From nobody Sat Mar 15 14:18:13 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1741959315; cv=pass; d=zohomail.com; s=zohoarc; b=GNz6q7A7lfpS068UWNYjdABsk3erPAgPxJcGXj1xWioDdJ40NSyWaSDigvjcGtAdzvK/eYKSTTUeajYHBjLADOOTr9t7/KM/kWM6aMddmbYbaEHYNgLNgtI6XJndcN8jFUzIyBpTsZE+NxD95ctLcxAUP2d0SvXTHMxX25uA6hw= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1741959315; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=UiHfeCJsztnzol3w0nFYnZOBAO7JVtS2ELlpCTYYWPw=; b=BkFZ+WQ2wviS4z9gwV59/nSQUK+jkCAH4npB0BZ7ajlE78v0RwYf2vuQXG5GfZG6LuRwInhXZxELr3Kxn9W1WwGA8doX4ukdEZw0dbbEvKRZtL5nkUDziUnADUd7+L8vlI2UYyrivEQbXT8E8OoT4o4Xu2QTzH5tdhArl7CgrEg= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1741959315321849.7390008779083; Fri, 14 Mar 2025 06:35:15 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.914587.1320309 (Exim 4.92) (envelope-from ) id 1tt5Bg-0003hM-1A; Fri, 14 Mar 2025 13:34:56 +0000 Received: by outflank-mailman (output) from mailman id 914587.1320309; Fri, 14 Mar 2025 13:34:56 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tt5Bf-0003hD-Ua; Fri, 14 Mar 2025 13:34:55 +0000 Received: by outflank-mailman (input) for mailman id 914587; Fri, 14 Mar 2025 13:34:55 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tt5Bf-0003Jp-0g for xen-devel@lists.xenproject.org; Fri, 14 Mar 2025 13:34:55 +0000 Received: from DU2PR03CU002.outbound.protection.outlook.com (mail-northeuropeazlp170120003.outbound.protection.outlook.com [2a01:111:f403:c200::3]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 1c8d8179-00d9-11f0-9898-31a8f345e629; Fri, 14 Mar 2025 14:34:53 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by PAXPR03MB7950.eurprd03.prod.outlook.com (2603:10a6:102:219::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8534.28; Fri, 14 Mar 2025 13:34:50 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971%3]) with mapi id 15.20.8511.026; Fri, 14 Mar 2025 13:34:50 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 1c8d8179-00d9-11f0-9898-31a8f345e629 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=lUdF7+YpF/RQ7KsWE4XlRUkwa8jRxs/gm4aLTsZofwVnLynl+IDgTGZNRFj8wNPDL8LXuCTQsy5xdeHGDOz55eRvW0hkWKJREa0cWQzFExqM+FgAHYIuANgq2k0aE7HCv4AfoZjG4AozwVakuwPzhSIBibZ3mgck5q5E0SVD++AW37CuzpS2d1a39jF8BaYZU0BA6LJCSITpRgOKA6TG2pYKZULL8oXTeIY0zbgwe5Nxzhun8vHjSqtnZbG2b9WSwJURLW3F/pSiir3pzYqYdKT1SBSQmxXMnlHFgy2Sr3Ri7ojRUbhTQoScxdfLhVl9mMeAqr59uY9dthQ2TBoXmw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=UiHfeCJsztnzol3w0nFYnZOBAO7JVtS2ELlpCTYYWPw=; b=uyTk+ALrUZdqM+LlVgnLVcXuLQALqniCdfulKmvjTRWRKFjjBMhawZ8K89NxLXNqgTvUN44w4OGsCt0PV5L8aDVPFOwAhJuhGQgawxgYaz+KFYJZScN+d+B279QyyKyKVHOBu9P0UoOfrFq4bDvtVSXF7aroa5i1MlcxdRQk1NHXgg+tJ5Titf6Cb1whwYCuIQm31uOs6wuGgBEYVuogjvjZzVYKZ52Gt5qInjZoaYEuv+kX8oCLdKADZRnUzW2s1tAxSLpW0pe8sAHJYKzzWwkW8o4cvRCVnJyF3FE/VFMaarjPvU0ZuDKZYSo7Ge7ZNnmrIoPTYoJ4rS51vly+1Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UiHfeCJsztnzol3w0nFYnZOBAO7JVtS2ELlpCTYYWPw=; b=GkomC9US+rKuBNWHrCwFBiqYE6cZ12Rm9fMvKsZpyL/aOZcFsc/G+ZYuFcgiPJZUWAMMv3c9I6WjQ3UwBRFJ2TcWAIIvPFI4/LLyEMrEpYlCApm8v6a5/przFIU9opaSWf4MdvI04l51wDvSP0Y4QoCy6tNwZx/SgUh/Wy8zwbNdG+Ui/EaQ5OaXR/muGJSVwZjBrtQjWUK/D94oztU0pqauxqv1TRo0Ul6tj5o/8QAupMRFcOYKBoYTqPEDEBswDpNPi5FqKEHBMBv1HMaeO4fzM8GOQbi1Ktt8a8HQYZyK/mdbauVt/1kYeXc4bEpbATiJAgkOTTVgiwSdM5Iv0A== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Oleksandr Tyshchenko , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Stewart Hildebrand , Mykyta Poturai , Julien Grall Subject: [PATCH v9 1/8] iommu/arm: Add iommu_dt_xlate() Thread-Topic: [PATCH v9 1/8] iommu/arm: Add iommu_dt_xlate() Thread-Index: AQHblOXcMT5vj1FVrECA/jH3D/u0iw== Date: Fri, 14 Mar 2025 13:34:50 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|PAXPR03MB7950:EE_ x-ms-office365-filtering-correlation-id: 58bfbc27-e59c-4612-cff8-08dd62fcfec5 x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|1800799024|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?BFHhT2iyl5MsO3H5aWAvd/1EJfnumSP+9Rs3L6p8LEGLxLAOetq6cM9/+q?= =?iso-8859-1?Q?MpBpx3SVqK2a3VuCAkacwwUH4AGzJk0bpOmRjG459aSkPZQIPUKi7zrqLe?= =?iso-8859-1?Q?7DZZLeVYx1h598p29h/j1aDuM3ap1sM/+oxv6FUU9t5n+kq444kSFYfCfK?= =?iso-8859-1?Q?NPv5sBk513M/I5hdN7de2JHyhzkhdGf6JChXnwHYFE7FRhtZx6qjuNwakV?= =?iso-8859-1?Q?xXFb/F48xLxjVNkMcLy0ylP6yJ0a0YcjDz2V0oRhufwiCj4oZoONoTaVF1?= =?iso-8859-1?Q?aIVEsXpfnZvpWXACa3oyngsjUQW0KzlK2dHTjEVarjnV4JytoNh8ZqYiEM?= =?iso-8859-1?Q?XWHdNjARKQRYArmNYCHtEEXZSY4ey2RFOm/KHRsxee+jyyIuAJEOjznpHk?= =?iso-8859-1?Q?2vTXDVg7gRhir2GEmA/WhVwIgfmr5tyaYkBOacBV0JyDffboaWLdJuteJ8?= =?iso-8859-1?Q?tHaL0cmHHKlyYDVFDYGd9sdyBoAHYeG1zGSPXfpTza6U5fYdMSiiRunICQ?= =?iso-8859-1?Q?XwIUfri2r5Rg9xt4c6toakAlcidbRX0FN2nWQOo5wg6nHQi0pzydQyJ5dR?= =?iso-8859-1?Q?L+j2gdQiA88hNijpMuQ+x7n5wy3t0AC+SDYmLtJ2794+vhDCzc7KHR33dj?= =?iso-8859-1?Q?DSmCnJkKCxLGoOWb3eEsQpTcJd4ZNC1aSeUA2xt8IZ4exR3T5xY5D73MRn?= =?iso-8859-1?Q?dX/xEnYQM7BjS3OGiLTPH2pnlWuB6SMVpSWQS7htRkUgI8DZ20fY3YRWnF?= =?iso-8859-1?Q?x4rJMWnZ2h25Z9OOo/Ym25eJ4Ee6KX+3d6aL1BammAtGSA5G7bX8cyVm1i?= =?iso-8859-1?Q?ijNO+7Xj+/7jt3yfWRGPkVrM3+lfP9fThFPUPvXx/bs/OrglDvjRGrAuWh?= =?iso-8859-1?Q?XjrmBdfnTv4797WOfIKwdheEzyoQpTP1PDmfXt7j9ndxaLwUVnxONrVn11?= =?iso-8859-1?Q?UVc38+45fxdJgsHxKxmLWXjr1v3CMLwoAkvPYIT2e2u6otcq/AskMi+UnB?= =?iso-8859-1?Q?RetrJtkjhZ9uMoBry/dGbesQE0AqdIb19u9+w+cANhykdEGyiOK0+swHgL?= =?iso-8859-1?Q?sY8p77td4DG7U2ZQqCcMKIyBkiV9FmAxkAuFzxXwmgLrP416BDlPAVEj4K?= =?iso-8859-1?Q?YAOyzF0CF0OVVhnRY1tZdIRaZzHaRRtkMRDt7XOrIyiQ7LRb7dmHt/GErZ?= =?iso-8859-1?Q?YFFIJzpemh/lPcdSKLE7b2r8zOtRJiw7/3yj3dyMSQVMf/zuW3J/XdYP+y?= =?iso-8859-1?Q?gv7kLW/ehBLFhYIsP6aBiADY/o1FV4tqQCh/BuJKHfDdFmIvRDommUUFtr?= =?iso-8859-1?Q?TyhqK1iBcQgpL5etkQGG8EZU/8ep4pCJwVjDGyoy8xeE4JAf2i+eAa9f8W?= =?iso-8859-1?Q?EuAOn1Mo95+gmrUXJY7JqB6tmzx9kFZbJogXhddYbRzTvW5H17Odr7/u0F?= =?iso-8859-1?Q?3kHwCILYdd5YPFx34wKRuLPeSzifQm+yC8rJnj3Yfv4fMQ2K94srCiC+Sb?= =?iso-8859-1?Q?X/uN4mVsvMpA/EPeUIf2n4?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?IMqpYnrDuwaaC7OjwjJjrdin6EE/F+SOkuYEJdPOoXwsT2K0ZzttYAcoB4?= =?iso-8859-1?Q?xxGkJI4ZQXiAY3QV7arjsax/TcVy3qrauP956VE+2cdGs+qBtj27LTVSd0?= =?iso-8859-1?Q?M3w3eUKl2VikZ6LEKh49BzXmcAECZUPR17Z1lsJFQpGZN7V8649g3mTkKh?= =?iso-8859-1?Q?Stua7QX1woDK587837BvvwCt5Jdtt6CizuULDZjbAaInNwqey0kpxzKjnj?= =?iso-8859-1?Q?kfB9nkBFN4xBJ+bVXCFMe2FN2SMN232UaXPrO4FP0gw+UHjJ1yRQ9d6Gm4?= =?iso-8859-1?Q?1AKZsYOh19kpeDDd6/uSSHOIt7c4+D7hWAIFihP4sXr5rudP0CGODx19v0?= =?iso-8859-1?Q?/PH7yKBqKzqnfIDVB/GtFW1FdvLDf8Cuz8NTP/fUOuOmcyHIxLl61dwZ97?= =?iso-8859-1?Q?oYLHoNVaaXO5p7PBVvHCGcmnmcJXM5KXAkDYl1HBl+ZiieXAnJBh543nnG?= =?iso-8859-1?Q?2Vu0GpwPGIE37VZ3RHflIegEHjEHk0bXvNykeQivBhTLMLsm/mInqEYwnS?= =?iso-8859-1?Q?FTGrgzuMOfVbmfM2NHTCH4nFLPm4DLssd37XLo6z5h/6pIuJensn+XTY7J?= =?iso-8859-1?Q?ta2tq0GvwCRGctlZTuE6dIn0In5N/JUT+XOeQSxVonSYEAZOu6pktfYnt1?= =?iso-8859-1?Q?yPaU240vGSES8eN+RXGk01mZCkIV5PD+Q3ZILuV3GrTSAOJSX30/jiIe+W?= =?iso-8859-1?Q?K1SHJtQD8Nghe+6/ETR/nbEDHMmigpqNhZm6kPR9rWPqcHAFgIBNMjr7uK?= =?iso-8859-1?Q?j0PUO1ItwO9xO/QkAm14eZ4i7bhliAhEjmNPEDm/w0V5sHLEHpNERxwoYO?= =?iso-8859-1?Q?Knl0y4eX61HTl50mGogI14LywbUCiYyWx4xZBkGyxczLj3BcvPv44fv+cI?= =?iso-8859-1?Q?9YKHvqG8vHDlA23w3BBEDV4kR1+KEcWlaN1QKGtv+g5uBs1q81NrAg89/0?= =?iso-8859-1?Q?9N45JZtapIcTj7Ou2vCB0TWWRPR4PT9o2bjffMlxmm49Eghie45BjKMumH?= =?iso-8859-1?Q?caLm/zUydY2tDiiyLulsP1pohRWoszhAaSLTvVPZImQI7E4pHwHkcoyvGB?= =?iso-8859-1?Q?nbP7v9gZFgJoSzS849arzC6WjO47FKn0rAsDU5rfo1fBiHub/GAayoZY8A?= =?iso-8859-1?Q?mMp5Z140QVuqqba2z6Udgc14S0jl71TcAimktiN0n1S1Lc4AavtEXan9D8?= =?iso-8859-1?Q?lVOKkeSzcAo1gmCs6r3j5d7BpVFrK+wKb0W6eFwY6RAzq48RdlXRtuJ20Q?= =?iso-8859-1?Q?KvtcfO1tvOVXoj9MosrNTTkwn2zdtnjp039B5FuvT3gz+FmCRMPiieF0bs?= =?iso-8859-1?Q?vNBwjlRUmwzAe8VA6Akc7Rme342caVOBP68Xu1DgiCels/Bznx8k6+RWxE?= =?iso-8859-1?Q?CQP9lPOFK5W11ziFqTM5LHRGxX3yC44od0xqgpGxEF/l+Y6J6S043Oxabh?= =?iso-8859-1?Q?4VmZ0bXZN4S4OhwFyRX7/uLyUSXgoSROoEDYjZEhKYNq4aAqKqT16QKosq?= =?iso-8859-1?Q?hztl3n+FNBMDr7lP1Cx5u7QK1Sbo/bycLqPPKcF2hUtadHmH3v1YsT17FE?= =?iso-8859-1?Q?cfKPHrTA8TFBmoCcDtX1I/otMvmgCytB8/qpdqhCjJZkbZWuE+KQY/zLJg?= =?iso-8859-1?Q?4iyobU6Rhnq79AT9EZ+hYvpum3km7HTVREfNp66rx6yUgmxGE8cbbT8A?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 58bfbc27-e59c-4612-cff8-08dd62fcfec5 X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2025 13:34:50.1971 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: ngazcFMwdbPitJk7tcZusBCuR1nxm+NEKXIk+wUkxV+ugTHk0ud2qS0qYDyl+Gb3flF9ucqbcuhhvLrhIcY3sw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR03MB7950 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1741959316646019000 Content-Type: text/plain; charset="utf-8" From: Oleksandr Tyshchenko Move code for processing DT IOMMU specifier to a separate helper. This helper will be re-used for adding PCI devices by the subsequent patches as we will need exact the same actions for processing DT PCI-IOMMU specifier. Signed-off-by: Oleksandr Tyshchenko Signed-off-by: Stewart Hildebrand Signed-off-by: Mykyta Poturai Reviewed-by: Julien Grall --- v8->v9: * remove DT_NO_IOMMU v7->v8: * explain NO_IOMMU better and rename to DT_NO_IOMMU v6->v7: * explained NO_IOMMU in comments v5->v6: * pass ops parameter to iommu_dt_xlate() * add Julien's R-b v4->v5: * rebase on top of "dynamic node programming using overlay dtbo" series * move #define NO_IOMMU 1 to header * s/these/this/ inside comment v3->v4: * make dt_phandle_args *iommu_spec const * move !ops->add_device check to helper v2->v3: * no change v1->v2: * no change downstream->v1: * trivial rebase * s/dt_iommu_xlate/iommu_dt_xlate/ (cherry picked from commit c26bab0415ca303df86aba1d06ef8edc713734d3 from the downstream branch poc/pci-passthrough from https://gitlab.com/xen-project/people/bmarquis/xen-arm-poc.git) --- xen/drivers/passthrough/device_tree.c | 42 +++++++++++++++++---------- 1 file changed, 27 insertions(+), 15 deletions(-) diff --git a/xen/drivers/passthrough/device_tree.c b/xen/drivers/passthroug= h/device_tree.c index 075fb25a37..4a1971c3fc 100644 --- a/xen/drivers/passthrough/device_tree.c +++ b/xen/drivers/passthrough/device_tree.c @@ -137,6 +137,30 @@ int iommu_release_dt_devices(struct domain *d) return 0; } =20 +static int iommu_dt_xlate(struct device *dev, + const struct dt_phandle_args *iommu_spec, + const struct iommu_ops *ops) +{ + int rc; + + if ( !ops->dt_xlate ) + return -EINVAL; + + if ( !dt_device_is_available(iommu_spec->np) ) + return 1; + + rc =3D iommu_fwspec_init(dev, &iommu_spec->np->dev); + if ( rc ) + return rc; + + /* + * Provide DT IOMMU specifier which describes the IOMMU master + * interfaces of that device (device IDs, etc) to the driver. + * The driver is responsible to decide how to interpret them. + */ + return ops->dt_xlate(dev, iommu_spec); +} + int iommu_remove_dt_device(struct dt_device_node *np) { const struct iommu_ops *ops =3D iommu_get_ops(); @@ -215,27 +239,15 @@ int iommu_add_dt_device(struct dt_device_node *np) { /* * The driver which supports generic IOMMU DT bindings must have - * these callback implemented. + * this callback implemented. */ - if ( !ops->add_device || !ops->dt_xlate ) + if ( !ops->add_device ) { rc =3D -EINVAL; goto fail; } =20 - if ( !dt_device_is_available(iommu_spec.np) ) - break; - - rc =3D iommu_fwspec_init(dev, &iommu_spec.np->dev); - if ( rc ) - break; - - /* - * Provide DT IOMMU specifier which describes the IOMMU master - * interfaces of that device (device IDs, etc) to the driver. - * The driver is responsible to decide how to interpret them. - */ - rc =3D ops->dt_xlate(dev, &iommu_spec); + rc =3D iommu_dt_xlate(dev, &iommu_spec, ops); if ( rc ) break; =20 --=20 2.34.1 From nobody Sat Mar 15 14:18:13 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1741959320; cv=pass; d=zohomail.com; s=zohoarc; b=UnQqfrEdCRY+jZ8tH4Cv6HRfZmQbZoUjmB4D92dCaPL8LveSVZetzUC85EwYdWfX4h5po8lovJTxTa8NihIQUcDIQ+nlnxqagaDy6jfG6ZvQaBVZtwg5Vg5IxCxT1wiHuSVS8di/4ziYvDRj+8VpXzyAQbgB3cVbHwql/BgXTKY= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1741959320; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=PUsxee2lGto+cKUU/E4hlWyJiIj2nzbj+aTUKYVDphk=; b=kn0dyAK7vffNWQZafmYu6vVKtbqcaNe2/2nP8kOLDe2jYs7/BTwC/Is7xxQDKIIDWQQm+3xoQOnziZmi7ZLFVJPcnA30fsEiQJZaLj9NKaDh4rkrjw7YETZDQHKTitipZV/S+FHvr9VRHeEM4YVInDhjhadqFtyiaN8MDX+lyis= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1741959320400561.2825202721128; Fri, 14 Mar 2025 06:35:20 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.914589.1320324 (Exim 4.92) (envelope-from ) id 1tt5Bi-00043c-Ke; Fri, 14 Mar 2025 13:34:58 +0000 Received: by outflank-mailman (output) from mailman id 914589.1320324; Fri, 14 Mar 2025 13:34:58 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tt5Bi-00042z-EV; Fri, 14 Mar 2025 13:34:58 +0000 Received: by outflank-mailman (input) for mailman id 914589; Fri, 14 Mar 2025 13:34:57 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tt5Bg-0003qF-T1 for xen-devel@lists.xenproject.org; Fri, 14 Mar 2025 13:34:57 +0000 Received: from DB3PR0202CU003.outbound.protection.outlook.com (mail-northeuropeazlp170110001.outbound.protection.outlook.com [2a01:111:f403:c200::1]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 1d65c6c7-00d9-11f0-9ab9-95dc52dad729; Fri, 14 Mar 2025 14:34:55 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by PAXPR03MB7950.eurprd03.prod.outlook.com (2603:10a6:102:219::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8534.28; Fri, 14 Mar 2025 13:34:50 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971%3]) with mapi id 15.20.8511.026; Fri, 14 Mar 2025 13:34:50 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 1d65c6c7-00d9-11f0-9ab9-95dc52dad729 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=A1FSVEcjaVtisi0GGaIOqLmM+KnFLh7DlBWt/TNRjj0DwsDG3L5wDOcrs0wfBY1iftutm/9ZIFVrZmHRJ/fq5/FqAZb4N9cSofAZyCvepUsl2J7S0AWXwcMmxObfE9j7+4qRFzfOUSjsR/UqakoOfX2Q8rXZBVp2bGH1XmQbCYtpgmfcIs4uxt5mTQcRTxuzDvUWFOMlO82M6eZz1Gap1GVZjx4fEeg6EyaZvmAIMeJl4EgmKYrF/pUuyNkTP+euJ+nO5FD2uaBUNIFlzEXs0zvG/780rmJzngzm8/KZcVEwiLg2dxLrDiKChdEAcYT7PIAao1h0XoTYUU6BOzy3gQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=PUsxee2lGto+cKUU/E4hlWyJiIj2nzbj+aTUKYVDphk=; b=CyhZtb8RHEubR5I76lAApHgOtckl5AEO1q0i33pnQYxu3TCSiAYmJ3ajvqruAc8F5IMjxFGUu8AE9HaTm5bZQluYKygd828rugeNr5TwM0EUBcTwV9WWPN2wrEnt3AsgoBT4dsSwsfk+3eYJ1Dodp0THmwd7iNHR+DkGlpPDCmzU8ukkItd4uYnXanudMKHMGZyjKv0R9tphjoNhQAI54YsF3kMOiSWCGlm1JibcESzTi1E7ssMKdfeskU3B05H39DoT7xYPP+tW2jy10A7hVyW+As2LCoJI71mDTtA1fK6w7exhkGITnKl+WqIgSA7SIdqO+ohE/FgugXRieeYyNg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=PUsxee2lGto+cKUU/E4hlWyJiIj2nzbj+aTUKYVDphk=; b=uLUoa+RBL4ujinaNIScyxaVb7OsbTTomr3Gfw8ndm9Pw+Ow6uTNTksU8DX6YjksQl1sOkyZ6P5yY8Fg5I2mqAeYs1JBqBaq2tNrILEr85WCoy8t6PAWGO9rutl9JJT1s64375brhI+8OqzfiCrSZBtQPO647XAiCeWkN/taOIoneEyUnYuxh/D253Lu2GnQuxsfpOhoPKC1+aGaBiRjhqtX0CESNmsQYMipWtkVFJTJMMG0WBCQsnUDQ7S+/1PLliRGCiXeqHAeSPqFuF4rrY1wcCHZv3fgM4ihKRdfaFeV9eCqsfvtnbGNDFh/NAuwfy3daRe1NwR109taXx7UbjQ== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Oleksandr Tyshchenko , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Jan Beulich , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Stewart Hildebrand , Mykyta Poturai Subject: [PATCH v9 2/8] iommu/arm: Introduce iommu_add_dt_pci_sideband_ids API Thread-Topic: [PATCH v9 2/8] iommu/arm: Introduce iommu_add_dt_pci_sideband_ids API Thread-Index: AQHblOXcI08sNdwZJ0ah+pJJkNPOtA== Date: Fri, 14 Mar 2025 13:34:50 +0000 Message-ID: <95d779f00127defa37f3c5056c762ea0da47fc53.1741958647.git.mykyta_poturai@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|PAXPR03MB7950:EE_ x-ms-office365-filtering-correlation-id: 9959f410-01e1-43d2-7612-08dd62fcff08 x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|1800799024|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?ipgzzjd8il8SYMCvX8cSQiWaizO9PMda5qrn16cCfNKP4wryiCLU7MPItT?