+E61maw63/W6RZ9b8oAI/I3lgmIZFe5PyLMY3KfRkfxML/LJ/MGfLOSwriLn/QXpJvRWozlMIod/W8Ppyru5p5nR5yQegD7CP55Wg2HJLu0PfNrxLgoDY0hGca+TGb2TtJu10pfeuSxYQClvpoA8VRBnaNVcGtxvQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fSwUIuX/M6++bKUnXBVsSIP1yPfNpCUPLwGuNZ2HAX0=; b=GSGAgOHj7n+McKeo3o63qiu+oYO2rltkf06PaySXHpA2fJMYHy1d7QWQq044mjh/xSlc75XXp8ij7IOcZI0piJvlkh4dL+TYrfnYOPqhD/Ee9rwpLAmP35rO6rVtDeoq6z2dkfZMRyOFqWXtuSr2pO+bSFBP/4EdGqOF6CxU7+TJ1aDPJpfO+1OJAZuSFX4VUvMg41zsh8OwKLatsOfiHC8mwToSmfU1HQs1RoPyEvDEcbmM6Vhfb1zSPkDbw+I4YyOk45AEj9sKC/lpp1Zm2b4dmyzwh4CFXR5BMJVYwojNvkykT0MLce9m0tvm9Q+R1yRngsmtJ1AhDHXBm/3v6g== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Stewart Hildebrand , Rahul Singh , Bertrand Marquis , Stefano Stabellini , Julien Grall , Michal Orzel , Volodymyr Babchuk , Mykyta Poturai Subject: [PATCH v7 5/8] xen/arm: smmuv3: Add PCI devices support for SMMUv3 Thread-Topic: [PATCH v7 5/8] xen/arm: smmuv3: Add PCI devices support for SMMUv3 Thread-Index: AQHbdwxAgXXfAs39tUOCWD0oIla8JQ== Date: Tue, 4 Feb 2025 13:54:04 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|AS8PR03MB10120:EE_ x-ms-office365-filtering-correlation-id: 008fadee-28c0-47d8-916e-08dd4523631e x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|376014|366016|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?q?YufnP8kIm9mQpl9Ocso8U/6yzY?= =?iso-8859-1?q?CLLk91lgIgWnuwJORFd2EG8yRriRT/X2uxbLmgdp94m4pkcNb3VXFPFTHFhx?= =?iso-8859-1?q?4YtxPvoJocPdd8osIZ09cUCx2GSIvtqO7g6Xu/g2j5kYhFs6JGj16/sVVntu?= =?iso-8859-1?q?F9Qo9n6OV5Zt58ONPMfW+StJ8nT3jLuU/pZP4FGQiSjo9xIwFMZLwIZSAxfb?= =?iso-8859-1?q?mQGw4Rqkve128DGq9ebUXyn+vPebbyavt+vMtjSRlt5MmcYX4JJGn20l6UME?= =?iso-8859-1?q?AYwup5EWDT/40BtM1N1oC2/nJqmaMr9NGhMIDc5W++MUY7h9aYn1Txp2frXh?= =?iso-8859-1?q?Ln/amkGKcIZZ0J0mLXnguKJJOzeZSCi2TXlQdCED2RKTI+7M7Za/7fvMTZIz?= =?iso-8859-1?q?W6aWzDvwSYPg1O5S7aurmQ4Xorwa1yitTQtke7nW/B+UwYkSX8uuI18E5AjS?= =?iso-8859-1?q?Pzvywi4Mhcz5LfsqhUN5tkm3kLMqQBQ2s5/o03xPZ9JUODXXFza+Q+hiCzaV?= =?iso-8859-1?q?4xpX7TfXfCy65CMN7Y3fK6hyoEGhRF26kH7wbl5frTQRf41qQJMuHwmp/nO0?= =?iso-8859-1?q?XVMTJguVJXy5S0qWFBQ+tjAWca+bIEdFcQ/DLeEorcM3UJTmv9z6u4/Vp23g?= =?iso-8859-1?q?EC3nX1WlzFyxNYPJlTlGd+GKoZK03Mezrn7OIDV196wYRtgxhB+GCQhFkAxF?= =?iso-8859-1?q?rZIPYv28h6UBsXQLa5A5hZLTNs5RHtSDf47342xFbbQzDki1DwgJMnsCm/40?= =?iso-8859-1?q?hdhgSOWULUlG121fhbvSBmSFHXQ27KR3GNgpamFK3juZwGyLQnXFa+dFaC2E?= =?iso-8859-1?q?vT2oZI8VVaRzqnW7ojLddoxuM6XtWnmcC11tM/IL8adUB+lWGy1JcLZlTVMV?= =?iso-8859-1?q?03ETUJio/0SOS5Pvegw/zrW1tBZy2NgiSXiilaMxfk2tm534iLwSqyyLXTA1?= =?iso-8859-1?q?VZpYnNWtHMN7PWgFYhVRnIeVjOvpVKlF61FTF4yA9IHTFTXAHBXeZsqSurFd?= =?iso-8859-1?q?qJbmrVVE6n/MFcjQhAKsVcc2wGKGcCi6sZydiLYlbpt46ZQKm/uQu8SacZZP?= =?iso-8859-1?q?cAGbNGjZ7Cl8DTaDVW5kKtmGHbgAX7IrSZPx8d0sLgc5ejhHUVCksjBRLLf/?= =?iso-8859-1?q?FKzPz6dmCaD8YSYQRrAfi2WZUq/Z3X0sfrQoMzT0L+X29nQVuln1X2zTqoXy?= =?iso-8859-1?q?qQ5J/48mAu8CEWp6bq4YdW2oH+n/VYYijOhHby/NDJRLon7VKW1jDygNviTM?= =?iso-8859-1?q?mfrY1ocOISWLl07RGuNtwu1RDBJgp4DWmtkil6cYHR0nfA337CKPL/AA/xQz?= =?iso-8859-1?q?1GT5Hq4sYY0+cEQrs0GGgeNgp9pHF9gVrmb3j/TMC29Mv5n/YFD4nN7o3u3W?= =?iso-8859-1?q?o95MFQ19Ls90XvUfdpCaCR5nMyhaQcX0pb1/nODgLPi7ghWg4UsWjIgI2KGR?= =?iso-8859-1?q?m6WPCrcen2xMzUwlKqoG+WjYyqEoo+bh/xrAGquv5P6e1yUOiAHPu7MKe/3M?= =?iso-8859-1?q?E+/E7O?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?q?kJ56hI5vUuFlXndZFRuE4GW?= =?iso-8859-1?q?duZrmR9MqhBhgUfH63kVKAsHf8bK4GRyjxYoExipN/jrjRHYHX/OmTh5igne?= =?iso-8859-1?q?icNP20l94Z+D3jCueteZNnhbDM59bSHUKqm38SDzDfu/wUtsg6vBAIa+eGFC?= =?iso-8859-1?q?ue23zsUX6QEmq25n0rtyH0mGg2rDhrULetzAAVd0BwHNnCYTWfGIty53Pik/?= =?iso-8859-1?q?xmDlSGtFTnq5DIxqxaDhWVl0KiWi6yUNvW3g6jea+gsshDzSHHaF0VApzV08?= =?iso-8859-1?q?u4ChBpJ48Z/rt7BJS/AQjB8O+3otpKT/5iJBqDxp+FrFOOb54kY2nMIiukcM?= =?iso-8859-1?q?qFneuKbAEWDsWIezAHIH1siUu43s/ys4i4afQUg+cgUxLYUaAP8wDvlbSJR2?= =?iso-8859-1?q?F06pdzxwV5UmjdmyLU1cl5LBNqtt3wbMTTsVXjKDNnHpI4U9hptC/TO7wLFv?= =?iso-8859-1?q?qXYQss271S4o/VD4aW/YlJ+Zk0iVD2kuahZrioTgr0VkRH0I6BXIQPXIg2Ub?= =?iso-8859-1?q?l8tVATHzsrBLsyHJW0nAWXyuR8AW60Ui+ooUPtzOO2dP8GbletaS8sz5lQso?= =?iso-8859-1?q?9+3r+OkwDJa9+VqLObHT5ySbDMxwIZLS6ZNgLKCJqF4LtF3yvcsptqt3LPAr?= =?iso-8859-1?q?wD6/PREelrB7speWe3PEeD9CIiYecdYnMUn1Fg+LoIMH1o0RA/ixyumioy9w?= =?iso-8859-1?q?7eMRAuuMY/MpqmtoGMchZgGW8syYnM2NsXpXfFBgbbOuewCYUo939qyQovan?= =?iso-8859-1?q?qKgt/Ggt8mTjtwPd9l6Ze+w9EGCZAqmAyO1eS4xynmfuk+3PjGpyzRnL6fhE?= =?iso-8859-1?q?syinzZxWcfnsYcLxAOyf92mFXrAKjJNsgOZTE8JZH5IovGVqzHeaXAo0cdhY?= =?iso-8859-1?q?pDHIdi0ZNAjaId0UPwrjYya50ZZTXRvi+L1gPpFWG9NdjDJOqnbRePJ6V7uN?= =?iso-8859-1?q?lJAnbbDNYMAdPWYzF1jX9BOi6IEevjRrl4+ifH4UFNFEQANnhfQYTUNQQGIS?= =?iso-8859-1?q?1MG5VFJim9Nf9nN8OpFCwp89VG02ewjdVyJShIBCd8+YRSpJMPXzbo/ihbYQ?= =?iso-8859-1?q?WXmf9mUfctrpFnKCqnFaXGqPWuJd4RQ+LtLmB55WtDSs99H/CtGGPdEGodqn?= =?iso-8859-1?q?skMOTG5iqKm13U3jQtkJwnRNgXJMOmv78MEsIinrQV3es7Ihv/emPy2u7EeJ?= =?iso-8859-1?q?Zl70CFA+Zp8FdhtEkec+iSvwTgUyHCZxRnXuvntZAKcfZknNvYQwkNU46Esz?= =?iso-8859-1?q?TW3RiT1ZeVl0on6FAIorIyhDfCYfNzLs7nYRzN7N/GYODzYipSEud+jfFJEz?= =?iso-8859-1?q?Te1+ycASCkoizZMlrzboACwF43lcjl+KynXU/ZW2CJdeIMjMwkwehmCgqcPo?= =?iso-8859-1?q?+uA7rdenDpD28KrgwVjJztljX+SaiUIDQ+tV6m505ijGC/oPbWSO52DS0HRg?= =?iso-8859-1?q?0rNZWKoNQxYF+cN5SnvYUlBDcfY7n37J+YyI5Shsb0X3Pj/OxK940nTHZ24h?= =?iso-8859-1?q?pVWYgisaUKInS6Rm0PREeJgi/YFRf4tB9rYwu73KnTLz3ZyobnO/YQKwxqnU?= =?iso-8859-1?q?V2mDVpeO/9Yjkg55904hVgNGjnJtq8IRRexg6o91o9jmF79UEErGAT9BLeAv?= =?iso-8859-1?q?1q0/qqxX82e68MZzzorBhq1xnD1XrBNRyS/52Qw=3D=3D?= MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 008fadee-28c0-47d8-916e-08dd4523631e X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Feb 2025 13:54:04.0604 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: h11mjg/UeGn0vqBjmuOB4Nnt9yWTkKxtQIRGX9l/GAdByIqONwDaDqpUn+YdUGQPuk9jDXPBIFJMScO8QZxCPA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR03MB10120 From: Rahul Singh Implement support for PCI devices in the SMMU driver. Trigger iommu-map parsing when new PCI device is added. Add checks to assign/deassign functions to ensure PCI devices are handled correctly. Implement basic quarantining. All pci devices are automatically assigned to hardware domain if it exists to ensure it can probe them. TODO: Implement scratch page quarantining support. Signed-off-by: Rahul Singh Signed-off-by: Stewart Hildebrand Signed-off-by: Mykyta Poturai --- v6->v7: * address TODO: use d->pci_lock in arm_smmu_assign_dev() * remove !is_hardware_domain and pdev->domain == d checks in assign to support future dom0less use case when dom0 is using vPCI * check if pdev->domain exists before assigning to it * don't print "" * change assign logic to remove reassign reimplementation * explain pdev->devfn check * make reassign check stricter and update comment v5->v6: * check for hardware_domain == NULL (dom0less test case) * locking: assign pdev->domain before list_add() v4->v5: * deassign from hwdom * add TODO regarding locking * fixup after dropping ("xen/arm: Move is_protected flag to struct device") v3->v4: * no change v2->v3: * rebase * invoke iommu_add_pci_sideband_ids() from add_device hook v1->v2: * ignore add_device/assign_device/reassign_device calls for phantom functions (i.e. devfn != pdev->devfn) downstream->v1: * rebase * move 2 replacements of s/dt_device_set_protected(dev_to_dt(dev))/device_set_protected(dev)/ from this commit to ("xen/arm: Move is_protected flag to struct device") so as to not break ability to bisect * adjust patch title (remove stray space) * arm_smmu_(de)assign_dev: return error instead of crashing system * remove arm_smmu_remove_device() stub * update condition in arm_smmu_reassign_dev * style fixup (cherry picked from commit 7ed6c3ab250d899fe6e893a514278e406a2893e8 from the downstream branch poc/pci-passthrough from https://gitlab.com/xen-project/people/bmarquis/xen-arm-poc.git) --- xen/drivers/passthrough/arm/smmu-v3.c | 117 +++++++++++++++++++++++--- 1 file changed, 106 insertions(+), 11 deletions(-) diff --git a/xen/drivers/passthrough/arm/smmu-v3.c b/xen/drivers/passthrough/arm/smmu-v3.c index cee5724022..9c7c13f800 100644 --- a/xen/drivers/passthrough/arm/smmu-v3.c +++ b/xen/drivers/passthrough/arm/smmu-v3.c @@ -1467,14 +1467,35 @@ static bool arm_smmu_sid_in_range(struct arm_smmu_device *smmu, u32 sid) } /* Forward declaration */ static struct arm_smmu_device *arm_smmu_get_by_dev(const struct device *dev); +static int arm_smmu_assign_dev(struct domain *d, u8 devfn, struct device *dev, + u32 flag); +static int arm_smmu_deassign_dev(struct domain *d, uint8_t devfn, + struct device *dev); static int arm_smmu_add_device(u8 devfn, struct device *dev) { int i, ret; struct arm_smmu_device *smmu; struct arm_smmu_master *master; - struct iommu_fwspec *fwspec = dev_iommu_fwspec_get(dev); + struct iommu_fwspec *fwspec; + +#ifdef CONFIG_HAS_PCI + if ( dev_is_pci(dev) ) + { + struct pci_dev *pdev = dev_to_pci(dev); + int ret; + + /* Ignore calls for phantom functions */ + if ( devfn != pdev->devfn ) + return 0; + + ret = iommu_add_pci_sideband_ids(pdev); + if ( ret < 0 ) + iommu_fwspec_free(dev); + } +#endif + fwspec = dev_iommu_fwspec_get(dev); if (!fwspec) return -ENODEV; @@ -1519,17 +1540,38 @@ static int arm_smmu_add_device(u8 devfn, struct device *dev) */ arm_smmu_enable_pasid(master); - if (dt_device_is_protected(dev_to_dt(dev))) { - dev_err(dev, "Already added to SMMUv3\n"); - return -EEXIST; - } + if ( !dev_is_pci(dev) ) + { + if (dt_device_is_protected(dev_to_dt(dev))) { + dev_err(dev, "Already added to SMMUv3\n"); + return -EEXIST; + } - /* Let Xen know that the master device is protected by an IOMMU. */ - dt_device_set_protected(dev_to_dt(dev)); + /* Let Xen know that the master device is protected by an IOMMU. */ + dt_device_set_protected(dev_to_dt(dev)); + } dev_info(dev, "Added master device (SMMUv3 %s StreamIds %u)\n", dev_name(fwspec->iommu_dev), fwspec->num_ids); +#ifdef CONFIG_HAS_PCI + if ( dev_is_pci(dev) ) + { + struct pci_dev *pdev = dev_to_pci(dev); + + /* + * During PHYSDEVOP_pci_device_add, Xen does not assign the + * device, so we must do it here. + */ + if ( pdev->domain ) + { + ret = arm_smmu_assign_dev(pdev->domain, devfn, dev, 0); + if (ret) + goto err_free_master; + } + } +#endif + return 0; err_free_master: @@ -2622,6 +2664,42 @@ static int arm_smmu_assign_dev(struct domain *d, u8 devfn, struct arm_smmu_domain *smmu_domain; struct arm_smmu_xen_domain *xen_domain = dom_iommu(d)->arch.priv; +#ifdef CONFIG_HAS_PCI + if ( dev_is_pci(dev) ) + { + struct pci_dev *pdev = dev_to_pci(dev); + + /* Ignore calls for phantom functions */ + if ( devfn != pdev->devfn ) + return 0; + + ASSERT(pcidevs_locked()); + + write_lock(&pdev->domain->pci_lock); + list_del(&pdev->domain_list); + write_unlock(&pdev->domain->pci_lock); + + pdev->domain = d; + + write_lock(&d->pci_lock); + list_add(&pdev->domain_list, &d->pdev_list); + write_unlock(&d->pci_lock); + + /* dom_io is used as a sentinel for quarantined devices */ + if ( d == dom_io ) + { + struct arm_smmu_master *master = dev_iommu_priv_get(dev); + if ( !iommu_quarantine ) + return 0; + + if ( master && master->domain ) + arm_smmu_deassign_dev(master->domain->d, devfn, dev); + + return 0; + } + } +#endif + spin_lock(&xen_domain->lock); /* @@ -2655,7 +2733,7 @@ out: return ret; } -static int arm_smmu_deassign_dev(struct domain *d, struct device *dev) +static int arm_smmu_deassign_dev(struct domain *d, uint8_t devfn, struct device *dev) { struct iommu_domain *io_domain = arm_smmu_get_domain(d, dev); struct arm_smmu_xen_domain *xen_domain = dom_iommu(d)->arch.priv; @@ -2667,6 +2745,21 @@ static int arm_smmu_deassign_dev(struct domain *d, struct device *dev) return -ESRCH; } +#ifdef CONFIG_HAS_PCI + if ( dev_is_pci(dev) ) + { + struct pci_dev *pdev = dev_to_pci(dev); + + /* Ignore calls for phantom functions */ + if ( devfn != pdev->devfn ) + return 0; + + /* dom_io is used as a sentinel for quarantined devices */ + if ( d == dom_io ) + return 0; + } +#endif + spin_lock(&xen_domain->lock); arm_smmu_detach_dev(master); @@ -2685,14 +2778,16 @@ static int arm_smmu_reassign_dev(struct domain *s, struct domain *t, { int ret = 0; - /* Don't allow remapping on other domain than hwdom */ - if ( t && !is_hardware_domain(t) ) + /* Don't allow remapping on other domain than hwdom + * or dom_io for PCI devices + */ + if ( t && !is_hardware_domain(t) && (t != dom_io || !dev_is_pci(dev)) ) return -EPERM; if (t == s) return 0; - ret = arm_smmu_deassign_dev(s, dev); + ret = arm_smmu_deassign_dev(s, devfn, dev); if (ret) return ret; From patchwork Tue Feb 4 13:54:04 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mykyta Poturai X-Patchwork-Id: 13959284 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id E7384C02194 for ; Tue, 4 Feb 2025 13:54:21 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.881485.1291680 (Exim 4.92) (envelope-from ) id 1tfJNV-0000XJ-Ss; Tue, 04 Feb 2025 13:54:13 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 881485.1291680; Tue, 04 Feb 2025 13:54:13 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfJNV-0000X0-PR; Tue, 04 Feb 2025 13:54:13 +0000 Received: by outflank-mailman (input) for mailman id 881485; Tue, 04 Feb 2025 13:54:12 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfJNU-0007bp-A8 for xen-devel@lists.xenproject.org; Tue, 04 Feb 2025 13:54:12 +0000 Received: from EUR03-DBA-obe.outbound.protection.outlook.com (mail-dbaeur03on20630.outbound.protection.outlook.com [2a01:111:f403:260d::630]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 82aa8e38-e2ff-11ef-99a4-01e77a169b0f; Tue, 04 Feb 2025 14:54:10 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by AS8PR03MB10120.eurprd03.prod.outlook.com (2603:10a6:20b:57f::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8398.24; Tue, 4 Feb 2025 13:54:04 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971%7]) with mapi id 15.20.8398.021; Tue, 4 Feb 2025 13:54:04 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 82aa8e38-e2ff-11ef-99a4-01e77a169b0f ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=SeH37IhJ8T2feiYadEw4MB0JRWwzu9PQvyBL5N5sV6z+xR7YV9laMUhpxzRsRI+WoysSrpYAJvRofd3/mBJxSIWPFc9IjsXqZFy1TWKaPAUktdBJfdpCWPvlQodHrnGH6IYUKZ8PC/mV2maqtvcT6q98n4jy/O1Mi4bWs2efreeLWhaWeX20be/5rnvD5KkI0xgQWuj2kcySU72Tx3hkFqHU7bHljLDpXmSCaGC5dKkkRW9Oz9bNbSL5+xnO4RjiFnf8KI9e9r6f023irnGsd6GwvHLnuMG0hnzfPEUGpvOAcaiRbl+h++Ur47EwqXoBuSbhdjMqRkB+7ZKvphRKfA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=IBmImMY45au6S/wSkAfDzPVwqKMv01abSxNI/zj+jYE=; b=KynIldwIVOc+u5R27l40IeHC4Sg049Mxh96fyOT6DaGUTym1CjuPUlj0+3OsIMIHaXSpEoZPA/iwn98C66FaP7PjobGLwwAktuISWbX5wfQpJMCxF6XlutBZCKPv3zWFjfXLhmP+9Jog9a3okPihSn0fwE4m6pahttVIZiJT8nFmx+KrioDcMgVpqTh4vONd3vijZiJ5iAFhSlV7pbaQ8KeTZo6plGVJBDEnrUf68YtWkVDW95MXiMzpZUqZpqpzItKwzevc9V9INdFDAnzjD5zdq06aeFqhJdGdECm/lx9sQx+W4KCROmJGWD6ffc/IcPzO0b7NlPNLLpxjVRysOQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=IBmImMY45au6S/wSkAfDzPVwqKMv01abSxNI/zj+jYE=; b=jN3kkmQdhtoETPZQPalrcrpYPD4KLIqnD1we2gTrVR2OX1h/TY66svF9ltO7s4bi8f2jp3SsXuMO6Mj6nf6JEenTYBxrJaI5MdFVAaLXcBFDeM8wLe0LkTXGJ1seifTw3QLanLHZtP1Ll464i/NiQNFBVQlaYfokwLfWxrHD1PNddVYwFJcYU/OtQYGzOIU8RQ2D3m25TVfZGxz7QTYVtpK89JqoBtmxN+ofmWE4+vX7txPEHZMwu5dvi8WyQLFnlNGr5Hvn+m+EvevEUSdxlOMPzIWyPS2nZmI2vwCi8MoSyqMTtI8Ujp2xKr9paRLih6ZhhFWxH+1FykAgtlLPhg== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Stewart Hildebrand , Rahul Singh , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk , Julien Grall Subject: [PATCH v7 6/8] xen/arm: Fix mapping for PCI bridge mmio region Thread-Topic: [PATCH v7 6/8] xen/arm: Fix mapping for PCI bridge mmio region Thread-Index: AQHbdwxAffL4CCc3KUGafSgxW+bavw== Date: Tue, 4 Feb 2025 13:54:04 +0000 Message-ID: <3766f6a15a2ffb24a51e5caa2eb6d8b44cada57a.1738665272.git.mykyta_poturai@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|AS8PR03MB10120:EE_ x-ms-office365-filtering-correlation-id: e6805e59-5597-4e9b-11c3-08dd4523634c x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|376014|366016|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?q?iaSovlQ1WivSLzwz+KwZ1Ok7tF?= =?iso-8859-1?q?/N81WC32fGp87l2vX5wwSBhINlwo4wMa8eIm3I1Ht/pOMfA3RCSOVZMIVX4Z?= =?iso-8859-1?q?lYUODVIBdqsVO0mUifJH0+w7l5ieZT+iUepUp/GMhQOTJuRSW89VKO/zsSeM?= =?iso-8859-1?q?gPDwVb/vqFmi4TFX9lhVoNRx/tg/kH7V1Zu8ocNLRjea8qG/V/fXTqYqft/S?= =?iso-8859-1?q?iWzKsLuFB11tKWjBA2107aN9iC79uqa0H1Qvz8PzQfaJuQeV2NlbsMXchQPZ?