From nobody Wed Nov 19 01:56:09 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1763473025; cv=pass; d=zohomail.com; s=zohoarc; b=eB45FhNNG8GmDFs+XrAfC+v4yEAh7+lNf6+a7webgxhGHEpxuIgvtNrdWOqtleF8ZjY6MhhxxhSZWlyqvUC7QDFExxI1KNwBv9DIOK5/pKTjRQDjINpeUMzXBb+kUiS4uJqQ4CqM+nIQaXRFjiBopa4ujyjOZB1eeQqMuTeponk= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1763473025; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=1vRvEsWL7V7SfwuRrWI4RoI5phHznft2v1SB3Ac0yZo=; b=J9W3gmDuM+MzJiDHKTMMmZlUEf4WyNH+QJLzrNg+SlOkb/A0Lq09qyQzKgrz6Is5OkhCqjMK/JCg+Mj5BaTyYcHUJlnfR/BiVWEJre19vyMabSSZ9K6CDLj02l5CtZnI1z9PZOjuVCB8loVyrtFRI1v1rBx7fYXQ/xSRtbmiL2Q= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1763473025721822.8518896414364; Tue, 18 Nov 2025 05:37:05 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1164701.1491614 (Exim 4.92) (envelope-from ) id 1vLLsv-0004r8-QR; Tue, 18 Nov 2025 13:36:41 +0000 Received: by outflank-mailman (output) from mailman id 1164701.1491614; Tue, 18 Nov 2025 13:36:41 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vLLsv-0004qy-NA; Tue, 18 Nov 2025 13:36:41 +0000 Received: by outflank-mailman (input) for mailman id 1164701; Tue, 18 Nov 2025 13:36:40 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vLLst-0004PV-Vn for xen-devel@lists.xenproject.org; Tue, 18 Nov 2025 13:36:39 +0000 Received: from AM0PR83CU005.outbound.protection.outlook.com (mail-westeuropeazlp170100001.outbound.protection.outlook.com [2a01:111:f403:c201::1]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 99ed07c6-c483-11f0-980a-7dc792cee155; Tue, 18 Nov 2025 14:36:35 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by AM9PR03MB7217.eurprd03.prod.outlook.com (2603:10a6:20b:26d::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9320.21; Tue, 18 Nov 2025 13:36:33 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb%7]) with mapi id 15.20.9320.013; Tue, 18 Nov 2025 13:36:33 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 99ed07c6-c483-11f0-980a-7dc792cee155 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=kENiPLSTa3E9uqrp1UWAOoBLPwGrXyQsmWNqHiccGolIxUp+byS3II0XMzaGuD4Dj8ifPN3+L5dAye4Z8hyQe2FkxjYTebdgg9khOQCZJ6Km8PH2pN9FTRO3vKSdim0cn9SG5BiFqc3mhT19341ar4k8opa/e/OPDcHzChcEY6Zf1SACEaOcpott2uf8nla07VSW3faun3mKAUfKgLBRJKLo3m1z1AAL/kj6mPW+YdCgGgH5hxTZnJQChA2w8kvIzlgVv8jMzEo2jGlcPq7lA4hcDodx/LHhY4MGpqQYbw0SyXwQq4eKZookWrbfZo2qmiYgLV2ZYhrSDCwy281B9Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=1vRvEsWL7V7SfwuRrWI4RoI5phHznft2v1SB3Ac0yZo=; b=KW+4LQL+q1j+/OjdHWEwVFaDvsoblvgkPkztW9lHUgQWzkEEHDhK00fGS74KhdmkooYHKssKUUVAES+aDpYw4CZPOOQ/y1dcUR0Mef8b3sTNFdaVKQ8HA7ugUqq6pKhwOESnLhv0Yp3dMpoMEfemYiSdTa8xPe/JM87KmXoOMU9jPGMLRW7BX+ZnH5oeo+c9HhE7sN2EAlOq0LCgn0e39ZwjD5gnlC+jzcN+kyDIvoiKiX/xz+Egb1eZZIpD0WPulT2DvOo5n62RzTLN8S7aF1bqcPeXqqsCVK7n0xwFWYZt8es8aym/Nu6IC1XClJNiNykNN8nBOUyWJUmqbcEE6g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1vRvEsWL7V7SfwuRrWI4RoI5phHznft2v1SB3Ac0yZo=; b=Qrx4I5fjhHs6dQM5Gf+cOCFzrvJNX8P2gwmmA6bIwrBhvS6s729+0MX/0pwsszUggmbawuEBsxhdz+6IwW20gaRWbAKMoFpfXoYhp73sH7pv8eaaZGsXgsVMBdIGgNLXHNTZmOR9w19DVcVHXmS2jN1bfVGaMnceEUxUhaYKmISjryJlQ1wi0DhKCqtNkD1biCh4dKIXpLzrBzoPVktXbzimpNQANKqqdeD0icXu/CBgehINHg6IZ+2FZmbiU1MTc6hB/PUpOuW0EEFjXHYY3sNfLUgISGBohj5g6A3wKfj9SQWqKCTjQkLgr4lgIp0CUpeYG+UwhWCIC1yxDewADA== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Edward Pickup , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , Julien Grall , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Stefano Stabellini , Bertrand Marquis , Volodymyr Babchuk , Luca Fancellu , Stewart Hildebrand , Mykyta Poturai Subject: [PATCH v3 1/8] arm/pci: Add pci-scan boot argument Thread-Topic: [PATCH v3 1/8] arm/pci: Add pci-scan boot argument Thread-Index: AQHcWJBa0sfFMet/uEihbNa8Xr70/w== Date: Tue, 18 Nov 2025 13:36:32 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|AM9PR03MB7217:EE_ x-ms-office365-filtering-correlation-id: 95ad61a9-7623-49f2-a451-08de26a77cee x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|366016|376014|7416014|38070700021; x-microsoft-antispam-message-info: =?iso-8859-1?Q?4PspFay2F7E93wGxuc2TfA6ZsyhSEgl3LKOeZOuqdKwyDUYoc4XOG+4KLw?= =?iso-8859-1?Q?SqpbLFbcva9+dJLiihLs/AMB3HSYzTqtI2kcFfUZK5LM/3104CO/RPYbKe?= =?iso-8859-1?Q?YDkYQ/+oTm2JcdVRCC0+YnbXXO1ygohFKiFdbv3mhQfsQ7YN6d9BQIqsmL?= =?iso-8859-1?Q?HUIXcEAKp87JPBsCabV4jZKGYffUQHBKwUrHcSvGD9BKAIzC3G1WyuMZVO?= =?iso-8859-1?Q?1K0rskbBBJvDPTtein3QXDeUxsTjppGo+FN6VxZskNYlR5Sz9MKmun+knP?= =?iso-8859-1?Q?BDqd4XylBh98ikZx9F99XG4lKsuvFE2jKPNOj92+7LxOtNEw62u2aB2Q/8?= =?iso-8859-1?Q?qZWnCy0XVGEaQpuZerUbfXDgRHf3/9XEtqJewgXWfn9j1qtzO9OkMFIt07?= =?iso-8859-1?Q?J14dGSDYZ7WZeeOM/eK9GKzra2ZW50OKWu9M6C7ag4Unv9cpvXnqmBoSpb?= =?iso-8859-1?Q?VnzcZ7perd336CW1XLwJYr4ss43LEH+MvdW3tofvQ4fdBeHKk4v1af989+?= =?iso-8859-1?Q?cqei3vnruEsZ1rYT0qV18rrWjHHZRlWu3S0EZ8soVJ0uBpgDq93j+H5tGT?= =?iso-8859-1?Q?LkBJ5BjQV/qB845UR/ATjCmd2I4Io+K1T8wdeLbbnE80vkm6eDXWXI2FBS?= =?iso-8859-1?Q?ghf8fkCk6+CHaO6Dzll5IJOIHM+oJqjbpvTIPSfGKhrlzue328obkhKnJX?= =?iso-8859-1?Q?sWHPDswKgPKMrKbzfRpC09SsMf4CyBG+eVUw8KQuz7o2LZNh7HpDPjzvzD?= =?iso-8859-1?Q?Fg0emtBK/Y8if4HULSIAdcKsxtZLGmi9nO0zyMLEDef+n6URSSXYhgn7c6?= =?iso-8859-1?Q?YRXUz/2iwt06p2Ta3RY/7Rx64T4ACnn6IOlPJZ7azwdzCbfWVd9cl+t/Y4?= =?iso-8859-1?Q?tXvSv+J1mDwKFqFMlCQcqTZgkJRf61poZ4wNBlGE8w7S+hVamILDEihYbp?= =?iso-8859-1?Q?IY5PCDK7cxvfp1vwhSYEuyQ5eRBj+jGu5B9oZzRWM4dbi6kiYEVOgPWknP?= =?iso-8859-1?Q?T9U86lZTIjR+JxTmrK1yr5nLB8sLVarT2EH+nDcO8YHjlgAZsv6sPKZCXx?= =?iso-8859-1?Q?Auf3gsmWpPV3hy4sYY4fOPJO319rSNFCg6DpkJ3l+OPXlZdp/MuciHPCov?= =?iso-8859-1?Q?loihqICwlSK/f1JKyRJzVhNuLcCBNP04WGINDaXQJ4mNISk5r/nPJy3YPg?= =?iso-8859-1?Q?nfy7TNlQf/KtnHX9PhPIkIQSg1RvVW3OpBmMn6K0p+2TyIhwzg2fbQQ0NC?= =?iso-8859-1?Q?qVjNybC8OMf5h8SD0Gdre7DErS87CdqHSc0r5FNgHzVzB9hnX5uqrhtth8?= =?iso-8859-1?Q?n9yqm8Udqnc2sgy9ilkWIRjzFbichQrzdv1N94KSJJoU8bx39Wv4QDW5ln?= =?iso-8859-1?Q?hPilMUSetRuOs2opWGKqLZHOWMZeUgKelm09xaPXHa51872/tVBHxhqfp7?= =?iso-8859-1?Q?rdIyCalS+Q1HNXNcWQZmQNNvgtgbU/Ov0JE0tkHhejxPo0jWiNLvsk/fRW?= =?iso-8859-1?Q?tIdfMFbiGGwCHjfzR82Xc/5Ur2H553e2qRxmeofFUL0CLI6qIm0nC4ZPsU?= =?iso-8859-1?Q?jj5RklbVR72WUMfGBENduHs8kY6c?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014)(7416014)(38070700021);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?29/JFNnYcdYuRFwiJWbTgWD2WpS3Z+8HTNRgk7rBgEsNEfzeLqOPOTOSZW?= =?iso-8859-1?Q?fip8MjdoPlB3d4gLZmMGpgmXBm30te/TKVzwymu7IfIFGNFU7jRxUurWLK?= =?iso-8859-1?Q?3GnOrlIbq7GSl2AoBnTs7znjVcnsmkyJpaUdk05gtrMir1ap3GLVdTrLV2?= =?iso-8859-1?Q?r9xM5pCneSqh+KakY+P73BvSQ7c6k9H7CguuM5uGnJOSN8TbHdiz8nLS4c?= =?iso-8859-1?Q?I6Uq0+FCS+tmVr+tellL74slqVloz4YPWQKvLOLPkOhnRgz3yo+iu40E8d?= =?iso-8859-1?Q?7pgGkBLL2cRSGU2CNrjdvetmVBeBGLu1bzKiDPk2mQueJ34X7E5hzt+sbm?= =?iso-8859-1?Q?spfsqNfi4ds41+mcPv3e0tFHfKYTx8bXrUAS6Q8mwGX8Zc/yIYND5RW5p8?= =?iso-8859-1?Q?O/BOQ+H5qccWHi6bpass9C1XOBXRCMRUK8lyPsegK2b9KHQEnDclpt/JdW?= =?iso-8859-1?Q?vJHF6fvqGqoXw3QiY0dp9tJh3hNO3gc/A4GB/PDF71TJf7F8OdVn9QUf0a?= =?iso-8859-1?Q?m8+Xc1i9OCVZI2jGzlEdk1GodOuB1cMmdXdJ7YOXf2tiXQy/jeWRSJ7PtQ?= =?iso-8859-1?Q?ikseZDdg613ogJqUHM2RHikYMYfLc9F9XC9IBVyf27hSHUrAv9TDFuWo8J?= =?iso-8859-1?Q?rxbjdMNpvAe90rVaZ15oVhZesvFj04yZ3bULDx7HybdTzKXCR3J1bEeC7u?= =?iso-8859-1?Q?J4+kHk/2WuggEvu72JLf0SPMI6Ydg7cEsLdj2UUsimYbmsEleHt2+QgsuE?= =?iso-8859-1?Q?PFqgxA3fPq6/7NqCknVVaJ95sw3Ef11r31MKwl5MAxXxkSX1QXrXrnnkk/?= =?iso-8859-1?Q?gTKAdlTT+09VbnsYtvb/iw8aNSyA8kovz8z/ttbOCuSBsBQAPmYcAbwGUJ?= =?iso-8859-1?Q?KUThmd+u8xC3eQxf9a7pa5/Yt2GEpBY5KWFFaAuLxID9vFsX2iWw4dCQ0q?= =?iso-8859-1?Q?hdQlEzrSLOoF99bMdgHSdq28nrgYP+ZHiZUyapW3wWWGGS1Hrem+pfIKWR?= =?iso-8859-1?Q?yrySpClRfejQ+NqQDuVxSPkVuT2lu8UwrRVwlsaUSqu1Q4WHGh7KiQWCNv?= =?iso-8859-1?Q?GFB8XSFAKDw+wIsTKMGwLhLwbUdYXtgV3bfO7P0GbK5FOxzzEVy+FcfoEW?= =?iso-8859-1?Q?Y3eecqp430/mnhx7E2k5NC54RWxEzonK3YAdl/Yy013QE+0ycD2QCQ62LO?= =?iso-8859-1?Q?2erycQ5VBaZU0fVESpyqFgh3zHNGrqDJY11eMNwv867A5dy08SrlrTOjcB?= =?iso-8859-1?Q?apMHeRjzFnTr0EA6VjcwnJNGdKUvoGVfl02ebRtTc7HtBx/nbjwqFZeJOq?= =?iso-8859-1?Q?6B50rMnvOM4wZK/Czr6bylKulVuUnms9XQv3FW6RmGD7AJN5G3kFnFsgS0?= =?iso-8859-1?Q?FAfigcICwkqO+milYcl+eCxPfg7yPDdg8qlreII5SLxVRzLUCDhXlGAW3j?= =?iso-8859-1?Q?5F57gKz15dnBtd7iEbePf90TmF9OAKz/gTnCpXUaQk9Pb6a5WjMqy2oOZ4?= =?iso-8859-1?Q?uZ8sC10X2S9TYWHoF3eGBzP5OUhjBn800j8JMiigx0t6l9gfc9IVVzevmd?= =?iso-8859-1?Q?oWUaLAg6zUGTSo2ggaMsDqd7AvX7lpQpma9Z5qShuKPnnKvPiEYVIEsAof?= =?iso-8859-1?Q?wQEY1G8k0Hgoe8LWhsOFqV2hNY4TN0Dqw+YxDPHLGiwHjMZqdlFUguCA?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 95ad61a9-7623-49f2-a451-08de26a77cee X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Nov 2025 13:36:32.9951 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: G0CYuTMz9kNj0CYwMf7Fm4CXCRvx0pRSlA6rGmMO5l02PVO92NNXBRSfvHSGs5Hl4sADPYBGGaB2SwgcICvg6g== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR03MB7217 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1763473027305158500 Content-Type: text/plain; charset="utf-8" From: Edward Pickup This patch adds a Xen boot arguments that, if enabled, causes a call to existing code to scan pci devices enumerated by the firmware. This will be needed ahead of dom0less support for pci passthrough on arm. Signed-off-by: Luca Fancellu Signed-off-by: Stewart Hildebrand Signed-off-by: Mykyta Poturai --- v2->v3: * add define for cases when HAS_PCI is not set v1->v2: * remove dead code * don't return errors from pci_init, but report them changes from previous series: * remove is_pci_scan_enabled wrapper * make pci_scan_enabled ro_after_init * drop debug prints * drop Edward's SOB --- docs/misc/xen-command-line.pandoc | 7 +++++++ xen/arch/arm/include/asm/pci.h | 2 ++ xen/arch/arm/pci/pci-host-common.c | 1 + xen/arch/arm/pci/pci.c | 29 +++++++++++++++++++++++++++-- 4 files changed, 37 insertions(+), 2 deletions(-) diff --git a/docs/misc/xen-command-line.pandoc b/docs/misc/xen-command-line= .pandoc index 34004ce282..e5f7275bdc 100644 --- a/docs/misc/xen-command-line.pandoc +++ b/docs/misc/xen-command-line.pandoc @@ -2079,6 +2079,13 @@ This option can be specified more than once (up to 8= times at present). =20 Flag to enable or disable support for PCI passthrough =20 +### pci-scan (arm) +> `=3D ` + +> Default: `false` + +Flag to enable or disable Xen PCI scan at boot. + ### pcid (x86) > `=3D | xpti=3D` =20 diff --git a/xen/arch/arm/include/asm/pci.h b/xen/arch/arm/include/asm/pci.h index 08ffcd4438..0680b2f50c 100644 --- a/xen/arch/arm/include/asm/pci.h +++ b/xen/arch/arm/include/asm/pci.h @@ -155,6 +155,8 @@ bool arch_pci_device_physdevop(void); =20 #else /*!CONFIG_HAS_PCI*/ =20 +#define pci_scan_enabled false + struct pci_dev; =20 static inline void arch_pci_init_pdev(struct pci_dev *pdev) {} diff --git a/xen/arch/arm/pci/pci-host-common.c b/xen/arch/arm/pci/pci-host= -common.c index 487c545f3a..d3481b05eb 100644 --- a/xen/arch/arm/pci/pci-host-common.c +++ b/xen/arch/arm/pci/pci-host-common.c @@ -284,6 +284,7 @@ pci_host_common_probe(struct dt_device_node *dev, } =20 pci_add_host_bridge(bridge); + pci_add_segment(bridge->segment); =20 return bridge; =20 diff --git a/xen/arch/arm/pci/pci.c b/xen/arch/arm/pci/pci.c index beb1f971fa..49ee003c5e 100644 --- a/xen/arch/arm/pci/pci.c +++ b/xen/arch/arm/pci/pci.c @@ -91,8 +91,14 @@ bool arch_pci_device_physdevop(void) bool __read_mostly pci_passthrough_enabled; boolean_param("pci-passthrough", pci_passthrough_enabled); =20 +/* By default pci scan is disabled. */ +static __ro_after_init bool pci_scan_enabled; +boolean_param("pci-scan", pci_scan_enabled); + static int __init pci_init(void) { + int ret; + /* * Enable PCI passthrough when has been enabled explicitly * (pci-passthrough=3Don). @@ -104,9 +110,28 @@ static int __init pci_init(void) panic("Could not initialize PCI segment 0\n"); =20 if ( acpi_disabled ) - return dt_pci_init(); + ret =3D dt_pci_init(); else - return acpi_pci_init(); + ret =3D acpi_pci_init(); + + if ( ret < 0 ) + { + printk(XENLOG_ERR "PCI: Failed to initialize PCI host bridges (rc= =3D%d)\n", ret); + return 0; + } + + if ( pci_scan_enabled ) + { + ret =3D scan_pci_devices(); + + if ( ret < 0 ) + { + printk(XENLOG_ERR "PCI: Failed to scan PCI devices (rc=3D%d)\n= ", ret); + return 0; + } + } + + return 0; } __initcall(pci_init); =20 --=20 2.51.2 From nobody Wed Nov 19 01:56:09 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1763473035; cv=pass; d=zohomail.com; s=zohoarc; b=VJsQV5gjgMtIe0BqZUV2JEnTqXCc9m6gLvspgTFJ8Cf18y8qXBaevouOIaG+owHX5Xi0uXNj2vNpTikIv1D7FwToA/xD180/0ZnQUrHRhFjSd9KRUBj1JZvjtvJ8FONkkFo4Suyy/9H+CHZtD3HGk+d+HN9y01bHivFLZVxLr7k= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1763473035; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=/XEVTCh2kUTAALOQ+qR0XRxV/rN9vWfIGZCISaZjGHU=; b=eR40p923UUfuFfpMdIIUy1RnYDdZ7L2dd1couFbQmslk4yqBtciLF1S4YXu++Rei+N76U+nl1PDI0mG4BMa3WOsfa+8k0d0JA20u1SbCwPPTzmZeekJFV7NjXMdFztB37QGhGEw44Lkxihz5kxhx3LM6P1Shb4MTjOveDijryfo= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1763473035074830.6487661627647; Tue, 18 Nov 2025 05:37:15 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1164703.1491629 (Exim 4.92) (envelope-from ) id 1vLLsx-00057k-9x; Tue, 18 Nov 2025 13:36:43 +0000 Received: by outflank-mailman (output) from mailman id 1164703.1491629; Tue, 18 Nov 2025 13:36:43 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vLLsx-00056W-5b; Tue, 18 Nov 2025 13:36:43 +0000 Received: by outflank-mailman (input) for mailman id 1164703; Tue, 18 Nov 2025 13:36:41 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vLLsv-0004PV-Q0 for xen-devel@lists.xenproject.org; Tue, 18 Nov 2025 13:36:41 +0000 Received: from AM0PR83CU005.outbound.protection.outlook.com (mail-westeuropeazlp170100001.outbound.protection.outlook.com [2a01:111:f403:c201::1]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 9cc9271e-c483-11f0-980a-7dc792cee155; Tue, 18 Nov 2025 14:36:39 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by AM9PR03MB7217.eurprd03.prod.outlook.com (2603:10a6:20b:26d::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9320.21; Tue, 18 Nov 2025 13:36:33 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb%7]) with mapi id 15.20.9320.013; Tue, 18 Nov 2025 13:36:33 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 9cc9271e-c483-11f0-980a-7dc792cee155 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=WOlHA6XMDxKFhvyBH4YSvI2OIvdsiltn4k5bzRsiOan8ojX5PWlKWw0PPpzzJgShFvlwCAeOfREPCn/0Y5TtX6pWlPTzWOSIM7/nLT4bce/oBeXMjx/BB1Ow8BlHrsAeTrvU/Y6A81s1M3+twE7BsLSzJkP4C7GLSdgeGTVZzgUxhqrpvFLdgKGE+5LUfwgrGJCMmTex/2Gv0UTWW9+hC2m2kdDfdUQYRra9s4b/kn5YEdWSCFFHl5b7z0n+7OKBAf+LLP6+bQlwn0Imu8wlW5os7w4YVh1iIuqpgf0P+Ij/DmLnmcIYS41eSj4nYGZDGrkyemzeaaBg93vUsvHteQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=/XEVTCh2kUTAALOQ+qR0XRxV/rN9vWfIGZCISaZjGHU=; b=HYoHkDv8D4nkSF+llzhuKIeeRKwR/b0d6wqADQvoGHYoto0trUyxtgLE1KW+seiu84B00lo5GziEsClTwju2gwyumjf5T1F2pIKmwCprKf6pXNGzFZuKFsj7oseF6uFuLeI1baBdgG3EYN4JHUfGG5PRKUo+aTqC5+uvzTjt0AWXNHQvj45XqxwLYEZzf9Jo5Z4sychXXAzCY3Kc9vRev7rcNXsfaD3h5p01OQuVM1rp8Or9to6yv8ha/m9eSOsH1ppNpYiRQlkoTqvHE/E1EkjxWjPjD2um6Lmuj2au1Op2U9ZBX4CGvpZz9o4rwiAuT2WEts/IYO3ZIznhjIBZIw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/XEVTCh2kUTAALOQ+qR0XRxV/rN9vWfIGZCISaZjGHU=; b=ImcXloApzr5K3uzA2nEg6Vynznz3DeF8yNkkphoNcCIMz+y4YJJKxqt8cxdtF1ryCcoVoNYWCZdiGm4oYpXVkxh50kuCuaOQWDoq8zh1Z/KJGMvr7g4el4As13HH/cJ4/TULXf2kS9yI/+hLChOyFj5u6JTaxYj3ni6T7QrCGpriusOZTtdpRHDXEXayxZU3MuY+RlFUvXiJdrfZd9vC8dK9Ylm+z0OoSSyE4P8JHCYk5+Emaahee+4e7tl2L86MpuCUPZe0ZBdYceCCZxf8hBu+TcEPJ4mXarIGKKBmCg07qmD3BHmPGMbaIZqX/anOukMKaMaHD9RNPIvz0aZvHw== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Stewart Hildebrand , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk , Mykyta Poturai Subject: [PATCH v3 2/8] xen/dt: pass flags to callback in dt_for_each_range() Thread-Topic: [PATCH v3 2/8] xen/dt: pass flags to callback in dt_for_each_range() Thread-Index: AQHcWJBaNx96+qKbF0KY5H+PAaMMXw== Date: Tue, 18 Nov 2025 13:36:33 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|AM9PR03MB7217:EE_ x-ms-office365-filtering-correlation-id: a6d76af0-2139-48e3-661d-08de26a77d26 x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|366016|376014|38070700021; x-microsoft-antispam-message-info: =?iso-8859-1?Q?IiziC9mSMMdw43XI5CGbgrB+SxxHyiR+gUci0nClpmnoEJVn3repv+0B59?