= =?iso-8859-1?Q?qYuYtr9nH1jAXUxDCp+L/N9Bx4cK0GaPmq3BAWTwxEHyCvKcbAXlNYCfu6?= =?iso-8859-1?Q?jKdiBJ1HBLadDn2Q9ibyu2ugyWr0Rr5hTXariHumrjjlNGlQZkkJexkMnX?= =?iso-8859-1?Q?eV6Z/izmNkf8WzKUEDBLMkUfzZWNt4RNV1dCDrjH/0FPqNekkCU0alZTR9?= =?iso-8859-1?Q?VPkdRhZhrAXJ7ktOAP6MS97vnsSXy8wFf2diTcAyWqQygY5q2ww/yLsrUA?= =?iso-8859-1?Q?NrtfR8FvxDomrcBusqrSMz3uDp2pEJxxVM7xFL6xtpV062jeHXhzJYqSGE?= =?iso-8859-1?Q?7EtTaq4CmbIPC7wku7FnSgK/nUbzEJpkSUCUDczutppHgNa0eU0M8DF/wY?= =?iso-8859-1?Q?in2IyhvEntjIUFozrzrK5vAKbAg1v8E+rHZ1su16FfQv3PV0XM8AMPdkLn?= =?iso-8859-1?Q?SS0cIe5bdhiOSNs7LB/wPa3sRRlD3zuWBBFKBdHwN+fLENpprkOY7wdy6H?= =?iso-8859-1?Q?SI5SZF78yp9vInrsHPg9s7wwVqZqLJTi5tdSWYE0GyP33BN0qbb0JOfPD1?= =?iso-8859-1?Q?aIOKVBWWdoaVoMRR02F0oVRKS81QxM/7S3VpMiBAKQ30eEGzJp1KHKamzC?= =?iso-8859-1?Q?uSAd9P3NVmN7za7ijW6pKr1AIa0mR71R/vLDNC+ZqGYHtEaBCPPj6W7XoL?= =?iso-8859-1?Q?pVkQzADgquo5HvdX1NggBbNxRugWC2nTAgx7gYfoIKBZq/OpkDgBbHA8V3?= =?iso-8859-1?Q?eTlkV9NshufmGhSRQivf0tulmIZV2CBeIq9oMBrvTDVyMbRMeK+CQu36E+?= =?iso-8859-1?Q?DlnYa/7AEmabjCzTG7uCGBfXs0GykzCWMKCkHuiZ3rOkNl5cz1/1t+IjMV?= =?iso-8859-1?Q?IyB2GXP7+Gk9ZISJStR0xHxiMZFnnOEd/Kt0uXSZ9DqxQPdcz3ShAw7vtb?= =?iso-8859-1?Q?EyCT9WaXlwVyKUrUGwBZBs0XnH5vubnpd6b3sJu4y/aqMuOlv0LOpeLVQq?= =?iso-8859-1?Q?yEKcc/5gCAvNoCKBe5f7alxGCEMRyJSj/QvnHwDSXntr2xALzw7HgDgcUN?= =?iso-8859-1?Q?+Fx/dyzV8d5yZbK9ORK72CXjf798t+8wvLkrm0Gg06mvMqWQNLGvz0qFT7?= =?iso-8859-1?Q?CU0ZxqhXiJww/go1fsYqin4l8b+hCISVDRASd28nsCXgj9WYiQkloRtAa1?= =?iso-8859-1?Q?hepBFVOENtv+FW79QnMf5JLkIGdHt4h3Kgho9pnbX/1L8sK3V+TTo3lb3f?= =?iso-8859-1?Q?1vVWJkfbRXukuqeXAGRkKEe3GCWMpPdGGNzZaUnOrPv1UL3SQlS7Xdiw9O?= =?iso-8859-1?Q?5TrHMmf1RbNzrCevf1evSAOUz7F5Ay0+AncpyLe+KRLnmX6d1xqYOPIkPv?= =?iso-8859-1?Q?CsSrCaDC/NxMJ1Eq98PMh4TlLp3jIDPAt2VJNIOhCHe/bdQuicLPbV2rBm?= =?iso-8859-1?Q?lMQf7hqEnKDHhin9gDqL/jyvvaykUWRYilXgKDDF2mjy8PMlNtxtXRgTyI?= =?iso-8859-1?Q?O7DTZnBmbw/1alTLSIk5TZ?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?SngHlYyFkqnZdoqILSU5hWXM1VkF1ysgBL9i+oka1WxH6/Wmox6WL3n69A?= =?iso-8859-1?Q?L3yqgKnBIkkqvLGMjxtbRfRbz7bPrUCxo6evK/rFkpPS5ybRmomZ5BrnES?= =?iso-8859-1?Q?URx7Vuf1t49+YlbOqm4RdsDAlc7nAZeKeDx6WXrMbw9RgxfNIy/Q/o/KyY?= =?iso-8859-1?Q?Q4gDBVAHCANeuyx7psg8GnE1+mJJ6jNjlh4Zlk9goVL77MSeTLbRSLkMM0?= =?iso-8859-1?Q?TM13m+JN28xet5C65kQIHzE7d/cSEyxtHdIDig3Ex8RlXyf4s798eZxaOv?= =?iso-8859-1?Q?8NbDcrRjZDtQ/pqcb/C1Nh6FRNZn2YduFsbb6RS/NyH/lYMvSOKKAMdPhY?= =?iso-8859-1?Q?UfiQDXo9AJnVF4sQYN7pu6BXJFg8eKVA44QM3+i9L4nuuTtbDdLN+/T06k?= =?iso-8859-1?Q?CziNo+19jwYDzjBPk8idof6LNNDBLLG7fjzzAenvyOgAx4RfwHkHq1x9i5?= =?iso-8859-1?Q?VozTimszI9nLS2HjUJUTPENzTfTmTqxWil3ODZgKEimxNyWLxWkvLxB7OM?= =?iso-8859-1?Q?iX8siVBT2hMD8zl3MGu1auNqH28pbT5q3gYOcT00UYagJykzDsxbZ7peti?= =?iso-8859-1?Q?wxBdyARYln6QfNDZax477i8fXTxjxlw8tRh5gyf2NV4nnfuo4wqaFl4ZPQ?= =?iso-8859-1?Q?suVF+3hMYjP/MwI2pqKcfwrqsAUVOmy/qIg2VKwVBe2a8xpnTiSJpkyy2S?= =?iso-8859-1?Q?LIkbFUUgBUav027FsVRcobGa7uHc56LHTrgh05Ht0aWS7jxrrX63HAlcLF?= =?iso-8859-1?Q?GuF+xS8bgh4qRdcevINLjAj0qWIV0aAN3pyytsfszoHdM9ndfbWLqTqBPu?= =?iso-8859-1?Q?9ELngf45hvI/i2A/Sts7wqeSUDAUVbrLKuQ+K7HJ2Yf/HnBIYIgYc6ZRa4?= =?iso-8859-1?Q?mHXpqMnlJ/2jwK9Qqpf7G4o7o0st95AwfV912MIbHsqti55uwrp2OxJO/z?= =?iso-8859-1?Q?3pwSrLIxWYQ/GUwA6KdLwS6vp1nPWXLcYMQf6mV9PApeIjaNswAYoHZo9j?= =?iso-8859-1?Q?AbcFH6XX+BpaQHdaNuqFI8CuT1j2Yve5WBJiwqMLaSUUY+7HK9H93OdYVW?= =?iso-8859-1?Q?YpJOAgDYUh5T57bpwW9YkatCkeefsVD95nKCKdxgOSV16ryMxZSeRS+XR7?= =?iso-8859-1?Q?IT/XFNegvOc4l1lsHvArN0dFLqCPBB6NPrUvq/hUyz61TUSWDBaMmdOx4X?= =?iso-8859-1?Q?BQMisYy4fLQ9I5AXcB+5qEcF3ArlCux3XnNy1FN0jZSKpBBbzNPjJFN4Ug?= =?iso-8859-1?Q?pbGfnb+PomQXHseR81KX0szmLjkuHB7NfHqemSeYsar1AXcdofv3abjFSj?= =?iso-8859-1?Q?jmIqoS4+HZlCGGHhMd68DKg9DX+baCccYVrlcRVj/1SC5zAAHXaUhbydbw?= =?iso-8859-1?Q?qxa4ELkzznmlNf3GDto8mXQh2hnAg2DChfjxxzkSBeKoIVq1M7M/z8isQC?= =?iso-8859-1?Q?HxPecbAH4pW865dauJ8N2F8sjV5OHp22ByO9p5rNRPJpsbIgTvU73HglgM?= =?iso-8859-1?Q?GtBw4OhzTPnWHFY9YXTy1SUBu/hxmDWFYdbOf37VKujUWAKVYJetK9XkJE?= =?iso-8859-1?Q?hHG4C/lr1PiNNf4RKRSEbURfSa9giXrOP5LEUU+RHGX2Rq6kuqtrUU1giU?= =?iso-8859-1?Q?Vn11F47lbXGNrRfAi+/zDqYyHm9lbKcUoIYotWnxDlJST7H7bFZx/Elg?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9959f410-01e1-43d2-7612-08dd62fcff08 X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2025 13:34:50.6048 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: z0LBuDDp2ZQjQD4Vg23xrZ4s5otsDTd78ghvLS7hA/uLI8zuH3UEV0TT6G3qR2239uFn2MjNRwc/M/CKSXkUSA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR03MB7950 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1741959322766019100 Content-Type: text/plain; charset="utf-8" From: Oleksandr Tyshchenko The main purpose of this patch is to add a way to register PCI device (which is behind the IOMMU) using the generic PCI-IOMMU DT bindings [1] before assigning that device to a domain. This behaves similarly to the existing iommu_add_dt_device API, except it handles PCI devices, and it is to be invoked from the add_device hook in the SMMU driver. The function dt_map_id to translate an ID through a downstream mapping (which is also suitable for mapping Requester ID) was borrowed from Linux (v5.10-rc6) and updated according to the Xen code base. [1] https://www.kernel.org/doc/Documentation/devicetree/bindings/pci/pci-io= mmu.txt Signed-off-by: Oleksandr Tyshchenko Signed-off-by: Stewart Hildebrand Signed-off-by: Mykyta Poturai --- Regarding pci_for_each_dma_alias question: getting host bridge node directly seems like a simpler solution with the same result. AFAIU with pci_for_each_dma_alias in linux we would arrive to the host brige node anyway, but also try to call dt_map_id for each device along the way. I am not sure why exactly it is done this way in linux, as according to the pci-iommu.txt, iommu-map node can only be present in the PCI root. v8->v9: * replace DT_NO_IOMMU with 1 * guard iommu_add_pci_sideband_ids with CONFIG_ARM v7->v8: * ENOSYS->EOPNOTSUPP * move iommu_add_pci_sideband_ids to iommu.c to fix x86 build * simplify iommu_add_pci_sideband_ids * add docstrings to iommu_add_{dt_}pci_sideband_ids v6->v7: * put iommu_add_pci_sideband_ids under ifdef * remove ifdef CONFIG_APCI * style: add newline for symmetry v5->v6: * pass ops to iommu_dt_xlate() v4->v5: * style: add newlines after variable declarations and before return in iomm= u.h * drop device_is_protected() check in iommu_add_dt_pci_sideband_ids() * rebase on top of ("dynamic node programming using overlay dtbo") series * fix typo in commit message * remove #ifdef around dt_map_id() prototype * move dt_map_id() to xen/common/device_tree.c * add function name in error prints * use dprintk for debug prints * use GENMASK and #include * fix typo in comment * remove unnecessary (int) cast in loop condition * assign *id_out and return success in case of no translation in dt_map_id() * don't initialize local variable unnecessarily * return error in case of ACPI/no DT in iommu_add_{dt_}pci_sideband_ids() v3->v4: * wrap #include and if ( acpi_disabled ) in #ifdef CONFIG_ACPI * fix Michal's remarks about style, parenthesis, and print formats * remove !ops->dt_xlate check since it is already in iommu_dt_xlate helper * rename s/iommu_dt_pci_map_id/dt_map_id/ because it is generic, not specif= ic to iommu * update commit description v2->v3: * new patch title (was: iommu/arm: Introduce iommu_add_dt_pci_device API) * renamed function from: iommu_add_dt_pci_device to: iommu_add_dt_pci_sideband_ids * removed stale ops->add_device check * iommu.h: add empty stub iommu_add_dt_pci_sideband_ids for !HAS_DEVICE_TREE * iommu.h: add iommu_add_pci_sideband_ids helper * iommu.h: don't wrap prototype in #ifdef CONFIG_HAS_PCI * s/iommu_fwspec_free(pci_to_dev(pdev))/iommu_fwspec_free(dev)/ v1->v2: * remove extra devfn parameter since pdev fully describes the device * remove ops->add_device() call from iommu_add_dt_pci_device(). Instead, re= ly on the existing iommu call in iommu_add_device(). * move the ops->add_device and ops->dt_xlate checks earlier downstream->v1: * rebase * add const qualifier to struct dt_device_node *np arg in dt_map_id() * add const qualifier to struct dt_device_node *np declaration in iommu_add= _pci_device() * use stdint.h types instead of u8/u32/etc... * rename functions: s/dt_iommu_xlate/iommu_dt_xlate/ s/dt_map_id/iommu_dt_pci_map_id/ s/iommu_add_pci_device/iommu_add_dt_pci_device/ * add device_is_protected check in iommu_add_dt_pci_device * wrap prototypes in CONFIG_HAS_PCI (cherry picked from commit 734e3bf6ee77e7947667ab8fa96c25b349c2e1da from the downstream branch poc/pci-passthrough from https://gitlab.com/xen-project/people/bmarquis/xen-arm-poc.git) --- xen/common/device-tree/device-tree.c | 91 +++++++++++++++++++++++++++ xen/drivers/passthrough/device_tree.c | 42 +++++++++++++ xen/drivers/passthrough/iommu.c | 15 +++++ xen/include/xen/device_tree.h | 23 +++++++ xen/include/xen/iommu.h | 40 +++++++++++- 5 files changed, 210 insertions(+), 1 deletion(-) diff --git a/xen/common/device-tree/device-tree.c b/xen/common/device-tree/= device-tree.c index d0528c5825..3de7858df6 100644 --- a/xen/common/device-tree/device-tree.c +++ b/xen/common/device-tree/device-tree.c @@ -10,6 +10,7 @@ * published by the Free Software Foundation. */ =20 +#include #include #include #include @@ -2243,6 +2244,96 @@ int dt_get_pci_domain_nr(struct dt_device_node *node) return (u16)domain; } =20 +int dt_map_id(const struct dt_device_node *np, uint32_t id, + const char *map_name, const char *map_mask_name, + struct dt_device_node **target, uint32_t *id_out) +{ + uint32_t map_mask, masked_id, map_len; + const __be32 *map =3D NULL; + + if ( !np || !map_name || (!target && !id_out) ) + return -EINVAL; + + map =3D dt_get_property(np, map_name, &map_len); + if ( !map ) + { + if ( target ) + return -ENODEV; + + /* Otherwise, no map implies no translation */ + *id_out =3D id; + return 0; + } + + if ( !map_len || (map_len % (4 * sizeof(*map))) ) + { + printk(XENLOG_ERR "%s(): %s: Error: Bad %s length: %u\n", __func__, + np->full_name, map_name, map_len); + return -EINVAL; + } + + /* The default is to select all bits. */ + map_mask =3D GENMASK(31, 0); + + /* + * Can be overridden by "{iommu,msi}-map-mask" property. + * If dt_property_read_u32() fails, the default is used. + */ + if ( map_mask_name ) + dt_property_read_u32(np, map_mask_name, &map_mask); + + masked_id =3D map_mask & id; + for ( ; map_len > 0; map_len -=3D 4 * sizeof(*map), map +=3D 4 ) + { + struct dt_device_node *phandle_node; + uint32_t id_base =3D be32_to_cpup(map + 0); + uint32_t phandle =3D be32_to_cpup(map + 1); + uint32_t out_base =3D be32_to_cpup(map + 2); + uint32_t id_len =3D be32_to_cpup(map + 3); + + if ( id_base & ~map_mask ) + { + printk(XENLOG_ERR "%s(): %s: Invalid %s translation - %s-mask = (0x%"PRIx32") ignores id-base (0x%"PRIx32")\n", + __func__, np->full_name, map_name, map_name, map_mask, + id_base); + return -EFAULT; + } + + if ( (masked_id < id_base) || (masked_id >=3D (id_base + id_len)) ) + continue; + + phandle_node =3D dt_find_node_by_phandle(phandle); + if ( !phandle_node ) + return -ENODEV; + + if ( target ) + { + if ( !*target ) + *target =3D phandle_node; + + if ( *target !=3D phandle_node ) + continue; + } + + if ( id_out ) + *id_out =3D masked_id - id_base + out_base; + + dprintk(XENLOG_DEBUG, "%s: %s, using mask %08"PRIx32", id-base: %0= 8"PRIx32", out-base: %08"PRIx32", length: %08"PRIx32", id: %08"PRIx32" -> %= 08"PRIx32"\n", + np->full_name, map_name, map_mask, id_base, out_base, id_le= n, id, + masked_id - id_base + out_base); + return 0; + } + + dprintk(XENLOG_DEBUG, "%s: no %s translation for id 0x%"PRIx32" on %s\= n", + np->full_name, map_name, id, + (target && *target) ? (*target)->full_name : NULL); + + if ( id_out ) + *id_out =3D id; + + return 0; +} + /* * Local variables: * mode: C diff --git a/xen/drivers/passthrough/device_tree.c b/xen/drivers/passthroug= h/device_tree.c index 4a1971c3fc..37e1437b65 100644 --- a/xen/drivers/passthrough/device_tree.c +++ b/xen/drivers/passthrough/device_tree.c @@ -161,6 +161,48 @@ static int iommu_dt_xlate(struct device *dev, return ops->dt_xlate(dev, iommu_spec); } =20 +#ifdef CONFIG_HAS_PCI +int iommu_add_dt_pci_sideband_ids(struct pci_dev *pdev) +{ + const struct iommu_ops *ops =3D iommu_get_ops(); + struct dt_phandle_args iommu_spec =3D { .args_count =3D 1 }; + struct device *dev =3D pci_to_dev(pdev); + const struct dt_device_node *np; + int rc; + + if ( !iommu_enabled ) + return 1; + + if ( !ops ) + return -EINVAL; + + if ( dev_iommu_fwspec_get(dev) ) + return -EEXIST; + + np =3D pci_find_host_bridge_node(pdev); + if ( !np ) + return -ENODEV; + + /* + * According to the Documentation/devicetree/bindings/pci/pci-iommu.txt + * from Linux. + */ + rc =3D dt_map_id(np, PCI_BDF(pdev->bus, pdev->devfn), "iommu-map", + "iommu-map-mask", &iommu_spec.np, iommu_spec.args); + if ( rc ) + return (rc =3D=3D -ENODEV) ? 