From nobody Thu Oct 30 23:14:03 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1753184530; cv=pass; d=zohomail.com; s=zohoarc; b=ZuUrO16Lxr39Fr5Up8MOnqvXDxLVsfaNiHaGFMmuuCJWiwjY9rRSCXr5bmwH4N+tpE/IwGI8nBnyKdt+PfMroTULhLkL6ObUQDFiMqKsHAPIrR2/lQ7KM/hxRQAXAflNp0MvqfnXwmovzvok3S5JVug0TQV2ZT19tJCiXmoZcXo= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1753184530; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=rcgB+PVoPlQ+5vyNjJcLRHb3/sTxvUoyunM0ZQqmRrs=; b=TYJtzuPPYRotpWRtgtTLeqJ/QhO7ONIBjPa30llRXcUpDEA5xEnSX3324ZOUKN7uaRLs1qQmN5LZZoU9GWNjWeeRW36qocsz8UbJ6zYaTWNkdIV87mc1agm3Rqvwzsa/e5CwKtDoO4pSEdm7To4od8KmQXRAigbdi99dAaK2TWc= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1753184530624858.1165702951743; Tue, 22 Jul 2025 04:42:10 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1052279.1420892 (Exim 4.92) (envelope-from ) id 1ueBNS-0002Uh-LD; Tue, 22 Jul 2025 11:41:46 +0000 Received: by outflank-mailman (output) from mailman id 1052279.1420892; Tue, 22 Jul 2025 11:41:46 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNS-0002Tj-FQ; Tue, 22 Jul 2025 11:41:46 +0000 Received: by outflank-mailman (input) for mailman id 1052279; Tue, 22 Jul 2025 11:41:45 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNR-0002RD-1t for xen-devel@lists.xenproject.org; Tue, 22 Jul 2025 11:41:45 +0000 Received: from GVXPR05CU001.outbound.protection.outlook.com (mail-swedencentralazlp170130007.outbound.protection.outlook.com [2a01:111:f403:c202::7]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id d727f5bd-66f0-11f0-a31d-13f23c93f187; Tue, 22 Jul 2025 13:41:43 +0200 (CEST) Received: from PAVPR03MB8946.eurprd03.prod.outlook.com (2603:10a6:102:32e::21) by VI2PR03MB10809.eurprd03.prod.outlook.com (2603:10a6:800:272::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8943.29; Tue, 22 Jul 2025 11:41:38 +0000 Received: from PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc]) by PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc%6]) with mapi id 15.20.8943.025; Tue, 22 Jul 2025 11:41:38 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: d727f5bd-66f0-11f0-a31d-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=gCrwRoWhsq4ypWgmm/Tyz119t049kST6RmI58wdU/UX18kf89UzxOszM5q7dysn89H2BP3qzUuR4zdueMkS3zlasZ2m0yaT0tcgQcMtgsfP7j8Mc6m9mxQuIcHtaAfrYCEFLjYFhVg6/weBsWjJvwV8MB2QABMHO3WhiuusLHZe9AZQLGZg6nsK5uSV49Sb/Hedlt3M4l+97Y6cJiPDYbqn9ZNXs3nO3B618eZpratvHmBhKvHwRC7LEFHPZuK+AHk+X0mudr36nXIxgINHzSYVlNZW+jVVW2hbP6THrsOwOjhgEWu8KDe9yNLi95UZKMoujW3Yzn2EF7Etv9jaLXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=rcgB+PVoPlQ+5vyNjJcLRHb3/sTxvUoyunM0ZQqmRrs=; b=g+6wDOWcDkc2ZmP/3bgdCitsD6AEKYohLHyZGX+/Z5EMgxIRSrqQX5OZBYIpy6hkablkv1IidVX7B1/LhPVxBDFBKizPPYK/HSV4C7VGwtetxBafhb3hfiZ7EOp84egQvn6z3bs2mSee6gFhCLBWFrih/rT82h+QYn0M/BmiKyFtTMH3RElNx6TdaCzY8fjfOVTwIjIjmVsIaz72ceORJvKW+yKlI/jq/e0CGb9I2WxzUz/HlAo+hdh7gbnJPqNnBeg5+V3oHHq25TAXsx0TWal7niOhBFrcL8m8yw5HDE7/Xb71Tl4SwLQZy0Zi3Es2sxOrnBTw0mn5QTFACNK/3w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rcgB+PVoPlQ+5vyNjJcLRHb3/sTxvUoyunM0ZQqmRrs=; b=bKXselAAW8jt7Swm6jaR/B9QLMzYfolnbS3TqqVxRY614E7NUP+NG++VlU+OaNOyW/RlMQj2D5oyaSGx50a3vuV8hJmvbRfq67v6VxYkjQziMN7fot+X3H1/Np9Am8WnqGApzb6ZUSAM1QleHNKJgNA83nmfJRvKJlIC0c1DfYn3GTdSwzKRdVPIAlC4PQoaeI4NWBScCK6H3LB44/qwL3fWcL2f8BQv4mPTzqsmfpgTHiHNAEsW+/YRstU2VzJ3yw3PhG14kBmA1Og8UuftpCcJrL+8YkNAHnWqyR1Noafxdwf+Rm8JA7sLcCuzQqQsBGtXSu1nO/oc8leY+SLF3Q== From: Oleksii Moisieiev To: "xen-devel@lists.xenproject.org" CC: Andrew Cooper , Anthony PERARD , Bertrand Marquis , Jan Beulich , Juergen Gross , Julien Grall , Michal Orzel , Oleksii Moisieiev , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Stefano Stabellini , Volodymyr Babchuk , Grygorii Strashko Subject: [RFC PATCH v5 01/10] xen/arm: add generic SCI subsystem Thread-Topic: [RFC PATCH v5 01/10] xen/arm: add generic SCI subsystem Thread-Index: AQHb+v2VIVqDwzw580eWg2MNhp5UUg== Date: Tue, 22 Jul 2025 11:41:38 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB8946:EE_|VI2PR03MB10809:EE_ x-ms-office365-filtering-correlation-id: 2731c1cc-719f-457b-a233-08ddc914b812 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|7416014|1800799024|366016|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?4Qx//lRTlbU2NIGE2kyy1qFeiezMXk2vPm3VCIyPnfhsytx/OkLbGjpNhQ?= =?iso-8859-1?Q?z6TVy5s5Fikgw0jHH4xFosNTrXpQhWTK84R916q135sk0OJ7mqMU4SbeZp?= =?iso-8859-1?Q?dd92kdZvyLTxOhvzPYfM9ZVewRMh98V23pRl2OD6TaSUUxA3vp/oPOqral?= =?iso-8859-1?Q?gkHAzO170GM4Is17i7L3dG7XgLWcxg4+2s/fAu699bmfCf3/AlMiXi6l/I?= =?iso-8859-1?Q?aWYxA/U+Mh5HuPQj2DMs75UTeUi6WYH51/0KI/a7B5pBifz6aBrqXMSgwT?= =?iso-8859-1?Q?LUqjhd0uQefHJWlW53tuUiJZXEr4DXl5i7WDN/rqHL9lYcY2rK8n8q5tWF?= =?iso-8859-1?Q?anSvgj9ocv1/FJ4J3htFb6ltJ7OwCHkf5TaNdBXs+qf3AH+nlaGV7ZwgZo?= =?iso-8859-1?Q?HPFBWk15oT8UzvGHxiJD6rBCMNTLTqgUU9Xhdf+7MVWHQx7TL1Jx+yxC+d?= =?iso-8859-1?Q?EO6TlKBm/Dp7F8XLtRyXJe04GaAJJLO4SuwlTuczAERs1Q4RdDfiDySiAr?= =?iso-8859-1?Q?raz+Uv/HBKrWjtYONm+YclF6yMteBVnM3464uQpcwjq5Og45eVKKlQcUn9?= =?iso-8859-1?Q?a4fZFaDWVijZZ0wRRrRQtqTX/rvg/q1b0y782Ip834A9Ut19KRMKH9qdC8?= =?iso-8859-1?Q?MMjsTm86ahbuGZDHciJAMQWGE7OiLxMhnyND0bLHmoJlglLEzGTghTfkSl?= =?iso-8859-1?Q?2Q+I1IDF8/QihsnTBEU7VszLN3ogJ2DPO6ihFkxYBvgb22tPcDVlwuFM1F?= =?iso-8859-1?Q?+CzpZqIe2QFoLOqdCV6WCaskx7kNxAlExDLShiiNUzjBJlUHxG8duhPH/Z?= =?iso-8859-1?Q?0wo9pYFd3yLDHGg4Tx5k5y+Fr7gsPh2mmaB2agi9Rp//rBcdsQ3QrRmx58?= =?iso-8859-1?Q?F2Ly2pI+Kx9ryrLAyu9Y90A4aX5WXvd36R6xPT+/PeQvqK/Cslmb5NeVwU?= =?iso-8859-1?Q?FQFLhpfKQy6HdvcBORHS/B5GenxCBYSmWFvWJFoWvp23EqSC68PZrimazR?= =?iso-8859-1?Q?ce6h2NHbcv0UOo9O4R2S+o3gqyQDNZvEbcORxe2FhXCv6vJqcGXEykkijc?= =?iso-8859-1?Q?4yJte9Oigjyjk0i3fk5wvXYBvEVY/0/6B2v48o3Xi4zLAG27uFHFpirqBS?= =?iso-8859-1?Q?33dwZxopzwwBKiIxVNM/GToXITyfhHww1IXmDJG2Ssany5rC9UTtb5lgYS?= =?iso-8859-1?Q?OyP206PDxCxY9R3vfWp1XYBkP9o+ihY+7Bej2s5KT4cRDaRIbKbR+HY6u/?= =?iso-8859-1?Q?igwFnnX/UG+C1vVNcbdBS8matV8ZvvI5RXqVRfAi8++MOtRxo+e0OFS8qB?= =?iso-8859-1?Q?o6Sdy+XKsjbxwi6kPzsgOwAAWwtQryu+CTjOrWHTzGZtMjmJ/vWVczzvCj?= =?iso-8859-1?Q?wTODJDAJp9xCZQB73UIPUbCxrolcu7ZwS/AB9kcSnix58ZlV3OXelILwWT?= =?iso-8859-1?Q?0Z4FJR3xB3k+XJ0StNkvLHIZyJ5xSxtNKkacPwm169IM+ykzAB1INKHnyZ?= =?iso-8859-1?Q?Vl5FGjPbubd7dKORcp7wjRE+BTxUxK8YbyiHhAFCnVrA=3D=3D?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB8946.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(7416014)(1800799024)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?G9yDKj0q0IKiFrVJ8zfMWweZqSSpcelzhd1cA8khFpTubudi53D1AW7RWi?= =?iso-8859-1?Q?1H7wUKFc0e2gHB71jyv/IqCBlffExOmoNPfMVSGeUUxDP34VMtf9Xe81EK?= =?iso-8859-1?Q?8TJjgsOQSekzZDnWcya8UROqWKInuLlM2OLo/SQ+/tozU1JOuaWHnN/jsL?= =?iso-8859-1?Q?w08cUZA6PBO9W94tRin/lEKPMohKe4zqbxoHB62z2vvG0C5K343arsaR2F?= =?iso-8859-1?Q?1NNqc3PXcb6ZZfzjmtJO3Gdcss6HRFFclXyDJMhXn3GGQYN09slZGIqAEN?= =?iso-8859-1?Q?j4sXsEmsPPVpk1NK0jRXgSzsgvAEr7KwzH9g2T2auM4fNYwbjjFTo2Qk6G?= =?iso-8859-1?Q?Jd7J/QTJfUS0o/HnLViHszXpU3NrGUhoar5bnbJKsJQYygSeQKpJz70RRP?= =?iso-8859-1?Q?t6zBlXQv5oZMU4xAIHvqByUm7vlIgIRlOsSqJpaDA9Giqm5sgajmcawlSm?= =?iso-8859-1?Q?oVoM6xmSanNLaEv26z1f4RKjOod93skYRK2h5ZHgKu5FdSaeDSYYqmeP5+?= =?iso-8859-1?Q?NtK03+JG1MllkDjTKPodhmMkralAkys8VRDx9OOog5QBY4+fFSreelHWid?= =?iso-8859-1?Q?ECwftvjgYP14dDt9UgcZV0ENT6iCo3V16mTJPzxO2p3pabq7PPkFJoFuiq?= =?iso-8859-1?Q?uwEE+m+tFOjWN4WXJJbCOPoRk7LsnW11IKOZ3Xu+6lUsVyqLZxjxxj+6vz?= =?iso-8859-1?Q?dVZ4wFKp6wfjDrqP/8ZE+7COcWSE64c6EmsrJmb9LUKcESAd3bsUAibQjz?= =?iso-8859-1?Q?/TLYLf45AGhdoFHdzDfQrlrJ0Qh5lJsAM/3arfXbrOjoNCSX1R3hp01+Vy?= =?iso-8859-1?Q?FYcCDew+3I0fxQFnZ1p3xIagA4g0TfKhrUR2OUMnBVHueE8c44VlsPKNwY?= =?iso-8859-1?Q?WUDz0EYwCKI3l5Oq3b/gELnnMf2DK6hjTgeaKtbU0pacUKiZhC4fm0jfMp?= =?iso-8859-1?Q?IgdIUgvXClWq3HGlm4CC+XI92L3BsbqFnKXSiHjRo4COo4iJOQ/lbpYlz8?= =?iso-8859-1?Q?rRuz+yYxoRkg3YG9QzCwnigWoBg5Ahpfd5NF3xz9UlNoPlJRCYyYSIDcWi?= =?iso-8859-1?Q?m7sTsYrCRPgTlpB1FQZrK2Wgj3Btj7mn4rObPQrhZFHPYpYlwsw7fy7jAH?= =?iso-8859-1?Q?eYSYLNZncqCZXEFUHlA2CY0th+iR0bQfp6LLxD37nOaG78b3QN5CoLgBfc?= =?iso-8859-1?Q?Wq77oeQ9H3fBz1hxc+XQ8SaCG+TGnbi1ffSIRJteVRtkJoSrazL96Ph3f8?= =?iso-8859-1?Q?QLRE8wBaAiJd18Vvm/lXvShtCuWYeX8NUCmA0ha2AEvOylQOWIsTjs3Bwq?= =?iso-8859-1?Q?WWT1iMGZrrB7uhWumZVh60DB7zPHIhmPUhwunLMpizC7SDnbbS3zczN9Mu?= =?iso-8859-1?Q?y5mIiEoSWFkTnBi5I9Q1WNXmG78/ggNFLnnAC9/siNRSYXGdieXJuiUgbH?= =?iso-8859-1?Q?rLHQVztmTos5Owwksj+wsyBGjxByP5Bg4g+FYpeNHsFlhpwlMDbsQWE3PT?= =?iso-8859-1?Q?xaPIiDn2QI0JMk0h6sVaTHg1O6JOZl/DtCeYqxz/67DXXjLScjGKl3Ffrl?= =?iso-8859-1?Q?ePcpvMb5TDZzxV4jUMqXZDgGwsQ3oE/EIn1g6XqDtuASwpL4zhFM0YIFJE?= =?iso-8859-1?Q?oLOQxnoN/FCaZx58PdQpaq7OdcQkKJ8Ng4tY1Oct0ES8edc191Y4ovCw?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB8946.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 2731c1cc-719f-457b-a233-08ddc914b812 X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jul 2025 11:41:38.0823 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 4QFmxoh1di+AWer4tUmHNzxb0C+eq0B1byuvXfguFLciC0VvZUfqXdGUUVjQs/XN+lHAOMbD5m8cKs9ekxBxVQFwJTx4QDBQfH2nJRy9je0= X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI2PR03MB10809 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1753184531603116600 Content-Type: text/plain; charset="utf-8" This patch adds the basic framework for ARM SCI mediator. SCI is System Control Interface, which is designed to redirect requests from the Domains to ARM specific Firmware (for example SCMI). This will allow the devices, passed-through to the different Domains, to access to the System resources (such as clocks/resets etc) by sending requests to the firmware. ARM SCI subsystem allows to implement different SCI drivers to handle specific ARM firmware interfaces (like ARM SCMI) and mediate requests -between the Domains and the Firmware. Also it allows SCI drivers to perform proper action during Domain creation/destruction which is vital for handling use cases like Domain reboot. This patch introduces new DEVICE_FIRMWARE device subclass for probing SCI drivers basing on device tree, SCI drivers register itself with DT_DEVICE_START/END macro. On init - the SCI drivers should register its SCI ops with sci_register(). Only one SCI driver can be supported. At run-time, the following SCI API calls are introduced: - sci_domain_sanitise_config() called from arch_sanitise_domain_config() - sci_domain_init() called from arch_domain_create() - sci_relinquish_resources() called from domain_relinquish_resources() - sci_domain_destroy() called from arch_domain_destroy() - sci_handle_call() called from vsmccc_handle_call() - sci_dt_handle_node() - sci_dt_finalize() called from handle_node() (Dom0 DT) Signed-off-by: Oleksii Moisieiev Signed-off-by: Grygorii Strashko --- Changes in v5: - update Maintainers file. Set role as a Reviewer - rebased on the latest master branch - Introduce arch_handle_passthrough_prop call to handle arm specific nodes Changes in v4: - fix SPDX-License - rename DEVICE_ARM_SCI DT device class to FIRMWARE_DEVICE - move XEN_DOMCTL_assign_device code in separate patch - Add documentation for SCI SCMI drivers MAINTAINERS | 6 + xen/arch/arm/device.c | 5 + xen/arch/arm/dom0less-build.c | 8 + xen/arch/arm/domain.c | 12 +- xen/arch/arm/domain_build.c | 8 + xen/arch/arm/firmware/Kconfig | 8 + xen/arch/arm/firmware/Makefile | 1 + xen/arch/arm/firmware/sci.c | 154 +++++++++++++++++ xen/arch/arm/include/asm/domain.h | 5 + xen/arch/arm/include/asm/firmware/sci.h | 200 +++++++++++++++++++++++ xen/arch/arm/vsmc.c | 3 + xen/common/device-tree/dom0less-build.c | 4 + xen/include/asm-generic/device.h | 1 + xen/include/asm-generic/dom0less-build.h | 9 + xen/include/public/arch-arm.h | 4 + 15 files changed, 427 insertions(+), 1 deletion(-) create mode 100644 xen/arch/arm/firmware/sci.c create mode 100644 xen/arch/arm/include/asm/firmware/sci.h diff --git a/MAINTAINERS b/MAINTAINERS index c4886c1159..31dbba54bb 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -509,6 +509,12 @@ R: George Dunlap S: Supported F: xen/common/sched/ =20 +SCI MEDIATORS +R: Oleksii Moisieiev +S: Supported +F: xen/arch/arm/firmware/sci.c +F: xen/arch/arm/include/asm/firmware/sci.h + SEABIOS UPSTREAM M: Wei Liu S: Supported diff --git a/xen/arch/arm/device.c b/xen/arch/arm/device.c index 11523750ae..74b54cad34 100644 --- a/xen/arch/arm/device.c +++ b/xen/arch/arm/device.c @@ -13,6 +13,7 @@ #include #include =20 +#include #include =20 int map_irq_to_domain(struct domain *d, unsigned int irq, @@ -303,6 +304,10 @@ int handle_device(struct domain *d, struct dt_device_n= ode *dev, p2m_type_t p2mt, return res; } } + + res =3D sci_assign_dt_device(d, dev); + if ( res ) + return res; } =20 res =3D map_device_irqs_to_domain(d, dev, own_device, irq_ranges); diff --git a/xen/arch/arm/dom0less-build.c b/xen/arch/arm/dom0less-build.c index 4b285cff5e..2a0bf817ba 100644 --- a/xen/arch/arm/dom0less-build.c +++ b/xen/arch/arm/dom0less-build.c @@ -22,6 +22,7 @@ #include #include #include +#include #include #include =20 @@ -272,6 +273,12 @@ int __init init_vuart(struct domain *d, struct kernel_= info *kinfo, return rc; } =20 +int __init arch_handle_passthrough_prop(struct kernel_info *kinfo, + struct dt_device_node *node) +{ + return sci_assign_dt_device(kinfo->d, node); +} + void __init arch_create_domUs(struct dt_device_node *node, struct xen_domctl_createdomain *d_cfg, unsigned int flags) @@ -280,6 +287,7 @@ void __init arch_create_domUs(struct dt_device_node *no= de, =20 d_cfg->arch.gic_version =3D XEN_DOMCTL_CONFIG_GIC_NATIVE; d_cfg->flags |=3D XEN_DOMCTL_CDF_hvm | XEN_DOMCTL_CDF_hap; + d_cfg->arch.arm_sci_type =3D XEN_DOMCTL_CONFIG_ARM_SCI_NONE; =20 if ( !dt_property_read_u32(node, "nr_spis", &d_cfg->arch.nr_spis) ) { diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c index 79a144e61b..d0146da5da 100644 --- a/xen/arch/arm/domain.c +++ b/xen/arch/arm/domain.c @@ -24,6 +24,7 @@ #include #include #include +#include #include #include #include @@ -699,7 +700,7 @@ int arch_sanitise_domain_config(struct xen_domctl_creat= edomain *config) return -EINVAL; } =20 - return 0; + return sci_domain_sanitise_config(config); } =20 int arch_domain_create(struct domain *d, @@ -791,6 +792,9 @@ int arch_domain_create(struct domain *d, d->arch.sve_vl =3D config->arch.sve_vl; #endif =20 + if ( (rc =3D sci_domain_init(d, config)) !=3D 0 ) + goto fail; + return 0; =20 fail: @@ -851,6 +855,7 @@ void arch_domain_destroy(struct domain *d) domain_vgic_free(d); domain_vuart_free(d); free_xenheap_page(d->shared_info); + sci_domain_destroy(d); #ifdef CONFIG_ACPI free_xenheap_pages(d->arch.efi_acpi_table, get_order_from_bytes(d->arch.efi_acpi_len)); @@ -1044,6 +1049,7 @@ enum { PROG_p2m_root, PROG_p2m, PROG_p2m_pool, + PROG_sci, PROG_done, }; =20 @@ -1103,6 +1109,10 @@ int domain_relinquish_resources(struct domain *d) ret =3D relinquish_p2m_mapping(d); if ( ret ) return ret; + PROGRESS(sci): + ret =3D sci_relinquish_resources(d); + if ( ret ) + return ret; =20 PROGRESS(p2m_root): /* diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c index ed668bd61c..92039cf213 100644 --- a/xen/arch/arm/domain_build.c +++ b/xen/arch/arm/domain_build.c @@ -26,6 +26,7 @@ #include #include #include +#include #include #include #include @@ -1639,6 +1640,9 @@ static int __init handle_node(struct domain *d, struc= t kernel_info *kinfo, return 0; } =20 + if ( sci_dt_handle_node(d, node) ) + return 0; + /* * The vGIC does not support routing hardware PPIs to guest. So * we need to skip any node using PPIs. @@ -1739,6 +1743,10 @@ static int __init handle_node(struct domain *d, stru= ct kernel_info *kinfo, if ( res ) return res; =20 + res =3D sci_dt_finalize(d, kinfo->fdt); + if ( res ) + return res; + /* * Create a second memory node to store the ranges covering * reserved-memory regions. diff --git a/xen/arch/arm/firmware/Kconfig b/xen/arch/arm/firmware/Kconfig index 817da745fd..fc7918c7fc 100644 --- a/xen/arch/arm/firmware/Kconfig +++ b/xen/arch/arm/firmware/Kconfig @@ -1,3 +1,11 @@ +config ARM_SCI + bool + depends on ARM + help + This option enables generic Arm SCI (System Control Interface) mediators + support. It allows domains to control system resources via one of + Arm SCI mediators drivers implemented in XEN, like SCMI. + menu "Firmware Drivers" =20 config SCMI_SMC diff --git a/xen/arch/arm/firmware/Makefile b/xen/arch/arm/firmware/Makefile index a5e4542666..71bdefc24a 100644 --- a/xen/arch/arm/firmware/Makefile +++ b/xen/arch/arm/firmware/Makefile @@ -1 +1,2 @@ +obj-$(CONFIG_ARM_SCI) +=3D sci.o obj-$(CONFIG_SCMI_SMC) +=3D scmi-smc.o diff --git a/xen/arch/arm/firmware/sci.c b/xen/arch/arm/firmware/sci.c new file mode 100644 index 0000000000..e1522e10e2 --- /dev/null +++ b/xen/arch/arm/firmware/sci.c @@ -0,0 +1,154 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +/* + * Generic part of the SCI (System Control Interface) subsystem. + * + * Oleksii Moisieiev + * Copyright (c) 2025 EPAM Systems + */ + +#include +#include +#include +#include +#include + +#include + +static const struct sci_mediator_ops __read_mostly *cur_mediator; + +int sci_register(const struct sci_mediator_ops *ops) +{ + if ( cur_mediator ) + return -EEXIST; + + if ( !ops->domain_init || !ops->domain_destroy || !ops->handle_call ) + return -EINVAL; + + cur_mediator =3D ops; + + return 0; +}; + +bool sci_handle_call(struct cpu_user_regs *args) +{ + if ( unlikely(!cur_mediator) ) + return false; + + return cur_mediator->handle_call(args); +} + +int sci_domain_init(struct domain *d, struct xen_domctl_createdomain *conf= ig) +{ + if ( !cur_mediator ) + return 0; + + return cur_mediator->domain_init(d, config); +} + +int sci_domain_sanitise_config(struct xen_domctl_createdomain *config) +{ + if ( !cur_mediator ) + return 0; + + if ( !cur_mediator->domain_sanitise_config ) + return 0; + + return cur_mediator->domain_sanitise_config(config); +} + +void sci_domain_destroy(struct domain *d) +{ + if ( !cur_mediator ) + return; + + cur_mediator->domain_destroy(d); +} + +int sci_relinquish_resources(struct domain *d) +{ + if ( !cur_mediator ) + return 0; + + if ( !cur_mediator->relinquish_resources ) + return 0; + + return cur_mediator->relinquish_resources(d); +} + +bool sci_dt_handle_node(struct domain *d, struct dt_device_node *node) +{ + if ( !cur_mediator ) + return 0; + + if ( !cur_mediator->dom0_dt_handle_node ) + return 0; + + return cur_mediator->dom0_dt_handle_node(d, node); +} + +int sci_dt_finalize(struct domain *d, void *fdt) +{ + if ( !cur_mediator ) + return 0; + + if ( !cur_mediator->dom0_dt_finalize ) + return 0; + + return cur_mediator->dom0_dt_finalize(d, fdt); +} + +int sci_assign_dt_device(struct domain *d, struct dt_device_node *dev) +{ + struct dt_phandle_args ac_spec; + int index =3D 0; + int ret; + + if ( !cur_mediator ) + return 0; + + if ( !cur_mediator->assign_dt_device ) + return 0; + + while ( !dt_parse_phandle_with_args(dev, "access-controllers", + "#access-controller-cells", index, + &ac_spec) ) + { + printk(XENLOG_DEBUG "sci: assign device %s to %pd\n", + dt_node_full_name(dev), d); + + ret =3D cur_mediator->assign_dt_device(d, &ac_spec); + if ( ret ) + return ret; + + index++; + } + + return 0; +} + +static int __init sci_init(void) +{ + struct dt_device_node *np; + unsigned int num_sci =3D 0; + int rc; + + dt_for_each_device_node(dt_host, np) + { + rc =3D device_init(np, DEVICE_FIRMWARE, NULL); + if ( !rc && num_sci ) + { + printk(XENLOG_ERR + "SCMI: Only one SCI controller is supported. found seco= nd %s\n", + np->name); + return -EOPNOTSUPP; + } + else if ( !rc ) + num_sci++; + else if ( rc !=3D -EBADF && rc !=3D -ENODEV ) + return rc; + } + + return 0; +} + +__initcall(sci_init); diff --git a/xen/arch/arm/include/asm/domain.h b/xen/arch/arm/include/asm/d= omain.h index a3487ca713..af3e168374 100644 --- a/xen/arch/arm/include/asm/domain.h +++ b/xen/arch/arm/include/asm/domain.h @@ -120,6 +120,11 @@ struct arch_domain #ifdef CONFIG_TEE void *tee; #endif +#ifdef CONFIG_ARM_SCI + bool sci_enabled; + /* ARM SCI driver's specific data */ + void *sci_data; +#endif =20 } __cacheline_aligned; =20 diff --git a/xen/arch/arm/include/asm/firmware/sci.h b/xen/arch/arm/include= /asm/firmware/sci.h new file mode 100644 index 0000000000..71fb54852e --- /dev/null +++ b/xen/arch/arm/include/asm/firmware/sci.h @@ -0,0 +1,200 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +/* + * Generic ARM SCI (System Control Interface) subsystem. + * + * Oleksii Moisieiev + * Copyright (c) 2025 EPAM Systems + */ + +#ifndef __ASM_ARM_SCI_H +#define __ASM_ARM_SCI_H + +#include +#include +#include +#include +#include + +#ifdef CONFIG_ARM_SCI + +struct sci_mediator_ops { + /* + * Called during domain construction. If it is requested to enable + * SCI support, so SCI driver can create own structures for the new do= main + * and inform firmware about new domain (if required). + * Mandatory. + */ + int (*domain_init)(struct domain *d, + struct xen_domctl_createdomain *config); + + /* + * Called during domain construction. The SCI driver uses + * it to sanitize domain SCI configuration parameters. + * Optional. + */ + int (*domain_sanitise_config)(struct xen_domctl_createdomain *config); + + /* + * Called during domain destruction, releases all resources, that + * were allocated for domain. + * Mandatory. + */ + void (*domain_destroy)(struct domain *d); + + /* + * Called during domain destruction to relinquish resources used + * by SCI driver itself and request resources releasing from firmware. + * Optional. + */ + int (*relinquish_resources)(struct domain *d); + + /* SMC/HVC Handle callback */ + bool (*handle_call)(struct cpu_user_regs *regs); + + /* + * Dom0 DT nodes handling callback so SCI driver can detect DT nodes it + * need to handle and decide if those nodes need to be provided to Dom= 0. + * Optional. + */ + bool (*dom0_dt_handle_node)(struct domain *d, struct dt_device_node *n= ode); + + /* + * SCI driver callback called at the end of Dom0 DT generation, so + * it can perform steps to modify DT to enable/disable SCI + * functionality for Dom0. + */ + int (*dom0_dt_finalize)(struct domain *d, void *fdt); + + /* + * SCI driver callback called when DT device is passed through to gues= t, + * so SCI driver can enable device access to the domain if SCI FW prov= ides + * Device specific access control functionality. + * Optional. + */ + int (*assign_dt_device)(struct domain *d, struct dt_phandle_args *ac_s= pec); +}; + + +static inline bool sci_domain_is_enabled(struct domain *d) +{ + return d->arch.sci_enabled; +} + +/* + * Register SCI subsystem ops. + * + * Register SCI drivers operation and so enable SCI functionality. + * Only one SCI driver is supported. + */ +int sci_register(const struct sci_mediator_ops *ops); + +/* + * Initialize SCI functionality for domain if configured. + * + * Initialization routine to enable SCI functionality for the domain. + * The SCI configuration data and decision about enabling SCI functionality + * for the domain is SCI driver specific. + */ +int sci_domain_init(struct domain *d, struct xen_domctl_createdomain *conf= ig); + +/* + * Sanitise domain configuration parameters. + * + */ +int sci_domain_sanitise_config(struct xen_domctl_createdomain *config); + +/* + * Destroy SCI domain instance. + */ +void sci_domain_destroy(struct domain *d); + +/* + * Free resources assigned to the certain domain. + */ +int sci_relinquish_resources(struct domain *d); + +/* + * SMC/HVC Handle callback. + * + * SCI driver acts as SMC/HVC server for the registered domains and + * does redirection of the domain calls to the SCI firmware, + * such as ARM TF-A or similar. + */ +bool sci_handle_call(struct cpu_user_regs *regs); + +/* + * Dom0 DT nodes handling function. + * + * Allows SCI driver to detect DT nodes it need to handle and decide if + * those nodes need to be provided to Dom0. + */ +bool sci_dt_handle_node(struct domain *d, struct dt_device_node *node); + +/* + * Dom0 DT generation finalize. + * + * Called at the end of Dom0 DT generation, so SCI driver can perform steps + * to modify DT to enable/disable SCI functionality for Dom0. + */ +int sci_dt_finalize(struct domain *d, void *fdt); + +/* + * Assign DT device to domain. + * + * Called when DT device is passed through to guest, so SCI driver can ena= ble + * device access to the domain if SCI FW provides "Device specific access + * control" functionality. + */ +int sci_assign_dt_device(struct domain *d, struct dt_device_node *dev); +#else + +static inline bool sci_domain_is_enabled(struct domain *d) +{ + return false; +} + +static inline int sci_domain_init(struct domain *d, + struct xen_domctl_createdomain *config) +{ + return 0; +} + +static inline int +sci_domain_sanitise_config(struct xen_domctl_createdomain *config) +{ + return 0; +} + +static inline void sci_domain_destroy(struct domain *d) +{} + +static inline int sci_relinquish_resources(struct domain *d) +{ + return 0; +} + +static inline bool sci_handle_call(struct cpu_user_regs *args) +{ + return false; +} + +static inline bool sci_dt_handle_node(struct domain *d, + struct dt_device_node *node) +{ + return false; +} + +static inline int sci_dt_finalize(struct domain *d, void *fdt) +{ + return false; +} + +static inline int sci_assign_dt_device(struct domain *d, + struct dt_device_node *dev) +{ + return 0; +} + +#endif /* CONFIG_ARM_SCI */ + +#endif /* __ASM_ARM_SCI_H */ diff --git a/xen/arch/arm/vsmc.c b/xen/arch/arm/vsmc.c index 6081f14ed0..2469738fcc 100644 --- a/xen/arch/arm/vsmc.c +++ b/xen/arch/arm/vsmc.c @@ -12,6 +12,7 @@ #include #include #include +#include #include #include #include @@ -300,6 +301,8 @@ static bool vsmccc_handle_call(struct cpu_user_regs *re= gs) break; case ARM_SMCCC_OWNER_SIP: handled =3D handle_sip(regs); + if ( !handled ) + handled =3D sci_handle_call(regs); break; case ARM_SMCCC_OWNER_TRUSTED_APP ... ARM_SMCCC_OWNER_TRUSTED_APP_E= ND: case ARM_SMCCC_OWNER_TRUSTED_OS ... ARM_SMCCC_OWNER_TRUSTED_OS_END: diff --git a/xen/common/device-tree/dom0less-build.c b/xen/common/device-tr= ee/dom0less-build.c index 0012046574..f29656a27e 100644 --- a/xen/common/device-tree/dom0less-build.c +++ b/xen/common/device-tree/dom0less-build.c @@ -228,6 +228,10 @@ static int __init handle_passthrough_prop(struct kerne= l_info *kinfo, if ( res < 0 ) return res; =20 + res =3D arch_handle_passthrough_prop(kinfo, node); + if ( res ) + return res; + /* If xen_force, we allow assignment of devices without IOMMU protecti= on. */ if ( xen_force && !dt_device_is_protected(node) ) return 0; diff --git a/xen/include/asm-generic/device.h b/xen/include/asm-generic/dev= ice.h index 1acd1ba1d8..e96c5558c2 100644 --- a/xen/include/asm-generic/device.h +++ b/xen/include/asm-generic/device.h @@ -18,6 +18,7 @@ enum device_class DEVICE_IOMMU, DEVICE_INTERRUPT_CONTROLLER, DEVICE_PCI_HOSTBRIDGE, + DEVICE_FIRMWARE, /* Use for error */ DEVICE_UNKNOWN, }; diff --git a/xen/include/asm-generic/dom0less-build.h b/xen/include/asm-gen= eric/dom0less-build.h index e0ad0429ec..1c56441c33 100644 --- a/xen/include/asm-generic/dom0less-build.h +++ b/xen/include/asm-generic/dom0less-build.h @@ -61,6 +61,9 @@ void set_domain_type(struct domain *d, struct kernel_info= *kinfo); int