= =?iso-8859-1?Q?lnw4iddSEmNdvlv+A0ET6q3NwfpGXrg9saVw/fvqyOKb1BSDxagYCX6rVA?= =?iso-8859-1?Q?MamzqOadj2ptQu/WtLRoiGVygNpyk0BRnOOXfP2kd7YLpmrpiIkaot1p1z?= =?iso-8859-1?Q?uZA4KGWhWv+1ksFkV+gD5hU6NVfKMsJ5O8wdJZkbZHxdwEwcTfU14x4SBU?= =?iso-8859-1?Q?5llpAXxym/rvLBwnW90hBQqi68aDBzooJuqiCydHYnFP3FiqqEvHvhdoRi?= =?iso-8859-1?Q?EcSAr562aNVloh8JRpt7VOn7PS4bIV7z5Ea1Mon8BcMR1HNhwFDuCAyS/1?= =?iso-8859-1?Q?cgZfmn4Prg0ZFP5eYmYXKS+51uvcP3735o23JyfMzni63tP1T7ds3i6vG7?= =?iso-8859-1?Q?VtPIhmZ2RV2Tyt4ndUd0MYmfd/X4fGGb7rJdMuFHdF29/n36u6D04O9Ai3?= =?iso-8859-1?Q?qkJy5Md/W9F9HV3dp5yiri5IWiFHsOnABedAcydS/yZUrCMl6m1uHT3SsU?= =?iso-8859-1?Q?dQtxlfZcosucgK8D+VTJ3WXiTKZFRd+p4G2h3TjKRiAHJgV5oFWBi64iEE?= =?iso-8859-1?Q?/ggWrH1diUOkWjJ3JGlP8KD04wRwfYrU0OR9lz/0l5gUipjBUCw/oc0wLp?= =?iso-8859-1?Q?Qnnq+6ko5f3oLMQDmtBcv4WidO5/IjCMdTlbrFdQNRTRmQXyvyOqAuyHEx?= =?iso-8859-1?Q?SdaPQtp7RH5yOqluHr9F916iDoAQHWgcOAFHNsJaw/zP6ipoHNHdmlJ36y?= =?iso-8859-1?Q?MaaHJ8fu2g3ynUrwJLiCY0pC4IXy0VljXK2eABMPmMG6vewYHlzJLSAbdJ?= =?iso-8859-1?Q?3zCa+ptK7h3EXE7I1qmMENMS5yIbdsmLDXGUYAvDF8dWkyOK+WC1Tm8zFC?= =?iso-8859-1?Q?4iXRmNQRNAFD4iIFE9PMYAo+YXyqo4IO81eU4Hw8ZdADUM/V71VPlKQwZ8?= =?iso-8859-1?Q?27VM71S74s9FZoEhVlL5+n5sFj80nRHtfGxWj8C4Z7rDNbEi3Mr6UVQQ7N?= =?iso-8859-1?Q?oy8gXlP4tGEMa2PAjNC0T4LOi+myyfZKh3Y/03Wcf4oiYoD3Y4V8bX/0ZR?= =?iso-8859-1?Q?kJe2+1QYib8bW4nEOHvZ0Bm4fK1DudqZWhlv+lFou7QjrVHwL50PgL4qU7?= =?iso-8859-1?Q?YcwvctQ37g2SByuHZGgp8an5AUs5XgZRWyLJXuWrXptRU04MImPsk6q1Ze?= =?iso-8859-1?Q?HsXVKk+BA7pby1aGgifFS43qn/EaiTUxEoDKnk41e7xYtG1Vm2JWnhz7FK?= =?iso-8859-1?Q?rEDxSGFbynNUEtYRXoJYDgeWCRgqBT4bf1NASX/pXGuY8Qetw4GGdzKzGE?= =?iso-8859-1?Q?u/RjI+mhkwaRAP0Ve3MoqzexdUFU/b/n0TrvLahDQEz61vM36HlD1T5UfG?= =?iso-8859-1?Q?jQPGZdGTKKL/JO5S2Ucsb6OR7NRl59Yh9xhwK/W70bzED26WcBaYhZn6io?= =?iso-8859-1?Q?aEyiXad2I45jXQrSTLSV9cMoyX6HAlkZG+94t0d/dby5fUQ1NpSKtUv4X6?= =?iso-8859-1?Q?v2DpaHeUnqe8p+R5wZvfYTLntq2fAX6fi1v3rWLD93siddmz7IZvLxezai?= =?iso-8859-1?Q?bpMqh6dMp3RZ5b97t1svYPSpghud?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014)(38070700021);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?22xLloeC0C2GQlqh1N1kDnmniCv6obDH2H1or0+uTg6blzyo+D+5vFuZXK?= =?iso-8859-1?Q?EnzcpfUtKvJV5qvS8iaVpT9qEVlG6F7V2LtRb/HYkltBCntyA0TC7s9BkF?= =?iso-8859-1?Q?S+5o6tKlsdHqlXYlaXQyg+ZLvRyLCUpd9Fa6TPizvdTo7BAdWg90Zs76MN?= =?iso-8859-1?Q?JNjBTmb5YJEa8bbbY/4VtSYaP2Kx8IXkmo9+Y1V0XWu3u1bkvTu84hsfs3?= =?iso-8859-1?Q?EUTM7TDQpRKTlqqyBzzKU5ipdMNVG/1w6taLu0YNAr5W7PiQvwEri56e+4?= =?iso-8859-1?Q?ffWVxPrjLIxoU/XggL5Y1qbxtAbn5SZnzclnqVhVOGfnp5U0WGgMMhb56X?= =?iso-8859-1?Q?RqV/Kz7JMU5IeQ/EKywzfx2lHhAaO+Aywc/9fFIavDYTElfR5Y4ktERNzN?= =?iso-8859-1?Q?JBbAvH7JfPuMSyY+MITF4rho8OqvurjVD2H05PTjSZbPzDYat3/CeChwo/?= =?iso-8859-1?Q?dRR+vDb0LqbgaUx42QMXCslkKW2n2Obl5H4WF/+X9ej8EQLpeQAV9h4Iy3?= =?iso-8859-1?Q?IGUWYejVrS1khaAEMleeXoLIn9aAmOIXa4wM49hQpd2MdOPh0MOmMDSPuR?= =?iso-8859-1?Q?+3JPBU1GsLuHIH+Z3RBDZwUQZTcVyQnTSCNtU2Uyftw7+LwmloaR4ih6aV?= =?iso-8859-1?Q?vfcTo9ll/OzYX9VX9w3jHm0YwkHpz9e7HEjsxYx+26XETS34p3l7LL86OE?= =?iso-8859-1?Q?7xY8dMCg9KjpimlLJIYH4lipMyfcB+OTqxI3vP50F/j2sjowg3S7aVnoyY?= =?iso-8859-1?Q?eYcl4eF+mu95pm3GEQoqkc/GLIxUC4T15KaEmwPxPzbigieG1aSY9I2EDc?= =?iso-8859-1?Q?vBeXsIzSvnqi+mzETwg6IAOAye/Hrn24a+0U1kOLLQV8fZ20dH5qXI/sqm?= =?iso-8859-1?Q?NaK43WoTSyppEwz9ANcg02W+CLddR9KM4uu36uBkr/sivHtiNRuIgbtuW/?= =?iso-8859-1?Q?4Y1EwrKRjV2oxdEC18hLoZ6RzhNEkrt1JDT5wg0moKU+qqvt44X4W+hElU?= =?iso-8859-1?Q?tOT9LnOjVzUs/TBbQmlrxZ7EY6Va7No46u28ute5jyWc+kEvreKe/2Bk/Z?= =?iso-8859-1?Q?oZN7+uY0SOxz1t+EDCi70CIEBg2Gfm5lD+a2L4F2FiNsj19ZTRg+KP7a2n?= =?iso-8859-1?Q?vdl014ADVceicLWHl6BAPhiYAZDCkOYvpmch7sgkxslCkHuCrMLf8PDPVW?= =?iso-8859-1?Q?L9RDjaK/D+fwKJenjMHSNtImUZk4oeXf/U/cZVxfX9V6Xu6q1uXPdFSp+k?= =?iso-8859-1?Q?OetVzpKfpO9tIy9iv3QzSveWUUUOKEXamI8zQFl9HizRfdKoGbUVtL7rgi?= =?iso-8859-1?Q?+bFvCA2SZI7yBpiLcQqWSCSrhlCe4KhBLe3OSWcbqfTMJTelAhTOD6UbYL?= =?iso-8859-1?Q?eMAxnjMZgLeppZB2aecuWJ9oK8wtXPqx1pN4tLGnwzkaT2GINaiO9RQPZG?= =?iso-8859-1?Q?PG3ygBKtpclexY70qZDcNqmD4CSK/1afKygk8w+jeoHLREwTyc+if4IuFH?= =?iso-8859-1?Q?hGaQ3Bo6tPwtpgBdfUna2eJ6OYJOvOjPGU6s3L17vDSRkZI0NxDmD4eSJD?= =?iso-8859-1?Q?aaAAJW5RE5pXNqXy1NN3I61BqtuDRcayxs+hCbuHt+bdrhVZ76M/t9kCYs?= =?iso-8859-1?Q?vMMbQMd68W6szqmHgB+iR4VhVDvAlilVx9IEgyzqltdbPKlw/0V76dxQ?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: a6d76af0-2139-48e3-661d-08de26a77d26 X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Nov 2025 13:36:33.3744 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: NJyyDPKTVqwXJw//kEZkwBh168kguD/zQhqobTfs+ZFY1kgn7jNCwqrN0VBgR1yxHqv9AWnKNiNqCzUpFWboCg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR03MB7217 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1763473035337158500 Content-Type: text/plain; charset="utf-8" From: Stewart Hildebrand PCI ranges have prefetchable / non-prefetchable flags that will be needed in the callback. Pass the flags to the callback. Signed-off-by: Stewart Hildebrand Signed-off-by: Mykyta Poturai --- v2->v3: * style fixes v1->v2: * no changes --- xen/arch/arm/device.c | 4 ++-- xen/arch/arm/domain_build.c | 3 ++- xen/arch/arm/include/asm/setup.h | 2 +- xen/arch/arm/pci/pci-host-common.c | 4 ++-- xen/common/device-tree/device-tree.c | 5 +++-- xen/include/xen/device_tree.h | 2 +- 6 files changed, 11 insertions(+), 9 deletions(-) diff --git a/xen/arch/arm/device.c b/xen/arch/arm/device.c index 74b54cad34..732c84e726 100644 --- a/xen/arch/arm/device.c +++ b/xen/arch/arm/device.c @@ -49,7 +49,7 @@ int map_irq_to_domain(struct domain *d, unsigned int irq, return 0; } =20 -int map_range_to_domain(const struct dt_device_node *dev, +int map_range_to_domain(const struct dt_device_node *dev, uint32_t flags, uint64_t addr, uint64_t len, void *data) { struct map_range_data *mr_data =3D data; @@ -325,7 +325,7 @@ int handle_device(struct domain *d, struct dt_device_no= de *dev, p2m_type_t p2mt, return res; } =20 - res =3D map_range_to_domain(dev, addr, size, &mr_data); + res =3D map_range_to_domain(dev, 0, addr, size, &mr_data); if ( res ) return res; } diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c index fb8fbb1650..4bbffdf535 100644 --- a/xen/arch/arm/domain_build.c +++ b/xen/arch/arm/domain_build.c @@ -762,7 +762,8 @@ int __init add_ext_regions(unsigned long s_gfn, unsigne= d long e_gfn, } =20 static int __init handle_pci_range(const struct dt_device_node *dev, - uint64_t addr, uint64_t len, void *data) + uint32_t flags, uint64_t addr, uint64_t= len, + void *data) { struct rangeset *mem_holes =3D data; paddr_t start, end; diff --git a/xen/arch/arm/include/asm/setup.h b/xen/arch/arm/include/asm/se= tup.h index 1eaf13bd66..97bc5f90a1 100644 --- a/xen/arch/arm/include/asm/setup.h +++ b/xen/arch/arm/include/asm/setup.h @@ -62,7 +62,7 @@ int map_device_irqs_to_domain(struct domain *d, struct dt= _device_node *dev, int map_irq_to_domain(struct domain *d, unsigned int irq, bool need_mapping, const char *devname); =20 -int map_range_to_domain(const struct dt_device_node *dev, +int map_range_to_domain(const struct dt_device_node *dev, uint32_t flags, uint64_t addr, uint64_t len, void *data); =20 struct init_info diff --git a/xen/arch/arm/pci/pci-host-common.c b/xen/arch/arm/pci/pci-host= -common.c index d3481b05eb..46e7e3b707 100644 --- a/xen/arch/arm/pci/pci-host-common.c +++ b/xen/arch/arm/pci/pci-host-common.c @@ -418,7 +418,7 @@ int __init pci_host_bridge_mappings(struct domain *d) bridge->child_ops->need_p2m_hwdom_mapping(d, bridge, a= ddr); if ( need_mapping ) { - err =3D map_range_to_domain(dev, addr, size, &mr_data); + err =3D map_range_to_domain(dev, 0, addr, size, &mr_data); if ( err ) return err; } @@ -433,7 +433,7 @@ int __init pci_host_bridge_mappings(struct domain *d) * to be page aligned. We should check for alignment but this is not the * right place for alignment check. */ -static int is_bar_valid(const struct dt_device_node *dev, +static int is_bar_valid(const struct dt_device_node *dev, uint32_t flags, uint64_t addr, uint64_t len, void *data) { struct pdev_bar_check *bar_data =3D data; diff --git a/xen/common/device-tree/device-tree.c b/xen/common/device-tree/= device-tree.c index 0b5375f151..5ee1fa4eb1 100644 --- a/xen/common/device-tree/device-tree.c +++ b/xen/common/device-tree/device-tree.c @@ -976,7 +976,7 @@ int dt_device_get_paddr(const struct dt_device_node *de= v, unsigned int index, =20 int dt_for_each_range(const struct dt_device_node *dev, int (*cb)(const struct dt_device_node *dev, - uint64_t addr, uint64_t length, + uint32_t flags, uint64_t addr, uint64_t le= ngth, void *data), void *data) { @@ -1041,13 +1041,14 @@ int dt_for_each_range(const struct dt_device_node *= dev, { uint64_t a, s; int ret; + uint32_t flags =3D bus->get_flags(ranges); =20 memcpy(addr, ranges + na, 4 * pna); =20 a =3D __dt_translate_address(dev, addr, "ranges"); s =3D dt_read_number(ranges + na + pna, ns); =20 - ret =3D cb(dev, a, s, data); + ret =3D cb(dev, flags, a, s, data); if ( ret ) { dt_dprintk(" -> callback failed=3D%d\n", ret); diff --git a/xen/include/xen/device_tree.h b/xen/include/xen/device_tree.h index 06d7643622..1091e34a10 100644 --- a/xen/include/xen/device_tree.h +++ b/xen/include/xen/device_tree.h @@ -667,7 +667,7 @@ int dt_for_each_irq_map(const struct dt_device_node *de= v, */ int dt_for_each_range(const struct dt_device_node *dev, int (*cb)(const struct dt_device_node *dev, - uint64_t addr, uint64_t length, + uint32_t flags, uint64_t addr, uint64_t le= ngth, void *data), void *data); =20 --=20 2.51.2 From nobody Wed Nov 19 01:56:09 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1763473027; cv=pass; d=zohomail.com; s=zohoarc; b=UHBGVZw3Eg99czBneDZdGKwwnq6p7tOnl78/sNT0LPnmojgrXqSZc8OypJtTwxe0A5lvNjVlKVlZQICWYBh7fQysClFFgJH0Vsje4OVdUxOduQt/N5TNMNGrXRt6911++9wVfJs1i84Dn9Xu3kb5Y0tYtr+3tFAGMpM5CHH2d/Q= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1763473027; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=hTGuoCs2WHO4MzRcHi6p/mnMsry/Pk1E1urssND/pzw=; b=Kc0a0DILLl/upgPPcH+2/mGSUdlqYCHD8mH/uRS1uA/gDjJapM8VLywuVNCC95obgF7F0grIidJKkXf66ZPrROlmtg1upGmet5jBWi/jWVzkchVmSVAWV54CnK8Lq56jDzBGGJqXtRaKgENa4mc68PEgpI0yIlJfOFduV+CG9EE= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1763473027346907.5177089951725; Tue, 18 Nov 2025 05:37:07 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1164700.1491600 (Exim 4.92) (envelope-from ) id 1vLLsu-0004Sj-GT; Tue, 18 Nov 2025 13:36:40 +0000 Received: by outflank-mailman (output) from mailman id 1164700.1491600; Tue, 18 Nov 2025 13:36:40 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vLLsu-0004S8-C4; Tue, 18 Nov 2025 13:36:40 +0000 Received: by outflank-mailman (input) for mailman id 1164700; Tue, 18 Nov 2025 13:36:39 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vLLst-0004PV-CQ for xen-devel@lists.xenproject.org; Tue, 18 Nov 2025 13:36:39 +0000 Received: from AM0PR02CU008.outbound.protection.outlook.com (mail-westeuropeazlp170130006.outbound.protection.outlook.com [2a01:111:f403:c201::6]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 9b5feae2-c483-11f0-980a-7dc792cee155; Tue, 18 Nov 2025 14:36:37 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by PAXPR03MB7650.eurprd03.prod.outlook.com (2603:10a6:102:1de::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9320.18; Tue, 18 Nov 2025 13:36:33 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb%7]) with mapi id 15.20.9320.013; Tue, 18 Nov 2025 13:36:33 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 9b5feae2-c483-11f0-980a-7dc792cee155 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=FymBHOQ5qqRyn4hne7vE/T9D6noxTf2bSZwhHrEj345SS5IFvu3/PTnN9MlNONOoWPBj8I+50wJzzC7K5xJmrGPDgI8solUGnIEpWPkiMaTjhC2qSisv2nqh+7tCoALu2hVtk9GoyE0QdtoyrgdbOaKIwjcP7brjulf801K0K5zfS3o4isUcg49U2y/g1DN+al9pYXBD+pIhNDPdvaccI1v4NcYxLnLwx0jXH/RHwj2gwxljsYMVUu5nsiE9Qa/fynQ0uz3MOZNm3m6eBzLfypvW54nzOEB/wFtn3pdWSE4FwkK28devawJxNRwIFcgRI9hxrIuR+V8OzY7scL9dVw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=hTGuoCs2WHO4MzRcHi6p/mnMsry/Pk1E1urssND/pzw=; b=xIYXcSFU4Q9s5zJ0j1z7VkfOKFfAF5hPGrFe+/vojLFDVcpjGfFrPTsew0P+8iZmpNTRPWX+OiGwrWLvpJbZOkgPZTpm3DKwEk1klKT2C4vsjxgrAyy+a67QNPoEkGhfbvzHJWoP1dEmlFF8huOr96hpkxfdZDCIrnYyB0hIdWWUrw0qi5VcwDqTV9Q43sucxtOSzyxVX1EycfpbQZqQGGCRtUrfheWi5TiS6EweOVtzcmIKPIbIN3hK7Hmg1T7jk2IGrIh1iIIGrvvhdy7FvqmmKrXs7LJEXxriL+468W83lXSE+2BDwElBUYoSzyjKCNOksubwTu9HlH5LHd1w1A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hTGuoCs2WHO4MzRcHi6p/mnMsry/Pk1E1urssND/pzw=; b=Vq9Z6QthU0mIWIOFHnuoff3lbPQYuEAeXhGNsMOLiJpcziK+KbiBSeLX8rPRb0wNzTydJb+2CgYj/puO3QzW/kZWLCm1VnLmTgjF4GyOA5CTH0Gm/qtWxN8mBMblZyQfsG0lyekeIvtgo2x2YNFxoJIU34NUQfjPNLddT1+uPBSsdNkSRAFRuUQQ0NLdZOFQKfpkA0tvJ/4p0nhTI1IUHTdA7X8NhQlwd+kN1nER+tZHFW/mNtopIgf97szbyrvNQrtIcswJYOrKIZoyCOSCexzvqbxLscqciI3neGSZu/gAdfN71dquQIK5zHGsrPqzT4nNZQvrUKJ/mWlzs+82xA== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Stefano Stabellini , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Stewart Hildebrand , Mykyta Poturai Subject: [PATCH v3 3/8] xen/vpci: introduce has_vpci_bridge Thread-Topic: [PATCH v3 3/8] xen/vpci: introduce has_vpci_bridge Thread-Index: AQHcWJBaPhgfVTH0K0SSYJwd1HNNWw== Date: Tue, 18 Nov 2025 13:36:33 +0000 Message-ID: <207b6aef763d12426385efb925beeebbbb56f6b3.1763462211.git.mykyta_poturai@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|PAXPR03MB7650:EE_ x-ms-office365-filtering-correlation-id: 854ced44-1825-49f9-8720-08de26a77d60 x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|366016|1800799024|376014|38070700021; x-microsoft-antispam-message-info: =?iso-8859-1?Q?r66zxSukQZ67c8+d9nWDC9YLF8bwV3aaThXUCimBJMXIB9qqA/HKCpv+Ri?