1 : rc; + + rc =3D iommu_dt_xlate(dev, &iommu_spec, ops); + if ( rc < 0 ) + { + iommu_fwspec_free(dev); + return -EINVAL; + } + + return rc; +} +#endif /* CONFIG_HAS_PCI */ + int iommu_remove_dt_device(struct dt_device_node *np) { const struct iommu_ops *ops =3D iommu_get_ops(); diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iomm= u.c index 9e74a1fc72..dfaca67302 100644 --- a/xen/drivers/passthrough/iommu.c +++ b/xen/drivers/passthrough/iommu.c @@ -20,6 +20,7 @@ #include #include #include +#include #include =20 #ifdef CONFIG_X86 @@ -744,6 +745,20 @@ int __init iommu_get_extra_reserved_device_memory(iomm= u_grdm_t *func, return 0; } =20 +#ifdef CONFIG_ARM +int iommu_add_pci_sideband_ids(struct pci_dev *pdev) +{ + int ret =3D -EOPNOTSUPP; + +#ifdef CONFIG_HAS_PCI + if ( acpi_disabled ) + ret =3D iommu_add_dt_pci_sideband_ids(pdev); +#endif + + return ret; +} +#endif + /* * Local variables: * mode: C diff --git a/xen/include/xen/device_tree.h b/xen/include/xen/device_tree.h index 5ff763bb80..9254204af6 100644 --- a/xen/include/xen/device_tree.h +++ b/xen/include/xen/device_tree.h @@ -946,6 +946,29 @@ int dt_count_phandle_with_args(const struct dt_device_= node *np, */ int dt_get_pci_domain_nr(struct dt_device_node *node); =20 +/** + * dt_map_id - Translate an ID through a downstream mapping. + * @np: root complex device node. + * @id: device ID to map. + * @map_name: property name of the map to use. + * @map_mask_name: optional property name of the mask to use. + * @target: optional pointer to a target device node. + * @id_out: optional pointer to receive the translated ID. + * + * Given a device ID, look up the appropriate implementation-defined + * platform ID and/or the target device which receives transactions on that + * ID, as per the "iommu-map" and "msi-map" bindings. Either of @target or + * @id_out may be NULL if only the other is required. If @target points to + * a non-NULL device node pointer, only entries targeting that node will be + * matched; if it points to a NULL value, it will receive the device node = of + * the first matching target phandle, with a reference held. + * + * Return: 0 on success or a standard error code on failure. + */ +int dt_map_id(const struct dt_device_node *np, uint32_t id, + const char *map_name, const char *map_mask_name, + struct dt_device_node **target, uint32_t *id_out); + struct dt_device_node *dt_find_node_by_phandle(dt_phandle handle); =20 #ifdef CONFIG_DEVICE_TREE_DEBUG diff --git a/xen/include/xen/iommu.h b/xen/include/xen/iommu.h index b928c67e19..82319016a1 100644 --- a/xen/include/xen/iommu.h +++ b/xen/include/xen/iommu.h @@ -215,7 +215,8 @@ int iommu_dt_domain_init(struct domain *d); int iommu_release_dt_devices(struct domain *d); =20 /* - * Helper to add master device to the IOMMU using generic IOMMU DT binding= s. + * Helpers to add master device to the IOMMU using generic (PCI-)IOMMU + * DT bindings. * * Return values: * 0 : device is protected by an IOMMU @@ -225,6 +226,19 @@ int iommu_release_dt_devices(struct domain *d); */ int iommu_add_dt_device(struct dt_device_node *np); =20 +/* + * Fills out the device's IOMMU fwspec with IOMMU ids from the DT. + * Ids are specified in the iommu-map property in the host bridge node. + * More information on the iommu-map property format can be found in + * Documentation/devicetree/bindings/pci/pci-iommu.txt from Linux. + * + * Return values: + * 0 : iommu_fwspec is filled out successfully. + * <0 : error while filling out the iommu_fwspec. + * >0 : IOMMU is not enabled/present or device is not connected to it. + */ +int iommu_add_dt_pci_sideband_ids(struct pci_dev *pdev); + int iommu_do_dt_domctl(struct xen_domctl *domctl, struct domain *d, XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl); =20 @@ -238,8 +252,32 @@ int iommu_do_dt_domctl(struct xen_domctl *domctl, stru= ct domain *d, */ int iommu_remove_dt_device(struct dt_device_node *np); =20 +#else /* !HAS_DEVICE_TREE */ +static inline int iommu_add_dt_pci_sideband_ids(struct pci_dev *pdev) +{ + return -EOPNOTSUPP; +} + #endif /* HAS_DEVICE_TREE */ =20 +/* + * This function is not strictly ARM-specific, but it is only used by ARM + * as of now. So wrap it with ifdef to avoid creating dead code on other + * architectures. When usage is extended to other architectures, this ifdef + * should be removed. + */ +#ifdef CONFIG_ARM +/* + * Fills out the device's IOMMU fwspec with IOMMU ids. + * + * Return values: + * 0 : iommu_fwspec is filled out successfully. + * <0 : error while filling out the iommu_fwspec. + * >0 : IOMMU is not enabled/present or device is not connected to it. + */ +int iommu_add_pci_sideband_ids(struct pci_dev *pdev); +#endif + struct page_info; =20 /* --=20 2.34.1 From nobody Sat Mar 15 14:18:13 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1741959323; cv=pass; d=zohomail.com; s=zohoarc; b=OARzuQCQfQSOwGn9R//79u50xvjWfNTNMem7EPN25hhdhv0xVKPsnYB5G3/7UfDe6w3YmnE11VmQkkaiQDR6i5EerXEe/t93eJXeMOG8RqbkxxC3DTrMszKPNsbEJ8SsaPg22xLPNoxWcJiqwL0aOBf69rMV6odCA3ieTCLhiZg= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1741959323; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=SMWq/RIZ8Sv+e5l/RmuzHBIUH1oPPE/Mvx8WzQabMZ4=; b=FEMN85LaGlQT4Qm48l/hCtLnXc1TtAdlf54fJMOrumlrzGkJA6JtSOgBmWMve4iew0qn/cm2XhxJr06gtKRVIhBCaZrB2ew3bIjP04Ws2AJ6sIsdPaFXiKeGPmeN4tUnWIXggWgLAD6tspD6FWWr+P8gyVFBtIxLMTasY8kUuqQ= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1741959323625106.11532990174442; Fri, 14 Mar 2025 06:35:23 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.914588.1320319 (Exim 4.92) (envelope-from ) id 1tt5Bi-000409-9R; Fri, 14 Mar 2025 13:34:58 +0000 Received: by outflank-mailman (output) from mailman id 914588.1320319; Fri, 14 Mar 2025 13:34:58 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tt5Bi-000400-62; Fri, 14 Mar 2025 13:34:58 +0000 Received: by outflank-mailman (input) for mailman id 914588; Fri, 14 Mar 2025 13:34:56 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tt5Bg-0003Jp-Ex for xen-devel@lists.xenproject.org; Fri, 14 Mar 2025 13:34:56 +0000 Received: from DU2PR03CU002.outbound.protection.outlook.com (mail-northeuropeazlp170120003.outbound.protection.outlook.com [2a01:111:f403:c200::3]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 1d6a46df-00d9-11f0-9898-31a8f345e629; Fri, 14 Mar 2025 14:34:55 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by PAXPR03MB7950.eurprd03.prod.outlook.com (2603:10a6:102:219::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8534.28; Fri, 14 Mar 2025 13:34:51 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971%3]) with mapi id 15.20.8511.026; Fri, 14 Mar 2025 13:34:51 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 1d6a46df-00d9-11f0-9898-31a8f345e629 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=cuS0BskdvjXgNGmjlnKVEgcB3XzNFYBbyb0CxqlOcnzLReh+is3W+MI7TV5yx44IigNBfcU17XteQvYOB8niNVo++k+nc4tRu52A+4Md5b+9IzB0pi5mxRFit025O925F5izYlmvPN/gPuJiaubsIUcY1aRA9K8QN/8Ke9mqWoPoTmC4uRc4EJq3Chikjt0ZWfVxZE+pLnM9hIBM/FnB457P4vJU2WPlVHMa2XeFpAU8S9XSBAvLxm63WqZE3HH62Jwgs7DMjBvx6THWAJTR1PR4KRhl2hJCq/rhtfEnIh4P0Q+NMrZZwAKG91pCiiB51rYQcoD9Fuo3y07Vmipc+g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=SMWq/RIZ8Sv+e5l/RmuzHBIUH1oPPE/Mvx8WzQabMZ4=; b=cMqTzBrwQRqJ9j7j59/+n8qp4fEYPqHCU+QSVVQBprhPrvf6ufM0imXJ6B+brw//oN9JSI2dVxJdI+kg2H7sCP9kj+cvArkz20RXSvzfnFTwJWfJxJmSERLGOle0ZPLFJ5TYyvFNU21XE8BgN7WkDvw/sNiIJMBp0r2EHGDfF1puTaHiNTMrh0uCi3u2tSIi5a5fZJgIynEB3bn3zeoAGAaFK4F/FRskS0I+f9MY/o7cbG8TVgCZ2kwtqJMUNOgJqZtmIKjvisKcGyEJ8e/GXWvBEcx2ap4Tvs+xijpBSAOQqsp+OvFVRW75Iv6vzXU+2+SUr3Ptbm4fvJCIm/wKnA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SMWq/RIZ8Sv+e5l/RmuzHBIUH1oPPE/Mvx8WzQabMZ4=; b=uvpjKPtBU+rfGTLhwlEhZ1bID9nbKPE1vN6refCjdKaPsbKrKxrmw89xe5P3Bef91yP1h2fFTIInUY5lNEYDTniThApbFEt6kQQCqZL38K8wU7oIue6sjdrQ1v/1gwKGmNlQxSjAseYECLUGH+4XischsWbL3gMwtLE9dDeWtUhTJh/yyh2nXnpaY2Z4anbaFUiAFeml2/lUQXPEl6w/71g58mrqXJRwClRAObcKzDIiHtYmGncnMD0KI7hSlNskDhKhZUbheg511LygGLSz648OcY/tPDxXoZt4dwwRNJXgXxWxZtGDqbW//qFk3sWwUVZTVsj2iX5arB941v6sPw== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Stewart Hildebrand , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel Subject: [PATCH v9 3/8] iommu/arm: iommu_add_dt_pci_sideband_ids phantom handling Thread-Topic: [PATCH v9 3/8] iommu/arm: iommu_add_dt_pci_sideband_ids phantom handling Thread-Index: AQHblOXciFlCTG2d9UO3pZAlFjZPOg== Date: Fri, 14 Mar 2025 13:34:50 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|PAXPR03MB7950:EE_ x-ms-office365-filtering-correlation-id: 5c33cf1c-0b4e-4ac6-9148-08dd62fcff39 x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|1800799024|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?nJbHMB7gLCW+0tg+z3a4MqjQvA+cgMlwh2w2fymm2cij+EZVxFlYvrhBkN?= =?iso-8859-1?Q?SoY0I04YAC3yoY3cYE0dwvSIxGvtvsUM1wlfMuBOB9aLF4BE3AZTfdH1eZ?= =?iso-8859-1?Q?jZwBazXbaRunX+jTvs5sJD+yP7fpBDqCoc0g0Niew41vi+cFjsWLiW7Cav?= =?iso-8859-1?Q?A2id6pRad8tdxsRAxC9YhbXYgmFwhfNkHvUUUYzw1RO0Yi+N4LWpVOXGpP?= =?iso-8859-1?Q?hYQat8oDAj/YYcd32uAisV0tc8Vjk30BvCw4G9biTrrUzcWblAHUu05RtX?= =?iso-8859-1?Q?PYq65DS1frOTx10zv8TwFR5jZOqNnoSCRxtSGc5/fM5ylUM3X35c4rNgYA?= =?iso-8859-1?Q?1BauRLHf12pFLDWiqFwOgXGBMzmpES2x3VbqjBbzodo/gsfTq71fw1B58f?= =?iso-8859-1?Q?R7o0uZxweg83nuQc4ebMX5OYNk7jlaWd1HwinvOFy71M65u5/P4GJjC9or?= =?iso-8859-1?Q?//00jgGT2QEDu+Neql3qJTcPw+ohLbXC8SXqTR/PfjiukjTTvegfnfDOOk?= =?iso-8859-1?Q?+IL5XW0xW195lm8Q0T9p1jJsjk5WNo49p6x5S6MUg3NFKd4msHgqRgplpk?= =?iso-8859-1?Q?1nfkwOBe5TQ+8W42h43dt92INiwfXdOJ6n9hcDCJWHgSuyro+YCozfUTZQ?= =?iso-8859-1?Q?DYS9pQPY+jAcUIzhmiCo5zKb4/KVJgX/sh/4SdmS5dUcXZNtJZkEHoMBcW?= =?iso-8859-1?Q?dzg+dnXWnCDsi0Eb6DzRhGx4CEYjZw0wIHYvKQK8JiZMtfJSfXIYPAqqqn?= =?iso-8859-1?Q?XnmXdJ+OmufsMV+Y63zD1hVfQcdaybLcQD+oxzFrdc3YJ70RjJ432Buz58?= =?iso-8859-1?Q?KmA7EN66pbsuzoZAtQkdrMZLzPnLGviUlxKGJgeVgINzue6y0XiyC6qIy3?= =?iso-8859-1?Q?P/cD2YJgMfjCx6Aj549V6uU/ugl75x1uT334RwSxGJ+5LjZerv5zRRlq5q?= =?iso-8859-1?Q?xSJmImWBnMJQCWPv8S07HTG7J/c3WJ7CTrNDLA3VvC6Nyzsq+Q4g5MxCK4?= =?iso-8859-1?Q?tGBPtpfTIwgZ2xJZt1Q3zBjQxgtTc32aJkO7SkEFfb76+XglBoMgdy9ZEu?= =?iso-8859-1?Q?vmiZyW3UmVfJnKAUKDgIWzMvflZm/P6Gm4fHCsFaV4f6RZr6rLal+ccKAH?= =?iso-8859-1?Q?4oUnX7j6uAzF+TE2xZIo7OkyZfpvc9B/8P5u1ttxrUhBqeIOBOV5PoJ83M?= =?iso-8859-1?Q?Z0Oy4m0fNQQguvlzr2IXis8d4tDM+z+B0BmmTy07cXWBjzBCAlhctd3Hgd?= =?iso-8859-1?Q?GeIkjDQmutzYdmYulzZlaMxYC11D1olvnMFpT9WJMQyjkVCE4Gq5vaROQk?= =?iso-8859-1?Q?1emx750eHm0DsDTbl7NfZet1dSnc4veZDfkt4yHfZBjZaYBUkKNWB/ZYwB?= =?iso-8859-1?Q?1jmj5diNE0q1+IAU5dZV5fPM4QgYnroA/Oh7cupSC4nzYY9rz0m6KBZai3?= =?iso-8859-1?Q?o1RngKQ8VY+PvdtaBoOTYXOgEIRUef7YM8YnVyebS7t/3AY1bSVPjqg7yo?= =?iso-8859-1?Q?dMPB/2zRn0aebGJ5Bo/vMZ?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?Bn3MjBRYhd+6cPCxa7Z6ajj+h+wsUxLMUYVkB9Eb0q2X1V1Nlzc0jtULNq?= =?iso-8859-1?Q?NchPi7IGcvRKd64v8bZeepUU62T2+qj7FCK64cT+u4dafPezsxL7yzgU6Z?= =?iso-8859-1?Q?sl1aRqhlk9dL8aXzBC2mb0Wl1I5ifLhXE/O0KuwFlg0VamvungPPc2YXuv?= =?iso-8859-1?Q?GE+uuPc+SttVtsXsW5HRn6MlNEt1NWRM7kYpJeSeBb4aKYw+AK4jOe1npo?= =?iso-8859-1?Q?B1tB7g8v5wvMihSMdA73hAEqF9azPC5ud5moZFsj9S4K8wKAqNSmTJth5P?= =?iso-8859-1?Q?wJeZOmLIQidYhxD+pAXb1Clx2Bwlx2SBWTgnIjTrOdY4taeO+4lk69LWQ/?= =?iso-8859-1?Q?zPe6QdgPCf0BB37LcmE92EJby8ZpjVbso2yyBHzPk50wkAig1nPXQ+p2yd?= =?iso-8859-1?Q?EAIYEb2EmVEV4+4JLRcegtezR+dRclHnfD7qC7Ml8TK3TTY2qNtpdq/5+a?= =?iso-8859-1?Q?SAkK2A93NJgLA3KQVBH/IYxSkVCQ3Ht1kHvvfY5UcclmSpSXmCg4XkM/jd?= =?iso-8859-1?Q?ZiCkizjbE3vCG3H8aLyqp0yeUSXTn8lTMyPsDwmFX0pQ01Fe9HQS07Eo9w?= =?iso-8859-1?Q?xjLrKa3cBsAnRWQgHGNXQwrilydBa5jQoI4Dga6hGCBojiULmgeqo+BHyT?= =?iso-8859-1?Q?zpu3TQ0Pv/ta/z7DgkDjFqkBIoEc5CraAMJKBwSIJAFIgaY3gi8PAjF7n5?= =?iso-8859-1?Q?EhqcxvEtCG+0HLiS2vF3EscgDXzuvcMxkXJWup1I0gXKsA0HWcGGA58Ku3?= =?iso-8859-1?Q?enL7wKtq6TsNt0Vzce4mPx8IlYSJoWLEm+LWZO4Oae/PxLx2cC3zQYuq5f?= =?iso-8859-1?Q?nHPq+axBQSon62fJLiD6g2xHrn/pxEyMbcS4ZcRIxIqbJ5yyomk2uTlS5F?= =?iso-8859-1?Q?GRVLEgddKYZCq/CqweOWdyjgjEa2ysKTQ310pE8K+YsyVdKcxJm205fEo8?= =?iso-8859-1?Q?Ksq9G3voBj60FjuoNwBcVhNskWKutQIhLIvCgbV6qSa0rlgWvUUPGb6EUO?= =?iso-8859-1?Q?dShlrnC3UE/luOpnmFR9KwMjIKlVKfHw4DJxwzWvBTF4Surxm9isqyWY0D?= =?iso-8859-1?Q?3Py2r4fY9+hex+QPfXd1OWfHcXD4m9UiWgkNKaANBmlgYl7Xgi2e7rFRyf?= =?iso-8859-1?Q?gnmvFUdPiWZvv1WKufUUz3hBwOqM7LTi7BYzacWPlC/T1CiboeYLajCuc5?= =?iso-8859-1?Q?ElIGaGCEbgR1eqH+i/+jSvfYwYJkiMHxOzP7EkzIi7zAqdCO0wtaudHmE3?= =?iso-8859-1?Q?j5GlIHWHFG0X10Ej52OeGQpZX65qvTMiLM2qPNuUnjyP/NUzjesWroJRaq?= =?iso-8859-1?Q?2lCuALReh5ojdHlmR5xw5jpW+gGScH0xseCsyk5XQTfwG3Li4IppSm6Nb0?= =?iso-8859-1?Q?aW3c4OJ4EFokanDkBek3O/hoIPVwtS81Qh9h3tC6KNdxZxIM97IZVjrDre?= =?iso-8859-1?Q?31RowFhgwkaVTF3aHR9DH+g5023mKw9zmgeCiBbXyDrzwKV2tbl8rP3i0J?= =?iso-8859-1?Q?yioHMyfIAGBCe2O7c+4GHWaysQPJ3pytMxE3Ykg8cSP8U0Qh39m5sHVvf2?= =?iso-8859-1?Q?fZ8eAEgfZvrivEZS2GojpUBAJ4gTuVM8ZK9Fvz41nETawKU3oP+Jbg6Z/G?= =?iso-8859-1?Q?VTxJm6ujYt9BRqyoiWlYG3SZKRdWLr0tE1yLuxIuRSq91VMYt4ENkvVw?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 5c33cf1c-0b4e-4ac6-9148-08dd62fcff39 X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2025 13:34:50.9215 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: Fkxst15m7dLcDTeNQHQy5kJdRKgkiBf4hWrSP0FWl2sbKbBkqE6LHAJcnseSphPJBhdLOC2436S8p1bhQwJvJg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR03MB7950 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1741959326662019100 Content-Type: text/plain; charset="utf-8" From: Stewart Hildebrand Handle phantom functions in iommu_add_dt_pci_sideband_ids(). Each phantom function will have a unique requestor ID (RID)/BDF. On ARM, we need to map/translate the RID/BDF to an AXI stream ID for each phantom function according to the pci-iommu device tree mapping [1]. The RID/BDF -> AXI stre= am ID mapping in DT could allow phantom devices (i.e. devices with phantom functi= ons) to use different AXI stream IDs based on the (phantom) function. [1] https://www.kernel.org/doc/Documentation/devicetree/bindings/pci/pci-io= mmu.txt Signed-off-by: Stewart Hildebrand --- v8->v9: * replace DT_NO_IOMMU with 1 v7->v8: * no change v6->v7: * no change v5->v6: * no change v4->v5: * no change v3->v4: * s/iommu_dt_pci_map_id/dt_map_id/ v2->v3: * new patch title (was: iommu/arm: iommu_add_dt_pci_device phantom handling) * rework loop to reduce duplication * s/iommu_fwspec_free(pci_to_dev(pdev))/iommu_fwspec_free(dev)/ v1->v2: * new patch --- TODO: investigate Jan's comment [2] [2] https://lore.kernel.org/xen-devel/806a2978-19fb-4d31-ab6a-35ea7317c8de@= suse.com/ --- xen/drivers/passthrough/device_tree.c | 33 ++++++++++++++++----------- 1 file changed, 20 insertions(+), 13 deletions(-) diff --git a/xen/drivers/passthrough/device_tree.c b/xen/drivers/passthroug= h/device_tree.c index 37e1437b65..f5850a2607 100644 --- a/xen/drivers/passthrough/device_tree.c +++ b/xen/drivers/passthrough/device_tree.c @@ -169,6 +169,7 @@ int iommu_add_dt_pci_sideband_ids(struct pci_dev *pdev) struct device *dev =3D pci_to_dev(pdev); const struct dt_device_node *np; int rc; + unsigned int devfn =3D pdev->devfn; =20 if ( !iommu_enabled ) return 1; @@ -183,21 +184,27 @@ int iommu_add_dt_pci_sideband_ids(struct pci_dev *pde= v) if ( !np ) return -ENODEV; =20 - /* - * According to the Documentation/devicetree/bindings/pci/pci-iommu.txt - * from Linux. - */ - rc =3D dt_map_id(np, PCI_BDF(pdev->bus, pdev->devfn), "iommu-map", - "iommu-map-mask", &iommu_spec.np, iommu_spec.args); - if ( rc ) - return (rc =3D=3D -ENODEV) ? 