= =?iso-8859-1?q?6VpuTJUzm375YhHaskB//wMxqT3SKKtFkVsIjNg+vLa9ovwR51i3+lWX0TRB?= =?iso-8859-1?q?IFWIcA12WChhqmCrwrEXTpS00eDxzlJPmVydeE+UXJESWYtrw2KYFiNPaLOU?= =?iso-8859-1?q?ml0zZMFApeu1NkjgbhFK80wDzrLjHemujoK0FG53jMV7wEbpMtDBwG5N7PXl?= =?iso-8859-1?q?zIjCvVBU5hGpEwT30ELPLAD673rFZuYRv9RKaJODVbodcNUnrDL6sWkaWtIk?= =?iso-8859-1?q?RayYAEfs4ZDd7wdjfpDiwADLi+mtC3TByHrP+tDsJ2rkenyy8hXPHEahw6qD?= =?iso-8859-1?q?ODuZxCWjvFjdeS9Ce0Fw2h4VtEpngZHllhLDvqZFg7JCBdgPcjwjlNiTN1tU?= =?iso-8859-1?q?w4Nn+d3rS6CZMd9VLiPELj29sx8hQFIug6jrgNxk2rh9uAUlGAeGOOcVjRfN?= =?iso-8859-1?q?Rt5XeBkjTrcbQ+aUHx5tDDuC8pMY2qOGtcnljddahmhIaPOqgGdD3HE7BMhS?= =?iso-8859-1?q?g4w2XXzCqWgqLmNUah83yuszby+OXpyeuAO5uYfnFAtBgA9iCJfuYasbsWnl?= =?iso-8859-1?q?Rt4Y1raoLdHtS1DwlB1dTvsB7t3egBmceboqn6x7o5Vpt0Mid0fUPm6+U1VK?= =?iso-8859-1?q?ibte/8+GKL05+4R6FsKCwNeaFu9n/d5onNPxL62+2n9jkUUvei6rgqlblh2h?= =?iso-8859-1?q?MkRyYlNSGfUgSjl4JX82WvdY1iYFMqpcPUHnv0EnGxUVL4mXBs+2hXp4wtTT?= =?iso-8859-1?q?li8AjMtX7USRhr8dHwVsISazxozd3PsivREPv3gc2ud2eQEEzfgpiqAiOtBA?= =?iso-8859-1?q?7A5zzSKsAph4omzhW4FvjNlGdd26FqFfYpMAD0IeFvxAJDkbag4FwGlWk3lr?= =?iso-8859-1?q?g/0pViTkZGVLxsE4wNloPO4j8ZIkYAemq3618DPUsTPz2c52xlZJDsL53fXI?= =?iso-8859-1?q?Oa8V/iHEUxvYhQ0z6eRFEJsKgmVclc5z5JgTUp9jHG7YwegRk6u9E5OUsMxz?= =?iso-8859-1?q?OhV9zZX2JXI6B4CMk/aKGF3pTeYlOTK/tCRtTxbH5gn4qvyDUOqiYEbE/imX?= =?iso-8859-1?q?Z00pMfH5rBzPZwqAzDPPhBnuIzlaYKFF2ZK8euZFy79BoDRLps8h8hGBhOH7?= =?iso-8859-1?q?BxMDyPrbnu3ea2ZC0jX82HrcdjTHFBtcPLKA50yKM1wMF6PrBwRM5lVIiOJb?= =?iso-8859-1?q?scLeyYn48sMeqJJlF222oReg=3D=3D?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?q?/n4oTvG0Dgd6TQcoJb4/IjV?= =?iso-8859-1?q?1KaILzh2PBzRSOpCyzJz2F4k6eELUqersVcLH8OxtuIqBfRlVZyjROx2Fr0I?= =?iso-8859-1?q?ExD82E6gJi2iiUtTqlG5jcXUyG8MW37H3hix134v0pO8t4nf2rw8gTAvTJ8n?= =?iso-8859-1?q?+MB6adocqvGrzkh+ogkPn7aRvpV3BIe5yyZiHBroNkgwVX0+vN1poVFFyd34?= =?iso-8859-1?q?5LlpVYZpf+spxchCBk7XUSI0+tl0ZZU7B2xIXDNlnFyvMua07J6R5dY91MIs?= =?iso-8859-1?q?x7XRIGSQgbtW6yj0vNNjM/oKqk9GzKwLpV4GYJHsIGxs601AWOE/654nAyOJ?= =?iso-8859-1?q?Rn8L4832e9AL+bC04d15YLBxGJGTgI1n2NSPObhCXH2r3jNLodSBPKp9XM8E?= =?iso-8859-1?q?k23IKL7ar9TaFHjKV6SKcGQ92wQjn8x2ALIyFhzaq1F7KM+QQdHEK3SHznso?= =?iso-8859-1?q?BabN72MaXlXE7Sx5QWtNk7kp/wqpxBB8GNpSKLmUZLiapOu9XDdDrIHs06lJ?= =?iso-8859-1?q?APpWHt2+D00SBGfs1Kg7WXzuTjCoBJOdVQn2c102Wv/j/rtcWA5UOfFoRhNx?= =?iso-8859-1?q?EYzWEBZXk+mEk8ho5k5DIgQZ72rebH2RCmHO8V4weZA9G2jRzwAn1EOKr8PU?= =?iso-8859-1?q?ysDzV147VAr3xcO9l0NLZhf6LwyNp5G8GHfsEtR3Rk10Q4lc/0YT4zD5xsb8?= =?iso-8859-1?q?g0PzHDpSFv9euM2+N4YuaR6ab9B/D0oFZjvmwYPh8M27puVSmH8aKdGvdWZh?= =?iso-8859-1?q?WjD7K+u+Wv+G2EdnS1mHmnqe7cwi+pv4Yk2t4A9oWWEApAIIUwDBemnVCltH?= =?iso-8859-1?q?8UFIkl304ghWLWxQNwObIyweM29WTV6HlQHHBpxTHUqoSya6A3Gb7MZ+1zCC?= =?iso-8859-1?q?CCvahaKVIYqouEIEvm+CI84txNl1b3aGnJtuuOBlO69XCmrS9uqHCuU16s4M?= =?iso-8859-1?q?aQeJy6GN/r7WQBikZbY8P1dvW55xyte7grTfKS3L48ExvTUgV6zqmwhZkSB7?= =?iso-8859-1?q?vHNraV+UQq8Nfn0Vv0J+5CimlfczvCjT7W/I47y2uUcRLXFh+nvBnRQdgMyi?= =?iso-8859-1?q?xRH0KClpR5/69TSKwl94ug4lz/NL0QX9bVfNmboNVhgwCxji4s4qRLpVXKRn?= =?iso-8859-1?q?6kSK/CiZllpDa1P/KZQpY83TdobcOSzJ6XdJ3YuLAjLJQ4FYEdtJiET/915i?= =?iso-8859-1?q?lLsbFkcJxj570083Ag+O3C7yeHEEadNXgczA/8RDBDexw8T0OiL0CZDxM+CT?= =?iso-8859-1?q?ZFuAEt66YeIqvvsLbByL54tPs8rOyfwK9Ulh48+++XeKeK/W+SksOhORfZOU?= =?iso-8859-1?q?5HjNhkCk4NHhNU8OjznRJrKbJC2sHxpe+u2ONseddUrapPR0M6ITleEodH5r?= =?iso-8859-1?q?+acpmMoUeJVLrAPCV8Gn9w7FAOeWjnLfg03HPJubUy6/ZzmRRYtQqQADU0Q4?= =?iso-8859-1?q?YxrrI3t3NRc1MXrRkbQy8Ou0efRJMbE566+2YidaWNnk3nCxmYoBZVqjFV0P?= =?iso-8859-1?q?obNS5d+tFQNdO3gun9fgzb8Odo0RbHRsa0osFebc93OwZ08vPPmpRZN9CoKY?= =?iso-8859-1?q?NErAN0XSHCnKiP1QT2/XgutS77BgoJwBQwbtNKeK1THKAw/CsGv7UvrmBnTN?= =?iso-8859-1?q?ISWpGRZd5k6VHGtK+bd84Ufw+OSF/a1JWTEdZ+w=3D=3D?= MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: e6805e59-5597-4e9b-11c3-08dd4523634c X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Feb 2025 13:54:04.4402 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: kKiFL/i/eohweXueptx50WcN9IS6titZIMldOKX3JZrCTnDnAXPnreDd6rf4JcWbGrA9l+wYTyoyEDNiv3DDPg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR03MB10120 From: Rahul Singh Current code skip the mapping for PCI bridge MMIO region to dom0 when pci_passthrough_enabled flag is set. Mapping should be skip when has_vpci(d) is enabled for the domain, as we need to skip the mapping only when VPCI handler are registered for ECAM. Signed-off-by: Rahul Singh Signed-off-by: Stewart Hildebrand Acked-by: Julien Grall --- This patch was originally picked up from [1] v6->v7: * add Julien's A-b v5->v6: * drop unrelated change in xen/arch/arm/domain_build.c:handle_linux_pci_domain() v4->v5: * new patch changes since picking up from [1]: * rebase on top of "dynamic node programming using overlay dtbo" series * replace !is_pci_passthrough_enabled() check with !IS_ENABLED(CONFIG_HAS_PCI) instead of removing [1] https://lists.xenproject.org/archives/html/xen-devel/2023-07/msg00483.html --- xen/arch/arm/device.