init_intc_phandle(struct kernel_info *kinfo, const char *name, const int node_next, const void *pfdt); =20 +int arch_handle_passthrough_prop(struct kernel_info *kinfo, + struct dt_device_node *node); + #else /* !CONFIG_DOM0LESS_BOOT */ =20 static inline void create_domUs(void) {} @@ -70,6 +73,12 @@ static inline bool is_dom0less_mode(void) } static inline void set_xs_domain(struct domain *d) {} =20 +static inline int arch_handle_passthrough_prop(struct kernel_info *kinfo, + struct dt_device_node *node) +{ + return 0; +} + #endif /* CONFIG_DOM0LESS_BOOT */ =20 #endif /* __ASM_GENERIC_DOM0LESS_BUILD_H__ */ diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.h index 24840eeaa6..55eed9992c 100644 --- a/xen/include/public/arch-arm.h +++ b/xen/include/public/arch-arm.h @@ -327,6 +327,8 @@ DEFINE_XEN_GUEST_HANDLE(vcpu_guest_context_t); #define XEN_DOMCTL_CONFIG_TEE_OPTEE 1 #define XEN_DOMCTL_CONFIG_TEE_FFA 2 =20 +#define XEN_DOMCTL_CONFIG_ARM_SCI_NONE 0 + struct xen_arch_domainconfig { /* IN/OUT */ uint8_t gic_version; @@ -350,6 +352,8 @@ struct xen_arch_domainconfig { * */ uint32_t clock_frequency; + /* IN */ + uint8_t arm_sci_type; }; #endif /* __XEN__ || __XEN_TOOLS__ */ =20 --=20 2.34.1 From nobody Thu Oct 30 23:14:03 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1753184529; cv=pass; d=zohomail.com; s=zohoarc; b=bg89I1rTrGhXRr3sirISUL83bD9xu/5PSt9wSA3PQ4QhMob3eyhnOdsH/GLRXNfZXHVNJm/3kKmjOBNyam0Y6VmcTUlN/cexB7Ynu9RGasZkyygDWpAfnf86fkZjxUW26+iaiDYHXWJ3MwMqPY1LZOy5uScl+OEqc1i463md+nI= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1753184529; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=yS5nd8+7GCnypH2t7jFX8XPLarALP1JqJw5pW0mZNOg=; b=giErOiKtaZr1berVA82TaUyAZBSwAf8uv0Oq0JNgmEln94tZ2kcWQGQOFEqT3CaLKHuTE/42VO2is56DFQzHboPVNwu4dfzxIGt94nRlvQ1hvckxw0poMJeCtJu0Mhp9P1q6E587b0MRUQ67i4C6UCwjG37GtyqQDq91SX0ixbI= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1753184529515936.3326511930358; Tue, 22 Jul 2025 04:42:09 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1052280.1420907 (Exim 4.92) (envelope-from ) id 1ueBNU-0002t9-0M; Tue, 22 Jul 2025 11:41:48 +0000 Received: by outflank-mailman (output) from mailman id 1052280.1420907; Tue, 22 Jul 2025 11:41:47 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNT-0002t0-ST; Tue, 22 Jul 2025 11:41:47 +0000 Received: by outflank-mailman (input) for mailman id 1052280; Tue, 22 Jul 2025 11:41:46 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNS-0002RD-20 for xen-devel@lists.xenproject.org; Tue, 22 Jul 2025 11:41:46 +0000 Received: from GVXPR05CU001.outbound.protection.outlook.com (mail-swedencentralazlp170130007.outbound.protection.outlook.com [2a01:111:f403:c202::7]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id d7b9e445-66f0-11f0-a31d-13f23c93f187; Tue, 22 Jul 2025 13:41:44 +0200 (CEST) Received: from PAVPR03MB8946.eurprd03.prod.outlook.com (2603:10a6:102:32e::21) by VI2PR03MB10809.eurprd03.prod.outlook.com (2603:10a6:800:272::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8943.29; Tue, 22 Jul 2025 11:41:38 +0000 Received: from PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc]) by PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc%6]) with mapi id 15.20.8943.025; Tue, 22 Jul 2025 11:41:38 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: d7b9e445-66f0-11f0-a31d-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=cMy1hF6v52+JukGYJK/pN/V/TnDN8CibHvoR8T55Pscf0jlcUMq4y5hLTMixym3/5H8ukcTRJmhlbEWyIKzpbFZ8OTxUsjwgAxyr6jIuilgs0DzKIIvEH1PZRSPffPafYKt8f2tRwbUlDkEdJQjZqUQMfLIbJwrK+dQuNrVrVu3ZhR4D04TQhIH0Q6Bjqa+qxbYnwCex+Q8R0MvJQN4wAU0lhQDkMjZLchStYaSaUhP2/SPobmOkavQvf+jJcyWUCpCNVALxlwHAxqp0XdPGkRIMdNfp2aq+dqA/hmbWTxZljUfi9+9wEx5YJvG9Oc8mw9Z3Ayi4Xfr8WeqZTKfSUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=yS5nd8+7GCnypH2t7jFX8XPLarALP1JqJw5pW0mZNOg=; b=jjXICJ+vuD+fW7TWLYsYS9jlacSeQvmZH+3g9iIldiCMUm23mh58t5mKj/gcQ3QTnCBR/DInvQqA0a9J3nrmDy/6JqHNZ7fY5M+FiaNzl3pM8VbtmuZ2ISiYsVfrhBvSSmqT6kCqztTh5xMBIPLjUtJdomY11QUXZ0m6zOu/DEIB9fW/fvudx8FENyGs7xbXDAwJO+y4NR3/0G/nhMLT1Z5ZEeOmKLn8XHHbliO9qvO66jMxN0FrUwBmoxpSmKyWDTTbAXOXbViQluCwN/Er0J/Gg7w1nyQJvr1Qt9glOOx+3twruZFgtVlBECmDii33FMQ1VwnsZf49zmMRkNrMzg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=yS5nd8+7GCnypH2t7jFX8XPLarALP1JqJw5pW0mZNOg=; b=uhz36tR+l/scGeQwjf0qj1dubbu+KwZu3H4lXPAQH9k6R12KOOPRgok53IFxgOs4z67Yk3/TtdW9CIu+TtXRPCMirpWqQMWn5N8ne0Ix5K4Ci7v73bhSvP5AyAnXxpKVcsaRQPSMPyqD9xmu0pKHrU8mm40VRK4wpfsKpBKLAOlcvplcCXfVWFhUt6seJBXBN8/CAyHBcuXwSp4nTf9zIXumq+Vq5hvD5tKjSy2UUM9aHiUbdKeXn1RBo48LOqqLtrwuM43wBESCc0iVAdDTFGMqe75zdlw/g77aZi2EL4FQWfG6iYlVrDItIYv0t+kTY1cAgqpeoEqAUiOq8c3DGQ== From: Oleksii Moisieiev To: "xen-devel@lists.xenproject.org" CC: Andrew Cooper , Anthony PERARD , Bertrand Marquis , Jan Beulich , Juergen Gross , Julien Grall , Michal Orzel , Oleksii Moisieiev , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Stefano Stabellini , Volodymyr Babchuk , Grygorii Strashko Subject: [RFC PATCH v5 02/10] xen/arm: scmi-smc: update to be used under sci subsystem Thread-Topic: [RFC PATCH v5 02/10] xen/arm: scmi-smc: update to be used under sci subsystem Thread-Index: AQHb+v2VN6PNmY5o9E6echLDtYWg4w== Date: Tue, 22 Jul 2025 11:41:38 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB8946:EE_|VI2PR03MB10809:EE_ x-ms-office365-filtering-correlation-id: fbec80d1-b1ae-4b0e-f1c9-08ddc914b85e x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|7416014|1800799024|366016|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?9nYOZAiX/07dRFKEbnlpzJrqHRh0n89ZD2Ylt/HHOZ9SPmj1WqbMzRwNFp?= =?iso-8859-1?Q?PVVspBbZy5JAhRMlHyDYeNIgTmCcJv0bpowH3djBLtIqcz23rFFKjvAoZb?= =?iso-8859-1?Q?j2j7cI+opczRlQiI3gV27dz3Flapmpm5zTbU2f3nYb1Ig7KImKSxrIVXss?= =?iso-8859-1?Q?IxJ4dylQziJ7VuOS215ggUYnhZ16tuH/cfN/yCf1oIjgs28JkXofBssGLb?= =?iso-8859-1?Q?BBgxRkxW8gpqVeLrI3XPaMPZ/+N3g3gWCPbSyDmVsfyDLFeVDoySq6luct?= =?iso-8859-1?Q?iuB3UfNj4Z26p0/ky7uS/DRdx2TuATA+fGhxbOk2jgllllKVk/E9z5QQqb?= =?iso-8859-1?Q?02AneZYtmpGRgzSt9IYWMpM2jMPTsO8A5Fb2pLrTgUiLt9AD6MqK4ZpH8i?= =?iso-8859-1?Q?IMCGsSI8HYNFQkS6GO4s0S173UdFlkkP2QCkymXTUiJ9gUFzpVq1c2GyS3?= =?iso-8859-1?Q?KW8Fin7RdsIkUvKin03UxH1BRMHv1ep7GjmGGpP93d88plcwIK4VGGsP9w?= =?iso-8859-1?Q?TCaAMUXYCttFWIAQ1tJe+C5yLshv5AvgwDLvZcnGn2/nBWk0J5sYrZvvDa?= =?iso-8859-1?Q?XUjYXoynjZyBKzLrMCS5Odepyj8zVcFHaX69JP2YZEoP1PomBdMMRMMXER?= =?iso-8859-1?Q?hY/1hOxYEBG55SLmbkthn0Jq4o7QQGoJ5BZnFL/2zJkoIoU/CuJMMESYP3?= =?iso-8859-1?Q?LJMZVx6yHDrPND4PT8KkaWwDT6gzxyJ00ixvaWEPurncD/O9KfYoV9lmEo?= =?iso-8859-1?Q?pSm7yE+Gr0qT9RXMFWJ3Gs87IcSBE4e48PAq22TK9awWF9IZ9YgUhJdzzC?= =?iso-8859-1?Q?APfZphHMAAQ+0JnYNfQPfw6PtKbxXJ8gz73lnxXf88FEdJimAlXM+++4nj?= =?iso-8859-1?Q?vA/TyVBifXrADjQHCMqQ0IVcNTZNtpk3BEpJLZeoudT7QRgZ5ltXn+9lLa?= =?iso-8859-1?Q?7QIIEqlbsl+gQNGMT7ZZVcgzyzGA8VozN06hFPeez3dAOaCAbVi0g+HcT2?= =?iso-8859-1?Q?nEVQSuQkEos2/MVkmkp39W7qnVGZsMVUnECDmyE0W4fKXqYDB9ERRJlRX7?= =?iso-8859-1?Q?ND88aCEJHLM/zARfhC6AjWyCsBMnuGUnvA3OHpj5XexgTSnO/IS+kqOoVY?= =?iso-8859-1?Q?d7YnlUxlLDlBUneVr5RApZSq+jnnVg0aflxeR5dWHfVacDmA3aqCS5aiym?= =?iso-8859-1?Q?jD/ayPfZtjJtIoYmkHpVDN5br6t09Y6HtjOOdaXLIRspgxc8+SLdAwwF0X?= =?iso-8859-1?Q?bB7vLS9DqftRHzWRcOVlvY94S1cnTF9NA9/R5PnoEuplJDVAysAellmNYq?= =?iso-8859-1?Q?INZTk5P8DQiHp1q/NMN4wY1OO9n2gTYaoZrdKYPUAA0acH9Y/0VHtypLMe?= =?iso-8859-1?Q?i8z2Aq0VsISJ4+DlD+vZzRLLTK1dGtdrMmvTMWDrd/uJ99341fIwP6U19H?= =?iso-8859-1?Q?NuZ4uck4P7/HHlFPIDQpplvMXXuBm7sgr5iu+OdHOmzJT9eUM0470JQBhn?= =?iso-8859-1?Q?ruqZUFMbTmnrvYpMPSNz6o362lKFrm5xttwS6qOAigSw=3D=3D?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB8946.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(7416014)(1800799024)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?bhssojWqyorBc3XyC8ulsG7NMm3Jw30T0q3UCWjuZMuzhQn9+2ZvQRWpU7?= =?iso-8859-1?Q?OSHIT6L9kyVnVKzorontUgEDhXKGnkRdQZMk3nhhLHluksa7NbzpdCTbeW?= =?iso-8859-1?Q?wDBl2G8i3t9zOCNT9ooo+4GjnYVyHU6Xcic2d/lDy5fbR3FPjeRGDvZ4FO?= =?iso-8859-1?Q?2ojJTYtMTMKHCVidgLklDsRKPDToNWibm6AruM5/4GuUC8zoK7JRLeIv2b?= =?iso-8859-1?Q?CUUXFoouEUiAxWc6FSPJL1J2wqxkmHSP0il3CGxqPqCpg/awvN2J0LwT+2?= =?iso-8859-1?Q?ivFKI/GY5a8KblwBuSImLcgZiU113lVTNPA0QV7zT7r/IYUhSqFLGQoYXS?= =?iso-8859-1?Q?99SXJunXAcfmAJXgCrLjt1N5tafsTZwNKYW1RoFfyq6xDF7kJ4f22tl2d4?= =?iso-8859-1?Q?NitVoCl45W0J4VW6/YxERHfJlqBmQ9p72DDPA8gHguBMaTESiL1hYVmwyO?= =?iso-8859-1?Q?5nIPybeVNUQBggO2OSAOOByMvxmXypVixBqgxDzSqeTEZtWgeNhWst5EKD?= =?iso-8859-1?Q?e/443lhOw4xRZb1wXUWgLVq4Y6NV3zYfEDrHnB35wc5lpCWW5ln++vA5Ex?= =?iso-8859-1?Q?AqfwB8STsYW6ASKPftlcPMJOeFuw4zvMWHtMFaFxK2vOQf1V3ClEItiTDj?= =?iso-8859-1?Q?e6uuHKSY5aMPA3tVUpAtWdUcvkR7GiMRqVj1h6GKwlp3Fs0X136w+qE3bz?= =?iso-8859-1?Q?sxrFPnRus68N2hjmaN0BYsZyDQIJER8RuOpGcRljJbg2RoOUH+mav9ml/t?= =?iso-8859-1?Q?ic46HuWE/2Rd3zm4pxiJKdyhmFMXI8yq5bLzKpqh55J2KPEUJQowxZxM3W?= =?iso-8859-1?Q?ek5WhYIMbXuuthFAy+TAuZDDFOPApZjNICGtO9L/KTr092Xu6+YjUK5C5R?= =?iso-8859-1?Q?88XenHncQXi9eiNOjq8535PGWmWfFE97Bor9Zrp76k94SenRrIalxXEK3Z?= =?iso-8859-1?Q?AYeW3yIXN2pprH/0crhUSqFX5N5Mhe2RZfbzxVaQpQyWRAd+8Ink5079Bw?= =?iso-8859-1?Q?oyqtwxkmoZ4GqTxthLYBCxicEcmls87oU0LizadQ25bhM4b8jG3/jNY76d?= =?iso-8859-1?Q?FTCjZfDyMhA4OUY7N2/7CbEUaEvyDMGbSbR4+mDN42A2FbBVy9Vvaq648p?= =?iso-8859-1?Q?sz/l8R2of7hxl4W/burimgu+jweptTQXOIHqEnVN2Ljc7dQwShuucVpvZV?= =?iso-8859-1?Q?uTXBBHsLYqYDU3tHkdC91qBLj0N032oz+71Rfcr0jeEqTjRdPQFKcqzjEK?= =?iso-8859-1?Q?sQ64X8TWxv/V7+Jc13WyGJJeV285LIuRfKusHxrXe8IzbljzZ05rbZhkSZ?= =?iso-8859-1?Q?aesCxwzb6k+TtyVdgkzwjVPwRWUHNNDgqo6445iq9DhtXhet2ZJ1+bJXn/?= =?iso-8859-1?Q?AAU16l5Y7IdwiYWEjYooVceLYa8awko1OyV5ZVf4ivOOZAQNRQ7rrtQhfq?= =?iso-8859-1?Q?x1/EX6NlsdmuYvp5+a2Vk3Az6I+ZxtcOG2G0+MkKKO6WRaQg9zH7Na2KC1?= =?iso-8859-1?Q?8Pr4IgAk+nPiG325t9gxjOs/rOdODRmUuuqkbDw36wH8Tzh6RZVkU+/eSH?= =?iso-8859-1?Q?c6oDQ84xuGo0eJsrGjm2wdWZwL5kalLCLPXM+mA/1ueUdZdttJgsEInB+4?= =?iso-8859-1?Q?LYU916nozku8AuPkCrgrI/bYt1aAX6dYemVYNigu1Ad+0UW7RwnoEcpg?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB8946.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: fbec80d1-b1ae-4b0e-f1c9-08ddc914b85e X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jul 2025 11:41:38.5966 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: bTBm2wtoWCmKdv+jGI1Y8VB2EvIrYLip/b+gWDkVgeVOc8UmdrIKhMjNFRroUqNkKMffOCjaT6Uc3qiAyjlIMZSJKyjiP9NTaZNV9F2Mypo= X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI2PR03MB10809 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1753184531575116600 Content-Type: text/plain; charset="utf-8" From: Grygorii Strashko The introduced SCI (System Control Interface) subsystem provides unified interface to integrate in Xen SCI drivers which adds support for ARM firmware (EL3, SCP) based software interfaces (like SCMI) that are used in system management. The SCI subsystem allows to add drivers for different FW interfaces or have different drivers for the same FW interface (for example, SCMI with different transports). This patch updates SCMI over SMC calls handling layer, introduced by commit 3e322bef8bc0 ("xen/arm: firmware: Add SCMI over SMC calls handling layer"), to be SCI driver: - convert to DT device; - convert to SCI Xen interface. There are no functional changes in general, the driver is just adopted to the SCI interface. Signed-off-by: Grygorii Strashko Signed-off-by: Oleksii Moisieiev --- xen/arch/arm/firmware/Kconfig | 13 ++- xen/arch/arm/firmware/scmi-smc.c | 93 +++++++++++--------- xen/arch/arm/include/asm/firmware/scmi-smc.h | 41 --------- xen/arch/arm/vsmc.c | 5 +- xen/include/public/arch-arm.h | 1 + 5 files changed, 64 insertions(+), 89 deletions(-) delete mode 100644 xen/arch/arm/include/asm/firmware/scmi-smc.h diff --git a/xen/arch/arm/firmware/Kconfig b/xen/arch/arm/firmware/Kconfig index fc7918c7fc..bbf88fbb9a 100644 --- a/xen/arch/arm/firmware/Kconfig +++ b/xen/arch/arm/firmware/Kconfig @@ -8,9 +8,18 @@ config ARM_SCI =20 menu "Firmware Drivers" =20 +choice + prompt "ARM SCI driver type" + default SCMI_SMC + help + Choose which ARM SCI driver to enable. + +config ARM_SCI_NONE + bool "none" + config SCMI_SMC bool "Forward SCMI over SMC calls from hwdom to EL3 firmware" - default y + select ARM_SCI help This option enables basic awareness for SCMI calls using SMC as doorbell mechanism and Shared Memory for transport ("arm,scmi-smc" @@ -18,4 +27,6 @@ config SCMI_SMC firmware node is used to trap and forward corresponding SCMI SMCs to firmware running at EL3, for calls coming from the hardware domain. =20 +endchoice + endmenu diff --git a/xen/arch/arm/firmware/scmi-smc.c b/xen/arch/arm/firmware/scmi-= smc.c index 33473c04b1..13d1137592 100644 --- a/xen/arch/arm/firmware/scmi-smc.c +++ b/xen/arch/arm/firmware/scmi-smc.c @@ -9,6 +9,7 @@ * Copyright 2024 NXP */ =20 +#include #include #include #include @@ -16,12 +17,11 @@ #include #include =20 +#include #include -#include =20 #define SCMI_SMC_ID_PROP "arm,smc-id" =20 -static bool __ro_after_init scmi_enabled; static uint32_t __ro_after_init scmi_smc_id; =20 /* @@ -41,14 +41,11 @@ static bool scmi_is_valid_smc_id(uint32_t fid) * * Returns true if SMC was handled (regardless of response), false otherwi= se. */ -bool scmi_handle_smc(struct cpu_user_regs *regs) +static bool scmi_handle_smc(struct cpu_user_regs *regs) { uint32_t fid =3D (uint32_t)get_user_reg(regs, 0); struct arm_smccc_res res; =20 - if ( !scmi_enabled ) - return false; - if ( !scmi_is_valid_smc_id(fid) ) return false; =20 @@ -78,49 +75,45 @@ bool scmi_handle_smc(struct cpu_user_regs *regs) return true; } =20 -static int __init scmi_check_smccc_ver(void) +static int scmi_smc_domain_init(struct domain *d, + struct xen_domctl_createdomain *config) { - if ( smccc_ver < ARM_SMCCC_VERSION_1_1 ) - { - printk(XENLOG_WARNING - "SCMI: No SMCCC 1.1 support, SCMI calls forwarding disabled= \n"); - return -ENOSYS; - } + if ( !is_hardware_domain(d) ) + return 0; =20 + d->arch.sci_enabled =3D true; + printk(XENLOG_DEBUG "SCMI: %pd init\n", d); return 0; } =20 -static int __init scmi_dt_init_smccc(void) +static void scmi_smc_domain_destroy(struct domain *d) { - static const struct dt_device_match scmi_ids[] __initconst =3D - { - /* We only support "arm,scmi-smc" binding for now */ - DT_MATCH_COMPATIBLE("arm,scmi-smc"), - { /* sentinel */ }, - }; - const struct dt_device_node *scmi_node; - int ret; + if ( !is_hardware_domain(d) ) + return; =20 - /* If no SCMI firmware node found, fail silently as it's not mandatory= */ - scmi_node =3D dt_find_matching_node(NULL, scmi_ids); - if ( !scmi_node ) - return -EOPNOTSUPP; + printk(XENLOG_DEBUG "SCMI: %pd destroy\n", d); +} =20 - ret =3D dt_property_read_u32(scmi_node, SCMI_SMC_ID_PROP, &scmi_smc_id= ); - if ( !ret ) +static int __init scmi_check_smccc_ver(void) +{ + if ( smccc_ver < ARM_SMCCC_VERSION_1_1 ) { - printk(XENLOG_ERR "SCMI: No valid \"%s\" property in \"%s\" DT nod= e\n", - SCMI_SMC_ID_PROP, scmi_node->full_name); - return -ENOENT; + printk(XENLOG_WARNING + "SCMI: No SMCCC 1.1 support, SCMI calls forwarding disabled= \n"); + return -ENOSYS; } =20 - scmi_enabled =3D true; - return 0; } =20 +static const struct sci_mediator_ops scmi_smc_ops =3D { + .handle_call =3D scmi_handle_smc, + .domain_init =3D scmi_smc_domain_init, + .domain_destroy =3D scmi_smc_domain_destroy, +}; + /* Initialize the SCMI layer based on SMCs and Device-tree */ -static int __init scmi_init(void) +static int __init scmi_dom0_init(struct dt_device_node *dev, const void *d= ata) { int ret; =20 @@ -134,22 +127,36 @@ static int __init scmi_init(void) if ( ret ) return ret; =20 - ret =3D scmi_dt_init_smccc(); - if ( ret =3D=3D -EOPNOTSUPP ) - return ret; + ret =3D dt_property_read_u32(dev, SCMI_SMC_ID_PROP, &scmi_smc_id); + if ( !ret ) + { + printk(XENLOG_ERR "SCMI: No valid \"%s\" property in \"%s\" DT nod= e\n", + SCMI_SMC_ID_PROP, dt_node_full_name(dev)); + return -ENOENT; + } + + ret =3D sci_register(&scmi_smc_ops); if ( ret ) - goto err; + { + printk(XENLOG_ERR "SCMI: mediator already registered (ret =3D %d)\= n", + ret); + return ret; + } =20 printk(XENLOG_INFO "Using SCMI with SMC ID: 0x%x\n", scmi_smc_id); =20 return 0; - - err: - printk(XENLOG_ERR "SCMI: Initialization failed (ret =3D %d)\n", ret); - return ret; } =20 -__initcall(scmi_init); +static const struct dt_device_match scmi_smc_match[] __initconst =3D { + DT_MATCH_COMPATIBLE("arm,scmi-smc"), + { /* sentinel */ }, +}; + +DT_DEVICE_START(scmi_smc, "SCMI SMC DOM0", DEVICE_FIRMWARE) + .dt_match =3D scmi_smc_match, + .init =3D scmi_dom0_init, +DT_DEVICE_END =20 /* * Local variables: diff --git a/xen/arch/arm/include/asm/firmware/scmi-smc.h b/xen/arch/arm/in= clude/asm/firmware/scmi-smc.h deleted file mode 100644 index 6b1a164a40..0000000000 --- a/xen/arch/arm/include/asm/firmware/scmi-smc.h +++ /dev/null @@ -1,41 +0,0 @@ -/* SPDX-License-Identifier: GPL-2.0-only */ -/* - * xen/arch/arm/include/asm/firmware/scmi-smc.h - * - * ARM System Control and Management Interface (SCMI) over SMC - * Generic handling layer - * - * Andrei Cherechesu - * Copyright 2024 NXP - */ - -#ifndef __ASM_SCMI_SMC_H__ -#define __ASM_SCMI_SMC_H__ - -#include - -struct cpu_user_regs; - -#ifdef CONFIG_SCMI_SMC - -bool scmi_handle_smc(struct cpu_user_regs *regs); - -#else - -static inline bool scmi_handle_smc(struct cpu_user_regs *regs) -{ - return false; -} - -#endif /* CONFIG_SCMI_SMC */ - -#endif /* __ASM_SCMI_H__ */ - -/* - * Local variables: - * mode: C - * c-file-style: "BSD" - * c-basic-offset: 4 - * indent-tabs-mode: nil - * End: - */ diff --git a/xen/arch/arm/vsmc.c b/xen/arch/arm/vsmc.c index 2469738fcc..78d5bdf56f 100644 --- a/xen/arch/arm/vsmc.c +++ b/xen/arch/arm/vsmc.c @@ -21,7 +21,6 @@ #include #include #include -#include =20 /* Number of functions currently supported by Hypervisor Service. */ #define XEN_SMCCC_FUNCTION_COUNT 3 @@ -233,7 +232,7 @@ static bool handle_sip(struct cpu_user_regs *regs) if ( platform_smc(regs) ) return true; =20 - return scmi_handle_smc(regs); + return sci_handle_call(regs); } =20 /* @@ -301,8 +300,6 @@ static bool vsmccc_handle_call(struct cpu_user_regs *re= gs) break; case ARM_SMCCC_OWNER_SIP: handled =3D handle_sip(regs); - if ( !handled ) - handled =3D sci_handle_call(regs); break; case ARM_SMCCC_OWNER_TRUSTED_APP ... ARM_SMCCC_OWNER_TRUSTED_APP_E= ND: case ARM_SMCCC_OWNER_TRUSTED_OS ... ARM_SMCCC_OWNER_TRUSTED_OS_END: diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.h index 55eed9992c..095b1a23e3 100644 --- a/xen/include/public/arch-arm.h +++ b/xen/include/public/arch-arm.h @@ -328,6 +328,7 @@ DEFINE_XEN_GUEST_HANDLE(vcpu_guest_context_t); #define XEN_DOMCTL_CONFIG_TEE_FFA 2 =20 #define XEN_DOMCTL_CONFIG_ARM_SCI_NONE 0 +#define XEN_DOMCTL_CONFIG_ARM_SCI_SCMI_SMC 1 =20 struct xen_arch_domainconfig { /* IN/OUT */ --=20 2.34.1 From nobody Thu Oct 30 23:14:03 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1753184531; cv=pass; d=zohomail.com; s=zohoarc; b=e3uREionjOOklDITNrTEpvWZDkOcfILX//tx6+d4uGMzoAcaR3XZmotvW/IKNZIv6r8o69r8jQHDj7g5ruhnmHWBkt6gUX6c9Hul7GuHGZ4V8Ch6w2cBL/OiDH9BPAObhE9LdgFIo3348wYFJIPIzGFXfQ68yeCt+YQnU+OTIc0= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1753184531; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=BH6uP6T92fUPJOOHYdRU2OEOHDWBDGnbqymyAZm2crs=; b=MunypmFtSB4mZIn17eS9NOkAcNomI0ooCiX0WGChkTbmbCVrlMwXcCXip6JUAUwNfCMqYL7UlyhEx4TCohcjLy5t3LmoBebKrSGeG6DPUv6nl9Igh5x+LJwpyVZAmNEd2xuBthqetXGrntlMhzkuG9qK8bBRZcDNhlxMbyJ883I= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1753184530995527.4219848842874; Tue, 22 Jul 2025 04:42:10 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1052281.1420912 (Exim 4.92) (envelope-from ) id 1ueBNU-0002wE-D2; Tue, 22 Jul 2025 11:41:48 +0000 Received: by outflank-mailman (output) from mailman id 1052281.1420912; Tue, 22 Jul 2025 11:41:48 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNU-0002vA-47; Tue, 22 Jul 2025 11:41:48 +0000 Received: by outflank-mailman (input) for mailman id 1052281; Tue, 22 Jul 2025 11:41:47 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNT-0002RD-2H for xen-devel@lists.xenproject.org; Tue, 22 Jul 2025 11:41:47 +0000 Received: from GVXPR05CU001.outbound.protection.outlook.com (mail-swedencentralazlp170130007.outbound.protection.outlook.com [2a01:111:f403:c202::7]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id d82abb7e-66f0-11f0-a31d-13f23c93f187; Tue, 22 Jul 2025 13:41:45 +0200 (CEST) Received: from PAVPR03MB8946.eurprd03.prod.outlook.com (2603:10a6:102:32e::21) by VI2PR03MB10809.eurprd03.prod.outlook.com (2603:10a6:800:272::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8943.29; Tue, 22 Jul 2025 11:41:41 +0000 Received: from PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc]) by PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc%6]) with mapi id 15.20.8943.025; Tue, 22 Jul 2025 11:41:39 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: d82abb7e-66f0-11f0-a31d-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=xBF0FzU7UAivJH9myFSb3n7b1yrkrVig+CiYw26bDKthzlu51wPApBxFRzdBL4l03ueAlpComW/QPsDPPWW03JypC2dDRKevSo6TSt5lulBvahyUqfje/5Vkt5WjLx1flpTxKN0hhzu9GdHCmLTgxUjTDBq9ctLEHozFeR9qYIZCu3wsRVNWMW77kVhG7Z2o3SNL5nw6rnFNR+3FxnX1tqXzRR34LZfq4tHT03Um0LfgIfy+c/y6TP21m84jwrB8iEWOC3v6rt2dQZ6k1JYPeJwOoUOC2QlryBIl+0KlsTOCruim2n15y/ADF4Q/X5TLBgRzFpR5+S8VVTZc2iC5Jg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=BH6uP6T92fUPJOOHYdRU2OEOHDWBDGnbqymyAZm2crs=; b=s1tUzFKJ4GDsJ00YcT9xaCazu+jcoKmXxiLOouwikEixOqj1v0waXdmwGVlVH32X9bX454q/K1c0rkuuJTyzXV8gD5j5Qk7mpWAu8J1TwuasbcrVXmb0xB0tZVO39wab2NLryEUXhkuMtYuBekMwSjxTw29SRJEfkv+1GWNH8erxHIxR+aL8ObckmmNv4WbqPYmTM+zrJXTzEV2H+ob2vssgoEZjwo1p24bII4qpg3uGhDjvZut3fVX50LZbpqC05xN+aYZPZmiRvB1SLUUASrwvpEOpX/HS1avo0wJE6buYeySranPCEEn/zmDtWOws9nhHeRxmGp51gxv1RhQfJw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BH6uP6T92fUPJOOHYdRU2OEOHDWBDGnbqymyAZm2crs=; b=G0rsfAvhHW+XY+0O4VF1627q2/b51PYSDTM0SHclk3GQ1yOofQ9T6Kzk6YLlmXiDqWfIcJ2Q76xwYvp2ZfVWRYUExni4f++kR3h1UOSgHZ7nqbwXd+Z1u7xEq7D3hCCEgIUCo3KG98zMi0mGGceW+Tz+ZwgWtVfkAJFKH/NCNOZ7oiFjKOM8FXwXcG9oGFp+IC4t3aAZUuyrksqjOISNrzZ05IbO6vny1Ev6leJh7FaoUtc05c+CkjykvRS8Dw/olI/BbgdblydqOSflTnLN5q/RHjuUAYuJaY5lj2hg5mVWcBpq40l9PdbNca+0tQkcQiHSHHJkVoR4xPGOCppYIQ== From: Oleksii Moisieiev To: "xen-devel@lists.xenproject.org" CC: Andrew Cooper , Anthony PERARD , Bertrand Marquis , Jan Beulich , Juergen Gross , Julien Grall , Michal Orzel , Oleksii Moisieiev , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Stefano Stabellini , Volodymyr Babchuk , Grygorii Strashko Subject: [RFC PATCH v5 03/10] xen/arm: scmi-smc: passthrough SCMI SMC to domain, single agent Thread-Topic: [RFC PATCH v5 03/10] xen/arm: scmi-smc: passthrough SCMI SMC to domain, single agent Thread-Index: AQHb+v2WwNOcdkSTxEeQCZiMLfCc7w== Date: Tue, 22 Jul 2025 11:41:39 +0000 Message-ID: <3c8b292b345d81cd20ce260d45d3d7aac6d98702.1753184487.git.oleksii_moisieiev@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB8946:EE_|VI2PR03MB10809:EE_ x-ms-office365-filtering-correlation-id: d60a3750-99a0-436a-0307-08ddc914b8ab x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|7416014|1800799024|366016|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?6gMxcGNqQAE4ESnTFnn3X3ib6ZwAXOrY4RZKRrkGMvFBealjV8wmtFha3+?= =?iso-8859-1?Q?46Pp4obHSp70FG9DqVTjb8NLQcamtScaSuVWsL8/F5AjVwic02BJwJbhmz?= =?iso-8859-1?Q?vTKqjqVjTpIAUdSIpTY+SG5RY8Hn9MXjWSSWfgBjkxvWjU0FFNPjrPP+zK?= =?iso-8859-1?Q?VIsny/ICp6uA5tMLn9P+Z+xRxnSi4mxu63Xi1OeeW20tA245TRD9CNy7rI?= =?iso-8859-1?Q?eQBMUouJwlsSc7/A4MhZRnyYSLdqp86kV9jhmWHYjcMDostKqAXt8kXCwd?= =?iso-8859-1?Q?0hVOYvUlziA81AhWgCvEz7gYvb613IP8aWWcLsKyy9v8ZKfW5oa6xkQUm+?= =?iso-8859-1?Q?k6vUjdpnqCfRSZ9NECutzEp/xsgU5lKMwgUyixpNhujVnA/53so5nCgmpK?= =?iso-8859-1?Q?wT+wMPj8UZ0RcQlRSOS+uURglRUVdq1xiId/W4AQ/r32z/+CFlrcNfuuV0?= =?iso-8859-1?Q?ouDOS6ZVtu3DLVCd19BBMYYswklGY1i+H1H8KharyWZLl61Zb55m7IM8E0?= =?iso-8859-1?Q?n+mRRtu65+mdkqUmn3RdzNA182RD8Gi3VviqFr1IUM8lEXOzbR+5Scak7D?= =?iso-8859-1?Q?4+/Sw7LC3p7BxDzFTEM0CxTbSydygI+6DzBmGA5JmH6ZQxCFBCbGrr12zE?= =?iso-8859-1?Q?qtIt5KHOnqlW7lqoxExQwYnlBOY/wa1wgcwrgHUA8y79sASlwi8CYTvYeH?= =?iso-8859-1?Q?k4Q7jvIYmctFFchP2qRgRGjuze04kDp7gRVf71JrhC35+6YwMd9n51hKaj?= =?iso-8859-1?Q?Q14wK/9GCJawFhPceG+z2a1BW++UG/XPr3MZlaE0VSPJ7nyQamr319nPEb?= =?iso-8859-1?Q?f6LTa2wS+YRkffL4DTxmRKGcikIy3NhdXzKvmydS5BxfwcdI4K5CCBXvuX?= =?iso-8859-1?Q?pshSpnhnO43HPzLT7QkIjjhQwG0u7s8Ho0qlgbdTaUt9wzcX8UGpYugktj?= =?iso-8859-1?Q?8kgIVFamDIP8xNTahiyKLaeLEEW9CltUa24Sm2UUxmv+gbWxxmjV6ESpgA?= =?iso-8859-1?Q?kheW5M1Xv1fEHHGTtOiheMmgTcJcmoNworqqC/uWkJx0/7UG3SsWJ5bAZU?= =?iso-8859-1?Q?Hg5C33O23ToENKlM27LFEtD/MNgux+ME8dQihPWhRLV1xqYqSvpnhBJ1hn?= =?iso-8859-1?Q?qAfXjLOHbccWkN8T8B5JwNYdPFP0ihpaCEVyK0RVN41R4DCa9Iy3bXu0Hq?= =?iso-8859-1?Q?HBJ95pfYjpdUUzkXwaSu0b2tgcARbLAJnkv4+y6fLT8XFl4lRsvJ3A6frP?= =?iso-8859-1?Q?+fBCz4zdfhlrHBSededLay5RhbO5efAx+eMesEDinSMehITb1fEgMkajeB?= =?iso-8859-1?Q?4YgVrNtl+cKNGqall/RKtPwHO432zSi/kCb9MZu2PlV+xEIJxkpv1NRmKl?= =?iso-8859-1?Q?sY3tZbQGJHJj/Lpnjxsb3LUz2NNrHDo7f6476bHYSZFTkQV0ctgiIbHmIi?= =?iso-8859-1?Q?K0v0kMUfQ8I7b0Kol2dpu84U247TkQkcGw9eXusxhp6/oVr2supIfialAv?= =?iso-8859-1?Q?qIhZ1qOM45loR0up3X2z11AqqeobQx57pWRkFLRZ3TPg=3D=3D?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB8946.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(7416014)(1800799024)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?2ll9+V0RB6SAlI44myPaNew0qckNv1QjBEu25+QcJR6Z3xvBjyStNWDO12?= =?iso-8859-1?Q?IVF0rwSjI5bXvwLkXlJoLwOhDStqBFLtmuWpDwcWhUJntFUPqO33d07OCv?= =?iso-8859-1?Q?9q7VdhNu3jQVs9kHy6ly9DsxRXIPL7nDERGhCpooAdX6sJv3paQW955d4z?= =?iso-8859-1?Q?51uFfT9beLBrxNH081I8bZsVYzeLITM6Rg+vNMf4el6u9cizPlWWcowAqH?= =?iso-8859-1?Q?4U++62VQrmf0naKeBulL/Ezmo20taQN54wAJr6iH1nOCQ0LwXUipipjyP3?= =?iso-8859-1?Q?SFlO5HBqa5txuOM7J9KDxS2oSMj0OiqujI0PoagJEMAN0XAGsMHPWsYgWI?= =?iso-8859-1?Q?dEW9dsJRJ87womZFGu+lLfjyZQWWkFti2icfP2Hm82H5Sn0NVjANqV4cCW?= =?iso-8859-1?Q?tEDYONyxQiu11Mf8pacMjkVeDvsfl2ITky5q6XQarNyGv261f3e7d4xvNE?= =?iso-8859-1?Q?cUixHUu4odmg+jHnWMUEXmcI/NIHzt94pO2NSce/bl9mi+8Qst8TGc1EVW?= =?iso-8859-1?Q?wUH8TPYDMxhAbZLXJJOOl0FwN/lLZfAIthgWr8phGd8twMntey0qBYDQdN?= =?iso-8859-1?Q?6AMtGnqyKzwQuKsPVP/Oim7l/aUcvr1A/k/tD1N6Lz6KxRis2Wd2UdOARd?= =?iso-8859-1?Q?4MUFmCxCeFLXKfFZ9pdJn0IYsiWDPV/2yxuslWxue7qhTBjU9G/mdUAOia?= =?iso-8859-1?Q?DJUq4azOb50gMjtH5Nm66j/c6p6PGA31K5uwPhgIaPvsF5NIYR6RM7+nS7?= =?iso-8859-1?Q?UKopTiAPSndMkZjnkuR0VoEvViGRTOilApWE/MFnfAifZESZuxKd9tiLNZ?= =?iso-8859-1?Q?U1Kgd69MsKTQt6fryr+HP14eod0ORbUtMeZmt8oPfwbBH+3zA4tboSlFsf?= =?iso-8859-1?Q?S9YHufQJdRlTdKuDyGvWhcLBEOXVIDrvufQFSydNn6vDwRUQFWzbXIAyKH?= =?iso-8859-1?Q?VbwQpNSkWZBlediKq1xetkWv5XhZ/MSB/BcZSp+8IrdV9HoNGe6CN0Yae/?= =?iso-8859-1?Q?7ZOlqpVrKf0S3KHD/Ce18W1KP2UooElRYbBEyAFmMUPIA4TN0fRqwBzq/I?= =?iso-8859-1?Q?LDyaNcOZ/WQIAWEIcUGhFQUtuN2BFROVlDXfg/KSItkoFkj5zMmXXjs6ig?= =?iso-8859-1?Q?JD5nfDLTfzQFurr7K9WgdilKph6+VZuyLEykEpjkYQ19hvSRFC+6cqbe0y?= =?iso-8859-1?Q?vPACKI1ZDJSpk6pzdKX8Vo1ubvj+Z9W9LjeDkLQW3wJoPB3Q+MbmpxpaTI?= =?iso-8859-1?Q?s5CpmHykwknd2/Ni8kcC8OByJ7RL0UZxdWa0d7JMLFx+j5xEOiP+gXbcQ4?= =?iso-8859-1?Q?B6NFqlmrijwHrZcTsWaH7cx0Sxtj9fkojFKMO1eRqXwpWGnMHf3NRNN8bT?= =?iso-8859-1?Q?A5JneoEwGZbbmfX8Kru00BlKRO7qtCekwbzIpLCx71+f3CySXjFwwCl8MG?= =?iso-8859-1?Q?JBp8kJfaA3L9l1V1SDueC75nMkjh/t84E0YxNx8I/KqMb7uEWmrzoCfxWE?= =?iso-8859-1?Q?nior78ZaTF4dQaBVNB7XMul9RjNa/kOEHCclvgLU0c51/xcWwuiCJkXp1V?