1 : rc; + do { + /* + * According to the Documentation/devicetree/bindings/pci/pci-iomm= u.txt + * from Linux. + */ + rc =3D dt_map_id(np, PCI_BDF(pdev->bus, devfn), "iommu-map", + "iommu-map-mask", &iommu_spec.np, iommu_spec.args); + if ( rc ) + return (rc =3D=3D -ENODEV) ? 1 : rc; =20 - rc =3D iommu_dt_xlate(dev, &iommu_spec, ops); - if ( rc < 0 ) - { - iommu_fwspec_free(dev); - return -EINVAL; + rc =3D iommu_dt_xlate(dev, &iommu_spec, ops); + if ( rc < 0 ) + { + iommu_fwspec_free(dev); + return -EINVAL; + } + + devfn +=3D pdev->phantom_stride; } + while ( (devfn !=3D pdev->devfn) && + (PCI_SLOT(devfn) =3D=3D PCI_SLOT(pdev->devfn)) ); =20 return rc; } --=20 2.34.1 From nobody Sat Mar 15 14:18:13 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1741959331; cv=pass; d=zohomail.com; s=zohoarc; b=JopwLuo1w/f8Is6NEDrCGYH4uozIC8wF2S/pu8E6QSCnVJwqjde47F/DS+ferO1B8gJrjKSQjFsOG3JtYbI3bDIKAvqooT6fQsHTN/A6AdShbKayyGg7yKUIyUFg2kQQEiyurI32P4lvznc16UQxbRFrz1z7nM4xgbNtv+L3y+I= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1741959331; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=Hlh1zQAkMfzGRpHne5rgWyDdp0BZ3vC2SDvajq3D2NQ=; b=auPcG+l0IcJLvSayhLC7+dSLFPxK3bgAIUWFQhs0XScSycztIcX96XnbraLAzmAGGErHoR7VPAIcJiREXvTSi8R8z0KoEu1LNubtSUbpm3E6hnzAY9vK55BNcdzTiEA8PX6cHPRn/i1uP3bUChZ5JjfxSlucue9XRCphdYfBCOo= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1741959331461845.4537454539968; Fri, 14 Mar 2025 06:35:31 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.914591.1320345 (Exim 4.92) (envelope-from ) id 1tt5Bk-0004e5-Jf; Fri, 14 Mar 2025 13:35:00 +0000 Received: by outflank-mailman (output) from mailman id 914591.1320345; Fri, 14 Mar 2025 13:35:00 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tt5Bk-0004cY-BW; Fri, 14 Mar 2025 13:35:00 +0000 Received: by outflank-mailman (input) for mailman id 914591; Fri, 14 Mar 2025 13:34:58 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tt5Bi-0003Jp-8J for xen-devel@lists.xenproject.org; Fri, 14 Mar 2025 13:34:58 +0000 Received: from DU2PR03CU002.outbound.protection.outlook.com (mail-northeuropeazlp170120003.outbound.protection.outlook.com [2a01:111:f403:c200::3]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 1e45e93e-00d9-11f0-9898-31a8f345e629; Fri, 14 Mar 2025 14:34:56 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by PAXPR03MB7950.eurprd03.prod.outlook.com (2603:10a6:102:219::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8534.28; Fri, 14 Mar 2025 13:34:51 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971%3]) with mapi id 15.20.8511.026; Fri, 14 Mar 2025 13:34:51 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 1e45e93e-00d9-11f0-9898-31a8f345e629 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=TYH0MHqdIpodfM/Ujls4y3CxU3cM7rK/e547b27S62ELuvOw6JWKalxUrNENnm/GVruNm+gRoI3n/wuXTK+F4/+mUMVIX+c+4tgvvoatz4M8JceVpvYP6RfyGIK5kWVckjJDbInDFqMgv/UOnDuetEeT9S4Z32rfLgeAgMKfcXKKn9G67CyWw9n0U4VBMO6hRZ4aTkFN1xh/LhWv+hZKHKkhhJKhYJ5A7AOPnIZjZzSNWe4QE8B3Zac2ehpAmY80M4vak04OJ5u33Xwf0nwps6pILT6dqan21sWe63uPGa8Jfov7rxLgFGgELaygcHzU+NkRidTl/ZCy5EgfFc/C1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Hlh1zQAkMfzGRpHne5rgWyDdp0BZ3vC2SDvajq3D2NQ=; b=YdoJ9UAd8u+lMyU7nYPUhSZuOvdzfXCBuVZ2NuNUk7cbhnb1fp37m/K18sxuOdhWr0rYag3JpN1aa1aZgNjsqWzDuA/Ex3t93lUBtYpMzaqTMC62dj+y0+pGBD1cdwkbrLEPQ8Zr8ak20UMDsDaLOJ/hxpJLKN1IROBL28Qc6GK6JB6k/yNhyjOyXmbwE5GcwQp2KrHzdpQ2ALGjxA1UBaYZwGmMWUSWkVg7Gp+nKy1yiyF0XKjkqU5ZWrHPI4HamBgKOVK4mQFrbGHL8qe7MZeg0HzoamNUOje79xIvjMca0zoZCw/pajnkrmsvv4FwFpugoVCaRLWinVy6Jq8PzA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Hlh1zQAkMfzGRpHne5rgWyDdp0BZ3vC2SDvajq3D2NQ=; b=EfT3vowE4udA1AeGMHA0iqipQCpKvNQu24r6B7QZ0489aDZMdKmX6XobH+pfc5DAZdqDgfUGXIdrkAK8XI0tP75/766SIVkdpmOHJjIfF6KqbadAEJZTX0OkcWZeiG6PUz9CD++yySRuRNRb+E260zxb9n69fTizTYz3LVD2z2wCVmaY9b3agndCO8XjDP+F2ciLDY+JtsOhja9htFlWAJlEZ5jBo54qPnHSZDOtHyQy83aFNSSAoOeI00HDmbyrizbcjJqFh+Oe37knAvE68xpJK+THfmp5hbzzZB2Egj/tIxiBrDh43KywbtBXyzaJgbTaRCUtTekMm9oASuqRdQ== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Oleksandr Andrushchenko , Julien Grall , Rahul Singh , Stefano Stabellini , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk , Oleksandr Tyshchenko , Stewart Hildebrand , Mykyta Poturai Subject: [PATCH v9 4/8] xen/arm: smmuv2: Add PCI devices support for SMMUv2 Thread-Topic: [PATCH v9 4/8] xen/arm: smmuv2: Add PCI devices support for SMMUv2 Thread-Index: AQHblOXddxnGJU9kEEekiYRuY9GmSQ== Date: Fri, 14 Mar 2025 13:34:51 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|PAXPR03MB7950:EE_ x-ms-office365-filtering-correlation-id: b403bdee-5be6-4d57-46f5-08dd62fcff89 x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|1800799024|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?3OWXJbPuzxvCaQhUW1lO0GXp+94vhIsGuwEXiUw7mJ7PTWRpngmt1BawAt?= =?iso-8859-1?Q?X9Yfp/oDVWhdeNNqT6Mc4TWbWb+S41Y/RYCg23HGcU8mgOOuaKtZjvsrYO?= =?iso-8859-1?Q?Iq4GfRBfuYKTvWpaCxFPfEbDBYMp8u4rJh/hr09R0k+OVfUJ6ogguWz0Ph?= =?iso-8859-1?Q?rZoH6/jaRa84R9wXahI3gJmcDBkeNymwdHiNQfXMycI1zTFCk1t2afm+8p?= =?iso-8859-1?Q?5Gg62yQY26jlBf+h6vadtJ+6lrKeISD0pUriRb+wG8ZlCuCGhjVZhudWcI?= =?iso-8859-1?Q?IEcwjcza8+/wOg2boiaDDqsLTl19UxC5A4IJBZoh+Apj8ZpohjPs3ZLcFe?= =?iso-8859-1?Q?rDw292XiL/8G9qrBTuAZznK+4VZpt2wzViqnRGoXxE9xCPVzQMBK/nyz4K?= =?iso-8859-1?Q?WxWUyOb+GG1NyQIlk/wTTBQxsEkWxy7E/oULdlEcuDZxweQaDX2XuC4iq5?= =?iso-8859-1?Q?DtJa+/pcgxw7j9bp0roQkcM7NFD16ixmrSpF+xx8mLQK21SXHtvR5JG8cQ?= =?iso-8859-1?Q?lMrQj5Jlq91vvGIIHuLeHACvij0wgsSK8Clcw1hnEeDyOD2XYM/F6xC6Yh?= =?iso-8859-1?Q?Ka4tQIbj5lhXTNh8cwr6o5IDNd3pX5Zh8+1J2OLxnJuBBRwXQI0ihKtTzS?= =?iso-8859-1?Q?dv3vjWRdkLtzL/GIs88TVbJhnb3JNA27BjcZVOWuezzkLha/VFqDG8JUK0?= =?iso-8859-1?Q?abxAQPw42kHlmqdLs9suz/SWQYXpfeGPO5vtBZlhW7yoPZSfGvbr4+PPQj?= =?iso-8859-1?Q?TbHX1W3KAGuw7x8Y/nrEc0gFZx/aCGh3k0R7qGxoFxTPKLPRSzAjyClqL6?= =?iso-8859-1?Q?JgXRCXDsvCQeJuJcA/g1TgG4yMXQvOxKr8t4GZpKlga8KAqtF+EEepT6xZ?= =?iso-8859-1?Q?xjGJOH/AmGEgy7va9iYVuErAnLTtH3wsBsUx1iRRZV1ehm/0uoDpRbUjKa?= =?iso-8859-1?Q?TCGKZeggU4Uc3H8UUJyhQhzJIX06QBSawbt73rZANq5Gn2P6NsVYYfpFRM?= =?iso-8859-1?Q?5NRXbEeShrX/k0meP/6x2BYENwkUy6KYltKFN28tjIMUNRcpbusp/DDTPT?= =?iso-8859-1?Q?zLoS+2Qa7UCxRuBcmmBg1JRvVqLBStyCPon4I2F5gltm2V0UjMTybbClhd?= =?iso-8859-1?Q?mAbLrFe7pPwvqfZBpxfpM8t5Qxe4UZ0bdorgL/m5GRHwtvgwtaLMXn2ydK?= =?iso-8859-1?Q?UZkhF/u4d+j1yHxCGS9E6lZNEuE91d3EAl4kkhq5tN2cXVgMmva07H3o2I?= =?iso-8859-1?Q?Ue9OOskwflMosURH8seKjvdWSsuGr+nu/GsVWrGW0FpoMLG4Ig/mQfZnw4?= =?iso-8859-1?Q?mWYUx0/LhsrrsdrrwnqlsoPfrqZP3zUJwYhMN81NWDfDVtvTp6oN1k6A0v?= =?iso-8859-1?Q?E1+ndm0NX+sCO63/lZ4zZ95WlQtMGtIQhqbiX8IAOWjUou19wS/z6AfHKB?= =?iso-8859-1?Q?jp983OIQNvvlEd+xKQRpdXkdi7vafqGWuh6N1uZIsPCbM8gXBNyxjcDkUR?= =?iso-8859-1?Q?XOPXrcIL4IiYix+bxPXheO?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?N9zQNIcRgFCcPaVWJvh2bi6vtkFPJPS+QFV+QeWDJ7S7Yf+ZEUceFCJln3?= =?iso-8859-1?Q?ofYi7HpcjQVjzFcontPnIxk5B3k0odBj8Qzud/PonZG8NdnHOIV+5tr7MC?= =?iso-8859-1?Q?CtzcBxyomffQvmIccyr+/3MUQ1ococLCsIoLLOzZiPHC1wqhD7Bra69tJC?= =?iso-8859-1?Q?NV3+Ika8DRKT4HTGj1pMJwDVyWqgNnxH9zNHlADLfybViUUEHKKWTRj8Uf?= =?iso-8859-1?Q?Yuy1RcBbE10MAZ7RegTGE5m2zpQ/Ig0/MNSlpBxHGzmc60oDFj+cJ2nw/R?= =?iso-8859-1?Q?57Gr6+OWYmU3lI/qRfNrAVs6C0dpGt9NQzND07zOs8B1tcS6XfB7UYt/FF?= =?iso-8859-1?Q?9J2vwB7ZaNL5FhsNgh3j0LxKFy/8FnbRPAWrFY5gj3KdtRkX9CUBllf2nC?= =?iso-8859-1?Q?lC34B8CYbZXw7S11ONcGXLD+Wmy+h+fCF5JP62zAzIXA8C/E7GOlXfVsKw?= =?iso-8859-1?Q?ODiUfEOYkQGbBJv7rFrHm0TvksXH6Arepzn72n0c8GdgDi+Rr2um9dl/1Z?= =?iso-8859-1?Q?4kwD0M4dW9RxWfkZ2WAjyCXg1wvYMCnx4x12d5TUSYO5B1iIWmG1pYGh5c?= =?iso-8859-1?Q?I9AfxihioJSqSFKb4ipgrAo/RkuRls5+184gH6Z2yJ/vSeJe5c7h+8Z0RB?= =?iso-8859-1?Q?y2iX/K7EPAUbJDsX2M1hl2xl2eJDoqXZRpQ4xc/K3CJrpeO1pa4l+IC2ee?= =?iso-8859-1?Q?GiTF31y5y4nxe90wAZD5RJUp556bqZng0xG/J8TbaAC7MCU3aHPET8y5Ki?= =?iso-8859-1?Q?kHET6guqPP95Rvn3TIiXTTDqv5QeSjUD0e92WWpmvOAoJHyq8kJtVGkSIJ?= =?iso-8859-1?Q?De5wx4vfLnctu/I9vqDc143feUstXvlzRQ3PboxQrcj6da44ZdBYMzB+W8?= =?iso-8859-1?Q?LODyZ6jUOMcAA/OfQ9JlF3zWqS7OcLv0OdpfA4Fa7WDoJTdDbYd/0YU2U9?= =?iso-8859-1?Q?VnXnFH5VN6DtbCgIgqVh+QNx1XgtvaOT5WxoR7PQQie5WiwnuF0hURdPc/?= =?iso-8859-1?Q?I1/9e94eLU8RK5Euqkx2DSGW90u9PeBDKyoxuNGB4tXruSBuvg3V4jP7jD?= =?iso-8859-1?Q?0nsdL5Efy0qGdBjwgT9jPZr/FrZA+CrWurboQwWxsl5un3RkDNiOa27ygy?= =?iso-8859-1?Q?VMNStVIE61fjZ41nZLvelJcGfbByZiHunjHq7Qos6NmfDbyAVVS32slPRO?= =?iso-8859-1?Q?7mK8kCrXscLgcnw49uk1YNa+5/yAgm2NZ+9oSTjoEl4TPnVMKnbTnXRWHM?= =?iso-8859-1?Q?H6XHLdTb+oNpjOFD4BORGSNFKdngTrSyHWupzohlbhfBqpn7+wPYbzMIK4?= =?iso-8859-1?Q?nYXlO490eTsdOxqIpL1DClohssPjFWyNCefZ0LRFHcUGXZHSmf1wyqOg87?= =?iso-8859-1?Q?tv7Ajt2gGDjeSnbLdXmieauuaaEuMgC0FjejVjIFd7YiKl7yk9PHMk0cH2?= =?iso-8859-1?Q?MpAfZ5S6hKx0VeSdAiuJmp6tLttABU5RI7Ben45n3+BCY7ZQWbAN1vbQSl?= =?iso-8859-1?Q?qPbqkKZr0sC5cXKKcLorAQojxVFba0RrVfI/E6WYofEJdjmskGs+bK3/sC?= =?iso-8859-1?Q?dHXv0MR/yIreHHRQ+iSLLfMSVS6Y1tzKI3GuoHK6i2S4jH555nMFNIJo2L?= =?iso-8859-1?Q?cQt6WNuDdevFGzUYhu1APGWBxMAuyLNsGY7fJ1fsBDK2HIBLiIhYe+lA?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: b403bdee-5be6-4d57-46f5-08dd62fcff89 X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2025 13:34:51.4846 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: J3Ur7ngx001xinORw+D5pr7nXuBUMG8ggTXXaP7XIoD8+8220inLD+3W46Ws8Us+HilNUwZO5w/nGYGlvEvFCQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR03MB7950 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1741959332975019100 Content-Type: text/plain; charset="utf-8" From: Oleksandr Andrushchenko Implement support for PCI devices in the SMMU driver. Make arm_smmu_master structure to hold a pointer to the device to allow it to hold PCI devices. Trigger iommu-map parsing when new PCI device is added. Add checks to assign/deassign functions to ensure PCI devices are handled correctly. Implement basic quarantining. All pci devices are automatically assigned to hardware domain if it exists to ensure it can probe them. TODO: Implement scratch page quarantining support. Signed-off-by: Oleksandr Tyshchenko Signed-off-by: Oleksandr Andrushchenko Signed-off-by: Stewart Hildebrand Signed-off-by: Mykyta Poturai --- v8->v9: * no change v7->v8: * no change v6->v7: * use d->pci_lock in arm_smmu_assign_dev() * remove !is_hardware_domain and pdev->domain =3D=3D d checks in assign to support future dom0less use case when dom0 is using vPCI * remove stale todo in dev_get_dev_node * don't print "" * remove redundant dt_device_is_protected check * remove assign/deassing prints * change assign logic to remove reassign reimplementation * check if pdev->domain exists before assigning to it * explain pdev->devfn check * make reassign check stricter and update comment v5->v6: * check for hardware_domain =3D=3D NULL (dom0less test case) * locking: assign pdev->domain before list_add() v4->v5: * assign device to pdev->domain (usually dom0) by default in add_device() h= ook * deassign from hwdom * rebase on top of ("dynamic node programming using overlay dtbo") series * remove TODO in comment about device prints * add TODO regarding locking * fixup after dropping ("xen/arm: Move is_protected flag to struct device") v3->v4: * add new device_is_protected check in add_device hook to match SMMUv3 and IPMMU-VMSA drivers v2->v3: * invoke iommu_add_pci_sideband_ids() from add_device hook v1->v2: * ignore add_device/assign_device/reassign_device calls for phantom functio= ns (i.e. devfn !=3D pdev->devfn) downstream->v1: * wrap unused function in #ifdef 0 * remove the remove_device() stub since it was submitted separately to the = list [XEN][PATCH v6 12/19] xen/smmu: Add remove_device callback for smmu_iommu= ops https://lists.xenproject.org/archives/html/xen-devel/2023-05/msg00204.html * arm_smmu_(de)assign_dev: return error instead of crashing system * update condition in arm_smmu_reassign_dev * style fixup * add && !is_hardware_domain(d) into condition in arm_smmu_assign_dev() (cherry picked from commit 0c11a7f65f044c26d87d1e27ac6283ef1f9cfb7a from the downstream branch spider-master from https://github.com/xen-troops/xen.git) --- xen/drivers/passthrough/arm/smmu.c | 190 ++++++++++++++++++++++------- 1 file changed, 147 insertions(+), 43 deletions(-) diff --git a/xen/drivers/passthrough/arm/smmu.c b/xen/drivers/passthrough/a= rm/smmu.c index 03d22bce1e..cfddcbb1ad 100644 --- a/xen/drivers/passthrough/arm/smmu.c +++ b/xen/drivers/passthrough/arm/smmu.c @@ -132,11 +132,21 @@ enum irqreturn { =20 typedef enum irqreturn irqreturn_t; =20 -/* Device logger functions - * TODO: Handle PCI - */ -#define dev_print(dev, lvl, fmt, ...) \ - printk(lvl "smmu: %s: " fmt, dt_node_full_name(dev_to_dt(dev)), ## __VA_= ARGS__) +/* Device logger functions */ +#ifndef CONFIG_HAS_PCI +#define dev_print(dev, lvl, fmt, ...) \ + printk(lvl "smmu: %s: " fmt, dev_name(dev), ## __VA_ARGS__) +#else +#define dev_print(dev, lvl, fmt, ...) ({ \ + if ( !dev_is_pci((dev)) ) \ + printk(lvl "smmu: %s: " fmt, dev_name((dev)), ## __VA_ARGS__); \ + else \ + { \ + struct pci_dev *pdev =3D dev_to_pci((dev)); \ + printk(lvl "smmu: %pp: " fmt, &pdev->sbdf, ## __VA_ARGS__); \ + } \ +}) +#endif =20 #define dev_dbg(dev, fmt, ...) dev_print(dev, XENLOG_DEBUG, fmt, ## __VA_A= RGS__) #define dev_notice(dev, fmt, ...) dev_print(dev, XENLOG_INFO, fmt, ## __VA= _ARGS__) @@ -188,6 +198,7 @@ static void __iomem *devm_ioremap_resource(struct devic= e *dev, * Xen: PCI functions * TODO: It should be implemented when PCI will be supported */ +#if 0 /* unused */ #define to_pci_dev(dev) (NULL) static inline int pci_for_each_dma_alias(struct pci_dev *pdev, int (*fn) (struct pci_dev *pdev, @@ -197,6 +208,7 @@ static inline int pci_for_each_dma_alias(struct pci_dev= *pdev, BUG(); return 0; } +#endif =20 /* Xen: misc */ #define PHYS_MASK_SHIFT PADDR_BITS @@ -631,7 +643,7 @@ struct arm_smmu_master_cfg { for (i =3D 0; idx =3D (cfg)->smendx[i], (i) < (num); ++(i)) =20 struct arm_smmu_master { - struct device_node *of_node; + struct device *dev; struct rb_node node; struct arm_smmu_master_cfg cfg; }; @@ -723,7 +735,7 @@ arm_smmu_get_fwspec(struct arm_smmu_master_cfg *cfg) { struct arm_smmu_master *master =3D container_of(cfg, struct arm_smmu_master, cfg); - return dev_iommu_fwspec_get(&master->of_node->dev); + return dev_iommu_fwspec_get(master->dev); } =20 static void parse_driver_options(struct arm_smmu_device *smmu) @@ -742,21 +754,11 @@ static void parse_driver_options(struct arm_smmu_devi= ce *smmu) =20 static struct device_node *dev_get_dev_node(struct device *dev) { -#if 0 /* Xen: TODO: Add support for PCI */ - if (dev_is_pci(dev)) { - struct pci_bus *bus =3D to_pci_dev(dev)->bus; - - while (!pci_is_root_bus(bus)) - bus =3D bus->parent; - return bus->bridge->parent->of_node; - } -#endif - return dev->of_node; } =20 static struct arm_smmu_master *find_smmu_master(struct arm_smmu_device *sm= mu, - struct device_node *dev_node) + struct device *dev) { struct rb_node *node =3D smmu->masters.rb_node; =20 @@ -765,9 +767,9 @@ static struct arm_smmu_master *find_smmu_master(struct = arm_smmu_device *smmu, =20 master =3D container_of(node, struct arm_smmu_master, node); =20 - if (dev_node < master->of_node) + if (dev < master->dev) node =3D node->rb_left; - else if (dev_node > master->of_node) + else if (dev > master->dev) node =3D node->rb_right; else return master; @@ -802,9 +804,9 @@ static int insert_smmu_master(struct arm_smmu_device *s= mmu, =3D container_of(*new, struct arm_smmu_master, node); =20 parent =3D *new; - if (master->of_node < this->of_node) + if (master->dev < this->dev) new =3D &((*new)->rb_left); - else if (master->of_node > this->of_node) + else if (master->dev > this->dev) new =3D &((*new)->rb_right); else return -EEXIST; @@ -836,28 +838,30 @@ static int arm_smmu_dt_add_device_legacy(struct arm_s= mmu_device *smmu, struct arm_smmu_master *master; struct device_node *dev_node =3D dev_get_dev_node(dev); =20 - master =3D find_smmu_master(smmu, dev_node); + master =3D find_smmu_master(smmu, dev); if (master) { dev_err(dev, - "rejecting multiple registrations for master device %s\n", - dev_node->name); + "rejecting multiple registrations for master device\n"); return -EBUSY; } =20 master =3D devm_kzalloc(dev, sizeof(*master), GFP_KERNEL); if (!master) return -ENOMEM; - master->of_node =3D dev_node; + master->dev =3D dev; =20 - /* Xen: Let Xen know that the device is protected by an SMMU */ - dt_device_set_protected(dev_node); + if ( !dev_is_pci(dev) ) + { + /* Xen: Let Xen know that the device is protected by an SMMU */ + dt_device_set_protected(dev_node); + } =20 for (i =3D 0; i < fwspec->num_ids; ++i) { if (!