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/arch/arm/device.c b/xen/arch/arm/device.c index 5610cddcba..25847d60ee 100644 --- a/xen/arch/arm/device.c +++ b/xen/arch/arm/device.c @@ -268,7 +268,7 @@ int handle_device(struct domain *d, struct dt_device_node *dev, p2m_type_t p2mt, .d = d, .p2mt = p2mt, .skip_mapping = !own_device || - (is_pci_passthrough_enabled() && + (has_vpci(d) && (device_get_class(dev) == DEVICE_PCI_HOSTBRIDGE)), .iomem_ranges = iomem_ranges, .irq_ranges = irq_ranges From patchwork Tue Feb 4 13:54:04 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mykyta Poturai X-Patchwork-Id: 13959285 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 9D945C02196 for ; Tue, 4 Feb 2025 13:54:24 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.881487.1291690 (Exim 4.92) (envelope-from ) id 1tfJNX-0000nM-86; Tue, 04 Feb 2025 13:54:15 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 881487.1291690; Tue, 04 Feb 2025 13:54:15 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfJNX-0000mx-4B; Tue, 04 Feb 2025 13:54:15 +0000 Received: by outflank-mailman (input) for mailman id 881487; Tue, 04 Feb 2025 13:54:14 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfJNW-0007bp-03 for xen-devel@lists.xenproject.org; Tue, 04 Feb 2025 13:54:14 +0000 Received: from EUR03-DBA-obe.outbound.protection.outlook.com (mail-dbaeur03on20630.outbound.protection.outlook.com [2a01:111:f403:260d::630]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 838906b0-e2ff-11ef-99a4-01e77a169b0f; Tue, 04 Feb 2025 14:54:12 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by AS8PR03MB10120.eurprd03.prod.outlook.com (2603:10a6:20b:57f::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8398.24; Tue, 4 Feb 2025 13:54:05 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971%7]) with mapi id 15.20.8398.021; Tue, 4 Feb 2025 13:54:05 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 838906b0-e2ff-11ef-99a4-01e77a169b0f ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=edjCSlaYKAEBRGPLr7MeZ3l+bPSDDTIp3ZSjBRhYcdk3YyZgaa14OkUk7a07OiGBd/DR4DbyzZZcMZkbJGpCtFK/vTB4AD93/Jz+1Z6Lfgwu+gTg6LU3qeRy55FKsu82uoa6pvKY5vjWlL7X/ZDBbHoefy9dBbWNO3a6wGcNm0Am6L1NTkW9wwnHOHk2m4Mb6olLR1yoDsvhcBmXKlC+WDadii1duSJgYBvKRQLYLcCLAeTWRbyIKOM1Uws1T7YWvXS6W2RU3eZ7tTUa6A1nNfEofnfMGHr+BJOT2oP0ptCBxTdVyIQw9cshl2jw/fI98gbf2HZc7flvNK9Bqs5oGQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=M6yVN/7mR8MjfSPlwMkMwzKY7bVejLrXee73gB5MtkM=; b=y0Lom8FCzYW3DyRWZ9qYpKJyPBoLZ36XhzmkRi9n0+WxZxgkg2k2w74EVRRCgQgTh0orzXQIVqtGvccZkDBhKQn6xz8/O8m2u0Mp8w3upaBPWFOnZHK6L/3wuBbSJhas6JGqwY5gm0sE4WO0OWlH17AwgTyNBiGQyjA6Q+2eoXVgE7fKTRa3Jv25eyV0vWOl7+f/zli+XzlKg0y4K3OVOdOCUsmgFbR18Ku4TiEBo/YG2cUxOLs8lDurSj/OWJ0RMqgY4AW94l+/oDmuApA4Z1CJpsHdrAmVsbaHZyQkLtjcvWGwBx37AiDKigX4T5vXAEg9gx679BxfSviIZkoPLA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=M6yVN/7mR8MjfSPlwMkMwzKY7bVejLrXee73gB5MtkM=; b=d1wX+yHR/O62tKhCAAU2E5RvvZtnWwdPP8VzqVimqsi0o5ML6CuG/Vs7srKiloLDHpm2YD4xDZtc3psSbOKw/NmRoq83BK6OuTRmMDoArBsTAPu8B1bII6GfAFqysJ38DqsD1VWxoCWcIvPeKIYTAzCBgIHk15L6Wmd4yOSQsSImznRngNx1ZpGhWerSoowdepHN5JYrW4OsfZ553khmGU0YMO8LZCWduxWvSGYRarCE+KwCxm88XrIV9Hn00vq/xLn49dxrro2kPKNvSaxxrWJNIj1x265rXA40CD7hc8HzQlj0XnVAY3Kq20wSlntsJgloooz9oLn88uUmzC4P9A== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Stewart Hildebrand , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk , Andrew Cooper , Anthony PERARD , Jan Beulich , =?iso-8859-1?q?Roger_Pau_Monn=E9?= , Mykyta Poturai Subject: [PATCH v7 7/8] xen/arm: enable dom0 to use PCI devices with pci-passthrough=no Thread-Topic: [PATCH v7 7/8] xen/arm: enable dom0 to use PCI devices with pci-passthrough=no Thread-Index: AQHbdwxA2HXgA27x50qr88LJQwvJaw== Date: Tue, 4 Feb 2025 13:54:04 +0000 Message-ID: <7d9c8b93c01ee56cb8da6e959a020946efe65330.1738665272.git.mykyta_poturai@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|AS8PR03MB10120:EE_ x-ms-office365-filtering-correlation-id: a1ad0abb-2df3-4554-9942-08dd45236388 x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|376014|7416014|366016|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?q?XTmnKrbxCTVLNXMGAYgm/gwIts?= =?iso-8859-1?q?0qBTd/NclKn5x2+enpSrzf+lYmhV+hlW+eWBloi1Sn+aJEmrOC2csajbcsRc?= =?iso-8859-1?q?VxTuWQa+nyG+gQ4TsL2mZ+Ctm0ad6y5ZHgHrO2HaV+t7cOGEgpeHnpbPAJpr?= =?iso-8859-1?q?XZpxHZLUt2UEzWcG6+wFuCJH4PD1xEuQaV8Tidv/2Yama3JLd9lv5w0b9Yuv?= =?iso-8859-1?q?90PUWPkUwhmqyxIP5ealFydCtz9MksuxSTm62YZYKjn5PV1XuevsE3QqE279?= =?iso-8859-1?q?e70zNJXHpL13bjzS2WEIC+RVdeFTCFgKngsQTTMWNBodnRX5BwZA1BwByfvR?= =?iso-8859-1?q?o6+CWrAhhLgcdkfwY88kxjCmLN3hwrrG2VYR3nEcun5rCNOzfKx5S+tl3uGa?= =?iso-8859-1?q?zBd+CJ3Zy45KHj2axbwQxDp6dEt+CO3qLzJji5grD0Rfxbw48ePloxBO+0AH?= =?iso-8859-1?q?L8pA2Ulp6oS/ClWxpf5jqfYfZzY1irEYEDKQ4Izsw+nq1FzQeWS4k806wBza?= =?iso-8859-1?q?woA+z14MpBzjBUZQpMLDrs+lXr+M6Ne9AIVO6zX3OHAwlonex073VEXgA03P?= =?iso-8859-1?q?2+rTQnDXWFH2JhZJ3Uph4RmMBx3nlEJ+CyQwDbLfAyyGq2q6ef9kDLCbSDqr?= =?iso-8859-1?q?j6h0KGVhdVwz1T6qCOaWWbjfFqH3iuVz4Vm6MHsJO8mNNsX8r5LxyMTF8olc?= =?iso-8859-1?q?l73hQlLUhJILyryDzV1dKCua8ORaiCVilUj1UxBuF2YPrVVpUgePIAGk/jDI?= =?iso-8859-1?q?6GUZj4oBPkZcydgag+vswVAkw+5/mxxTJlsMIF4TNg+migCfjeaGBNuEwlQ2?= =?iso-8859-1?q?hPmQMPaiWFYGz1waTj127i/QZbgpCMQNUhFQT5495ieFGK0WWl2sTDupUbK7?= =?iso-8859-1?q?mu+NbU7ej/1KM47lC4plBAdUIwOoupxKma89kNiMMUv+EEtFx63qziMR3jNd?= =?iso-8859-1?q?net+jBzPCwtRphGnJUAs9jTXi+cG73upunMaz4Ul2IbmFfnIwv00E8HsKeb0?= =?iso-8859-1?q?Nz5p5BhHWrXOkig79sN8jzoApUxBWP7fUoMPKaMvVcMjD6nohmk4prHsLB7K?= =?iso-8859-1?q?yHOCGQAcQqtTBzlb/bYnxqYZmVQm41r+489AKT/otlRjiMpulJZAckVNT6bT?= =?iso-8859-1?q?dqEmhmLLkXr6UaNxTYCE/BSA6qA6Au6eNL7UK9cfoxmgM80b8zgXHkdZoK7e?= =?iso-8859-1?q?mpddbJqdvIJ04nGdDaVg1nSIkrSJXyW8JRSpqzxFH2OfyMzFdzeAL6uE8ViQ?= =?iso-8859-1?q?HizM69AQjLGOAYhPnCtNuWwuqg+UVWl6hVnAHWu5ogVap8bjpHhtssZdRbub?= =?iso-8859-1?q?+iEN6Uaxwe3vRSQMXZFrg2uKNlJqxgg53qwbVYhdgCcFDcJ+xkY51oFdJBcQ?= =?iso-8859-1?q?W0ghsQwsiIJTOA6MdxXVz/1trpEKwJsPmtoCyifsOug9SspQA6rCXZPwCfR8?