= =?iso-8859-1?Q?JOnfK1oY15xX89PfsIDwHkyEYsD199JiS6rrAGIifyjJRzBtaM7JR3w7lF?= =?iso-8859-1?Q?Zmn7SbA7vCpzG0ATrnwDxL0IbWNa3nx04Fs2IEqEdKRzlmbRRkLmRTnw?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB8946.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: d60a3750-99a0-436a-0307-08ddc914b8ab X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jul 2025 11:41:39.1200 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: oghOXPjohugEu/alHEAdIIiu2xp937GrkdCxbeu20vjV9cITYrQsgt5XikwSuYZ2kSX+ks2DSjCABCqbK9rkuHfybkoCox9qTKQuf/R5g9I= X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI2PR03MB10809 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1753184533473116600 Content-Type: text/plain; charset="utf-8" From: Grygorii Strashko The commit 3e322bef8bc0 ("xen/arm: firmware: Add SCMI over SMC calls handling layer") introduces simple driver which forwards SCMI over SMC calls from hwdom/dom0 to EL3 firmware (TF-A) with a single SCMI OSPM agent support. While it is working gracefully for hwdom/dom0 use case it doesn't cover "thin Dom0 with guest domain, which serves as Driver domain" use-case. In this case HW need to be enable in Driver domain and dom0 is performing only control functions. The EL3 SCMI firmware (TF-A) with a single SCMI OSPM agent support is pretty generic case for the default vendors SDK and new platforms. This patch enables passthrough of SCMI SMC single agent interface to the one guest domain serving as Driver domain. Configure Dom0 to enable SCMI passthrough: - dom0: add scmi_smc_passthrough to the Xen Command Line Enabled SCMI passthrough for guest using toolstack in the following way: - domD: xl.cfg add "arm_sci" option as below arm_sci =3D "type=3Dscmi_smc" - domD: xl.cfg enable access to the "arm,scmi-shmem" iomem =3D [ "47ff0,1@22001", ] - domD: add SCMI nodes to the Driver domain partial device tree as in the below example: passthrough { scmi_shm_0: sram@22001000 { compatible =3D "arm,scmi-shmem"; reg =3D <0x0 0x22001000 0x0 0x1000>; }; firmware { compatible =3D "simple-bus"; scmi: scmi { compatible =3D "arm,scmi-smc"; shmem =3D <&scmi_shm_0>; ... } } } dom0less case configuration: - add "xen,sci_type" property for required DomU ("xen,domain") node xen,sci_type=3D"scmi_smc" - add scmi nodes to the Driver domain partial device tree the same way as above and enable access to the "arm,scmi-shmem" according to dom0less documentation. For example: scmi_shm_0: sram@22001000 { compatible =3D "arm,scmi-shmem"; reg =3D <0x00 0x22001000 0x00 0x1000>; -> xen,reg =3D <0x0 0x47ff0000 0x0 0x1000 0x0 0x22001000>; -> xen,force-assign-without-iommu; }; The SCMI SMC single agent interface can be enabled for one and only one domain. In general, the configuration is similar to any other HW passthrough, except explicitly enabling SCMI with "arm_sci" xl.cfg option. Note that "arm,scmi-smc" and "arm,scmi-shmem" nodes will be removed from dom0/hwdom DT in case of Signed-off-by: Grygorii Strashko Signed-off-by: Oleksii Moisieiev Acked-by: Anthony PERARD # tools --- Changes in v5: - rename dom0_scmi_smc_passthrough to scmi_smc_passthrough Changes in v4: - xl.cfg doc - fix comments from Stefano Stabellini - fix toolstack code as sugested by Anthony PERARD - use MATCH_OPTION() - move arm_sci struct and cfg params in "arch_arm" - add SCMI passthrough for dom0less case docs/man/xl.cfg.5.pod.in | 34 ++++++++ docs/misc/arm/device-tree/booting.txt | 15 ++++ docs/misc/xen-command-line.pandoc | 9 +++ tools/include/libxl.h | 5 ++ tools/libs/light/libxl_arm.c | 14 ++++ tools/libs/light/libxl_types.idl | 10 +++ tools/xl/xl_parse.c | 36 +++++++++ xen/arch/arm/dom0less-build.c | 34 +++++++- xen/arch/arm/firmware/Kconfig | 4 +- xen/arch/arm/firmware/scmi-smc.c | 112 +++++++++++++++++++++++++- 10 files changed, 268 insertions(+), 5 deletions(-) diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in index 1d122982c6..8f1a203e21 100644 --- a/docs/man/xl.cfg.5.pod.in +++ b/docs/man/xl.cfg.5.pod.in @@ -3073,6 +3073,40 @@ writes will be ignored. =20 This option is only implemented for Arm where the default is enabled. =20 +=3Ditem B + +Set ARM_SCI specific options for the guest. ARM SCI is System +Control Protocol allows domain to manage various functions that are provid= ed +by HW platform firmware. + +B is a comma separated list of C settings, +from the following list: + +=3Dover 4 + +=3Ditem B + +Specifies an ARM SCI type for the guest. + +=3Dover 4 + +=3Ditem B + +Don't allow guest to use ARM SCI if present on the platform. This is the +default value. + +=3Ditem B + +Enables ARM SCMI SMC support for the guest by enabling SCMI over SMC calls +forwarding from domain to the EL3 firmware (like Trusted Firmware-A) with a +single SCMI OSPM agent support. +Should be used together with B Xen command line +option. + +=3Dback + +=3Dback + =3Dback =20 =3Dhead3 x86 diff --git a/docs/misc/arm/device-tree/booting.txt b/docs/misc/arm/device-t= ree/booting.txt index 07acc7ba64..8ea11c1551 100644 --- a/docs/misc/arm/device-tree/booting.txt +++ b/docs/misc/arm/device-tree/booting.txt @@ -307,6 +307,21 @@ with the following properties: passed through. This option is the default if this property is missing and the user does not provide the device partial device tree for the d= omain. =20 +- xen,sci_type + + A string property specifying an ARM SCI type for the guest. + + - "none" + Don't allow guest to use ARM SCI if present on the platform. This is t= he + default value. + + - "scmi_smc" + Enables ARM SCMI SMC support for the guest by enabling SCMI over SMC c= alls + forwarding from domain to the EL3 firmware (like Trusted Firmware-A) w= ith a + single SCMI OSPM agent support. + Should be used together with scmi_smc_passthrough Xen command line + option. + Under the "xen,domain" compatible node, one or more sub-nodes are present for the DomU kernel and ramdisk. =20 diff --git a/docs/misc/xen-command-line.pandoc b/docs/misc/xen-command-line= .pandoc index 6865a61220..7a1f723e63 100644 --- a/docs/misc/xen-command-line.pandoc +++ b/docs/misc/xen-command-line.pandoc @@ -1096,6 +1096,15 @@ affinities to prefer but be not limited to the speci= fied node(s). =20 Pin dom0 vcpus to their respective pcpus =20 +### scmi_smc_passthrough (ARM) +> `=3D ` + +The option is available when `CONFIG_SCMI_SMC` is compiled in, and allows = to +enable SCMI SMC single agent interface for any, but only one guest domain, +which serves as Driver domain. The SCMI will be disabled for Dom0/hwdom and +SCMI nodes removed from Dom0/hwdom device tree. +(for example, thin Dom0 with Driver domain use-case). + ### dtuart (ARM) > `=3D path [:options]` =20 diff --git a/tools/include/libxl.h b/tools/include/libxl.h index a8704e0268..64ca80e4cc 100644 --- a/tools/include/libxl.h +++ b/tools/include/libxl.h @@ -313,6 +313,11 @@ */ #define LIBXL_HAVE_BUILDINFO_ARCH_NR_SPIS 1 =20 +/* + * libxl_domain_build_info has the arch_arm.sci* fields. + */ +#define LIBXL_HAVE_BUILDINFO_ARCH_ARM_SCI 1 + /* * LIBXL_HAVE_SOFT_RESET indicates that libxl supports performing * 'soft reset' for domains and there is 'soft_reset' shutdown reason diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c index ec258bdc16..e4407d6e3f 100644 --- a/tools/libs/light/libxl_arm.c +++ b/tools/libs/light/libxl_arm.c @@ -233,6 +233,20 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc, config->arch.sve_vl =3D d_config->b_info.arch_arm.sve_vl / 128U; } =20 + switch (d_config->b_info.arch_arm.arm_sci.type) { + case LIBXL_ARM_SCI_TYPE_NONE: + config->arch.arm_sci_type =3D XEN_DOMCTL_CONFIG_ARM_SCI_NONE; + break; + case LIBXL_ARM_SCI_TYPE_SCMI_SMC: + config->arch.arm_sci_type =3D XEN_DOMCTL_CONFIG_ARM_SCI_SCMI_SMC; + break; + default: + LOG(ERROR, "Unknown ARM_SCI type %d", + d_config->b_info.arch_arm.arm_sci.type); + return ERROR_FAIL; + } + LOG(DEBUG, " - SCI type=3D%u", config->arch.arm_sci_type); + return 0; } =20 diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_type= s.idl index 26999b77e3..c8bc0f8521 100644 --- a/tools/libs/light/libxl_types.idl +++ b/tools/libs/light/libxl_types.idl @@ -551,6 +551,15 @@ libxl_sve_type =3D Enumeration("sve_type", [ (2048, "2048") ], init_val =3D "LIBXL_SVE_TYPE_DISABLED") =20 +libxl_arm_sci_type =3D Enumeration("arm_sci_type", [ + (0, "none"), + (1, "scmi_smc") + ], init_val =3D "LIBXL_ARM_SCI_TYPE_NONE") + +libxl_arm_sci =3D Struct("arm_sci", [ + ("type", libxl_arm_sci_type), + ]) + libxl_rdm_reserve =3D Struct("rdm_reserve", [ ("strategy", libxl_rdm_reserve_strategy), ("policy", libxl_rdm_reserve_policy), @@ -726,6 +735,7 @@ libxl_domain_build_info =3D Struct("domain_build_info",[ ("vuart", libxl_vuart_type), ("sve_vl", libxl_sve_type), ("nr_spis", uint32, {'init_val': 'LIBXL_NR_= SPIS_DEFAULT'}), + ("arm_sci", libxl_arm_sci), ])), ("arch_x86", Struct(None, [("msr_relaxed", libxl_defbool), ])), diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c index 4ffcbf624b..68d2ebeb9f 100644 --- a/tools/xl/xl_parse.c +++ b/tools/xl/xl_parse.c @@ -1284,6 +1284,36 @@ out: if (rc) exit(EXIT_FAILURE); } =20 +static int parse_arm_sci_config(XLU_Config *cfg, libxl_arm_sci *arm_sci, + const char *str) +{ + int ret =3D 0; + char *buf2, *ptr; + char *oparg; + + if (NULL =3D=3D (buf2 =3D ptr =3D strdup(str))) + return ERROR_NOMEM; + + ptr =3D strtok(buf2, ","); + while (ptr !=3D NULL) + { + if (MATCH_OPTION("type", ptr, oparg)) { + ret =3D libxl_arm_sci_type_from_string(oparg, &arm_sci->type); + if (ret) { + fprintf(stderr, "Unknown ARM_SCI type: %s\n", oparg); + ret =3D ERROR_INVAL; + goto parse_error; + } + } + + ptr =3D strtok(NULL, ","); + } + +parse_error: + free(buf2); + return ret; +} + void parse_config_data(const char *config_source, const char *config_data, int config_len, @@ -2984,6 +3014,12 @@ skip_usbdev: xlu_cfg_get_defbool(config, "trap_unmapped_accesses", &b_info->trap_unmapped_accesses, 0); =20 + if (!xlu_cfg_get_string(config, "arm_sci", &buf, 1)) { + if (parse_arm_sci_config(config, &b_info->arch_arm.arm_sci, buf)) { + exit(EXIT_FAILURE); + } + } + parse_vkb_list(config, d_config); =20 d_config->virtios =3D NULL; diff --git a/xen/arch/arm/dom0less-build.c b/xen/arch/arm/dom0less-build.c index 2a0bf817ba..d28143f98b 100644 --- a/xen/arch/arm/dom0less-build.c +++ b/xen/arch/arm/dom0less-build.c @@ -279,6 +279,36 @@ int __init arch_handle_passthrough_prop(struct kernel_= info *kinfo, return sci_assign_dt_device(kinfo->d, node); } =20 +int __init domu_dt_sci_parse(struct dt_device_node *node, + struct xen_domctl_createdomain *d_cfg) +{ + const char *sci_type =3D NULL; + int ret; + + d_cfg->arch.arm_sci_type =3D XEN_DOMCTL_CONFIG_ARM_SCI_NONE; + + if ( !IS_ENABLED(CONFIG_ARM_SCI) || + !dt_property_read_bool(node, "xen,sci_type") ) + return 0; + + ret =3D dt_property_read_string(node, "xen,sci_type", &sci_type); + if ( ret ) + return ret; + + if ( !strcmp(sci_type, "none") ) + d_cfg->arch.arm_sci_type =3D XEN_DOMCTL_CONFIG_ARM_SCI_NONE; + else if ( !strcmp(sci_type, "scmi_smc") ) + d_cfg->arch.arm_sci_type =3D XEN_DOMCTL_CONFIG_ARM_SCI_SCMI_SMC; + else + { + printk(XENLOG_ERR "xen,sci_type in not valid (%s) for domain %s\n", + sci_type, dt_node_name(node)); + return -EINVAL; + } + + return 0; +} + void __init arch_create_domUs(struct dt_device_node *node, struct xen_domctl_createdomain *d_cfg, unsigned int flags) @@ -287,7 +317,9 @@ void __init arch_create_domUs(struct dt_device_node *no= de, =20 d_cfg->arch.gic_version =3D XEN_DOMCTL_CONFIG_GIC_NATIVE; d_cfg->flags |=3D XEN_DOMCTL_CDF_hvm | XEN_DOMCTL_CDF_hap; - d_cfg->arch.arm_sci_type =3D XEN_DOMCTL_CONFIG_ARM_SCI_NONE; + + if ( domu_dt_sci_parse(node, d_cfg) ) + panic("Error getting SCI configuration\n"); =20 if ( !dt_property_read_u32(node, "nr_spis", &d_cfg->arch.nr_spis) ) { diff --git a/xen/arch/arm/firmware/Kconfig b/xen/arch/arm/firmware/Kconfig index bbf88fbb9a..5c5f0880c4 100644 --- a/xen/arch/arm/firmware/Kconfig +++ b/xen/arch/arm/firmware/Kconfig @@ -25,7 +25,9 @@ config SCMI_SMC doorbell mechanism and Shared Memory for transport ("arm,scmi-smc" compatible only). The value of "arm,smc-id" DT property from SCMI firmware node is used to trap and forward corresponding SCMI SMCs - to firmware running at EL3, for calls coming from the hardware domain. + to firmware running at EL3, for calls coming from the hardware domain or + driver domain. + Use with EL3 firmware which supports only single SCMI OSPM agent. =20 endchoice =20 diff --git a/xen/arch/arm/firmware/scmi-smc.c b/xen/arch/arm/firmware/scmi-= smc.c index 13d1137592..ae759f1616 100644 --- a/xen/arch/arm/firmware/scmi-smc.c +++ b/xen/arch/arm/firmware/scmi-smc.c @@ -14,6 +14,8 @@ #include #include #include +#include +#include #include #include =20 @@ -22,7 +24,11 @@ =20 #define SCMI_SMC_ID_PROP "arm,smc-id" =20 +static bool __ro_after_init opt_scmi_smc_passthrough =3D false; +boolean_param("scmi_smc_passthrough", opt_scmi_smc_passthrough); + static uint32_t __ro_after_init scmi_smc_id; +static struct domain __read_mostly *scmi_dom; =20 /* * Check if provided SMC Function Identifier matches the one known by the = SCMI @@ -50,7 +56,7 @@ static bool scmi_handle_smc(struct cpu_user_regs *regs) return false; =20 /* Only the hardware domain should use SCMI calls */ - if ( !is_hardware_domain(current->domain) ) + if ( scmi_dom !=3D current->domain ) { gdprintk(XENLOG_WARNING, "SCMI: Unprivileged access attempt\n"); return false; @@ -75,12 +81,45 @@ static bool scmi_handle_smc(struct cpu_user_regs *regs) return true; } =20 +static int +scmi_smc_domain_sanitise_config(struct xen_domctl_createdomain *config) +{ + if ( config->arch.arm_sci_type !=3D XEN_DOMCTL_CONFIG_ARM_SCI_NONE && + config->arch.arm_sci_type !=3D XEN_DOMCTL_CONFIG_ARM_SCI_SCMI_SMC= ) + return -EINVAL; + + return 0; +} + static int scmi_smc_domain_init(struct domain *d, struct xen_domctl_createdomain *config) { - if ( !is_hardware_domain(d) ) + /* + * scmi_passthrough is not enabled: + * - proceed only for hw_domain + * - fail if guest domain has SCMI enabled. + */ + if ( !opt_scmi_smc_passthrough && !is_hardware_domain(d) ) + { + if ( config->arch.arm_sci_type =3D=3D XEN_DOMCTL_CONFIG_ARM_SCI_SC= MI_SMC ) + return -EINVAL; + else + return 0; + } + /* + * scmi_passthrough is enabled: + * - ignore hw_domain + * - proceed only for domain with SCMI enabled. + */ + if ( opt_scmi_smc_passthrough && + (config->arch.arm_sci_type =3D=3D XEN_DOMCTL_CONFIG_ARM_SCI_NONE = || + is_hardware_domain(d)) ) return 0; =20 + if ( scmi_dom ) + return -EEXIST; + + scmi_dom =3D d; d->arch.sci_enabled =3D true; printk(XENLOG_DEBUG "SCMI: %pd init\n", d); return 0; @@ -88,12 +127,77 @@ static int scmi_smc_domain_init(struct domain *d, =20 static void scmi_smc_domain_destroy(struct domain *d) { - if ( !is_hardware_domain(d) ) + if ( scmi_dom && scmi_dom !=3D d ) return; =20 + scmi_dom =3D NULL; + d->arch.sci_enabled =3D false; printk(XENLOG_DEBUG "SCMI: %pd destroy\n", d); } =20 +/* + * Handle Dom0 SCMI SMC specific DT nodes + * + * if scmi_smc_passthrough=3Dfalse: + * - Copy SCMI nodes into Dom0 device tree. + * if scmi_smc_passthrough=3Dtrue: + * - skip SCMI nodes from Dom0 DT + * - give dom0 control access to SCMI shmem MMIO, so SCMI can be passed + * through to guest. + */ +static bool scmi_smc_dt_handle_node(struct domain *d, + struct dt_device_node *node) +{ + static const struct dt_device_match shmem_matches[] __initconst =3D { + DT_MATCH_COMPATIBLE("arm,scmi-shmem"), + { /* sentinel */ }, + }; + static const struct dt_device_match scmi_matches[] __initconst =3D { + DT_MATCH_PATH("/firmware/scmi"), + { /* sentinel */ }, + }; + + /* skip scmi shmem node for dom0 if scmi not enabled */ + if ( dt_match_node(shmem_matches, node) && !sci_domain_is_enabled(d) ) + { + dt_dprintk("Skip scmi shmem node\n"); + return true; + } + + /* + * skip scmi node for dom0 if scmi not enabled, but give dom0 control + * access to SCMI shmem + */ + if ( dt_match_node(scmi_matches, node) && !sci_domain_is_enabled(d) ) + { + struct dt_device_node *shmem_node; + const __be32 *prop; + u64 paddr, size; + int ret; + + /* give dom0 control access to SCMI shmem */ + prop =3D dt_get_property(node, "shmem", NULL); + if ( !prop ) + return true; + + shmem_node =3D dt_find_node_by_phandle(be32_to_cpu(*prop)); + if ( !shmem_node ) + return true; + + ret =3D dt_device_get_address(shmem_node, 0, &paddr, &size); + if ( ret ) + return true; + + ret =3D iomem_permit_access(d, paddr_to_pfn(paddr), + paddr_to_pfn(paddr + size - 1)); + + dt_dprintk("Skip scmi node\n"); + return true; + } + + return false; +} + static int __init scmi_check_smccc_ver(void) { if ( smccc_ver < ARM_SMCCC_VERSION_1_1 ) @@ -108,8 +212,10 @@ static int __init scmi_check_smccc_ver(void) =20 static const struct sci_mediator_ops scmi_smc_ops =3D { .handle_call =3D scmi_handle_smc, + .domain_sanitise_config =3D scmi_smc_domain_sanitise_config, .domain_init =3D scmi_smc_domain_init, .domain_destroy =3D scmi_smc_domain_destroy, + .dom0_dt_handle_node =3D scmi_smc_dt_handle_node, }; =20 /* Initialize the SCMI layer based on SMCs and Device-tree */ --=20 2.34.1 From nobody Thu Oct 30 23:14:03 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1753184542; cv=pass; d=zohomail.com; s=zohoarc; b=QgnRpLtWZjLdxrw9kWVnZ9slhLd7S4ej4dFNE9bOJeOBwkwwUpYmv+6Ww9xUZbbgN5xcdI5x9nZU7t/DkcHXKqhw+0DHzO01FfSHonoGZ4VOsFD0SPo2yFAqztIKF4fx1z2f2SuHl/pZCPwC7KyXNEESDLIdv7NxCGz30Zo2N6Y= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1753184542; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=yfsqdlKrYuoyUtCJuzkRIZhR8rDGBhuWmWa6vmySCYI=; b=dycguK0KsmhEwrlADqxuWAsCUj8rW/lo8RpdR4vv2ikPyBDgp8WXd2fhFRVUnW6sCx1GaHn0gloW52Z0Z1szOyAOGr+xRdwU/gYBkjS1o0V9PLjQqi+NZrSFYB5DOOqmwYzyE3S/Pwtg7mjVVk4t1wABiD3wGqj+upzKyHnsJKY= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1753184542198763.477846872671; Tue, 22 Jul 2025 04:42:22 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1052292.1420986 (Exim 4.92) (envelope-from ) id 1ueBNh-0005BT-1U; Tue, 22 Jul 2025 11:42:01 +0000 Received: by outflank-mailman (output) from mailman id 1052292.1420986; Tue, 22 Jul 2025 11:42:00 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNg-0005AJ-Ra; Tue, 22 Jul 2025 11:42:00 +0000 Received: by outflank-mailman (input) for mailman id 1052292; Tue, 22 Jul 2025 11:41:59 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNf-0004HB-9S for xen-devel@lists.xenproject.org; Tue, 22 Jul 2025 11:41:59 +0000 Received: from MRWPR03CU001.outbound.protection.outlook.com (mail-francesouthazlp170110003.outbound.protection.outlook.com [2a01:111:f403:c207::3]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id df782aaa-66f0-11f0-b894-0df219b8e170; Tue, 22 Jul 2025 13:41:57 +0200 (CEST) Received: from PAVPR03MB8946.eurprd03.prod.outlook.com (2603:10a6:102:32e::21) by VI2PR03MB10809.eurprd03.prod.outlook.com (2603:10a6:800:272::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8943.29; Tue, 22 Jul 2025 11:41:41 +0000 Received: from PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc]) by PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc%6]) with mapi id 15.20.8943.025; Tue, 22 Jul 2025 11:41:41 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: df782aaa-66f0-11f0-b894-0df219b8e170 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=wnW1unPxhSq9nQjuqaGgQSbNWe8p8fhksQYW6E+y+ksAU58AO1tFwWyyl364dS2YmB0ZOG4LabH7eEYkZfcO1U1I+NXEtws2Zpmxht134jLlJfGhir6PMyW6B4iDWeeIXZQ+dMunZHRqiOTN7K+NpaRsOiI64sMhWa/R5h+HfVLhOzDi29ZxzSFpP51xO2tz5cQlcz0OGv/loHE0sGxf7K0wnm+wDJMRIyvqa99uUBgIGm3+vRMYHj9bNNGQSRBrvvVHDMIekdH16iAGYL14OsmE82vPW6vEnMFvgSdAJiQMtzCACBi8CPoMBxc8M42O2aCdPlr8QjHozRvzsin5XA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=yfsqdlKrYuoyUtCJuzkRIZhR8rDGBhuWmWa6vmySCYI=; b=F6FSsIesaVvi66jvOwIqR5eyqZqFLHW1d0AfQvAyg4iGUk2+Lm1SIk9X/vBBdrLW7DeuGVtgy509tRnfRdlfnTT7qg5rANkPEDiPG7vVJ8+NcnmRcLQQf9Jg9xyCCkr9ogi8A3bgHp0JkKNq4KaC4YfGdqjmRaqjkb4CHtgtcWPxzVeLrvKbtdBncoHb+1RZK3OGdCymiS3S0h5YW3Tp4keIpHfixhVgQipARCovDEuDJiD39rzTdKLIVVawZ9itNWs9KpSv2gcIfmdFdld+zN0vwW3owmaQNiuC2l1M+PdB2SkKeeOtkuP5upaGvMISC9oR8kpasAVhvH83uQtuqQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=yfsqdlKrYuoyUtCJuzkRIZhR8rDGBhuWmWa6vmySCYI=; b=F3FueASjlJ7rJNw1peHW8bUOKa3u6870m72C4vV703ljEYnaLXY0Bh3PYsDfAkvESW5IoGyxnQZUnz6xWpA+LrIOcs5Mn0mRgzvrw6sDwcporRs5ieOJw6gOAgNQCR3e9I/rD1ss+EO3x1ESL6VE4AYuvpMy7SAvr+3YQROxw7DECLjXiE9dwaDENrGep9rp7zG78OVRMC6lmfQw7rBlTcuWNEbLQRLNv/ceJDciiwT7nKnAaDkTXgJM0mlo9UbOWYE40IjXvO5yeJgAmOGQs2ObmIE1974EeFyMXLxoaqSGbs3AF97Y6ACRYr4L68mslaC4vK8+2/ZOSpTdwMT1TA== From: Oleksii Moisieiev To: "xen-devel@lists.xenproject.org" CC: Andrew Cooper , Anthony PERARD , Bertrand Marquis , Jan Beulich , Juergen Gross , Julien Grall , Michal Orzel , Oleksii Moisieiev , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Stefano Stabellini , Volodymyr Babchuk , Grygorii Strashko Subject: [RFC PATCH v5 04/10] docs: arm: add docs for SCMI over SMC calls forwarding driver Thread-Topic: [RFC PATCH v5 04/10] docs: arm: add docs for SCMI over SMC calls forwarding driver Thread-Index: AQHb+v2WERsbDNQi7E6G5xjDltU/pQ== Date: Tue, 22 Jul 2025 11:41:39 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB8946:EE_|VI2PR03MB10809:EE_ x-ms-office365-filtering-correlation-id: 851d8857-459b-4890-27a3-08ddc914ba08 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|7416014|1800799024|366016|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?19+k03Ei8lFSEbdqxRGMZgoLKKe7WzxWUKnScSb1eOTVyN9/scVMmLHOlE?= =?iso-8859-1?Q?cluhXgQsvXsfhn7L+aRBe6Ktlv3vFhA5qSCAH1IvvNSm0Nn5uDCokTXoDi?= =?iso-8859-1?Q?Wsm9UDLNylSFnVziiNlLiuE4knBaIEFF7gMMzS0fhabmgwFshhBqP19x6f?= =?iso-8859-1?Q?O/AfFEKqPAA6ihwuwjMe/3kcIQI91bzbQ3fxXglb3WDsaX5q9tsP8s2jvl?= =?iso-8859-1?Q?aEmifzO2Yjm08pvVkI5F/kbZk7ZMGVE0vJ+CIsezCd5Tme9+9vIZH9Us1W?= =?iso-8859-1?Q?XWg5Ved54q9dRNNakywq8XuDUZEYmztyrAIidFAFEHTaS+erT2r5VvxkCL?= =?iso-8859-1?Q?ONNJqJQQVzC5kdPAXHn+aTohPGAw+bYDxR/dnu3Ye1kKST/t3hgHDLa4aR?= =?iso-8859-1?Q?Qz7rYclrzhQn1RKvmUaCpj+uPfHLCoC2k7l7nSFhWZPEsojbWPVTsfkkpw?= =?iso-8859-1?Q?v8snaS9zPV633FlOBqLh432UnUCNVb1svASLfwjnLyaYyhHN1U2LwMjfDO?= =?iso-8859-1?Q?0voe+vsfrRM3xqDBydlEj1fqGMPaFeEFUEvZ/XendDm8ok5AkSrJmIGJFd?= =?iso-8859-1?Q?BxWu5t9EJ2AS8LAPLO+zjqxyVRgN/NwGiGGgCUJ1NsghIi4Oh66m7iu2Jd?= =?iso-8859-1?Q?zHq/KVm4pwrR5LaeUjV/c2oaXPdLooiKR4tWP9WkydVMGkiWvKvfBHgOlB?= =?iso-8859-1?Q?TwdlyopCiYx4KKj2rKllO+YMNJJwaJotwh4uMBGaeMlZ/s8ctxyAjf/bX8?= =?iso-8859-1?Q?e9svdqoAcMbf/jbxcBj4IHsByJfzeYP3d6rrRLy2xHb0wBpwoSypv3IcxK?= =?iso-8859-1?Q?R8CFISWKqleVQYLUZp8WyCc5LjpoJx8aRahLUGTsiuYKi1uTkzHwFvzSal?= =?iso-8859-1?Q?f+w50zWkildrZrTq1C8i4M3+I9lKW7ByCV7GyLvrtbsWAQFtHOVU8+czKk?= =?iso-8859-1?Q?vs/KXODG9yeJYdP5CxYSNJdzPPY6qUSE9F83e3XcMzDhOk3cRWBsYFTAtF?= =?iso-8859-1?Q?egHnYIVZgNvbzONl9VQjnwXcLqoy5ikWKgwGVxV9JsFouvVybT9vrToH1O?= =?iso-8859-1?Q?bZQ4N4ax2je9AeJvIClp933VilBp5OJHS6aPWGgkOgWAk75yPSD37XNm+p?= =?iso-8859-1?Q?hibIoz+hPHkh8i2F860j//oyj59wCjPtkchBY6uBGPUTxCDYPOyNu2tAUc?= =?iso-8859-1?Q?TZOssdVA9Pnbiy0l4rsZWENSUoAnqOJjNEW5apUkMciP6SsGu3WMuifTZi?= =?iso-8859-1?Q?HjzeEGgssC0HUR6ddTpT8dvvDcfX/2t0g3FZIOOtoPEquXl8sEiG2mhCKg?= =?iso-8859-1?Q?4Jq1P9KEbAPcfvtOCYO/X09iqCkfapxAW2b2MsqOVcaiNFdUTry4kspzrZ?= =?iso-8859-1?Q?5beiu3bSnurDA4dmGYoHcs/T53vcHD31x+DOlSIfxHrmL5sgq4SNwPz+1N?= =?iso-8859-1?Q?BPcXkg1eG24oGvRndxtAq9ICbLLMvfZX7i8PdH/IcFFOJ7bPetWSrEIMWc?= =?iso-8859-1?Q?hW4LaCgAeweuxZibqxs1HP00egvPWDxsYp3gTkf5POTYzfMPW22R6fjlOv?= =?iso-8859-1?Q?RD8qCpU=3D?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB8946.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(7416014)(1800799024)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?K1XxnJdAmg+0sop98CsY3QfWqOI9OXLl849VIGl0Gp59mwDjpYAJmatCst?= =?iso-8859-1?Q?ETvTnj4SGl4NSBDEAoEiCE4DloA3hDMF3g+txdTd6yauJL5BEK+YsZDtsM?= =?iso-8859-1?Q?V40TlajjCRFK4BvNklI09aInAcHAbn+8m9Xa8r7CnWfqghjGll6jyTTboW?= =?iso-8859-1?Q?5SQbmI2RlNcM9Nt2/NOJoCBR5SDopUfxRn2WaJv9P8b0vRjveFg5PNiQ65?= =?iso-8859-1?Q?EOXMvQkgllUSemefLmy81Dhc9hqkafbJak5WjK3RMC4OE3iauVXRJVmg2S?= =?iso-8859-1?Q?gu7CoOlUvyYleXSrwhvDPHUsN+oWbVqnnJ1V1Y01KnkYkWNFe84KYf/eIJ?= =?iso-8859-1?Q?oUz0cotEtoJa8oOezbVtG6R6AMJNaOBk9jssUu0jokrXOyB1cHu4cJxxr2?= =?iso-8859-1?Q?pGG18ZxLjlulZT4iISq5ms187EbJojWqbUT8eu0dOrwQWW8P/u7N/EKorI?= =?iso-8859-1?Q?vJR3gBpjV8FCs6SIBwpCyKBQKugj59YW+oqnEyyPPsPGCaXAS0X4XVXje8?= =?iso-8859-1?Q?yFve/pz+r4YZudOWVX77xlNLt+1yVsBNZwcyFcj6n7eO/Zyc+dDqGmC48e?= =?iso-8859-1?Q?lj/9dv6SXf2E5VRi1ZWpzQJ0cud4sM3n7BFODZLoWUC6hlcEJzeHQ4xbQ9?= =?iso-8859-1?Q?k1WZPeyyWETZSREG6WQtkEry5OpleZsRWcZ1HTj1O0x2QFjXV/Na76yuU0?= =?iso-8859-1?Q?h6ArHIunwmFReB27mN6pK0GegLGN5f9AzkKajKFQK9Z29cm82ZJr8/Kd4g?= =?iso-8859-1?Q?tmoiFo15lv6dhV0wqwGk5WKP8Xt2YkVDucAyOu8yUiul39sdfcacyFrAJZ?= =?iso-8859-1?Q?yyK+PfdaBh5DW2SnrAhQrI7AbQ4WFRo+UJC2m2thI4qF1ciaXV5yI3QYms?= =?iso-8859-1?Q?9An6Q7fR+jf5AMi1nMKHMTgZ1+BQJUgXhVx+QZiILEFDzjpsB0l7rgCJJm?= =?iso-8859-1?Q?DWbEfuQq2rkGgMlcNUju3qnHFpopdkKvmKFNFjQRzfh5WdT+iSaCLhXe9+?= =?iso-8859-1?Q?507GxEaS9b7NXrmWojD6uSSmDoCkGbYdiR66SIrrY54DtUNL+JyRq4Z3aj?= =?iso-8859-1?Q?RRFrufa0X7ckS8r57JlpkYWpUlfSqQoPPB+WVJ7CppWQIIkHGxp72Groz0?= =?iso-8859-1?Q?ZgCb09m2MQ7cP+e4ubrjadvaTcnsbw6kXo2bDPsXxnsCvknI86Wf5ixIAv?= =?iso-8859-1?Q?tQ9Zi+LmweLcXP3tmnZy2IU4YCDPpeRyTBK3Bzg7nIhKdDa0avsoeJuE5R?= =?iso-8859-1?Q?DSl/LKANCtq5q5ddSHGRWSp/KXGFBCyW1105Hy7ubhbnOYf9GTK8WsJCaW?= =?iso-8859-1?Q?l2hKDTjhOB3ydcpYoECOSvk8qd8x5JaorzorLc9iK3YCPE6HUzddTrdOqm?= =?iso-8859-1?Q?toS0fugWod/snl9t6UEk0c/8PNyqTvP8z1bovrWhoDZxtt9UTbFkAHPrwI?= =?iso-8859-1?Q?ne0+nSBHdHJidahRVz+Gn9ik4eka99Yt6t0QCg+r4vFdCjfXpCVp4qZ1tC?= =?iso-8859-1?Q?pXp1fSqPnyxxA3inrM4hUMhPq6c7IKTvKpS5IGJub2GKB/tddVNCWv/EIs?= =?iso-8859-1?Q?NAgOGA96LpWhv+6bJxgQ/LzH72188tfX0IFSjZc0jFaAeQdu/aC5X24HRb?= =?iso-8859-1?Q?VEBNQDxl0DQY+Oq7/A4J25gBeGpfv2NJm3eGSZYs4sUN2mpgi/Dk4Syg?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB8946.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 851d8857-459b-4890-27a3-08ddc914ba08 X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jul 2025 11:41:39.6908 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: +TbD0RpZ1aDLvP+A4HHHknS/fxCjztTQlSF8vgrgxJGss4vgmhDAD5mfLwGSbW5NYKQnBHAjPABtFgdblVtwZQvuOOZPGnzoZGs0TH+TwAY= X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI2PR03MB10809 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1753184543581116600 Content-Type: text/plain; charset="utf-8" From: Grygorii Strashko Add documentation section for Simple Arm SCMI over SMC/HVC calls forwarding driver (EL3). Signed-off-by: Grygorii Strashko Signed-off-by: Oleksii Moisieiev --- Changes in v5: - rename dom0_scmi_smc_passthrough in documentation .../arm/firmware/arm-scmi.rst | 177 ++++++++++++++++++ docs/hypervisor-guide/arm/index.rst | 9 + docs/hypervisor-guide/index.rst | 1 + 3 files changed, 187 insertions(+) create mode 100644 docs/hypervisor-guide/arm/firmware/arm-scmi.rst create mode 100644 docs/hypervisor-guide/arm/index.rst diff --git a/docs/hypervisor-guide/arm/firmware/arm-scmi.rst b/docs/hypervi= sor-guide/arm/firmware/arm-scmi.rst new file mode 100644 index 0000000000..a084c0caa3 --- /dev/null +++ b/docs/hypervisor-guide/arm/firmware/arm-scmi.rst @@ -0,0 +1,177 @@ +.. SPDX-License-Identifier: CC-BY-4.0 + +ARM System Control and Management Interface (SCMI) +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D + +The System Control and Management Interface (SCMI) [1], which is a set of = operating +system-independent software interfaces that are used in system management.