Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp3694431pxb; Sun, 26 Sep 2021 23:59:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwpi7ReT2YaEvi/UbZY9CeNPBhEsrZOIbiYtZMGKwVfjcZm6Ei7m4Zd5A4zKt/6j5APdjk1 X-Received: by 2002:a17:902:db0a:b0:13b:b984:8094 with SMTP id m10-20020a170902db0a00b0013bb9848094mr21241354plx.43.1632725977754; Sun, 26 Sep 2021 23:59:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632725977; cv=none; d=google.com; s=arc-20160816; b=H7IMdqu7r3xUj8TdwmKxKdalfgNVZkvYWf4sp2DA8dJaBiMZ4+tkVyzp9zZmT0itjs RtGiHNat2yEvNojsMBzj2jYaNvQMHmWYGIVUcpLIQzRAMjOVRl+ixLUpn3JANwxNRgMV VW0mEnI/hCSEYw2NAGH/xkyv9yYJP2v7XdQU6RoPF7pWJVsRWxkjmjRIAq/wnBMlG2f6 falR8CdiBR/TdM/GIm/kcxRnuey80YAzzHiANXX0ApsDRpIcsw1VN73X8yNnIHuGYCy9 Og+ae7iaFqTDlfS4dc6Q5L5GlQsoDbD6j+uOorEnOtXQ1FDJwy/WD/2msUawqKw5/Kil V98g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=w4/DyioZ/3SsuR8yEN6bZ8EtrReqU8tTeSBuDAdb3VQ=; b=UauzdqdlXge0NIoOVZo3sRDIrf+Yg0mRfNLa7Z+aCHrCMqyRavnThp8lA8mqKyuRML 4ujleC/WayWVLcRJGzvqC9Emanzx8BjNdg1KoFK7Gkc5pm0ohHPd5VS9IDVUlZKHla3e OIqjZ8VUEM8qtB29yxf4XUyJb2DNlmbkoRNEzRP4h1tM5RpsMW/v0fF2vQTgjWEfyfKH 0tUKpKb5JgPceZPgleDXlvcBSaV55yTotEVkqdKLjKXa2L8GWAbBE8L7zVDi+iGaK1aW DqSFpyqgElC4Q/jd1H4nMV6DsBjU8RNHJ00qOVDzqMnwtQKvHuFx3SUEarxJAxzMZ5oy 32sw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=qgj5GJKp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i1si20770211pgs.197.2021.09.26.23.59.25; Sun, 26 Sep 2021 23:59:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=qgj5GJKp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233178AbhI0HAH (ORCPT + 99 others); Mon, 27 Sep 2021 03:00:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38250 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233129AbhI0HAE (ORCPT ); Mon, 27 Sep 2021 03:00:04 -0400 Received: from mail-lf1-x12c.google.com (mail-lf1-x12c.google.com [IPv6:2a00:1450:4864:20::12c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1ECDDC061570 for ; Sun, 26 Sep 2021 23:58:27 -0700 (PDT) Received: by mail-lf1-x12c.google.com with SMTP id i25so73326264lfg.6 for ; Sun, 26 Sep 2021 23:58:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=w4/DyioZ/3SsuR8yEN6bZ8EtrReqU8tTeSBuDAdb3VQ=; b=qgj5GJKpWfoP9ym013F4TV5ZqlbqGRkpbbOTMSa/RzePc5Cl0WuBwhXH576wBYsX7p WOLlznN6Kr77bgZZekIgSLpm6VvnaNmKfz9aqqdsi3JomAkBfozM6MRI69BomD4KuTSS B8sxRrTft5JxxGNwIGZQClT2t9NnFNHBESWr3Zh3VzXmfS5izueYMFBz3wlipBjSvAR7 zDMz6sTg4hdftLJ1VWiMkthhUbL4/KrC1UIl8u33ksgActLJOx2hECcGib87HzFV+x8z 30FQZKGSIC3T7lvv/OdspYzrGaiFv2+jxOVYibxospTYD9TPTDxkeeSex7yu6Kdppk3r 4aGQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=w4/DyioZ/3SsuR8yEN6bZ8EtrReqU8tTeSBuDAdb3VQ=; b=aQxZ3rZVl7JkjZS4l9312CINYurj4mkLNpHlKHQwmRgNx7fMzVhmZDxqFe6W1CdO6w FdRFyUWZMaV3cpU/0FFrSKL8b7aYe960wHoN1FDR58DkYyrJZ/EBrgJZPHxl25+JQCWh SBtPRlPcmbDBmhx4cAf2/z0Qy/ecgDrsU+syHVlM3Yn7jmJyy5KZiDhY74ic49TEGobz Bcl1KbBud1TPQ6TdB99huti7QTnI3Km5Xqm27xgrP2U4cPZjvDP0DKklQ/1Ph5eawIM4 ExBfIZZGIGdmOEQVuYBPjN7Ky0doNzJrFO0KXirhxd5c3B267QK1qDccNKZXPeHSSC6K aLjQ== X-Gm-Message-State: AOAM531Xap74bnlcevmEXDCB+fQZCCoJKYnKRPVuHsfkV1xedUcqj6md FIX5/5/X9LMeRyHeLVN7NR0= X-Received: by 2002:a2e:97ce:: with SMTP id m14mr27362812ljj.73.1632725905476; Sun, 26 Sep 2021 23:58:25 -0700 (PDT) Received: from a2klaptop.epam.com (host-176-36-245-220.b024.la.net.ua. [176.36.245.220]) by