= =?iso-8859-1?q?CRlPHy8hHoMnE/vcNCaB3zq6rxBS+yhudcLgJbKyHL4olKf9RWXR0OXoNqOF?= =?iso-8859-1?q?eSLVla?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(7416014)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?q?NzWm29EZ8JppSLvy1YkbJng?= =?iso-8859-1?q?NZg0xepYeLtwCoPglUO5x2pUpFIvJGuGFUN1wNyMAA4PM03H3DPeQYIKMvvO?= =?iso-8859-1?q?AJjTg7hGQ+i7lGUikqQWlx8KABzbDbzEU9L3ma3ujRfJYyL523Y0pWQStQqu?= =?iso-8859-1?q?e0auNImklvIuzOTsc5iS7SdyqynTQBXZXTCWxzUW9Bj3+mcLRGqqMRVS+ueX?= =?iso-8859-1?q?UKabjgA8luN5Q4CgF3HaZa9GiEbM2pkZlu+f/iEleQZyltaw3msamfE8gcuT?= =?iso-8859-1?q?1y7BodyebnMT03e5aAyZijaJODZQZ0gFeO6tjqDOlNBo9d6COYdYJR1H6+v/?= =?iso-8859-1?q?3xaO4/1wKcGIbFeecLbOOytasHnhytQ+b24NF5rSfOfrL2g7d3CTeg30MbL4?= =?iso-8859-1?q?Tmh4pkvCj6R48nAgygaY50jLcD4psizxc9QpsIXwNtmI0zTqTMB6MeG7D8jt?= =?iso-8859-1?q?4xWkyJJ0cjhZoSHFlydy7WPt34VMPtY5u92C2OVnBXLNAV0mvIkePxQIj68g?= =?iso-8859-1?q?eBewKi72LiMLAemZwFQLcPSmFUdUF+op8nWspzTl8z6QHgXW5uHXsvSXGub/?= =?iso-8859-1?q?p8QacfY2wZpDYxH3TcTlgRhxuFMZLkmk3ATiRs/jBg5SHvyuBPa2uL0o0wcL?= =?iso-8859-1?q?ra2gYfaxBMfJpzuikFVqNZ3H3BaqUOsPTvF/JKDpnvVO/CyXkokchVIIiMlO?= =?iso-8859-1?q?1prX612kWT1LH2EZGevxElHb03r/xiNyWATZn5kz9FOaIG74LlzltS6TTLrz?= =?iso-8859-1?q?uVhEugsJZ/QYmHN9jOhCkCFbyOWd/iJu1eN7xVIZ1eIta/KH0O69PvdrzZdR?= =?iso-8859-1?q?6jO8kM8V9jvUGSLS0VX62jUx5HeaEH9igfg64Gm1n/GVuq6vKX9F4gil1WFj?= =?iso-8859-1?q?l8IOmeT43MoJkGHZ5FWs2SXAJWO8gnsQHN4u9ZNx7RjjBlBoHkibIq+YR2x4?= =?iso-8859-1?q?U2SwwiNR8w4/B5E/ZMUqN91LEx06gXJ8M4FHshwIxQgQnWjbzNb5LxLyP7rY?= =?iso-8859-1?q?fCuCg9nLNfCANL/ZAeTVVSFG220rUG0MYOllpOHAcqZBOw2x9Ld7dHB5ptfW?= =?iso-8859-1?q?9FcAYR2Q9AzUnKo+S/JdN3Md1l9gnRlDo9rjtAQ0hVk3qGcE4Y/Pvgo4Zgtg?= =?iso-8859-1?q?sNyeZGbvzFG7suTPU7+DZu9klt3BMW6pwH6vdwFc0p3mQNqzPOanvI2+T+5V?= =?iso-8859-1?q?6rbIHvvXe0p/X7Ci/zeFd2e3v5Jdhd6FQcCABzKGrBppD6Q24zCUzPcly+/7?= =?iso-8859-1?q?fp7RBYpyP5J3nFdLu8dxtGXqn6suXYYC1j2fr7YRBQR5cmFPMZK5M5f2rvVD?= =?iso-8859-1?q?JJshbe7Yeg2EQpwzh0d1JRJ3vGCWGhDC1r2yNA7VKq1wVGZgmCAToaP6V2G5?= =?iso-8859-1?q?DRu9NpexrvYh3jTMl9kFIqCoSTEW5I8sxYuOwx5Npirptb199kflvlfrvMVO?= =?iso-8859-1?q?rC734UP2YXXFvxE8HFZSgESzv0BeQOFDrF7OMSUM/49TBEHNvGBq4QgZPaV5?= =?iso-8859-1?q?B0vOslS+KqoNNMacdohrWa5I4cItQsLBPZuIcbbVpndUgtHIJGsEUOKSHSZ3?= =?iso-8859-1?q?xyU7z10fsEpM64i/ucPc7G8cucXxtOtNhFpr88B1tOZb1uJNNGlFRyx1Sbn9?= =?iso-8859-1?q?SBftEjxqP3vaxxtWbEJtmd1Bxsl9tMdo5aKHMwQ=3D=3D?= MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: a1ad0abb-2df3-4554-9942-08dd45236388 X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Feb 2025 13:54:04.8717 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: k+tkADKPEDqrKHTCczeJdCPj1Br4NdvXJjWe3ewV0hAK+JmX5ZzWyWfiNtDiose0XbKhLzQ0y8jENgR3IlZ+Aw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR03MB10120 From: Stewart Hildebrand Enable the use of IOMMU + PCI in dom0 without having to specify "pci-passthrough=yes". We rely on dom0 to initialize the PCI controller and perform a PHYSDEVOP_pci_device_add call to add each device to SMMU. Enable pci_init() for initializing Xen's internal PCI subsystem, and allow PHYSDEVOP_pci_device_add when pci-passthrough is disabled. is_pci_passthrough_enabled() is not an Arm-only construct, so remove the x86 definition of the function. Signed-off-by: Stewart Hildebrand Signed-off-by: Mykyta Poturai --- hmm. Since dec9e02f3190 ("xen: avoid generation of stub header") Should we also move is_pci_passthrough_enabled() back to xen/arch/arm/include/asm/pci.h ? Not sure if PPC/RISC-V will plan on using this check. v6->v7: * remove x86 definition of is_pci_passthrough_enabled() * update comments * make pci_physdev_op checks stricter v5->v6: * new patch - this effectively replaces ("Revert "xen/arm: Add cmdline boot option "pci-passthrough = """) --- xen/arch/arm/pci/pci.c | 5 +++-- xen/arch/x86/include/asm/pci.h | 6 ------ xen/drivers/pci/physdev.c | 4 ++-- 3 files changed, 5 insertions(+), 10 deletions(-) diff --git a/xen/arch/arm/pci/pci.c b/xen/arch/arm/pci/pci.c index 78b97beaef..f2281e81aa 100644 --- a/xen/arch/arm/pci/pci.c +++ b/xen/arch/arm/pci/pci.c @@ -16,6 +16,7 @@ #include #include #include +#include #include #include @@ -83,9 +84,9 @@ static int __init pci_init(void) { /* * Enable PCI passthrough when has been enabled explicitly - * (pci-passthrough=on). + * (pci-passthrough=on) or IOMMU is present and enabled. */ - if ( !pci_passthrough_enabled ) + if ( !is_pci_passthrough_enabled() && !iommu_enabled ) return 0; pci_segments_init(); diff --git a/xen/arch/x86/include/asm/pci.h b/xen/arch/x86/include/asm/pci.h index fd5480d67d..720fcc7f09 100644 --- a/xen/arch/x86/include/asm/pci.h +++ b/xen/arch/x86/include/asm/pci.h @@ -49,12 +49,6 @@ bool pci_ro_mmcfg_decode(unsigned long mfn, unsigned int *seg, extern int pci_mmcfg_config_num; extern struct acpi_mcfg_allocation *pci_mmcfg_config; -/* Unlike ARM, PCI passthrough is always enabled for x86. */ -static always_inline bool is_pci_passthrough_enabled(void) -{ - return true; -} - void arch_pci_init_pdev(struct pci_dev *pdev); static inline bool pci_check_bar(const struct pci_dev *pdev, diff --git a/xen/drivers/pci/physdev.c b/xen/drivers/pci/physdev.c index 0161a85e1e..d8a49cadf3 100644 --- a/xen/drivers/pci/physdev.c +++ b/xen/drivers/pci/physdev.c @@ -19,7 +19,7 @@ ret_t pci_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg) struct pci_dev_info pdev_info; nodeid_t node = NUMA_NO_NODE; - if ( !is_pci_passthrough_enabled() ) + if ( !is_pci_passthrough_enabled() && !iommu_enabled ) return -EOPNOTSUPP; ret = -EFAULT; @@ -57,7 +57,7 @@ ret_t pci_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg) case PHYSDEVOP_pci_device_remove: { struct physdev_pci_device dev; - if ( !is_pci_passthrough_enabled() ) + if ( !is_pci_passthrough_enabled() && !iommu_enabled ) return -EOPNOTSUPP; ret = -EFAULT; From patchwork Tue Feb 4 13:54:05 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mykyta Poturai X-Patchwork-Id: 13959286 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id EC280C02198 for ; Tue, 4 Feb 2025 13:54:24 +0000 (UTC) Received: from list by lists.xenproject.org with outflank-mailman.881488.1291700 (Exim 4.92) (envelope-from ) id 1tfJNZ-00017m-02; Tue, 04 Feb 2025 13:54:17 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 881488.1291700; Tue, 04 Feb 2025 13:54:16 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfJNY-00017F-Pd; Tue, 04 Feb 2025 13:54:16 +0000 Received: by outflank-mailman (input) for mailman id 881488; Tue, 04 Feb 2025 13:54:15 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tfJNX-0007bp-5n for xen-devel@lists.xenproject.org; Tue, 04 Feb 2025 13:54:15 +0000 Received: from EUR03-DBA-obe.outbound.protection.outlook.com (mail-dbaeur03on20630.outbound.protection.outlook.com [2a01:111:f403:260d::630]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 845d4309-e2ff-11ef-99a4-01e77a169b0f; Tue, 04 Feb 2025 14:54:13 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by AS8PR03MB10120.eurprd03.prod.outlook.com (2603:10a6:20b:57f::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8398.24; Tue, 4 Feb 2025 13:54:05 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971%7]) with mapi id 15.20.8398.021; Tue, 4 Feb 2025 13:54:05 +0000 X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 845d4309-e2ff-11ef-99a4-01e77a169b0f ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=UrbQioc10REbxMafjiGLMIMBB6LSnmbrkuatcmu+HXHRYIiUQR590uxMI0J5ABRI6XiVDVQa3S5TuWrSSD/mWWjRr608s0nRsu/5Sk1duVSEgEn0ObC9F/ZiBQh5ZFXe4h1i/DrU1GU/5Hfcsw+LM6Jv0K5bzrt7OyQzlhqdEKYvH06BOHvtfvY6RYpX9yBShzoCpFEaIkit+q+TLMuOVVXemBQaQsT+VNTIst/IOZBOSDEKP7k3bDys0tOPHdneFqp21Vs1cDMhLF5nekN7A62UmRaVO6xAkBhiIQOsOfSaEc87weROzXkd1WFfaEWX+wanS+0G+15LrgCk5RwFXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=rOv/bef5Zt0oQozTpFIdNHzB4w2PEWBoFld5FZnj5JM=; b=Mr4kUFb0vZSRaZX2Kw/LdyxbH0WvQLYhN8AoBhlqhq0fYkD6lh6boVHbvHIs6rH5Pz/xvPGKLkXofGIxKDPItgTwmzIhIQvoGNWUhLYyYaaN9E3gZUtZGoWFg1Wq/USx/uQHrMcVEEFG8YscOoANPEhKVafB6XDNHAnKd1h0+TX89mzEs0o3jAQOyeWw2M8C/QnsaJAGoWbtl09WLUrx12brCh9v83yo1OUEdzmrniKmYDdBZagSa7nUY0p4jfBCx2xFgMfUkH7pLTo2QD/ry6tz1SUrqX+FzoHYf0Kry0GrG4T4yz1ynodmSmTbE8/odYgtxetRzUgrhkMhwFYmAw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rOv/bef5Zt0oQozTpFIdNHzB4w2PEWBoFld5FZnj5JM=; b=C0I3VZoOIR2UHepz8TVJthwGpUQgJzPX1YlBBKxNWrlRQ0/D7mda7xAO+jXCdsK/QUDXF2/6ar2CRPBgRO6E8Q8DI2FJNOqB5c7TZAEfVNKs7wTfNbpFiBu9IPbjARKs6znGUbH6tT/T4acfIsAUG+VEU+Xhcth1OnbcA+JZsnhlR5iB2n01rFnyoUxb7cFB6qhcdhmhJQSAi2HlBku6RT36CJagROXZ/Ka0WMJLELG7tI9fUKTImnjIdzyGC+9qSZpxZRsKSdUS5mWsqwOBR8u5iAvo+WccpSb/014vGoFIXvkyNq129vLFZznjZICfKJm/K9ZPK4Rd9LKkVW2U6A== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Stewart Hildebrand , Rahul Singh , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk , Mykyta Poturai Subject: [PATCH v7 8/8] xen/arm: Map ITS doorbell register to IOMMU page tables Thread-Topic: [PATCH v7 8/8] xen/arm: Map ITS doorbell register to IOMMU page tables Thread-Index: AQHbdwxBkPL/bZ5O60y1uwygJe576g== Date: Tue, 4 Feb 2025 13:54:05 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|AS8PR03MB10120:EE_ x-ms-office365-filtering-correlation-id: 9ae0ff71-c690-4137-9f39-08dd452363aa x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|376014|366016|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?q?mkEP3Jel9qDBjM10UQsJwU2cTf?= =?iso-8859-1?q?PBbZl8c7KLDBOq5QBf0+QXi5g5WMVWPP2f25fF7cHCcYltv+n6cSDg6aPPf6?= =?iso-8859-1?q?dz3QI0saVUtBngeySh0+MyWWny+tEFb0mrKPRGJ3/ioWxIkzU61/p930nPto?= =?iso-8859-1?q?WNQ6agZrn7KxjgpDFl2AdtxBj8uFPHj6gyb6QODRGnDicqpdSL3PkGLLwvTX?= =?iso-8859-1?q?2EmsY+XaOx4kUQt1sIjyztVumtbxVCknnCAUey7QUlbGTPiewqsXBV6o1MDV?= =?iso-8859-1?q?8BA8LgCm0s46RdaQQ9sWc2w58cQBYGmn8bryC1+NorXW/gNYgpncfCjQ/w/d?= =?iso-8859-1?q?qqm8bkZqzkXZ84VjX7TrwdU3snECxn+VaCclVm1eIECuqd2HwqokCFmsi0Gx?= =?iso-8859-1?q?CGYNRP9zLZFAziE2dmFFvZxQRvrJsFyHbkHomyg7/DFDsFfMUok2nAb0a+2+?= =?iso-8859-1?q?3L/GsrpSiu30iP4OLDNRjBpYQ/lo9Gepfu0S3Zm4m0yffZcLssgh0zlZLFdE?= =?iso-8859-1?q?vY0eQC1fSG0+aIHh5VATePViq4fJwk0/pTz4Z2dx95FVsuJdgAlsju7O32kz?= =?iso-8859-1?q?h2wq6AhGJAu6/OaofergT9fVvhhZIIPzIq/Rli4J38/2j7UfTXqeGmyEA22b?= =?iso-8859-1?q?9p2GDqN5G0mOBW08Exxs+JbbbmUyDKNrpdPZFuRQem4cGCGJP//qWf80bFZA?= =?iso-8859-1?q?feylkdZRbHlt4GAyvIFggFFLSUVCPu4WO6XY0ST6hNB96SEA/OsBIqNe9zI8?= =?iso-8859-1?q?9+Y2ENIRnON+JD7xTOVhy+Pemfnr5LlfOPgA3rnrtqYrqceUv3NN3o6321Mx?= =?iso-8859-1?q?3skfi9T5iIcV3HOGkWtGCSV1wb9s/1wElQZwGFkTVFHixWBHs8k23CuTgXnm?= =?iso-8859-1?q?3gU+0xGuAGH8HSknEqbyYDAohWb0pyCbEVave344oAPcTtncs5Tx699kT5Vr?= =?iso-8859-1?q?q2X7EhiB46aWGYTc3uzWd6/OGabLQi3ZvGhGTEa0CeBWwww3HA+GFNKppH4B?= =?iso-8859-1?q?Y6Y0k8liz0c/g4fcDh4eitmzVnVJsWiZ7LFtvy9ySZdW5QHAK2dpXk5kf7No?= =?iso-8859-1?q?XMmO+Z1Y48pFocpLtdFM1kr1SZbwJLnIQZDKrY5IAK8s8p1635jyGuqAcPbY?= =?iso-8859-1?q?kW9iEnMT94JhkNWOUj9clI9CoTUxlvt8t+KOmGW+j8MvQvsoBKZhJjEfKLPb?= =?iso-8859-1?q?jJeoWgBteWAxJvcJ/H+Dm/cw5B8vp81p7EOux0y+YYa9lvoUXUGF3FZRCv5r?= =?iso-8859-1?q?QYw3kBfD4dKZvkDDin0+k/KDCWKFPacTRUDwXftljiJ9lWmf4RShpcvBvEkb?