= SCMI currently +provides interfaces for: + +- Discovery and self-description of the interfaces it supports +- Power domain management +- Clock management +- Reset domain management +- Voltage domain management +- Sensor management +- Performance management +- Power capping and monitoring +- Pin control protocol. + +The SCMI compliant firmware could run: + +- as part of EL3 secure world software (like Trusted Firmware-A) with + ARM SMC/HVC shared-memory transport; +- on dedicated System Control Processor (SCP) with HW mailbox shared-memor= y transport + +The major purpose of enabling SCMI support in Xen is to enable guest domai= ns access to the SCMI +interfaces for performing management actions on passed-through devices (su= ch as clocks/resets etc) +without accessing directly to the System control HW (like clock controller= s) which in most cases +can't shared/split between domains. Or, at minimum, allow SCMI access for = dom0/hwdom (or guest +domain serving as Driver domain). + +The below sections describe SCMI support options available for Xen. + +[1] `Arm SCMI `_ + +Simple SCMI over SMC/HVC calls forwarding driver (EL3) +------------------------------------------------------ + +The EL3 SCMI firmware (TF-A) with a single SCMI OSPM agent support is pret= ty generic case for +the default vendors SDK and new platforms with SCMI support. Such EL3 SCMI= firmware supports only +single SCMI OSPM transport (agent) with Shared memory based transport and = SMC/HVC calls as doorbell. + +The SCMI over SMC/HVC calls forwarding driver solves major problem for thi= s case by allowing +SMC/HVC calls to be forwarded form guest to the EL3 SCMI firmware. + +By default, the SCMI over SMC/HVC calls forwarding is enabled for Dom0/hwd= om. + +:: + + +--------------------------+ + | | + | EL3 SCMI FW (TF-A) | + ++-------+--^--------------+ + |shmem | | smc-id + +----^--+ | + | | + +----|-+---+---+----------+ + | | | FWD | Xen | + | | +---^---+ | + +----|-----|--------------+ + | | smc-id + +----v-----+--+ +---------+ + | | | | + | Dom0/hwdom | | DomU | + | | | | + | | | | + +-------------+ +---------+ + + +The SCMI messages are passed directly through SCMI shared-memory (zero-cop= y) and driver only +forwards SMC/HVC calls. + +Compiling +^^^^^^^^^ + +To build with the SCMI over SMC/HVC calls forwarding enabled support, enab= le Kconfig option + +:: + + CONFIG_SCMI_SMC + +The ``CONFIG_SCMI_SMC`` is enabled by default. + +Pass-through SCMI SMC to domain which serves as Driver domain +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +This section describes how to configure the SCMI over SMC/HVC calls forwar= ding driver to handle use +case "thin Dom0 with guest domain, which serves as Driver domain". In this= case HW need to be +enabled in Driver domain and dom0 is performing only control functions (wi= thout accessing FW) and so, +the SCMI need to be enabled in Driver domain. + +:: + + +--------------------------+ + |EL3 SCMI FW (TF-A) | + | | + +-------------^--+-------+-+ + smc-id| |shmem0 | + | +----^--+ + +-------------++------+|----+ + |Xen | FWD || | + | +--^----+| | + +----------------|-----|----+ + smc-id | | + +-----------+ +--+-----v-----+ + | | | | + | Dom0 | | Driver | + | Control | | domain | + | | | | + +-----------+ +--------------+ + +The SCMI can be enabled for one and only one guest domain. + +First. configure Dom0 to enable SCMI pass-through using Xen Command Line +**"scmi_smc_passthrough"** option. This will disable SCMI for Dom0/hwdom a= nd SCMI nodes will +be removed from Dom0/hwdom device tree. + +**Configure SCMI pass-through for guest domain with toolstack** + +* In domain's xl.cfg file add **"arm_sci"** option as below + +:: + + arm_sci =3D "type=3Dscmi_smc" + +* In domain's xl.cfg file enable access to the "arm,scmi-shmem" + +:: + + iomem =3D [ + "47ff0,1@22001", + ] + +.. note:: It's up to the user to select guest IPA for mapping SCMI shared-= memory. + +* Add SCMI nodes to the Driver domain partial device tree as in the below = example: + +.. code:: + + passthrough { + scmi_shm_0: sram@22001000 { + compatible =3D "arm,scmi-shmem"; + reg =3D <0x0 0x22001000 0x0 0x1000>; + }; + + firmware { + compatible =3D "simple-bus"; + scmi: scmi { + compatible =3D "arm,scmi-smc"; + shmem =3D <&scmi_shm_0>; + ... + } + } + } + +In general, the configuration is similar to any other HW pass-through, exc= ept explicitly +enabling SCMI with "arm_sci" xl.cfg option. + +**Configure SCMI pass-through for predefined domain (dom0less)** + +* add "xen,sci_type" property for required DomU ("xen,domain") node + +:: + + xen,sci_type=3D"scmi_smc" + +* add scmi nodes to the Driver domain partial device tree the same way as = above and enable access + to the "arm,scmi-shmem" according to dom0less documentation. For exampl= e: + +.. code:: + + scmi_shm_0: sram@22001000 { + compatible =3D "arm,scmi-shmem"; + reg =3D <0x00 0x22001000 0x00 0x1000>; + -> xen,reg =3D <0x0 0x47ff0000 0x0 0x1000 0x0 0x22001000>; + -> xen,force-assign-without-iommu; + }; diff --git a/docs/hypervisor-guide/arm/index.rst b/docs/hypervisor-guide/ar= m/index.rst new file mode 100644 index 0000000000..7aae4a0a03 --- /dev/null +++ b/docs/hypervisor-guide/arm/index.rst @@ -0,0 +1,9 @@ +.. SPDX-License-Identifier: CC-BY-4.0 + +ARM +=3D=3D=3D + +.. toctree:: + :maxdepth: 2 + + firmware/arm-scmi diff --git a/docs/hypervisor-guide/index.rst b/docs/hypervisor-guide/index.= rst index e4393b0697..520fe01554 100644 --- a/docs/hypervisor-guide/index.rst +++ b/docs/hypervisor-guide/index.rst @@ -9,3 +9,4 @@ Hypervisor documentation code-coverage =20 x86/index + arm/index \ No newline at end of file --=20 2.34.1 From nobody Thu Oct 30 23:14:03 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1753184538; cv=pass; d=zohomail.com; s=zohoarc; b=fN1pGfMIBff53tM/eHaAIdn3xgCADPTVKtcEDlHNbHaKfJ5viWFen/5Ip8NfsIL5vwwp3+GdjM4vSeVD3Ae/4XKSafMLQvInw4xcCJcq/0eKfwe/YXQVxAsftxAbo0D1T24rocpgd/tsc7JS9MFvQodsiKCe90Q8z6SzKIvTOfY= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1753184538; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=BHNLmh6kSbLX3vTRCQeitKw2HKkvmYsNdH8fBqw47cU=; b=RZeBM8Y5gP2eEdABYiPpg8y3CYH4mAPwk42mTgL98v1YLelqT2kJvwlxsHYbWTOuzShPDzfCCR29NeknfyUcdpBVloQR1/HNVYcCC3Yyf6UhepCsxXIjmNCuizm1hYZsl2QRwi7w8c/4lAr15wneHy7voo3O4/+qPdD7cPwQ5ME= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1753184538860244.77877947439276; Tue, 22 Jul 2025 04:42:18 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1052288.1420967 (Exim 4.92) (envelope-from ) id 1ueBNc-0004VL-6Z; Tue, 22 Jul 2025 11:41:56 +0000 Received: by outflank-mailman (output) from mailman id 1052288.1420967; Tue, 22 Jul 2025 11:41:56 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNc-0004VA-1c; Tue, 22 Jul 2025 11:41:56 +0000 Received: by outflank-mailman (input) for mailman id 1052288; Tue, 22 Jul 2025 11:41:54 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNa-0004HB-IM for xen-devel@lists.xenproject.org; Tue, 22 Jul 2025 11:41:54 +0000 Received: from MRWPR03CU001.outbound.protection.outlook.com (mail-francesouthazlp170110003.outbound.protection.outlook.com [2a01:111:f403:c207::3]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id da903ebf-66f0-11f0-b894-0df219b8e170; Tue, 22 Jul 2025 13:41:49 +0200 (CEST) Received: from PAVPR03MB8946.eurprd03.prod.outlook.com (2603:10a6:102:32e::21) by VI2PR03MB10809.eurprd03.prod.outlook.com (2603:10a6:800:272::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8943.29; Tue, 22 Jul 2025 11:41:42 +0000 Received: from PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc]) by PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc%6]) with mapi id 15.20.8943.025; Tue, 22 Jul 2025 11:41:42 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: da903ebf-66f0-11f0-b894-0df219b8e170 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=glhLD7UDE/lJ6KcOIyBRLaMJPVxqM5dHn0TZSoOAYNwiAnlBCpDI08C6hkxbWjChFTUtTP7PqH37tVc1NJBuj9JkX5OiDUg3myPRP5Nxb3LPeXRSMiSrxHgnvfTJXRa1WSAhAnmqwc4kePZpdF+zKEPSCMXus8lcSiQVNeT2SuKY7mkYZIQ/O38EGZOmwChEWYaD+FNHLBHVPCnF7vQOIqjiZI8dXuvr/zHNLBnheFm7208GKE54iLDkhED6R1hCGchVlJfn28sGnHsve9G0HSsZ5QPNgTFGdJDs2ba0BrKwXu2E01TU/a7QP+tgsim5vyjeWAmQPvcuuK0A8gelyg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=BHNLmh6kSbLX3vTRCQeitKw2HKkvmYsNdH8fBqw47cU=; b=FhTZrxC3l08qK0eKTg0dcPHzyROwhI3TezIkruXacbF2UKJ1XhmXxf4VeXJWLzT0JiGdq25najidjDxHdIalybeeYAJnHViYfKzZKpB99/dzS9gmqwYAEwYjtPBDAhCuBh1omPU93NBrTrMRFvTv8sBiXuxy/tWtGze46oH2CR2XzKkVwFToA1jFh34gZo9UuGQGFI1EOg8xHp3qZuSup+C83x2cmgEGcjrbBen5MhgPuPEJqvZHdWbfRCe9TTK6xOuEz5bkk5+uhvTtSRVyB/o8AeqqAjfAkXPx5nSHBlADS65ff6EUOYGRrKAwBQ3IScX0kSrZJM/1Fosz8pjfIw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BHNLmh6kSbLX3vTRCQeitKw2HKkvmYsNdH8fBqw47cU=; b=BxbYw0DPlc0CR7MtKK2y7FtPVKGHPne1gFX2T00b2j1s6HNh+2usp+0y7jAWwiiJRn/Ryu/wa+TvLZr/9PB7m2spwQ9VkDDx/w20v8nx1kqx7ZxCN9ctL6+3Ita5L57jgbpCpz9a5JZD/M3gUszAOasMMCE8NpnQiKkcq4Z+ZOhKNurBQ9B5YOBBGX2DwqUEAyKhhmQWGaWeJMXTmuGUnRoBA+KccCYa3YVwatPIDr5g67INDiTIGwmQ6HtOdyGaDB6vYVl3KP6I/Y6QLTakH8syvTo/Snk/kAYeIwbktQIUjoyNbLbNIve0xxSpwIn9vksbmeoKoRrzi+7sMm+7Pw== From: Oleksii Moisieiev To: "xen-devel@lists.xenproject.org" CC: Andrew Cooper , Anthony PERARD , Bertrand Marquis , Jan Beulich , Juergen Gross , Julien Grall , Michal Orzel , Oleksii Moisieiev , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Stefano Stabellini , Volodymyr Babchuk , Grygorii Strashko Subject: [RFC PATCH v5 05/10] drivers: iommu: change error code when iommu is disabled Thread-Topic: [RFC PATCH v5 05/10] drivers: iommu: change error code when iommu is disabled Thread-Index: AQHb+v2WASGXgn5qjE+iEIhr6yQoow== Date: Tue, 22 Jul 2025 11:41:40 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB8946:EE_|VI2PR03MB10809:EE_ x-ms-office365-filtering-correlation-id: 7ede76ef-f979-4df0-342c-08ddc914ba61 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|7416014|1800799024|366016|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?4XR+3+hVsKojf56G8k8JL+HO4QYIRzmyeSSSh6j6zNwgrrJ0DlQs98lOkW?= =?iso-8859-1?Q?Hm8Ub6xW8GCvOMVjxDVSHvPTIENI3N8a8jHch4oUe2RotpmXtwDEAwfku/?= =?iso-8859-1?Q?C5hc+qfTqPRn3dgtlQyUWi8M3WUM+qmJDdfYmHOvgovgcecJKxpxMl+OIm?= =?iso-8859-1?Q?hH5D5lmy/33Uq++0c2YKN4VXkT3XK0GHptRLtV8SsrryQO3dElaMrIzr3P?= =?iso-8859-1?Q?vBxKKaaRisZY1lwRda6yCenr9w+9hOpaInRpG3VTXhT7yE/79Iusyo7KHu?= =?iso-8859-1?Q?8oMAIsY3ry2Te07aDbPGyS3Atp5kNVArWA0/wwt1lHaKn0l9tTcTzbKSEe?= =?iso-8859-1?Q?FGo/q3w2JLp+QqU9uz82JNUUgJRaHEaYfPKWBz1LrDPsH5FFle/5CaifNS?= =?iso-8859-1?Q?AYq2rF4EKZ96jmpzbU8BmsonU1TaYKBL4p8mgRUvvuFeZgMBAJ8W+teta+?= =?iso-8859-1?Q?h9o2CWwnHY9A918eKTRgayG2LAhr52pGo9fbHUcrpxRBuILKDOdZx2gIUb?= =?iso-8859-1?Q?KguPAm6NFtHOEQQYU8U6e1FIyobFu6KJXq5uhK2ewIeOYXVX4D0DQqzzsG?= =?iso-8859-1?Q?VyMd4hTUrWS+XiimFT0yNWUWaIdnt46pCfcpUsX0i6aCA6TcMZUk7zlOzQ?= =?iso-8859-1?Q?/qRwct63rEu7UDYKilW5bP9AhJrNk4iGa2NnZCU7MALQZ0TLHIMIAjq1pY?= =?iso-8859-1?Q?WUBpuRYmO8dywA/th1YmUMIcjr0pi1G3KgGeUrJgUo4Methb4i/cpM9KF8?= =?iso-8859-1?Q?0f9DwxwFBdKf72b+KCS8qtyC/elmcDRPL6EaJ/z+q02oX8BrDr+eDaIgXs?= =?iso-8859-1?Q?ASgV7DqPP1r+CtSToTAHFC5XO1b/tb030bWPFrJiJCeSfUEYaJnovOeflX?= =?iso-8859-1?Q?5fv+eFaPRUFFXfVq2FOF7blXMQsBBuoFxubENZkM4VkoKt48KdmKgwcKjk?= =?iso-8859-1?Q?CKh6lzUrONF2By0TCX15JLYV8aYzIvPQnmysuSQkGprxzklmZrELRkLBIb?= =?iso-8859-1?Q?I1LCTu0eF4X4FdS+K5BhUFkGkP4fP1ehu1rXy2goaom3aWRqyf6vyy6qKy?= =?iso-8859-1?Q?KJ2wVMHwMmX1D81y7DwUZLXOA3NvUorxsZ4XoNdninHWmhobcNjYdKUKmA?= =?iso-8859-1?Q?H06fIicHo02DraX3O10AS+cc9l58csNcmCzY3w34SD3o1S3QCepi03Eej5?= =?iso-8859-1?Q?bpqkR9dBU39Q/7EGOcOnk2gJ7is/zkFcRsKcC+SXzCGcVSrrZR4wFLa6N+?= =?iso-8859-1?Q?qvH+pE8LzUvfzj1FyWBuysekUiuUDOQDKG9Gzdj4g6DeOrvYJDjjbbuZBY?= =?iso-8859-1?Q?pHZCHi5gtSg+dfjn+oWEZdioFjXICQ/1JaY6BY7zr1BeZ7AS1R8sZGiCwL?= =?iso-8859-1?Q?6t+xczSAmWcQ7p/SLCiAfgq84FRy44r4U/No6+J3PLc8jmcoGANVF/qQK0?= =?iso-8859-1?Q?bZNGbgehiK+AbHDdR90zeEiqndGwjUTeeAAtQvCFo/8HBQsMsVtJ0YtK9t?= =?iso-8859-1?Q?OCDKF61Ux9tSIow8ehQjOzBrKpDsz4Apeu87YFEdkX/XDoncq+2qrKPJ5N?= =?iso-8859-1?Q?r5bTMMY=3D?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB8946.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(7416014)(1800799024)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?Te706rPPCizjuizri2hRzcXTxUKcpWpZJ1EGFM4fn/sXTYMj2zz0zW7vnf?= =?iso-8859-1?Q?RumAza9Lu2CbJxeiwTRPjmrEAK4kNDCSskTPPHQgRsbgW8Wb85+xXCJDbM?= =?iso-8859-1?Q?oPxn0SmYDQos7VnrAh4ocgjjKZwWVpDvTFH6LliVXqTvZuT/s6e1kd5tZH?= =?iso-8859-1?Q?b/yNXTDpN2EED8I3SWAyabGC4bxAi+qUcWQNyEOoS2MH28Tpkwd3WsSBI9?= =?iso-8859-1?Q?8xj+azYDrwhWdtrC3WUbbnQ97G7cHKbxodT2PRIkwJjI2LoNqGxWu7uckX?= =?iso-8859-1?Q?ddwthX+CWLfoegft5tccq+nScOPiUouuTsRq6ziw25kmyd1bQZU6ToXSMG?= =?iso-8859-1?Q?9sCc7ZkbsA5p/Sy/TGQOlS6f6S9LhYwPz1l+jFVcFlV6jOPXNmQjIlCDr4?= =?iso-8859-1?Q?8a+ccRbVY2U5lmGmTIQA6EMv5c3yiBGE9MGgV2CSwLFa1LkW9/pDk+jCb0?= =?iso-8859-1?Q?pgxFW/J4OPUzE8E2ELHp/Qf6XbnlXAhVv+266Cy1/6t7aaQwaa3FQWiTcd?= =?iso-8859-1?Q?ruVumBDkayAQunj+v+Tn10mkHFBbyIgnWBxFkRNvwVQEAldTVD2YkL070A?= =?iso-8859-1?Q?JBBnqbaHWmxAoPbxYk99gm2eeqCY54qRmkkvNjwRVR6VNn8OyH5DM8rY2B?= =?iso-8859-1?Q?oMe4aHeLk8K5up2snUAiwNXh0QXzGVxtP6fqSFvVS1+aUsyUrx4+T4nFjQ?= =?iso-8859-1?Q?peYbH25h0RUaV9FDuORyNOcLVmDy2fkW1qLYDG69bPRnsRuWNB66O1qmnE?= =?iso-8859-1?Q?pgUNVDCf/g7znxCURclucTwdz4Y76L+e+H9rr3y+eu5Olzugo7hJlyghmM?= =?iso-8859-1?Q?3LBaK6Jt7uYfI85Lr+YoM1ynJyOGuVIk37HgwjJevye6vzSzdgnCsmxjUt?= =?iso-8859-1?Q?Z2aKf90vPVudTKKvRKwnPM4LyAwmbt4PQq2phHkjgHY3If6QRtnBR1b1B2?= =?iso-8859-1?Q?+7fy7HFqKg2Lfvnwhw73YOIGxqDh8YOeLJ1orlu6hjtQJENPZrrtuASYu8?= =?iso-8859-1?Q?N/XfOWC+gtb5jiDYhg6/MyjAdjs0COx4l2CEbP4Leg0NF64ArwdaPUNYLj?= =?iso-8859-1?Q?k/hRiWMuQ3UF+nR5e1tWEsFDKqZ5WcELmp/aq4MuGL77zj2BJs/clAhEm8?= =?iso-8859-1?Q?5pZNUlFFATmuMl9oEZgn77frIl8r94zZA2yEmX2jB1pDFmX1rxTOX8yChd?= =?iso-8859-1?Q?4lXvWTFH5VxhwB/cXSvvLyCEGkG7UUeFuteQcQmQ7U/3vijF3yIP8zpkPi?= =?iso-8859-1?Q?PX1EflHE3TAHGIWZl6OSOwNlibHBF+TX/pEFWLQulvWga4lOMhB0UOnZAE?= =?iso-8859-1?Q?29td3xGgjCdLmhlVEYSVO2Lk3oLFYt9HPPm3pkYYoU2K+fGhYGBCCvHO5m?= =?iso-8859-1?Q?ATxv9kXMrvdh98ZGk+1x62D37b8VqreznWTjdLjJ9jVZ+2dC5LsCPKkZ6P?= =?iso-8859-1?Q?IoFd8dW2fEkBZLE4A04Wky5tUKJJFdhfv+RxUkHbrW6GPEOLzShIxLDmy9?= =?iso-8859-1?Q?KRLFJe2yZMNqCkNjKAe7CUUsNRehMdxp5LkHS7yhcWwex2tp/lE3Qe23dC?= =?iso-8859-1?Q?udnLHhhKaE9sEmc8FTuiTuGwuTdXY2gJfzwoJ9VnwjQ6iXsUXN+0kn0aky?= =?iso-8859-1?Q?b8go7otgwx0TmK3G5G3ywcQOrP7k5wCC65i3MbWEtS29ycITbMTveT+w?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB8946.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 7ede76ef-f979-4df0-342c-08ddc914ba61 X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jul 2025 11:41:40.1155 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: n5bIDn5hW6YQ33L9tca47MJ9OBoITy+t3ytrpq0m/Z2UoUixdTxxuyNRcGSRBOOZdkDSBV+/xZl/YUuDB4qJvaiAM0fTTBtH8uiGpHu05Ws= X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI2PR03MB10809 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1753184539154116600 Content-Type: text/plain; charset="utf-8" Change -ENOPNOTSUPP error code to -ENXIO when iommu is disabled during iommu_do_domctl call. As was discussed in [1] [0]: https://lore.kernel.org/xen-devel/alpine.DEB.2.22.394.2506171701190.17= 80597@ubuntu-linux-20-04-desktop/ Signed-off-by: Oleksii Moisieiev --- Changes in v5: - set error code to -ENXIO when iommu is disabled xen/drivers/passthrough/iommu.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iomm= u.c index 16aad86973..075bbd1718 100644 --- a/xen/drivers/passthrough/iommu.c +++ b/xen/drivers/passthrough/iommu.c @@ -632,7 +632,7 @@ int iommu_do_domctl( int ret =3D -ENODEV; =20 if ( !(d ? is_iommu_enabled(d) : iommu_enabled) ) - return -EOPNOTSUPP; + return -ENXIO; =20 #ifdef CONFIG_HAS_PCI ret =3D iommu_do_pci_domctl(domctl, d, u_domctl); --=20 2.34.1 From nobody Thu Oct 30 23:14:03 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1753184534; cv=pass; d=zohomail.com; s=zohoarc; b=IF9Y6jdSz86LK0suI5YYunbUFHU4fBWzxtS5MbqyUDUFf2Pz6FU/gmqlOkzp86ofP/E0xvBcnGHdhFIvwIQnMzj3toDRkeai8jEWMfq98dHIOdWMED3bziZYHvyxbd3LvkUKUmfJ/OWJxRQWmlmX98wha5CIQfsLuNCXiYZPimw= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1753184534; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=Bvdj4fhiG/MBLH8UUVQd9RqYFEdkKD52da5j0t2kGl0=; b=Q90C2QSUPA166qOZ+4yvCQB2Q6WsHU/WPxe30PM1ZH1Rm574jKda+m6QBN4LRBySTYbW+y9MDCAznP1ndG7hVKfnS6/RyqY25IZbO75u5DyDFunShoD5deQdL0AZyNKqgjFrvsGLBN0QwbR8cbSNowkz8ZHpDqgZ/iUg8Swfejc= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1753184534235768.2544618359332; Tue, 22 Jul 2025 04:42:14 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1052290.1420976 (Exim 4.92) (envelope-from ) id 1ueBNf-0004ue-Hv; Tue, 22 Jul 2025 11:41:59 +0000 Received: by outflank-mailman (output) from mailman id 1052290.1420976; Tue, 22 Jul 2025 11:41:59 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNf-0004u4-Db; Tue, 22 Jul 2025 11:41:59 +0000 Received: by outflank-mailman (input) for mailman id 1052290; Tue, 22 Jul 2025 11:41:57 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNd-0004HB-IJ for xen-devel@lists.xenproject.org; Tue, 22 Jul 2025 11:41:57 +0000 Received: from MRWPR03CU001.outbound.protection.outlook.com (mail-francesouthazlp170110003.outbound.protection.outlook.com [2a01:111:f403:c207::3]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id de7afc80-66f0-11f0-b894-0df219b8e170; Tue, 22 Jul 2025 13:41:56 +0200 (CEST) Received: from PAVPR03MB8946.eurprd03.prod.outlook.com (2603:10a6:102:32e::21) by VI2PR03MB10809.eurprd03.prod.outlook.com (2603:10a6:800:272::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8943.29; Tue, 22 Jul 2025 11:41:42 +0000 Received: from PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc]) by PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc%6]) with mapi id 15.20.8943.025; Tue, 22 Jul 2025 11:41:42 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: de7afc80-66f0-11f0-b894-0df219b8e170 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=MMWP8LEWyWVAcFu3U8eRKgVZ3uR738NKMP/Tm7mbxjUAoLjov3brK/iog5aTC9pwZuLaQXgWMKxpjOaBCGHyTYG3ZSOwn0T5rVXC/7+tO7jtG6v7vVg607DxzTwDc52z4SwXel4fic1LU8SAfChfFcMibFZiyJxelJcmg6gzw8WVNvlO8yWvMiXATSzTEd/cy/1RbeVM4Bw9lmZD4ElcNyoNRUMIpQXHdrXJlPP+Az88Ya56jZ8TLkjWWPu6o3hMZXZ4nspDPQuQrIZa7jllGxSDOOm/upmNAea6kpHw//l2cx82S27MkKfnUtpyX18zif1H1es21ykiMso4/KPg0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Bvdj4fhiG/MBLH8UUVQd9RqYFEdkKD52da5j0t2kGl0=; b=tm40m4sTFxVQAO1H+gMsCkQd28r9AmEmDjWT9ZkrgMYRwBZpEXHRlDAUxdwB35/skXb8/0aAB06AxWVg95by+KNxge3HiSRUN135Ij+UrA7t5QA0TAdFSRxriyA1osQIhR+s/tycREsuV99LFfw51uol0oGJ88DvimciYEUJVNcugmO9uF+gAfvMICxyR4d/LKD5r++kQS9dB9siB423UHmgL7qBM6kP70u/o8t1aPF8ghht19BgqKbFeIAREPVNY6M3SpLAfoqyaUV68NQGVZJhBwaV74+1+4MefN3VJrRQQ+heB55QTiSv0wtOrKfHpLCN7yVU5ac4UZ1cBfWT2w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Bvdj4fhiG/MBLH8UUVQd9RqYFEdkKD52da5j0t2kGl0=; b=ViQljXJTpQI5MF34UeglxQmb1xICHQtYyBA5JkD1iQtRcEH38uuKWaqOraphgXJzamzTE8Lm5Uqzb8lFHsBXNf/T3bUKO+jzo9Cj/1JVvBPPBa84YAGDhbXXQhpIhnJle0e7tG2tLzpUA/xoYwZ7wur67zRJX/Vu98jcN8o5yqsMkVdlJSdiJO3arKKydlXV3j2iWDU1fZmQBABPEnsd0E7IXc7aDJ1kJJrWcfkqKAmU5KuEnTBPs/xXhS5fwh32lLrX82h7Kn0O76AXwOhMPyNJNGCS+Io7W7mGNxHSIeGsW+XH5ej/6rzVUD2Gfp8PD+pR88AZEaWLfpq8IYANQA== From: Oleksii Moisieiev To: "xen-devel@lists.xenproject.org" CC: Andrew Cooper , Anthony PERARD , Bertrand Marquis , Jan Beulich , Juergen Gross , Julien Grall , Michal Orzel , Oleksii Moisieiev , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Stefano Stabellini , Volodymyr Babchuk , Grygorii Strashko Subject: [RFC PATCH v5 06/10] xen/domctl: extend XEN_DOMCTL_assign_device to handle not only iommu Thread-Topic: [RFC PATCH v5 06/10] xen/domctl: extend XEN_DOMCTL_assign_device to handle not only iommu Thread-Index: AQHb+v2XIf5rVjN6B0ydmKskjXCNlg== Date: Tue, 22 Jul 2025 11:41:40 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB8946:EE_|VI2PR03MB10809:EE_ x-ms-office365-filtering-correlation-id: 9888cc14-6d04-4c64-f208-08ddc914ba97 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|7416014|1800799024|366016|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?c4ssJyYITA047w43TnpcmKL31I84CTdtQyFVt0GJx7BltMu2gBxSAwZfje?= =?iso-8859-1?Q?V2vEv9q3JUqWtxcY2YmW1XIkx138tWyR37KuzcxrV1GQ2kfySke5LlgyEK?= =?iso-8859-1?Q?wOuMAHZuB2z6CQJjdvdmeqTFsqmKjT5jwTjGjEaDVHXWTxsrLDAcEihLMk?= =?iso-8859-1?Q?UsWLS0dEfMKAvljXQ8nP6bXgi44UPndzsGgRiuzDi+rMiprpXhXdC/I8Cb?= =?iso-8859-1?Q?PE3a0c25JMstyk3jhf+M2gz6OHhDaynj7u7P6rQM7xu2uzG0q548A/9oon?= =?iso-8859-1?Q?fvAPA6IFM1I71UJKgSOdYvAkJeor96C2Wn1OBP/Aikx20mR+iFXZhWQhC6?= =?iso-8859-1?Q?J7KrlBX4z0RDpdcT0HOjwqFAcCspac0VyNoarKi5S9R0UwA23ljWp4Qg7e?= =?iso-8859-1?Q?rNMIwmPQFtqOhEbHQmD54ZcHvQPB3np5n3sVIoi83sOaGfFy15hvVLjaiE?= =?iso-8859-1?Q?+iv1EEzX8YFA5R/bpy0l/jpIVpYcqnDPaj4iX0KBAsBEs7UrM8+klDCQwJ?= =?iso-8859-1?Q?4s88POjxBCygnWjYIk9maJ0/JiR68CCeQnpI0J6CEYQqHOlsO7jMzfCHBv?= =?iso-8859-1?Q?Yrwhs5c3oVXGmjWYGBtkEB9s8G6X4TYnWEPb/fMNCcDkf5hIzBELRt7z1r?= =?iso-8859-1?Q?05cn5qU/h3gQJIj6y8Fim90xmgiUID+aMkF6yH2i480D35pqIeJP11K/3R?= =?iso-8859-1?Q?uanUbp+PcGekh2SAeE+I41LztEkThSsVDZ6q5koT9ICkFRiRsCQX+hX9Yh?= =?iso-8859-1?Q?qicS+ptkqNnIxbg+HVjllb7yUoXWsHEPcp22+vT87NOkAge/X44kD0VC8r?= =?iso-8859-1?Q?eLBrjBbK0c25uQ0jecFnVNHKJqMeJhcttmn9T7D+P/3RN+7o81N/644nKx?= =?iso-8859-1?Q?zZCBK01HnQWxcMzV/vdBrzlJXiKHXuQR97GmRmvnc/m9bz8cuhabb7cQvy?= =?iso-8859-1?Q?KfHl7IZc0edVOyebIbQYkSQhU/NXFDYfd94HmRg5DQBGF8TMwxvcvSIAhy?= =?iso-8859-1?Q?2rDs8vQAUg3hqS2gnYi7wBZ0v7YXaqn1gKnyCzbTBkBUnCbeTwJo0h5qBK?= =?iso-8859-1?Q?nkzFgyAGGk8uIKHePrP4P9IcHQfZl4lfZEQHO8F1vgD3NbBJBnMw4JedFy?= =?iso-8859-1?Q?REeTO0/25fMi5KGrWxH1fyb2YcZ8iNbh7kCFOSH8IAQ6csjfGjsZr23fW9?= =?iso-8859-1?Q?4S38SArItUWQStVOLUHiW9IsMAv3MEbdqoqbAjcwyM6O5S7l1bPwK5/+SU?= =?iso-8859-1?Q?YFVGhThwwASs8yA5Y0EWHDesDc8TJdREDne+Kbnm/Ef4xju0up94WjL5D1?= =?iso-8859-1?Q?bdpLCV0dGACpZ6XveruRjrzddBkGWQfP3uyi8dFeJ+/8D2rUrnXWxtwMUu?= =?iso-8859-1?Q?2dCnRE2/idICvVKqk501VTcCmWfGw4+uwPjKO7a/sqiF38gIImVm9LiTer?= =?iso-8859-1?Q?gw2WKeumQ0dAQtrgOqO6jFdukJwTMM13heUwYGByFx29a79Q2h6vuzXtGt?= =?iso-8859-1?Q?HuqCxzMwokAP3GTQhfuKkjEk16b7Ik0NGoek69d/pAgA=3D=3D?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB8946.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(7416014)(1800799024)(366016)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?VesnFOiWYV19DGmNf98mWm/tOjOenhjLH0ZJ5u+yJWfUTJ3VjuRNLAjw40?= =?iso-8859-1?Q?cL4uN50CALBEf9GK67Yo11zC5sIska+dv6lb32pmm+VLifhSFBaoVdWWlr?= =?iso-8859-1?Q?Ah3Q/2wlJrs33JiX3LeJwkJp6SIfYEXM1IAwa9dqDBPMhKTypukRFVsJLR?= =?iso-8859-1?Q?yjyQmBwphPgnLMKYx+luVgdXbdM5maphOis9GjlUe3erBlObJtmpiKleFz?= =?iso-8859-1?Q?funIFnBbARifYIJsOQ6nB5kxkEr21Jkme0MYX7A5f8E155aZ2d6uRcpVn1?= =?iso-8859-1?Q?Wq4vtJezdH86xWIubpTQJW3maLscNomiVH6PUr5ee+kStxQRkvhbPGIcsa?= =?iso-8859-1?Q?eyEZ1zMhY6j90NriGSfFkMeT3Pj4dX3wU4chepMjSBmKyuX/Oh9FBzcPd5?= =?iso-8859-1?Q?92j8f+s5gRxyM8A1P22R8EULfYKe9Wy3291WEFeWr7/Aa6DXCQNmJE4J/q?= =?iso-8859-1?Q?ZfqnkUGEtFh4B5xG8KAMerndTrdkJ/MhVqYdG2Ez24dzffIe465zp2PGg4?= =?iso-8859-1?Q?pwY8TCslF+dYtrdldvwihIkKRjrz+STSWDKkpCHruE+X/wbx4xZBEjsMgK?= =?iso-8859-1?Q?X7dcAsURYQTcmskYXMgVplurJXAFNzaw2h5+WmAzsN8ecaVGnh3SoGtTyU?= =?iso-8859-1?Q?njyml/3+VyeyryW/elbAs06752eAzg5gOk62ZK8Ld+wnCRvjfTYmYEwr3o?= =?iso-8859-1?Q?Y+7LJ8ikkkkMBvYlnPCPtoD/04xT31+W+oJrbsLq3D1ifzdBwbHtEn14ka?= =?iso-8859-1?Q?y8hU/kfrgiWFYUcVIyo06Mu6vipAxJEpS2JuwQeZG1dzUnwqf3gFcIaLKq?= =?iso-8859-1?Q?mOx5IR8qj/lTh9yQ4Gvzd3jPRl8NM0JihR1KHH9OzhWxH9O66oDnLgtoP9?= =?iso-8859-1?Q?PbIJNI3Rfz9Rvxl1i+aEE0vNCzYBoly8DethJ5odW4Xs+/5Pz8zgaCg+N7?= =?iso-8859-1?Q?r2+bLDKThZbDUcNmv+VxpLQUyOuEwyhxGUJxiTZYyzI9Cio8Ys8EL5QO6N?= =?iso-8859-1?Q?SHP+t2P1PNmk0C4xHF/MCsQvQMGY0MTP7DEHN3VmBRAwMKT4PelOAp77Gu?= =?iso-8859-1?Q?D16ezzdoKmL2uQy2ie+QthW58wBx6+5BpFOI3yOsn1Z+L36MoPJ3Fk6OZS?= =?iso-8859-1?Q?bkKhybqnOuq2me/AnYTBgOkk/LM2pWg3HoFcbsehQaWi4E6vSAID0IQTAW?= =?iso-8859-1?Q?rEf6oUFx5p1cHPNM0BbHIyAB+2ByDtCkFLzIN6Ay+DVpOY7FW61flUo0r6?= =?iso-8859-1?Q?sVT7rPxEALUpX9PitSw0bBREGJZcTudbUXmZC9Dpnb7eFTPErolJUl3yf0?= =?iso-8859-1?Q?h50C14nSmLKi+Sgu+os7aHqOtgFnvnsaTtXEKIPTmW3K5I9Z9k6SZTnm2o?= =?iso-8859-1?Q?yb635EUIiZBTfLbJsvp1Y3Q0Ca5GGnAZpH4R7eoRTr6kIc8KNIiHVcfu6J?= =?iso-8859-1?Q?lBMA7O9NvlLBiewzoP3+YWlhOiVcqcfdH/CQ7DKN94KYbzFiry0x6eRAiI?= =?iso-8859-1?Q?inskGiRkxkn+XaSDAVJuKHBA6rRzuvACuQp1vveGYvtZ3VZ/oLUVSEdKxc?= =?iso-8859-1?Q?7bqhsb2u7ZsDNJYdHl9pGBEMOXOpAL50TYII1fN/TvxSMk6Vj/26iixjjG?= =?iso-8859-1?Q?mVI3CXyPiTCdMrIlSuZ+HSjlUaXEx9cZah8/kiIie5pHmy468P0FuXTg?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB8946.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9888cc14-6d04-4c64-f208-08ddc914ba97 X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jul 2025 11:41:40.4991 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: j4XMRUFq2LMRJbthExtovWQocm7BUmvzV4jbaScZaC5U2vIOkJDXdAMTgBSCxwmrOswpEsmyQSW5esIO4o23lC5NIHzlcz1LnYn6PPJ25WQ= X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI2PR03MB10809 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1753184535709116600 Content-Type: text/plain; charset="utf-8" From: Grygorii Strashko Add chained handling of assigned DT devices to support access-controller functionality through SCI framework, so DT device assign request can be passed to FW for processing and enabling VM access to requested device (for example, device power management through FW interface like SCMI). The SCI access-controller DT device processing is chained after IOMMU processing and expected to be executed for any DT device regardless of its protection by IOMMU (or if IOMMU is disabled). This allows to pass not only IOMMU protected DT device through xl.cfg:"dtdev" property for processing: dtdev =3D [ "/soc/video@e6ef0000", <- IOMMU protected device "/soc/i2c@e6508000", <- not IOMMU protected device ] The change is done in two parts: 1) update iommu_do_dt_domctl() to check for dt_device_is_protected() and not fail if DT device is not protected by IOMMU 2) add chained call to sci_do_domctl() in do_domctl() Signed-off-by: Grygorii Strashko Signed-off-by: Oleksii Moisieiev --- Changes in v5: - return -EINVAL if mediator without assign_dt_device was provided - invert return code check for iommu_do_domctl in XEN_DOMCTL_assign_device domctl processing to make cleaner code - change -ENOTSUPP error code to -ENXIO in sci_do_domctl - handle -ENXIO return comde of iommu_do_domctl - leave !dt_device_is_protected check in iommu_do_dt_domctl to make code work the same way it's done in "handle_device" call while creating hwdom(dom0) and "handle_passthrough_prop" call for dom0less creation - drop return check from sci_assign_dt_device call as not needed - do not return EINVAL when addign_dt_device is not set. That is because this callback is optional and not implemented in single-agent driver xen/arch/arm/firmware/sci.c | 35 +++++++++++++++++++++++++ xen/arch/arm/include/asm/firmware/sci.h | 14 ++++++++++ xen/common/domctl.c | 19 ++++++++++++++ xen/drivers/passthrough/device_tree.c | 6 +++++ 4 files changed, 74 insertions(+) diff --git a/xen/arch/arm/firmware/sci.c b/xen/arch/arm/firmware/sci.c index e1522e10e2..db75fc5cb3 100644 --- a/xen/arch/arm/firmware/sci.c +++ b/xen/arch/arm/firmware/sci.c @@ -126,6 +126,41 @@ int sci_assign_dt_device(struct domain *d, struct dt_d= evice_node *dev) return 0; } =20 +int sci_do_domctl(struct xen_domctl *domctl, struct domain *d, + XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl) +{ + struct dt_device_node *dev; + int ret =3D 0; + + switch ( domctl->cmd ) + { + case XEN_DOMCTL_assign_device: + ret =3D -ENXIO; + if ( domctl->u.assign_device.dev !