smtp.gmail.com with ESMTPSA id t18sm1498351lfl.219.2021.09.26.23.58.24 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 26 Sep 2021 23:58:25 -0700 (PDT) From: Oleksandr Andrushchenko To: xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org Cc: boris.ostrovsky@oracle.com, jgross@suse.com, julien@xen.org, sstabellini@kernel.org, jbeulich@suse.com, Oleksandr Andrushchenko , Anastasiia Lukianenko Subject: [PATCH v4 2/2] xen-pciback: allow compiling on other archs than x86 Date: Mon, 27 Sep 2021 09:58:22 +0300 Message-Id: <20210927065822.350973-2-andr2000@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210927065822.350973-1-andr2000@gmail.com> References: <20210927065822.350973-1-andr2000@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Oleksandr Andrushchenko Xen-pciback driver was designed to be built for x86 only. But it can also be used by other architectures, e.g. Arm. Re-structure the driver in a way that it can be built for other platforms as well. Add new configuration option CONFIG_XEN_PCIDEV_STUB, so the driver can be limited in its functionality, e.g. no support for para-virtualised scenario when it acts as PCI backend. x86 platform will continue using CONFIG_XEN_PCIDEV_BACKEND for the fully featured backend driver. Signed-off-by: Oleksandr Andrushchenko Signed-off-by: Anastasiia Lukianenko --- Since v3: - Fix >>32 shift for 32-bit architectures - Move CONFIG_XEN_PCIDEV_STUB into this patch Since v2: - swap the patch order Since v1: - Do not move pci_xen_initial_domain as it is x86 specific --- arch/x86/include/asm/xen/pci.h | 16 ----- arch/x86/pci/xen.c | 74 +------------------- drivers/xen/Kconfig | 20 ++++++ drivers/xen/pci.c | 75 +++++++++++++++++++++ drivers/xen/xen-pciback/conf_space_header.c | 8 ++- drivers/xen/xen-pciback/pci_stub.c | 3 +- drivers/xen/xen-pciback/xenbus.c | 2 +- include/xen/pci.h | 28 ++++++++ 8 files changed, 133 insertions(+), 93 deletions(-) create mode 100644 include/xen/pci.h diff --git a/arch/x86/include/asm/xen/pci.h b/arch/x86/include/asm/xen/pci.h index 3506d8c598c1..4b08c2b809ea 100644 --- a/arch/x86/include/asm/xen/pci.h +++ b/arch/x86/include/asm/xen/pci.h @@ -16,27 +16,11 @@ static inline int pci_xen_hvm_init(void) #endif #if defined(CONFIG_XEN_DOM0) int __init pci_xen_initial_domain(void); -int xen_find_device_domain_owner(struct pci_dev *dev); -int xen_register_device_domain_owner(struct pci_dev *dev, uint16_t domain); -int xen_unregister_device_domain_owner(struct pci_dev *dev); #else static inline int __init pci_xen_initial_domain(void) { return -1; } -static inline int xen_find_device_domain_owner(struct pci_dev *dev) -{ - return -1; -} -static inline int xen_register_device_domain_owner(struct pci_dev *dev, - uint16_t domain) -{ - return -1; -} -static inline int xen_unregister_device_domain_owner(struct pci_dev *dev) -{ - return -1; -} #endif #if defined(CONFIG_PCI_MSI) diff --git a/arch/x86/pci/xen.c b/arch/x86/pci/xen.c index 3d41a09c2c14..4a45b0bf9ae4 100644 --- a/arch/x86/pci/xen.c +++ b/arch/x86/pci/xen.c @@ -23,6 +23,7 @@ #include #include +#include #include #include #include @@ -583,77 +584,4 @@ int __init pci_xen_initial_domain(void) } return 0; } - -struct xen_device_domain_owner { - domid_t domain; - struct pci_dev *dev; - struct list_head