= =?iso-8859-1?Q?jt0/D/l4nC42KaftAcsDq5j6Jp+jVPTfr5KvJ43YfAuEyYUizq8XcuqCCM?= =?iso-8859-1?Q?l73Hpjmsp9i1Mw/AuMMpQs+DAGBeXdJO7RWsFmhcYZMeQhcJ3PkoHJWkbE?= =?iso-8859-1?Q?ZtUmDnim/u7qMy93vMdzm5dCZVjxwUCbEm+erNIVWbT+Grhg5wDGriZlwE?= =?iso-8859-1?Q?Xxv4AMwaih6CG27SHF9bUnJonTt8tuSzlYj8vC4urQ0i96KEQZXcwXojB7?= =?iso-8859-1?Q?f/RQ0DHz73l/FR6vyvda1v8xhk4HPl4a770OwH+4NerFyek64m5pzgq1uz?= =?iso-8859-1?Q?R/YXtju16LhiU3VIk28jCQZSW2szZA8s8W8lRITiJyI+R4I79rCtnhz9l0?= =?iso-8859-1?Q?h/Ugv1fSjgt7DRKtzzgu7N4W5sE0m0JKmBBQCMfsOqnZ7f+KsCZN0K94+X?= =?iso-8859-1?Q?pP9zkZ2HxefenCu+OC9pLorEa/c/B4Z1gCbFTgZ+WfkfDxKmHWmKl0knOl?= =?iso-8859-1?Q?U1a06whBikH9oQUNIm9A9t6wAXosjKlMVsDQz3L1cTIZyAQ4lGX0tUBPSJ?= =?iso-8859-1?Q?yRcHiPCBJAR4Sf75pitq3CtHYzF0/qtmOJUXSQhn5sra4TUZUV1Y4rbHvV?= =?iso-8859-1?Q?UVTUPbCVW92VQbhxzQeyQ2xfs7m5l/EMzi025DKH+Ba+G2kHjfJeM4Us8V?= =?iso-8859-1?Q?e5jLoWPB17gExBsSlVvXc8Q3m8nhnPGOVpuoEJZXtEYAduzrPQOCAc8HHs?= =?iso-8859-1?Q?8mr0odyhbdAwKKXRgKshMW/vBphenzCpoHWhlzhDLCkB01+wOWu4cWB+2z?= =?iso-8859-1?Q?hZGvzS9ytN18AfqW8HUU2rpsoQQSU7xy1kl/zEQr1cfGs1qNDnXFDbyWGG?= =?iso-8859-1?Q?S/ufST2tbyxpJGAHhhlFhE9kBf/ejELOlvcMyEz3TL2aEcErlHqxzWbUgT?= =?iso-8859-1?Q?3kJPDixRTCmsbjmkLYhgJdxxegqG+MF7AGBUZ5bU9rAN12de/s2rK5QMb+?= =?iso-8859-1?Q?Mvhe+O+2MXf1YLRMWNnxaFpvtUQCTYV7gtxRKwvB4jnPbjFcZbdek0LkVq?= =?iso-8859-1?Q?Qi0U31DcwSo8Wa6IveFxLymlbHr1lKBaeEZbI3idCGTdZgV56cRdVRtBLa?= =?iso-8859-1?Q?+6S2rN+9RWDIIXwtefUjOaTn3gYi5fcbnnjZ2qSokYafibZG1uxWH07Mtw?= =?iso-8859-1?Q?o1/k7Wy1mwSGAQ8UH7EmSSV1FA8wkLW/tMNl3KRNmUcZ5kpH71m9IciaZy?= =?iso-8859-1?Q?8E+A+u+g+8mfFuNbAW6z9kcnu3pobdv2t9uCVf7ZxpU7N04k8OFdyqOCQS?= =?iso-8859-1?Q?xVdX1zUUWYwUdzksd+jONdUFYsLfI8lWlcwax9Ai/d/G/wY6DAgQ50uyP5?= =?iso-8859-1?Q?rwnNYkmQFzoiue2vK4QZQKwWDV32YyTQFdlPMMnKpbzTaKiJKAII8LDM6L?= =?iso-8859-1?Q?gSg40ANG36tJQhRWqbe7BDKoM06N1XJM8N/7r52Vdh0Vj2zWFIDq2H7H0F?= =?iso-8859-1?Q?/fwW6x9aSbO1tLW0fURWYgUYy8WJuA4vlcWbIhViROMkOXFoH2rdzcX76c?= =?iso-8859-1?Q?Qg3OqbQYtQyfhb1O2FVAimykC4rC?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(376014)(38070700021);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?i65KbYz14aKuLLV2Tp9bhg7Gwx9tJEA7aEeUUeXppFKFAdeyP3iQkf/LRT?= =?iso-8859-1?Q?hZKxD1BXlxBizdDU3MTSq7Z68xJuBawdQjKIhiYM/frw1h3iPV6lTMTCpg?= =?iso-8859-1?Q?JBsVbgAA3zJ4T5dlMqCJzN84DRkWzYOMCHjCVEmOeYTTX6Bk0Qmo71o7n/?= =?iso-8859-1?Q?RjyC0gzl0KqL4yJrVRL59wFmG1XGnKhgYQsdYOxVG5emMYaBduJJSLb7eV?= =?iso-8859-1?Q?6FBHnrEUp5/yZXhwfGGze4pNELkVHwawNpg+ubuXD/wZXoQ3ZKEa45EcaN?= =?iso-8859-1?Q?OaQDsA2EjUROwBIawmyKmLtB9la8gawwp2koj/2jpsK9e62tq9Qf3TXTE9?= =?iso-8859-1?Q?GY/lXIfms1Muc5KDML1mljKBG2AND4i7vuJ9M79k/r8rbWNFliEaPiXKhD?= =?iso-8859-1?Q?sKwxohX3qHgd8vZ7lNVn9h0qrdh23f5GMsis84QTn1ZyjnPKeeDvgHKffZ?= =?iso-8859-1?Q?uaZseBTIX35A6Rz5E2UKpg4gqsXEdN0X+Vmazis3tXgpFr3mfn0dZMGe04?= =?iso-8859-1?Q?3LUSZ2u1nHiNNyu8mUGMHaNfY2Av7W3+k5bDWkC+AowvvBHq7GVjC4ZbS0?= =?iso-8859-1?Q?WRe5OfjHLZPMCQOVC4HAOvl7VogsfmFS9crvDA3Mp0s16cA4acZaeHrYFA?= =?iso-8859-1?Q?tj2JdInk8nU/hL8lJ5p4bBpS1UaQQBw0FfOnohKi0hXgs+ezjtytkzsuVm?= =?iso-8859-1?Q?mUdxg+2mkWGYU/m38qatDvdP7ab5TkNPeqgrmj1XODreeMt/MgjVKeVc5G?= =?iso-8859-1?Q?k9uQwdpBCNKlfpkaQndSiob/blsndZ2nhR1rxpxgLhwKbjPxw9bRy7oUlH?= =?iso-8859-1?Q?1lbUvSG7Kvvi+WQp8Z6t2Tq/CTUMEyOcfHDNQkfvXnQRcw/bjbDv0ovRZB?= =?iso-8859-1?Q?NU3F5Zhr/jSPo07Xz84PhiIiLnWBe1E/h8o6mFt814TSj3hW18pn/YWsS9?= =?iso-8859-1?Q?imw4dzuwcK/O7kjlK1YIuxbbSLu1FGbBTILaWotQPORdzUVpXRHkezS0gq?= =?iso-8859-1?Q?tJpL7UfVDGD32VCcP9oi5bEQy5oNx377SS8G/CjYCKVvUVubB0Markqqrf?= =?iso-8859-1?Q?7yF0Yb10xri0eAOdxeekMG72dCSX/WZP/gUWL16Alp3viFSyzJAgntXfEG?= =?iso-8859-1?Q?Z0xE4uLLE4luvyrb/pqcWBIL9/A9uqfo/LMGFTMwv8YIHix9WeMmvWF7Jx?= =?iso-8859-1?Q?pzbkuG33aiPyef4hveMdbHOGH9LYajWjxI7hUUBcC7fv3rhL+UjM0PbHLj?= =?iso-8859-1?Q?eyQxCWVYZPOOwdc7j7YQISHauevot9pkiGdbj94tY6ZpydaBOLend3wQKY?= =?iso-8859-1?Q?cQctGA5jeIXndRgFZeDB5XL/voDCJySGEBuV7CE1ugHJEJGR264d4lwDai?= =?iso-8859-1?Q?ypGv1prO8w91K2yK+SYJku/6fhAHOk9L91oz3DADiySatTrEJxxR+Hal9V?= =?iso-8859-1?Q?p498WCZ0a27l2HJAi7n9afrXrOUbEETUJta7n7RkABbx5EOtgbm3EQsS+V?= =?iso-8859-1?Q?KlfQ8k8ppOaGzExOHeqnRNTjaroBMJgUxWQxjxktNlb9PbRSeAhUrwmZLB?= =?iso-8859-1?Q?HVfBB59nVS3M0l7cdezTLzDsjZM/0vKu6WAGOiJgT9g6co9lLVfZPP40K1?= =?iso-8859-1?Q?6Laobx1sC2IdBDQIFdYmswaHO9jl/meA+gHCK8JcGNvhu71YldZ17rjQ?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 854ced44-1825-49f9-8720-08de26a77d60 X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Nov 2025 13:36:33.7994 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: TUszDvzFAlQQbsu/YTbekjpVBrHu+Q86XXZQ5K3sq3CNtWt0lRQzrCDF49NzaRXkE/euuAmPy1NNrmBaMzml/Q== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR03MB7650 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1763473029436153000 Content-Type: text/plain; charset="utf-8" From: Stefano Stabellini With Dom0 now being able to use a virtual bridge we need a way to distinguish Dom0 using HW bridghe from Dom0 using virtual bridge. Introduce a new macro has_vpci_bridge that would determine if a domain should be treated as using HW bridge (only Dom0 with pci-scan disabled) or as using a virtual one (all DomUs and Dom0 with pci-scan enabled) Use the macro in drivers/vpci. Signed-off-by: Stefano Stabellini Signed-off-by: Stewart Hildebrand Signed-off-by: Mykyta Poturai --- v2->v3: * s/is_hwdom/is_hw_bridge/ v1->v2: * simplify definition --- xen/arch/arm/include/asm/pci.h | 1 + xen/arch/arm/pci/pci.c | 2 +- xen/drivers/vpci/header.c | 74 +++++++++++++++++----------------- xen/drivers/vpci/vpci.c | 4 +- xen/include/xen/vpci.h | 8 ++++ 5 files changed, 50 insertions(+), 39 deletions(-) diff --git a/xen/arch/arm/include/asm/pci.h b/xen/arch/arm/include/asm/pci.h index 0680b2f50c..7289f7688b 100644 --- a/xen/arch/arm/include/asm/pci.h +++ b/xen/arch/arm/include/asm/pci.h @@ -23,6 +23,7 @@ #define pci_to_dev(pcidev) (&(pcidev)->arch.dev) =20 extern bool pci_passthrough_enabled; +extern bool pci_scan_enabled; =20 struct rangeset; =20 diff --git a/xen/arch/arm/pci/pci.c b/xen/arch/arm/pci/pci.c index 49ee003c5e..951639eb3f 100644 --- a/xen/arch/arm/pci/pci.c +++ b/xen/arch/arm/pci/pci.c @@ -92,7 +92,7 @@ bool __read_mostly pci_passthrough_enabled; boolean_param("pci-passthrough", pci_passthrough_enabled); =20 /* By default pci scan is disabled. */ -static __ro_after_init bool pci_scan_enabled; +__ro_after_init bool pci_scan_enabled; boolean_param("pci-scan", pci_scan_enabled); =20 static int __init pci_init(void) diff --git a/xen/drivers/vpci/header.c b/xen/drivers/vpci/header.c index 469f497744..528e8b660b 100644 --- a/xen/drivers/vpci/header.c +++ b/xen/drivers/vpci/header.c @@ -230,7 +230,7 @@ bool vpci_process_pending(struct vcpu *v) =20 read_unlock(&v->domain->pci_lock); =20 - if ( !is_hardware_domain(v->domain) ) + if ( has_vpci_bridge(v->domain) ) domain_crash(v->domain); =20 return false; @@ -492,7 +492,7 @@ static int modify_bars(const struct pci_dev *pdev, uint= 16_t cmd, bool rom_only) } } =20 - if ( !is_hardware_domain(d) ) + if ( has_vpci_bridge(d) ) break; =20 d =3D dom_xen; @@ -522,7 +522,7 @@ static void cf_check cmd_write( { struct vpci_header *header =3D data; =20 - if ( !is_hardware_domain(pdev->domain) ) + if ( has_vpci_bridge(pdev->domain) ) { const struct vpci *vpci =3D pdev->vpci; =20 @@ -564,7 +564,7 @@ static void cf_check bar_write( struct vpci_bar *bar =3D data; bool hi =3D false; =20 - ASSERT(is_hardware_domain(pdev->domain)); + ASSERT(!has_vpci_bridge(pdev->domain)); =20 if ( bar->type =3D=3D VPCI_BAR_MEM64_HI ) { @@ -747,7 +747,7 @@ static int vpci_init_capability_list(struct pci_dev *pd= ev) { int rc; bool mask_cap_list =3D false; - bool is_hwdom =3D is_hardware_domain(pdev->domain); + bool is_hw_bridge =3D !has_vpci_bridge(pdev->domain); =20 if ( pci_conf_read16(pdev->sbdf, PCI_STATUS) & PCI_STATUS_CAP_LIST ) { @@ -758,17 +758,17 @@ static int vpci_init_capability_list(struct pci_dev *= pdev) PCI_CAP_ID_MSIX, }; /* - * For dom0, we should expose all capabilities instead of a fixed + * For hw bridge, we should expose all capabilities instead of a f= ixed * capabilities array, so setting n to 0 here is to get the next * capability position directly in pci_find_next_cap_ttl. */ - const unsigned int n =3D is_hwdom ? 0 : ARRAY_SIZE(supported_caps); + const unsigned int n =3D is_hw_bridge ? 0 : ARRAY_SIZE(supported_c= aps); =20 next =3D pci_find_next_cap_ttl(pdev->sbdf, PCI_CAPABILITY_LIST, supported_caps, n, &ttl); =20 rc =3D vpci_add_register(pdev->vpci, vpci_read_val, - is_hwdom ? vpci_hw_write8 : NULL, + is_hw_bridge ? vpci_hw_write8 : NULL, PCI_CAPABILITY_LIST, 1, (void *)(uintptr_t)next); if ( rc ) @@ -776,7 +776,7 @@ static int vpci_init_capability_list(struct pci_dev *pd= ev) =20 next &=3D ~3; =20 - if ( !next && !is_hwdom ) + if ( !next && !is_hw_bridge ) /* * If we don't have any supported capabilities to expose to the * guest, mask the PCI_STATUS_CAP_LIST bit in the status @@ -792,7 +792,7 @@ static int vpci_init_capability_list(struct pci_dev *pd= ev) pos + PCI_CAP_LIST_NEXT, supported_caps, n, &ttl); =20 - if ( !is_hwdom ) + if ( !is_hw_bridge ) { rc =3D vpci_add_register(pdev->vpci, vpci_hw_read8, NULL, pos + PCI_CAP_LIST_ID, 1, NULL); @@ -801,7 +801,7 @@ static int vpci_init_capability_list(struct pci_dev *pd= ev) } =20 rc =3D vpci_add_register(pdev->vpci, vpci_read_val, - is_hwdom ? vpci_hw_write8 : NULL, + is_hw_bridge ? vpci_hw_write8 : NULL, pos + PCI_CAP_LIST_NEXT, 1, (void *)(uintptr_t)next); if ( rc ) @@ -811,8 +811,8 @@ static int vpci_init_capability_list(struct pci_dev *pd= ev) } } =20 - /* Return early for the hw domain, no masking of PCI_STATUS. */ - if ( is_hwdom ) + /* Return early for the hw bridge, no masking of PCI_STATUS. */ + if ( is_hw_bridge ) return 0; =20 /* Utilize rsvdp_mask to hide PCI_STATUS_CAP_LIST from the guest. */ @@ -829,7 +829,7 @@ static int vpci_init_ext_capability_list(const struct p= ci_dev *pdev) { unsigned int pos =3D PCI_CFG_SPACE_SIZE; =20 - if ( !is_hardware_domain(pdev->domain) ) + if ( has_vpci_bridge(pdev->domain) ) /* Extended capabilities read as zero, write ignore for DomU */ return vpci_add_register(pdev->vpci, vpci_read_val, NULL, pos, 4, (void *)0); @@ -866,7 +866,7 @@ int vpci_init_header(struct pci_dev *pdev) struct vpci_header *header =3D &pdev->vpci->header; struct vpci_bar *bars =3D header->bars; int rc; - bool is_hwdom =3D is_hardware_domain(pdev->domain); + bool is_hw_bridge =3D !has_vpci_bridge(pdev->domain); =20 ASSERT(rw_is_write_locked(&pdev->domain->pci_lock)); =20 @@ -893,15 +893,15 @@ int vpci_init_header(struct pci_dev *pdev) * PCI_COMMAND_PARITY, PCI_COMMAND_SERR, and PCI_COMMAND_FAST_BACK. */ rc =3D vpci_add_register_mask(pdev->vpci, - is_hwdom ? vpci_hw_read16 : guest_cmd_read, + is_hw_bridge ? vpci_hw_read16 : guest_cmd_= read, cmd_write, PCI_COMMAND, 2, header, 0, 0, - is_hwdom ? 0 - : PCI_COMMAND_RSVDP_MASK | - PCI_COMMAND_IO | - PCI_COMMAND_PARITY | - PCI_COMMAND_WAIT | - PCI_COMMAND_SERR | - PCI_COMMAND_FAST_BACK, + is_hw_bridge ? 