=3D XEN_DOMCTL_DEV_DT ) + break; + + if ( !cur_mediator ) + break; + + if ( !cur_mediator->assign_dt_device ) + break; + + ret =3D dt_find_node_by_gpath(domctl->u.assign_device.u.dt.path, + domctl->u.assign_device.u.dt.size, &de= v); + if ( ret ) + return ret; + + ret =3D sci_assign_dt_device(d, dev); + + break; + default: + /* do not fail here as call is chained with iommu handling */ + break; + } + + return ret; +} + static int __init sci_init(void) { struct dt_device_node *np; diff --git a/xen/arch/arm/include/asm/firmware/sci.h b/xen/arch/arm/include= /asm/firmware/sci.h index 71fb54852e..b8d1bc8a62 100644 --- a/xen/arch/arm/include/asm/firmware/sci.h +++ b/xen/arch/arm/include/asm/firmware/sci.h @@ -146,6 +146,14 @@ int sci_dt_finalize(struct domain *d, void *fdt); * control" functionality. */ int sci_assign_dt_device(struct domain *d, struct dt_device_node *dev); + +/* + * SCI domctl handler + * + * Only XEN_DOMCTL_assign_device is handled for now. + */ +int sci_do_domctl(struct xen_domctl *domctl, struct domain *d, + XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl); #else =20 static inline bool sci_domain_is_enabled(struct domain *d) @@ -195,6 +203,12 @@ static inline int sci_assign_dt_device(struct domain *= d, return 0; } =20 +static inline int sci_do_domctl(struct xen_domctl *domctl, struct domain *= d, + XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_dom= ctl) +{ + return 0; +} + #endif /* CONFIG_ARM_SCI */ =20 #endif /* __ASM_ARM_SCI_H */ diff --git a/xen/common/domctl.c b/xen/common/domctl.c index f2a7caaf85..35398a0c42 100644 --- a/xen/common/domctl.c +++ b/xen/common/domctl.c @@ -29,6 +29,7 @@ #include =20 #include +#include #include #include #include @@ -859,7 +860,25 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_= domctl) case XEN_DOMCTL_test_assign_device: case XEN_DOMCTL_deassign_device: case XEN_DOMCTL_get_device_group: + int ret1; + =20 ret =3D iommu_do_domctl(op, d, u_domctl); + if ( ret < 0 && ret !=3D -ENXIO ) + return ret; + + /* + * Add chained handling of assigned DT devices to support + * access-controller functionality through SCI framework, so + * DT device assign request can be passed to FW for processing and + * enabling VM access to requested device. + * The access-controller DT device processing is chained after IOM= MU + * processing and expected to be executed for any DT device + * regardless if DT device is protected by IOMMU or not (or IOMMU + * is disabled). + */ + ret1 =3D sci_do_domctl(op, d, u_domctl); + if ( ret1 !=3D -ENXIO ) + ret =3D ret1; break; =20 case XEN_DOMCTL_get_paging_mempool_size: diff --git a/xen/drivers/passthrough/device_tree.c b/xen/drivers/passthroug= h/device_tree.c index f5850a2607..29a44dc773 100644 --- a/xen/drivers/passthrough/device_tree.c +++ b/xen/drivers/passthrough/device_tree.c @@ -379,6 +379,12 @@ int iommu_do_dt_domctl(struct xen_domctl *domctl, stru= ct domain *d, break; } =20 + if ( !dt_device_is_protected(dev) ) + { + ret =3D 0; + break; + } + ret =3D iommu_assign_dt_device(d, dev); =20 if ( ret ) --=20 2.34.1 From nobody Thu Oct 30 23:14:03 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1753184534; cv=pass; d=zohomail.com; s=zohoarc; b=ntY+MRK+UevYFn3pbemYaNhJj8UUt+fFTUh3EcPlv/VPGhXtfsu3OoeQHZXnRuwj5YxNmXEOW1hYZzqrSO3Q1XUffLaShLCLxZf5uBU7s0xV9oQ1bQ/zhS/9YDHi/ikBSQtfHaNxDnw2nW279vNpg5RQRftLupYhZQM5WbfaD8Q= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1753184534; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=dUvvV+20T1UDiyfQPM2cyTTSiGchXAevlCVyA+kQh4I=; b=GjUSLO7jCAIajfg7UrlMuTFkxwYEM3HVRJcgvNoBMIpgBcfzmDBMygG35gR2qymKfVimIQ/xLtyOFzEcN+MU84ACwNfz2P4Z7g0L1O18xxCbWzaGuGVRJHBe0oV6Qsbc7wFk1WOdSfVX7URPHK4yrqu9aFR7FwGpZYdH6rH5T5U= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1753184534588338.9293477675317; Tue, 22 Jul 2025 04:42:14 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1052282.1420927 (Exim 4.92) (envelope-from ) id 1ueBNV-0003Mi-Lg; Tue, 22 Jul 2025 11:41:49 +0000 Received: by outflank-mailman (output) from mailman id 1052282.1420927; Tue, 22 Jul 2025 11:41:49 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNV-0003MW-Hs; Tue, 22 Jul 2025 11:41:49 +0000 Received: by outflank-mailman (input) for mailman id 1052282; Tue, 22 Jul 2025 11:41:48 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNU-0002RD-2V for xen-devel@lists.xenproject.org; Tue, 22 Jul 2025 11:41:48 +0000 Received: from AM0PR83CU005.outbound.protection.outlook.com (mail-westeuropeazlp170100001.outbound.protection.outlook.com [2a01:111:f403:c201::1]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id d91cea4e-66f0-11f0-a31d-13f23c93f187; Tue, 22 Jul 2025 13:41:47 +0200 (CEST) Received: from PAVPR03MB8946.eurprd03.prod.outlook.com (2603:10a6:102:32e::21) by AS2PR03MB10194.eurprd03.prod.outlook.com (2603:10a6:20b:5fc::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8943.30; Tue, 22 Jul 2025 11:41:42 +0000 Received: from PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc]) by PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc%6]) with mapi id 15.20.8943.025; Tue, 22 Jul 2025 11:41:42 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: d91cea4e-66f0-11f0-a31d-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=bT57Ow7KmSUB1Sr4zJXXgPSWsSZjaWAyOf/OKvCLHMavDWfwjn6vUQb1NOiS5aOr+IeH9wVDAojCHXkrnIA3r55+V5iwjuHcWoGSvd0fnhemRucYKH03BJxQZynikiKhVj6S8YykcWTF6+VThfCf7H048b41MAgHXeTeTeu3k1ZaDaWVn8Igu5e+DU3povz/oopS/lYoC0Q78xaP+e/YDYKPT4pyPqtHn5zd4BsihsnbZdej8rLN/Mzibq6GAeYUTAse+ncI+wBIzF71uHinw35QDo6GEzY0/Qj911rLVcTqRIbvRCt+mIg7WflCl2IyMysgmykdT6n4aeRx0aPkJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=dUvvV+20T1UDiyfQPM2cyTTSiGchXAevlCVyA+kQh4I=; b=ZKCqXmtJ+U929zFlrE+0u1tmFOeyXZLMBcKAK9bU+6cpAF8Bi5gDK1faHe1B0miFcKNhlXKh9Cnr2ty4cckfkr0WwyK1p+Q7qQENC5VBdaG7fKiiNGEd9v9FmJuUG/LmD1jyl41iTj2fUYGdICTVAYC4xHEcESReuIq+8FPXpzXOQl2IjLmFTegtSjboUTX9dxeDVneEH20cPPwI1XWHCxtB/gLnSyzMw28ZJmJuPFUfiQEH6Hj0Yyl+bI/ZFk5O9TOjBLOBHpE64PuUykNaASeoWXeSAJI1uBOp+TkMgXj7ZwciVp9INSbYayXppcPYKuMgHss59pjbudSt6a9iDw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dUvvV+20T1UDiyfQPM2cyTTSiGchXAevlCVyA+kQh4I=; b=ZECGgcWpI1ATSgv8mHhX9r4WDbxifNV/vsgRHC8aP/NEg+m60YB5Tph1H/7r1jtkUktczSggV6X68sATnK73Nqig3LVHpp/06vW6r9qkH93YG1kIZJFjS5wWLeGnyEaXH84spb395O/pOsa5Vo62tFpWu+kb9GHNVohBHVnHiRZkyEgrUp8vIxtJZq4ei8gJuE4i8zq8zFHWKWnfQqzZ2tEpkvvW4q+Ahbw9NYUfev/H8zYf0kKderrqy2wCusvmAYmxzP51G7o8pvRDcqgmV1YLMPg+DH6cDoAmkNzxxrxOAMBZhyk1iYsCiniJInwyuV4VioOzNXcjowPgIMEqBw== From: Oleksii Moisieiev To: "xen-devel@lists.xenproject.org" CC: Andrew Cooper , Anthony PERARD , Bertrand Marquis , Jan Beulich , Juergen Gross , Julien Grall , Michal Orzel , Oleksii Moisieiev , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Stefano Stabellini , Volodymyr Babchuk , Grygorii Strashko Subject: [RFC PATCH v5 07/10] xen: arm: smccc: add INVALID_PARAMETER error code Thread-Topic: [RFC PATCH v5 07/10] xen: arm: smccc: add INVALID_PARAMETER error code Thread-Index: AQHb+v2XkapJpHUkb0u7p4MhQIJSwA== Date: Tue, 22 Jul 2025 11:41:40 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB8946:EE_|AS2PR03MB10194:EE_ x-ms-office365-filtering-correlation-id: 52d7740d-1116-45fd-8808-08ddc914bae4 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|366016|1800799024|7416014|376014|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?8vy2vamGdHOHgeoS1MApeiECp/8jO7ad75Q2VkxSDxgrfuFGl7SDpx4p6A?= =?iso-8859-1?Q?DkOQqFpgGpFbkqgPtuzLMSsottiO1TEEaGtuKvNhO4RyTlDU+oU/pZZnC8?= =?iso-8859-1?Q?smnGqvRUGdOruPFzzrWpPYLlUWuUZk3pySy9lJLGfChCvavUE3R3XddvF8?= =?iso-8859-1?Q?Xx6eUsKwSsGehZIxAL9RuxLegKq7da7bRGMXijjzM8uHi/0TptZW3C/iCo?= =?iso-8859-1?Q?5CtyKhqGKTeIfuua3wv9IS/zZwcF3JKYsVRQURAfHAzsjuyk8Ja2ODPZAs?= =?iso-8859-1?Q?eiW+n9mis8E7+TpxmOMOkxROXuepTRGwYb8fv6OEpiBxBj2O9TwZLj4bC6?= =?iso-8859-1?Q?/Qs4a1CKm4EXqVbpOZf0aPKrQXFDsUOCNzIT05pRMeYUCRsmXsdcoqd2fM?= =?iso-8859-1?Q?jbwC40xqZ2uQHIi5R9u8PhjLK46GAc7tJScFoNPPDddVyyyga7NjewrVZU?= =?iso-8859-1?Q?Xlvjwaeo45QC/Y06eV8zzD/daCspvQYhg5HkABDGbAbayD6LbLg7xczztU?= =?iso-8859-1?Q?S9NkMhqQZUhLU3EjS+X0E8gkeG423wDUZaFYynrNWpiO+w7ysSgvxiehVJ?= =?iso-8859-1?Q?iNUrihZkSzQBwkmkk150MK52fBD3Jc2lBc56CM56OuWl8FoiPPuHzocjbl?= =?iso-8859-1?Q?edFeM588A0d5k6KcVxb9PmITVgLBibirVYKqig9uY0iCzXthr8VW2u+FXQ?= =?iso-8859-1?Q?9BcJMXJyzl8pSiXWzoViEDcYFo7IsdGqPVaQAUcpHlamr/d8HB9BQave9q?= =?iso-8859-1?Q?gM7m7/ErYWHECvZklet47Z/7HAgsytwP2iDBYPo420ZJyzuWhu9sFSwGyu?= =?iso-8859-1?Q?ZBO2kubF25+4DTlj0Z2xUzH5zlFVunUe1IguXsYfM6ozCP5PQ5J6fK0R/k?= =?iso-8859-1?Q?piAENXfZ2hVQHqm8IZ2dCKN+mr4fP2HZj0JUkM6NZuFe4NsFDaofy9aGbz?= =?iso-8859-1?Q?j3n5L24xBMlXDCqzO5ZdxAsa92kHtGOMAV37E8nuIhO5kssfu17aK+pUGJ?= =?iso-8859-1?Q?k5MPX+AlNjVhlw9d8UpgwVU/1WcD3xuMOvw9bXDdryEsiJxPDiLyYZ+Nkn?= =?iso-8859-1?Q?GQ0JLzt78gpc9SlKkwkJ3W2pdiX/suGA4IwHQ+nME7m37wPic+bUYE5z8B?= =?iso-8859-1?Q?s2tJOf9EDb7j6ECcMglx3Xv0itvSFDRlGQFAnads1V5fBeQODY8rpfIJoO?= =?iso-8859-1?Q?7Th8enaZBRfnJmcGPVWGqkMVDMbmwu7PjB2l65nQDoOwT04QiVooVWQXmF?= =?iso-8859-1?Q?T4DZYIeDowJkOn7hXtZDMfya9FIJPZuEU6M+a46hDYPTce2s+K6I2p0uOX?= =?iso-8859-1?Q?puAHq5RUMgJO1we+17J3/+D3JjtLgPmXowTLgDSISLLcQwz6+p1D+XJAMv?= =?iso-8859-1?Q?NXgXnIS+dWF1V6PT6ZbqQ09iOBS1+kbmtcstFPHpqDmIs6DSpIoCdTdgAa?= =?iso-8859-1?Q?rp9gyx1W0gvTM6iwTuJR+ZZ+aSui2kcUBB4pTXoi6l21kjS1C03xPlGlyL?= =?iso-8859-1?Q?KqmhiV43aMxPWuqQvpfQubrLU3oxdMqNRO7kqewKsIsBGm2UnLMa+OGBjb?= =?iso-8859-1?Q?ne+9QmQ=3D?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB8946.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(7416014)(376014)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?O36M/kqY2fQkczcwomOPhV5s4DpC09mozjus1Mf5o+pYEtvz72pOCLv6v3?= =?iso-8859-1?Q?O9ep3DfTee+hJYd6wCkaDOphdr0+gvUmTkBWpjNax62kvFzf+t2ncRXqJl?= =?iso-8859-1?Q?LaPa8e9+NonQH5aWOcZcngp3rTQ1uO0/8oRHLPV6+YZouFVgbS6KLgGvJy?= =?iso-8859-1?Q?kW7QeIOZLfrFBjPEIYOBVBRV2ZSWuQXTPYrRHsz4r50I1O89WXdUV8mH6z?= =?iso-8859-1?Q?ebUlX4bci1t/LctK6isOEi92Pv4uk1MLUa/b1Qao/SuD5Q67B8AOKvziyv?= =?iso-8859-1?Q?K05zABJRvwYPabJhw4bHrRkhVey5Hm84PQUdviQU7MA3UlgZmiiAHC2ZFL?= =?iso-8859-1?Q?hkWG6U4lSNSr9EZLGxaZBhYSG+NFL0bNL6HwO1FMp0HMQ6cko4wijEBv8x?= =?iso-8859-1?Q?kYxmfNOZt9zpCi1eGMfjsLZunx+fWb8+z8pItH7VIgfe9FkHSgJmhnQdjN?= =?iso-8859-1?Q?d/S+0EBGu5pyWhBLYeKlG+ngnPHTjDqwDJO5Wv82K9USPNnALsVrQovGXh?= =?iso-8859-1?Q?ogLz2w7b0fxP89RcVCDCLd6M+C6KfNUyoQUQ0H2OI/VAwlRGJ7cPV6Zymg?= =?iso-8859-1?Q?ue2CxidBnRDJaUeZlJStyRSow0Sr22mQys64uQUcl3/zqX+4JrDd1hpPQs?= =?iso-8859-1?Q?GhKTCR6687VhRobBSnNJ21Yx2PrIB43VRlXU3VxcD45bsyrbDJROAUAKQL?= =?iso-8859-1?Q?knGDQoPpNc/FObANVtrCRDZgdweU8jYirl+lJ+/2mrIhhNFiM61YquXea6?= =?iso-8859-1?Q?1SnWd8KI2PcZ965uSMi5C4jkkbTT9n8g25HzgYvYeNaMPED0J9cIYo/c8H?= =?iso-8859-1?Q?VKbG1pnqHat4nRjtoiLC2g/V6/LMLgagdnqcGooUjHA3xQVrQiWJYc5gHJ?= =?iso-8859-1?Q?g63M4Emcilj9M7k+aCwdXMlJ967fN35LDGHck/NuhLmarm0xM4+nJcFKTO?= =?iso-8859-1?Q?tcAH2PJIm/ABgelfp6DLHsl5r45IWSstLOKrSRok97AH+TOlSShyuDtGTo?= =?iso-8859-1?Q?/wJnl0ViZKd65FEmjVMSTGhEsEHwZAnnTdQeJQFhgz7jtION+JxSmq4set?= =?iso-8859-1?Q?zp7AvlDpCZrrpFb76B9dr55VEgPQTQsYVrAlj+GioXL+oS/Xwl/2y8xZju?= =?iso-8859-1?Q?glB8D1fZk+q0yPTEzyou8Y21572hw1cgrj/L5++ftQxiDMaERuvX1CgrJC?= =?iso-8859-1?Q?m2pxk8povKBDCMDesBZv9DEB6EgEpJ7uKr7O6DYI4S890bjve/jVA8RduT?= =?iso-8859-1?Q?UDYgnsfoumlh4bHfZe65OTaOIOpM7L/qz+MBWVkwz7bNvIB6EdZJQUQ1Kq?= =?iso-8859-1?Q?fAsag8vrVb1fk+QAzmwDGX4XWe3SZqdmaXfcKz2F/0FQukBhkwn4wNYSyi?= =?iso-8859-1?Q?3etz6uIJoOwM1Hi0OsjDT7LRAtZ95C6CXA6462OQwbQKRnI5TDc+MvQ2lB?= =?iso-8859-1?Q?0lhYWjwIwZpSaDHdE1ZVvpTKHXyTBrdjF2utQFLbUFkQwoFCwQ1JgcstSZ?= =?iso-8859-1?Q?v+CVneTXw8DafU6f6e8xRbK8DfZf2J8tdYcxMEsERWO3A+eB38/LAKalE5?= =?iso-8859-1?Q?5Jv5ibLeTP+T02zgV4skkvgBSRdINSmjaQAIq01LVMvnQ3jYpCZQLd6Cfd?= =?iso-8859-1?Q?1F+9h2Akai2KVBe0GkGyBi+nTPr/hkb92qlVBo7s2VTkD3CufBcVcATQ?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB8946.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 52d7740d-1116-45fd-8808-08ddc914bae4 X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jul 2025 11:41:40.8165 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: KJ5zuTK7cDi0KJq2OgSrfU2S8ehfspMNI6RUHaRHbPBZHxDw7EB17/gwAbASCuYeZBHXjSzwy6gP5u15wY5jeIIfXQ9ZzSm9U7TXttxF3Ck= X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS2PR03MB10194 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1753184535420116600 Content-Type: text/plain; charset="utf-8" According to the "7.1 Return Codes" section of DEN0028 [1] INVALID_PARAMETER code (-3) is returned when one of the call parameters has a non-supported value. Adding this error code to the common smccc header file. [1]: https://documentation-service.arm.com/static/5f8edaeff86e16515cdbe4c6 Signed-off-by: Oleksii Moisieiev Acked-by: Stefano Stabellini --- xen/arch/arm/include/asm/smccc.h | 1 + 1 file changed, 1 insertion(+) diff --git a/xen/arch/arm/include/asm/smccc.h b/xen/arch/arm/include/asm/sm= ccc.h index a289c48b7f..dc6af94db1 100644 --- a/xen/arch/arm/include/asm/smccc.h +++ b/xen/arch/arm/include/asm/smccc.h @@ -381,6 +381,7 @@ void arm_smccc_1_2_smc(const struct arm_smccc_1_2_regs = *args, 0x3FFF) =20 /* SMCCC error codes */ +#define ARM_SMCCC_INVALID_PARAMETER (-3) #define ARM_SMCCC_NOT_REQUIRED (-2) #define ARM_SMCCC_ERR_UNKNOWN_FUNCTION (-1) #define ARM_SMCCC_NOT_SUPPORTED (-1) --=20 2.34.1 From nobody Thu Oct 30 23:14:03 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1753184525; cv=pass; d=zohomail.com; s=zohoarc; b=kQCOAAQZF3mSq1eHKeNeXfD1wj1amq6qwPEQxnxk/p/eeM4CkKK2ME2FTTMKy1G/zC1NSlrpFLaI77iKHuR0mhMXI/XEzt+CZz2CGnMrP5sxkmG+QyegNQFzKzhMDYZfqHije+fxi9STpBjRGpSidbToK3n9AGnZRic8nw3OPFE= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1753184525; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=s78A2BGWOWtn2IanctdhKkqcCNJK9PnZSUd/GG10AOg=; b=OPEQHHBDJpXYe4jukAFzH6Ec6RMgjzUuXUoQK+WN9yiS8LdBR7u04IsVV363fNUAAW6FbabsuI3bPHi3DGG9+wuXl6TG5+FFYF0cjf02JrrkRv4CEAd7BIweHyBGA6kIwICJlS9cRNR+3UgCalf2X7h3sVF4bHGqxK1fKsDZ9RQ= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1753184525582286.94437371994616; Tue, 22 Jul 2025 04:42:05 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1052283.1420937 (Exim 4.92) (envelope-from ) id 1ueBNW-0003c0-Sr; Tue, 22 Jul 2025 11:41:50 +0000 Received: by outflank-mailman (output) from mailman id 1052283.1420937; Tue, 22 Jul 2025 11:41:50 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNW-0003bn-P1; Tue, 22 Jul 2025 11:41:50 +0000 Received: by outflank-mailman (input) for mailman id 1052283; Tue, 22 Jul 2025 11:41:49 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNV-0002RD-2k for xen-devel@lists.xenproject.org; Tue, 22 Jul 2025 11:41:49 +0000 Received: from AM0PR83CU005.outbound.protection.outlook.com (mail-westeuropeazlp170100001.outbound.protection.outlook.com [2a01:111:f403:c201::1]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id d9642393-66f0-11f0-a31d-13f23c93f187; Tue, 22 Jul 2025 13:41:47 +0200 (CEST) Received: from PAVPR03MB8946.eurprd03.prod.outlook.com (2603:10a6:102:32e::21) by AS2PR03MB10194.eurprd03.prod.outlook.com (2603:10a6:20b:5fc::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8943.30; Tue, 22 Jul 2025 11:41:43 +0000 Received: from PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc]) by PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc%6]) with mapi id 15.20.8943.025; Tue, 22 Jul 2025 11:41:43 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: d9642393-66f0-11f0-a31d-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=srMseTY9wPYSN2xAPV3USh3y9aqIz4bS0fQnb9+H7U77043K/J0nN37HE7hfAy8sU+FNZXTZwS5xDEDKhCaee5KQblnqQtmQcpuWi0ixkPRv7F61MDeXCmd+KTNY24fYCZwhJLg0ETkROjTyMoOI1iCNaXgPGJl0ooKUjiLUC/T2EEgDjZuvC0ZTDmmbV3SjswSSqbdY+DU+rhVJTjBfCbUj9mO5Cf9a4UVXfdvhj69rLrCVMdCdkHjIPhCScznd8+Pt9pD7OhZ8U3oVEV0nfrVMgY2KTFXCz4Qb6sXQZNkRLIvrUniHy3mxOodIVixE3yG4ifBGZLvPOoVBoh3VDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=s78A2BGWOWtn2IanctdhKkqcCNJK9PnZSUd/GG10AOg=; b=Y+UOGyrASIzHDqC8VzzZ4ZeQZ5Qcduil3bggP8YoEfvQePnJBFwH4s7fmpK5qdroF2YrY6OdEeIC3ixDH2WmpMy9Eih/HxyjGtnaSXOJ65F4vr596sZmbxEpduFNhKd05ZOOF+IrR81Le9wA6SusJzpqy+g67j15AJq2ziz81Lnftw7Xoav6E+VtqAaLVZMzMXGuefmK1nmuc80ezXnSVOSNDfzUpd/GnkHihwB4kgjg9JDgTqntw00dKWGagp75xMvu5X5YKvTX+AQKziaXhCfEMbFJXaVX0eW6qKlZWyVtFm0j4AuNGpccaCKB29zFDaYPUIU83HyxmwsPqO61ug== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=s78A2BGWOWtn2IanctdhKkqcCNJK9PnZSUd/GG10AOg=; b=JpmFLpotfau0PXy6S5QTDMtGzgxBXpI6Vo61z9PunE63iHA9ipb2dbf9Njm7G6ic8/JfNwjYgatf35VFiCvVWe0Uo8PENgJ3j8BW1Mn/u+qfP+xd2m8kR2bvjjGpfm3YN4TdGFoE0JeCBGDogMs6hmb8gv+UMdQ0aFDE8uSWfENpRmkaoRyCsYVAlU2iXJmoi36BVv+plz4zuYu8VH6fuOWEWIev8bmV6NXGkTSJFhFy9rM1mTqSui8UNteFd3EBTJnv5V0N5uFGUg1tZBwIvjxG3zC+Vg9BHPz5RK6HNef6CN7F4hJJkksXby8lxuPFTExOu+S7yArgiAPqnoSVgA== From: Oleksii Moisieiev To: "xen-devel@lists.xenproject.org" CC: Andrew Cooper , Anthony PERARD , Bertrand Marquis , Jan Beulich , Juergen Gross , Julien Grall , Michal Orzel , Oleksii Moisieiev , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Stefano Stabellini , Volodymyr Babchuk , Grygorii Strashko Subject: [RFC PATCH v5 08/10] lib/arm: Add I/O memory copy helpers Thread-Topic: [RFC PATCH v5 08/10] lib/arm: Add I/O memory copy helpers Thread-Index: AQHb+v2X+ZrZt2L7gUmcdC6X7zP5Og== Date: Tue, 22 Jul 2025 11:41:41 +0000 Message-ID: <6df9b5bbeae12a74397d72d53c530313f0778025.1753184487.git.oleksii_moisieiev@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB8946:EE_|AS2PR03MB10194:EE_ x-ms-office365-filtering-correlation-id: f4e89cc0-5d3e-4d53-6d06-08ddc914bb0c x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|366016|1800799024|7416014|376014|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?zQvd3liY6+NN39LFEYgaUGjsou0ZYAd0Udz/C+ejfJdo8X/TPa1/vmcwHB?= =?iso-8859-1?Q?y6h+Lo7AAfi6s0oBM23ZQ4vpNqyIZuaWflUhLcO97t0vC8NEDwzXD/a2fc?= =?iso-8859-1?Q?+s6BtswSgUT18Co9Ldr4cuxVzfuuETW2VpUwPJC1J7+MG8NJHMBU3tgQqD?= =?iso-8859-1?Q?NHdd+IWGe/RWB4XEgNorJ0Jv9WPM7PiAC/ntXN3QIThCp7Mm7l6Kr6Tt96?= =?iso-8859-1?Q?Zp6B9mJaRFcjcvSBgnxFSsUmacakqrikKxMaCzpToxdwQsMZIseut7TJm7?= =?iso-8859-1?Q?TaW+lRNG1r0IknWDknp5JjIKsUgduQKLweFtkH2xtgyRVcj3KuMOhDi1Ej?= =?iso-8859-1?Q?39x+FncPKQ48yUTlzk6XU9Q9FtMwj47EVTr/7/5K2nV5NU6+nDokp5FB55?= =?iso-8859-1?Q?A38YqeRo+8w44EhLSrZa1q/dsfuwP/QUeVUapqu4E5YvZGzp4b3TCBuq5P?= =?iso-8859-1?Q?2bNkhvWn6XIIacCCPvdjZ8OrYDmCecZapS5eZyd0uByEMqwwHGh5rZjzq3?= =?iso-8859-1?Q?XaFAxLl0Aa/gKr80ADB9sO0Lqcs8U/Lspkgj6DV4x/4MLNe9jOUO8yrKyy?= =?iso-8859-1?Q?yw+RDOwPYyyCoQteIgbIpttGvSrpUAgFup+AYkkq1Ki/LxjRp0I1neRSNI?= =?iso-8859-1?Q?ViIcnnBu10pJAXTa2gupVVnQh3ksojMhbkpNzi3D7RNn/RsjEYSf5Eqxb7?= =?iso-8859-1?Q?zmPpj/zuksQD9LjviVMKjt3b5lzxY71K4SXjwN5I1iQXq6dNzs3VkShCXt?= =?iso-8859-1?Q?DsTJmlcRjeOGxgmGviT58q2let8MvtqGvFXgZMpBkdutwENyZ9A1LOIQaX?= =?iso-8859-1?Q?DrLqVMlbEHGTHWKV3EdlG1vUUuhbbEFRxByyRAKFzfxCBCZD1Abze78QU0?= =?iso-8859-1?Q?HKOvvb5QbZLZS6PjkeSMb9t0ao+lXn99Zlr2uFNRQphOmt1QUzcg/hJtyT?= =?iso-8859-1?Q?c31+4Vp7D3QCTYPhQ/ibdzuuWYx8lM8cfbDQONi6HoKbDFa5KZqAKO77VV?= =?iso-8859-1?Q?EDdN1eZkURxdU9cvw5izkod9AkjY2dozbTWsOkQwXv4eBxm4fRMGSA7Dgk?= =?iso-8859-1?Q?Gim8GTsnA6cHVLcNtVd/18zGy7SxzN8fNcDmde4XNk1srOLHBtJIjb9vKn?= =?iso-8859-1?Q?NpgCt3r5I5nlttm2t0W3xNHXrQDkOHt/yjXnxue17lZQVrzcmAddOY7mC/?= =?iso-8859-1?Q?AfudKCVhM2E+eED6QiZlXfBFE/5HkKQ0R07xtkcAT7gD0I8F/DLOSYQ3I9?= =?iso-8859-1?Q?clDLh5wniAND8J/lpgr5QboO4J4kDSevpSGfUn64R/enbyn3p7aQxXMyFO?= =?iso-8859-1?Q?MktcOFhN94r5IE1Wo81eqeXOlpHE0xjZkL5uTb+yyy8r9vjkMQunBEdxy8?= =?iso-8859-1?Q?WUTxxZ8H6FZat5vcF9hCERFaY2j5VcXyOzn4XsqykoNIgdnl9BmeNG0kGF?= =?iso-8859-1?Q?MIhFcpcXPCUygalyHH0CveOdQh0HH3HKqBJPitOoIRwwX3WsNJw6Cs/6MK?= =?iso-8859-1?Q?okFpETH8ujGUix7aHzT4kTR+njQSsznTizXoKE5qnY/A=3D=3D?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB8946.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(7416014)(376014)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?h+C4AxIzltK9Z1Jq9m4/wCCImRuUfFX75gqDw6lbw5m6u91Rrfw0bxdv0a?= =?iso-8859-1?Q?0X4l1us35/QHEArFHCO4KL5zJAJbnKbPApL0bghRWXTunvgrh1sH+b5fNt?= =?iso-8859-1?Q?bRhLVfHayakwWOC1eKp94j9IOUZlVBiabJphlrxpedHBr/NaJPLHzAP+Zn?= =?iso-8859-1?Q?bNHY3GAsD0MQnMFOfhlofbPExgvOdw0iscrqKvZTIRUS8FCsNrVvqdXVdK?= =?iso-8859-1?Q?Dkd80pd8/FjAYXIMVpK/tl/FrB3RccTeRjTExXZFYi9dDCB5bIfgvvrhDk?= =?iso-8859-1?Q?Hq8TTz2dO/iFA3MO8l2ZRUqcCqySgGQko6lNN3rDjnXA1tmMAxF3LObM74?= =?iso-8859-1?Q?76D7ql2pg9L3sY0cYcTeexm80n6m0gAKJAO32S1cRuDNmDZD4Gqm/LXb0A?= =?iso-8859-1?Q?kcZDPe9xnBqGAviefPZwF2yQuskClOEZLpKqsjqHpBT/7wm47Ski+pCtIt?= =?iso-8859-1?Q?Quib/GdQt60eVHmGYfneh8DnzNxRCzgNV+AVt+MovRPSmkgy+kexTnVkLu?= =?iso-8859-1?Q?Wh4Owf2VOf0Wlq3jhFd+2WD9cJTZDpSzGJPNfOD61DOCFfx7vSMR+QGODL?= =?iso-8859-1?Q?9CIbf81mYBK6ctENjDtCDCrKIjXSiCFD57r9/6jWXX8nesx/l9FF2kdJu3?= =?iso-8859-1?Q?P8/DNAgghGgFtBsaELt46/OfgwCEWsUDWqu1FSalvpElkwadEHAJunTnGJ?= =?iso-8859-1?Q?eFLP1U/j+eR6RQnZO0yNh0shU9+Dx6hvZHU45yS40LageZcsq95kScN+3x?= =?iso-8859-1?Q?sZt69FiT1jSnHGx1hhTZb7822fE1LNLqCLsaoRfeaXLhuuQ5ubn4Wx7+QU?= =?iso-8859-1?Q?Pp4UVoESU/1inXxom280w7/K9V83yDSCV6Dq+8lbWKcPJxqZ0RI36q4pFP?= =?iso-8859-1?Q?oxwNO6vu/5jYoETxPZGOe/Lw/pVwNj9taMXfJkzlzyoIS3+vXlMoOO75AL?= =?iso-8859-1?Q?aqbVnSa4s8hbhuDMpuHukw/FO8eIFFOTJo/4ohns6pKXUUtQMNIMaLn5XH?= =?iso-8859-1?Q?Mo1ilCpG9dlmNZb6N/QDyiAyYyCSPVPo7Y5CBKAwjJbFX3AyVZx9W10y5l?= =?iso-8859-1?Q?e8vIF6+IWDbsCTPPM95uGUqS7A83fcXn0Kye0c06GKDkodYo0hcMz+YBMw?= =?iso-8859-1?Q?H+CAaX5UuDji/4NdCEQVWePNACfrmU0NaVMHa8e/DjktZaI7rQgRzJEHB/?= =?iso-8859-1?Q?Q4sCmA4ksjg/RH6B/4fmCD4XXuZzFCRBwrLzO77JsZ1BjlyPfcrMxnEQQN?= =?iso-8859-1?Q?BT35/5PF3hBljn270tx0gZZELN/gZRj6mYwpMRqoZGeDRhcx9lZyeJXY3h?= =?iso-8859-1?Q?ZnWfJcvbx7IwYPwVDXFEF4hlxX4kB83NP5ZiUdZJv7xPhEDSBAdtNUMCsl?= =?iso-8859-1?Q?JDZ5IEuqpz3vW9QnCXCYYFjuQ/iwBtaTgDTuuHup7MQsB0zShYf+h56u7G?= =?iso-8859-1?Q?0faHGqhViX00Z73WTEZoqUlZ0b1lRbPWbfjd+pjprkreshRHPDZw9UXMH8?= =?iso-8859-1?Q?aWfDBp83KbB9CMyMfqsv3WQfZUMcfWlwuGBp1X0VcDpbYSokicB6+pd5Wa?= =?iso-8859-1?Q?OZpHUlc+ESuMP9MKRNVXPeklzjaDGO0Gj5tcHpz+lcrHKNzmTKsT7DK53X?= =?iso-8859-1?Q?CkikWp5JtPzhVq/SG14guTtvy0Kn0TwSm6LLE8D85Sgp7oHwkYL0zUfQ?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB8946.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: f4e89cc0-5d3e-4d53-6d06-08ddc914bb0c X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jul 2025 11:41:41.1690 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: yWdqX6V4Wkd975yELDDFwOPSH4+uBJt68S0ZV969hl+zsvzJ6vopBLKrSM1Z0ucBjfUDn3bN9odCRLXjIrsqri7G70F2x8JlnMx8YiDQn7s= X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS2PR03MB10194 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1753184527368116600 Content-Type: text/plain; charset="utf-8" This commit introduces two helper functions, `__memcpy_fromio` and `__memcpy_toio`, to provide a robust mechanism for copying data between standard memory and memory-mapped I/O (MMIO) space for the ARM architecture. These functions are designed to handle memory transfers safely, accounting for potential address alignment issues to ensure correctness and improve performance where possible. The implementation is specific to ARM and uses relaxed I/O accessors. __memcpy_fromio: Copies a block of data from an I/O memory source to a destination in standard ("real") memory. The implementation first handles any unaligned bytes at the beginning of the source buffer individually using byte-wise reads. It then copies the bulk of the data using 32-bit reads for efficiency, and finally processes any remaining bytes at the end of the buffer. __memcpy_toio: Copies a block of data from standard memory to a destination in I/O memory space. It follows a similar strategy, handling any initial unaligned portion of the destination buffer byte-by-byte before using more efficient 32-bit writes for the main, aligned part of the transfer. Any trailing bytes are also handled individually. xen/include/xen/lib/arm/io.h Signed-off-by: Oleksii Moisieiev --- Changes in v5: - move memcpy_toio/fromio to the generic place xen/include/xen/lib/arm/io.h | 15 +++++++ xen/lib/Makefile | 1 + xen/lib/arm/Makefile | 1 + xen/lib/arm/io.c | 80 ++++++++++++++++++++++++++++++++++++ 4 files changed, 97 insertions(+) create mode 100644 xen/include/xen/lib/arm/io.h create mode 100644 xen/lib/arm/Makefile create mode 100644 xen/lib/arm/io.c diff --git a/xen/include/xen/lib/arm/io.h b/xen/include/xen/lib/arm/io.h new file mode 100644 index 0000000000..86973660ba --- /dev/null +++ b/xen/include/xen/lib/arm/io.h @@ -0,0 +1,15 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +#ifndef _XEN_LIB_ARM_IO_H +#define _XEN_LIB_ARM_IO_H + +#include + +/* + * Prototypes for I/O memory access functions. + */ +extern void __memcpy_fromio(void *to, const volatile void __iomem *from, + size_t count); +extern void __memcpy_toio(volatile void __iomem *to, const void *from, + size_t count); + +#endif /* _XEN_LIB_ARM_IO_H */ diff --git a/xen/lib/Makefile b/xen/lib/Makefile index 5ccb1e5241..efa8157a72 100644 --- a/xen/lib/Makefile +++ b/xen/lib/Makefile @@ -1,4 +1,5 @@ obj-$(CONFIG_X86) +=3D x86/ +obj-$(CONFIG_ARM) +=3D arm/ =20 lib-y +=3D bsearch.o lib-y +=3D ctors.o diff --git a/xen/lib/arm/Makefile b/xen/lib/arm/Makefile new file mode 100644 index 0000000000..87250b3822 --- /dev/null +++ b/xen/lib/arm/Makefile @@ -0,0 +1 @@ +obj-y +=3D io.o \ No newline at end of file diff --git a/xen/lib/arm/io.c b/xen/lib/arm/io.c new file mode 100644 index 0000000000..d267bd28e4 --- /dev/null +++ b/xen/lib/arm/io.c @@ -0,0 +1,80 @@ +#include +#include + +/* + * memcpy_fromio - Copy data from IO memory space to "real" memory space. + * @to: Where to copy to + * @from: Where to copy from + * @count: The size of the area. + */ +void __memcpy_fromio(void *to, const volatile void __iomem *from, + size_t count) +{ + while ( count && !IS_ALIGNED((unsigned long)from, 4) ) + { + *(u8 *)to =3D readb_relaxed(from); + from++; + to++; + count--; + } + + while ( count >=3D 4 ) + { + *(u32 *)to =3D readl_relaxed(from); + from +=3D 4; + to +=3D 4; + count -=3D 4; + } + + while ( count ) + { + *(u8 *)to =3D readb_relaxed(from); + from++; + to++; + count--; + } +} + +/* + * memcpy_toio - Copy data from "real" memory space to IO memory space. + * @to: Where to copy to + * @from: Where to copy from + * @count: The size of the area. + */ +void __memcpy_toio(volatile void __iomem *to, const void *from, + size_t count) +{ + while ( count && !IS_ALIGNED((unsigned long)to, 4) ) + { + writeb_relaxed(*(u8 *)from, to); + from++; + to++; + count--; + } + + while ( count >=3D 4 ) + { + writel_relaxed(*(u32 *)from, to); + from +=3D 4; + to +=3D 4; + count -=3D 4; + } + + while ( count ) + { + writeb_relaxed(*(u8 *)from, to); + from++; + to++; + count--; + } +} + +/* + * Local variables: + * mode: C + * c-file-style: "BSD" + * c-basic-offset: 8 + * tab-width: 8 + * indent-tabs-mode: t + * End: + */ --=20 2.34.1 From nobody Thu Oct 30 23:14:03 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1753184531; cv=pass; d=zohomail.com; s=zohoarc; b=VkgKkVJIpw3Ui29seq0Lng6OWLYLWB+w7GzUXGj8lcYXNfH63xYOPnPxnNcspG5haMC0V2cbmS2za0Rg8R+4FH7DEqeh/4bEYP11RftsyERzdB53eyH3cHl0Hi2uuyO26hAxQq12wDnNWnq8hosYwJgsecr/o7wfp9Ln9iBJT+w= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1753184531; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=vT2nggWQ7GnemOjtj8KZXvOXeClpfSlSt341uw+14xg=; b=Y6OEHHcyRUO0y26mAdkycUujQRJ8QhXQzKJUux/vXuM6/3Vx25TjqNK4HiJcY49alp4vUQrJWzfG6shd+a2sRFvNiVv/oJlTNW1m0wXipwe/cIHvYZfhAWDbXoU5aESM0VPSgliwsyPIC2Qf2NEk4d9pR8Ybwd1nHJELKlCtcf4= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1753184531885225.62617544485204; Tue, 22 Jul 2025 04:42:11 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1052285.1420956 (Exim 4.92) (envelope-from ) id 1ueBNZ-00048N-Mi; Tue, 22 Jul 2025 11:41:53 +0000 Received: by outflank-mailman (output) from mailman id 1052285.1420956; Tue, 22 Jul 2025 11:41:53 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNZ-000488-IY; Tue, 22 Jul 2025 11:41:53 +0000 Received: by outflank-mailman (input) for mailman id 1052285; Tue, 22 Jul 2025 11:41:52 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNX-0002RD-T2 for xen-devel@lists.xenproject.org; Tue, 22 Jul 2025 11:41:52 +0000 Received: from AM0PR83CU005.outbound.protection.outlook.com (mail-westeuropeazlp170100001.outbound.protection.outlook.com [2a01:111:f403:c201::1]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id daed6bc6-66f0-11f0-a31d-13f23c93f187; Tue, 22 Jul 2025 13:41:50 +0200 (CEST) Received: from PAVPR03MB8946.eurprd03.prod.outlook.com (2603:10a6:102:32e::21) by AS2PR03MB10194.eurprd03.prod.outlook.com (2603:10a6:20b:5fc::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8943.30; Tue, 22 Jul 2025 11:41:43 +0000 Received: from PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc]) by PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc%6]) with mapi id 15.20.8943.025; Tue, 22 Jul 2025 11:41:43 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: daed6bc6-66f0-11f0-a31d-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=fktc98fAsrYZ4zzGevkd6hPFaLY9c4TFCeitjWRxkrnJCD++DSi8uyZA77WD8Ei4tGGReszib15yO5TRv1uA/h8WBe0y89ljdBmClVK06fXYOLtIOXC+4JoNRrZTLAEgwgsQltbLOuLwQpy+Hdu3moJctZ1EkikNJePrWt6ClGGmZFBvwphGrdMaTYgkn/pmYdoIr+L0To+QKPpo7oCbZEOG5Gi2ygHTiMH060EndSOBVETt70AUsArVSDWtKo/JRSMM7edGtbFMPMz1+XWckNKl7Alq9vpCgbeLC24qxf6TlR6v8/e1j/nt3mg9QsJQT+Mq3RhYN6nOkhKLK/rZ1Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=vT2nggWQ7GnemOjtj8KZXvOXeClpfSlSt341uw+14xg=; b=tu2s5K0nB4Pzy2BiLX/fZ0U6/si+rJVuVbj2CJz/HiYPDm7wIrt/PWKhUKrQ7cCB36inxQQbFIsQimctZ+CtA29w+Wfu16xerfgWDJCIdWgDYJSj3P0AmgxToFerRuVjMTR7qTky2Ozyb7E3KzlGJ1a52JRG9RrMz7x1RJk5HVaAkS/SGCzCx0R8y52pL7Ja/ip8vmc0wHr+1ULN3epGIUcUdgRNKNoOL57ai1v/3B03BOUzTq2rZAMEJT2zICeRSo4CzPYQk8JcZTyiFyS/HevCWGAkLMLpM73kX/FaMvB8KOzetxPep5ivskKhiTIBxXftmjybhZyd3YBhgPqy2g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vT2nggWQ7GnemOjtj8KZXvOXeClpfSlSt341uw+14xg=; b=VUi/7ftGGZSDk4Hom8OTzARLUYqPiproEwNQZpsNTkHKERc3ieE0nExeynLejA1mbBTVk7APW7drmIh/k3t+fUOLhn2OIuO5OkGxStv8evTwnLEtmtkJnZnA8h7/OA0EGsszPMhkRfxULpP/cDu7OUhavgjgIOMcZV4OotyBiVef+fJRV3YPnfslcrZ3tGs9oN+rXWHVbN5G7Zc8go8rws41o/SD4d+9EE82yPNfF5rHay3p9YQoKiG6WAA03cqSo4Plz+Cy8yQByWuR2+jvMFlz/a1VM7WlxR3s3uEEnjwbJd1PSoHUBOYtYbjIqTej8WM+AOyu/bFxdYhqR9PCHg== From: Oleksii Moisieiev To: "xen-devel@lists.xenproject.org" CC: Andrew Cooper , Anthony PERARD , Bertrand Marquis , Jan Beulich , Juergen Gross , Julien Grall , Michal Orzel , Oleksii Moisieiev , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Stefano Stabellini , Volodymyr Babchuk , Grygorii Strashko Subject: [RFC PATCH v5 09/10] xen/arm: scmi: introduce SCI SCMI SMC multi-agent driver Thread-Topic: [RFC PATCH v5 09/10] xen/arm: scmi: introduce SCI SCMI SMC multi-agent driver Thread-Index: AQHb+v2XoctYc1zYUEiXzsOLhr7ZXg== Date: Tue, 22 Jul 2025 11:41:41 +0000 Message-ID: <9f4a137980a0ee72f0f03d55176ca178c4b90126.1753184487.git.oleksii_moisieiev@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB8946:EE_|AS2PR03MB10194:EE_ x-ms-office365-filtering-correlation-id: 5499e9cd-583b-46f7-4710-08ddc914bb49 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|366016|1800799024|7416014|376014|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?SJGyR4SAE7foq2teycdMC9UUr63joqgRBSUe3EdEJblrjziD5t8o9LmNwI?= =?iso-8859-1?Q?ae2dK0OxP6asQdIXju1n6GSU3mUSuuGG+GqB/zNvFcLrOzUokCThvuXfkL?= =?iso-8859-1?Q?0It/Uyiep7V9ZHpxf0NI88KoApH246GljaYOBHzF02C78qZxXcbeIg1hhr?= =?iso-8859-1?Q?epSdOnP8tUCL1wjAmZY0TmRkYBmJ76438uMJ8qELxpmpC69C5Xh5DkRJCl?= =?iso-8859-1?Q?TZxFUeRex3FTI4mzXIQp7DdGoZ3GbbjbeWpZOw0hs52f39kuZbAyTqGGOb?= =?iso-8859-1?Q?uG+5o861gWuaJeacZcDnBjhkR+DPCKgKLQ52fusssPv6PB+Md1Fbp+SYRg?= =?iso-8859-1?Q?nsu8WP8b/Ph3g2r/BD8N5TXWOnug42MpEneAW9ycgI26X3eRV8EZ2Zh4oT?= =?iso-8859-1?Q?JE3bHdOeoGv5oOAdPrHuk3ZAcLkAu4DPM66dGM0ILOrL6ym7/0pqSp2anp?= =?iso-8859-1?Q?VZbp1qpoS8OaxQn4EUNk/izaW/Yt6UfzMyexpjCj+UV8tVKmvDga/wa7Af?= =?iso-8859-1?Q?hvXMKeGmdzx9Nhaky7ZZEUsxal8v3JT60YXrKoExshDoXDpPv2fbhqDHdg?= =?iso-8859-1?Q?KCkfNKNI0axCTDa0UILIyy2gDaY6LoDIUJnawgh4U2VgxUQi6D0rYGSBp/?= =?iso-8859-1?Q?8H1qnvReyuipAmT7osh7L5smWc0J92vGb13f/RqFhPg18nw02VzdB9DmVX?= =?iso-8859-1?Q?YhH7aFZT1zfgIRKD7T/KEfhpq6kISZxkO/ColDEY9wSftiein98a0BbQyj?= =?iso-8859-1?Q?8BpAprObGmuBdIKuws8YBDzl7Q8EW8ZHHDcgDjXUzQJ9BTh3XOmSvrvJ+K?= =?iso-8859-1?Q?X2hJkmZsh1GBk5KmUJCl/x87Rmb6lIxraZmf43RCjCQFoojQNJjDhNzqP/?= =?iso-8859-1?Q?8i/huGDN18U0IuZ9pJjjMB9Zm+syP3sVxTS7g+isD/kk1tc5FIRWAazA/n?= =?iso-8859-1?Q?sygkvzXmpYYHaE31qb2aq2a4mlHOP37ln+VtqLBuWpHo+PTFzxqYp/HHzj?= =?iso-8859-1?Q?WZms73c1Z777+0/VS63WmO2+8agsPqqPT21aK5S51Be53sl1PdBja/TfXt?= =?iso-8859-1?Q?DJkWMdDSXiktXgRWj/zpFl1Rww/sg5vrdNGrMw6G9t2fF1mCSWZ4Hj4C2B?= =?iso-8859-1?Q?dMKPpua3vc7Rdy/7R3ekfB7k2xtdySGFRpl+3e1KscOp4heIVcy11yrp2f?= =?iso-8859-1?Q?Wpbz3/7jUso0iQmLSqkxkhIRDuJ2vL2sFf14a4Eb1jT8hnXosjw9jNuwkL?= =?iso-8859-1?Q?S+5VW2JR6jUleTl5QXc38GegdpnjuQ+XFh9H/yQ6exKqw+d07AFq9+nzPb?= =?iso-8859-1?Q?UhxEInonM3gONWTtpc+9xYM9Rb42Z7vYRv2bhGGMzkq0IIFx8Geo+1V2pk?= =?iso-8859-1?Q?69Qn2MzHevuH6dTa2vhakjpt31VIgq4+VZTO0nUNM9+umXD0VFCIfZE+ij?= =?iso-8859-1?Q?fyluS0ccS5SeJtLb21ETfYlcGfwh/efqjHoQGIR/M2WdZ7xteyMw2DhYTt?= =?iso-8859-1?Q?U=3D?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB8946.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(7416014)(376014)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?GI8P8GJg0+/79WI8TpfnfoLjGfUYP5j2+9uTrzwvl7rDD17CURxvJI53ty?= =?iso-8859-1?Q?cLxH+D8GAzTFVmjk/2U4yp87uCbfwm1H63zqEFFqVtUBAcm+kml4v9OP4u?= =?iso-8859-1?Q?QXJ2DEKQ4kCYnhMeRuUXhfJ0g/fZaFhZECNwZ7KaTMpjZK4CtOwrPaiJ3Y?= =?iso-8859-1?Q?zTRNjJJCnzXUtcFgweSRprZNVJMhvmJV2znY22fEcvjsPRRfohl3jJHcm5?= =?iso-8859-1?Q?LATcPw8TESmcY+/AAyrxJQ39SkdJtRRqmguHz59WWAPyHOKR5lvrxPfQNb?= =?iso-8859-1?Q?tXHndug3I1kduVgxEbeEMHpoARPGOBaNFWPezn/BKbM1ymI7r1VObf4zeL?= =?iso-8859-1?Q?BlYC9/OWTr715WFQqmQU1LsCEGGjQj4Ym14srmoFgvZMvs5gLrQBCXuVd0?= =?iso-8859-1?Q?jzSSDb893dALTqjxAdyPHQnxQRdz6G719wFfoibTZca9h0dZoDYtNAAH38?= =?iso-8859-1?Q?IRpyjNedhL/CTwOgX19PaVGWc34Da4LZGkK374RexIzHkUnN2lWCTQwyPN?= =?iso-8859-1?Q?u5StylQ7yj+B4MeKNR5iLUfRZouRr6loiEJ6/rveeVP6j9mK7OkK1IfCPO?= =?iso-8859-1?Q?1hbOh08lqJ46XkPbjcczDKoAhit1M+7tCnBDeB2CXKKlVL7nmH6T3MvtIZ?= =?iso-8859-1?Q?8Sbe0zxqJqUTVCa7mWopoTlYQQR4jDZgEtqJk+t7oW3574lf0stbHeBG4+?= =?iso-8859-1?Q?NFeqO+MNzGtPQCRYA+xlBHRk8uL6lYkJ1s859FyRgxo5iK3perL0RJUs37?= =?iso-8859-1?Q?H65dzRBCldoE8fUMdUsF7r+7mV5BdmFtU9IfM/D19aezZMg7Czayyq2JcJ?= =?iso-8859-1?Q?oOgm9qyvdsy/exC8MuztuQ1+6akt8RpOID7Bgqj+WG/PhWN4pcYgZGgIec?= =?iso-8859-1?Q?N3NEHB0wF5oP5eHDR94KjHOYEZ31JNepUZUq+RIKTQJPRx9i9frPrSBXjQ?= =?iso-8859-1?Q?Wn49qG6YF/nLhmFS41rN/mBdlTn8MVHL1ijzGPaKjkuMjNSehAHITxBwig?= =?iso-8859-1?Q?KX21sgDF0jt91I4dmlZo7Qyub/AJGtEjie3YVrUd2tyZvb8ues1oLxa5Jr?= =?iso-8859-1?Q?qcamNn+INM4KxEatlwFNTE5CMVFo1edrMEjyDJIt5+Vo6N9QU6FjGBehDA?= =?iso-8859-1?Q?G/0ldU48qZZMyCZzK97gCwlAlZoOI7lAhuRXl+dC7v/29ee5BIFjM/WLTZ?= =?iso-8859-1?Q?Yo+Fletq0usKaCaQvBCHQ3uoTWkhzn+8Zt1LHWVWLTh63J3i6s8oJexlMh?= =?iso-8859-1?Q?huT+ADvO7rGXMySet07u8zLfTWjamkUHAJ+quL8hcYLlMA/08LRSN8jLMl?= =?iso-8859-1?Q?ycJH0Xmcl3w8V9tQpVzPWl0purugScbimUlzHC6Si0hyWDapFDCETRKhEF?= =?iso-8859-1?Q?CeqQfffi49bX5nw59p0icTIXGz57qGljCFxybq2ubjc0uMBx7EHJIzxTOf?= =?iso-8859-1?Q?puqs5S7167YW4Qf4oHFYJIsFBd71BLR6FafREcu76bbDhuOvBFvjQ41880?= =?iso-8859-1?Q?VL7sh+VOWCTZGPo/TnKoUA3DE6xjMYXb3gISfzkUXSOguenPhp+3meXVS0?= =?iso-8859-1?Q?E2tUkS2I+NUEEV1m3rRxmGZ2+xXK7WSgGpNqDS9FQ2914VyDmTBwDlLbOG?= =?iso-8859-1?Q?qC0iP67oczhZ/XYia5aSI7vGQa/1T3f9Zz4zdNyuTt/+mYO0OZlN5N5w?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB8946.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 5499e9cd-583b-46f7-4710-08ddc914bb49 X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jul 2025 11:41:41.8716 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: KlFjXUarMPwmH1h2F3Q3w3MjJEpAe8AYTk+OpjvdkVzYNe9Ba4I8p3GlX+SdjLa7GqA2eMSAncbkAFwqX/BdbURxH4XVTzgngXWoevruBxo= X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS2PR03MB10194 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1753184533449116600 Content-Type: text/plain; charset="utf-8" This patch introduces SCI driver to support for ARM EL3 Trusted Firmware-A (TF-A) which provides SCMI interface with multi-agnet support, as shown below. +-----------------------------------------+ | | | EL3 TF-A SCMI | +-------+--+-------+--+-------+--+-------++ |shmem1 | |shmem0 | |shmem2 | |shmemX | +-----+-+ +---+---+ +--+----+ +---+---+ smc-id1 | | | | agent1 | | | | +-----v--------+---------+-----------+----+ | | | | | | | | | | +--------------+---------+-----------+----+ smc-id0 | smc-id2| smc-idX| agent0 | agent2 | agentX | | | | +----v---+ +--v-----+ +--v-----+ | | | | | | | Dom0 | | Dom1 | | DomX | | | | | | | | | | | | | +--------+ +--------+ +--------+ The EL3 SCMI multi-agent firmware expected to provide SCMI SMC/HVC shared memory transport for every Agent in the system. The SCMI Agent transport channel defined by pair: - smc-id: SMC/HVC id used for Doorbell - shmem: shared memory for messages transfer, Xen page aligned. Shared memort is mapped with the following flags: MT_DEVICE_nGnRE. The follwoing SCMI Agents expected to be defined by SCMI FW to enable SCMI multi-agent functionality under Xen: - Xen manegement agent: trusted agents that accesses to the Base Protocol commands to configure agent specific permissions - OSPM VM agents: non-trusted agent, one for each Guest domain which is allowed direct HW access. At least one OSPM VM agent has to be provided by FW if HW is handled only by Dom0 or Driver Domain. The EL3 SCMI FW expected to implement following Base protocol messages: - BASE_DISCOVER_AGENT (optional if agent_id was provided) - BASE_RESET_AGENT_CONFIGURATION (optional) - BASE_SET_DEVICE_PERMISSIONS (optional) The SCI SCMI SMC multi-agent driver implements following functionality: - The driver is initialized based on the ``xen,config`` node under ``chosen= `` (only one SCMI interface is supported), which describes the Xen management agent SCMI interface. scmi_shm_1: sram@47ff1000 { compatible =3D "arm,scmi-shmem"; reg =3D <0x0 0x47ff1000 0x0 0x1000>; }; scmi_xen: scmi { compatible =3D "arm,scmi-smc"; arm,smc-id =3D <0x82000003>; <--- Xen manegement agent smc-id #address-cells =3D < 1>; #size-cells =3D < 0>; #access-controller-cells =3D < 1>; shmem =3D <&scmi_shm_1>; <--- Xen manegement agent shmem }; - The driver obtains Xen specific SCMI Agent's configuration from the Host = DT, probes Agents and builds SCMI Agents list. The Agents configuration is taken from "scmi-sec= ondary-agents" property where first item is "arm,smc-id", second - "arm,scmi-shmem" phan= dle and third is optional "agent_id": chosen { ranges; xen,config { ranges; scmi-secondary-agents =3D < 0x82000003 &scmi_shm_0 0 0x82000004 &scmi_shm_2 2 0x82000005 &scmi_shm_3 3 0x82000006 &scmi_shm_4 4>; #scmi-secondary-agents-cells =3D <3>; <--- optional, default 3 scmi_shm_0 : sram@47ff0000 { compatible =3D "arm,scmi-shmem"; reg =3D <0x0 0x47ff0000 0x0 0x1000>; }; scmi_shm_2: sram@47ff2000 { compatible =3D "arm,scmi-shmem"; reg =3D <0x0 0x47ff2000 0x0 0x1000>; }; scmi_shm_3: sram@47ff3000 { compatible =3D "arm,scmi-shmem"; reg =3D <0x0 0x47ff3000 0x0 0x1000>; }; scmi_shm_4: sram@47ff4000 { compatible =3D "arm,scmi-shmem"; reg =3D <0x0 0x47ff4000 0x0 0x1000>; }; // Xen SCMI management channel scmi_shm_1: sram@47ff1000 { compatible =3D "arm,scmi-shmem"; reg =3D <0x0 0x47ff1000 0x0 0x1000>; }; scmi_xen: scmi { compatible =3D "arm,scmi-smc"; arm,smc-id =3D <0x82000002>; <--- Xen manegement agent smc-id #address-cells =3D < 1>; #size-cells =3D < 0>; #access-controller-cells =3D < 1>; shmem =3D <&scmi_shm_1>; <--- Xen manegement agent shmem }; }; }; /{ // Host SCMI OSPM channel - provided to the Dom0 as is if SCMI enabled = for it scmi_shm: sram@47ff0000 { compatible =3D "arm,scmi-shmem"; reg =3D <0x0 0x47ff0000 0x0 0x1000>; }; firmware { scmi: scmi { compatible =3D "arm,scmi-smc"; arm,smc-id =3D <0x82000002>; <--- Host OSPM agent smc-id #address-cells =3D < 1>; #size-cells =3D < 0>; shmem =3D <&scmi_shm>; <--- Host OSPM agent shmem protocol@X{ }; }; }; }; This approach allows defining multiple SCMI Agents by adding Xen-specific p= roperties under the ``/chosen`` node to the Host Device Tree, leaving the main part unchang= ed. The Host DT SCMI channel will be passed to Dom0. The Xen management agent is described as a ``scmi_xen`` node under the ``/c= hosen`` node, which is used by Xen to control other SCMI Agents in the system. All secondary agents' configurations are provided in the ``scmi-secondary-a= gents`` property with an optional ``agent_id`` field. The ``agent_id`` from the ``scmi-secondary-agents`` property is used to ide= ntify the agent in the system and can be omitted by setting ``#scmi-secondary-agents-cells =3D <2>= ``, so the Secondary Agents configuration will look like this: chosen { xen,config { scmi-secondary-agents =3D < 0x82000003 &scmi_shm_0 0x82000004 &scmi_shm_2 0x82000005 &scmi_shm_3 0x82000006 &scmi_shm_4>; #scmi-secondary-agents-cells =3D <2>; }; } In this case, Xen will use the ``SCMI_BASE_DISCOVER_AGENT`` call to discove= r the ``agent_id`` for each secondary agent. Providing the ``agent_id`` in the ``scmi-secondar= y-agents`` property allows skipping the discovery call, which is useful when the secondary agen= t's shared memory is not accessible by Xen or when boot time is important because it allows skip= ping the agent discovery procedure. Note that Xen is the only one entry in the system which need to know about SCMI multi-agent support. - It implements the SCI subsystem interface required for configuring and enabling SCMI functionality for Dom0/hwdom and Guest domains. To enable SCMI functionality for domain it has to be configured with unique supported SCMI Agent_id and use corresponding SCMI SMC/HVC shared memory transport [smc-id, shmem] defined for this SCMI Agent_id. - Once Xen domain is configured it can communicate with EL3 SCMI FW: -- zero-copy, the guest domain puts SCMI message in shmem; -- the guest triggers SMC/HVC exception with smc-id (doorbell); -- the Xen driver catches exception, do checks and synchronously forwards it to EL3 FW. - the Xen driver sends BASE_RESET_AGENT_CONFIGURATION message to Xen management agent channel on domain destroy event. This allows to reset resources used by domain and so implement use-case like domain reboot. Dom0 Enable SCMI SMC: - pass dom0_scmi_agent_id=3D in Xen command line. if not provided SCMI will be disabled for Dom0 and all SCMI nodes removed from Dom0 DT. The driver updates Dom0 DT SCMI node "arm,smc-id" value and fix up shmem node according to assigned agent_id. Guest domains enable SCMI SMC: - xl.cfg: add configuration option as below arm_sci =3D "type=3Dscmi_smc_multiagent,agent_id=3D2" - xl.cfg: enable access to the "arm,scmi-shmem" which should correspond as= signed agent_id for the domain, for example: iomem =3D [ "47ff2,1@22001", ] - DT: add SCMI nodes to the Driver domain partial device tree as in the below example. The "arm,smc-id" should correspond assigned agent_id for th= e domain: passthrough { scmi_shm_0: sram@22001000 { compatible =3D "arm,scmi-shmem"; reg =3D <0x0 0x22001000 0x0 0x1000>; }; firmware { compatible =3D "simple-bus"; scmi: scmi { compatible =3D "arm,scmi-smc"; arm,smc-id =3D <0x82000004>; shmem =3D <&scmi_shm_0>; ... } } } SCMI "4.2.1.1 Device specific access control" The XEN SCI SCMI SMC multi-agent driver performs "access-controller" provid= er function in case EL3 SCMI FW implements SCMI "4.2.1.1 Device specific access control= " and provides the BASE_SET_DEVICE_PERMISSIONS command to configure the devices that an agents= have access to. The DT SCMI node should "#access-controller-cells=3D<1>" property and DT de= vices should be bound to the Xen SCMI. &i2c1 { access-controllers =3D <&scmi 0>; }; The Dom0 and dom0less domains DT devices will be processed automatically th= rough sci_assign_dt_device() call, but to assign SCMI devices from toolstack the = xl.cfg:"dtdev" property shell be used: dtdev =3D [ "/soc/i2c@e6508000", ] xl.cfg:dtdev will contain all nodes which are under SCMI management (not on= ly those which are behind IOMMU). [1] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/= tree/Documentation/devicetree/bindings/firmware/arm,scmi.yaml [2] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/= tree/Documentation/devicetree/bindings/access-controllers/access-controller= s.yaml Signed-off-by: Oleksii Moisieiev Signed-off-by: Grygorii Strashko Acked-by: Anthony PERARD # tools --- Changes in v5: - fix device-tree example format in booting.txt, added ";" after "}". - update define in scmi-proto.h - update define in scmi-shmem.h file - scmi_assign_device - do not ignore -EOPNOTSUPP return code of the do_smc_xfer - remove overwriting agent_channel->agent_id after SCMI_BASE_DISCOVER_AGENT call - add multi-agent files to the MAINTAINERS - add SCMI multi-agent description to the SUPPORT.md - handle ARM_SMCCC_INVALID_PARAMETER return code and return -EINVAL for smc call - updated collect_agents function. Set agent_id parameter as optional in scmi-secondary-agents device-tree property - introduce "#scmi-secondary-agents-cells" parameter to set if agent_id was provided - reanme xen,scmi-secondary-agents property to scmi-secondary-agents - move memcpu_toio/fromio for the generic place - update Xen to get management channel from /chosen/xen,config node - get hypervisor channnel from node instead of using hardcoded - update handling scmi and shmem nodes for the domain - Set multi-agent driver to support only Arm64 Changes in v4: - toolstack comments from Anthony PERARD - added dom0less support - added doc for "xen,scmi-secondary-agents" MAINTAINERS | 4 + SUPPORT.md | 11 + docs/man/xl.cfg.5.pod.in | 13 + docs/misc/arm/device-tree/booting.txt | 88 +++ docs/misc/xen-command-line.pandoc | 9 + tools/libs/light/libxl_arm.c | 4 + tools/libs/light/libxl_types.idl | 4 +- tools/xl/xl_parse.c | 12 + xen/arch/arm/dom0less-build.c | 11 + xen/arch/arm/domain_build.c | 3 +- xen/arch/arm/firmware/Kconfig | 12 + xen/arch/arm/firmware/Makefile | 1 + xen/arch/arm/firmware/scmi-proto.h | 164 ++++ xen/arch/arm/firmware/scmi-shmem.c | 112 +++ xen/arch/arm/firmware/scmi-shmem.h | 45 ++ xen/arch/arm/firmware/scmi-smc-multiagent.c | 803 ++++++++++++++++++++ xen/include/public/arch-arm.h | 3 + 17 files changed, 1297 insertions(+), 2 deletions(-) create mode 100644 xen/arch/arm/firmware/scmi-proto.h create mode 100644 xen/arch/arm/firmware/scmi-shmem.c create mode 100644 xen/arch/arm/firmware/scmi-shmem.h create mode 100644 xen/arch/arm/firmware/scmi-smc-multiagent.c diff --git a/MAINTAINERS b/MAINTAINERS index 31dbba54bb..1b6b58cbb7 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -514,6 +514,10 @@ R: Oleksii Moisieiev S: Supported F: xen/arch/arm/firmware/sci.c F: xen/arch/arm/include/asm/firmware/sci.h +F: xen/arch/arm/firmware/scmi-smc-multiagent.c +F: xen/arch/arm/firmware/scmi-shmem.c +F: xen/arch/arm/firmware/scmi-shmem.h +F: xen/arch/arm/firmware/scmi-proto.h =20 SEABIOS UPSTREAM M: Wei Liu diff --git a/SUPPORT.md b/SUPPORT.md index 6a82a92189..9d7857d953 100644 --- a/SUPPORT.md +++ b/SUPPORT.md @@ -956,6 +956,17 @@ by hwdom. Some platforms use SCMI for access to system= -level resources. =20 Status: Supported =20 +### Arm: SCMI SMC multi-agent support + +Enable support for the multi-agent configuration of the EL3 Firmware, which +allows Xen to provide an SCMI interface to the Domains. +Xen manages access permissions to the HW resources and provides an SCMI in= terface +to the Domains. Each Domain is represented as a separate Agent, which can +communicate with EL3 Firmware using a dedicated shared memory region, and +notifications are passed through by Xen. + + Status, ARM64: Tech Preview + ### ARM: Guest PSCI support =20 Emulated PSCI interface exposed to guests. We support all mandatory diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in index 8f1a203e21..f6cf2d4567 100644 --- a/docs/man/xl.cfg.5.pod.in +++ b/docs/man/xl.cfg.5.pod.in @@ -3103,8 +3103,21 @@ single SCMI OSPM agent support. Should be used together with B Xen command line option. =20 +=3Ditem B + +Enables ARM SCMI SMC multi-agent support for the guest by enabling SCMI ov= er +SMC calls forwarding from domain to the EL3 firmware (like Trusted Firmwar= e-A) +with a multi SCMI OSPM agent support. The SCMI B should be +specified for the guest. + =3Dback =20 +=3Ditem B + +Specifies a non-zero ARM SCI agent id for the guest. This option is mandat= ory +if the SCMI SMC support is enabled for the guest. The agent ids of domains +existing on a single host must be unique and in the range [1..255]. + =3Dback =20 =3Dback diff --git a/docs/misc/arm/device-tree/booting.txt b/docs/misc/arm/device-t= ree/booting.txt index 8ea11c1551..10a99cfd15 100644 --- a/docs/misc/arm/device-tree/booting.txt +++ b/docs/misc/arm/device-tree/booting.txt @@ -322,6 +322,20 @@ with the following properties: Should be used together with scmi_smc_passthrough Xen command line option. =20 + - "scmi_smc_multiagent" + + Enables ARM SCMI SMC multi-agent support for the guest by enabling SCM= I over + SMC calls forwarding from domain to the EL3 firmware (like ARM + Trusted Firmware-A) with a multi SCMI OSPM agent support. + The SCMI agent_id should be specified for the guest with "xen,sci_agen= t_id" + property. + +- "xen,sci_agent_id" + + Specifies a non-zero ARM SCI agent id for the guest. This option is + mandatory if the SCMI SMC "scmi_smc_multiagent" support is enabled for + the guest. The agent ids of guest must be unique and in the range [1..= 255]. + Under the "xen,domain" compatible node, one or more sub-nodes are present for the DomU kernel and ramdisk. =20 @@ -824,3 +838,77 @@ The automatically allocated static shared memory will = get mapped at 0x80000000 in DomU1 guest physical address space, and at 0x90000000 in Dom= U2 guest physical address space. DomU1 is explicitly defined as the owner dom= ain, and DomU2 is the borrower domain. + +SCMI SMC multi-agent support +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D + +For enabling the ARM SCMI SMC multi-agent support (enabled by CONFIG_SCMI_= SMC_MA) +the Xen specific SCMI Agent's configuration shell be provided in the Host = DT +according to the SCMI compliant EL3 Firmware specification with +ARM SMC/HVC transport using property "scmi-secondary-agents" placed in "xe= n,config" +node under "chosen" node: + +- scmi-secondary-agents + + Defines a set of SCMI agents configuration supported by SCMI EL3 FW and + available for Xen. Each Agent defined as triple consisting of: + SMC/HVC function_id assigned for the agent transport ("arm,smc-id"), + phandle to SCMI SHM assigned for the agent transport ("arm,scmi-shmem"= ), + SCMI agent_id (optional) if not set - Xen will determine Agent ID for + each provided channel using BASE_DISCOVER_AGENT message. + +As an example: + +/{ +chosen { + xen,config { + scmi_shm_1: sram@47ff1000 { + compatible =3D "arm,scmi-shmem"; + reg =3D <0x0 0x47ff1000 0x0 0x1000>; + }; + scmi_shm_2: sram@47ff2000 { + compatible =3D "arm,scmi-shmem"; + reg =3D <0x0 0x47ff2000 0x0 0x1000>; + }; + scmi_shm_3: sram@47ff3000 { + compatible =3D "arm,scmi-shmem"; + reg =3D <0x0 0x47ff3000 0x0 0x1000>; + }; + scmi_shm_3: sram@47ff4000 { + compatible =3D "arm,scmi-shmem"; + reg =3D <0x0 0x47ff4000 0x0 0x1000>; + }; + scmi-secondary-agents =3D < + 0x82000003 &scmi_shm_1 1 + 0x82000004 &scmi_shm_2 2 + 0x82000005 &scmi_shm_3 3 + 0x82000006 &scmi_shm_4 4>; + #scmi-secondary-agents-cells =3D <3>; + }; + }; +}; + +- #scmi-secondary-agents-cells + + Defines whether Agent_id is set in the "scmi-secondary-agents" propert= y. + Possible values are: 2, 3. + When set to 3 (the default), expect agent_id to be present in the seco= ndary + agents list. + When set to 2, agent_id will be discovered for each channel using + BASE_DISCOVER_AGENT message. + + +Example: + +/{ +chosen { + xen,config { + scmi-secondary-agents =3D < + 0x82000003 &scmi_shm_1 + 0x82000004 &scmi_shm_2 + 0x82000005 &scmi_shm_3 + 0x82000006 &scmi_shm_4>; + #scmi-secondary-agents-cells =3D <2>; + }; + }; +}; diff --git a/docs/misc/xen-command-line.pandoc b/docs/misc/xen-command-line= .pandoc index 7a1f723e63..5a1c1e072c 100644 --- a/docs/misc/xen-command-line.pandoc +++ b/docs/misc/xen-command-line.pandoc @@ -1105,6 +1105,15 @@ which serves as Driver domain. The SCMI will be disa= bled for Dom0/hwdom and SCMI nodes removed from Dom0/hwdom device tree. (for example, thin Dom0 with Driver domain use-case). =20 +### dom0_scmi_agent_id (ARM) +> `=3D ` + +The option is available when `CONFIG_SCMI_SMC_MA` is compiled in, and allo= ws to +enable SCMI functionality for Dom0 by specifying a non-zero ARM SCMI agent= id. +The SCMI will be disabled for Dom0 if this option is not specified +(for example, thin Dom0 or dom0less use-cases). +The agent ids of domains existing on a single host must be unique. + ### dtuart (ARM) > `=3D path [:options]` =20 diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c index e4407d6e3f..be0e6263ae 100644 --- a/tools/libs/light/libxl_arm.c +++ b/tools/libs/light/libxl_arm.c @@ -240,6 +240,10 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc, case LIBXL_ARM_SCI_TYPE_SCMI_SMC: config->arch.arm_sci_type =3D XEN_DOMCTL_CONFIG_ARM_SCI_SCMI_SMC; break; + case LIBXL_ARM_SCI_TYPE_SCMI_SMC_MULTIAGENT: + config->arch.arm_sci_type =3D XEN_DOMCTL_CONFIG_ARM_SCI_SCMI_SMC_M= A; + config->arch.arm_sci_agent_id =3D d_config->b_info.arch_arm.arm_sc= i.agent_id; + break; default: LOG(ERROR, "Unknown ARM_SCI type %d", d_config->b_info.arch_arm.arm_sci.type); diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_type= s.idl index c8bc0f8521..da7f87cd0c 100644 --- a/tools/libs/light/libxl_types.idl +++ b/tools/libs/light/libxl_types.idl @@ -553,11 +553,13 @@ libxl_sve_type =3D Enumeration("sve_type", [ =20 libxl_arm_sci_type =3D Enumeration("arm_sci_type", [ (0, "none"), - (1, "scmi_smc") + (1, "scmi_smc"), + (2, "scmi_smc_multiagent") ], init_val =3D "LIBXL_ARM_SCI_TYPE_NONE") =20 libxl_arm_sci =3D Struct("arm_sci", [ ("type", libxl_arm_sci_type), + ("agent_id", uint8) ]) =20 libxl_rdm_reserve =3D Struct("rdm_reserve", [ diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c index 68d2ebeb9f..4c05b20c06 100644 --- a/tools/xl/xl_parse.c +++ b/tools/xl/xl_parse.c @@ -1306,6 +1306,18 @@ static int parse_arm_sci_config(XLU_Config *cfg, lib= xl_arm_sci *arm_sci, } } =20 + if (MATCH_OPTION("agent_id", ptr, oparg)) { + unsigned long val =3D parse_ulong(oparg); + + if (!val || val > 255) { + fprintf(stderr, "An invalid ARM_SCI agent_id specified (%l= u). Valid range [1..255]\n", + val); + ret =3D ERROR_INVAL; + goto parse_error; + } + arm_sci->agent_id =3D val; + } + ptr =3D strtok(NULL, ","); } =20 diff --git a/xen/arch/arm/dom0less-build.c b/xen/arch/arm/dom0less-build.c index d28143f98b..6ca17b0ce6 100644 --- a/xen/arch/arm/dom0less-build.c +++ b/xen/arch/arm/dom0less-build.c @@ -299,6 +299,17 @@ int __init domu_dt_sci_parse(struct dt_device_node *no= de, d_cfg->arch.arm_sci_type =3D XEN_DOMCTL_CONFIG_ARM_SCI_NONE; else if ( !strcmp(sci_type, "scmi_smc") ) d_cfg->arch.arm_sci_type =3D XEN_DOMCTL_CONFIG_ARM_SCI_SCMI_SMC; + else if ( !strcmp(sci_type, "scmi_smc_multiagent") ) + { + uint32_t agent_id =3D 0; + + if ( !dt_property_read_u32(node, "xen,sci_agent_id", &agent_id) || + !agent_id ) + return -EINVAL; + + d_cfg->arch.arm_sci_type =3D XEN_DOMCTL_CONFIG_ARM_SCI_SCMI_SMC_MA; + d_cfg->arch.arm_sci_agent_id =3D agent_id; + } else { printk(XENLOG_ERR "xen,sci_type in not valid (%s) for domain %s\n", diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c index 92039cf213..ea13e374a0 100644 --- a/xen/arch/arm/domain_build.c +++ b/xen/arch/arm/domain_build.c @@ -508,7 +508,8 @@ static int __init write_properties(struct domain *d, st= ruct kernel_info *kinfo, dt_property_name_is_equal(prop, "linux,uefi-mmap-start") = || dt_property_name_is_equal(prop, "linux,uefi-mmap-size") || dt_property_name_is_equal(prop, "linux,uefi-mmap-desc-siz= e") || - dt_property_name_is_equal(prop, "linux,uefi-mmap-desc-ver= ")) + dt_property_name_is_equal(prop, "linux,uefi-mmap-desc-ver= ") || + dt_property_name_is_equal(prop, "xen,config") ) continue; =20 if ( dt_property_name_is_equal(prop, "xen,dom0-bootargs") ) diff --git a/xen/arch/arm/firmware/Kconfig b/xen/arch/arm/firmware/Kconfig index 5c5f0880c4..972cd9b173 100644 --- a/xen/arch/arm/firmware/Kconfig +++ b/xen/arch/arm/firmware/Kconfig @@ -29,6 +29,18 @@ config SCMI_SMC driver domain. Use with EL3 firmware which supports only single SCMI OSPM agent. =20 +config SCMI_SMC_MA + bool "Enable ARM SCMI SMC multi-agent driver" + depends on ARM_64 + select ARM_SCI + help + Enables SCMI SMC/HVC multi-agent in XEN to pass SCMI requests from Doma= ins + to EL3 firmware (TF-A) which supports multi-agent feature. + This feature allows to enable SCMI per Domain using unique SCMI agent_i= d, + so Domain is identified by EL3 firmware as an SCMI Agent and can access + allowed platform resources through dedicated SMC/HVC Shared memory based + transport. + endchoice =20 endmenu diff --git a/xen/arch/arm/firmware/Makefile b/xen/arch/arm/firmware/Makefile index 71bdefc24a..37927e690e 100644 --- a/xen/arch/arm/firmware/Makefile +++ b/xen/arch/arm/firmware/Makefile @@ -1,2 +1,3 @@ obj-$(CONFIG_ARM_SCI) +=3D sci.o obj-$(CONFIG_SCMI_SMC) +=3D scmi-smc.o +obj-$(CONFIG_SCMI_SMC_MA) +=3D scmi-shmem.o scmi-smc-multiagent.o diff --git a/xen/arch/arm/firmware/scmi-proto.h b/xen/arch/arm/firmware/scm= i-proto.h new file mode 100644 index 0000000000..e290d6630d --- /dev/null +++ b/xen/arch/arm/firmware/scmi-proto.h @@ -0,0 +1,164 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +/* + * Arm System Control and Management Interface definitions + * Version 3.0 (DEN0056C) + * + * Copyright (c) 2024 EPAM Systems + */ + +#ifndef ARM_FIRMWARE_SCMI_PROTO_H_ +#define ARM_FIRMWARE_SCMI_PROTO_H_ + +#include + +#define SCMI_SHORT_NAME_MAX_SIZE 16 + +/* SCMI status codes. See section 4.1.4 */ +#define SCMI_SUCCESS 0 +#define SCMI_NOT_SUPPORTED (-1) +#define SCMI_INVALID_PARAMETERS (-2) +#define SCMI_DENIED (-3) +#define SCMI_NOT_FOUND (-4) +#define SCMI_OUT_OF_RANGE (-5) +#define SCMI_BUSY (-6) +#define SCMI_COMMS_ERROR (-7) +#define SCMI_GENERIC_ERROR (-8) +#define SCMI_HARDWARE_ERROR (-9) +#define SCMI_PROTOCOL_ERROR (-10) + +/* Protocol IDs */ +#define SCMI_BASE_PROTOCOL 0x10 + +/* Base protocol message IDs */ +#define SCMI_BASE_PROTOCOL_VERSION 0x0 +#define SCMI_BASE_PROTOCOL_ATTIBUTES 0x1 +#define SCMI_BASE_PROTOCOL_MESSAGE_ATTRIBUTES 0x2 +#define SCMI_BASE_DISCOVER_AGENT 0x7 +#define SCMI_BASE_SET_DEVICE_PERMISSIONS 0x9 +#define SCMI_BASE_RESET_AGENT_CONFIGURATION 0xB + +typedef struct scmi_msg_header { + uint8_t id; + uint8_t type; + uint8_t protocol; + uint32_t status; +} scmi_msg_header_t; + +/* Table 2 Message header format */ +#define SCMI_HDR_ID GENMASK(7, 0) +#define SCMI_HDR_TYPE GENMASK(9, 8) +#define SCMI_HDR_PROTO GENMASK(17, 10) + +#define SCMI_FIELD_GET(_mask, _reg) = \ + ((typeof(_mask))(((_reg) & (_mask)) >> (ffs64(_mask) - 1))) +#define SCMI_FIELD_PREP(_mask, _val) = \ + (((typeof(_mask))(_val) << (ffs64(_mask) - 1)) & (_mask)) + +static inline uint32_t pack_scmi_header(scmi_msg_header_t *hdr) +{ + return SCMI_FIELD_PREP(SCMI_HDR_ID, hdr->id) | + SCMI_FIELD_PREP(SCMI_HDR_TYPE, hdr->type) | + SCMI_FIELD_PREP(SCMI_HDR_PROTO, hdr->protocol); +} + +static inline void unpack_scmi_header(uint32_t msg_hdr, scmi_msg_header_t = *hdr) +{ + hdr->id =3D SCMI_FIELD_GET(SCMI_HDR_ID, msg_hdr); + hdr->type =3D SCMI_FIELD_GET(SCMI_HDR_TYPE, msg_hdr); + hdr->protocol =3D SCMI_FIELD_GET(SCMI_HDR_PROTO, msg_hdr); +} + +static inline int scmi_to_xen_errno(int scmi_status) +{ + if ( scmi_status =3D=3D SCMI_SUCCESS ) + return 0; + + switch ( scmi_status ) + { + case SCMI_NOT_SUPPORTED: + return -EOPNOTSUPP; + case SCMI_INVALID_PARAMETERS: + return -EINVAL; + case SCMI_DENIED: + return -EACCES; + case SCMI_NOT_FOUND: + return -ENOENT; + case SCMI_OUT_OF_RANGE: + return -ERANGE; + case SCMI_BUSY: + return -EBUSY; + case SCMI_COMMS_ERROR: + return -ENOTCONN; + case SCMI_GENERIC_ERROR: + return -EIO; + case SCMI_HARDWARE_ERROR: + return -ENXIO; + case SCMI_PROTOCOL_ERROR: + return -EBADMSG; + default: + return -EINVAL; + } +} + +/* PROTOCOL_VERSION */ +#define SCMI_VERSION_MINOR GENMASK(15, 0) +#define SCMI_VERSION_MAJOR GENMASK(31, 16) + +struct scmi_msg_prot_version_p2a { + uint32_t version; +} __packed; + +/* BASE PROTOCOL_ATTRIBUTES */ +#define SCMI_BASE_ATTR_NUM_PROTO GENMASK(7, 0) +#define SCMI_BASE_ATTR_NUM_AGENT GENMASK(15, 8) + +struct scmi_msg_base_attributes_p2a { + uint32_t attributes; +} __packed; + +/* + * BASE_DISCOVER_AGENT + */ +#define SCMI_BASE_AGENT_ID_OWN 0xFFFFFFFF + +struct scmi_msg_base_discover_agent_a2p { + uint32_t agent_id; +} __packed; + +struct scmi_msg_base_discover_agent_p2a { + uint32_t agent_id; + char name[SCMI_SHORT_NAME_MAX_SIZE]; +} __packed; + +/* + * BASE_SET_DEVICE_PERMISSIONS + */ +#define SCMI_BASE_DEVICE_ACCESS_ALLOW BIT(0, UL) + +struct scmi_msg_base_set_device_permissions_a2p { + uint32_t agent_id; + uint32_t device_id; + uint32_t flags; +} __packed; + +/* + * BASE_RESET_AGENT_CONFIGURATION + */ +#define SCMI_BASE_AGENT_PERMISSIONS_RESET BIT(0, UL) + +struct scmi_msg_base_reset_agent_cfg_a2p { + uint32_t agent_id; + uint32_t flags; +} __packed; + +#endif /* ARM_FIRMWARE_SCMI_PROTO_H_ */ + +/* + * Local variables: + * mode: C + * c-file-style: "BSD" + * c-basic-offset: 4 + * tab-width: 4 + * indent-tabs-mode: nil + * End: + */ diff --git a/xen/arch/arm/firmware/scmi-shmem.c b/xen/arch/arm/firmware/scm= i-shmem.c new file mode 100644 index 0000000000..8fc8ca356b --- /dev/null +++ b/xen/arch/arm/firmware/scmi-shmem.c @@ -0,0 +1,112 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +/* + * SCI SCMI multi-agent driver, using SMC/HVC shmem as transport. + * + * Oleksii Moisieiev + * Copyright (c) 2025 EPAM Systems + */ +/* SPDX-License-Identifier: GPL-2.0-only */ + +#include +#include +#include + +#include "scmi-proto.h" +#include "scmi-shmem.h" + +static inline int +shmem_channel_is_free(const volatile struct scmi_shared_mem __iomem *shmem) +{ + return (readl(&shmem->channel_status) & + SCMI_SHMEM_CHAN_STAT_CHANNEL_FREE) ? 0 : -EBUSY; +} + +int shmem_put_message(volatile struct scmi_shared_mem __iomem *shmem, + scmi_msg_header_t *hdr, void *data, int len) +{ + int ret; + + if ( (len + sizeof(shmem->msg_header)) > SCMI_SHMEM_MAPPED_SIZE ) + { + printk(XENLOG_ERR "scmi: Wrong size of smc message. Data is invali= d\n"); + return -EINVAL; + } + + ret =3D shmem_channel_is_free(shmem); + if ( ret ) + return ret; + + writel_relaxed(0x0, &shmem->channel_status); + /* Writing 0x0 right now, but "shmem"_FLAG_INTR_ENABLED can be set */ + writel_relaxed(0x0, &shmem->flags); + writel_relaxed(sizeof(shmem->msg_header) + len, &shmem->length); + writel(pack_scmi_header(hdr), &shmem->msg_header); + + if ( len > 0 && data ) + __memcpy_toio(shmem->msg_payload, data, len); + + return 0; +} + +int shmem_get_response(const volatile struct scmi_shared_mem __iomem *shme= m, + scmi_msg_header_t *hdr, void *data, int len) +{ + int recv_len; + int ret; + int pad =3D sizeof(hdr->status); + + if ( len >=3D SCMI_SHMEM_MAPPED_SIZE - sizeof(shmem) ) + { + printk(XENLOG_ERR + "scmi: Wrong size of input smc message. Data may be invalid= \n"); + return -EINVAL; + } + + ret =3D shmem_channel_is_free(shmem); + if ( ret ) + return ret; + + recv_len =3D readl(&shmem->length) - sizeof(shmem->msg_header); + + if ( recv_len < 0 ) + { + printk(XENLOG_ERR + "scmi: Wrong size of smc message. Data may be invalid\n"); + return -EINVAL; + } + + unpack_scmi_header(readl(&shmem->msg_header), hdr); + + hdr->status =3D readl(&shmem->msg_payload); + recv_len =3D recv_len > pad ? recv_len - pad : 0; + + ret =3D scmi_to_xen_errno(hdr->status); + if ( ret ) + { + printk(XENLOG_DEBUG "scmi: Error received: %d\n", ret); + return ret; + } + + if ( recv_len > len ) + { + printk(XENLOG_ERR + "scmi: Not enough buffer for message %d, expecting %d\n", + recv_len, len); + return -EINVAL; + } + + if ( recv_len > 0 ) + __memcpy_fromio(data, shmem->msg_payload + pad, recv_len); + + return 0; +} + +/* + * Local variables: + * mode: C + * c-file-style: "BSD" + * c-basic-offset: 4 + * tab-width: 4 + * indent-tabs-mode: nil + * End: + */ diff --git a/xen/arch/arm/firmware/scmi-shmem.h b/xen/arch/arm/firmware/scm= i-shmem.h new file mode 100644 index 0000000000..7313cb6b26 --- /dev/null +++ b/xen/arch/arm/firmware/scmi-shmem.h @@ -0,0 +1,45 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +/* + * Arm System Control and Management Interface definitions + * Version 3.0 (DEN0056C) + * Shared Memory based Transport + * + * Copyright (c) 2024 EPAM Systems + */ + +#ifndef ARM_FIRMWARE_SCMI_SHMEM_H_ +#define ARM_FIRMWARE_SCMI_SHMEM_H_ + +#include + +#define SCMI_SHMEM_CHAN_STAT_CHANNEL_FREE BIT(0, UL) +#define SCMI_SHMEM_CHAN_STAT_CHANNEL_ERROR BIT(1, UL) + +struct scmi_shared_mem { + uint32_t reserved; + uint32_t channel_status; + uint32_t reserved1[2]; + uint32_t flags; + uint32_t length; + uint32_t msg_header; + uint8_t msg_payload[]; +}; + +#define SCMI_SHMEM_MAPPED_SIZE PAGE_SIZE + +int shmem_put_message(volatile struct scmi_shared_mem __iomem *shmem, + scmi_msg_header_t *hdr, void *data, int len); + +int shmem_get_response(const volatile struct scmi_shared_mem __iomem *shme= m, + scmi_msg_header_t *hdr, void *data, int len); +#endif /* ARM_FIRMWARE_SCMI_SHMEM_H_ */ + +/* + * Local variables: + * mode: C + * c-file-style: "BSD" + * c-basic-offset: 4 + * tab-width: 4 + * indent-tabs-mode: nil + * End: + */ diff --git a/xen/arch/arm/firmware/scmi-smc-multiagent.c b/xen/arch/arm/fir= mware/scmi-smc-multiagent.c new file mode 100644 index 0000000000..9f839147d4 --- /dev/null +++ b/xen/arch/arm/firmware/scmi-smc-multiagent.c @@ -0,0 +1,803 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +/* + * SCI SCMI multi-agent driver, using SMC/HVC shmem as transport. + * + * Oleksii Moisieiev + * Copyright (c) 2025 EPAM Systems + */ + +#include + +#include +#include +#include +#include +#include +#include +#include +#include + +#include +#include + +#include "scmi-proto.h" +#include "scmi-shmem.h" + +#define SCMI_AGENT_ID_INVALID 0xFF + +static uint8_t __initdata opt_dom0_scmi_agent_id =3D SCMI_AGENT_ID_INVALID; +integer_param("dom0_scmi_agent_id", opt_dom0_scmi_agent_id); + +#define SCMI_SECONDARY_AGENTS "scmi-secondary-agents" + +struct scmi_channel { + uint32_t agent_id; + uint32_t func_id; + domid_t domain_id; + uint64_t paddr; + uint64_t len; + struct scmi_shared_mem __iomem *shmem; + spinlock_t lock; + struct list_head list; +}; + +struct scmi_data { + struct list_head channel_list; + spinlock_t channel_list_lock; + uint32_t func_id; + bool initialized; + uint32_t shmem_phandle; + uint32_t hyp_channel_agent_id; + struct dt_device_node *dt_dev; +}; + +static struct scmi_data scmi_data; + +static int send_smc_message(struct scmi_channel *chan_info, + scmi_msg_header_t *hdr, void *data, int len) +{ + struct arm_smccc_res resp; + int ret; + + ret =3D shmem_put_message(chan_info->shmem, hdr, data, len); + if ( ret ) + return ret; + + arm_smccc_1_1_smc(chan_info->func_id, 0, 0, 0, 0, 0, 0, 0, &resp); + + if ( resp.a0 =3D=3D ARM_SMCCC_INVALID_PARAMETER ) + return -EINVAL; + + if ( resp.a0 ) + return -EOPNOTSUPP; + + return 0; +} + +static int do_smc_xfer(struct scmi_channel *chan_info, scmi_msg_header_t *= hdr, + void *tx_data, int tx_size, void *rx_data, int rx_s= ize) +{ + int ret =3D 0; + + ASSERT(chan_info && chan_info->shmem); + + if ( !hdr ) + return -EINVAL; + + spin_lock(&chan_info->lock); + + printk(XENLOG_DEBUG + "scmi: agent_id =3D %d msg_id =3D %x type =3D %d, proto =3D %x\= n", + chan_info->agent_id, hdr->id, hdr->type, hdr->protocol); + + ret =3D send_smc_message(chan_info, hdr, tx_data, tx_size); + if ( ret ) + goto clean; + + ret =3D shmem_get_response(chan_info->shmem, hdr, rx_data, rx_size); + +clean: + printk(XENLOG_DEBUG + "scmi: get smc response agent_id =3D %d msg_id =3D %x proto =3D= %x res=3D%d\n", + chan_info->agent_id, hdr->id, hdr->protocol, ret); + + spin_unlock(&chan_info->lock); + + return ret; +} + +static struct scmi_channel *get_channel_by_id(uint32_t agent_id) +{ + struct scmi_channel *curr; + bool found =3D false; + + spin_lock(&scmi_data.channel_list_lock); + list_for_each_entry(curr, &scmi_data.channel_list, list) + { + if ( curr->agent_id =3D=3D agent_id ) + { + found =3D true; + break; + } + } + + spin_unlock(&scmi_data.channel_list_lock); + if ( found ) + return curr; + + return NULL; +} + +static struct scmi_channel *acquire_scmi_channel(struct domain *d, + uint32_t agent_id) +{ + struct scmi_channel *curr; + struct scmi_channel *ret =3D ERR_PTR(-ENOENT); + + spin_lock(&scmi_data.channel_list_lock); + list_for_each_entry(curr, &scmi_data.channel_list, list) + { + if ( curr->agent_id =3D=3D agent_id ) + { + if ( curr->domain_id !=3D DOMID_INVALID ) + { + ret =3D ERR_PTR(-EEXIST); + break; + } + + curr->domain_id =3D d->domain_id; + ret =3D curr; + break; + } + } + + spin_unlock(&scmi_data.channel_list_lock); + + return ret; +} + +static void relinquish_scmi_channel(struct scmi_channel *channel) +{ + ASSERT(channel !=3D NULL); + + spin_lock(&scmi_data.channel_list_lock); + channel->domain_id =3D DOMID_INVALID; + spin_unlock(&scmi_data.channel_list_lock); +} + +static int map_channel_memory(struct scmi_channel *channel) +{ + ASSERT(channel && channel->paddr); + channel->shmem =3D ioremap_nocache(channel->paddr, SCMI_SHMEM_MAPPED_S= IZE); + if ( !channel->shmem ) + return -ENOMEM; + + channel->shmem->channel_status =3D SCMI_SHMEM_CHAN_STAT_CHANNEL_FREE; + printk(XENLOG_DEBUG "scmi: Got shmem %lx after vmap %p\n", channel->pa= ddr, + channel->shmem); + + return 0; +} + +static void unmap_channel_memory(struct scmi_channel *channel) +{ + ASSERT(channel && channel->shmem); + iounmap(channel->shmem); + channel->shmem =3D NULL; +} + +static struct scmi_channel *smc_create_channel(uint32_t agent_id, + uint32_t func_id, uint64_t = addr) +{ + struct scmi_channel *channel; + + channel =3D get_channel_by_id(agent_id); + if ( channel ) + return ERR_PTR(EEXIST); + + channel =3D xmalloc(struct scmi_channel); + if ( !channel ) + return ERR_PTR(ENOMEM); + + spin_lock_init(&channel->lock); + channel->agent_id =3D agent_id; + channel->func_id =3D func_id; + channel->domain_id =3D DOMID_INVALID; + channel->shmem =3D NULL; + channel->paddr =3D addr; + list_add_tail(&channel->list, &scmi_data.channel_list); + return channel; +} + +static void free_channel_list(void) +{ + struct scmi_channel *curr, *_curr; + + list_for_each_entry_safe(curr, _curr, &scmi_data.channel_list, list) + { + list_del(&curr->list); + xfree(curr); + } +} + +static int __init +scmi_dt_read_hyp_channel_addr(struct dt_device_node *scmi_node, u64 *addr, + u64 *size) +{ + struct dt_device_node *shmem_node; + const __be32 *prop; + + prop =3D dt_get_property(scmi_node, "shmem", NULL); + if ( !prop ) + return -EINVAL; + + shmem_node =3D dt_find_node_by_phandle(be32_to_cpu(*prop)); + if ( IS_ERR_OR_NULL(shmem_node) ) + { + printk(XENLOG_ERR + "scmi: Device tree error, can't parse reserved memory %ld\n= ", + PTR_ERR(shmem_node)); + return PTR_ERR(shmem_node); + } + + return dt_device_get_address(shmem_node, 0, addr, size); +} + +/* + * Handle Dom0 SCMI specific DT nodes + * + * Make a decision on copying SCMI specific nodes into Dom0 device tree. + * For SCMI multi-agent case: + * - shmem nodes will not be copied and generated instead if SCMI + * is enabled for Dom0 + * - scmi node will be copied if SCMI is enabled for Dom0 + */ +static bool scmi_dt_handle_node(struct domain *d, struct dt_device_node *n= ode) +{ + static const struct dt_device_match shmem_matches[] __initconst =3D { + DT_MATCH_COMPATIBLE("arm,scmi-shmem"), + { /* sentinel */ }, + }; + static const struct dt_device_match scmi_matches[] __initconst =3D { + DT_MATCH_PATH("/firmware/scmi"), + { /* sentinel */ }, + }; + + if ( !scmi_data.initialized ) + return false; + + /* skip scmi shmem node for dom0 if scmi not enabled */ + if ( dt_match_node(shmem_matches, node) && !sci_domain_is_enabled(d) ) + { + dt_dprintk(" Skip scmi shmem node\n"); + return true; + } + + /* drop scmi if not enabled */ + if ( dt_match_node(scmi_matches, node) && !sci_domain_is_enabled(d) ) + { + dt_dprintk(" Skip scmi node\n"); + return true; + } + + return false; +} + +static int scmi_assign_device(uint32_t agent_id, uint32_t device_id, + uint32_t flags) +{ + struct scmi_msg_base_set_device_permissions_a2p tx; + struct scmi_channel *channel; + scmi_msg_header_t hdr; + + channel =3D get_channel_by_id(scmi_data.hyp_channel_agent_id); + if ( !channel ) + return -EINVAL; + + hdr.id =3D SCMI_BASE_SET_DEVICE_PERMISSIONS; + hdr.type =3D 0; + hdr.protocol =3D SCMI_BASE_PROTOCOL; + + tx.agent_id =3D agent_id; + tx.device_id =3D device_id; + tx.flags =3D flags; + + return do_smc_xfer(channel, &hdr, &tx, sizeof(tx), NULL, 0); +} + +static int scmi_dt_assign_device(struct domain *d, + struct dt_phandle_args *ac_spec) +{ + struct scmi_channel *agent_channel; + uint32_t scmi_device_id =3D ac_spec->args[0]; + int ret; + + if ( !d->arch.sci_data ) + return 0; + + /* The access-controllers is specified for DT dev, but it's not a SCMI= */ + if ( ac_spec->np !=3D scmi_data.dt_dev ) + return 0; + + agent_channel =3D d->arch.sci_data; + + spin_lock(&agent_channel->lock); + + ret =3D scmi_assign_device(agent_channel->agent_id, scmi_device_id, + SCMI_BASE_DEVICE_ACCESS_ALLOW); + if ( ret ) + { + printk(XENLOG_ERR + "scmi: could not assign dev for %pd agent:%d dev_id:%u (%d)= ", + d, agent_channel->agent_id, scmi_device_id, ret); + } + + spin_unlock(&agent_channel->lock); + return ret; +} + +static int collect_agent_id(struct scmi_channel *agent_channel) +{ + int ret; + scmi_msg_header_t hdr; + struct scmi_msg_base_discover_agent_p2a da_rx; + struct scmi_msg_base_discover_agent_a2p da_tx; + + ret =3D map_channel_memory(agent_channel); + if ( ret ) + return ret; + + hdr.id =3D SCMI_BASE_DISCOVER_AGENT; + hdr.type =3D 0; + hdr.protocol =3D SCMI_BASE_PROTOCOL; + + da_tx.agent_id =3D agent_channel->agent_id; + + ret =3D do_smc_xfer(agent_channel, &hdr, &da_tx, sizeof(da_tx), &da_rx, + sizeof(da_rx)); + if ( agent_channel->domain_id !=3D DOMID_XEN ) + unmap_channel_memory(agent_channel); + if ( ret ) + return ret; + + printk(XENLOG_DEBUG "id=3D0x%x name=3D%s\n", da_rx.agent_id, da_rx.nam= e); + agent_channel->agent_id =3D da_rx.agent_id; + return 0; +} + +static __init int collect_agents(struct dt_device_node *scmi_node) +{ + const struct dt_device_node *config_node; + const __be32 *prop; + uint32_t len; + const __be32 *end; + uint32_t cells_per_entry =3D 3; /* Default to 3 cells if property is a= bsent. */ + + config_node =3D dt_find_node_by_path("/chosen/xen,config"); + if ( !config_node ) + { + printk(XENLOG_WARNING "scmi: /chosen/xen,config node not found, no= agents to collect.\n"); + return -ENOENT; + } + + /* Check for the optional '#scmi-secondary-agents-cells' property. */ + if ( dt_property_read_u32(config_node, "#scmi-secondary-agents-cells", + &cells_per_entry) ) + { + if ( cells_per_entry !=3D 2 && cells_per_entry !=3D 3 ) + { + printk(XENLOG_ERR "scmi: Invalid #scmi-secondary-agents-cells = value: %u\n", + cells_per_entry); + return -EINVAL; + } + } + + prop =3D dt_get_property(config_node, SCMI_SECONDARY_AGENTS, &len); + if ( !prop ) + { + /* This is not an error, as there may be no secondary agents. */ + printk(XENLOG_WARNING "scmi: No %s property found, no agents to co= llect.\n", + SCMI_SECONDARY_AGENTS); + return -EINVAL; + } + + /* Validate that the property length is a multiple of the cell size. */ + if ( len =3D=3D 0 || len % (cells_per_entry * sizeof(uint32_t)) !=3D 0= ) + { + printk(XENLOG_ERR "scmi: Invalid length of %s property: %u for %u = cells per entry\n", + SCMI_SECONDARY_AGENTS, len, cells_per_entry); + return -EINVAL; + } + + end =3D (const __be32 *)((const u8 *)prop + len); + + for ( ; prop < end; ) + { + uint32_t agent_id; + uint32_t smc_id; + uint32_t shmem_phandle; + struct dt_device_node *node; + u64 addr, size; + int ret; + struct scmi_channel *agent_channel; + + smc_id =3D be32_to_cpu(*prop++); + shmem_phandle =3D be32_to_cpu(*prop++); + + if ( cells_per_entry =3D=3D 3 ) + agent_id =3D be32_to_cpu(*prop++); + else + agent_id =3D SCMI_BASE_AGENT_ID_OWN; + + node =3D dt_find_node_by_phandle(shmem_phandle); + if ( !node ) + { + printk(XENLOG_ERR "scmi: Could not find shmem node for agent %= u\n", + agent_id); + return -EINVAL; + } + + ret =3D dt_device_get_address(node, 0, &addr, &size); + if ( ret ) + { + printk(XENLOG_ERR + "scmi: Could not read shmem address for agent %u: %d\n", + agent_id, ret); + return ret; + } + + if ( !IS_ALIGNED(size, SCMI_SHMEM_MAPPED_SIZE) ) + { + printk(XENLOG_ERR "scmi: shmem memory is not aligned\n"); + return -EINVAL; + } + + agent_channel =3D smc_create_channel(agent_id, smc_id, addr); + if ( IS_ERR(agent_channel) ) + { + printk(XENLOG_ERR "scmi: Could not create channel for agent %u= : %ld\n", + agent_id, PTR_ERR(agent_channel)); + return PTR_ERR(agent_channel); + } + + if ( cells_per_entry =3D=3D 2 ) + { + ret =3D collect_agent_id(agent_channel); + if ( ret ) + return ret; + } + + printk(XENLOG_DEBUG "scmi: Agent %u SMC %X addr %lx\n", agent_chan= nel->agent_id, + smc_id, (unsigned long)addr); + } + + return 0; +} + +static int scmi_domain_init(struct domain *d, + struct xen_domctl_createdomain *config) +{ + struct scmi_channel *channel; + int ret; + + if ( !scmi_data.initialized ) + return 0; + + /* + * Special case for Dom0 - the SCMI support is enabled basing on + * "dom0_sci_agent_id" Xen command line parameter + */ + if ( is_hardware_domain(d) ) + { + if ( opt_dom0_scmi_agent_id !=3D SCMI_AGENT_ID_INVALID ) + { + config->arch.arm_sci_type =3D XEN_DOMCTL_CONFIG_ARM_SCI_SCMI_S= MC_MA; + config->arch.arm_sci_agent_id =3D opt_dom0_scmi_agent_id; + } + else + config->arch.arm_sci_type =3D XEN_DOMCTL_CONFIG_ARM_SCI_NONE; + } + + if ( config->arch.arm_sci_type =3D=3D XEN_DOMCTL_CONFIG_ARM_SCI_NONE ) + return 0; + + channel =3D acquire_scmi_channel(d, config->arch.arm_sci_agent_id); + if ( IS_ERR(channel) ) + { + printk(XENLOG_ERR + "scmi: Failed to acquire SCMI channel for agent_id %u: %ld\= n", + config->arch.arm_sci_agent_id, PTR_ERR(channel)); + return PTR_ERR(channel); + } + + printk(XENLOG_INFO + "scmi: Acquire channel id =3D 0x%x, domain_id =3D %d paddr =3D = 0x%lx\n", + channel->agent_id, channel->domain_id, channel->paddr); + + /* + * Dom0 (if present) needs to have an access to the guest memory range + * to satisfy iomem_access_permitted() check in XEN_DOMCTL_iomem_permi= ssion + * domctl. + */ + if ( hardware_domain && !is_hardware_domain(d) ) + { + ret =3D iomem_permit_access(hardware_domain, paddr_to_pfn(channel-= >paddr), + paddr_to_pfn(channel->paddr + PAGE_SIZE = - 1)); + if ( ret ) + goto error; + } + + d->arch.sci_data =3D channel; + d->arch.sci_enabled =3D true; + + return 0; + +error: + relinquish_scmi_channel(channel); + return ret; +} + +int scmi_domain_sanitise_config(struct xen_domctl_createdomain *config) +{ + if ( config->arch.arm_sci_type !=3D XEN_DOMCTL_CONFIG_ARM_SCI_NONE && + config->arch.arm_sci_type !=3D XEN_DOMCTL_CONFIG_ARM_SCI_SCMI_SMC= _MA ) + { + dprintk(XENLOG_INFO, "scmi: Unsupported ARM_SCI type\n"); + return -EINVAL; + } + else if ( config->arch.arm_sci_type =3D=3D + XEN_DOMCTL_CONFIG_ARM_SCI_SCMI_SMC_MA && + config->arch.arm_sci_agent_id =3D=3D 0 ) + { + dprintk(XENLOG_INFO, + "scmi: A zero ARM SCMI agent_id is not supported\n"); + return -EINVAL; + } + + return 0; +} + +static int scmi_relinquish_resources(struct domain *d) +{ + int ret; + struct scmi_channel *channel, *agent_channel; + scmi_msg_header_t hdr; + struct scmi_msg_base_reset_agent_cfg_a2p tx; + + if ( !d->arch.sci_data ) + return 0; + + agent_channel =3D d->arch.sci_data; + + spin_lock(&agent_channel->lock); + tx.agent_id =3D agent_channel->agent_id; + spin_unlock(&agent_channel->lock); + + channel =3D get_channel_by_id(scmi_data.hyp_channel_agent_id); + if ( !channel ) + { + printk(XENLOG_ERR + "scmi: Unable to get Hypervisor scmi channel for domain %d\= n", + d->domain_id); + return -EINVAL; + } + + hdr.id =3D SCMI_BASE_RESET_AGENT_CONFIGURATION; + hdr.type =3D 0; + hdr.protocol =3D SCMI_BASE_PROTOCOL; + + tx.flags =3D 0; + + ret =3D do_smc_xfer(channel, &hdr, &tx, sizeof(tx), NULL, 0); + if ( ret =3D=3D -EOPNOTSUPP ) + return 0; + + return ret; +} + +static void scmi_domain_destroy(struct domain *d) +{ + struct scmi_channel *channel; + + if ( !d->arch.sci_data ) + return; + + channel =3D d->arch.sci_data; + spin_lock(&channel->lock); + + relinquish_scmi_channel(channel); + printk(XENLOG_DEBUG "scmi: Free domain %d\n", d->domain_id); + + d->arch.sci_data =3D NULL; + d->arch.sci_enabled =3D true; + + spin_unlock(&channel->lock); +} + +static bool scmi_handle_call(struct cpu_user_regs *regs) +{ + uint32_t fid =3D (uint32_t)get_user_reg(regs, 0); + struct scmi_channel *agent_channel; + struct domain *d =3D current->domain; + struct arm_smccc_res resp; + bool res =3D false; + + if ( !sci_domain_is_enabled(d) ) + return false; + + agent_channel =3D d->arch.sci_data; + spin_lock(&agent_channel->lock); + + if ( agent_channel->func_id !