From nobody Sat May 4 09:03:23 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail(p=none dis=none) header.from=arm.com Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1639478771094526.4698599446707; Tue, 14 Dec 2021 02:46:11 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.246569.425218 (Exim 4.92) (envelope-from ) id 1mx5JQ-00054W-Vr; Tue, 14 Dec 2021 10:45:36 +0000 Received: by outflank-mailman (output) from mailman id 246569.425218; Tue, 14 Dec 2021 10:45:36 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1mx5JQ-00054P-Sf; Tue, 14 Dec 2021 10:45:36 +0000 Received: by outflank-mailman (input) for mailman id 246569; Tue, 14 Dec 2021 10:45:36 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1mx5JQ-00054J-0u for xen-devel@lists.xenproject.org; Tue, 14 Dec 2021 10:45:36 +0000 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by se1-gles-flk1.inumbo.com (Halon) with ESMTP id 1c62fad1-5cca-11ec-85d3-df6b77346a89; Tue, 14 Dec 2021 11:39:27 +0100 (CET) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 366146D; Tue, 14 Dec 2021 02:45:33 -0800 (PST) Received: from e109506.cambridge.arm.com (e109506.cambridge.arm.com [10.1.199.62]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 4E55C3F5A1; Tue, 14 Dec 2021 02:45:32 -0800 (PST) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 1c62fad1-5cca-11ec-85d3-df6b77346a89 From: Rahul Singh To: xen-devel@lists.xenproject.org Cc: bertrand.marquis@arm.com, rahul.singh@arm.com, Stefano Stabellini , Julien Grall , Volodymyr Babchuk Subject: [PATCH] xen/arm: vpci: Remove PCI I/O ranges property value Date: Tue, 14 Dec 2021 10:45:16 +0000 Message-Id: X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ZM-MESSAGEID: 1639478773048100001 Content-Type: text/plain; charset="utf-8" IO ports on ARM don't exist so all IO ports related hypercalls are going to fail on ARM when we passthrough a PCI device. Failure of xc_domain_ioport_permission(..) would turn into a critical failure at domain creation. We need to avoid this outcome, instead we want to continue with domain creation as normal even if xc_domain_ioport_permission(..) fails. XEN_DOMCTL_ioport_permission is not implemented on ARM so it would return -ENOSYS. To solve above issue remove PCI I/O ranges property value from dom0 device tree node so that dom0 linux will not allocate I/O space for PCI devices if pci-passthrough is enabled. Another valid reason to remove I/O ranges is that PCI I/O space are not mapped to dom0 when PCI passthrough is enabled, also there is no vpci trap handler register for IO bar. Signed-off-by: Rahul Singh --- xen/arch/arm/domain_build.c | 14 +++++++ xen/common/device_tree.c | 72 +++++++++++++++++++++++++++++++++++ xen/include/xen/device_tree.h | 10 +++++ 3 files changed, 96 insertions(+) diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c index d02bacbcd1..60f6b2c73b 100644 --- a/xen/arch/arm/domain_build.c +++ b/xen/arch/arm/domain_build.c @@ -749,6 +749,11 @@ static int __init write_properties(struct domain *d, s= truct kernel_info *kinfo, continue; } =20 + if ( is_pci_passthrough_enabled() && + dt_device_type_is_equal(node, "pci") ) + if ( dt_property_name_is_equal(prop, "ranges") ) + continue; + res =3D fdt_property(kinfo->fdt, prop->name, prop_data, prop_len); =20 if ( res ) @@ -769,6 +774,15 @@ static int __init write_properties(struct domain *d, s= truct kernel_info *kinfo, if ( res ) return res; } + + /* + * PCI IO bar are not mapped to dom0 when PCI passthrough is enabl= ed, + * also there is no trap handler registered for IO bar therefor re= move + * the IO range property from the device tree node for dom0. + */ + res =3D dt_pci_remove_io_ranges(kinfo->fdt, node); + if ( res ) + return res; } =20 /* diff --git a/xen/common/device_tree.c b/xen/common/device_tree.c index 4aae281e89..9fa25f6723 100644 --- a/xen/common/device_tree.c +++ b/xen/common/device_tree.c @@ -2195,6 +2195,78 @@ int dt_get_pci_domain_nr(struct dt_device_node *node) return (u16)domain; } =20 +int dt_pci_remove_io_ranges(void *fdt, const struct dt_device_node *dev) +{ + const struct dt_device_node *parent =3D NULL; + const struct dt_bus *bus, *pbus; + unsigned int rlen; + int na, ns, pna, pns, rone, ret; + const __be32 *ranges; + __be32 regs[((GUEST_ROOT_ADDRESS_CELLS * 2) + GUEST_ROOT_SIZE_CELLS + = 1) + * 2]; + __be32 *addr =3D ®s[0]; + + bus =3D dt_match_bus(dev); + if ( !bus ) + return 0; /* device is not a bus */ + + parent =3D dt_get_parent(dev); + if ( parent =3D=3D NULL ) + return -EINVAL; + + ranges =3D dt_get_property(dev, "ranges", &rlen); + if ( ranges =3D=3D NULL ) + { + printk(XENLOG_ERR "DT: no ranges; cannot enumerate %s\n", + dev->full_name); + return -EINVAL; + } + if ( rlen =3D=3D 0 ) /* Nothing to do */ + return 0; + + bus->count_cells(dev, &na, &ns); + if ( !DT_CHECK_COUNTS(na, ns) ) + { + printk(XENLOG_ERR "dt_parse: Bad cell count for device %s\n", + dev->full_name); + return -EINVAL; + } + pbus =3D dt_match_bus(parent); + if ( pbus =3D=3D NULL ) + { + printk("DT: %s is not a valid bus\n", parent->full_name); + return -EINVAL; + } + + pbus->count_cells(dev, &pna, &pns); + if ( !DT_CHECK_COUNTS(pna, pns) ) + { + printk(XENLOG_ERR "dt_parse: Bad cell count for parent %s\n", + dev->full_name); + return -EINVAL; + } + /* Now walk through the ranges */ + rlen /=3D 4; + rone =3D na + pna + ns; + + for ( ; rlen >=3D rone; rlen -=3D rone, ranges +=3D rone ) + { + unsigned int flags =3D bus->get_flags(ranges); + if ( flags & IORESOURCE_IO ) + continue; + + memcpy(addr, ranges, 4 * rone); + + addr +=3D rone; + } + + ret =3D fdt_property(fdt, "ranges", regs, sizeof(regs)); + if ( ret ) + return ret; + + return 0; +} + /* * Local variables: * mode: C diff --git a/xen/include/xen/device_tree.h b/xen/include/xen/device_tree.h index fd6cd00b43..ad2e905595 100644 --- a/xen/include/xen/device_tree.h +++ b/xen/include/xen/device_tree.h @@ -849,6 +849,16 @@ int dt_count_phandle_with_args(const struct dt_device_= node *np, */ int dt_get_pci_domain_nr(struct dt_device_node *node); =20 +/** + * dt_get_remove_io_range - Remove the PCI I/O range property value. + * @fdt: Pointer to the file descriptor tree. + * @node: Device tree node. + * + * This function will remove the PCI IO range property from the PCI device= tree + * node. + */ +int dt_pci_remove_io_ranges(void *fdt, const struct dt_device_node *node); + struct dt_device_node *dt_find_node_by_phandle(dt_phandle handle); =20 #ifdef CONFIG_DEVICE_TREE_DEBUG --=20 2.25.1