0 + : PCI_COMMAND_RSVDP_MASK | + PCI_COMMAND_IO | + PCI_COMMAND_PARITY | + PCI_COMMAND_WAIT | + PCI_COMMAND_SERR | + PCI_COMMAND_FAST_BACK, 0); if ( rc ) return rc; @@ -925,7 +925,7 @@ int vpci_init_header(struct pci_dev *pdev) * start with memory decoding disabled, and modify_bars() will not be = called * at the end of this function. */ - if ( !is_hwdom ) + if ( !is_hw_bridge ) cmd &=3D ~(PCI_COMMAND_VGA_PALETTE | PCI_COMMAND_INVALIDATE | PCI_COMMAND_SPECIAL | PCI_COMMAND_MASTER | PCI_COMMAND_ME= MORY | PCI_COMMAND_IO); @@ -933,7 +933,7 @@ int vpci_init_header(struct pci_dev *pdev) header->guest_cmd =3D cmd; =20 /* Disable memory decoding before sizing. */ - if ( !is_hwdom || (cmd & PCI_COMMAND_MEMORY) ) + if ( !is_hw_bridge || (cmd & PCI_COMMAND_MEMORY) ) pci_conf_write16(pdev->sbdf, PCI_COMMAND, cmd & ~PCI_COMMAND_MEMOR= Y); =20 for ( i =3D 0; i < num_bars; i++ ) @@ -945,9 +945,10 @@ int vpci_init_header(struct pci_dev *pdev) { bars[i].type =3D VPCI_BAR_MEM64_HI; rc =3D vpci_add_register(pdev->vpci, - is_hwdom ? vpci_hw_read32 - : guest_mem_bar_read, - is_hwdom ? bar_write : guest_mem_bar_wr= ite, + is_hw_bridge ? vpci_hw_read32 + : guest_mem_bar_read, + is_hw_bridge ? bar_write + : guest_mem_bar_write, reg, 4, &bars[i]); if ( rc ) goto fail; @@ -959,7 +960,7 @@ int vpci_init_header(struct pci_dev *pdev) if ( (val & PCI_BASE_ADDRESS_SPACE) =3D=3D PCI_BASE_ADDRESS_SPACE_= IO ) { bars[i].type =3D VPCI_BAR_IO; - if ( !IS_ENABLED(CONFIG_X86) && !is_hwdom ) + if ( !IS_ENABLED(CONFIG_X86) && !is_hw_bridge ) { rc =3D vpci_add_register(pdev->vpci, vpci_read_val, NULL, reg, 4, (void *)0); @@ -988,7 +989,7 @@ int vpci_init_header(struct pci_dev *pdev) { bars[i].type =3D VPCI_BAR_EMPTY; =20 - if ( !is_hwdom ) + if ( !is_hw_bridge ) { rc =3D vpci_add_register(pdev->vpci, vpci_read_val, NULL, reg, 4, (void *)0); @@ -1005,17 +1006,18 @@ int vpci_init_header(struct pci_dev *pdev) bars[i].prefetchable =3D val & PCI_BASE_ADDRESS_MEM_PREFETCH; =20 rc =3D vpci_add_register(pdev->vpci, - is_hwdom ? vpci_hw_read32 : guest_mem_bar_r= ead, - is_hwdom ? bar_write : guest_mem_bar_write, + is_hw_bridge ? vpci_hw_read32 + : guest_mem_bar_read, + is_hw_bridge ? bar_write : guest_mem_bar_wr= ite, reg, 4, &bars[i]); if ( rc ) goto fail; } =20 /* Check expansion ROM. */ - rc =3D is_hwdom ? pci_size_mem_bar(pdev->sbdf, rom_reg, &addr, &size, - PCI_BAR_ROM) - : 0; + rc =3D is_hw_bridge ? pci_size_mem_bar(pdev->sbdf, rom_reg, &addr, &si= ze, + PCI_BAR_ROM) + : 0; if ( rc > 0 && size ) { struct vpci_bar *rom =3D &header->bars[num_bars]; @@ -1038,7 +1040,7 @@ int vpci_init_header(struct pci_dev *pdev) goto fail; } } - else if ( !is_hwdom ) + else if ( !is_hw_bridge ) { /* TODO: Check expansion ROM, we do not handle ROM for guests for = now */ header->bars[num_bars].type =3D VPCI_BAR_EMPTY; diff --git a/xen/drivers/vpci/vpci.c b/xen/drivers/vpci/vpci.c index 07c7071d0a..8ea89b9805 100644 --- a/xen/drivers/vpci/vpci.c +++ b/xen/drivers/vpci/vpci.c @@ -48,7 +48,7 @@ static int assign_virtual_sbdf(struct pci_dev *pdev) =20 ASSERT(rw_is_write_locked(&pdev->domain->pci_lock)); =20 - if ( is_hardware_domain(d) ) + if ( !has_vpci_bridge(d) ) return 0; =20 /* @@ -429,7 +429,7 @@ static const struct pci_dev *translate_virtual_device(c= onst struct domain *d, #ifdef CONFIG_HAS_VPCI_GUEST_SUPPORT const struct pci_dev *pdev; =20 - ASSERT(!is_hardware_domain(d)); + ASSERT(has_vpci_bridge(d)); ASSERT(rw_is_locked(&d->pci_lock)); =20 for_each_pdev ( d, pdev ) diff --git a/xen/include/xen/vpci.h b/xen/include/xen/vpci.h index 9ae75d946a..d4695cb353 100644 --- a/xen/include/xen/vpci.h +++ b/xen/include/xen/vpci.h @@ -339,6 +339,14 @@ static inline int __must_check vpci_reset_device(struc= t pci_dev *pdev) return vpci_assign_device(pdev); } =20 +#ifdef CONFIG_ARM +#include + +#define has_vpci_bridge(d) (!is_hardware_domain(d) || pci_scan_enabled) +#else +#define has_vpci_bridge(d) (!is_hardware_domain(d)) +#endif + #endif =20 /* --=20 2.51.2 From nobody Wed Nov 19 01:56:09 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1763473041; cv=pass; d=zohomail.com; s=zohoarc; b=B9tG/yTuU2uUrzena84s9BZ/xZ1Q3xv3BKzrDNVHoT9l/HkFZgj2Cir9jtqSHaYsdl1rUah7m7L0uvAlD6dIwWJXBx6Vi7Dm3B71jhDj4CQy6rojftGsLiL5IScPrSgbhx9DWiRJiONCtsTaEPFYZMrKimfv3MmHRsYpfXb4tLU= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1763473041; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=hwiFIXX4P610NqjFRS+PLIfG423P2YodlLBqgLz4QzE=; b=mFDV2YmgxSqjRzYW4wnpFD3WZqs0aD7KSg+rQ5NaYVuxhT7pgbo54iMaqA3DYDCJkNTtABUxdMcYKFwRfR0w85NSTZJjPU6/bRb9o3rKVfzzJBomuIL2+G/DTlwTzkwlkXhhZJRnhN58nPo5xJBGzVp9PjFSKRWaOfAyW3hQF0M= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1763473041407296.9975604879953; Tue, 18 Nov 2025 05:37:21 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1164702.1491625 (Exim 4.92) (envelope-from ) id 1vLLsx-00055U-3t; Tue, 18 Nov 2025 13:36:43 +0000 Received: by outflank-mailman (output) from mailman id 1164702.1491625; Tue, 18 Nov 2025 13:36:43 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vLLsw-00055I-Ug; Tue, 18 Nov 2025 13:36:42 +0000 Received: by outflank-mailman (input) for mailman id 1164702; Tue, 18 Nov 2025 13:36:41 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vLLsv-0004PV-2v for xen-devel@lists.xenproject.org; Tue, 18 Nov 2025 13:36:41 +0000 Received: from AM0PR02CU008.outbound.protection.outlook.com (mail-westeuropeazlp170130006.outbound.protection.outlook.com [2a01:111:f403:c201::6]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 9c6eb938-c483-11f0-980a-7dc792cee155; Tue, 18 Nov 2025 14:36:39 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by PAXPR03MB7650.eurprd03.prod.outlook.com (2603:10a6:102:1de::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9320.18; Tue, 18 Nov 2025 13:36:34 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb%7]) with mapi id 15.20.9320.013; Tue, 18 Nov 2025 13:36:34 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 9c6eb938-c483-11f0-980a-7dc792cee155 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=ETM/dOLm/ghkkx0IULJbbSi2EHCdpTF5Zh6mtAVFLObyAPLrMA8rOyWyui3p1MfjD/KVMTVB1VZDGXbEXnFIozD0U38udW8tBqRTksQIWoSFP0Q5wejMxodO0qGRXL86aOHrOwh536dCZJc7uWqXar2UMg3poGP8kSh/WrnvIVjylAxZXCctE37Ts49Wu7PDXaVz9hXKg9WYKRTRjbpmG0i1yGitdFjpV272uWgG66Ghe3pN8DLVWv4geNPe2Af/XGJGOq1mRPsOF/VWck+MK2pwLR50hNQ0oy02W6ld8CwOYJDzwwu6+7GzUcRLMLBxpxjm0RrJSVPNrC98HpZU/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=hwiFIXX4P610NqjFRS+PLIfG423P2YodlLBqgLz4QzE=; b=OUKo08fTM6gZkSY2LJpruQjLnzIl8uaOH5fHE4n6i0deq2PiedjmTRCqbhm5Gdk6ILGSTOHnfjiNmRFDDdrNmXuH5A3m397XyCrlhGb10/eIeX9ZBSciA8O/OxKYOWtIc0nJJynSPgGOj6mBtEbSpJlyJRPTyIDdpP3KrDBKV2mAeLVW+1J67o+KcVMhgK6ma1IaPHhE0H8xFnUxJgpzRlrNp5/CEkB4/7v69G+XwS8mqBw7dNArX4T9LmOgvxi1BssVkNflIlj/gFOy/yHsaBYZhkNIGurNaBXw0MbkiaZ+XGLTAeqx2CgDECmwbni+lcrp2s6Ui6lVWIKdrjFd+w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hwiFIXX4P610NqjFRS+PLIfG423P2YodlLBqgLz4QzE=; b=Sl0U8Ak74T6cpobpKSa3FIjjdTCB/p5OP0722ePagkUB9Hgo3gHpuzGsTrcwxmg5xo2BMi+mU20HIMX1g5XPvySdf6qO8gofs6Pu4xtsaMGoARCS0zruuPwq2BdiP06xCi5ECz7ATyWNAdsRHvUoKmX4J0dmWr2cmVexzngzrxc2e9iy7GYNS9TvaB/5mC4rAQlLE5F5D+EYO+SYpNp7h/1oPVBj48UrXIgsK7rk+QT0BxmXrzdPxKyptFi0wub+3JITFiVH9Nd186mGqTBv4iDPLYDoSjAGKDAD6t8yN9JQM5g3DTgPuzjUYX4QBGUMPYTrw68w7ui9PWM//sy1CQ== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Luca Fancellu , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , Julien Grall , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Stefano Stabellini , Bertrand Marquis , Volodymyr Babchuk , Stewart Hildebrand , Mykyta Poturai Subject: [PATCH v3 4/8] xen/pci: update DT for hwdom when it uses vpci Thread-Topic: [PATCH v3 4/8] xen/pci: update DT for hwdom when it uses vpci Thread-Index: AQHcWJBbokhYTBMFOESThWU0kpE72A== Date: Tue, 18 Nov 2025 13:36:34 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|PAXPR03MB7650:EE_ x-ms-office365-filtering-correlation-id: bc6ea9dd-73f6-49ad-b2aa-08de26a77dad x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|366016|1800799024|376014|7416014|38070700021; x-microsoft-antispam-message-info: =?iso-8859-1?Q?HPl5DA8njYhc2pwC/lZsCrjfOJKRMxGEtOtIRnd9j1/rH+fKszUSq0G5GV?= =?iso-8859-1?Q?lvxFyt9v7x7Up25xUuP9sWqMCRiHI3FLn/XjuG1ZzEXK9c9QpcHNG/pVpZ?= =?iso-8859-1?Q?69xMQ+/D9soKKgLxPHlsQeZWjzq57Jl9RFUxvhcrx1f4aQfHrR32+b9UuX?= =?iso-8859-1?Q?YPfqUHIKTvNLt5JSHkWoG17lKkhhEfOxKOgj9gPE9OyXUkDht7EEvogJbU?= =?iso-8859-1?Q?W/31Ia3/kLLvjPqD7DgaM3uY6LYbLqI+MrRp2MI9gJXrt4G5+p+z9XS1PG?= =?iso-8859-1?Q?Ft5Fkfdo4C2eU1zGD6QnUR7YUnaniCdPsVKYu9hn0TnZOUlHeAuK1qdoKt?= =?iso-8859-1?Q?b+f8ghfvEETcogyOi3alOw44e6AEzyH6aR/kdbjBAmCAf/z7P7+Sws1Yw2?= =?iso-8859-1?Q?E9zjaHruh3IwzVTIqq/SMApCX80OMjgeUuMSoC4nOIYy0SaoboYs18vbgp?= =?iso-8859-1?Q?nL4GtRW4HoGcAHHd31z9EFGvXxqTfFrrWnvgOFFWJ6I1HxInsuwBYSWdKp?= =?iso-8859-1?Q?MKYeQM+dNBynVmz1qtAeKi36xpLZZHvfv9Ykg6cxaSZc7xOZb132IeHKb8?= =?iso-8859-1?Q?2H1pqCJCeMhXBspgarPWgd8RWXhX19PtIt/xS8VayBFv+3GSowyQYwo7Xy?= =?iso-8859-1?Q?zPnG7T5iL8OkWdeTaS1aAtgLPT54voT2kkCRAVm3204NzQup277Y/9QB+2?= =?iso-8859-1?Q?HDJMxWbgF39SStxonCLdAqFajg+t0vh1cmD8NPLPycMXm5mTj68TdjPhF4?= =?iso-8859-1?Q?7tNeqg0NJmqbklEsC+i74p06wOc7jHwx+tWklJ9HPp9GhbE9w4YQ8qeMCT?= =?iso-8859-1?Q?n86Ge1U6rGnLcL6ZRcdTb2w/zGvFDZhhXjwWtb5lvXcCOKST+PnORYlqAt?= =?iso-8859-1?Q?k4UuS2/tVuSMFjIfft/rDtVvmFhYeDnTErNrvInRUPfJBsboR8PLN9tddG?= =?iso-8859-1?Q?nAF/qVAgGqvw6XN3yaHgxeK2ue5bxAowUxUgkPyoI2yjdkxpdY9icxUnmC?= =?iso-8859-1?Q?BNoyUnqT5u8GmVoCMhaAJqjCO1jHPl4//cRLGL/LZw6VtqyAadJgJhmoWQ?= =?iso-8859-1?Q?01v7vClQzXFZ/l0Kg+OxU+H3tULePWG5hlhN8axoT569uGAHxYXaPwkYY1?= =?iso-8859-1?Q?Z2AaJcqYwHgLFcJ7ZlPxa57YT6tjN685te2oSSsO3E2db65pYAgYAi9ce8?= =?iso-8859-1?Q?/T4zWeacIqErN2vzGz6J+A6tyBl0/UQFLCiQzdqSCzRbMsX1bOZ64V6/FX?= =?iso-8859-1?Q?4wjriUtAjF6jMwnACVR3kIOgi/4UzO+qiYdAIaqW4YbB1zXVAuvSK5Eotj?= =?iso-8859-1?Q?OlRneMPKPumrDI0w4GnFPQta9HH3ZgWZlbnvZzbH4HiOBJ1NbhmVwO/9GC?= =?iso-8859-1?Q?x5BTQNy+Muj4EPmXcjM3QWHvSnEG03lBt7Mqg8lSI/CgFWqQqoe/GDVgc6?= =?iso-8859-1?Q?Uaw71ntCSTwf/MEbCv9Wh+h0Onjd+kq2OSjAlcGqEkK1ToiQFPKIT45Z5j?= =?iso-8859-1?Q?ubDRrmAP2RtcN+vuNCTIJq92lbd5Sm+2QXeZ/Ouz4opubicYNFSFImlT+K?= =?iso-8859-1?Q?bIof6/07r7DE+IlyYwYJ5DSebnQE?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(376014)(7416014)(38070700021);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?oM7vih9qJlk8VMwq89wswJyLpD+aGRTgZ1lC9n/gFFMa5m9MiNtOPbMtpP?= =?iso-8859-1?Q?nm+999QkF/np1TfCK6IT+4RU2LRNgc2AlCV96z2UZdG228gD9IsVD966QK?= =?iso-8859-1?Q?cwDSFTCg3wzQQuz4GZSJwEq5ywy2ftWs8xImzBUa6l8mvradLne35ORygP?= =?iso-8859-1?Q?sxMXAjwM4c9QTkNT/Rkd8LHMM6g2xpInjVlZJkJqhGZ+F/4seIDD96jV3e?= =?iso-8859-1?Q?TWtSm6NRcDxZ4BWm/IOboJ5iC9WZOabrGUg/mrn6UjVeoR0dbQqXfECqUs?= =?iso-8859-1?Q?qjLXJl6r0ayYKuuAAOXn8UPjGThOegPOxsL+PHxFgF1P7mpy4aDG7n+/Cx?= =?iso-8859-1?Q?OzCqtSKcDrx3g+i+MfzttQDvdgSO8mzTvxl6labFk4WX8WbrKQXZhbKlqH?= =?iso-8859-1?Q?ioAgQnvMvi4F+a5XcOPO1eJiUR25zuJyLH+cbu7Z6DtZtQRY7RIT64XVJg?= =?iso-8859-1?Q?9IUsZL+4B0I1rUE625vokepCEwH6gym9tZhJwRozovmK/5IcCiDkaMMaNc?= =?iso-8859-1?Q?TAbt2hRnsBmpReYsgNk9/W4EEwYhMgrY3BWR5L8ubeLCUBeCDj0AkOTcqN?= =?iso-8859-1?Q?YX4Qt7TrlutC5/C+bQj/BDO5IUZbG74O95bj6gF3TDDppmR91v2KZzk12j?= =?iso-8859-1?Q?pXDBeEt8C5M1oilLw0hI+vMBRqLDUkWBNCbK0f2xECSM7iNa4OW2CMBPzG?= =?iso-8859-1?Q?AizYnqPBEiqPXyaBxJoLJ0nu5S4G2XWR2rU4cDazitnT14cTxzXrmvjz62?= =?iso-8859-1?Q?fhg2Pkf667vdGrEbdR4N6dOxSTCnbx7Z0JsEPhkoz4vTn/6oRHpFVyhjtE?= =?iso-8859-1?Q?2o7LVTjCX9AMimIIJ5dUFoyMv5K2Jqjwi0TUxpxSExe8YEL6P0u4j3ZuWL?= =?iso-8859-1?Q?ZmHEDEWlCztZfHO0V37djQtPwDO41EQB9TtY34GornY1GXILLp0Zog57hS?= =?iso-8859-1?Q?whxB3kG6ZsPcRWZORypdS3+9LFyaCV/JA+z+tOMAKRtSMZSZgE7HzWcfbq?= =?iso-8859-1?Q?QdjwnYj+/A/H4/JqhvszbP0CyRG7T8rjPwaSz7fBSPzu/0MJOqzABOiKpc?= =?iso-8859-1?Q?EUD16Vmywz4yU+2ZXh3pGNwFTLopnkEb4ziWC7nHRNMtXFWLLFsc/lH9LP?= =?iso-8859-1?Q?FpKZIv7iAuhjnK2tD0rmXLNB1ZrxtezauH/fO6vP/5TtVnIOKeW20e/324?= =?iso-8859-1?Q?7o++fGh7Qgnne3SyVhn6kkfPMwlCEQn1wDYPr5UYqXMCFvwoqfmeZAl4cr?= =?iso-8859-1?Q?wpNYa/8yCg6D3dwGMNRJK833DVqLKZpIXPcntdIgXO0BcAJkLXblvtxpdZ?= =?iso-8859-1?Q?doDEgAp2e/4shFzvW9FA2jijrsMybQlaU303a3GQJrHazrTqx97vq3bSbm?= =?iso-8859-1?Q?SEVP7w/7fH96exgMzCQjZoaZL5RFrn3BndUE5HA+NtBaRpegrpWCqkviPj?= =?iso-8859-1?Q?4epsft+0wL7jW0zG2nCig6WWXHL66ns4RsJqI/RhSMpVXm8MiWhHngiiUg?= =?iso-8859-1?Q?OB1evvgQs7L11eBNlu4YJGTYq0e6MVGGxqwI9H/GMvCK/laxKotwvA0ydD?= =?iso-8859-1?Q?/JCzANxV2vDcuEo/WAwFwECUyX39fbMTm5/hoWzIFwu9ZNi4CCN2WYFNnc?= =?iso-8859-1?Q?Mqc3H7AKMfgN9uSBP/7jqw41icQ39W+hhbcvmRAdNZ/QjiQsD0MOrj9A?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: bc6ea9dd-73f6-49ad-b2aa-08de26a77dad X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Nov 2025 13:36:34.3049 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: IUMGCYjrn0l9naYUM0DFJBbpdoqg0M1ExqHDg1sZEqG2spNtj1q4kDNFPcUgs0XFCUkfwdtzZCK32JLHgiBVmg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR03MB7650 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1763473043384153000 Content-Type: text/plain; charset="utf-8" From: Luca Fancellu When pci-scan is enabled and Xen supports vpci for guests, Xen will scan the pci bus to find devices and emulate the pci bus, so the hw domain must see the emulated bus instead of the real one. A new helper function, hwdom_uses_vpci, is implemented and returns true when pci-scan is enabled and Xen is built with CONFIG_HAS_VPCI_GUEST_SUPPORT=3Dy. When hwdom_uses_vpci() is true, a vpci node is created for the hwdom device tree. Depending on whether the guest is using vPCI or not, and whether the domain is using host layout or not, generate the appropriate device tree nodes for the guest and handle the right MMIO regions traps. Signed-off-by: Luca Fancellu Signed-off-by: Stewart Hildebrand Signed-off-by: Mykyta Poturai --- v2->v3: * use has_vpci_bridge in place of hwdom_uses_vpci v1->v2: * make make_vpci_node static --- docs/misc/xen-command-line.pandoc | 4 +- xen/arch/arm/domain_build.c | 151 +++++++++++++++++++++++++++++- 2 files changed, 153 insertions(+), 2 deletions(-) diff --git a/docs/misc/xen-command-line.pandoc b/docs/misc/xen-command-line= .pandoc index e5f7275bdc..4a546f94a7 100644 --- a/docs/misc/xen-command-line.pandoc +++ b/docs/misc/xen-command-line.pandoc @@ -2084,7 +2084,9 @@ Flag to enable or disable support for PCI passthrough =20 > Default: `false` =20 -Flag to enable or disable Xen PCI scan at boot. +Flag to enable or disable Xen PCI scan at boot. When the flag is enabled, = the +hardware domain cannot have access to the real PCI bus, it will see the bus +emulated by Xen. =20 ### pcid (x86) > `=3D | xpti=3D` diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c index 4bbffdf535..7423605b61 100644 --- a/xen/arch/arm/domain_build.c +++ b/xen/arch/arm/domain_build.c @@ -41,6 +41,7 @@ #include #include #include +#include =20 static unsigned int __initdata opt_dom0_max_vcpus; integer_param("dom0_max_vcpus", opt_dom0_max_vcpus); @@ -1557,6 +1558,142 @@ int __init make_chosen_node(const struct kernel_inf= o *kinfo) return res; } =20 +#ifdef CONFIG_HAS_VPCI_GUEST_SUPPORT +struct vpci_param { + uint64_t vpci_ecam_base; + uint64_t vpci_ecam_size; + uint64_t vpci_mem_base; + uint64_t vpci_mem_size; + uint64_t vpci_mem_prefetch_base; + uint64_t vpci_mem_prefetch_size; +}; + +static int __init handle_vpci_range(const struct dt_device_node *dev, + uint32_t flags, uint64_t addr, uint64_= t len, + void *data) +{ + struct vpci_param *vpci =3D (struct vpci_param *)data; + + if ( !(flags & IORESOURCE_MEM) ) + return 0; + + if ( !