(smmu->features & ARM_SMMU_FEAT_STREAM_MATCH) && (fwspec->ids[i] >=3D smmu->num_mapping_groups)) { dev_err(dev, - "stream ID for master device %s greater than maximum allowed (%d)\n", - dev_node->name, smmu->num_mapping_groups); + "SMMU stream ID %d is greater than maximum allowed (%d)\n", + fwspec->ids[i], smmu->num_mapping_groups); return -ERANGE; } master->cfg.smendx[i] =3D INVALID_SMENDX; @@ -872,7 +876,7 @@ static int arm_smmu_dt_remove_device_legacy(struct arm_= smmu_device *smmu, struct device_node *dev_node =3D dev_get_dev_node(dev); int ret; =20 - master =3D find_smmu_master(smmu, dev_node); + master =3D find_smmu_master(smmu, dev); if (master =3D=3D NULL) { dev_err(dev, "No registrations found for master device %s\n", @@ -884,8 +888,9 @@ static int arm_smmu_dt_remove_device_legacy(struct arm_= smmu_device *smmu, if (ret) return ret; =20 - /* Protected by dt_host_lock and dtdevs_lock as caller holds these locks.= */ - dev_node->is_protected =3D false; + if ( !dev_is_pci(dev) ) + /* Protected by dt_host_lock and dtdevs_lock as caller holds these locks= . */ + dev_node->is_protected =3D false; =20 kfree(master); return 0; @@ -914,6 +919,12 @@ static int register_smmu_master(struct arm_smmu_device= *smmu, fwspec); } =20 +/* Forward declaration */ +static int arm_smmu_assign_dev(struct domain *d, u8 devfn, + struct device *dev, u32 flag); +static int arm_smmu_deassign_dev(struct domain *d, uint8_t devfn, + struct device *dev); + /* * The driver which supports generic IOMMU DT bindings must have this * callback implemented. @@ -938,6 +949,23 @@ static int arm_smmu_dt_add_device_generic(u8 devfn, st= ruct device *dev) { struct arm_smmu_device *smmu; struct iommu_fwspec *fwspec; + int ret; + +#ifdef CONFIG_HAS_PCI + if ( dev_is_pci(dev) ) + { + struct pci_dev *pdev =3D dev_to_pci(dev); + int ret; + + /* Ignore calls for phantom functions */ + if ( devfn !=3D pdev->devfn ) + return 0; + + ret =3D iommu_add_pci_sideband_ids(pdev); + if ( ret < 0 ) + iommu_fwspec_free(dev); + } +#endif =20 fwspec =3D dev_iommu_fwspec_get(dev); if (fwspec =3D=3D NULL) @@ -947,7 +975,25 @@ static int arm_smmu_dt_add_device_generic(u8 devfn, st= ruct device *dev) if (smmu =3D=3D NULL) return -ENXIO; =20 - return arm_smmu_dt_add_device_legacy(smmu, dev, fwspec); + ret =3D arm_smmu_dt_add_device_legacy(smmu, dev, fwspec); + if ( ret ) + return ret; + +#ifdef CONFIG_HAS_PCI + if ( dev_is_pci(dev) ) + { + struct pci_dev *pdev =3D dev_to_pci(dev); + + /* + * During PHYSDEVOP_pci_device_add, Xen does not assign the + * device, so we must do it here. + */ + if ( pdev->domain ) + ret =3D arm_smmu_assign_dev(pdev->domain, devfn, dev, 0); + } +#endif + + return ret; } =20 static int arm_smmu_dt_xlate_generic(struct device *dev, @@ -970,11 +1016,10 @@ static struct arm_smmu_device *find_smmu_for_device(= struct device *dev) { struct arm_smmu_device *smmu; struct arm_smmu_master *master =3D NULL; - struct device_node *dev_node =3D dev_get_dev_node(dev); =20 spin_lock(&arm_smmu_devices_lock); list_for_each_entry(smmu, &arm_smmu_devices, list) { - master =3D find_smmu_master(smmu, dev_node); + master =3D find_smmu_master(smmu, dev); if (master) break; } @@ -2066,6 +2111,7 @@ static bool arm_smmu_capable(enum iommu_cap cap) } #endif =20 +#if 0 /* Not used */ static int __arm_smmu_get_pci_sid(struct pci_dev *pdev, u16 alias, void *d= ata) { *((u16 *)data) =3D alias; @@ -2076,6 +2122,7 @@ static void __arm_smmu_release_pci_iommudata(void *da= ta) { kfree(data); } +#endif =20 static int arm_smmu_add_device(struct device *dev) { @@ -2083,12 +2130,13 @@ static int arm_smmu_add_device(struct device *dev) struct arm_smmu_master_cfg *cfg; struct iommu_group *group; void (*releasefn)(void *data) =3D NULL; - int ret; =20 smmu =3D find_smmu_for_device(dev); if (!smmu) return -ENODEV; =20 + /* There is no need to distinguish here, thanks to PCI-IOMMU DT bindings = */ +#if 0 if (dev_is_pci(dev)) { struct pci_dev *pdev =3D to_pci_dev(dev); struct iommu_fwspec *fwspec; @@ -2113,10 +2161,12 @@ static int arm_smmu_add_device(struct device *dev) &fwspec->ids[0]); releasefn =3D __arm_smmu_release_pci_iommudata; cfg->smmu =3D smmu; - } else { + } else +#endif + { struct arm_smmu_master *master; =20 - master =3D find_smmu_master(smmu, dev->of_node); + master =3D find_smmu_master(smmu, dev); if (!master) { return -ENODEV; } @@ -2784,6 +2834,42 @@ static int arm_smmu_assign_dev(struct domain *d, u8 = devfn, return -ENOMEM; } =20 +#ifdef CONFIG_HAS_PCI + if ( dev_is_pci(dev) ) + { + struct pci_dev *pdev =3D dev_to_pci(dev); + + /* Ignore calls for phantom functions */ + if ( devfn !=3D pdev->devfn ) + return 0; + + ASSERT(pcidevs_locked()); + + write_lock(&pdev->domain->pci_lock); + list_del(&pdev->domain_list); + write_unlock(&pdev->domain->pci_lock); + + pdev->domain =3D d; + + write_lock(&d->pci_lock); + list_add(&pdev->domain_list, &d->pdev_list); + write_unlock(&d->pci_lock); + + /* dom_io is used as a sentinel for quarantined devices */ + if ( d =3D=3D dom_io ) + { + struct iommu_domain *domain =3D dev_iommu_domain(dev); + if ( !iommu_quarantine ) + return 0; + + if ( domain && domain->priv ) + arm_smmu_deassign_dev(domain->priv->cfg.domain, devfn, dev); + + return 0; + } + } +#endif + if (!dev_iommu_group(dev)) { ret =3D arm_smmu_add_device(dev); if (ret) @@ -2833,11 +2919,27 @@ out: return ret; } =20 -static int arm_smmu_deassign_dev(struct domain *d, struct device *dev) +static int arm_smmu_deassign_dev(struct domain *d, uint8_t devfn, + struct device *dev) { struct iommu_domain *domain =3D dev_iommu_domain(dev); struct arm_smmu_xen_domain *xen_domain; =20 +#ifdef CONFIG_HAS_PCI + if ( dev_is_pci(dev) ) + { + struct pci_dev *pdev =3D dev_to_pci(dev); + + /* Ignore calls for phantom functions */ + if ( devfn !=3D pdev->devfn ) + return 0; + + /* dom_io is used as a sentinel for quarantined devices */ + if ( d =3D=3D dom_io ) + return 0; + } +#endif + xen_domain =3D dom_iommu(d)->arch.priv; =20 if (!domain || domain->priv->cfg.domain !=3D d) { @@ -2864,14 +2966,16 @@ static int arm_smmu_reassign_dev(struct domain *s, = struct domain *t, { int ret =3D 0; =20 - /* Don't allow remapping on other domain than hwdom */ - if ( t && !is_hardware_domain(t) ) + /* Don't allow remapping on other domain than hwdom + * or dom_io for PCI devices + */ + if ( t && !is_hardware_domain(t) && (t !=3D dom_io || !dev_is_pci(dev)) ) return -EPERM; =20 if (t =3D=3D s) return 0; =20 - ret =3D arm_smmu_deassign_dev(s, dev); + ret =3D arm_smmu_deassign_dev(s, devfn, dev); if (ret) return ret; =20 --=20 2.34.1 From nobody Sat Mar 15 14:18:13 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1741959320; cv=pass; d=zohomail.com; s=zohoarc; b=bQQigrqpz4hsaXrKMSpfM9l0aVrs8fnDGerQbeo+KZfP4AnbAxzDp5Qfp4adfsoWOyzctBIMbPfMfMh6frGGNB5kbHwYQtufbmURSGA7fmzdGOBXQDGNFZtpyaxRxNQDayk75O11DywgXbNcMZl2PCf8h6BxyAJ+MdzdwFHf5JU= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1741959320; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=AOnvZtlfUne5TYRjtHh0jVzbDwrE6SdxYlOQRFmecDo=; b=X1VpYR3mILYCYNWSJ9mc/ZCMg28e2+MIgVrhNFyC+SM+Bug3BewwWN/mBvJgL1DYIaC+WiFY9RZyU4AKN9iffT3simXNpdmO2Uj/wFu1q7/dliDKr/m31z+jfugWMtWehUISUmEWToJJBeN0DcbD7FpPUSNFi/sIu5EbaUgnVsA= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1741959320605137.57055969116618; Fri, 14 Mar 2025 06:35:20 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.914590.1320329 (Exim 4.92) (envelope-from ) id 1tt5Bj-0004AS-4b; Fri, 14 Mar 2025 13:34:59 +0000 Received: by outflank-mailman (output) from mailman id 914590.1320329; Fri, 14 Mar 2025 13:34:59 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tt5Bi-00049S-Vu; Fri, 14 Mar 2025 13:34:58 +0000 Received: by outflank-mailman (input) for mailman id 914590; Fri, 14 Mar 2025 13:34:57 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tt5Bh-0003qF-Ig for xen-devel@lists.xenproject.org; Fri, 14 Mar 2025 13:34:57 +0000 Received: from DB3PR0202CU003.outbound.protection.outlook.com (mail-northeuropeazlp170110001.outbound.protection.outlook.com [2a01:111:f403:c200::1]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 1e39445a-00d9-11f0-9ab9-95dc52dad729; Fri, 14 Mar 2025 14:34:56 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by PAXPR03MB7950.eurprd03.prod.outlook.com (2603:10a6:102:219::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8534.28; Fri, 14 Mar 2025 13:34:52 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971%3]) with mapi id 15.20.8511.026; Fri, 14 Mar 2025 13:34:52 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 1e39445a-00d9-11f0-9ab9-95dc52dad729 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=xpmVCBylXIbjNVuIP9r1xrRHGGV43UN1sYS5+EPjJyg9wwM/pego8F60D3cRVFZDE5QgAjxAaIm62HnzLA1BZCvif3JtXVmjTGqUO1u1BJHCavxYD6/54Uuo+NW7q+Sc8rCwhjJ+KprPWnC8TjTffao9NjTYokgAfyy/kv6l3X6tvNL4yfcXUksHoYR7R6hsBbhnkVfprgU+bxTe671KefEgRfwi71BSuS/u1Fcia6ImnWnk0hWajSABKL2X89v7g/gUEKJOPfQRGX7GXuL2jVG3DG8/SWJxv9/sOBmmGNoxp83Bzg/iwA8TekbvRlhsiX9qhGAB5qY/vcCWi5iXyg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=AOnvZtlfUne5TYRjtHh0jVzbDwrE6SdxYlOQRFmecDo=; b=d0d1UseHvepfHyBdFHgWuRLs6Zgz4poBVdQNR3jQ/PsypGrvFf+CL+E5fMLApC7jHU+ws/aZrSNfTlcXXtg6aOj78e26vIYYhnTXgErpVY5BVt4R6u8Jm/PLj0bW6roa/s30C/fH+Y32p4MkYh/UEq2yfELZowtwV/4Nk0NOf+mTy3hqlNTnAbuoufUvE7cjFcYbtLRGOzlLN546TDvgkIzYHBPUzjY6wcZ6CbYq/KsL/9+MkSx2vpt709R7a7y8psVDVmFRIcyGs/9jFmrY6zJ0XNclmvJxUlv11hj+gCDRkqub1HHk+KugaWJ4d77WOWAWd0KzTAIoUYZZMPxW4w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=AOnvZtlfUne5TYRjtHh0jVzbDwrE6SdxYlOQRFmecDo=; b=aYLO/3YNz1941Se8wKmk0+Dd45dZuiHLBv1wY4zJqErTQHG53CD1wTFtqB2G+yTO4UuZQkBwL6TaJGNq1pvxJbYPKgFHbJki40Ddth59Qazg4/aHskTQX/b+/pXMWI15RBYRTZ2pY7AU/jeRMXmBFkofTTvld0/81DWQro5uM2c3ecTDp3AFtNEqpzsIBD1d8CTHFQ4slsufEqeK5OZguSxkQzbN8O1ob/Izc8S3AdqMEqeQNDbRj2QES5un3Ddljh3Bg4RMMLur96xUxVuArK8IjndUVZ34Q3PeNnsrK7uLGsVYSqtk+xz7ehDCXyErBnFNtcWXyKODGXRZ0AzZgA== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Rahul Singh , Bertrand Marquis , Stefano Stabellini , Julien Grall , Michal Orzel , Volodymyr Babchuk , Stewart Hildebrand , Mykyta Poturai Subject: [PATCH v9 5/8] xen/arm: smmuv3: Add PCI devices support for SMMUv3 Thread-Topic: [PATCH v9 5/8] xen/arm: smmuv3: Add PCI devices support for SMMUv3 Thread-Index: AQHblOXdhWilNcJfUUy0RIyqDgHtMQ== Date: Fri, 14 Mar 2025 13:34:52 +0000 Message-ID: <96dd4cb828377a5a09881ddb5ee5ded1df3dde1e.1741958647.git.mykyta_poturai@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|PAXPR03MB7950:EE_ x-ms-office365-filtering-correlation-id: f99afaf8-76f7-4f3b-c300-08dd62fcffe8 x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|1800799024|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?LxS6X98BoXN8icnEmLF/CdX2rWeahP3yZrMgDGWp1KOzKyio/FDtfrzSuI?= =?iso-8859-1?Q?vZ40CI4+QUiLoS78c803Av1r4gyTSu1u1v54c+/84BBcEyT9M75uK38U1i?= =?iso-8859-1?Q?V83f3unt892/ewbCPlO8PjvC2PcbT6iH+FJSJ4aL0VliiWoXYMPlNzhIOS?= =?iso-8859-1?Q?Gyd9hNlG23esVeftl4ZFQ1GMZgttwEnZUlOsocyVt6rdwCJVOXweTQ859n?= =?iso-8859-1?Q?2CXix0+4y5jTlLQBu6CwGGX01loK96d3AvzvVB7wp6J5qSrSiHj6FTNg2Q?= =?iso-8859-1?Q?ijqgRWN2MetkmlPpHCH9Oa0lCgYgby+fe50r87xA4hZUTuPX0YWMmMRQLq?= =?iso-8859-1?Q?8kuuvw7Xo9XO4adEMx09nKNaHFXMyklU4PL7oE6Jhyu4VLKxtjPW9zoqrQ?= =?iso-8859-1?Q?RKeFo4Ca8+dzVbyE7tYIwfSh5dMQZ5WEpZjHtenogX0ojhNfAXejbourwg?= =?iso-8859-1?Q?ruVr23Gh/7HSFxFObRyihdqO68Qg7kztOVw9ABVjnBfk131h/4GaniIXfl?= =?iso-8859-1?Q?sAXp+cQ86sMenXdM1zl2DlSX/bt2Oq2NLbKetxy2lFCPcs3juaE4/yK5mV?= =?iso-8859-1?Q?6eQmoVn92Mp+kWgzpniADNEB4hBboSx/Jmc80wZiLrnfe2eyVFqVra/zfH?= =?iso-8859-1?Q?h4g+QoQrjMkA5cC25kuQv7sWpKEgSQsrkpUMMZQk3XSdHxHbrOIYW0kv/7?= =?iso-8859-1?Q?kvpI/RfRau5wqlKF9XLdRxiSKDHJ/NaaIalmvQ72wNQxg7n8dv1vB9g4Rs?= =?iso-8859-1?Q?FkhH7D1sI+1a+ksQ0QYKOgpWwW4yeQAiVCIQUlOKPdFOqt83mWGaxEOaZ5?= =?iso-8859-1?Q?4AYa76+fZ62UMVaHmwxWbsAQoH59IfAxdcOE6V6LhZidd5EvZ+t08ofUqo?= =?iso-8859-1?Q?/ljl2hwvwIme4i3m2bbgRn7ZR2gsAkzTmZna4RLIN+CtA6d/5OlZ+Px4Uv?= =?iso-8859-1?Q?tOZQnNNBOSKuckSHu2mqPk+R4vnIyPP64myM/mgD2Fmw/g1nrsncIJVyS4?= =?iso-8859-1?Q?v5uk3MKfXjzfrhU9P2hZx8hpPIWQ1KkHPqbr+rjP6l4B5rgX/cdi9BbfRn?= =?iso-8859-1?Q?QFInZgrqQD5Wv1DwzCCEQGPZGSK6QVzmG9M/EoiZpFvVL3QZ/Su2zcq39C?= =?iso-8859-1?Q?4K4DzIwdqPyW7YTRsVpk8m0p7yEcDyAmGfz2qUAUSdbCtjaTtQbfRUfyPr?= =?iso-8859-1?Q?dy2ra85dnqJgAWubgjSnW+0pqiMQ7HsHtS3Pp51DWhK69j2FZhJJljnLFR?= =?iso-8859-1?Q?lZPndgilKXNZ/epa+dCTwvj023f45j/iPtMWKcagoDEeeeoUy8VOqPWbD+?= =?iso-8859-1?Q?iexlQqCkrx/x65zVEX1UOEIMojNWWQszpvVGpeAiDgFduPdlE3vNPg0rWg?= =?iso-8859-1?Q?olC6SXTNH9sPkhqaFnCEE1lo6cd/wOJ/C9srtfDJGtJIRoeFS4ogwsMwOZ?= =?iso-8859-1?Q?sO+ncefMPD5jsnQ7NFp78E5lcdmNYDmAPySYnmAHEVm5n8RWqnrM6xMEje?= =?iso-8859-1?Q?BwXfzBoiBM8BVrr6ilFoAE?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?ImtTEcvWP5ASd/gkv2MP7SlyUYJLyOlgogdVLjb8U8zmq53L/6B/4mztjh?= =?iso-8859-1?Q?7GVqubkFw8gDRYkaTtr1FdW61K04qmtRdq0VeXXhq44mkFpRn2s1WDT7tm?= =?iso-8859-1?Q?g2eDO5qjeKXRdS1YyfffoO4b8w7BRnZj4sF8LZiBQ4XFa6IKDs2HJLy70+?= =?iso-8859-1?Q?60SfFIYy76tuy8eq/mprFQcjaKvjridfTcpCaUNmSXmrc2DCrPo3eI9La1?= =?iso-8859-1?Q?5OjMAzFgVmUo2Ah0WAxGYmPxPoE2EqtGSbHWOFhedZg1UNf5X6R4VNfQX/?