= =?iso-8859-1?q?/oYBxvLPEtQq7zqrjLLCmC/t2x8gkam+ul0MNrgaGAGHoQgQDzzE9opNjz7+?= =?iso-8859-1?q?wi1EAM4UI50tGXVESvWEX2mw5qhnQfdmUxuZ8sdxEnPE9F9AwCAoeS23uVyv?= =?iso-8859-1?q?pnwIsH+FFflhIzs0aLf53yxQ=3D=3D?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?q?WJALqx/B5yhM3Eor2VRKsPA?= =?iso-8859-1?q?ujeOki6CYDb+lam6F/EZ+hgccg7+sb31QGp4im5Uo5UsJ1NBSKtlah+wl/Ec?= =?iso-8859-1?q?YjVRHkYPWqmoF6jFF3hhOg8VP3wXcHBMj1lxhXGwDjC+pfQdPW6XI2yJgHEv?= =?iso-8859-1?q?IGVvO5+/pQjl5kXEe+dITYRRwgFHPGme/XhG6HZDgYZY31dM6B5LWXjfzJef?= =?iso-8859-1?q?JEHcF8yxybHLGp7gj84p1fBsfgaYcLx6lqXqonMCMfxZFuuhthTG6zn+eB3d?= =?iso-8859-1?q?H3r64IciSMIZoxISqXxPAjMWJ8xSZGt6DNIcGwnqICpsr+ScOCJrHipKAROI?= =?iso-8859-1?q?UWYKf8siGaRmzwgSPJO0cTSLJg9qLbCosFkmWjRnxqNwvEpZxRnAuIr4oDGX?= =?iso-8859-1?q?IZZaEAitoy/AHKosxW97WtlwAUfs35TC089CHIvhap1rhPPf0jDqzLV8AGpT?= =?iso-8859-1?q?OICQrxOavAN+AnUDPQnkvNRxqorqJrnT0kCEbjUMZOEI6jmazuHOXRu+XTVd?= =?iso-8859-1?q?pCDIrnRZ1krzzt9nODU4thmYVPZ8T0bpEIZ8eMXdE8m+9+Z1Wtw1twPQQFwa?= =?iso-8859-1?q?xLgtfQRRdLPz7Cip9jvlNTQ6WCMKt5UNllnVVH3s00v7uOCgILPxlHJi56fg?= =?iso-8859-1?q?c6IhSU7fEKb4h4TtW9SkdcxvXNPDoKtMsianXDQbNeTCAf/3kcEpOT+DAzm4?= =?iso-8859-1?q?d/bjxY2SvbEyx/nqIwJxK77YRvvzBdeuRps0iiwxMMLHYowfsPpEKK6Z5Mxi?= =?iso-8859-1?q?IBLONFk/tOuf/NmkZH4sj8+uD1OqJwOw+bmI9pDrShGcxxZEntG3qjPZdZA+?= =?iso-8859-1?q?R3NeXNCjAsvahaAOFFMl4U0NINsIDY/WffGn2YjGQkahstUsE1Yj7HKYOOfJ?= =?iso-8859-1?q?2oE/Cx5XEeXniK8NzOeSGTTdEU5vx8lE88+9VoWBKm+BRZWaey1NkO28Dik/?= =?iso-8859-1?q?MZzvFJ7NEr18OQzzqm3HjGhjfQzNYyPVoPuHdHGKoHWDp9bfVhBf+YLiwcOP?= =?iso-8859-1?q?I1MeLJcMJN6YzZvAR6D/G0/CcrtPezFcxUGtpuabq7eXxxXfn4OQr9qIrevZ?= =?iso-8859-1?q?rLYYM5b/s1u4trLQqO+D2UhFsLhpaq/fgcivw04H4nElaKqz6/jzEgJ50Vgb?= =?iso-8859-1?q?I6HRZb9tfIwLERYuvEodEehxD5BIPal6isOy7s+ByyAuO7R0txzG9PkXwy9/?= =?iso-8859-1?q?op1Vcx4TwXqBUoj63n6kiytRl4lfx5gfi4v3VbPdT8GzbHRj/Vbdkil5WpPZ?= =?iso-8859-1?q?+jrdjGxbFdmceNKVDGigmY1+oT7zlqFRaWKsDpdloUf43vem69HY7thOekAf?= =?iso-8859-1?q?8kH7NMPFdNpJSD0e1r662vSZABvWFPAEVt31mTCklBJtbPkFk0yHWgjGjwSK?= =?iso-8859-1?q?Q6hMDOJsiyLs7WH4EaVq5jJAFOxOGR4n5G6bB0pPL3MN/UxShyhuz8uZ4HFJ?= =?iso-8859-1?q?Z0aUvbnVprdS8uP4g4QWuofbNimtRfLD5a3cnRFeodA1ZyVVcfyZxt+yjtM8?= =?iso-8859-1?q?7wbxnf3rzzpRnX+cmdH6GDOw1s2UvbJvaDs0wYpNvbXV4PFMGZ+f10E8BD3W?= =?iso-8859-1?q?OrIa6noRt/faZhT4cgd4SEOHMTjKcIYkb/rTJSLZvWPliujUd+QRrxBYiFBM?= =?iso-8859-1?q?iIt/KSSYrjyiWvlPQ7ycAtiGTo2mEbsSAlvNvZA=3D=3D?= MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9ae0ff71-c690-4137-9f39-08dd452363aa X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Feb 2025 13:54:05.3010 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 0IruJEtzZ9AOpNgeFwa/cnLE1dP12vL5D4rrE/cn4AfwN1Wo4ejjmFW4ay3RzpxcsqlKdycYwmJ4d7IrRWmw2g== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR03MB10120 From: Rahul Singh When ITS is enabled and PCI devices that are behind an SMMU generate an MSI interrupt, SMMU fault will be observed as there is currently no mapping in p2m table for the ITS translation register (GITS_TRANSLATER). A mapping is required in the iommu page tables so that the device can generate the MSI interrupt writing to the GITS_TRANSLATER register. The GITS_TRANSLATER register is a 32-bit register, and there is nothing else in a page containing it, so map that page. Signed-off-by: Rahul Singh Signed-off-by: Stewart Hildebrand Signed-off-by: Mykyta Poturai --- This patch was originally picked up from [1], and commit description loosely borrowed from [2]. Example SMMUv3 fault (qemu-system-aarch64 virt model), ITS base 0x8080000: (XEN) SMMUv3: /smmuv3@9050000: event 0x10 received: (XEN) SMMUv3: /smmuv3@9050000: 0x0000000800000010 (XEN) SMMUv3: /smmuv3@9050000: 0x0000008000000000 (XEN) SMMUv3: /smmuv3@9050000: 0x0000000008090040 (XEN) SMMUv3: /smmuv3@9050000: 0x0000000000000000 Example SMMUv2 fault (AMD/Xilinx Versal), ITS base 0xf9020000: (XEN) smmu: /axi/smmu@fd800000: Unhandled context fault: fsr=0x402, iova=0xf9030040, fsynr=0x12, cb=0 v6->v7: * add tlb flush after mapping * style: update formatting * revert back to printk with XENLOG_G_ERR v5->v6: * switch to iommu_map() interface * fix page_count argument * style fixup * use gprintk instead of printk * add my Signed-off-by * move to vgic_v3_its_init_virtual() v4->v5: * new patch [1] https://lists.xenproject.org/archives/html/xen-devel/2023-07/msg00483.html [2] https://gitlab.com/xen-project/people/bmarquis/xen-arm-poc/-/commit/6232a0d53377009bb7fbc3c3ab81d0153734be6b --- xen/arch/arm/vgic-v3-its.c | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) diff --git a/xen/arch/arm/vgic-v3-its.c b/xen/arch/arm/vgic-v3-its.c index c65c1dbf52..376254f206 100644 --- a/xen/arch/arm/vgic-v3-its.c +++ b/xen/arch/arm/vgic-v3-its.c @@ -1478,6 +1478,26 @@ static int vgic_v3_its_init_virtual(struct domain *d, paddr_t guest_addr, register_mmio_handler(d, &vgic_its_mmio_handler, guest_addr, SZ_64K, its); + if ( is_iommu_enabled(its->d) ) + { + mfn_t mfn = maddr_to_mfn(its->doorbell_address); + unsigned int flush_flags = 0; + int ret = iommu_map(its->d, _dfn(mfn_x(mfn)), mfn, 1, IOMMUF_writable, + &flush_flags); + + if ( ret < 0 ) + { + printk(XENLOG_G_ERR + "GICv3: Map ITS translation register for %pd failed.\n", + its->d); + return ret; + } + + ret = iommu_iotlb_flush(its->d, _dfn(mfn_x(mfn)), 1, flush_flags); + if ( ret < 0 ) + return ret; + } + /* Register the virtual ITS to be able to clean it up later. */ list_add_tail(&its->vits_list, &d->arch.vgic.vits_list);