Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp331005pxb; Wed, 22 Sep 2021 03:16:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxQi3hhs0AXlfB3Smh+UlMCYjA9Tf2HTr2uJrU98rwP6/5vIJ3ISXU3kvC42if6BWSmI92Z X-Received: by 2002:a02:3b50:: with SMTP id i16mr4085682jaf.57.1632305773322; Wed, 22 Sep 2021 03:16:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632305773; cv=none; d=google.com; s=arc-20160816; b=b3ShqDiS1KDNYuxLQcgT7v6b1Wff6fiAI0vgQ6bitroYhag1FF7zeU8zIABLYA/9Bt wGPJyxKL+nAdXSVYtqdbdMePryZMcy9Yo9v7OEG2rAzr0sDvoF/xsfhjcKDUdQaA43px ArHOvTgEYy+Kw/1KylVt1RheXSo0Kz9jXpCDF8sReahfgLvlVpNms/sNdzu0Oc2rAC75 1ioWzkKo6ZuDo8o82TvJFDqHJutg50NlZ9wdLUr9Y1aH7CRgkPH7izawXYcDBI2TAev+ oXHgmy6ATJ9ZS8CzhUPl0/BVjU+f37qW4nzfJSLnFWUsHBe0ldUTDCMytJ4T+K3+RTG+ TNZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=SvLayk7gLTLICLvUIqlFHN+Qd7wHHCUL73ogGPkKfx8=; b=iOpAx1S5HksES9jEPZwV1jvkTEqxWRyPJOK3Tzcx2OcToH82Ej4mIgxFdUvyL3oL/7 OdbG3IlxVzQazKHQqvIbvZkrz4U2kvSGzWSR5wZX9stqm/j3RD22HahBJEdXaSnIs4sx 24/6sDF8dL84rOW8QLBekzm/toySicw8NRkef29pXJlb69EPMoqS9rqAIhKDLqh4iyN4 c0owzkhvTmHzDhA39BlIBl/k3Iy4A8o/no8QgGaTmvaM4X0JX6+lPYvUJ2IIQNvLPa/P lrQOSq0k4HMXJEDsRjjppqsAURGjd+tST41bo+HqnwTotoUEmn0j2YRi92JqiiH6QtYc bUhg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=dkrfcJFR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j11si2251703ils.94.2021.09.22.03.16.00; Wed, 22 Sep 2021 03:16:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=dkrfcJFR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234731AbhIVKQO (ORCPT + 99 others); Wed, 22 Sep 2021 06:16:14 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53014 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234747AbhIVKP5 (ORCPT ); Wed, 22 Sep 2021 06:15:57 -0400 Received: from mail-lf1-x12c.google.com (mail-lf1-x12c.google.com [IPv6:2a00:1450:4864:20::12c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DCCD9C061760 for ; Wed, 22 Sep 2021 03:14:26 -0700 (PDT) Received: by mail-lf1-x12c.google.com with SMTP id g41so9942572lfv.1 for ; Wed, 22 Sep 2021 03:14:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=SvLayk7gLTLICLvUIqlFHN+Qd7wHHCUL73ogGPkKfx8=; b=dkrfcJFRtgM58BtsNkps8s/wg+2uBksUXZT7yMoNtS2Z7ULeyfkZ4w5Z4DEGDS8CqM qZDNTlKTqTfMUi3sz+S35Y6/nsbXQpGVWPkaBrrRvQ0BfCo1P0Iuw2KMLyiFQ5W7UQxi GLVSWFruCbLxZAWoD8Wg5K+pRM77JlbiSUuTjDIHpfVMOF0wfuhB5eYj9Uux96e0rQPe HhDSHZWqS1zOkWvLhvCAohmYlNGNI3roGCzGQ2ly8v5M1gSGPCbqnVSipAc6DXx6UdzN CfVzmKn654p7y4ejqoY6hn45KENIFY2FEa9usJqX2CCk7BLryqJgzPj3x8u4mw0glxAp pXnA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=SvLayk7gLTLICLvUIqlFHN+Qd7wHHCUL73ogGPkKfx8=; b=e/aR4R0ndzuNbnNJNOgZrCvWqcx+DFyjbYTUycFxsTkVGUzGUX8LNKlZTADSR/wkdd RAamFS/EB2YAPtrgPMyeVo/X3yznD3h54AjOqp4FMVfnsIGrMDMiecwO6vABUydR864w y5NqjZi7VwceXP8bJwrKGKsgli3Ex5Ii8o2Rzxkm8RP5dhj+vS1iqQa7YfQePgMqvhB+ 7BOYLTmV0QwpE0/O+82rzlCB49tvkgaEB/sKlM1IGyIv+f9hz9jY6+FRUHrnTcvpG6mh