= =?iso-8859-1?Q?bcUeOvN2LK7976LE8hiP1Umy2MTlp+Rtca07HEy9SKEZxQ4j6+RAOHMbwg?= =?iso-8859-1?Q?6lK2eZA8DNqNTYk8i5WvhWOVF5JnJPIPOSAYfegCxj3XtLWimMT0Vvz2EB?= =?iso-8859-1?Q?4pQ0s9uI4J6yoIiIQt4+tiabO2YdLQWIlMsiKgsHaDj5/KRMt7TXQ8BXiV?= =?iso-8859-1?Q?52+nrMPKQsgSOfagJcruuObAHRlMMwm/M1zLlTsRnLAAkAqg+3E/tFwBU8?= =?iso-8859-1?Q?lauTfWNnSfXqJ3q/4q2A5MCxR0djuv7pYYXQZXUtLMmdktDlRqOO8yjxq0?= =?iso-8859-1?Q?ws6ifR4Q367YAN2nmdB/DK2jFROUJinQUNLEB5mRc9vKWor8YR0lmFrrQU?= =?iso-8859-1?Q?GiZS/wRCLXX4xw06HB/fTMjIV4rQjJCQxluFaKBfFSJT23fqeXDnIS4lFk?= =?iso-8859-1?Q?qfVUX6XYzav+rAn4UgQ1ubxqYNE3ueHrWmu7sxq+rnSt79zB+gv34+/nuX?= =?iso-8859-1?Q?xkr+yWlbZyi2mhIeSM4U7KIb5ZMT9iNt5sXfdMufr4qQyR33knM8pMcSkJ?= =?iso-8859-1?Q?ZOc/e1FmEnBQaLhRpUiSKbCpxMUcWEa8NNrPkFWnKmWGiS6jB6T28eZ7dW?= =?iso-8859-1?Q?ORvKJCsHb9MLIcpZ8edcSf/XGbquHAa7OcVG1QW9Z8rmWJmF4S8Snp2j8A?= =?iso-8859-1?Q?oLLSZLLitfqhmXPWLfKrjQwxXP7uEEudtb+m3i5baYzfqybK5MNn7Ics7P?= =?iso-8859-1?Q?mqXNfSAiamCG4DvXcq14CTUqAH0Jmrhlg9nhi0jb0hNeXirYoCRzottW8i?= =?iso-8859-1?Q?2mWLMlCwET6DoPCBY0lvWePaSfyWBwoebxZXFF8YURb7GsLaMQ/27LV2Zd?= =?iso-8859-1?Q?/pf+AgiiM3w3vKOlb3YYksgBZUdTKvS/ed9uiPH1Ak3YmOGEg4m+8iWPLw?= =?iso-8859-1?Q?LnkYE65v0OpX8WrlzGNy4skUheoUbkA1y9d/5xo5azE073AMGkMbICIKnO?= =?iso-8859-1?Q?JL39ottVlpsvEvr/j2nbyvJd1TNcMw49hFODPYrtf9KEYy/zyIoQhxEe9x?= =?iso-8859-1?Q?53YWyR5coKsdJgHwEyWu2gUoW6VefVwqTWnZtGegpPiBGr9YI5MJJkpMus?= =?iso-8859-1?Q?h1c5/CYEXQpMsCmB9ch4qydmaRShPCfD0D7klfJVcqnrpXgWoUXbe/LWl3?= =?iso-8859-1?Q?l3MmNUI1YTRoMGecYh6s1N7RzjijKiO9ehsFJz+iOwjanV/CK+uv6fAcPr?= =?iso-8859-1?Q?KijRyDeVAkOaaoxD3mX5xRgzhR2qt+7ZS/g7zi4bkc54PzsCuuZbVll5dM?= =?iso-8859-1?Q?iXazky/eIK/BEfeeD+WTYEoS6KJYGa7Kx9gMLQoKFmK7P9MzT1t//7uFUx?= =?iso-8859-1?Q?5Zra/vJdhd8kabWr9+2ye7jBqlN2/c3ojIaNSUg7kR4NS7D9t1VtTnZw?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: f99afaf8-76f7-4f3b-c300-08dd62fcffe8 X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2025 13:34:52.0730 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: Pt4DvFeag/tssF0DjfCSao0qsIVaQXSrqPsQFw6vrF1JVT+5fJ8HZymwLs0XsKKe7LaCJbw/b7R0T2yoDlxvrw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR03MB7950 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1741959322700019100 Content-Type: text/plain; charset="utf-8" From: Rahul Singh Implement support for PCI devices in the SMMU driver. Trigger iommu-map parsing when new PCI device is added. Add checks to assign/deassign functions to ensure PCI devices are handled correctly. Implement basic quarantining. All pci devices are automatically assigned to hardware domain if it exists to ensure it can probe them. TODO: Implement scratch page quarantining support. Signed-off-by: Rahul Singh Signed-off-by: Stewart Hildebrand Signed-off-by: Mykyta Poturai --- v8->v9: * no change v7->v8: * no change v6->v7: * address TODO: use d->pci_lock in arm_smmu_assign_dev() * remove !is_hardware_domain and pdev->domain =3D=3D d checks in assign to support future dom0less use case when dom0 is using vPCI * check if pdev->domain exists before assigning to it * don't print "" * change assign logic to remove reassign reimplementation * explain pdev->devfn check * make reassign check stricter and update comment v5->v6: * check for hardware_domain =3D=3D NULL (dom0less test case) * locking: assign pdev->domain before list_add() v4->v5: * deassign from hwdom * add TODO regarding locking * fixup after dropping ("xen/arm: Move is_protected flag to struct device") v3->v4: * no change v2->v3: * rebase * invoke iommu_add_pci_sideband_ids() from add_device hook v1->v2: * ignore add_device/assign_device/reassign_device calls for phantom functio= ns (i.e. devfn !=3D pdev->devfn) downstream->v1: * rebase * move 2 replacements of s/dt_device_set_protected(dev_to_dt(dev))/device_s= et_protected(dev)/ from this commit to ("xen/arm: Move is_protected flag to struct device") so as to not break ability to bisect * adjust patch title (remove stray space) * arm_smmu_(de)assign_dev: return error instead of crashing system * remove arm_smmu_remove_device() stub * update condition in arm_smmu_reassign_dev * style fixup (cherry picked from commit 7ed6c3ab250d899fe6e893a514278e406a2893e8 from the downstream branch poc/pci-passthrough from https://gitlab.com/xen-project/people/bmarquis/xen-arm-poc.git) --- xen/drivers/passthrough/arm/smmu-v3.c | 117 +++++++++++++++++++++++--- 1 file changed, 106 insertions(+), 11 deletions(-) diff --git a/xen/drivers/passthrough/arm/smmu-v3.c b/xen/drivers/passthroug= h/arm/smmu-v3.c index cee5724022..9c7c13f800 100644 --- a/xen/drivers/passthrough/arm/smmu-v3.c +++ b/xen/drivers/passthrough/arm/smmu-v3.c @@ -1467,14 +1467,35 @@ static bool arm_smmu_sid_in_range(struct arm_smmu_d= evice *smmu, u32 sid) } /* Forward declaration */ static struct arm_smmu_device *arm_smmu_get_by_dev(const struct device *de= v); +static int arm_smmu_assign_dev(struct domain *d, u8 devfn, struct device *= dev, + u32 flag); +static int arm_smmu_deassign_dev(struct domain *d, uint8_t devfn, + struct device *dev); =20 static int arm_smmu_add_device(u8 devfn, struct device *dev) { int i, ret; struct arm_smmu_device *smmu; struct arm_smmu_master *master; - struct iommu_fwspec *fwspec =3D dev_iommu_fwspec_get(dev); + struct iommu_fwspec *fwspec; + +#ifdef CONFIG_HAS_PCI + if ( dev_is_pci(dev) ) + { + struct pci_dev *pdev =3D dev_to_pci(dev); + int ret; + =09 + /* Ignore calls for phantom functions */ + if ( devfn !=3D pdev->devfn ) + return 0; + + ret =3D iommu_add_pci_sideband_ids(pdev); + if ( ret < 0 ) + iommu_fwspec_free(dev); + } +#endif =20 + fwspec =3D dev_iommu_fwspec_get(dev); if (!fwspec) return -ENODEV; =20 @@ -1519,17 +1540,38 @@ static int arm_smmu_add_device(u8 devfn, struct dev= ice *dev) */ arm_smmu_enable_pasid(master); =20 - if (dt_device_is_protected(dev_to_dt(dev))) { - dev_err(dev, "Already added to SMMUv3\n"); - return -EEXIST; - } + if ( !dev_is_pci(dev) ) + { + if (dt_device_is_protected(dev_to_dt(dev))) { + dev_err(dev, "Already added to SMMUv3\n"); + return -EEXIST; + } =20 - /* Let Xen know that the master device is protected by an IOMMU. */ - dt_device_set_protected(dev_to_dt(dev)); + /* Let Xen know that the master device is protected by an IOMMU. */ + dt_device_set_protected(dev_to_dt(dev)); + } =20 dev_info(dev, "Added master device (SMMUv3 %s StreamIds %u)\n", dev_name(fwspec->iommu_dev), fwspec->num_ids); =20 +#ifdef CONFIG_HAS_PCI + if ( dev_is_pci(dev) ) + { + struct pci_dev *pdev =3D dev_to_pci(dev); + + /* + * During PHYSDEVOP_pci_device_add, Xen does not assign the + * device, so we must do it here. + */ + if ( pdev->domain ) + { + ret =3D arm_smmu_assign_dev(pdev->domain, devfn, dev, 0); + if (ret) + goto err_free_master; + } + } +#endif + return 0; =20 err_free_master: @@ -2622,6 +2664,42 @@ static int arm_smmu_assign_dev(struct domain *d, u8 = devfn, struct arm_smmu_domain *smmu_domain; struct arm_smmu_xen_domain *xen_domain =3D dom_iommu(d)->arch.priv; =20 +#ifdef CONFIG_HAS_PCI + if ( dev_is_pci(dev) ) + { + struct pci_dev *pdev =3D dev_to_pci(dev); + + /* Ignore calls for phantom functions */ + if ( devfn !=3D pdev->devfn ) + return 0; + + ASSERT(pcidevs_locked()); + + write_lock(&pdev->domain->pci_lock); + list_del(&pdev->domain_list); + write_unlock(&pdev->domain->pci_lock); + + pdev->domain =3D d; + + write_lock(&d->pci_lock); + list_add(&pdev->domain_list, &d->pdev_list); + write_unlock(&d->pci_lock); + + /* dom_io is used as a sentinel for quarantined devices */ + if ( d =3D=3D dom_io ) + { + struct arm_smmu_master *master =3D dev_iommu_priv_get(dev); + if ( !iommu_quarantine ) + return 0; + + if ( master && master->domain ) + arm_smmu_deassign_dev(master->domain->d, devfn, dev); + + return 0; + } + } +#endif + spin_lock(&xen_domain->lock); =20 /* @@ -2655,7 +2733,7 @@ out: return ret; } =20 -static int arm_smmu_deassign_dev(struct domain *d, struct device *dev) +static int arm_smmu_deassign_dev(struct domain *d, uint8_t devfn, struct d= evice *dev) { struct iommu_domain *io_domain =3D arm_smmu_get_domain(d, dev); struct arm_smmu_xen_domain *xen_domain =3D dom_iommu(d)->arch.priv; @@ -2667,6 +2745,21 @@ static int arm_smmu_deassign_dev(struct domain *d, s= truct device *dev) return -ESRCH; } =20 +#ifdef CONFIG_HAS_PCI + if ( dev_is_pci(dev) ) + { + struct pci_dev *pdev =3D dev_to_pci(dev); + + /* Ignore calls for phantom functions */ + if ( devfn !=3D pdev->devfn ) + return 0; + + /* dom_io is used as a sentinel for quarantined devices */ + if ( d =3D=3D dom_io ) + return 0; + } +#endif + spin_lock(&xen_domain->lock); =20 arm_smmu_detach_dev(master); @@ -2685,14 +2778,16 @@ static int arm_smmu_reassign_dev(struct domain *s, = struct domain *t, { int ret =3D 0; =20 - /* Don't allow remapping on other domain than hwdom */ - if ( t && !is_hardware_domain(t) ) + /* Don't allow remapping on other domain than hwdom + * or dom_io for PCI devices + */ + if ( t && !is_hardware_domain(t) && (t !=3D dom_io || !dev_is_pci(dev)) ) return -EPERM; =20 if (t =3D=3D s) return 0; =20 - ret =3D arm_smmu_deassign_dev(s, dev); + ret =3D arm_smmu_deassign_dev(s, devfn, dev); if (ret) return ret; =20 --=20 2.34.1 From nobody Sat Mar 15 14:18:13 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1741959327; cv=pass; d=zohomail.com; s=zohoarc; b=BJn3EzDCH39u1Ib7PgW9t6rFkQcPXPXTOwfKmXbMaDYaAQEVxK1CXQaV/zcCF3QjtrDZcI8yqDZhkNoEah8faJ7tGmLcX7l1tYF7Q/TYCyKck2wo9lwe2YMYXSEmza8Toh0wZCQFoo9tV+rZWhLDtQJPXNjZbK/Tj2NJn7bxihY= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1741959327; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=pXb77dvoSIicJfrdR1ZABgIlCW7Hf5cEU2GUFGRcKJs=; b=VK3p8Ctlq7U89b1kfk4J1VPC6MWXqxwtM0NE8gRQXZPnOXuV/4JtVimGLNNMYCKCn+7cKKI4badO759yjDdS/JT6tUzrK++7e+g3hzZAHyvmBHsC/4fDqiC+JL0jYFblKAwjE4fzS9wtBrmvLdHD6XlwN19zrwYHsOvPhwOS4WE= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1741959327448357.3868926919321; Fri, 14 Mar 2025 06:35:27 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.914592.1320350 (Exim 4.92) (envelope-from ) id 1tt5Bl-0004kl-3Z; Fri, 14 Mar 2025 13:35:01 +0000 Received: by outflank-mailman (output) from mailman id 914592.1320350; Fri, 14 Mar 2025 13:35:01 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tt5Bk-0004jC-R9; Fri, 14 Mar 2025 13:35:00 +0000 Received: by outflank-mailman (input) for mailman id 914592; Fri, 14 Mar 2025 13:34:58 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tt5Bi-0003qF-Ij for xen-devel@lists.xenproject.org; Fri, 14 Mar 2025 13:34:58 +0000 Received: from DB3PR0202CU003.outbound.protection.outlook.com (mail-northeuropeazlp170110001.outbound.protection.outlook.com [2a01:111:f403:c200::1]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 1e96aaa1-00d9-11f0-9ab9-95dc52dad729; Fri, 14 Mar 2025 14:34:57 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by PAXPR03MB7950.eurprd03.prod.outlook.com (2603:10a6:102:219::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8534.28; Fri, 14 Mar 2025 13:34:52 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971%3]) with mapi id 15.20.8511.026; Fri, 14 Mar 2025 13:34:52 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 1e96aaa1-00d9-11f0-9ab9-95dc52dad729 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=n2FX7YtnXU26EmXw/Wcq3gqtxohaEsdOEEzYUihSEr2JptRQgcsbs0OPkU2TFZMMn/iKP4WI15U7+W3WsVzzObqMEMSdZMMKZLQy5By40j8SyB2S4Oru9qHrmxcA1FLF/AlR/vdI5J+k30jBleuWjgxgKFdxo2RvV5dZnPcoVEruW4s+g4uHWaLSln5CnpkDEKGJFkm5sZ5hnPgstV6OAfQ16Kv+CPAR6MJngBM07GscMISgUGNnlCCpaeVo1rtHAE5btDEjLz5PztUDSsOedIXNbjWDgp3VaqOO2S/5pUr+SofhLCURFz9bwQxlRilK/r4K6STMYgAIPSHo3YvHlw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=pXb77dvoSIicJfrdR1ZABgIlCW7Hf5cEU2GUFGRcKJs=; b=a70Z1vhPh9s90UPkohH0swHYYL09a60pav+8rLKVcvlDKAp6XeBT0mSdCP871BmN+Jnzh8A8YFmzW58Z1NRtC1aJy2+2Y4cnUMQT/eqQTatpHDNvpZsWqYO8n/1yZ62N2x1h+paK6i7L5ZfTL16H4r0AZAFFHq7iUheEOcFfEuXIw3y3Hm0QBIEJ0Zfz06DVZxIn2mdF1sYViWLedod1VYlDC+bn3FSpSwvjv/2vhK9d9iPlQ/waDPPPuLvzKjzmJHNnZQjYebGYJBKh4OggAc7OYK56SylnJ4xSGGhDOgQlw38Zzy+9Yf7gKEOUqXQ8YHCYY3DBjW28ajs2vXeFWA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=pXb77dvoSIicJfrdR1ZABgIlCW7Hf5cEU2GUFGRcKJs=; b=L51lqS/Tig8lD0J+hSSBEG/AntrmeIP+gGpDk56gZxK/bFU6xKefHM0I3Z9o0ObZFtuyNAMWWahVySjLIDXcpKXfnxLai800XKWFsy5glf8MX8M6bksyxuY1jAXMkanQq0KV+3858w+TcThcFVrZd8m1Kl9QzrBzxH0iO9wtwJBI8GQMSFD/kPJ98Zzm1G7aQdL+DrGh49db5QMzILhzg0bgTTvPW5oE2vhGfJRza7ZM80VH/vxopcMGhus/DNvbY94FxMHNhNA8wWuZr7F1DQsbDuelGVRnXnUI3JzOHYz0oze3InLMKZgBLRuMq9RvrjEmRMQrtTjkK3Uura83Ew== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Rahul Singh , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk , Stewart Hildebrand , Julien Grall Subject: [PATCH v9 6/8] xen/arm: Fix mapping for PCI bridge mmio region Thread-Topic: [PATCH v9 6/8] xen/arm: Fix mapping for PCI bridge mmio region Thread-Index: AQHblOXd3SOsXym3+kS43vL/VEJ0fg== Date: Fri, 14 Mar 2025 13:34:52 +0000 Message-ID: <06c0eae067d00df58a47dc1506d8624c8ebc52d5.1741958647.git.mykyta_poturai@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|PAXPR03MB7950:EE_ x-ms-office365-filtering-correlation-id: 7b8a5f84-4a62-4cbe-0f18-08dd62fd0022 x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|1800799024|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?G3iGtIpdIrtKpnYlLn4R95JUAsGTn0P7BY0Hy2jFrDcYfQIwaePmNdPJ/z?= =?iso-8859-1?Q?HAnhxS6gEnTUR23rQMSj18VaCvvGiyQpvKEI+h9LoDAIf/pab4+mxqSDBB?= =?iso-8859-1?Q?WpGiCPIVYIioJLNPZojRpjyyHIONMs3kLtnlLUFuBiUqHHQsd+pe9MSbXZ?= =?iso-8859-1?Q?Zs/4LRB/HoH4j7pom0rODcrccAVctCE5jazCgXHcBZ4XXuJK+BDZqDAIC1?= =?iso-8859-1?Q?pTW3T21SH95ykPwQ9IW1vl4+aYzvec9qnN7J5dxt0BcpkBQ0GXRlJChq+Z?= =?iso-8859-1?Q?mhm5DavJk5OkT5qx2z+PHQEz0VVL472x1LWKb0kcZU0pLWtNwTUSUI/Ih4?= =?iso-8859-1?Q?6wJefhRcXcXqVjX74Jsel7RicaC94003cSOEyiqKAcvOmBfzE/3stwGtlQ?= =?iso-8859-1?Q?FH9ZzfIQ6mHr8KVKFNs2XpIrx1jYja98Ta0YPnlDhZC5m5f3NJegviPf/u?= =?iso-8859-1?Q?+LYSxbr7M+acqEDnUwQd5mDJUD730/k9TxJNdXryq7IIxizNVpe7GlkI78?= =?iso-8859-1?Q?vjcDijRw2jpywyBq555gHSwVAoEa6xJYgs0XNVBqvyAF1dJxaYC3dEL+uj?= =?iso-8859-1?Q?KrT4FXCwdycWn4bh9Dc3aO8/sX3VmiwAAGgdcpPaTNuwELKNYLr5tC7mXe?= =?iso-8859-1?Q?mX6Bli4GDNRN6SSqs7QTGp+gW8pnwNfDMckFG7kWR3ZtLSlvL6h2gG/JLF?= =?iso-8859-1?Q?G2eYzvnlA7L6CoRXClgCaKiXtVg7aFnvD7FTtVWxal4FfqkhxadOuiZ440?= =?iso-8859-1?Q?+T9QiRS1mi1OMfdNSh1X9w1bst4/j0obNyi7fePeqNMywJQlNK65JgOSmt?= =?iso-8859-1?Q?HYKhxMVZLo1Kzpx/6VGYjJIvzoWNBvPWiXsQ3SG/6wDHMAp7N3fYlQvVFa?= =?iso-8859-1?Q?ZdNxGHao80E3BcUr8+IY22yHW0e0TbYvDj+azLD5as8cRNgUlSzXxi1Af5?= =?iso-8859-1?Q?KeeUsiY6Ysw8uu6/702XZ9YDRR+1bLB82HulkL68aXhmI0iMQT3b7Dp3BQ?= =?iso-8859-1?Q?ETDJIpnl4fWd0/QNAWkQc8rQKDA3yq0LvCmWDiLPI+Q5D+icZTtdlo+W/y?= =?iso-8859-1?Q?QG9NJmo+BRRvBvCofJ4V7VbToCztRT+My2otDa+GYLyhdHCV3iIuc+8wOK?= =?iso-8859-1?Q?KlQtLOYa615wDgjvgd30Gc+v+epLzo50y0DH14MJIyxi8BHOt13Y3MonjI?