(flags & IORESOURCE_PREFETCH) && addr < GB(4) ) + { + vpci->vpci_mem_base =3D addr; + vpci->vpci_mem_size =3D len; + } + else if ( flags & IORESOURCE_PREFETCH ) + { + vpci->vpci_mem_prefetch_base =3D addr; + vpci->vpci_mem_prefetch_size =3D len; + } + return 0; +} + +static int __init make_vpci_node(struct domain *d, void *fdt) +{ + /* reg is sized to be used for all the needed properties below */ + __be32 reg[((GUEST_ROOT_ADDRESS_CELLS * 2) + GUEST_ROOT_SIZE_CELLS + 1) + * 2]; + __be32 *cells; + char buf[22]; /* pcie@ + max 16 char address + '\0' */ + int res; + struct vpci_param vpci =3D { + .vpci_ecam_base =3D GUEST_VPCI_ECAM_BASE, + .vpci_ecam_size =3D GUEST_VPCI_ECAM_SIZE, + .vpci_mem_base =3D GUEST_VPCI_MEM_ADDR, + .vpci_mem_size =3D GUEST_VPCI_MEM_SIZE, + .vpci_mem_prefetch_base =3D GUEST_VPCI_PREFETCH_MEM_ADDR, + .vpci_mem_prefetch_size =3D GUEST_VPCI_PREFETCH_MEM_SIZE + }; + + if ( domain_use_host_layout(d) ) + { + struct pci_host_bridge *bridge; + + bridge =3D pci_find_host_bridge(0, 0); + + vpci.vpci_ecam_base =3D bridge->cfg->phys_addr; + vpci.vpci_ecam_size =3D bridge->cfg->size; + + res =3D dt_for_each_range(bridge->dt_node, handle_vpci_range, &vpc= i); + if ( res < 0 ) + return -EINVAL; + } + + snprintf(buf, sizeof(buf), "pcie@%"PRIx64, vpci.vpci_ecam_base); + dt_dprintk("Create vpci node\n"); + res =3D fdt_begin_node(fdt, buf); + if ( res ) + return res; + + res =3D fdt_property_string(fdt, "compatible", "pci-host-ecam-generic"= ); + if ( res ) + return res; + + res =3D fdt_property_string(fdt, "device_type", "pci"); + if ( res ) + return res; + + /* Create reg property */ + cells =3D ®[0]; + dt_child_set_range(&cells, GUEST_ROOT_ADDRESS_CELLS, GUEST_ROOT_SIZE_C= ELLS, + vpci.vpci_ecam_base, vpci.vpci_ecam_size); + + res =3D fdt_property(fdt, "reg", reg, + (GUEST_ROOT_ADDRESS_CELLS + + GUEST_ROOT_SIZE_CELLS) * sizeof(*reg)); + if ( res ) + return res; + + /* Create bus-range property */ + cells =3D ®[0]; + dt_set_cell(&cells, 1, 0); + dt_set_cell(&cells, 1, 255); + res =3D fdt_property(fdt, "bus-range", reg, 2 * sizeof(*reg)); + if ( res ) + return res; + + res =3D fdt_property_cell(fdt, "#address-cells", 3); + if ( res ) + return res; + + res =3D fdt_property_cell(fdt, "#size-cells", 2); + if ( res ) + return res; + + res =3D fdt_property_string(fdt, "status", "okay"); + if ( res ) + return res; + + /* + * Create ranges property as: + * <(PCI bitfield) (PCI address) (CPU address) (Size)> + */ + cells =3D ®[0]; + dt_set_cell(&cells, 1, GUEST_VPCI_ADDR_TYPE_MEM); + dt_set_cell(&cells, GUEST_ROOT_ADDRESS_CELLS, vpci.vpci_mem_base); + dt_set_cell(&cells, GUEST_ROOT_ADDRESS_CELLS, vpci.vpci_mem_base); + dt_set_cell(&cells, GUEST_ROOT_SIZE_CELLS, vpci.vpci_mem_size); + dt_set_cell(&cells, 1, GUEST_VPCI_ADDR_TYPE_PREFETCH_MEM); + dt_set_cell(&cells, GUEST_ROOT_ADDRESS_CELLS, vpci.vpci_mem_prefetch_b= ase); + dt_set_cell(&cells, GUEST_ROOT_ADDRESS_CELLS, vpci.vpci_mem_prefetch_b= ase); + dt_set_cell(&cells, GUEST_ROOT_SIZE_CELLS, vpci.vpci_mem_prefetch_size= ); + res =3D fdt_property(fdt, "ranges", reg, sizeof(reg)); + if ( res ) + return res; + + res =3D fdt_end_node(fdt); + + return res; +} +#else +static inline int __init make_vpci_node(struct domain *d, void *fdt) +{ + return 0; +} +#endif + static int __init handle_node(struct domain *d, struct kernel_info *kinfo, struct dt_device_node *node, p2m_type_t p2mt) @@ -1615,7 +1752,12 @@ static int __init handle_node(struct domain *d, stru= ct kernel_info *kinfo, dt_dprintk(" Skip it (blacklisted)\n"); return 0; } - + /* If Xen is scanning the PCI devices, don't expose real bus to hwdom = */ + if ( has_vpci_bridge(d) && dt_device_type_is_equal(node, "pci") ) + { + dt_dprintk(" Skip it (pci-scan is enabled)\n"); + return 0; + } /* * Replace these nodes with our own. Note that the original may be * used_by DOMID_XEN so this check comes first. @@ -1766,6 +1908,13 @@ static int __init handle_node(struct domain *d, stru= ct kernel_info *kinfo, if ( res ) return res; } + + if ( has_vpci_bridge(d) ) + { + res =3D make_vpci_node(d, kinfo->fdt); + if ( res ) + return res; + } } =20 res =3D fdt_end_node(kinfo->fdt); --=20 2.51.2 From nobody Wed Nov 19 01:56:09 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1763473030; cv=pass; d=zohomail.com; s=zohoarc; b=B1a3L395EFUNObR3YgtQ7Heu+cPXHlfyWAAc2qXHEhIOS47+EIBoMvto0HKiJ79jCr2K1K9UMwyuYJ+IO5M4ngjqouStHSk/7Dkugp65tr+sot3gMzocjBloM9lXOon+B7x/m35VlOEV81USGDUl3O3LP6VW8sMcPUYENMUxIj0= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1763473030; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=d3gUrZvavUMAU8h5VSMZBDp0633KA1vXEfAJbZw9Jiw=; b=XOkSykS+JKQMREQaVvZiv+Hz69azGed0+Wldg0MnGVsFRdtKs4L9Vfqc2RhkyuW9Y6L+6DndermYkhIPLyWbiF6L6QptGDXlMeIus7vGPSqpDN8ZYgth52AVvsB6ArmeC747KLJbmCvfgd4QjJTq+Iqg3WlsYc+TYx0REiTFbjQ= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1763473030720521.3810729553147; Tue, 18 Nov 2025 05:37:10 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1164705.1491655 (Exim 4.92) (envelope-from ) id 1vLLsz-0005lt-BA; Tue, 18 Nov 2025 13:36:45 +0000 Received: by outflank-mailman (output) from mailman id 1164705.1491655; Tue, 18 Nov 2025 13:36:45 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vLLsz-0005lU-5Q; Tue, 18 Nov 2025 13:36:45 +0000 Received: by outflank-mailman (input) for mailman id 1164705; Tue, 18 Nov 2025 13:36:43 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vLLsx-0004PV-QP for xen-devel@lists.xenproject.org; Tue, 18 Nov 2025 13:36:43 +0000 Received: from AM0PR83CU005.outbound.protection.outlook.com (mail-westeuropeazlp170100001.outbound.protection.outlook.com [2a01:111:f403:c201::1]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 9db4274b-c483-11f0-980a-7dc792cee155; Tue, 18 Nov 2025 14:36:41 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by AM9PR03MB7217.eurprd03.prod.outlook.com (2603:10a6:20b:26d::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9320.21; Tue, 18 Nov 2025 13:36:34 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb%7]) with mapi id 15.20.9320.013; Tue, 18 Nov 2025 13:36:34 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 9db4274b-c483-11f0-980a-7dc792cee155 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Eie4zLhrAkOdIAk1eUdnJIzOmlattSEw10nMlBUtYKc2+8XKqze9TRUtnrOnFoBMiGBJZSCx7I0EB99j/iDYOHinZcf8OHCVOcpK0WxA2w6wzysKQJM3of6Fg8BUQTwjcabq7FIHOekmNdR7crQo6kR+y+RnbH+HgQbdr+ueOajZ3OcFUV7kWdZUAww/T9xFIxMyKOKVbKInbGJoXNkdLxB1fZ+VYWtysFGXrvfUvM3+5HDf9/4OyGHOkUSGHhLifuK8KRKHMt8wQ7jhBcxISOhvezXxBDsKTsSt9dGNqTdQZM8vS9mXpzEApXxeV+mu8ztFMXD8Qmyy4bATQbEZHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=d3gUrZvavUMAU8h5VSMZBDp0633KA1vXEfAJbZw9Jiw=; b=EBYDNCPG3AXzybmXTXOWfOTX0ObrBcqXWB7xVXDRI+UZ1jYKar/45sCofxaY+1mqwTVTT1uN5Zh1z2XH1b31xYLm4JQnzkuW7UPzBd9F8lkss0E9UyyZ90bXRHCoUhFalYHp/tn1p7ZKq8JqkZRLuEuZLrEYeBJOlfGPwX9nbZ0bjKaZStbZk+gc+Ux7cQ+XWcdKYLpe5XcdlH7kahvD/qmSsbJ8XMqw0dAs2ypIW1lnzfbj7mek/e9TGSHp4iifCPMgWj+0/uesGldTCLrlVFYVTK3G3Q8jqGb8OcWKsOLN0lFH27EEVDIpFxtIEI8LL9BUzlMLlFqz7vJx2krLsg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=d3gUrZvavUMAU8h5VSMZBDp0633KA1vXEfAJbZw9Jiw=; b=IAekcQqfIZDoWZNpk6/N58dJ6MM+gwEfQ3flRYA2Wb07WvZCidT+D50bVAjT3i64UYI3n+q4kOWNVW/qSefZPY68StNsAAQo4q8lDzw+QafBxpg5WX1p8bTJ4yoMFrlAmbNWGuQ3tW+LCXDLp/s/UOm+NjJmzjDmH8kt4j8CqxkCDik0NKwCYrpHrTSJ7asGEIS6Moa8Hi+Qwd/eUkWJ1Jixf8O/7dcK4NCFiu8uNstvrFKalQaazyGPkxyJM0yqyA9sC2vGmpFgbShijPj0/aPOI9OeRcryFitwW1yCmYAzN9a9SqRPyXxahSq9OSYmavzura4scYWKYQMNjjPjmw== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Mykyta Poturai , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk Subject: [PATCH v3 5/8] arm/pci: Mark pci_host_common_probe as init Thread-Topic: [PATCH v3 5/8] arm/pci: Mark pci_host_common_probe as init Thread-Index: AQHcWJBbQ2jIUgN/N0aOfhp6b7S6kA== Date: Tue, 18 Nov 2025 13:36:34 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|AM9PR03MB7217:EE_ x-ms-office365-filtering-correlation-id: 2d89d1dd-2a2b-423e-4097-08de26a77dfb x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|366016|376014|38070700021; x-microsoft-antispam-message-info: =?iso-8859-1?Q?+NzbDBxNv2zGlnj4ZHGvFR+CPe97rZ3hMui3rB1AaOGNTnvLVmn013FKZU?= =?iso-8859-1?Q?B9Z4oFb/6O7KsdzQtRIk+ct4hTyJPZwSR8OxRxN96g1xLsqQYxYuckuViO?= =?iso-8859-1?Q?tEvVhSDVj8PtRgDn0/LtDPg3TcwgqBq7xFSV8KpZYpEdU8iRzgq9NcA2yU?= =?iso-8859-1?Q?TZ4Uib1+1L8TgX2x7VDJxAqM8ycV4IAaNQMaN8oxTBACRKAqft6qviB3AL?= =?iso-8859-1?Q?73o0fnTYh5gySuZzrfT0ti9nd7nn2/n/7GRXT/AIACTTo1nwJPgP8Ut8NH?= =?iso-8859-1?Q?VivwNylCSEb11JAhlGRBllB2MnU06FHo1MBbTcG7fn8sC67rsCDxiAUZJZ?= =?iso-8859-1?Q?yZhYy/VOaJjY3QpwTx1jJxTkACbVlAjmJXpTsNvRCty9qHRF9IbUr0Q1Q/?= =?iso-8859-1?Q?bVMfoFYLakkqW8KNSn90iVDI+/BgePSrNtyiCK65X/KMj6OOI11O869kBu?= =?iso-8859-1?Q?ALoreYoUWu9rkRGR8ufGsnODpgL27XciVtDMRyoqog1S1IokEDT39NOiN8?= =?iso-8859-1?Q?lMr0jZTijSCL2UTKlRr2f/lYSsiD0xEiYyp+3UYyL24NJ8MRcpDcv66Ssj?= =?iso-8859-1?Q?AJQ+jthaRYmkAFxMKxiTHI8BZuovIfEKu0LiXatpVLgFisOTn1XWqmDoCi?= =?iso-8859-1?Q?+gaZ4wUnP898IFu5OFNzMnkVMWbrtSTHceXnu11pOHOs5KnXd4NdFzLAkh?= =?iso-8859-1?Q?SDQIJi+SZ8Blz98iqXHY3HAZh9PZLXJV4AZKezxs0Bqy6EjHiTGMW5kBsR?= =?iso-8859-1?Q?Pc38ltz2Cjt+BaeeQ8j4mR7C+N2chmqrJp21Z4UH3LLbCrklVUEaT7k4oo?= =?iso-8859-1?Q?+xGW0vXObn2ufLRFjWBNGVOP6cJdLOK5drZTYpeHwTn5M0pSvzzyj5aPSY?= =?iso-8859-1?Q?T6KWkJ3BLyyYR6cBn+qAnqauGog/07cqPTg4hmpAb2i4XAMxWjvEh8mEmS?= =?iso-8859-1?Q?fWbdsV78O0zpm2P4AvrXTGP78JkJ5mFR+cgmfO8nXV+m5o1wInH+itYn9x?= =?iso-8859-1?Q?gQ6qW9r8UvvM7fRQ1sAUvRq2n0vOM0JBXdLvkKMshfR0k+RxSVG5wC+C0e?= =?iso-8859-1?Q?qzng89OXxxYLCb67b6czQQnYZK5QtD4fRIjyL6lK1TIYJLx2SfOSqYNZIX?= =?iso-8859-1?Q?lRZfvsLNbXG62Sadmq+7bUziLXBXEyf60EMuvx0eAr7d8vzdx11s0eZE8d?= =?iso-8859-1?Q?XKclhYaUmVsGEElKWbsook6RMsqGYSVCEPfLCcopK8NHLKYDrH3zJAcL0T?= =?iso-8859-1?Q?3b6Cy7p2ZEhiT1Omw1kWlNmD9VqRfdif7v9o8QqDpi5FkB+swfUYNG2Wwv?= =?iso-8859-1?Q?+HNIg8ChEROQ+r8BP3/0JfdSBg3RiU0VO4pUfZ2ZbVy41ltWLXYRkfzwjp?= =?iso-8859-1?Q?3A7icrJtk/sCxpjaRPbcVC2cpfV99QxpSyho4JalzG+ijzxygAWWTROTIL?= =?iso-8859-1?Q?q652AlRIIFX6bVMTxwyh6N3+MU818xf5kYkCmi6MZmRTBMUQmWz4rLoDR4?= =?iso-8859-1?Q?L5LuFTyebd3sL7E0hHgV4JHJpXtSUDdeJNszwD91IlqBl3HnMF//J5RN1I?= =?iso-8859-1?Q?51GZqoiFvAxd8QG4oBBrAMFM5GcD?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014)(38070700021);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?G2fMD2WEbWmxTTJQnm9wJ2rCHlxFwRlor1laHmuF77xo8FGQsv/emRiZu6?= =?iso-8859-1?Q?4G49YmTEqXEkAYL+/SLCg04giEZiKhaM+rJQwcjJo3jcFqFY9Vf4zW12ny?= =?iso-8859-1?Q?OYtfNtcBrSKGwXPfBra+PJwNaWLvEN6Us9RJ3sO3+VgV8niD5+9r1o1Vo8?= =?iso-8859-1?Q?Xl/l1eAU7iWuxEaC5rObkfRhz8ghe+/HaL32e7JAbydYnaA6Xy9znWlmjA?= =?iso-8859-1?Q?tzsZqNmblyZf2IVQgQXG2+MaWTXAdexud+/DYEIQqabmajBkzX3oBX5EwV?= =?iso-8859-1?Q?tKOb9l8n8wOp+iF2qEpsjgG9+y3ZEWAO5pDHwfWcVq/Etqz91DS0JOH/oi?= =?iso-8859-1?Q?5tjDGchKF/jfDRMUMLBr9XUbEfpp4oNiw5PYyg4sUUYltEkB5TrVOgq6xi?= =?iso-8859-1?Q?CONMrSwu/nCcSN4wjYk9N9I1MGyppOg+Dz9Ku4ffGtB1ozrYL/koZU6nRZ?= =?iso-8859-1?Q?Q/jgX/RCekxhHkuLKAJcxBmf6l/yKLipQ6lbWcLgIHrtq9y4KFSrGzSQk2?= =?iso-8859-1?Q?QVezshN1bxvIdjEq1ANZIxfUHb4EFrB1KGVUPU0BJuazce+/mCr/L/RuU9?= =?iso-8859-1?Q?0AX5c/pbhW6KFnS1l5heo6Ik9YSWg9ECl/kfUjXJ2g3zb9eawpYE6vb2OD?= =?iso-8859-1?Q?Jk4ISFKMV+sK9QjnWu5u0WjWoAzrExBn/vuNe14UD8UoVdlf563isScr8t?= =?iso-8859-1?Q?3Ho6/2UkxsZAZ3Wru37GXgbMABvj2BjPZiOvmxxTUTLqlzD4RH6egPVZSL?= =?iso-8859-1?Q?jBR4/bmNEuVb779Lx5x/Tyc/VC4VaQZM8zOOtM4wnb0nA1ZonuS+jbT8LS?= =?iso-8859-1?Q?X7J/BKSYn2AL3EXfTuaMqZUZ5/SfrRq/nZahi26bBNYa6NhjS/Jxf5O5ll?= =?iso-8859-1?Q?32EtOERKEQguG0nV9WB52S/WpsHuYs2l2AP3Wo7Ic1L9XWlfM+zc4080hF?= =?iso-8859-1?Q?/5HS66hwhTxamwZdPeE5khLzJpkXsFVuDtmk/GEnkcPo99Gr/tdY0n0fhF?= =?iso-8859-1?Q?L1mMdUvSqj3vCDAKMoc723PMAtdjK+B6UklRLNCAH7r+mtyIWF+CDqMH4q?= =?iso-8859-1?Q?FXHQdLkhmbwBC5UBWS//LlpJyKFmz27GcqwoEeJDt2/meyqmi4+4hxIH29?= =?iso-8859-1?Q?aAMfrNHT768FkM4nriED6swgHtN9GVUz+RDKbIoS7YvN4Hr3Hm8Pb7/V9x?= =?iso-8859-1?Q?vkS3yF1wm1v/VbjqpqDvjuileGIcSCXIo0jzTybLN8wsW7PYEoCNjhgcMc?= =?iso-8859-1?Q?jSmrKzhdvV+DkYUataTQ818w1BQeb9X/Q7Q/C/V//B9VpCL4OsgBU6MMdT?= =?iso-8859-1?Q?VP3Ls84TVov/apBj4G4u91IUVHHV3svfUGMeDaneiEUl+pzAq5KQDEYSAa?= =?iso-8859-1?Q?wkPTJ4peB4qKdfNNhZsmlZQuZrBrCl/KwFRB4A6u23/Hv4jMmEVS3xLluI?= =?iso-8859-1?Q?MDAX8/IFd9TlWfUJA9FUTQa57Q6fiaLAOd74F9eQkcrxS2YXE0uVWBVNb/?= =?iso-8859-1?Q?ieHhpVnMsS+fmAy5eu5f8Gcy6TU7wHyEuQHWZWWXF4BPXA+V6VB8BR9h66?= =?iso-8859-1?Q?ViAtTtW++NMwz6dZMy0SpKg0i3R9bNVb8Vndg4Xb29g8+9x4Zg5ZiVfb63?= =?iso-8859-1?Q?6D6BkgEIx9eH9qAV8oHt4uMZK7KLOG07hdbYY8g0nFCSvXcnHUoHgsbg?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 2d89d1dd-2a2b-423e-4097-08de26a77dfb X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Nov 2025 13:36:34.7912 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: PRhkZhm/EF4hsEjXepal5bicSRyAALransVPn+Is0JLDa+u2hHbv2iuFrOlvvhqVUNNAcbtpHWGpcL/6a7El7g== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR03MB7217 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1763473033131153000 Content-Type: text/plain; charset="utf-8" pci_host_common_probe is only ever called from init context so mark it as such. Signed-off-by: Mykyta Poturai --- v2->v3: * patch introduced --- xen/arch/arm/pci/pci-host-common.