=3D fid ) + { + res =3D false; + goto unlock; + } + + arm_smccc_1_1_smc(fid, + get_user_reg(regs, 1), + get_user_reg(regs, 2), + get_user_reg(regs, 3), + get_user_reg(regs, 4), + get_user_reg(regs, 5), + get_user_reg(regs, 6), + get_user_reg(regs, 7), + &resp); + + set_user_reg(regs, 0, resp.a0); + set_user_reg(regs, 1, resp.a1); + set_user_reg(regs, 2, resp.a2); + set_user_reg(regs, 3, resp.a3); + res =3D true; +unlock: + spin_unlock(&agent_channel->lock); + + return res; +} + +static const struct sci_mediator_ops scmi_ops =3D { + .domain_init =3D scmi_domain_init, + .domain_destroy =3D scmi_domain_destroy, + .relinquish_resources =3D scmi_relinquish_resources, + .handle_call =3D scmi_handle_call, + .dom0_dt_handle_node =3D scmi_dt_handle_node, + .domain_sanitise_config =3D scmi_domain_sanitise_config, + .assign_dt_device =3D scmi_dt_assign_device, +}; + +static int __init scmi_check_smccc_ver(void) +{ + if ( smccc_ver < ARM_SMCCC_VERSION_1_1 ) + { + printk(XENLOG_WARNING + "scmi: No SMCCC 1.1 support, SCMI calls forwarding disabled= \n"); + return -ENOSYS; + } + + return 0; +} + +static int scmi_dt_hyp_channel_read(struct dt_device_node *scmi_node, stru= ct scmi_data *scmi_data, + u64 *addr) +{ + int ret; + u64 size; + + if ( !dt_property_read_u32(scmi_node, "arm,smc-id", &scmi_data->func_i= d) ) + { + printk(XENLOG_ERR "scmi: unable to read smc-id from DT\n"); + return -ENOENT; + } + + ret =3D scmi_dt_read_hyp_channel_addr(scmi_node, addr, &size); + if ( IS_ERR_VALUE(ret) ) + return -ENOENT; + + if ( !IS_ALIGNED(size, SCMI_SHMEM_MAPPED_SIZE) ) + { + printk(XENLOG_ERR "scmi: shmem memory is not aligned\n"); + return -EINVAL; + } + + return 0; +} + +static __init int scmi_probe(struct dt_device_node *scmi_node, const void = *data) +{ + u64 addr; + int ret; + struct scmi_channel *channel; + int n_agents; + scmi_msg_header_t hdr; + struct scmi_msg_base_attributes_p2a rx; + + ASSERT(scmi_node !=3D NULL); + + INIT_LIST_HEAD(&scmi_data.channel_list); + spin_lock_init(&scmi_data.channel_list_lock); + + if ( !acpi_disabled ) + { + printk(XENLOG_WARNING "scmi: is not supported when using ACPI\n"); + return -EINVAL; + } + + ret =3D scmi_check_smccc_ver(); + if ( ret ) + return ret; + + ret =3D scmi_dt_hyp_channel_read(scmi_node, &scmi_data, &addr); + if ( ret ) + return ret; + + scmi_data.dt_dev =3D scmi_node; + + channel =3D smc_create_channel(SCMI_BASE_AGENT_ID_OWN, scmi_data.func_= id, addr); + if ( IS_ERR(channel) ) + goto out; + + /* Request agent id for Xen management channel */ + ret =3D collect_agent_id(channel); + if ( ret ) + return ret; + + /* Save the agent id for Xen management channel */ + scmi_data.hyp_channel_agent_id =3D channel->agent_id; + + ret =3D map_channel_memory(channel); + if ( ret ) + goto out; + + channel->domain_id =3D DOMID_XEN; + + hdr.id =3D SCMI_BASE_PROTOCOL_ATTIBUTES; + hdr.type =3D 0; + hdr.protocol =3D SCMI_BASE_PROTOCOL; + + ret =3D do_smc_xfer(channel, &hdr, NULL, 0, &rx, sizeof(rx)); + if ( ret ) + goto error; + + n_agents =3D SCMI_FIELD_GET(SCMI_BASE_ATTR_NUM_AGENT, rx.attributes); + printk(XENLOG_DEBUG "scmi: Got agent count %d\n", n_agents); + ret =3D collect_agents(scmi_node); + if ( ret ) + goto error; + + ret =3D sci_register(&scmi_ops); + if ( ret ) + { + printk(XENLOG_ERR "SCMI: mediator already registered (ret =3D %d)\= n", + ret); + return ret; + } + + scmi_data.initialized =3D true; + goto out; + +error: + unmap_channel_memory(channel); + free_channel_list(); +out: + return ret; +} + +static const struct dt_device_match scmi_smc_match[] __initconst =3D { + DT_MATCH_PATH("/chosen/xen,config/scmi"), + { /* sentinel */ }, +}; + +DT_DEVICE_START(scmi_smc_ma, "SCMI SMC MEDIATOR", DEVICE_FIRMWARE) + .dt_match =3D scmi_smc_match, + .init =3D scmi_probe, +DT_DEVICE_END + +/* + * Local variables: + * mode: C + * c-file-style: "BSD" + * c-basic-offset: 4 + * tab-width: 4 + * indent-tabs-mode: nil + * End: + */ diff --git a/xen/include/public/arch-arm.h b/xen/include/public/arch-arm.h index 095b1a23e3..30e46de6d7 100644 --- a/xen/include/public/arch-arm.h +++ b/xen/include/public/arch-arm.h @@ -329,6 +329,7 @@ DEFINE_XEN_GUEST_HANDLE(vcpu_guest_context_t); =20 #define XEN_DOMCTL_CONFIG_ARM_SCI_NONE 0 #define XEN_DOMCTL_CONFIG_ARM_SCI_SCMI_SMC 1 +#define XEN_DOMCTL_CONFIG_ARM_SCI_SCMI_SMC_MA 2 =20 struct xen_arch_domainconfig { /* IN/OUT */ @@ -355,6 +356,8 @@ struct xen_arch_domainconfig { uint32_t clock_frequency; /* IN */ uint8_t arm_sci_type; + /* IN */ + uint8_t arm_sci_agent_id; }; #endif /* __XEN__ || __XEN_TOOLS__ */ =20 --=20 2.34.1 From nobody Thu Oct 30 23:14:03 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1753184535; cv=pass; d=zohomail.com; s=zohoarc; b=fM+tIurVqfP3THGXY0wcJ+Rv0haI0kf+2tYEg11UwX2JEvs8ysv7uBgN42W6S7FrK1vaPrTYyYZkfz2Zs8YUORrrNXpAhI40ungngGmDGnqYde4mAQlOm5grbEUnYyVUfNsr8uLPVls5wIXi2TPDuvlzpvxB7xOAuta6MrM+fS8= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1753184535; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=ZtBHyckLFU+FReIE1TwgxoajvyZ0FNCU8yRZKhlrmvo=; b=G1dtIrpxCSUNQmg9/EiUKcsddj6uZCAeFfZj82AB1Uczb8RjNcodvQIxAPEYiPqAsxshxWn51E/XydoAn/ObTRp3eXNdvJ55ddQx+s40PDyHDiBsYiPDBGQ9tPljSCVZL/yPn/rUds3oplgsd83Yc93L9wWbeknn1kspIwjDjWQ= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1753184535424616.18506604636; Tue, 22 Jul 2025 04:42:15 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1052284.1420947 (Exim 4.92) (envelope-from ) id 1ueBNY-0003rf-5P; Tue, 22 Jul 2025 11:41:52 +0000 Received: by outflank-mailman (output) from mailman id 1052284.1420947; Tue, 22 Jul 2025 11:41:52 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNY-0003rU-1N; Tue, 22 Jul 2025 11:41:52 +0000 Received: by outflank-mailman (input) for mailman id 1052284; Tue, 22 Jul 2025 11:41:50 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1ueBNW-0002RD-2p for xen-devel@lists.xenproject.org; Tue, 22 Jul 2025 11:41:50 +0000 Received: from AM0PR83CU005.outbound.protection.outlook.com (mail-westeuropeazlp170100001.outbound.protection.outlook.com [2a01:111:f403:c201::1]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id da7f7dff-66f0-11f0-a31d-13f23c93f187; Tue, 22 Jul 2025 13:41:49 +0200 (CEST) Received: from PAVPR03MB8946.eurprd03.prod.outlook.com (2603:10a6:102:32e::21) by AS2PR03MB10194.eurprd03.prod.outlook.com (2603:10a6:20b:5fc::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8943.30; Tue, 22 Jul 2025 11:41:45 +0000 Received: from PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc]) by PAVPR03MB8946.eurprd03.prod.outlook.com ([fe80::f12d:7394:bbe3:dfc%6]) with mapi id 15.20.8943.025; Tue, 22 Jul 2025 11:41:44 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: da7f7dff-66f0-11f0-a31d-13f23c93f187 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=rz1JK0mAS7P6eGQkGhI1Aa5vL6HyrB6voNdvugAu9TC39BwjSmcXwJp9fPsI0j0LwUWJeACBzOP57Ip1rtxuNJnfAJWAHIEDEkxb63zn29ncR0LK9z5LnyCWxZINog0pHu3aLfYB/K8gXE6KZuu6p+hETjkK50/ZttFqJTe86TtBtMBW9G6GlBw7b/erqAOu1dVa2tjxagRiMnA9BL1W5eoEI7Kud9R078pyIEhcywalFyjkQ0HzQkCy63B3UDlAylyNWAcTT6LTxsPJhKKmWECKNiMTYyhKK24Yp54bE77FNhXb2kAPMvV6T9loX66eUqygu6kxKuOMn8/ip/sWWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ZtBHyckLFU+FReIE1TwgxoajvyZ0FNCU8yRZKhlrmvo=; b=s0jF1MiEOU9fvMCn9XRauzYwFr++JUNpwRXGaEu3O+zRufsWA+RTFjWvlkbJGGVGbLBSoVByPRk4NV67rhmrYpUIIWm+dvh2JDh4O8ACdB1Cxbmp1HVVKWTB8QKUdjm15wIxn8ff9yqk0l+cFIuDEDGOycx6UmKdbRl8OAtx/XT7MomlKzpuWDBh94GjI+j3m59KFuCfPiwYlEuevQKac6RyocMOF93TwVO7yTPJkF4mwhD0ndITvaBuFbd3k/+OjbZBEJ5t3HEMKhAOnk9hfX4RZnFH0tCq/JWAd723C2tLPW18xt5aTpESkdg3FUNfPduXKOl8kLSTHaYvvqDHog== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZtBHyckLFU+FReIE1TwgxoajvyZ0FNCU8yRZKhlrmvo=; b=AKzB+VCtz3M3cVhzlXnDm3S17Z37yR3n4BE6FMwKND4qvY7kjlzT80Gr8Z+MckKCc8tYRRGbWV9l9weU8EpvlOr/qlTWqn4b8/NP9zVoROTKbIhiDQ1QNT4xnylX8Rb4146Gblf2dKwWMxexMo35V9O3oyR4FDNycSwCF9H/P9jq+VvfecIQ/UcadZfjmuyiQwQbuKfAzzbN972G5j17Nnh2ila0zSD7tkj/N+pdxiGuJrvkWo6sDaKUQarkgAk5U9VMdTPbdjAC74mh93sOhSls2/k946bwF7oFPusu5bLk7T1SHB9BFgQRVINT/3zqjTCdoGw6x52Mqv6XnVTzdw== From: Oleksii Moisieiev To: "xen-devel@lists.xenproject.org" CC: Andrew Cooper , Anthony PERARD , Bertrand Marquis , Jan Beulich , Juergen Gross , Julien Grall , Michal Orzel , Oleksii Moisieiev , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Stefano Stabellini , Volodymyr Babchuk , Grygorii Strashko Subject: [RFC PATCH v5 10/10] docs: arm: add SCI SCMI SMC multi-agent driver docs Thread-Topic: [RFC PATCH v5 10/10] docs: arm: add SCI SCMI SMC multi-agent driver docs Thread-Index: AQHb+v2YthkFbL0cM0C5xOxn1VGgFQ== Date: Tue, 22 Jul 2025 11:41:42 +0000 Message-ID: <79e357dbe97fbb8c8148e75fa65182e611665695.1753184487.git.oleksii_moisieiev@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB8946:EE_|AS2PR03MB10194:EE_ x-ms-office365-filtering-correlation-id: 7ef3e670-9df9-4e97-2eb8-08ddc914bb8b x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|366016|1800799024|7416014|376014|13003099007|38070700018; x-microsoft-antispam-message-info: =?iso-8859-1?Q?fj7DONMXw4jrxu+iRCYeEpGPhPaoTSKO6HIX9bL1DeB7b/2VEWarU8yEzG?= =?iso-8859-1?Q?bC8OfOBarSAytmmHMmQ0gD/uzzdTjvPV6VwNqJeX4nW7ewNGpnu3IQsj4U?= =?iso-8859-1?Q?RvKVl4DAXHRQMLPxSZIAeapCw8SG7HdN+TpjtUzLYb8ik5gvCejyWP/1pf?= =?iso-8859-1?Q?k5K219qQDb8my+MGuKYCXCJiJaKPDA5oYDhKlh2L4nofPkuPWGiEohxSfF?= =?iso-8859-1?Q?3raTi+kOV/BFnmab1Aql0HfK0BCt0S9cdf0f9Y5LJxUId5mTh4ApKrT0ec?= =?iso-8859-1?Q?cvq7bY3ASXJbbxgthqJmaHXSBRHNtx1zjCn5VF5w82IcU/GfTekbIqPaUx?= =?iso-8859-1?Q?Xj6C4YI567Cj3gKo99YG4upHf6fDmbKJmhuZRIVkWE3zb9Ho8NdeuSn15V?= =?iso-8859-1?Q?Crh/XoNYVsLakQRATXFZfCCyXzKEkw5dUeEX+bgOA0A2hcozuOS4m1bx9N?= =?iso-8859-1?Q?QLkjuLpWIYhyhDPlilN7rz/6xiGi4CpN1MZTH/JiKA4G9iurYz1LMpe4Pg?= =?iso-8859-1?Q?pTPxmu6rHMQmH/USiOeamyGYSlVLgoQ9cT6jnwY9ZHGbdf6Athq1a0Jni+?= =?iso-8859-1?Q?ABdFssqvsUnonCTuokZc3lHCP0vqEXd0Y8dglDxioxFOmfPI6SbwU8BSfH?= =?iso-8859-1?Q?66SRwhOiZt6HuO9cOYoFSSZ4e9f5biftNtM+cmohkgXcZQd8M+S16II8Sb?= =?iso-8859-1?Q?A56kBkcpj9IqmJ4biuK0slyx7kYj0cgxZAkZEgUeXjqDVa/psivlCHTpAi?= =?iso-8859-1?Q?RNIl93C80yJfH5quy7iVSDLBPKPWmJDoibDC2uK9llQ2Fxc/FV+C8fVsJU?= =?iso-8859-1?Q?DZSpFXvsnE3ZoySdS1VwaF1baJts1Be3giaaOM9U28kua8UShYi0WijHqr?= =?iso-8859-1?Q?WEa7iLcLAluqhb6YU0FvUl6nsX1dgY+9PQ0jr9UWNmkJDinujqpXDEsICY?= =?iso-8859-1?Q?qNCcRYmeXbpBEJQxwvAxQYfWnfYEBXy3Q6kQ2rX10DzvaZuITDPAVDOlG9?= =?iso-8859-1?Q?+ag9EoDJ8SzM94qHZH/uRo1isa+t7pHdGrNsa+AYrbEhwXkNyJE9Oy9Skk?= =?iso-8859-1?Q?YFUqHpz5gbtaNz0YpHWK8cpGNV6hh7HmaR7SwVvttWsje5V98GhsG7tvOp?= =?iso-8859-1?Q?xjISdEJTE1bdD9JwBt7k44DlAa/INbHwEkXt1qC/gnAG43WL2f7qk15TeE?= =?iso-8859-1?Q?ZkXzzCi0N1aosTMBIZzSW7nQqAJjvqNPXCyuSVZh3hiJSdJDQ26/o5tE7k?= =?iso-8859-1?Q?jKUeNMAtVDcmkCeUmq6O6PA6xuGV8mO2zRKMOJ6/9PMpvMtDFRm8Yll9O9?= =?iso-8859-1?Q?lQ6xEb+I/CtmeV2wYCOwc+HM4rXVA8nJwKoktYYzSLpxm7GL7SqsBoKXpo?= =?iso-8859-1?Q?8sCDPpv5T/H7yszMh27Yo1R5vfk9cZP9tkit7DxbgiWJYnJA5wp7VsQvPA?= =?iso-8859-1?Q?j19tAWcJyGJL4zwTtgT3CKwhTzxLMRequRsEA5zJaLYAgbpk/IpO9UX0mj?= =?iso-8859-1?Q?A=3D?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB8946.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(7416014)(376014)(13003099007)(38070700018);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?0TESWup1DPw23PB0uBS7nESjyYudP8+6r21EXNsHZM3Ia0iIBcAovzGa1/?= =?iso-8859-1?Q?ULVV9VsGTZVrKeTAuKBFH71RVTRBd77K6ozH8/jMD29YtEmG2WRZ32fpm+?= =?iso-8859-1?Q?eSxt/rAzo4x+NW2C1xpd1a3dO67Xiyu/B39EXW24HawUUD9oYv5Bl9TTf1?= =?iso-8859-1?Q?7qQ35XHtGPc7K203gkDWoihZZYm7D6jLjSnL2yFVlXcYKPgJeecyDhSAec?= =?iso-8859-1?Q?BYpxSJJIwxjnMkaZ3UtyWZ4zClifWM+w3FR6lgpOiuMTlCY2o3iyf7rO1J?= =?iso-8859-1?Q?diboAvRmJsaK/PD3Ad0WCxFycWNeMwY/63w1nfyUBsftCBTv76ZqNM3sYb?= =?iso-8859-1?Q?1EuuEU82lcId/02Y5LpsVpaBxfLoS5Y/ssauvRkWdPAJOaDxE33kU/fSpx?= =?iso-8859-1?Q?DOm+efeWewIqRXBnfPYy63QoaI3IfgB2VRsGb3GUDlvMVQ/ug8CAbRp7Kj?= =?iso-8859-1?Q?lNBmpUyxk9czvqQiyMaL6wAxy/FQXe0QSyTyNYQ4HyC67G0KshBA6ClDIO?= =?iso-8859-1?Q?iJq2V4+mtybXsencU20hV4X7XY2fADcdMyOpUwniCD9AT6lpwP56i+RCwE?= =?iso-8859-1?Q?GGJ3kXHSy+tsdzlFJ7a3sodTG5mu1V5SK6Bn4fwd6imrQjVVdK9Llz+YqL?= =?iso-8859-1?Q?vWNrL0cnzVB393FNPJvc80ov45fPFdzX1/NBUqi31oymeiApXdLZSRAk5s?= =?iso-8859-1?Q?5N+/CEgBHGOxnzbZjNqFWRkgtxgPBl94DWQQ9vX0E2/OCVCd/FNDgJRKe/?= =?iso-8859-1?Q?IRaP/LyJiuQO1MqYrM22Y/et4c0gtFcu+zyVvRcyamOtndsyGIpzE7yB++?= =?iso-8859-1?Q?6uISHO+hr8e1oJoGBZUq0+5xi/AXruB3GTCD7HxN77d+MShoioJ+9BN7ji?= =?iso-8859-1?Q?Jc/CdzK07e3HwTG73lpgEGZexj7bWPucv1OZ1hEuzfv3J7cjpGZW1NuM2f?= =?iso-8859-1?Q?ejvJI+PktmDxiSNLqmiwvsN6TLEeWJtQehbyTxVmWmdVQPQ2FX5tYeOnQo?= =?iso-8859-1?Q?ydwq8uyilbIV9bFxFpb1ZcKo+3adcmyJ+Gf3Rmxv/RD3s5vOfS3ZWDNECz?= =?iso-8859-1?Q?O27fZL5kS0KMzbwkNvcuWmYt6Dyxj+0fDnprL/uX9TqHS+7C3eB97qBOrC?= =?iso-8859-1?Q?4NzWaGeZWL+3qvfXxzTh1xbxKJi2ScdTFr1kU+saC2y7sJ9hCwvZnJq65R?= =?iso-8859-1?Q?v4moG9UWjXy3hJu3saKKNNSQpQppctlUQbtCYs1ODAv7EeSV0fRFWVVBsR?= =?iso-8859-1?Q?ZaOiTWkvIAevizwbIaDBe1OU7Evg5L5U75WEqbEH90YFMg44w+CgsSHAzN?= =?iso-8859-1?Q?Nhewb+OM4CKqDRb4eiASRWR/wmsDjQwQuht6YeCHzZBTG9HArjPIe8iKXs?= =?iso-8859-1?Q?3jdCxWM3n4fqyf4uOMHz2LCd1Qy02WRzSA+mn7DciO/qAp9jjcS3KUADSV?= =?iso-8859-1?Q?H1swmYNh17I6Z0v7w46ZM5tqKxTE8nzFEleLiW/w61gbqp4wXJMXYzfo30?= =?iso-8859-1?Q?RFm6tEhPb2WTFcQCK2sZLaaqWY99zZpyA5fCJb3YtiG4STHh0RataZACZ1?= =?iso-8859-1?Q?Bf74kJE1DK2Abtjtsszw6QtVcVDuRoz6JhvgEXbx6AgRNx+NtaIvVWSUso?= =?iso-8859-1?Q?/Ezy8ywbiLM10c4fqScO3J09gxBIUIUDTVpzaQWAHGKO8oXKcqc4zXIw?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB8946.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 7ef3e670-9df9-4e97-2eb8-08ddc914bb8b X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jul 2025 11:41:42.3906 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 4EB9b0qqc71irp/A155wllLivhcpLt1s0WXthAOIAWT0QsuTfB/8lRR6TxGET1M51pj8FV6cKgpZuCecO+/9T+TgYERuTo5YqaauyLR+fus= X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS2PR03MB10194 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1753184537529116600 Content-Type: text/plain; charset="utf-8" From: Grygorii Strashko Add SCI SCMI SMC multi-agent driver documentation. It includes a detailed description of the SCMI multi-agent driver. This document explains the driver's functionality, configuration, and the compilation process. The Xen SCMI multi-agent driver is designed to provide SCMI access to system resources from different domains. Signed-off-by: Oleksii Moisieiev --- Changes in v5: - rework multi-agent driver to leave Host Device-tree unmodified .../arm/firmware/arm-scmi.rst | 341 +++++++++++++++++- 1 file changed, 340 insertions(+), 1 deletion(-) diff --git a/docs/hypervisor-guide/arm/firmware/arm-scmi.rst b/docs/hypervi= sor-guide/arm/firmware/arm-scmi.rst index a084c0caa3..2ab56af879 100644 --- a/docs/hypervisor-guide/arm/firmware/arm-scmi.rst +++ b/docs/hypervisor-guide/arm/firmware/arm-scmi.rst @@ -31,7 +31,10 @@ domain serving as Driver domain). =20 The below sections describe SCMI support options available for Xen. =20 -[1] `Arm SCMI `_ +| [1] `Arm SCMI `_ +| [2] `System Control and Management Interface (SCMI) bindings `_ +| [3] `Generic Domain Access Controllers bindings `_ + =20 Simple SCMI over SMC/HVC calls forwarding driver (EL3) ------------------------------------------------------ @@ -175,3 +178,339 @@ enabling SCMI with "arm_sci" xl.cfg option. -> xen,reg =3D <0x0 0x47ff0000 0x0 0x1000 0x0 0x22001000>; -> xen,force-assign-without-iommu; }; + +SCMI SMC/HVC multi-agent driver (EL3) +------------------------------------- + +The SCMI SMC/HVC multi-agent driver enables support for ARM EL3 Trusted Fi= rmware-A (TF-A) which +provides SCMI interface with multi-agnet support, as shown below. + +:: + + +-----------------------------------------+ + | | + | EL3 TF-A SCMI | + +-------+--+-------+--+-------+--+-------++ + |shmem1 | |shmem0 | |shmem2 | |shmemX | + +-----+-+ +---+---+ +--+----+ +---+---+ + smc-id1 | | | | + agent1 | | | | + +-----v--------+---------+-----------+----+ + | | | | | + | | | | | + +--------------+---------+-----------+----+ + smc-id0 | smc-id2| smc-idX| + agent0 | agent2 | agentX | + | | | + +----v---+ +--v-----+ +--v-----+ + | | | | | | + | Dom0 | | Dom1 | | DomX | + | | | | | | + | | | | | | + +--------+ +--------+ +--------+ + +The EL3 SCMI multi-agent firmware expected to provide SCMI SMC/HVC shared-= memory transport +for every Agent in the system. The SCMI Agent transport channel defined by= pair: + +- smc-id: SMC/HVC function id used for Doorbell +- shmem: shared memory for messages transfer, **Xen page aligned**. + Shared memory is mapped with the following flags: MT_DEVICE_nGnRE and _P= AGE_DEVICE, indicating that this + memory is mapped as device memory. + +The following SCMI Agents expected to be defined by SCMI FW to enable SCMI= multi-agent functionality +under Xen: + +- Xen management agent: trusted agents that accesses to the Base Protocol = commands to configure + agent specific permissions +- OSPM VM agents: non-trusted agent, one for each Guest domain which is a= llowed direct HW access. + At least one OSPM VM agent has to be provided by FW if HW is handled onl= y by Dom0 or Driver Domain. + +The EL3 SCMI FW expected to implement following Base protocol messages: + +- BASE_DISCOVER_AGENT (optional if agent_id was provided) +- BASE_RESET_AGENT_CONFIGURATION (optional) +- BASE_SET_DEVICE_PERMISSIONS (optional) + +The number of supported SCMI agents and their transport specifications are= SCMI FW implementation +specific. + +Compiling with multi-agent support +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +To build with the SCMI SMC/HVC multi-agent driver support, enable Kconfig = option: + +:: + + CONFIG_SCMI_SMC_MA + + +Driver functionality +^^^^^^^^^^^^^^^^^^^^ + +The SCI SCMI SMC multi-agent driver implements following functionality: + +- The driver is initialized based on the ``xen,config`` node under ``chose= n`` + (only one SCMI interface is supported), which describes the Xen manageme= nt + agent SCMI interface. + +.. code:: + + scmi_shm_1: sram@47ff1000 { + compatible =3D "arm,scmi-shmem"; + reg =3D <0x0 0x47ff1000 0x0 0x1000>; + }; + scmi_xen: scmi { + compatible =3D "arm,scmi-smc"; + arm,smc-id =3D <0x82000002>; <--- Xen manegement agent smc-id + #address-cells =3D < 1>; + #size-cells =3D < 0>; + #access-controller-cells =3D < 1>; + shmem =3D <&scmi_shm_1>; <--- Xen manegement agent shmem + }; + +- The driver obtains Xen specific SCMI Agent's configuration from the Host= DT, probes Agents and + builds SCMI Agents list. The Agents configuration is taken from "scmi-se= condary-agents" + property where first item is "arm,smc-id", second - "arm,scmi-shmem" pha= ndle and third is + optional "agent_id": + +.. code:: + + chosen { + ranges; <--- set default ranges so address can be translated when pa= rsing scmi_shm node + xen,config { + ranges; <--- set default ranges so address can be translated when = parsing scmi_shm node + scmi-secondary-agents =3D < + 0x82000003 &scmi_shm_0 0 + 0x82000004 &scmi_shm_2 2 + 0x82000005 &scmi_shm_3 3 + 0x82000006 &scmi_shm_4 4>; + #scmi-secondary-agents-cells =3D <3>; <--- optional, default 3 + + scmi_shm_0 : sram@47ff0000 { + compatible =3D "arm,scmi-shmem"; + reg =3D <0x0 0x47ff0000 0x0 0x1000>; + }; + + scmi_shm_2: sram@47ff2000 { + compatible =3D "arm,scmi-shmem"; + reg =3D <0x0 0x47ff2000 0x0 0x1000>; + }; + scmi_shm_3: sram@47ff3000 { + compatible =3D "arm,scmi-shmem"; + reg =3D <0x0 0x47ff3000 0x0 0x1000>; + }; + scmi_shm_4: sram@47ff4000 { + compatible =3D "arm,scmi-shmem"; + reg =3D <0x0 0x47ff4000 0x0 0x1000>; + }; + + // Xen SCMI management channel + scmi_shm_1: sram@47ff1000 { + compatible =3D "arm,scmi-shmem"; + reg =3D <0x0 0x47ff1000 0x0 0x1000>; + }; + + scmi_xen: scmi { + compatible =3D "arm,scmi-smc"; + arm,smc-id =3D <0x82000002>; <--- Xen manegement agent smc-id + #address-cells =3D < 1>; + #size-cells =3D < 0>; + #access-controller-cells =3D < 1>; + shmem =3D <&scmi_shm_1>; <--- Xen manegement agent shmem + }; + }; + }; + + /{ + // Host SCMI OSPM channel - provided to the Dom0 as is if SCMI ena= bled for it + scmi_shm: sram@47ff1000 { + compatible =3D "arm,scmi-shmem"; + reg =3D <0x0 0x47ff1000 0x0 0x1000>; + }; + + firmware { + scmi: scmi { + compatible =3D "arm,scmi-smc"; + arm,smc-id =3D <0x82000003>; <--- Host OSPM agent smc-id + #address-cells =3D < 1>; + #size-cells =3D < 0>; + shmem =3D <&scmi_shm>; <--- Host OSPM agent shmem + + protocol@X{ + }; + }; + }; + }; + + This approach allows defining multiple SCMI Agents by adding Xen-specifi= c properties under + the ``/chosen`` node to the Host Device Tree, leaving the main part unch= anged. The Host DT + SCMI channel will be passed to Dom0. + + The Xen management agent is described as a ``scmi_xen`` node under the `= `/chosen`` node, which + is used by Xen to control other SCMI Agents in the system. + + All secondary agents' configurations are provided in the ``scmi-secondar= y-agents`` property with + an optional ``agent_id`` field. + + The ``agent_id`` from the ``scmi-secondary-agents`` property is used to = identify the agent in the + system and can be omitted by setting ``#scmi-secondary-agents-cells =3D = <2>``, so the Secondary + Agents configuration will look like this: + +.. code:: + + chosen { + xen,config { + scmi-secondary-agents =3D < + 0x82000003 &scmi_shm_0 + 0x82000004 &scmi_shm_2 + 0x82000005 &scmi_shm_3 + 0x82000006 &scmi_shm_4>; + #scmi-secondary-agents-cells =3D <2>; + }; + } + + In this case, Xen will use the ``SCMI_BASE_DISCOVER_AGENT`` call to disc= over the ``agent_id`` + for each secondary agent. Providing the ``agent_id`` in the ``scmi-secon= dary-agents`` property + allows skipping the discovery call, which is useful when the secondary a= gent's shared memory is + not accessible by Xen or when boot time is important because it allows s= kipping the agent + discovery procedure. + +.. note:: + + Note that Xen is the only one entry in the system which need to know a= bout SCMI multi-agent support. + +- The driver implements the SCI subsystem interface required for configuri= ng and enabling SCMI + functionality for Dom0/hwdom and Guest domains. To enable SCMI functiona= lity for guest domain + it has to be configured with unique supported SCMI Agent_id and use corr= esponding SCMI SMC/HVC + shared-memory transport ``[smc-id, shmem]`` defined for this SCMI Agent_= id. + +- Once Xen domain is configured it can communicate with EL3 SCMI FW: + + - zero-copy, the guest domain puts/gets SCMI message in/from shmem; + - the guest triggers SMC/HVC exception with agent "smc-id" (doorbell); + - the Xen driver catches exception, do checks and synchronously forwards= it to EL3 FW. + +- the Xen driver sends BASE_RESET_AGENT_CONFIGURATION message to Xen manag= ement agent channel on + domain destroy event. This allows to reset resources used by domain and = so implement use-case + like domain reboot. + + +Configure SCMI for Dom0 +^^^^^^^^^^^^^^^^^^^^^^^ +The **"dom0_scmi_agent_id=3D"** Xen command line is used to= enable SCMI functionality for +Dom0. if not provided SCMI will be disabled for Dom0 and all SCMI nodes re= moved from Dom0 DT. + +Xen utilizes Host DT SCMI node to configure Dom0 SCMI Agent so the device-= tree remains unchanged +except for the Xen specific properties under ``/chosen`` node. If Xen devi= ce-tree doesn't include +``/firmware/scmi`` node or it's disabled, the Dom0 SCMI Agent will not be = configured. + +.. note:: + + The **dom0_scmi_agent_id** value should match the ``func_id`` and ``sh= mem`` in the ``/firmware/scmi`` node + to set the correct Dom0 SCMI Agent. + +Configure SCMI for for guest domain with toolstack +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +* In domain's xl.cfg file add **"arm_sci"** option as below + +:: + + arm_sci =3D "type=3Dscmi_smc_multiagent,agent_id=3D2" + +* In domain's xl.cfg file enable access to the "arm,scmi-shmem" which shou= ld correspond + assigned "agent_id" for the domain, for example: + +:: + + iomem =3D [ + "47ff2,1@22001", + ] + +.. note:: It's up to the user to select guest IPA for mapping SCMI shared-= memory. + +* Add SCMI nodes to the Driver domain partial device tree as in the below = example. + The "arm,smc-id" should correspond assigned agent_id for the domain: + +.. code:: + + passthrough { + scmi_shm_0: sram@22001000 { + compatible =3D "arm,scmi-shmem"; + reg =3D <0x0 0x22001000 0x0 0x1000>; + }; + + firmware { + compatible =3D "simple-bus"; + scmi: scmi { + compatible =3D "arm,scmi-smc"; + arm,smc-id =3D <0x82000004>; + shmem =3D <&scmi_shm_0>; + ... + } + } + } + +**Device specific access control** + +The XEN SCMI SMC/HVC multi-agent driver performs "access-controller" provi= der function in case +EL3 SCMI FW implements SCMI "4.2.1.1 Device specific access control" and p= rovides the +BASE_SET_DEVICE_PERMISSIONS command to configure the devices that an agent= s have access to. +The Host DT SCMI node should have "#access-controller-cells=3D<1>" propert= y and DT devices should +be bound to the SCMI node using Access Controllers bindings [3]. + +For example: + +.. code:: + + &i2c1 { + access-controllers =3D <&scmi 0>; + }; + +Use domain's xl.cfg file **"dtdev"** property to assign SCMI devices from = toolstack to the guest: + +:: + + dtdev =3D [ + "/soc/i2c@e6508000", + ] + +.. note:: + + xl.cfg:"dtdev" need contain all nodes which are under SCMI management = (not only those which are + behind IOMMU) and passed-through to the guest domain. + +Configure SCMI for predefined domains (dom0less) +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ + +* add "xen,sci_type" and "xen,sci_agent_id" properties for required DomU (= "xen,domain") node + +:: + + xen,sci_type=3D"scmi_smc_multiagent" + xen,sci_agent_id=3D2 + +* add scmi nodes to the Driver domain partial device tree the same way as = above (toolstack case) and + enable access to the "arm,scmi-shmem" according to the dom0less document= ation. For example: + +.. code:: + + scmi_shm_0: sram@22001000 { + compatible =3D "arm,scmi-shmem"; + reg =3D <0x00 0x22001000 0x00 0x1000>; + -> xen,reg =3D <0x0 0x47ff0000 0x0 0x1000 0x0 0x22001000>; + -> xen,force-assign-without-iommu; + }; + +* For SCMI device access control configure pass-through devices in the gue= st partial DT according to + the dom0less documentation and ensure that devices SCMI management has "= xen,path" property set: + +.. code:: + + i2c@e6508000 { + ... + reg =3D <0x00 0xe6508000 0x00 0x1000>; + -> xen,path =3D "/soc/i2c@e6508000" + -> xen,reg =3D <0x0 0xe6508000 0x0 0x1000 0x0 0xe6508000>; + -> xen,force-assign-without-iommu; + }; --=20 2.34.1