= =?iso-8859-1?Q?bW7GRzTciGojTOl6WilJeGLuBZ0YTY7ZxdbGnE3jUNx8CTUlnQBK74X9XW?= =?iso-8859-1?Q?RuFRcaUNqRZoMcDhLhQNYE3sFdUlH2eRrJNsgNXhiz0ZoJ+DqOQQ+hSp0E?= =?iso-8859-1?Q?ScCcM2uneXBfR+67Yoy3SU+gfBUhw8BqcsQdw8cJPyq0edU4Du5HVn3uQu?= =?iso-8859-1?Q?htDzejwlBEnbIrpWcYt+e94mV3XsMvj7PBnsvtTApi9Ky9SlUdZJtE2vk3?= =?iso-8859-1?Q?2Fp+vFdBgqMRl89Udupqu5zXDj++BN9mA+lR+FbrW1PsH+TII5A4gN3UxT?= =?iso-8859-1?Q?zsfipdw+UVFF6Wlrzde2p+?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?MQcZVenzu2tDSneANZom+omF8QOyS7t5FEvHhQ88txaK1eUn8EqXQs9W0x?= =?iso-8859-1?Q?VwVz7HQcvVDlee4cfFrLoSlm7K+emflsE97E/PBKK2FrXYrHFqsiIabviG?= =?iso-8859-1?Q?V12XbqqC/Q6Xbe7pUuvqg+0vr6isjS5tcuJgZspzq75JWRremsagV8v8hY?= =?iso-8859-1?Q?l1Uj3V0GNKCDcwc7Eu/QmsgaH2pCONxoII9rh+odnjMviFGIWsAzogjf0s?= =?iso-8859-1?Q?27Z51CtfuI3x8nqD4aWZOGauz5L6wSX/CUpe+aVqKETEZnGhUCDcdCWsFV?= =?iso-8859-1?Q?n3yF4JyYGvJgzu6h5sOt8x0PO2Rzq34i4UYyaHTUlOSSMzyb+oXwElcZgN?= =?iso-8859-1?Q?9JJKLN3BuGR8Fjt/nFrwKXfAJyj5E9nahhchdFEf0C/WGqWzJl+VsEdE56?= =?iso-8859-1?Q?oaXCLykq7jTk+ignfhq87DTNjDKo0LyW7c37BXGW+EpPpRGUmRBbxiyPH4?= =?iso-8859-1?Q?W8BoBBwaaAyz09GQusE1DmzpqT0z02VHA2biW06hYCOiMa0qHv5lgA/D5h?= =?iso-8859-1?Q?qkprjR2YvldHouHB3PgEm5X8y5Q2woG1Pm76IOlD5RJQ1nT7vUgLOO7L76?= =?iso-8859-1?Q?mJrSyCDFR9e0Jn64/rC9ERVoghb7yxF2O5niVC+tUpxBIVjycSIU4n7iPw?= =?iso-8859-1?Q?VPjx39HUqipYH0MHYOVqURUZNxEcXmG2wmN3cuBdgRl9IzhfSkYKQdKiP7?= =?iso-8859-1?Q?E8/vMBU61G8jmXvdwzqp8GcP3oECo9LaaO0/nMuDzSQ/E7y/btunwLkcd7?= =?iso-8859-1?Q?mm6HZojCItCJwnciH3c5ZFTQ4IXAcBVVT1wT5pHl0msUTWEq4jmfaAACql?= =?iso-8859-1?Q?OjcUFSwHOxI7xW3DZLCw3vsr416BfRaGv8N/VQzFSIk+3qZuPDW/aGlfCB?= =?iso-8859-1?Q?ghJMlDfkq/SiuZEort4ZHvhJWxy5OGxO1v/J06XxMnjzVX8x24ik5opP8I?= =?iso-8859-1?Q?cmMEltGrVbAJKuPph2w2nFitdLnpulkgIAIlZR+PCMZCJ4/YxBMDmdzvjj?= =?iso-8859-1?Q?0rewvn5KPnSrIEfIYrXP3/szinG86HOHTFkFUTTnFplbQ6eYUBkGSI4xmQ?= =?iso-8859-1?Q?xQRL7NVDd9/N41isQ1/ZSjLDuec61zbk58rwcM4K+9fleaoWz3w8ajwQu1?= =?iso-8859-1?Q?DxErcgqE+cbN1jZTyOc/Dm20yuPS0ANECgipT0CPQRfZaUwgIeyhQrte0E?= =?iso-8859-1?Q?oE2Co4/7nV5BofJdAItrWNxjA/dLlywTEiSVVh6xf0rVOU8w5ey3U3Dmdw?= =?iso-8859-1?Q?GObN+n5/lThDqI+KJwJQzJ373Us1OTEA+AndXGeBXaOVFxRxzQ1JFJDtl2?= =?iso-8859-1?Q?Ez7Qxpo2pGz1/2oKCuRES/5La2mjZt8AdevmL0FhbEcDc9k0hDyPGUL3MR?= =?iso-8859-1?Q?OTPbQt7DPkEOCe/RIJF6g+rBaohOxMJV7o42kjKeo//3tAu7spVFQSD9eG?= =?iso-8859-1?Q?77Je4nGPCGnJOsD5iABzYpI2BRCDwV81xbr4eAY/+JTZVaS2YAJ3229/vM?= =?iso-8859-1?Q?ISxYdDSfnELAU0dJXiy8/tzomCaIv0dEpczXtAMF0AqWe1sDnl5+EDvJ56?= =?iso-8859-1?Q?v4ixBjLk/7KZH01JSO8YKikYsbpz+owPVwOQYzCuXJXmZkJLKFKPNLpWBo?= =?iso-8859-1?Q?w6NeAXNIptyNj7CDYwUAD+VGDaKs9CIiMD1C2ZCf0dboVo6KR8eyU7LQ?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 7b8a5f84-4a62-4cbe-0f18-08dd62fd0022 X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2025 13:34:52.4598 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: evY0Ns7NWZkJvQYir3T4MxmZN5ZFhf6+J6rRB4y9dP/n1EEDag4CXpCDOPFUYHdTPOm2z9GFPvR8hyjX7Q5FGA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR03MB7950 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1741959328628019100 Content-Type: text/plain; charset="utf-8" From: Rahul Singh Current code skip the mapping for PCI bridge MMIO region to dom0 when pci_passthrough_enabled flag is set. Mapping should be skip when has_vpci(d) is enabled for the domain, as we need to skip the mapping only when VPCI handler are registered for ECAM. Signed-off-by: Rahul Singh Signed-off-by: Stewart Hildebrand Acked-by: Julien Grall --- This patch was originally picked up from [1] v8->v9: * no change v7->v8: * no change v6->v7: * add Julien's A-b v5->v6: * drop unrelated change in xen/arch/arm/domain_build.c:handle_linux_pci_dom= ain() v4->v5: * new patch changes since picking up from [1]: * rebase on top of "dynamic node programming using overlay dtbo" series * replace !is_pci_passthrough_enabled() check with !IS_ENABLED(CONFIG_HAS_P= CI) instead of removing [1] https://lists.xenproject.org/archives/html/xen-devel/2023-07/msg00483.h= tml --- xen/arch/arm/device.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/arch/arm/device.c b/xen/arch/arm/device.c index 5610cddcba..25847d60ee 100644 --- a/xen/arch/arm/device.c +++ b/xen/arch/arm/device.c @@ -268,7 +268,7 @@ int handle_device(struct domain *d, struct dt_device_no= de *dev, p2m_type_t p2mt, .d =3D d, .p2mt =3D p2mt, .skip_mapping =3D !own_device || - (is_pci_passthrough_enabled() && + (has_vpci(d) && (device_get_class(dev) =3D=3D DEVICE_PCI_HOSTBRIDG= E)), .iomem_ranges =3D iomem_ranges, .irq_ranges =3D irq_ranges --=20 2.34.1 From nobody Sat Mar 15 14:18:13 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1741959333; cv=pass; d=zohomail.com; s=zohoarc; b=ENCH2uYNt5vJMhs0G6xsznWJbTwwYGmXHIKftNKjnOqWT7mxiVjtN+VjmRiFn/C6svMuEC5mbccFL/rXe3Za39Yo3nx3viH0M+AwcyYZ/dqa/H89LNhoJwlNSq+xcOpHQSP9f4JymKa5JF7dN878kdJhAcHXPuEBNb4O4AncLu8= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1741959333; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=EaRGqv75WxAf8THVDvfxaEKJIBwr3hKe+EXX/PX1zC4=; b=gByap5t4fV2yvZuxyIJusbEd/3j0MkeKM3ZmI+DeSKjDGWrF+2HLQTI+4uZOIdNRKgIWUhOlfJRWzUwBioBgBkvZ0wCFNM5HZGoUY1qLWp/Lr4pXIdYz/GGq5XM2dhuwgawFfV+U2nieNQdvK27RMDTewzDoMwRRc8uU7o5YPQ0= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1741959333696121.35103792018413; Fri, 14 Mar 2025 06:35:33 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.914593.1320361 (Exim 4.92) (envelope-from ) id 1tt5Bm-0004yN-1W; Fri, 14 Mar 2025 13:35:02 +0000 Received: by outflank-mailman (output) from mailman id 914593.1320361; Fri, 14 Mar 2025 13:35:01 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tt5Bl-0004vu-MU; Fri, 14 Mar 2025 13:35:01 +0000 Received: by outflank-mailman (input) for mailman id 914593; Fri, 14 Mar 2025 13:34:59 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tt5Bj-0003qF-In for xen-devel@lists.xenproject.org; Fri, 14 Mar 2025 13:34:59 +0000 Received: from DB3PR0202CU003.outbound.protection.outlook.com (mail-northeuropeazlp170110001.outbound.protection.outlook.com [2a01:111:f403:c200::1]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 1edd2130-00d9-11f0-9ab9-95dc52dad729; Fri, 14 Mar 2025 14:34:57 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by PAXPR03MB7950.eurprd03.prod.outlook.com (2603:10a6:102:219::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8534.28; Fri, 14 Mar 2025 13:34:52 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971%3]) with mapi id 15.20.8511.026; Fri, 14 Mar 2025 13:34:52 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 1edd2130-00d9-11f0-9ab9-95dc52dad729 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=H17FcS0p92UXBV10OqnDNtTgPDr2ST/w9wjWjMGsXZkm28n3aIsWQlfIc3Viq4Jhm0gdZlcBb+VRfTYvwFxd/7lOHtmk95yrRCN2tvtncFxpnLMesj46quc+Z31LzmprqSg4n1kqHDAY6OWHT6mATSNcS7cZ4kUhm6TBvM79Wx5zQe36uKDHcQ9DafNkAfcy2Fh7vGzo9BE9wEgZXnkmd1RWrsHIO33YHh7X3uANlOJRngee/vnBR9jA6eDdSRf3Yx5ha7kdAoThoBw2khDQPzrgnZKzzeUNZAhsLCu3utfFcl0mc/t1k3hIoEYtWcS3H10FO5UP4zxQtN+8CNIPZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=EaRGqv75WxAf8THVDvfxaEKJIBwr3hKe+EXX/PX1zC4=; b=yJipVeqWxemi5sczUOZUJ+dqoDZNELkOtb3A5h7lthZ6qB0qAtob25X+BsQZDpRazabXi+u/AU6rlTzobTGwKkFoplUii5XsUVs/CDewgb/qcnLzQRYr7yAWpEyZyApY5+eDM/bI0czIpwD420fG/qquhDfFBYh031OuhBR55NjBruIdRgC2FcUhmSIJFTmnjN94F89iajlzbjorLATU4twhaC72AS/fiWs9uk7gv3DuZPQoTROyC2+8Nxgb5zyG+VzQHdlx7tpiO19KP7l00fAgF3wUYThkmCXiZMOtXoh8IFk1o/4NbLsnmLsGadQiUBbxkMqYzYmonnSW7DJpyQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EaRGqv75WxAf8THVDvfxaEKJIBwr3hKe+EXX/PX1zC4=; b=iTdSeSVHjsulmiOTZyT8Vz6fnS2wWi1JswO4ElWc8Ou5T8khlqtYoam0ByQS8mPI7/F9bsgsET91hfwENwieORXVSkXtWlA3vqPJR6tmReSdRuGoaUpeFCaMN4lr8/uO7aQjUCyGTeXcdbxelsMHdLSWblqrdLlNP/t91+blWpcoJsywskruiGY9gypKbyCrV0ggfVkDPx9sCCZ+1WuDyFl1vkqut7BssfRR8KqprvopUIMm82bsu/StSgV0ijYw870mXhQwX2oZWrqwCrk7u2xPt7GN5OelqJTYAMfLbq9gmaH/3a2oNZTDNesq/M5U2Lc10jntWgRgwxzKSL+79w== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Stewart Hildebrand , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk , Andrew Cooper , Anthony PERARD , Jan Beulich , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Mykyta Poturai Subject: [PATCH v9 7/8] xen/arm: enable dom0 to use PCI devices with pci-passthrough=no Thread-Topic: [PATCH v9 7/8] xen/arm: enable dom0 to use PCI devices with pci-passthrough=no Thread-Index: AQHblOXdxbIbbkNtn0WSg/9tW2OJ4w== Date: Fri, 14 Mar 2025 13:34:52 +0000 Message-ID: <132afbca390edd6e9fd7b1ffacf6c5aff0d29aa7.1741958647.git.mykyta_poturai@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|PAXPR03MB7950:EE_ x-ms-office365-filtering-correlation-id: 3e689cb4-be74-4205-7ca0-08dd62fd0051 x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|7416014|366016|1800799024|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?623gYspX7xb2vep0uxzy/w6XEvNd3qnZq96K7y0pF0goF/3YT7DI9gLGpW?= =?iso-8859-1?Q?OQbTIWJHdw3Dgp3ZriNJGc+CaYATU5h7d3unWOQbEdkZLWZr3ddjfkNen/?= =?iso-8859-1?Q?ALXYXAl6nXL82fs9XgcRictEGi7S0ufznJJD6+BLEaR7ifeebhT76KMQ6G?= =?iso-8859-1?Q?Ec70bIKmg5tjg2BGei/yu53kAmqg0ME4GyH/aPDY47gDPvIyf/ChsxEWAA?= =?iso-8859-1?Q?u+5deSKMEMw5A9Ym6sEFmDnAntltblIQ96hnkzdDOE3DZpzRTkEhzys6R1?= =?iso-8859-1?Q?G9lq0dYqhlWgSnUPrVexqjafPgQG+eew4axlEEtrSXi8yCLiMj5oRfvCwh?= =?iso-8859-1?Q?YYj8LjQ9yUWlda/EgBsl3UO3U71+VgjupPsOOKoJ6FHh0Y80Qx/q7MV7tO?= =?iso-8859-1?Q?fFWPfl+IOFFFxVxbDwYuhTTv/6wZb02PQ8Zx2nm8nGXBjq8Lk77sgg58lg?= =?iso-8859-1?Q?XZieBmIqXO8fNmB/BGddnbPvNMMV7uVpg1kggA5HoqPn8Lw21b9YbJidEl?= =?iso-8859-1?Q?v5uek85kd2Cmp8OERrHcR4ftnC2J9ThAotmns1eFkexWJ7Ze1LBtQpAysl?= =?iso-8859-1?Q?Bp8g/yrl5kUW997gcKUudZNDRgxyLIyyfzMC3paW4JWLRiddYxCRRB5V9Y?= =?iso-8859-1?Q?HrQHU6M8pYEDA/sDvuoYg7oEAyQ96hUjpgKjmHQ5WuVFsNNNAlvkna5VBn?= =?iso-8859-1?Q?vQHdg6L2GznzWguZZXM5wKT80qYe45L2iGKhdem7oOVwI724VCLiLvlS0F?= =?iso-8859-1?Q?gYGQbys5Q7uRqzxlUl9d/vuE4K1iMR49SJet5AXalvC/Ftqtwkgyy0azny?= =?iso-8859-1?Q?1i6Vd+jasOZjSpZYtJ1O6tUjxnE+Z2f90OXNsaCpAZRVkGVMyE0nqogrDe?= =?iso-8859-1?Q?29pcQd76+Upgcc8PodPONhosoFSapVi9OrNg/OjbSrrnq4rzDoThsHKEpg?= =?iso-8859-1?Q?geAC6hvg0A2EKf3f4ggEXXergEyCMS53LkxWxkqYTbl9D4sgIPee76xyga?= =?iso-8859-1?Q?C9O9Thcyk/ig2ZiYGPCmkQTUoTWc5dMwYiSgP9iYWv7FZ3Uwrps8G71GPX?= =?iso-8859-1?Q?H+KuW2dl/s5mp+oAPdK0WAT4ALKaEAyqItL9QN8annHvaDXROs+RS783CA?= =?iso-8859-1?Q?7sBwUkrr+2J2deVLpWrLOA2ZhDdkaaW3TVEj81G+zCBGIMKEvgfOehtdCX?= =?iso-8859-1?Q?IZs9c6pS3ogeObHhe/bT/rB9wjuZdG0fVFfkvb+WOKFZ2xeI8IwjrkCDYV?= =?iso-8859-1?Q?KGN3g/54HrNZD5cQNM1zK8nGwDbmGEA/gQC8JQsxRhoTR7U4/1RwOMiCvo?= =?iso-8859-1?Q?Fqm5Zd8VreN2h/4oY6cnFxiHgsgubER/Fok3nmK2A2BnfozB8rvd/XYc7f?= =?iso-8859-1?Q?o9ORps8eN2Wrv7+dFUKlfJOHcTvakM6aFFsz9rGqlK42LcbZkv69l5Pdn+?= =?iso-8859-1?Q?9xlrh8GPMoJLCXK3VQpdMIj4GArdI+BqqBQ07CMSDTb0dTlY/O1lu2MpH0?= =?iso-8859-1?Q?nYbTjaTHi0/8N3EqH3cEXK?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(7416014)(366016)(1800799024)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?Lplortc0chmLAfVv/vDeG5DkcR+5jWx4NVCPgy4mPiaUnHAhGF5WUngI5I?= =?iso-8859-1?Q?waMe3oqugDYZIrDI2ZwIYOLWCZV3/UxbPlYLxpfcmoutg7CFkPXziGaHi9?= =?iso-8859-1?Q?pZORQdsv97L2R1umS9vUtCt4ugaizy1KAUl1KWIGluDzijv6G7GuPwdipz?= =?iso-8859-1?Q?eSiwenszco86+x3L3QYrwhbsXpn3uOh71qOhLlg+TUVxona5dGovdSQqqa?= =?iso-8859-1?Q?vNrYgarapaZ3xv2KlMPUTViabp8+5Zvo2wvOL2AWMLp6GOdG61jZAZhJbC?= =?iso-8859-1?Q?GOFfPAtNua1tRHjMfpHqABxVAeoEo1/1QIXq0lAJboPAlFlCNJMnoUty+g?= =?iso-8859-1?Q?0/EkJfNJa6KBjBcWNED1HKliwZEhOsn399oo6i1WwF2+rQ19bcVUDfQtFz?= =?iso-8859-1?Q?qScEw6/ws5hKgwmUZnMfMaYT0z+UohEK3rMqLZref/8TLG+bKGv15s5t9A?= =?iso-8859-1?Q?ASqdm7h1EFuHi7d1+difutFnIcVBMZU8QLI8TKZacWbn/NYI0ilKijNiwK?= =?iso-8859-1?Q?xLe4fFZ21bOwtz99fiduWdeZisjpJcoLaW4QeFlkorX2ipbBhwLn2QSHk8?= =?iso-8859-1?Q?TqDw8kB+Ft4GGjnpumPJEkxMPJ4h1dhhQaBX6NVbg8APyTh7xCNTZ0n5zO?= =?iso-8859-1?Q?YFq/JYcbWwU1L1A+K48+fi7fcUhzYmhDWZ1cAxyzxWd3BxFNEyas1Rk4fP?= =?iso-8859-1?Q?b8hzlf9UBgnehWFpm1rxqAY1JU42IH+Eieskgae2AhjJxSxt9rFtVPHcbS?= =?iso-8859-1?Q?miUBh9zF9zjfpuypAv2oFYu1awWsVCQJS62OoLJaku84QMvHBsXFzWjtZx?= =?iso-8859-1?Q?QsdTF+JDVqAEjnY80WzOdT+DXs6dxB2AY2zwT3HI2PReaLEy1HvrpEaZpp?= =?iso-8859-1?Q?Hzd1CgHWHKdVKZxYYgJWHcFsIL+Gc3IKrsDaFA1twhMZU7/ZA6DNPZjjFn?= =?iso-8859-1?Q?NBjDoXeIB31+kuLDJDs2ZnexLdAGmC5oNAzks5ZAOQDMmEAex4Yvf+cOu5?= =?iso-8859-1?Q?CiJYVv3XzSR5EunDNBML/ilgpRd/3Qv75/BSQt7vatjriil8DTRFtBV0zc?= =?iso-8859-1?Q?Vlp7IW0C8uH4HBMQCSW6i2bhYeJMRRgURWTUQiJVI0PMzAiAwpMIwLAn+4?= =?iso-8859-1?Q?5Klb3+nYDsh3DYHAmvFv/PwyIM1P/xSvs7iGVLVzocXXwGD3O+TS+gYX02?= =?iso-8859-1?Q?dKwfSSHiWFzHwVrD9thOzn+UtDG404nt10+byDZxk7+q8VFJMk7m+Jql/F?= =?iso-8859-1?Q?t3WmICyf5Vxk/DwUnDt9mRgGBLEMPP/G23s4mh3HoKEqA2EJnOCHYVxU9h?= =?iso-8859-1?Q?eBHQ9wrK2bpIRerOIITanZN9x/6nCxWONzddfwztkNwV/kwcJUN8BCUt8T?= =?iso-8859-1?Q?NOgVdBaBxkTKzUAh0ivpnu2/TcDg29YugrgYsrMEuhhs/lldmBDIVbTWbr?= =?iso-8859-1?Q?Z50fDDf6H2au+lnwV0GQjRv4os20pmVnX5o1JKiHc19ryH5+pHdy2ZO7X/?= =?iso-8859-1?Q?WUERj8miOFr6R9jiNOvW8aWeOmMmZHS1Yyt+h61tOeWD9buahLrbOUivvm?= =?iso-8859-1?Q?YRzZWkijgVhEOTok0SvqeyvlTAV72qf3JWDKi9FSOxSEopKfl/jXdi5ibp?= =?iso-8859-1?Q?vj48Ewm56zKvWZTwibaX16TRerMdp33g0JIGUwNy21cHIB5VstN2TrKA?