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/arch/arm/pci/pci-host-common.c b/xen/arch/arm/pci/pci-host= -common.c index 46e7e3b707..de30fb0aec 100644 --- a/xen/arch/arm/pci/pci-host-common.c +++ b/xen/arch/arm/pci/pci-host-common.c @@ -232,7 +232,7 @@ static int pci_bus_find_domain_nr(struct dt_device_node= *dev) return domain; } =20 -struct pci_host_bridge * +struct pci_host_bridge * __init pci_host_common_probe(struct dt_device_node *dev, const struct pci_ecam_ops *ops, const struct pci_ecam_ops *child_ops) --=20 2.51.2 From nobody Wed Nov 19 01:56:09 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1763473036; cv=pass; d=zohomail.com; s=zohoarc; b=dPR8BgFOiaE/xEt2xQyiX+6ZN3zI1R/cWc9s47uVO0I3MKukRZYXQHwTZDxM7wwn3fGzzBFjrsSf3aaGw3ksdidnCZWqAViDI0UKN1WKkQ0rBya+fIL0nOeVFwPgFo22bP3qysOLDRxgFpuAvvbPRWNSC7WdI4VoZCWnwtO4ZK8= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1763473036; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=Q5toO1p7HM6sy4CzbYFdVDRmwNAwzJNlRltMnSAEZo4=; b=IT/14CzzN1+KAvQ3UalXYboLntpTF88eoHKPLWkHjew5sK4J1rqaYiYv9zSL3qPCphh3Kxhl7/vQLBEeM42/2Zx15S9pn2DZcnSZ05OqBXKjAW41WfYGXT4i6P54aL/lV+vgi5WTYfjBKniEP9lN/GZb0z714Lb8H9Ozfw3Ka20= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1763473036194707.3418008692937; Tue, 18 Nov 2025 05:37:16 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1164706.1491665 (Exim 4.92) (envelope-from ) id 1vLLt0-00062z-IP; Tue, 18 Nov 2025 13:36:46 +0000 Received: by outflank-mailman (output) from mailman id 1164706.1491665; Tue, 18 Nov 2025 13:36:46 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vLLt0-000620-DY; Tue, 18 Nov 2025 13:36:46 +0000 Received: by outflank-mailman (input) for mailman id 1164706; Tue, 18 Nov 2025 13:36:44 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vLLsy-0004PV-QH for xen-devel@lists.xenproject.org; Tue, 18 Nov 2025 13:36:44 +0000 Received: from AM0PR83CU005.outbound.protection.outlook.com (mail-westeuropeazlp170100001.outbound.protection.outlook.com [2a01:111:f403:c201::1]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 9e8b6f8c-c483-11f0-980a-7dc792cee155; Tue, 18 Nov 2025 14:36:42 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by AM9PR03MB7217.eurprd03.prod.outlook.com (2603:10a6:20b:26d::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9320.21; Tue, 18 Nov 2025 13:36:35 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb%7]) with mapi id 15.20.9320.013; Tue, 18 Nov 2025 13:36:35 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 9e8b6f8c-c483-11f0-980a-7dc792cee155 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=gcVm8N55xdEMAEBPDMW6b+jg0V7djeIZHf0XPEIF0wqAhiuH+vy/zQ6Blva++d+1vOzG3K235KS/dEXmSdRR7ZopmEI+AwZ0MiZ/u4XIYghN6P0fcfSCZvYSjjqGqfqOZn094sZkAcSlObiVKrCkW8WjhUZaBuw7GPblQLWizij61kvoUHextBhapRhjSG02MuO86TD7IB/sg0YlQTSwDVBJqkWNrjEsUqhrWIhUjQXUwqNT7wJcDD4l7m2+evhkaKWc3ElMXuvPXNZv6QrKf8WNCoWgaXhTSi6arsLC3VvC2Qf2Z8gArrIu9bSYTDTXI/zv0+4bkA4jJ90GdEOJsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Q5toO1p7HM6sy4CzbYFdVDRmwNAwzJNlRltMnSAEZo4=; b=ch2yLWxiIM2sXJwKQ3Z61UJWBIgcS2DR4NpKN3kxxGbC08YxXh+jjTBrrzJXXBijV2MYVrQBQ4/3eoQPmQFbfkEdmfkkfSxLaITuvAOXm8JuFBliiOv0VVzb7KAP5wVaQp54GkllZYiOzXZ14vqEa1SzYrZnoNN5U/my+9TeY3Y/e/B6YswT5XIA3DcMHcuHsvzMrsBUFWDL/QoEM6uHLBwSBxwygpKJxqpqit3WmDNTzai9TA2sgT5m06oQGvyPWF3cLWOMApobsXamQXGjURRjGLh2oNp1VOMzxSZ4mwPZTJmQ2QnuWtCaV1Z5/ZAM217e6W/xD6KPJGorwuPjxg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Q5toO1p7HM6sy4CzbYFdVDRmwNAwzJNlRltMnSAEZo4=; b=tFqSSmQG8LvDQPvEwNnl6/DwbEPSJUiWVRJb85+OkhnM5/Ray52toqAEEuo+n/GBEklc28GiWf02h46Tk+KIZ3qu80Yj4iHTxTSCpKiEN4+eOEQeNa61/mloQ5VABsbUjkvLw7dDeuotNxlV3mbJvZ44YX1z1oNbzU7GQLsgfx2suexgsd9k7f1xGSwcBOAjtyZQ3jzA5Bmie686336E+RG+in51s0DwRMIGSdGIKdKp/DS86WALIrfv2+6FTjcF7c/CKMwG8j1rxW8UVH2MRgKrX1sputQWDB+P8CTpVMetohkkFy9KOlS1h/8a2v2dIysmHamAopT06f8w++cF3g== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Stewart Hildebrand , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk , Andrew Cooper , Anthony PERARD , Jan Beulich , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Mykyta Poturai Subject: [PATCH v3 6/8] xen/pci: initialize BARs Thread-Topic: [PATCH v3 6/8] xen/pci: initialize BARs Thread-Index: AQHcWJBbzP55AknCK0ePM8b3+jQIaw== Date: Tue, 18 Nov 2025 13:36:35 +0000 Message-ID: <20b26b4a3f180139971105ee1b23cc4b0a82092b.1763462211.git.mykyta_poturai@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|AM9PR03MB7217:EE_ x-ms-office365-filtering-correlation-id: 49be56a2-b3bc-45b1-00d6-08de26a77e4d x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|366016|376014|7416014|38070700021; x-microsoft-antispam-message-info: =?iso-8859-1?Q?rQe9B5mUvRF/UAxSZDMDAbocGgdbKrJdcz6LV3vVLGMoWI7XKwjpn0Q3MG?= =?iso-8859-1?Q?PqwGvrTjQDeDNrqjmBU4AR+h20wg22KGbdlR8/LEOZsdPozFVeJ4BRpm8e?= =?iso-8859-1?Q?wvfbES/gPrVsBY14mrYJrmOlo+VxHQeHoES6owF9jNkohWqtB82k/GJQh9?= =?iso-8859-1?Q?/EKNuHIPVM8z+VRv0iZqJmAp7kDaa28gsjSZSvGzfg86ar6FOGok6Z4rgC?= =?iso-8859-1?Q?tkWJqe/TBwC1LeDAS1MIf8IjKxTMJqsSXHC0vLsqrSWQmIKLMr87vhbu5C?= =?iso-8859-1?Q?zsFKKG2yidfaaAH++uaHMaKxzS0fFvoOVdRKqDn9uw3/WafqBu2K24pjIe?= =?iso-8859-1?Q?y6JRRWtpJDSxy+t3lX2m41e5To2ipTlhXBKmdRdGsZWPJvUucEmY2qGEPj?= =?iso-8859-1?Q?l91qKyoD7O7y8VEumaXdV2/m6LXi2uSl4ExTKelgPpYlv9+YMlX/e62S1Y?= =?iso-8859-1?Q?6r2SVUgt+5TdQmHFl/EOE2XvdvBZ5lFMUnPYkoRuI4cfmU/04ZklVbhxCf?= =?iso-8859-1?Q?Jk8zOG8tbT8AK2PPqETbX5qnx2iLzA7sHX+zcGQA6dgULHG7qk2IVMyers?= =?iso-8859-1?Q?3F45/xtQ7JaDsXSOKakrQJJVRk16JSz9SRFYGly+jQuy6C6AP/PQoaxmZ3?= =?iso-8859-1?Q?/N0VkpWqxuX3O17TBiy1/8Qpxj19va1fiTCsDsA4hXZlAuHnp3FztgT0w/?= =?iso-8859-1?Q?Gukff5lnLL/84iXym8PqC4z2gNBPltLYAOzZFm6XoeNxy0kQt8gAnstJya?= =?iso-8859-1?Q?Lo+iQRFgy31Aescg6pjCQecOV6zbKkRvmlub/LMOXoFpisim0r2mmkXSyv?= =?iso-8859-1?Q?w6yeVD2/D5DP4IItV+XsKfbhPGoS4iaHYmomrZsYl06LCTL9oBbh+aCLux?= =?iso-8859-1?Q?R4mZ24IcJzlOUIB4eNFPByBVrED75QNGykjxD/51ad4287doUP3/3iOxBG?= =?iso-8859-1?Q?MpCs1kE6nT2q64mhis+1KqgX+R2FaHRJfpH1K7TbLSUkrpcgtLgS4a6SmW?= =?iso-8859-1?Q?ft2vXzt3T9vhSRgdvSD+Q4ZC7WouPptGz0OxBsW12xf8JGDGa57p5UpLOk?= =?iso-8859-1?Q?nokXMYFtK9bet9g7kw6jUCEbaENJ57uxKasWSGZl3jNXGCrKq77jHNt2Yu?= =?iso-8859-1?Q?2ztMO3xruDkFO9y0wIDE7MgDL8BKUSSya7qGI3PnGu4Gk8cQ/FUg3PmWUe?= =?iso-8859-1?Q?7eOsgK0fkmAU4Hj+Z50I8SgMnXKYNNrRE+TjS+rNHYCfsGgd0IT/fTDlZ+?= =?iso-8859-1?Q?OWG61HbLDm9mZk52GZ6hzBE8H5c/MKGjq01Vensp8NPJhRRfGv7hJBNAXM?= =?iso-8859-1?Q?pAvNhN8JQTux5sbDaBbqaTZ7WRd7f/3nmV8C4JdMfotkMU55tiMZn+PYzH?= =?iso-8859-1?Q?ygNbO62ePLRKbsPrXPlnmlMqGJm9sjCFktC7CWfRSbUMf8nf+8AWw06A8C?= =?iso-8859-1?Q?5sw3aNdN10rKstjNuTH7O8lCysXWD1jLjaPqi7D9HSHkESrigVGpJsAlew?= =?iso-8859-1?Q?cn+N1ERl6JVhKamDxPvCFUJpumSENtbbx9MKfPeMwKyL/rzbf/zYu8JFR2?= =?iso-8859-1?Q?iguUAl/16TJThNpmigd6pyQKT54/?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014)(7416014)(38070700021);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?2m2hGsY529pgOX8jjzWVC6+4vRgsA9uOFoGQW0hONQIzjQY7kOeGzVFKWc?= =?iso-8859-1?Q?5En13niW0Z8exbPln2bmc+79rj8oDDNgzdl4G5CwZLbBP9u9NPib81C2rs?= =?iso-8859-1?Q?01kx5XYViPx6iRh8h3bLaTFp6vviYESg7mkkeG9KUABboq6u9tW6+vif/c?= =?iso-8859-1?Q?tCFgSuXdk74kcPmnlY2LVBMpWi4Y/2bScP3wCmbgoq7swRdj5PIOJyfbHM?= =?iso-8859-1?Q?FBSY5PjJ/L8Vc+BHqccqkCNV2yAl6OoeOWsh/mWZiDb7eZLK/73oiSbG91?= =?iso-8859-1?Q?112LiYEeibUolGkrQ/qhxg/vZ6jbodCsgYFPYRx9Lq/o4TGWwgm6VNgBUt?= =?iso-8859-1?Q?qWfM5uB/DFq8zt+MIR4BlpeliwoG1VJiZO5jSuaSv/gI5HbLOyjuVhcvtH?= =?iso-8859-1?Q?eRsOP0/IICIqpH8tQweihG7kVWfmwktu95IPW7ziJXZXJeiduxh6oTicz3?= =?iso-8859-1?Q?HFY+7nTGYkNMdVmBUR+JUXW9E3mEzUr5kHPG9WywFH6U0n0zEIBqrV9aII?= =?iso-8859-1?Q?Z9ZdVOPMLT8dAH/qdDk44NP0CIHSRbuMbESM2dLsquCDRWmW+sZf/PPJa/?= =?iso-8859-1?Q?d/rNr7cbK14AFXCqYcue/WbydwqSktz8bBhAaDIaMl0f4sKl3ZKLk1NN8J?= =?iso-8859-1?Q?rcSxkyxWoWef4sdIs3nksiunhdzFs3xAMQB2AQsojICU4ayLoxkjojFgQA?= =?iso-8859-1?Q?ATaetRSevWkXjrQZaYVAIu1Lj7F3UmbxmhMyfU4SUgDD88eygtseD6YPH9?= =?iso-8859-1?Q?v7LGaqt9LHYaeQSnZfQAzTbkJBbaYLBAoEey6Kk8xLz4nO9SGVbYYI3j/f?= =?iso-8859-1?Q?GXD18Xk1OAco2YKw7DZ3FKcNkixE86eTxDzPqthIxAkavl5u0UtOEemulG?= =?iso-8859-1?Q?F76VDBWwv7y7xb550j5i5Cc7WtjMlJ8h+P3F04DDfS7V+XBVKeQquU+Dpb?= =?iso-8859-1?Q?71Oka7h13sCqZbvxFnNKWd0BVL24z1sLy2h77+4XSa7vrtoypyS68LY/bF?= =?iso-8859-1?Q?8Ec52K7QFiJa7DAm8ibM01hlcuUqfte9zZ5VnGjhTT/J+FUYDwWsM9+kA8?= =?iso-8859-1?Q?yjzngboh+LuXQCbSVplnFBvJlGFFm5QWJAYXK44ayUFYS+QNdpoLHLsf+V?= =?iso-8859-1?Q?muqFh5pZYt+CLGQz6QpqCPcSsWG9eFaCyPPbOfPsE0d/6RRO/g1HPVeaRW?= =?iso-8859-1?Q?47zV1M5w48Q0hFrpej/7PlfSM1N10UXIlMQg92pp9sVP8h8sb9V1FgyTTG?= =?iso-8859-1?Q?dbSS/GCEq0iUl2iJ8WJg29UnZPjmLVP1iZpM6/Atpg/L9J1Uo3rjDq3VvS?= =?iso-8859-1?Q?dxYJIpN40W0pUUcHK0kG5TbWc1O3qnzPGWw66otrah+JUaEkB20AYGzslF?= =?iso-8859-1?Q?2q2qOi1wI8oJBWn1Fk7OLIwJ1Vi8U/cPIqcm3pjOQA+kUWRKqEAdrW36H/?= =?iso-8859-1?Q?xm0bOoCPsXGXNE1HcS/Y9D+wPN2nAwtLPzL1eVsvg/8dwyQ0fba68ryboB?= =?iso-8859-1?Q?+iq9O16H5A6+TfCi3gRf0+UrAOy4v9iPE1DK9Zr3DFMSTRS4ygw0dq6Gd9?= =?iso-8859-1?Q?L26WTdBpkNEWxl9tlWfTImkg55K0su3iYmtft8W+Twvo2OZvFkMdw65QSk?= =?iso-8859-1?Q?d4wNDDjX5TTliB8WUb66zLCLe3SbQPxzJW4e3+XLfF9N0Gsj1k0rTaoQ?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 49be56a2-b3bc-45b1-00d6-08de26a77e4d X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Nov 2025 13:36:35.3324 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: jUjJccpWXmj8p+d+wz79u60M5f3HKbxHoz1ywdLiP5MIxmiPO04lGC3c6dJbrwo8mvyU9g3b2JkLRtH/BnoELQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR03MB7217 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1763473037306153000 Content-Type: text/plain; charset="utf-8" From: Stewart Hildebrand A PCI device must have valid BARs in order to assign it to a domain. On ARM, firmware is unlikely to have initialized the BARs, so we must do this in Xen. During setup_hwdom_pci_devices(), check if each BAR is valid. If the BAR happens to already be valid, remove the BAR range from a rangeset of valid PCI ranges so as to avoid overlap when reserving a new BAR. If not valid, reserve a new BAR address from the rangeset and write it to the device. Avaliable ranges are read from DT during init and stored in two distinct rangesets, one for prefetchable and one for non-prefetchable BARs. Signed-off-by: Stewart Hildebrand Signed-off-by: Mykyta Poturai --- v2->v3: * drop hwdom_uses_vpci * check that rangeset can handle u64 * rework rangeset manipulaiton * mark more functions as __init * move bar init to arm files * style fixes v1->v2: * move hwdom_uses_vpci to this patch * fixup error reporting --- xen/arch/arm/include/asm/pci.h | 7 ++ xen/arch/arm/pci/pci-host-common.c | 92 ++++++++++++++++++++++++ xen/arch/arm/pci/pci.c | 110 +++++++++++++++++++++++++++++ xen/common/rangeset.c | 62 ++++++++++++++-- xen/include/xen/rangeset.h | 11 +++ 5 files changed, 277 insertions(+), 5 deletions(-) diff --git a/xen/arch/arm/include/asm/pci.h b/xen/arch/arm/include/asm/pci.h index 7289f7688b..ac4e87f9c1 100644 --- a/xen/arch/arm/include/asm/pci.h +++ b/xen/arch/arm/include/asm/pci.h @@ -74,6 +74,8 @@ struct pci_host_bridge { struct pci_config_window *child_cfg; const struct pci_ops *child_ops; void *priv; /* Private data of the bridge. */ + struct rangeset *bar_ranges; + struct rangeset *bar_ranges_prefetch; }; =20 struct pci_ops { @@ -154,6 +156,11 @@ void pci_generic_init_bus_range_child(struct dt_device= _node *dev, =20 bool arch_pci_device_physdevop(void); =20 +uint64_t pci_get_new_bar_addr(const struct pci_dev *pdev, uint64_t size, + bool is_64bit, bool prefetch); +int pci_reserve_bar_range(const struct pci_dev *pdev, uint64_t addr, + uint64_t size, bool prefetch); + #else /*!CONFIG_HAS_PCI*/ =20 #define pci_scan_enabled false diff --git a/xen/arch/arm/pci/pci-host-common.c b/xen/arch/arm/pci/pci-host= -common.c index de30fb0aec..28c26af9eb 100644 --- a/xen/arch/arm/pci/pci-host-common.c +++ b/xen/arch/arm/pci/pci-host-common.c @@ -21,6 +21,7 @@ #include #include #include +#include =20 #include =20 @@ -232,6 +233,25 @@ static int pci_bus_find_domain_nr(struct dt_device_nod= e *dev) return domain; } =20 +static int __init add_bar_range(const struct dt_device_node *dev, + uint32_t flags, uint64_t addr, uint64_t le= n, + void *data) +{ + struct pci_host_bridge *bridge =3D data; + + /* Ensure we are not using bits in a rangeset */ + BUILD_BUG_ON(sizeof(unsigned long) !=3D sizeof(uint64_t)); + + if ( !(flags & IORESOURCE_MEM) ) + return 0; + + if ( flags & IORESOURCE_PREFETCH ) + return rangeset_add_range(bridge->bar_ranges_prefetch, addr, + addr + len - 1); + else + return rangeset_add_range(bridge->bar_ranges, addr, addr + len - 1= ); +} + struct pci_host_bridge * __init pci_host_common_probe(struct dt_device_node *dev, const struct pci_ecam_ops *ops, @@ -283,6 +303,18 @@ pci_host_common_probe(struct dt_device_node *dev, bridge->child_ops =3D &child_ops->pci_ops; } =20 + bridge->bar_ranges =3D rangeset_new(NULL, "BAR ranges", + RANGESETF_prettyprint_hex); + bridge->bar_ranges_prefetch =3D rangeset_new(NULL, + "BAR ranges (prefetchable)", + RANGESETF_prettyprint_hex); + if ( bridge->bar_ranges && bridge->bar_ranges_prefetch ) + { + err =3D dt_for_each_range(bridge->dt_node, add_bar_range, bridge); + if ( err ) + goto err_child; + } + pci_add_host_bridge(bridge); pci_add_segment(bridge->segment); =20 @@ -476,6 +508,66 @@ bool pci_check_bar(const struct pci_dev *pdev, mfn_t s= tart, mfn_t end) =20 return bar_data.is_valid; } + +/* + * Find suitable place for an uninitialized bar of specified size in the + * host bridge ranges + */ +uint64_t __init pci_get_new_bar_addr(const struct pci_dev *pdev, uint64_t = size, + bool is_64bit, bool prefetch) +{ + struct pci_host_bridge *bridge; + struct rangeset *range; + uint64_t addr =3D 0, end =3D GB(4); + + /* Make sure we can store addr in a rangeset */ + BUILD_BUG_ON(sizeof(addr) !=3D sizeof(unsigned long)); + + bridge =3D pci_find_host_bridge(pdev->seg, pdev->bus); + if ( !bridge ) + return 0; + + range =3D prefetch ? bridge->bar_ranges_prefetch : bridge->bar_ranges; + + if ( size < PAGE_SIZE ) + size =3D PAGE_SIZE; + + if ( is_64bit ) + { + addr =3D GB(4); + end =3D ~0; + } + + if ( !rangeset_claim_aligned_range(range, size, &addr, end) ) + return addr; + + printk(XENLOG_ERR "Failed to claim BAR range %lx-%lx from rangeset\n", + addr, addr + size - 1); + + return 0; +} + +/* + * Remove already used memory from the host bridge bar ranges + */ +int __init pci_reserve_bar_range(const struct pci_dev *pdev, uint64_t addr, + uint64_t size, bool prefetch) +{ + struct pci_host_bridge *bridge; + struct rangeset *range; + + /* Make sure we can store addr in a rangeset */ + BUILD_BUG_ON(sizeof(addr) !