FNd//3hHRzdGw9rwQdkYKDuKcFh2iY46PNrXYkOLY9jZOUhvhnm+DR0dHw+lSd4dsiOb QjyA== X-Gm-Message-State: AOAM531Euc9TbAQdxRg63D9VuLz4P2rmlblIq+yL7yZ8j4ihhFdk9mWS POM9knMcj1HzQWIdQsF864w= X-Received: by 2002:a2e:545a:: with SMTP id y26mr28468856ljd.225.1632305665218; Wed, 22 Sep 2021 03:14:25 -0700 (PDT) Received: from a2klaptop.epam.com (host-176-36-245-220.b024.la.net.ua. [176.36.245.220]) by smtp.gmail.com with ESMTPSA id k22sm184211ljm.18.2021.09.22.03.14.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 22 Sep 2021 03:14:24 -0700 (PDT) From: Oleksandr Andrushchenko To: xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org Cc: boris.ostrovsky@oracle.com, jgross@suse.com, julien@xen.org, sstabellini@kernel.org, jbeulich@suse.com, Oleksandr Andrushchenko , Anastasiia Lukianenko Subject: [PATCH 1/2] xen-pciback: allow compiling on other archs than x86 Date: Wed, 22 Sep 2021 13:14:21 +0300 Message-Id: <20210922101422.2319240-1-andr2000@gmail.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Oleksandr Andrushchenko Xen-pciback driver was designed to be built for x86 only. But it can also be used by other architectures, e.g. Arm. Re-structure the driver in a way that it can be built for other platforms as well. Signed-off-by: Oleksandr Andrushchenko Signed-off-by: Anastasiia Lukianenko --- Since v1: - Do not move pci_xen_initial_domain as it is x86 specific --- arch/x86/include/asm/xen/pci.h | 18 +------ arch/x86/pci/xen.c | 74 +---------------------------- drivers/xen/Kconfig | 2 +- drivers/xen/pci.c | 75 ++++++++++++++++++++++++++++++ drivers/xen/xen-pciback/pci_stub.c | 3 +- drivers/xen/xen-pciback/xenbus.c | 2 +- include/xen/pci.h | 28 +++++++++++ 7 files changed, 109 insertions(+), 93 deletions(-) create mode 100644 include/xen/pci.h diff --git a/arch/x86/include/asm/xen/pci.h b/arch/x86/include/asm/xen/pci.h index 3506d8c598c1..2889f091f459 100644 --- a/arch/x86/include/asm/xen/pci.h +++ b/arch/x86/include/asm/xen/pci.h @@ -16,26 +16,10 @@ static inline int pci_xen_hvm_init(void) #endif #if defined(CONFIG_XEN_DOM0) int __init pci_xen_initial_domain(void); -int xen_find_device_domain_owner(struct pci_dev *dev); -int xen_register_device_domain_owner(struct pci_dev *dev, uint16_t domain); -int xen_unregister_device_domain_owner(struct pci_dev *dev); #else static inline int __init pci_xen_initial_domain(void) { - return -1; -} -static inline int xen_find_device_domain_owner(struct pci_dev *dev) -{ - return -1; -} -static inline int xen_register_device_domain_owner(struct pci_dev *dev, - uint16_t domain) -{ - return -1; -} -static inline int xen_unregister_device_domain_owner(struct pci_dev *dev) -{ - return -1; + return -1; } #endif diff --git a/arch/x86/pci/xen.c b/arch/x86/pci/xen.c index 3d41a09c2c14..4a45b0bf9ae4 100644 --- a/arch/x86/pci/xen.c +++ b/arch/x86/pci/xen.c @@ -23,6 +23,7 @@ #include #include +#include #include #include #include @@ -583,77 +584,4 @@ int __init pci_xen_initial_domain(void) } return 0; } - -struct xen_device_domain_owner { - domid_t domain; - struct pci_dev *dev; - struct list_head list; -}; - -static DEFINE_SPINLOCK(dev_domain_list_spinlock); -static struct list_head dev_domain_list = LIST_HEAD_INIT(dev_domain_list); - -static struct xen_device_domain_owner *find_device(struct pci_dev *dev) -{ - struct xen_device_domain_owner *owner; - - list_for_each_entry(owner, &dev_domain_list, list) { - if (owner->dev == dev) - return owner; - } - return NULL; -} - -int xen_find_device_domain_owner(struct pci_dev *dev) -{ - struct xen_device_domain_owner *owner; - int domain = -ENODEV; - - spin_lock(&dev_domain_list_spinlock); - owner = find_device(dev); - if (owner) - domain = owner->domain; - spin_unlock(&dev_domain_list_spinlock); - return domain; -} -EXPORT_SYMBOL_GPL(xen_find_device_domain_owner); - -int xen_register_device_domain_owner(struct pci_dev *dev, uint16_t domain) -{ - struct xen_device_domain_owner *owner; - - owner = kzalloc(sizeof(struct xen_device_domain_owner), GFP_KERNEL); - if (!owner) - return -ENODEV; - - spin_lock(&dev_domain_list_spinlock); - if (find_device(dev)) { - spin_unlock(&dev_domain_list_spinlock); - kfree(owner); - return -EEXIST; - } - owner->domain = domain; - owner->dev = dev; - list_add_tail(&owner->list, &dev_domain_list); - spin_unlock(&dev_domain_list_spinlock); - return 0; -} -EXPORT_SYMBOL_GPL(xen_register_device_domain_owner); - -int xen_unregister_device_domain_owner(struct pci_dev *dev) -{ - struct xen_device_domain_owner *owner; - - spin_lock(&dev_domain_list_spinlock); - owner = find_device(dev); - if (!owner) { - spin_unlock(&dev_domain_list_spinlock); - return -ENODEV; - } - list_del(&owner->list); - spin_unlock(&dev_domain_list_spinlock); - kfree(owner); - return 0; -} -EXPORT_SYMBOL_GPL(xen_unregister_device_domain_owner); #endif diff --git a/drivers/xen/Kconfig b/drivers/xen/Kconfig index a37eb52fb401..057ddf61ef61 100644 --- a/drivers/xen/Kconfig +++ b/drivers/xen/Kconfig @@ -182,7 +182,7 @@ config SWIOTLB_XEN config XEN_PCIDEV_BACKEND tristate "Xen PCI-device backend driver" - depends on PCI && X86 && XEN + depends on PCI && XEN depends on XEN_BACKEND default m help diff --git a/drivers/xen/pci.c b/drivers/xen/pci.c index 224df03ce42e..fc8c1249d49f 100644 --- a/drivers/xen/pci.c +++ b/drivers/xen/pci.c @@ -254,3 +254,78 @@ static int xen_mcfg_late(void) return 0; } #endif + +#ifdef CONFIG_XEN_DOM0 +struct xen_device_domain_owner { + domid_t domain; + struct pci_dev *dev; + struct list_head list; +}; + +static DEFINE_SPINLOCK(dev_domain_list_spinlock); +static struct list_head dev_domain_list = LIST_HEAD_INIT(dev_domain_list); + +static struct xen_device_domain_owner *find_device(struct pci_dev *dev) +{ + struct xen_device_domain_owner *owner; + + list_for_each_entry(owner, &dev_domain_list, list) { + if (owner->dev == dev) + return owner; + } + return NULL; +} + +int xen_find_device_domain_owner(struct pci_dev *dev) +{ + struct xen_device_domain_owner *owner; + int domain = -ENODEV; + + spin_lock(&dev_domain_list_spinlock); + owner = find_device(dev); + if (owner) + domain = owner->domain; + spin_unlock(&dev_domain_list_spinlock); + return domain; +} +EXPORT_SYMBOL_GPL(xen_find_device_domain_owner); + +int xen_register_device_domain_owner(struct pci_dev *dev, uint16_t domain) +{ + struct xen_device_domain_owner *owner; + + owner = kzalloc(sizeof(struct xen_device_domain_owner), GFP_KERNEL); + if (!owner) + return -ENODEV; + + spin_lock(&dev_domain_list_spinlock); + if (find_device(dev)) { + spin_unlock(&dev_domain_list_spinlock); + kfree(owner); + return -EEXIST; + } + owner->domain = domain; + owner->dev = dev; + list_add_tail(&owner->list, &dev_domain_list); + spin_unlock(&dev_domain_list_spinlock); + return 0; +} +EXPORT_SYMBOL_GPL(xen_register_device_domain_owner); + +int xen_unregister_device_domain_owner(struct pci_dev *dev) +{ + struct xen_device_domain_owner *owner; + + spin_lock(&dev_domain_list_spinlock); + owner = find_device(dev); + if (!owner) { + spin_unlock(&dev_domain_list_spinlock); + return -ENODEV; + } + list_del(&owner->list); + spin_unlock(&dev_domain_list_spinlock); + kfree(owner); + return 0; +} +EXPORT_SYMBOL_GPL(xen_unregister_device_domain_owner); +#endif diff --git a/drivers/xen/xen-pciback/pci_stub.c b/drivers/xen/xen-pciback/pci_stub.c index f8e4faa96ad6..bba527620507 100644 --- a/drivers/xen/xen-pciback/pci_stub.c +++ b/drivers/xen/xen-pciback/pci_stub.c @@ -19,7 +19,8 @@ #include #include #include -#include +#include +#include #include #include #include "pciback.h" diff --git a/drivers/xen/xen-pciback/xenbus.c b/drivers/xen/xen-pciback/xenbus.c index c09c7ebd6968..da34ce85dc88 100644 --- a/drivers/xen/xen-pciback/xenbus.c +++ b/drivers/xen/xen-pciback/xenbus.c @@ -14,7 +14,7 @@ #include #include #include -#include +#include #include "pciback.h" #define INVALID_EVTCHN_IRQ (-1) diff --git a/include/xen/pci.h b/include/xen/pci.h new file mode 100644 index 000000000000..b8337cf85fd1 --- /dev/null +++ b/include/xen/pci.h @@ -0,0 +1,28 @@ +/* SPDX-License-Identifier: GPL-2.0 */ + +#ifndef __XEN_PCI_H__ +#define __XEN_PCI_H__ + +#if defined(CONFIG_XEN_DOM0) +int xen_find_device_domain_owner(struct pci_dev *dev); +int xen_register_device_domain_owner(struct pci_dev *dev, uint16_t domain); +int xen_unregister_device_domain_owner(struct pci_dev *dev); +#else +static inline int xen_find_device_domain_owner(struct pci_dev *dev) +{ + return -1; +} + +static inline int xen_register_device_domain_owner(struct pci_dev *dev, + uint16_t domain) +{ + return -1; +} + +static inline int xen_unregister_device_domain_owner(struct pci_dev *dev) +{ + return -1; +} +#endif + +#endif -- 2.25.1