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 3e689cb4-be74-4205-7ca0-08dd62fd0051 X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2025 13:34:52.7943 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 1sGrimxQX2RPkBZg7yYF8RXmuEKGmeHmK58SGOHE3AOK+ZwUbXjXDe0iu/Vi/NfR6xffKbRba7R6LqA/DiI9hg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR03MB7950 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1741959336758019100 Content-Type: text/plain; charset="utf-8" From: Stewart Hildebrand Enable the use of IOMMU + PCI in dom0 without having to specify "pci-passthrough=3Dyes". We rely on dom0 to initialize the PCI controller and perform a PHYSDEVOP_pci_device_add call to add each device to SMMU. Enable pci_init() for initializing Xen's internal PCI subsystem, and allow PHYSDEVOP_pci_device_add when pci-passthrough is disabled. Signed-off-by: Stewart Hildebrand Signed-off-by: Mykyta Poturai --- hmm. Since dec9e02f3190 ("xen: avoid generation of stub header") Should we also move is_pci_passthrough_enabled() back to xen/arch/arm/inclu= de/asm/pci.h ? Not sure if PPC/RISC-V will plan on using this check. v8-v9: * move iommu_enabled check inside is_pci_passthrough_enabled() v7->v8: * bring back x86 definition of is_pci_passthrough_enabled() v6->v7: * remove x86 definition of is_pci_passthrough_enabled() * update comments * make pci_physdev_op checks stricter v5->v6: * new patch - this effectively replaces ("Revert "xen/arm: Add cmdline boot option "pci-passthrough =3D = """) --- xen/arch/arm/domain_build.c | 2 +- xen/arch/arm/include/asm/pci.h | 5 +---- xen/arch/arm/pci/pci.c | 11 ++++++++++- xen/arch/x86/include/asm/pci.h | 2 +- xen/drivers/pci/physdev.c | 4 ++-- xen/include/xen/pci.h | 2 +- 6 files changed, 16 insertions(+), 10 deletions(-) diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c index 7b47abade1..fbd6db9438 100644 --- a/xen/arch/arm/domain_build.c +++ b/xen/arch/arm/domain_build.c @@ -526,7 +526,7 @@ static int __init handle_linux_pci_domain(struct kernel= _info *kinfo, uint16_t segment; int res; =20 - if ( !is_pci_passthrough_enabled() ) + if ( !is_pci_passthrough_enabled(false) ) return 0; =20 if ( !dt_device_type_is_equal(node, "pci") ) diff --git a/xen/arch/arm/include/asm/pci.h b/xen/arch/arm/include/asm/pci.h index 7f77226c9b..3ae85b4666 100644 --- a/xen/arch/arm/include/asm/pci.h +++ b/xen/arch/arm/include/asm/pci.h @@ -111,10 +111,7 @@ pci_find_host_bridge_node(const struct pci_dev *pdev); int pci_get_host_bridge_segment(const struct dt_device_node *node, uint16_t *segment); =20 -static always_inline bool is_pci_passthrough_enabled(void) -{ - return pci_passthrough_enabled; -} +bool is_pci_passthrough_enabled(bool dom0); =20 void arch_pci_init_pdev(struct pci_dev *pdev); =20 diff --git a/xen/arch/arm/pci/pci.c b/xen/arch/arm/pci/pci.c index 78b97beaef..79bb8728a4 100644 --- a/xen/arch/arm/pci/pci.c +++ b/xen/arch/arm/pci/pci.c @@ -16,9 +16,18 @@ #include #include #include +#include #include #include =20 +bool is_pci_passthrough_enabled(bool dom0) +{ + if ( dom0 ) + return pci_passthrough_enabled || iommu_enabled; + + return pci_passthrough_enabled; +} + /* * PIRQ event channels are not supported on Arm, so nothing to do. */ @@ -85,7 +94,7 @@ static int __init pci_init(void) * Enable PCI passthrough when has been enabled explicitly * (pci-passthrough=3Don). */ - if ( !pci_passthrough_enabled ) + if ( !is_pci_passthrough_enabled(true) ) return 0; =20 pci_segments_init(); diff --git a/xen/arch/x86/include/asm/pci.h b/xen/arch/x86/include/asm/pci.h index fd5480d67d..bffeaa507d 100644 --- a/xen/arch/x86/include/asm/pci.h +++ b/xen/arch/x86/include/asm/pci.h @@ -50,7 +50,7 @@ extern int pci_mmcfg_config_num; extern struct acpi_mcfg_allocation *pci_mmcfg_config; =20 /* Unlike ARM, PCI passthrough is always enabled for x86. */ -static always_inline bool is_pci_passthrough_enabled(void) +static always_inline bool is_pci_passthrough_enabled(__maybe_unused bool d= om0) { return true; } diff --git a/xen/drivers/pci/physdev.c b/xen/drivers/pci/physdev.c index 0161a85e1e..18448b94b3 100644 --- a/xen/drivers/pci/physdev.c +++ b/xen/drivers/pci/physdev.c @@ -19,7 +19,7 @@ ret_t pci_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void= ) arg) struct pci_dev_info pdev_info; nodeid_t node =3D NUMA_NO_NODE; =20 - if ( !is_pci_passthrough_enabled() ) + if ( !is_pci_passthrough_enabled(true) ) return -EOPNOTSUPP; =20 ret =3D -EFAULT; @@ -57,7 +57,7 @@ ret_t pci_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void= ) arg) case PHYSDEVOP_pci_device_remove: { struct physdev_pci_device dev; =20 - if ( !is_pci_passthrough_enabled() ) + if ( !is_pci_passthrough_enabled(true) ) return -EOPNOTSUPP; =20 ret =3D -EFAULT; diff --git a/xen/include/xen/pci.h b/xen/include/xen/pci.h index f784e91160..c4a49cf584 100644 --- a/xen/include/xen/pci.h +++ b/xen/include/xen/pci.h @@ -74,7 +74,7 @@ typedef union { =20 struct arch_pci_dev { }; =20 -static inline bool is_pci_passthrough_enabled(void) +static inline bool is_pci_passthrough_enabled(__maybe_unused bool dom0) { return false; } --=20 2.34.1 From nobody Sat Mar 15 14:18:13 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1741959328; cv=pass; d=zohomail.com; s=zohoarc; b=lMSWQ6XUY7KuhsALfasLytWT5IlQEUcQQi/A4i4iiVZBUF1cGGaii5lyqA/BaWkH1fJxDv1XSitTTzpXfuIewTdibmPV4DQ2eOWv6AbZn+X85buU3H0xhfoNDVw2FZt5s3w+sE1t9BS47cGg6u2gAElnXw0WPtWnZa6ZQJMndOw= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1741959328; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=qwq8S4cxBLVNYoyVBRxE8Ops330OFUSXGNqsnQp0k5o=; b=c88OZ9qn7dCB+FM1S3IVPtnvJ0CrfEQ+R+UYXqnFqr4FRJx7iezU9FtLE+oH+7uv4Mub71mm0l+cWqsLywKM6usokGiKfHZwupXPsVLA90EReJbJoZpZgHwr4RhUc8owavgLx9DwgBE3Gr7NIao4CIKJZDo0FoAlW8s0eWhlaMM= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1741959328510844.4423288858466; Fri, 14 Mar 2025 06:35:28 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.914594.1320373 (Exim 4.92) (envelope-from ) id 1tt5Bn-0005QQ-F8; Fri, 14 Mar 2025 13:35:03 +0000 Received: by outflank-mailman (output) from mailman id 914594.1320373; Fri, 14 Mar 2025 13:35:03 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tt5Bn-0005Os-4R; Fri, 14 Mar 2025 13:35:03 +0000 Received: by outflank-mailman (input) for mailman id 914594; Fri, 14 Mar 2025 13:35:00 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1tt5Bk-0003qF-JB for xen-devel@lists.xenproject.org; Fri, 14 Mar 2025 13:35:00 +0000 Received: from DB3PR0202CU003.outbound.protection.outlook.com (mail-northeuropeazlp170110001.outbound.protection.outlook.com [2a01:111:f403:c200::1]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 1f323175-00d9-11f0-9ab9-95dc52dad729; Fri, 14 Mar 2025 14:34:58 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by PAXPR03MB7950.eurprd03.prod.outlook.com (2603:10a6:102:219::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8534.28; Fri, 14 Mar 2025 13:34:53 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::35ac:8893:c31c:b971%3]) with mapi id 15.20.8511.026; Fri, 14 Mar 2025 13:34:53 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 1f323175-00d9-11f0-9ab9-95dc52dad729 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=pV8imtA6k/AZOeY0L0WgQuMcG65KgUButn6qHWhuN9KsYGWnhjOx6HBP+yVkvEdp8H0H5ffJQig7dS11mz82mcC0uOQbZ+Phigoiz8FPSm5A2ID9goKQV7n9Ag8hXj1WCGwFhkmECI4FROTvzx45G0fPAIMM1NCDrVGVyHBJoREpzFMzBHVT3ymvQnEFyAigZl1b/79ERcoQX5aLBi3tPt8eVYoSv8a34zw3PkbZSUfPulIYkhy7tn0zWinM2PRFv3ozeABNtnnR8VsOImU60opDLuJoPEERF6d9HNZQmmlaaVEGqIN21J/aCvpFAvZTm0PDCbcwBodSIpVFmn9gPQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=qwq8S4cxBLVNYoyVBRxE8Ops330OFUSXGNqsnQp0k5o=; b=fzXlLnRmZBT7shROshuJc1YpnwwRrulFUPgkkiNSmR+FhgRznzahNqNP7VbhlsHeLVCUmEIra3eNDg/f8T8cdAWb4yQZmaf4RQfi1YOnTVPzJLNsCjpOov9MDR03/nOc1rgFT+aA3hWQ403Rr8xo1i4FTdjHNzUDYz7b6LbP2Sa9aTmKT58ibVpNeJuZ81yM+nodG5gx7duyDwT1eZG4dW2nu9p7vRCdU4JLLRiScVXuRLgyBpHRXwGF9hNlsOXomHCtTxjVUBYKqetdwYyOLEkI/tspZkcLYzm8G3gwm3HjNThm20Hb6CvjGj2KqjfpLC1dgT+xsuntwB7fgVeP7g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qwq8S4cxBLVNYoyVBRxE8Ops330OFUSXGNqsnQp0k5o=; b=SrWew7dk0CkIZwPdeD9bIk1SYZ6a8qaaJr6a95j0qyT68ov8mkncOHytRwsWRbC89o9P4yZ/j1VuBTIta2rAj73UyBM73QckS4UXbCV0L1WFqtg2K1r4aNIE42ozC45XOnQxp1/lbzM9yHcwpXxBFDTyNA48TBLsoszx0mv/e8+c/5upuLOS9sBRxAjKzAmp1MRZB59lqGt7W6R19VHIs1C25JMsG8H5f/Wez/mXtxbRUmRY0m0ceuck0BRDowg5HTaQZ6rLxwo9Wquq44kZCAxtdHl/tUPEw7TFWZYpGBj36A6lqfPLKYF6z+SAKCgPllyrijeW86cXz/swx18MJw== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Rahul Singh , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk , Stewart Hildebrand , Mykyta Poturai Subject: [PATCH v9 8/8] xen/arm: Map ITS doorbell register to IOMMU page tables Thread-Topic: [PATCH v9 8/8] xen/arm: Map ITS doorbell register to IOMMU page tables Thread-Index: AQHblOXehlQl1S3l2U6Q3DlTtEEfCw== Date: Fri, 14 Mar 2025 13:34:53 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|PAXPR03MB7950:EE_ x-ms-office365-filtering-correlation-id: 9addef1f-5e06-43d9-3533-08dd62fd009e x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|366016|1800799024|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?EsoA0n8EyWKFTZEsszo661fBZoRETfBYsLQkY7njDeBpyDPx/JxkkHqasH?= =?iso-8859-1?Q?yfMxrreeFiJ/WqgwJV2Lhx3nZ3oa86QqRGhRDYordy8chvpDqy6txuRWV2?= =?iso-8859-1?Q?q6Nx/rRGytr7nmdMQpFaNGvzdjIHgklQUnD84lY7onq8DSIAVi8PnUs8Nj?= =?iso-8859-1?Q?ntlZ17gxuMM4yg3uwe38YmV1RA6Q5BeAsFk8AWm1hGCDppv+NY4lf3oYgU?= =?iso-8859-1?Q?3JTNDNBi+Jjkq9Sua8+tZPCfLanFJZoIVOGHG8Rq22BfrzGf/4K7ayKG9/?= =?iso-8859-1?Q?pixrvSaozArneuBZbPlZXvbfYhXToJujKjOp6KkmYEmHiGW1q51DkQ0iH2?= =?iso-8859-1?Q?5RPyL1ODSHczRcw8kvYi3tdvbblQef83o/SJnb4o9Sn/+F+zM6czOZCc/h?= =?iso-8859-1?Q?xzPpeNFVmn7NwfWUEiFlrYXxthz4gu+rAR5PlS4LNQPnyOuFQB/vd3ivOh?= =?iso-8859-1?Q?QaTJo2wZ74vAj7mG57DxINvIY3Wc0lPRV3BDy38a6N4EBDGGTqbStMLeJh?= =?iso-8859-1?Q?E6kMJwAVEskK0kHWqyGqIWrpyxEBcU+qrI2cAux6p38lOrbc1qU7VuUJYC?= =?iso-8859-1?Q?/zJC2mKlf6s9pwhplVSWMhOOkOV8OroRkJG6sCwxGftdAAoJ1uChQzG0YC?= =?iso-8859-1?Q?YQIuxbox4w1gk1ZShSR8EbD2yj7BARV5CqE7255+rFg/4hkun9b6il8Ph0?= =?iso-8859-1?Q?16NNPks4ROl1OiJAj4reUY+mzO1t38JlXkXQIKcdhIRErUdld6BCTWbOwt?= =?iso-8859-1?Q?/mTiY9Nvom/VW1QMJmUo9X+4vB3bMdYyrR9Zn/9jSWsBnXoNmDFu6jeGlt?= =?iso-8859-1?Q?6ej8NyIw+GgWZwhXn6tHN6hiuwDA20fH2SmL1tbc2GfOh7Njc8zSEGp+8J?= =?iso-8859-1?Q?vm9ywM9J+2DPhGmIvSi0s9+5ZeVUJOPoJLmY3MUd9wTRS03XaLyI595Cwy?= =?iso-8859-1?Q?ZBG/7/bwhXhMLUe9zDzPt/p93NqcncxUVcM7uw8Wu1o4EqDFXJtjncEpG3?= =?iso-8859-1?Q?qg95ohl+J64cupmyBo8+xmanIedDDpeytI4WSti6Q4irpAx6tGfADutUjt?= =?iso-8859-1?Q?Ni95cgDlm6klDd21RKwtv/weXN1vGKlvTQfX9NN7R6jvcI9LA8fDvV6moU?= =?iso-8859-1?Q?Ih7TBuys52nw1Z7bl2GyX8eDbvoo5CzKs2o6uNzDSnLGmaHf5i9c2Po4Vt?= =?iso-8859-1?Q?uCD69wIsDPzAPouquOt/0xeNCR5HwgFgjHvQ6lYpRtwPBJOdmtts9mOWd9?= =?iso-8859-1?Q?JVgOGMvN3cx6ikeJmaGNli5nugFBifbsqn9TK3s3DYQeEqZqDy4WMxD5a9?= =?iso-8859-1?Q?qyUMeuxyBdD/wL8TEk9hcNGJ6vjYqWbq1CAxisgarIJQYbO2UGKqHvN8iK?= =?iso-8859-1?Q?kT7oqE5IAP84Mvawb1WWY1+33KYx9ZUWYzroi62XZ/OyIfaovInhqkafLw?= =?iso-8859-1?Q?gELViVUkelrCjuhUFM/bg2kqi2p5VJoSYyqXXw=3D=3D?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?VtRxU6DCWAdaIb7q2gFecuOaX6GBmM6F4itwW9Q6KhHACoXCxl8ZP55Bf2?= =?iso-8859-1?Q?7JiVKu9D9WHp2gWGs77KZmv/SwM2d9vlA+4XMbk43aYUDvnyhgFn0Z/pAm?= =?iso-8859-1?Q?OPgnG7rxlV1lIfzKO2inx8HtnOdBXZjBYHhTTUOEcrhxF+DcEi7ksMdsTh?= =?iso-8859-1?Q?K5d/XMngEMA6Kp1UJRDKCT+fnU+cCP1ruB124iSAscfST1zaTNNgM6PFWC?= =?iso-8859-1?Q?luG1UNZcqxpzQujJ+6M5t8GQK+4HQWevddFzzT6LtTsLgtzUnIOOThlH/y?= =?iso-8859-1?Q?XTNGw7qZL8jb8WsfT3QRfP9fw2xvkhOp7XYcUzzFfOZQYVYyUxWQC9Oho1?= =?iso-8859-1?Q?ESm2yk5jB0wUze4Z/HnAJPQcln1pJwAmCXt+5ovjULLgx7bAJae9TmlQGx?= =?iso-8859-1?Q?kjCVXDnbzX7I+fiCH1fBXMvGWl4fAO0708oYCNxS2jauBuq5WspSgbrmR6?= =?iso-8859-1?Q?gQKPjIkEaMfcQ3d/VoGre9HYXuaz5vCW0EoSdDrS/bFnAMPrKTWXJ5jaP8?= =?iso-8859-1?Q?eLHOHK+0VmCySYTLvsBC/okymaBqZ+bO1C67L9cNdjDpb2rYgT1nVrSV2u?= =?iso-8859-1?Q?46iQgCKQc/nzAgoWwjS6kZoVD1aZHgjYB/JoA22hUOmLvRpI6ku5MUhR6P?= =?iso-8859-1?Q?eiBmLy8AqUqRtNUVnb725G0VET94oa7fm9NfP0c6e0PrJ0NGmADbh5V/1M?= =?iso-8859-1?Q?bafDjCTf+lumbtN6Z5+EcayoryTAlO2aVldJnSxBHpWRAhD8R9nue8hnGT?= =?iso-8859-1?Q?V7dwQq7PgNyXF9WA3hYS4QOcQkKBoVgPpHXJcEZakQ1ijojoDzDqflPWNT?= =?iso-8859-1?Q?R/ys/jfHupjDMRb4hUYQEjgZ1ogRyWXfkIlLaLm/ms5LGlfp/qSQvgB1QK?= =?iso-8859-1?Q?5JYyaVyIz97x10ZwnH+CySBj8NUWQQ3dzXJNLnhnfQVPaNW11O8I2NHdi7?= =?iso-8859-1?Q?a7tGRKtOUpWVIp8FWM6845iwtJQCU2yuiwCdO/lNuCJvbahzsGxnWtnFLw?= =?iso-8859-1?Q?Z57+T2IU74Wwyz5P2h/BrohR8C4qLhFS15JMyBH+DH9qMSsAkTDRctGm0j?= =?iso-8859-1?Q?J48UZn1ueadBcQWD99ZJGvrMIhsWW0qYUrdJ0NP3JJHcoQQSOroqRYISxy?= =?iso-8859-1?Q?lhRLnth/XpKykjSMjf9KZ1TjyE74rQncWMcemw0JcPKQqcmmXujaSM3NFf?= =?iso-8859-1?Q?IBzn2qIHlOnEjYZ+Y+xlZrMzvVZ7vm7poSIixFUSyh3ivYJ4UzgMzCdsuE?= =?iso-8859-1?Q?bLFosCH+bMRZBqAOJ19t4gGXbi/wxT+eniozynyNRlrJvBa6iUHLOZ9xYW?= =?iso-8859-1?Q?uASdvX2GCurK7C5oz+0Xew+f/0XfFtt3VoZk2wmtqIvEkBclEmdFVPoLaq?= =?iso-8859-1?Q?vEfUGacAaZcgnjaic0mYbzhHoJugCxSrR55e7deMr+xN4kx+foMN41U3W3?= =?iso-8859-1?Q?4l0nl88fpIDkp24H6AEj/LWd/tp2lIxXXsSh/N9fPj84U2XQHgmiyq6zWa?= =?iso-8859-1?Q?AMI7B0BTdKMx1dapPTYQslx86C2OFh8BhZUVOx+9RScdLafqOp9NK0M1hS?= =?iso-8859-1?Q?uW9EwoCCg1Ui25qZrFF1AYKCtKKHCLj0IDs69BIttHbgaOEwhxkwVKiPU1?= =?iso-8859-1?Q?c3Tr6pEtzQqwwK8CGLuX0cZJNsfkDKX8yxyd8/J74rO3Yx0JvVugkhdg?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9addef1f-5e06-43d9-3533-08dd62fd009e X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2025 13:34:53.2724 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: lZj3SN8HbPIre+Em4F++7P+QUhFIlZceqU6rsOS4uniOM+57NNEYLXbrQScGZeXlsFyaSFpbfYXecxyMshsRXg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR03MB7950 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1741959330595019000 Content-Type: text/plain; charset="utf-8" From: Rahul Singh When ITS is enabled and PCI devices that are behind an SMMU generate an MSI interrupt, SMMU fault will be observed as there is currently no mapping in p2m table for the ITS translation register (GITS_TRANSLATER). A mapping is required in the iommu page tables so that the device can generate the MSI interrupt writing to the GITS_TRANSLATER register. The GITS_TRANSLATER register is a 32-bit register, and there is nothing else in a page containing it, so map that page. Signed-off-by: Rahul Singh Signed-off-by: Stewart Hildebrand Signed-off-by: Mykyta Poturai --- This patch was originally picked up from [1], and commit description loosely borrowed from [2]. Example SMMUv3 fault (qemu-system-aarch64 virt model), ITS base 0x8080000: (XEN) SMMUv3: /smmuv3@9050000: event 0x10 received: (XEN) SMMUv3: /smmuv3@9050000: 0x0000000800000010 (XEN) SMMUv3: /smmuv3@9050000: 0x0000008000000000 (XEN) SMMUv3: /smmuv3@9050000: 0x0000000008090040 (XEN) SMMUv3: /smmuv3@9050000: 0x0000000000000000 Example SMMUv2 fault (AMD/Xilinx Versal), ITS base 0xf9020000: (XEN) smmu: /axi/smmu@fd800000: Unhandled context fault: fsr=3D0x402, iova= =3D0xf9030040, fsynr=3D0x12, cb=3D0 v8->v9: * no changes v7->v8: * no changes v6->v7: * add tlb flush after mapping * style: update formatting * revert back to printk with XENLOG_G_ERR v5->v6: * switch to iommu_map() interface * fix page_count argument * style fixup * use gprintk instead of printk * add my Signed-off-by * move to vgic_v3_its_init_virtual() v4->v5: * new patch [1] https://lists.xenproject.org/archives/html/xen-devel/2023-07/msg00483.h= tml [2] https://gitlab.com/xen-project/people/bmarquis/xen-arm-poc/-/commit/623= 2a0d53377009bb7fbc3c3ab81d0153734be6b --- xen/arch/arm/vgic-v3-its.c | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) diff --git a/xen/arch/arm/vgic-v3-its.c b/xen/arch/arm/vgic-v3-its.c index c65c1dbf52..376254f206 100644 --- a/xen/arch/arm/vgic-v3-its.c +++ b/xen/arch/arm/vgic-v3-its.c @@ -1478,6 +1478,26 @@ static int vgic_v3_its_init_virtual(struct domain *d= , paddr_t guest_addr, =20 register_mmio_handler(d, &vgic_its_mmio_handler, guest_addr, SZ_64K, i= ts); =20 + if ( is_iommu_enabled(its->d) ) + { + mfn_t mfn =3D maddr_to_mfn(its->doorbell_address); + unsigned int flush_flags =3D 0; + int ret =3D iommu_map(its->d, _dfn(mfn_x(mfn)), mfn, 1, IOMMUF_wri= table, + &flush_flags); + + if ( ret < 0 ) + { + printk(XENLOG_G_ERR + "GICv3: Map ITS translation register for %pd failed.\n= ", + its->d); + return ret; + } + + ret =3D iommu_iotlb_flush(its->d, _dfn(mfn_x(mfn)), 1, flush_flags= ); + if ( ret < 0 ) + return ret; + } + /* Register the virtual ITS to be able to clean it up later. */ list_add_tail(&its->vits_list, &d->arch.vgic.vits_list); =20 --=20 2.34.1