=3D sizeof(unsigned long)); + + bridge =3D pci_find_host_bridge(pdev->seg, pdev->bus); + if ( !bridge ) + return 0; + + range =3D prefetch ? bridge->bar_ranges_prefetch : bridge->bar_ranges; + + return rangeset_remove_range(range, addr, addr + size - 1); +} + /* * Local variables: * mode: C diff --git a/xen/arch/arm/pci/pci.c b/xen/arch/arm/pci/pci.c index 951639eb3f..0330220e93 100644 --- a/xen/arch/arm/pci/pci.c +++ b/xen/arch/arm/pci/pci.c @@ -95,6 +95,108 @@ boolean_param("pci-passthrough", pci_passthrough_enable= d); __ro_after_init bool pci_scan_enabled; boolean_param("pci-scan", pci_scan_enabled); =20 +typedef int (*bar_callback_t)(struct pci_dev *, uint8_t, uint64_t, uint64_= t, + bool, bool); + +static int __init reserve_bar_range(struct pci_dev *pdev, uint8_t reg, + uint64_t addr, uint64_t size, bool is_= 64bit, + bool prefetch) +{ + if ( pci_check_bar(pdev, maddr_to_mfn(addr), + maddr_to_mfn(addr + size - 1)) ) + return pci_reserve_bar_range(pdev, addr, size, prefetch); + return 0; +} + +static int __init setup_bar(struct pci_dev *pdev, uint8_t reg, uint64_t ad= dr, + uint64_t size, bool is_64bit, bool prefetch) +{ + if ( !pci_check_bar(pdev, maddr_to_mfn(addr), + maddr_to_mfn(addr + size - 1)) ) + { + uint16_t cmd =3D pci_conf_read16(pdev->sbdf, PCI_COMMAND); + + addr =3D pci_get_new_bar_addr(pdev, size, is_64bit, prefetch); + if ( !addr ) + return -ENOMEM; + + pci_conf_write16(pdev->sbdf, PCI_COMMAND, + cmd & ~(PCI_COMMAND_MEMORY | PCI_COMMAND_IO)); + + pci_conf_write32(pdev->sbdf, reg, + (addr & GENMASK(31, 0)) | + (is_64bit ? PCI_BASE_ADDRESS_MEM_TYPE_64 : 0)); + + if ( is_64bit ) + pci_conf_write32(pdev->sbdf, reg + 4, addr >> 32); + + pci_conf_write16(pdev->sbdf, PCI_COMMAND, cmd); + } + + return 0; +} + +static int __init bars_iterate(struct pci_dev *pdev, void *arg) +{ + unsigned int i, barsize, ret =3D 0, num_bars =3D PCI_HEADER_NORMAL_NR_= BARS; + uint64_t addr, size; + bar_callback_t cb =3D arg; + + if ( (pci_conf_read8(pdev->sbdf, PCI_HEADER_TYPE) & 0x7f) =3D=3D + PCI_HEADER_TYPE_NORMAL ) + { + for ( i =3D 0; i < num_bars; i +=3D barsize ) + { + uint8_t reg =3D PCI_BASE_ADDRESS_0 + i * 4; + bool prefetch; + + if ( (pci_conf_read32(pdev->sbdf, reg) & PCI_BASE_ADDRESS_SPAC= E) =3D=3D + PCI_BASE_ADDRESS_SPACE_IO ) + { + barsize =3D 1; + continue; + } + + barsize =3D pci_size_mem_bar(pdev->sbdf, reg, &addr, &size, + (i =3D=3D num_bars - 1) ? PCI_BAR_L= AST : 0); + + if ( !size ) + continue; + + prefetch =3D pci_conf_read32(pdev->sbdf, reg) & + PCI_BASE_ADDRESS_MEM_PREFETCH; + + ret =3D cb(pdev, reg, addr, size, barsize =3D=3D 2, prefetch); + if ( ret ) + return ret; + } + } + + return ret; +} + +static int __init pci_setup_bars(void) +{ + int ret; + /* We can't change the signature of bars_iterate to only accept + * bar_callback_t, so use intermediate variables to ensure callback + * signatures are always correct + */ + bar_callback_t cb_reserve =3D reserve_bar_range; + bar_callback_t cb_setup =3D setup_bar; + + pcidevs_lock(); + ret =3D pci_iterate_devices(bars_iterate, cb_reserve); + if ( ret ) + goto out; + + ret =3D pci_iterate_devices(bars_iterate, cb_setup); + +out: + pcidevs_unlock(); + return ret; +} + static int __init pci_init(void) { int ret; @@ -129,6 +231,14 @@ static int __init pci_init(void) printk(XENLOG_ERR "PCI: Failed to scan PCI devices (rc=3D%d)\n= ", ret); return 0; } + + ret =3D pci_setup_bars(); + + if ( ret < 0 ) + { + printk(XENLOG_ERR "PCI: Failed to configure BARs (rc=3D%d)\n",= ret); + return 0; + } } =20 return 0; diff --git a/xen/common/rangeset.c b/xen/common/rangeset.c index 0e3b9acd35..6a0c20ab41 100644 --- a/xen/common/rangeset.c +++ b/xen/common/rangeset.c @@ -180,16 +180,13 @@ int rangeset_add_range( return rc; } =20 -int rangeset_remove_range( - struct rangeset *r, unsigned long s, unsigned long e) +static int remove_range(struct rangeset *r, unsigned long s, unsigned long= e) { struct range *x, *y, *t; int rc =3D 0; =20 ASSERT(s <=3D e); =20 - write_lock(&r->lock); - x =3D find_range(r, s); y =3D find_range(r, e); =20 @@ -244,8 +241,18 @@ int rangeset_remove_range( destroy_range(r, x); } =20 - out: +out: + return rc; +} + +int rangeset_remove_range(struct rangeset *r, unsigned long s, unsigned lo= ng e) +{ + int rc =3D 0; + + write_lock(&r->lock); + rc =3D remove_range(r, s, e); write_unlock(&r->lock); + return rc; } =20 @@ -357,6 +364,51 @@ int rangeset_claim_range(struct rangeset *r, unsigned = long size, return 0; } =20 +int rangeset_claim_aligned_range(struct rangeset *r, unsigned long size, + unsigned long *s, unsigned long e) +{ + struct range *x; + int rc =3D 0; + + /* Power of 2 check */ + if ( (size & (size - 1)) !=3D 0 && size !=3D 0 ) + { + *s =3D 0; + return -EINVAL; + } + + if ( e < *s ) + return -EINVAL; + + write_lock(&r->lock); + + for ( x =3D first_range(r); x; x =3D next_range(r, x) ) + { + /* Assumes size is a power of 2 */ + unsigned long start_aligned =3D ROUNDUP(x->s, size); + + if ( x->e > start_aligned && + (x->e - start_aligned) >=3D size && + start_aligned >=3D *s && + start_aligned + size <=3D e) + { + rc =3D remove_range(r, start_aligned, start_aligned + size - 1= ); + if ( !rc ) + *s =3D start_aligned; + else + *s =3D 0; + + write_unlock(&r->lock); + return rc; + } + } + + *s =3D 0; + + write_unlock(&r->lock); + return -ENOSPC; +} + int rangeset_consume_ranges(struct rangeset *r, int (*cb)(unsigned long s, unsigned long e, void *ctxt, unsigned long *c), diff --git a/xen/include/xen/rangeset.h b/xen/include/xen/rangeset.h index 817505badf..dcef96cb2c 100644 --- a/xen/include/xen/rangeset.h +++ b/xen/include/xen/rangeset.h @@ -61,6 +61,17 @@ int __must_check rangeset_add_range( struct rangeset *r, unsigned long s, unsigned long e); int __must_check rangeset_claim_range(struct rangeset *r, unsigned long si= ze, unsigned long *s); + +/* + * Find a range subset that starts at or after s, ends before e, + * and is aligned to the size. + * If such subset is present it is removed from the rangeset and + * it's start is written to s, otherwise s is set to 0. + */ +int __must_check rangeset_claim_aligned_range(struct rangeset *r, + unsigned long size, + unsigned long *s, + unsigned long e); int __must_check rangeset_remove_range( struct rangeset *r, unsigned long s, unsigned long e); bool __must_check rangeset_contains_range( --=20 2.51.2 From nobody Wed Nov 19 01:56:09 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1763473030; cv=pass; d=zohomail.com; s=zohoarc; b=h+okmvkaNSKE3pqQPZ6j+Gb3SFTH7agUR1nPJ3x5HCF8dPjg9fGBj70S9tQiV1qmSg4vWtgJB+WJPnfZF8gsmjB48UxFJi1L4hOSLdsPvYwJc6fDhfprJ7i49j+PDwAPnGQPulqdeAlvf3cSvsLVV6K2q1XTlKJf62JA5RZ459I= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1763473030; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=LKOEHIAYRgOWqREfBlgF+TaCvomfVedYKECxzp2okn8=; b=EzWwmdJe8pGdy3SWOk3n1cSIfRFKZTLRR8wnz/TcqutuMlZvjeRFzd7K9mpPKCYPfKcaircj7nxR1xXao9sPm+3xe8vnpL/bkx6SFat5+8TzIePMNajDovKmR5G24p2pLT6FAfwxujk8UerzQpOK4a1WRQxevrdG7w+PC2wP2mk= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1763473030176170.7025266534721; Tue, 18 Nov 2025 05:37:10 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1164704.1491636 (Exim 4.92) (envelope-from ) id 1vLLsx-0005Eo-QS; Tue, 18 Nov 2025 13:36:43 +0000 Received: by outflank-mailman (output) from mailman id 1164704.1491636; Tue, 18 Nov 2025 13:36:43 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vLLsx-0005CU-Hz; Tue, 18 Nov 2025 13:36:43 +0000 Received: by outflank-mailman (input) for mailman id 1164704; Tue, 18 Nov 2025 13:36:42 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vLLsw-0004PV-Q5 for xen-devel@lists.xenproject.org; Tue, 18 Nov 2025 13:36:42 +0000 Received: from AM0PR02CU008.outbound.protection.outlook.com (mail-westeuropeazlp170130006.outbound.protection.outlook.com [2a01:111:f403:c201::6]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 9d7312fd-c483-11f0-980a-7dc792cee155; Tue, 18 Nov 2025 14:36:41 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by PAXPR03MB7650.eurprd03.prod.outlook.com (2603:10a6:102:1de::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9320.18; Tue, 18 Nov 2025 13:36:35 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb%7]) with mapi id 15.20.9320.013; Tue, 18 Nov 2025 13:36:35 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 9d7312fd-c483-11f0-980a-7dc792cee155 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=tf1c8OM1No0joyhFwQJj3LuuI3FSHXtmeC1NQ8OcqGOgQa9fi447qmPwrHx3CZQ/X3r9I4La4v9FB7N+uCRHwD8BY0KSo/S6Xp1yKMLdPaGOL9N067e7DpBb8zRu6c/qAa72yhE+9NKXnzehd9TLEQxiFh1L5D1dT+EY27N5XW90Ro9KCvosFmWlFeW62vVzhOMD/+Htwavnj5faXHp5Y1uEv09NHokhVEqncRo2pfCobOFdmQETk4ATaS4qiquiD+k1TsFmwYa/J1bKd2QPJ/60+ckDow+Nc29e/ez9rE7ys1/Nw5DTnTNWcZiK9Uqqeb2j4QsHJq1oqhrnMjRu8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=LKOEHIAYRgOWqREfBlgF+TaCvomfVedYKECxzp2okn8=; b=raNVKwALER6IT1DtIsgYLNq1J1qWPA1j1rmuPuPRiBni2EFd0JQZjXnnxGSY5++TypiA/YDBr38KeEi8NVBcB9kGl/g4uiemT39IxCYx3IkrSKcHN5vdr9cyKzcQdpO6KkNwPQfzoWthW2NHc/K+bCarmY/7h0ZERC+6wf+/ax36+pNAOt8seoTLndCHL6tE6pN4QV8WcxnRlwANKH+9SZhcl7UucbXzzI8+Tl0zAOEW7zKtXK/CG13/aHO8vPY54S8b25/YO4L+z/mCeH0Jo6JLGl6YuWf3STEkl8j8KT94Ao9yaLv0zC1ycPiOVQ+CIh+JXgGLlrieknFEXaBCiQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LKOEHIAYRgOWqREfBlgF+TaCvomfVedYKECxzp2okn8=; b=qLSxp1k612g7PrxRYBBKJaPqBO0Y8ydxcySuMPBLMObo5RTNT/V5c1k2eh8P6bnZs6tmHnqN6ivLIGjz37B+Yi8AoqM6Kwauw5mrWYLreaUIgGnAit4qu3bQYsMORt6MDrfj45DMJmLovh+Kg1PKqsaxZCSF8R3hjEB9RYxFErnSBQoPzUAGsMUctXS9f9pDe5HX+kM/YGIKEIeKLKSeIZlaD0x/1GYc4MH5sp5NIo2H/WwlvC7oR1fgEcziGNa/upWjjyQ3xZVsFatsNJyUreUVGTbRo3Kk+GYqPYDKE1efVE2hzLurU3DPhic0WYEnqkMVZWRTKQBjtUSAeNNCNg== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Luca Fancellu , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk , Jan Beulich , =?iso-8859-1?Q?Roger_Pau_Monn=E9?= , Stewart Hildebrand , Mykyta Poturai Subject: [PATCH v3 7/8] xen/pci: assign discovered devices to hwdom Thread-Topic: [PATCH v3 7/8] xen/pci: assign discovered devices to hwdom Thread-Index: AQHcWJBc5bz51R8u20uOZBtSz+TqyQ== Date: Tue, 18 Nov 2025 13:36:35 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|PAXPR03MB7650:EE_ x-ms-office365-filtering-correlation-id: d8f28b43-ed6e-49e8-437a-08de26a77e9a x-ld-processed: b41b72d0-4e9f-4c26-8a69-f949f367c91d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|366016|1800799024|376014|38070700021; x-microsoft-antispam-message-info: =?iso-8859-1?Q?CU8jgtdrPDXy6v6kUN9fgdmOO/0mTB7yHkka5N7qQDo89Qs6xTyjEnJwvD?= =?iso-8859-1?Q?5cOj9CvqNbDD/z9FV5IC7/XjZZqMFSP3iGfHxGzbe2b1yRuXVx11PyUB/I?= =?iso-8859-1?Q?krY/ePpL1mr2RPJo+pIoArDTOqkQdw1DkdqQRU/Gv62ypDfZf6AG5hfBYi?= =?iso-8859-1?Q?jIOF24zdGzdcLSU8vPX5/EaNO9MLat/ct14T1xleX+vx/6Y1wti4eMufDh?= =?iso-8859-1?Q?JuIV2KXHFrce4vac/pC9GU5VxCDCMcRqvW8VdL8Do+9UpBoQUa/xWtZxkz?= =?iso-8859-1?Q?m4Vk6FkLfrAd6LGehNV4dWg16tkydjgWmWhEgjcGxHru9hAZN+9dCzDSEw?= =?iso-8859-1?Q?Z+tvGbPHlQB0brIQ7u1DIw5QY00cwPtg/NispbuawP/oPo9kYnYu65tTVa?= =?iso-8859-1?Q?/XE7OBaCM8MYzfeZUBxP8YKP8d7QWe0jObcXvz8vTrMnlec0oK41HpYigt?= =?iso-8859-1?Q?mASCVDYGYXNSguuu/DbU1mBAQcEor8+ZJsDZgeeu1rvc8pJ92I44QGIKiq?= =?iso-8859-1?Q?L7mHcYnjESFMntiCY5AYkC4HtrO46Vtk1QNf5OjU+qyCTmYc5lxR5B944P?= =?iso-8859-1?Q?xyKEztkKAvDMlVzGwsD2LuLCtOXls/39yYLFpRowtttZ7fAB0JxLmjozdV?= =?iso-8859-1?Q?O4SMB+K6+DTq0MLtQW+C5gaPrSgQ2KWro4S6aJu0SDfGoxqkgWKdkvC1wn?= =?iso-8859-1?Q?NKpFGagL7hAw+3ymUJ5KQIoThqSd3iJmFK1Xb5A59UWYvo7kfcUzEM/46N?= =?iso-8859-1?Q?F6Vk1xdI3nzsluoblTfgj6ENZ83d41XPnCNjIpRD8pNkrsL0T1flcT+8r2?= =?iso-8859-1?Q?jkRe7Z4aDf4Vzkrkgzek0NgDncHMUxeyRcUwN0Qo9KatDBttMyiGJKajRc?= =?iso-8859-1?Q?0qStuKjxyF2eg6Dh2uP7A0kCwQ4G+9FNDF8zQSSDjtQwCeEVso6yJPUuyE?= =?iso-8859-1?Q?W5MOJn9JOiAOxVLFKLO2pXq8ll8Mc+uADpvKT+jgHjQyuWdhM9bBof81oC?= =?iso-8859-1?Q?vVC8wBPCGuvKRDtTsbnqJ3JKmnKuAEqFFecsCWSOyhMZoCweR53PCPqQzx?= =?iso-8859-1?Q?NgIDjtDZjko1HUkfJKpQV+I0gFmVMleF5q11fYgf+nQTqey9EAXIl3Am7N?= =?iso-8859-1?Q?vQfKkJioo3mu3eEP5h48cxcEFvUw8mgUkEamXlnPrgZTyNx1oTNBHfZPaz?= =?iso-8859-1?Q?K4/Psxb0xzkqhPapwTi/W8KHPeCMVFa3NA4FJW2puXCGKggD045K2Vbji/?= =?iso-8859-1?Q?9WeYzCJ2vvBnMZ5zM9x6o8Wt/AsmjXrr6ix/uF3bCmkmv/mAoDSsE9uRm4?= =?iso-8859-1?Q?96v6vO+tCeHkr1l2SCOCHWxEvA2PVnz3l/jqkHHud9IxE0adobRmp32dyi?= =?iso-8859-1?Q?32b9i+GrcbE+XZnqy+aQA+3NiIfY6tzrmZW7gkOXbEzsrLJwKtx+LoBVn4?= =?iso-8859-1?Q?Nujd+QLNWZMBA51JuMpZCfuBYNgYXRKE2HGrux4c3LYJVWz0vpw7WXrcf3?= =?iso-8859-1?Q?J12D/VeeqHRj0F7fTsD7HRDYyvOMZ+/e6Ris4/h8p8ND+NFhY5bRNYVnog?= =?iso-8859-1?Q?lT5hrrEjzV77UV+5THjhzeV8pxxZ?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(376014)(38070700021);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?8qcQvoGBqkC9ck3r/qH0AlyElqc1ys4asYoheJpDytDEcRxjQ+UorfDRW2?= =?iso-8859-1?Q?zo2WYYUIX7fOHQcILRQDm0g0zrxEMD5QpBNv/Xf4mzS3mPjphXK/zwv0qZ?= =?iso-8859-1?Q?OOOX8p7YOd0NO8aeCDY+sDjqAWMrPcJxz0VGbFVZDhwdcTnocbJ0UWuyU1?= =?iso-8859-1?Q?eVXKfgUH01ia10Z3PBtgGLNRZaWkj9diBHQzUaMUuMr/f9tcuiIa3vavGb?= =?iso-8859-1?Q?4QNOUuvFdWD62z/XwedqfLSwY1kJlWV3M+dj3YU294d4uALktRjJYB0R/F?= =?iso-8859-1?Q?FV43aCTgAAabVleB2HXHw1MVQ16dI6LPRGXL23+jfWdtHXDe/htwgC2UsA?= =?iso-8859-1?Q?Oj7lCUCowHx0rwU1cnGFXpBlo6L6RBU7bm9xs2HxKuzcjC4AbBqB1O9edD?= =?iso-8859-1?Q?gHO4wwszocMlH4kr/6G8WRTncFMs52Ije+6+xrti/Q05DS54i27AVyXJQE?= =?iso-8859-1?Q?p53kqUZf381PGPq0BKxLcWK/eJEiPj8uIiQfYCjHf5T/8NLs5S2WPrT2iZ?= =?iso-8859-1?Q?SMCFY4sKNs2gLKOWcIUv3P9mBkYZlG5hwYGLP9DVTBzbto68dFEEgqxbQ+?= =?iso-8859-1?Q?IiBa7fRy7DyGw8ycavBFujO1cvnA0KAkoFqDsJm/8cWNjNdHn6C4+pJCni?= =?iso-8859-1?Q?kbFlHTNyKw5Ske1bsw8YeKozsOWYDSaAqooWCvpXVHOXQ3mpPDfvNOap9E?= =?iso-8859-1?Q?bQJwiRTNrdbHV5wkNAzO/aQg7mjl74MyxSg1P7puEOFtZVrNI8tioyOa/H?= =?iso-8859-1?Q?1THsH/2y3cSZ6RhB6H5v4TaCrnqWCnH8TIVxSLE5DsrJWEW5PXXnQP/H4l?= =?iso-8859-1?Q?QAcmhWXobM948EmkbGg+PFV0Nqp6IafTg2Bv+Jo9JTdMBVnffv5C0kEJho?= =?iso-8859-1?Q?J+QBrZHPGNaLKTeQkR9EUGRG/ky8o580l5x5zxceynZLCg4504f44md1+A?= =?iso-8859-1?Q?nImmANliH+0tvRGFB2Y/UjMsVfS9bGWVkMs+JgY43hEnUjBKMO2ckpUnuk?= =?iso-8859-1?Q?vEUI5kTrQUtXinyZ9ftzpYjvceNacdDBtMPWBONA7jOXL/Lk7rq1htUiVQ?= =?iso-8859-1?Q?QL9hU3TFDXOsr+H7AeJj1p8CzqIZLiB+I2SDZ4br9Y5b1FpkF0+gC729e6?= =?iso-8859-1?Q?Y8EqIfvV+rYk5o7yO0O3jcEVhWoeX65ZbyrRszQb2OVeeNTjUyBehhI0oO?= =?iso-8859-1?Q?cs9RCl6ctEf1MOi7uc4J4VReLemdRGvwL5D2JxhKCtF86Y4NDKwwJtzkPq?= =?iso-8859-1?Q?yr3zvr87KZJgErw1WwdG5wKNPOlkuDDmPtmdfR68A90HPpLUzbLgfjG/yO?= =?iso-8859-1?Q?DwowPyuZSiST1VFN1e6263BlmZgSGY3J1QF8FrFRWqGn4ZDFxXoGkswUyj?= =?iso-8859-1?Q?kBBR9nUsbhYFF9Vapul2zp1/HmRt1nu5QMnygejtOo9DI6AYS+qb8ZUG11?= =?iso-8859-1?Q?wttt4bboVcGMvstoS8mS78pbNNroDHA2yZ0PuVcVPU0T+Fjo1vSI9rxjY8?= =?iso-8859-1?Q?o1JmqkT3+Px5e/zvskL4I9zwvKKf0hPCsVzS1Q8Qrt2voZYYcHttYcpEK5?= =?iso-8859-1?Q?6KF++7sbMrVzvXUZA+By53qjNQ2LKBTgDdnwI2OVbmJJtv5N1D+khPBUHc?= =?iso-8859-1?Q?SVCcCQjnZR+B7e9a1VsKLV8g/UG86dZ/3PEJ5HqAxGiVgjHAPhAdMRcw?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: d8f28b43-ed6e-49e8-437a-08de26a77e9a X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Nov 2025 13:36:35.8148 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: Q/UYv7Nbe19fceVfoBCjacGCWf9bLVX+8NOrSsO2X7LubjCUkzLTM6FXJig95JkzZQ9iW4snmoSjdsGUtsW/kw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR03MB7650 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1763473031349158500 Content-Type: text/plain; charset="utf-8" From: Luca Fancellu Hook up existing PCI setup routines for hwdom into Arm iommu initialization sequence, only assign endpoint devices. During scanned PCI device assignment, also permit access to the BAR ranges if hwdom is using vpci and hide host bridges from domains that use the fully emulated one. Signed-off-by: Luca Fancellu Signed-off-by: Stewart Hildebrand Signed-off-by: Mykyta Poturai --- v2->v3: * style fixes * rework iomem access configuration v1->v2: * add host bridge hiding * fix build without CONFIG_HAS_PCI --- xen/arch/arm/pci/pci-host-common.c | 11 +++++++++++ xen/drivers/passthrough/arm/iommu.c | 15 +++++++++++++++ xen/drivers/passthrough/pci.c | 11 +++++++++++ 3 files changed, 37 insertions(+) diff --git a/xen/arch/arm/pci/pci-host-common.c b/xen/arch/arm/pci/pci-host= -common.c index 28c26af9eb..110c334f59 100644 --- a/xen/arch/arm/pci/pci-host-common.c +++ b/xen/arch/arm/pci/pci-host-common.c @@ -430,6 +430,17 @@ int __init pci_host_bridge_mappings(struct domain *d) unsigned int i; bool need_mapping; =20 + /* + * Only allow iomem access to ranges if we use pci-scan + * Actual mappings will be handled by VPCI code. + */ + if ( has_vpci_bridge(d) ) + { + mr_data.skip_mapping =3D true; + dt_for_each_range(dev, map_range_to_domain, &mr_data); + continue; + } + for ( i =3D 0; i < dt_number_of_address(dev); i++ ) { paddr_t addr, size; diff --git a/xen/drivers/passthrough/arm/iommu.c b/xen/drivers/passthrough/= arm/iommu.c index 100545e23f..124a99f198 100644 --- a/xen/drivers/passthrough/arm/iommu.c +++ b/xen/drivers/passthrough/arm/iommu.c @@ -19,6 +19,7 @@ #include #include #include +#include =20 #include =20 @@ -133,6 +134,16 @@ void arch_iommu_domain_destroy(struct domain *d) { } =20 +#ifdef CONFIG_HAS_PCI +static int __hwdom_init iommu_add_hwdom_pci_device(u8 devfn, + struct pci_dev *pdev) +{ + const struct domain_iommu *hd =3D dom_iommu(hardware_domain); + + return iommu_call(hd->platform_ops, add_device, devfn, pci_to_dev(pdev= )); +} +#endif + void __hwdom_init arch_iommu_hwdom_init(struct domain *d) { /* Set to false options not supported on ARM. */ @@ -142,6 +153,10 @@ void __hwdom_init arch_iommu_hwdom_init(struct domain = *d) if ( iommu_hwdom_reserved =3D=3D 1 ) printk(XENLOG_WARNING "map-reserved dom0-iommu option is not suppo= rted on ARM\n"); iommu_hwdom_reserved =3D 0; + +#ifdef CONFIG_HAS_PCI + setup_hwdom_pci_devices(d, iommu_add_hwdom_pci_device); +#endif } =20 /* diff --git a/xen/drivers/passthrough/pci.c b/xen/drivers/passthrough/pci.c index 52c22fa50c..70c21403d5 100644 --- a/xen/drivers/passthrough/pci.c +++ b/xen/drivers/passthrough/pci.c @@ -20,6 +20,7 @@ #include #include #include +#include #include #include #include @@ -1041,6 +1042,12 @@ enum pdev_type pdev_type(u16 seg, u8 bus, u8 devfn) return pos ? DEV_TYPE_PCIe_ENDPOINT : DEV_TYPE_PCI; } =20 +static bool __hwdom_init pdev_is_endpoint(const struct pci_dev *pdev) +{ + enum pdev_type type =3D pdev_type(pdev->seg, pdev->bus, pdev->devfn); + return type =3D=3D DEV_TYPE_PCIe_ENDPOINT || type =3D=3D DEV_TYPE_PCI; +} + /* * find the upstream PCIe-to-PCI/PCIX bridge or PCI legacy bridge * return 0: the device is integrated PCI device or PCIe @@ -1221,6 +1228,10 @@ static int __hwdom_init cf_check _setup_hwdom_pci_de= vices( if ( !pdev ) continue; =20 + /* Hide real bridges from HWdom when it's using the emulated o= ne */ + if ( has_vpci_bridge(hardware_domain) && !pdev_is_endpoint(pde= v) ) + pci_hide_device(pdev->seg, pdev->bus, pdev->devfn); + if ( !pdev->domain ) { pdev->domain =3D ctxt->d; --=20 2.51.2 From nobody Wed Nov 19 01:56:09 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass(p=quarantine dis=none) header.from=epam.com ARC-Seal: i=2; a=rsa-sha256; t=1763473029; cv=pass; d=zohomail.com; s=zohoarc; b=UXjw1Huzpm2OHOZyjC/GgfTrloee3kFFztnXREm0pnPXmPS/O8Zdr49dQpc0iMDIo2iHgtwEvv5ggiBKv+y8XyUhkICOTY8hL4nltdQAecfKvCmhdTfHBJXR/Kt4Kixnaf/RUORzR2mdxt0zZ69FquPLA7aASmk2y0R9yuJ0bqk= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1763473029; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=71+mXVMCcGmDzHT41p1W9p55Yh86fh2s7rzxAEHrAJw=; b=Hy39ZXoVO8nO/c+JTG8k/TyIFSx/ndzEc5nikwI0kFwr1t27gAH3hIKO3u5tnwsF9UGWh15Lz8JP0nXCBxWW6fYepRV5+qKPSPbXkxJBbLJhuIDVN3aJIzx6OylDBhqbaRAXMvppxlRuTKk1fcb1lRNXAtdRjRUfgZxy9RxoIYI= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=epam.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1763473029906712.1818491209583; Tue, 18 Nov 2025 05:37:09 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1164707.1491675 (Exim 4.92) (envelope-from ) id 1vLLt3-0006N3-3k; Tue, 18 Nov 2025 13:36:49 +0000 Received: by outflank-mailman (output) from mailman id 1164707.1491675; Tue, 18 Nov 2025 13:36:49 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vLLt2-0006Mp-VS; Tue, 18 Nov 2025 13:36:48 +0000 Received: by outflank-mailman (input) for mailman id 1164707; Tue, 18 Nov 2025 13:36:47 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vLLt1-0004PV-Cc for xen-devel@lists.xenproject.org; Tue, 18 Nov 2025 13:36:47 +0000 Received: from AM0PR83CU005.outbound.protection.outlook.com (mail-westeuropeazlp170100001.outbound.protection.outlook.com [2a01:111:f403:c201::1]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id a05f0900-c483-11f0-980a-7dc792cee155; Tue, 18 Nov 2025 14:36:45 +0100 (CET) Received: from PAVPR03MB10102.eurprd03.prod.outlook.com (2603:10a6:102:30d::12) by AM9PR03MB7217.eurprd03.prod.outlook.com (2603:10a6:20b:26d::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9320.21; Tue, 18 Nov 2025 13:36:36 +0000 Received: from PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb]) by PAVPR03MB10102.eurprd03.prod.outlook.com ([fe80::b8c6:f37a:987a:beb%7]) with mapi id 15.20.9320.013; Tue, 18 Nov 2025 13:36:36 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: a05f0900-c483-11f0-980a-7dc792cee155 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=W2bzKBtmeF64AUTos2yyfOpFsVYE7kE5n3/jf+ak0Di8PYvPF4Rwiloo+B0BQwaNuYDDnjhpvS0H0ZMXLeBJaD53J1fwP9OX4K72XxQ0cqquPijI0/sSTEf48JjwKzrRHAe/2a4j4io1lCTVd84ofyo9dRcS+xbemF+O4WUMPEwJ/CqI/0X/291zdVaNpHOVF07Mbmi8gcQhoRh+XBV0+hXtLkpW6xwaVzb+q8/XzWjjsaL/zQRG182xrwo0XzQEufZZB/0dx+qD02J6vTgmzFR+wn0QrEVjXMYl2kx5YkTKNSZW7vUXqO3QH6lW9SdweBacTq5ZNYu98OFVsFazfw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=71+mXVMCcGmDzHT41p1W9p55Yh86fh2s7rzxAEHrAJw=; b=N0ucQZzDJguJKalspgqma/G91se0Zdq3RC1H8AA2Ym741M4m+gHDuQ8LXEY0i/Cblre9jCgVSkNI/P8kUJW3zn6pQeYbmF/InWL06Gy61KYH2YS2eiE2tmzVqIBe3PsA6YY2nl8VqPk9YlxszGhTSbntcys1MY8P/0KJejMpPMRbVb7+Tn5Mpi9Yvzxd40IMLIX1hA4jMMu5xISNaGUGgi71vCEA/fGWSAYzCKT0N8gEsfEUwKlfbRDN3VB4wXox5saPZEA5OlqVGbR9AGKuRW+p3w1Vgq3R0IlJWLX9+gyWcnK0tv/gbBBE1D2B+K+SR2N8MlUpSpUxJCIg1Mslig== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=epam.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=71+mXVMCcGmDzHT41p1W9p55Yh86fh2s7rzxAEHrAJw=; b=E/VeAtKOzg9M5cTIPzGtYx0mCfGfpAMywO78hUf6mHJbbNA/WBzrbtbvlqKzPQMlBFFyUzzdwKOjb+AavcaSePSxK2QHUgRXQQac+cJWGyUCQqvmUKXrRIvK5vlrmte5j8973gR7VUxBVIkHi8iREs7exB2ma2Z/D7iesEAIHhHf/M3FoDSqtZA5TEXQZ7ZK5T37J6wS9f49h/X3z+Bs+EXtr56fvuELfjgeS1yF+u0dLI6RcYzHsyAYQbJtHseGek+RgmeRcbRSLytQ8xLYNFzdTsgZSpDV/H03p3eIK9kRi3tMMdsrsBqUw3n++fodkR+ueIy25EaO9uHJH4h5rA== From: Mykyta Poturai To: "xen-devel@lists.xenproject.org" CC: Mykyta Poturai , Stefano Stabellini , Julien Grall , Bertrand Marquis , Michal Orzel , Volodymyr Babchuk Subject: [PATCH v3 8/8] arm/pci: enable vpci for hwdom when pci-scan is enabled Thread-Topic: [PATCH v3 8/8] arm/pci: enable vpci for hwdom when pci-scan is enabled Thread-Index: AQHcWJBceLVR272n0Uem7ppfvpbz3Q== Date: Tue, 18 Nov 2025 13:36:36 +0000 Message-ID: <81b3d59050df8482652c081270350dfc965b5900.1763462211.git.mykyta_poturai@epam.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: PAVPR03MB10102:EE_|AM9PR03MB7217:EE_ x-ms-office365-filtering-correlation-id: c30c8f24-07d7-4949-6112-08de26a77edc x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|366016|376014|38070700021; x-microsoft-antispam-message-info: =?iso-8859-1?Q?bkP9oyIRUL9S1YL9lIJlZkqOHNto/J1moVKhxN/Qlua/n6eTa/xWw4lI+L?= =?iso-8859-1?Q?Fpnse4S4Bhp/0vhtcE2Fhf5xymC7ntO4WvBc33kK3PSjii7FjayV8XqWyn?= =?iso-8859-1?Q?ldTgKMYHkB4fUSzQfiiho2G7h4oyCdN81tdWxhzJwm3RF6Zb5oxVjrrrwW?= =?iso-8859-1?Q?9iGziGjtIZgA9bG0l7HfeYD4ZtKDNgU1s1Ch+/6347SYPPSFY/RTC9AYao?= =?iso-8859-1?Q?tfveDDaXo3QpvtDFaaTMFC+RtrEm0U/b8hkmZ6aX3avw6+qU5Fa2TuDxBu?= =?iso-8859-1?Q?qpEI3XLNjL2aJxnC92Qq726+6oYESMsLgKmUOCKNwPaqXJggGh7HAVEiuF?= =?iso-8859-1?Q?TkrqdH3KkfrVP+odmJToWqg0ihpoqZtd09dsmakgalArdvi+n4msnC58d7?= =?iso-8859-1?Q?W7Eav8GvyvW+O95PgGi3N5WR60s30VF2ZroczQvkq3Fia0pAVHUKrpndu8?= =?iso-8859-1?Q?E4PAPGSU1nmHzwJM7peyAKUrmAnyxEdxUkYINMmPRhJEwr4mJJMQEwMEy6?= =?iso-8859-1?Q?hARjyxn/lbTkZUKc2XLJzGrbgB6DIYiMwig7L5rn8hu/jwPXcRyF9cHqD2?= =?iso-8859-1?Q?FsKCnQFvtCy8SQhWwecoQ/TOawp8+rjzNoRqZGcfgq94uqgVeQ1AtZyS8w?= =?iso-8859-1?Q?Low9Ps4EiFEYG3VxvaFd0p8G57Z+CYnK7BP3NC/qWwfrDDqJa6C+cwV/rK?= =?iso-8859-1?Q?SAhQFVV7FPG/v9wYCSDHs2JkwofIWZzX89eYvU7XvPpyrL71/DIsPJQrUQ?= =?iso-8859-1?Q?WcJ+0YwJCG9+CjxePc4uVOYP9Hm5ZLlSeDy4o1IIXZ7Z8lgyfC+P+G9bX+?= =?iso-8859-1?Q?inhDEnbUHwJ+ZXCcBONZI0IMyU76USJdB27NizLXlttwxCq+T87UAGeuqM?= =?iso-8859-1?Q?4KSXipuVRCO9XexOV0R/PDr2FD810AM36T1S8+ph8TlhD90GaR7mLfZRpx?= =?iso-8859-1?Q?LvhgR0doX3PiMcXTz9mG5xg7Gr0z4p33ybAJ3s1RBZnSQ1wdx8jEZDVdKu?= =?iso-8859-1?Q?GwpzAxvi4GONXEpvffuMvi+usPOD0Ha1iX4b3QOawQoR1/GfSMJVA3Jn15?= =?iso-8859-1?Q?CxYPHGJfRVHA2gtDKvgYY+6mS3YMIpEzvvsedSpD6C/vXGJLqnuIuAo2mE?= =?iso-8859-1?Q?ulbPs9hzScCvDA+E3IdVbaYbD9JZwoPx2/0rAmK8d2pmt868JCQLeRo9Zu?= =?iso-8859-1?Q?OnQYZji5Z5jpcXAxsh8elxb3DfAZo9WcKKjDmbS1fe833i7oRFxRykUVa1?= =?iso-8859-1?Q?h8naHTF3Kiq7mmdMDq+rLIbsypJiU9+0frSPLMlyMGXbtgsoZCVWPqXoWW?= =?iso-8859-1?Q?XlrCNCLQD7jolfIWmZMC2qI4MQyg6BGYYHvph75Ch+uGjxdVHA8ZK843l2?= =?iso-8859-1?Q?5dD0rmadt43B5tW80ba2RRp1Q+SdhtvAUYko6DGjQHSEPyyejaFXQHyDo6?= =?iso-8859-1?Q?3Auc/FZmboNB6oFI/L3+3kisTNwNf1Hll6ypVe5DPE9scnqLYcaXbghov8?= =?iso-8859-1?Q?lebMvO5DK1vzbzdRNN/R4dYsNzYEits+xiOqiYf3f7Eat19lz41/u8XIe3?= =?iso-8859-1?Q?3+oUXAHwisCo6Bglkd0oK3o06oLA?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAVPR03MB10102.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014)(38070700021);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?shfWLQBmEWWUHPBF1SoVqjYzW/MiFI0P4zmlj9S1qmHr5aC2CXS7SoCP0o?= =?iso-8859-1?Q?mYKKk/8Y9Bzjn6S2bOz6kvvnCceIiD2RRBWKiUK5Q1gLDnybJRSu+M632u?= =?iso-8859-1?Q?LP7EfHycJgjp8Nop6e46u1F8W7j2NQKLVMB4vu5MBAC2UjHSapagxKrlNg?= =?iso-8859-1?Q?8SEudBqQk7BhsR1KjxifDJJ1edZufVw5J3Si+G86rG5dPxafDpbgdfp3uv?= =?iso-8859-1?Q?4B3M/byqHWsDz9/yTPUEGH885zBIXbZ8EMWMUYoYO71HD3bazFJXvcnBTa?= =?iso-8859-1?Q?pgnTCQNu4PN8Uv/8cxTLb9ByMF15eCtnaV78buTYq4yQwC9yiahvpAYw/X?= =?iso-8859-1?Q?XMqngumC5JRojhSRVV6b2M4dEzNE9AF9JV9b4x85vc7hSmyCARahI8IxJg?= =?iso-8859-1?Q?Sa9p3E6odRaCcGY6Y9+ORUj6dpCTK0/AuHPLqnpUxFMTlDTaptzyT1DiO1?= =?iso-8859-1?Q?b/EEDi9LJ1sdSojJkeBB18S3xCdgzvIQyUCBds155qpsUcy7yYHALCiXp5?= =?iso-8859-1?Q?MTtYoYRUFd2AML70u5mQ4hyj5TakkdqDqhnPEfcR1+GEVGqupnedTx747n?= =?iso-8859-1?Q?eFluyoQ+gIHhvxnEPGu+XeZcshNQjm1Agn2o0x0DJGne3wXV7s6qBPM9u0?= =?iso-8859-1?Q?UBQxfjqnSxt28AwNWUjzX/U3iTZRw2ymK9w3W6YNmBurYX407pr0bFhmmu?= =?iso-8859-1?Q?19ik5GoIwu3ym/raG02nCoaTjsqCUkTTW8HNF/mdkYX3/q0eUTj1OIkrTn?= =?iso-8859-1?Q?fn/c/y1OJIxNJyqx6u3o5q59XiHXOuYQnsVdGTUUOU/U9+965Q2ggXfP3C?= =?iso-8859-1?Q?9JZ86y9WYy6Fe3TN6yjoGaCc55opV2w1bWgrVC9lv6bInUK23tWiBTkTTF?= =?iso-8859-1?Q?YwuJ93QXTyjXEwQrajshATzckDMLmI0deLOOpTGn0cjnRF++VgLlUffagO?= =?iso-8859-1?Q?A0B1oSZB5QsZOM0o5pl39DseDtqCAhx2zV1CuofHvbWlBHC6NdL3X4k0Uu?= =?iso-8859-1?Q?6aUTZVQxEdQr5KySDuswFtzEymP2d+r9eY9SaLiznUrrpZreHT3Md6+sHx?= =?iso-8859-1?Q?O+CbdRYlC/3JaiaAT3n2NHPrsG8AiSr5s8AtTJTj+DYZryYzwJaWoMI3Vj?= =?iso-8859-1?Q?esigJwvBVzk69jyXBj2oQ4P5COvhw00K82giZNM/H58fA3gJSrIclW5/Si?= =?iso-8859-1?Q?JpDVlAOhsLTbKSqHmfCpgcpNFn1YYeqjuOLu/KeAHx2CnBV3HZjqHG8g0m?= =?iso-8859-1?Q?Kb1B5xhY0Rjemrepkxj0ycGZR3DiaaSzFkHprs2NEwdYutgYHqL/jBSXuO?= =?iso-8859-1?Q?iRA0fYgmmGbfTJwU92B+LTGEHAuoyw4/7ZOLRjUPlzkUgoqxAxy6jtaJot?= =?iso-8859-1?Q?CUz2TT8fzK5yypHT4pHM7E1S0XxYK1b4zy0F2S/64fOmNxy6wWMnEZtzRj?= =?iso-8859-1?Q?35SIl9rJJyhGkk0wIPURQ+GI3gQpoERxcsHgjfdUT5ET8MAbmKoiCSTpdE?= =?iso-8859-1?Q?Eky3yigt0SXHo8sxHdVXY+h9kB9zXsgCol74LWbnRlwZRqtMpfePF+r1ct?= =?iso-8859-1?Q?1ZEA2aIlAuoCnfFEPF7OduOHBHKbDnW7vAtc7q3KutpGDObX3SloxkPpv8?= =?iso-8859-1?Q?KdBmJkpfJ+tthxvrhgcdGaU+HYCumkpS3z79i1KWBhtPBMQ1ZyD279lw?= =?iso-8859-1?Q?=3D=3D?= Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: epam.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PAVPR03MB10102.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: c30c8f24-07d7-4949-6112-08de26a77edc X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Nov 2025 13:36:36.2504 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b41b72d0-4e9f-4c26-8a69-f949f367c91d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 1sS5jYNExYjIaHBGIBMlUPwua7DcmKhJbCeEt783WAbgedmEpuMNDOp/yKwOVXJ4FI54z00xC+o31SRsNxxT2A== X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR03MB7217 X-ZohoMail-DKIM: pass (identity @epam.com) X-ZM-MESSAGEID: 1763473033295158500 Content-Type: text/plain; charset="utf-8" With pci-scan implemented it is now possible to use vpci for hardware domains. Update has_vpci to reflect this change. Signed-off-by: Mykyta Poturai --- v2->v3: * replace hwdom_uses_vpci with has_vpci_bridge v1->v2: * fix typo in commit message --- xen/arch/arm/include/asm/domain.h | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/xen/arch/arm/include/asm/domain.h b/xen/arch/arm/include/asm/d= omain.h index af3e168374..3eac0aea64 100644 --- a/xen/arch/arm/include/asm/domain.h +++ b/xen/arch/arm/include/asm/domain.h @@ -305,8 +305,7 @@ static inline void arch_vcpu_block(struct vcpu *v) {} =20 #define arch_vm_assist_valid_mask(d) (1UL << VMASST_TYPE_runstate_update_f= lag) =20 -/* vPCI is not available on Arm */ -#define has_vpci(d) ({ (void)(d); false; }) +#define has_vpci(d) (is_hardware_domain(d) && has_vpci_bridge(d)) =20 struct arch_vcpu_io { struct instr_details dabt_instr; /* when the instruction is decoded */ --=20 2.51.2