list; -}; - -static DEFINE_SPINLOCK(dev_domain_list_spinlock); -static struct list_head dev_domain_list = LIST_HEAD_INIT(dev_domain_list); - -static struct xen_device_domain_owner *find_device(struct pci_dev *dev) -{ - struct xen_device_domain_owner *owner; - - list_for_each_entry(owner, &dev_domain_list, list) { - if (owner->dev == dev) - return owner; - } - return NULL; -} - -int xen_find_device_domain_owner(struct pci_dev *dev) -{ - struct xen_device_domain_owner *owner; - int domain = -ENODEV; - - spin_lock(&dev_domain_list_spinlock); - owner = find_device(dev); - if (owner) - domain = owner->domain; - spin_unlock(&dev_domain_list_spinlock); - return domain; -} -EXPORT_SYMBOL_GPL(xen_find_device_domain_owner); - -int xen_register_device_domain_owner(struct pci_dev *dev, uint16_t domain) -{ - struct xen_device_domain_owner *owner; - - owner = kzalloc(sizeof(struct xen_device_domain_owner), GFP_KERNEL); - if (!owner) - return -ENODEV; - - spin_lock(&dev_domain_list_spinlock); - if (find_device(dev)) { - spin_unlock(&dev_domain_list_spinlock); - kfree(owner); - return -EEXIST; - } - owner->domain = domain; - owner->dev = dev; - list_add_tail(&owner->list, &dev_domain_list); - spin_unlock(&dev_domain_list_spinlock); - return 0; -} -EXPORT_SYMBOL_GPL(xen_register_device_domain_owner); - -int xen_unregister_device_domain_owner(struct pci_dev *dev) -{ - struct xen_device_domain_owner *owner; - - spin_lock(&dev_domain_list_spinlock); - owner = find_device(dev); - if (!owner) { - spin_unlock(&dev_domain_list_spinlock); - return -ENODEV; - } - list_del(&owner->list); - spin_unlock(&dev_domain_list_spinlock); - kfree(owner); - return 0; -} -EXPORT_SYMBOL_GPL(xen_unregister_device_domain_owner); #endif diff --git a/drivers/xen/Kconfig b/drivers/xen/Kconfig index 4efc95ddda41..75b9330dc6fd 100644 --- a/drivers/xen/Kconfig +++ b/drivers/xen/Kconfig @@ -184,6 +184,26 @@ config SWIOTLB_XEN config XEN_PCI_STUB bool +config XEN_PCIDEV_STUB + tristate "Xen PCI-device stub driver" + depends on PCI && !X86 && XEN + depends on XEN_BACKEND + select XEN_PCI_STUB + default m + help + The PCI device stub driver provides limited version of the PCI + device backend driver without para-virtualized support for guests. + If you select this to be a module, you will need to make sure no + other driver has bound to the device(s) you want to make visible to + other guests. + + The "hide" parameter (only applicable if backend driver is compiled + into the kernel) allows you to bind the PCI devices to this module + from the default device drivers. The argument is the list of PCI BDFs: + xen-pciback.hide=(03:00.0)(04:00.0) + + If in doubt, say m. + config XEN_PCIDEV_BACKEND tristate "Xen PCI-device backend driver" depends on PCI && X86 && XEN diff --git a/drivers/xen/pci.c b/drivers/xen/pci.c index 224df03ce42e..fc8c1249d49f 100644 --- a/drivers/xen/pci.c +++ b/drivers/xen/pci.c @@ -254,3 +254,78 @@ static int xen_mcfg_late(void) return 0; } #endif + +#ifdef CONFIG_XEN_DOM0 +struct xen_device_domain_owner { + domid_t domain; + struct pci_dev *dev; + struct list_head list; +}; + +static DEFINE_SPINLOCK(dev_domain_list_spinlock); +static struct list_head dev_domain_list = LIST_HEAD_INIT(dev_domain_list); + +static struct xen_device_domain_owner *find_device(struct pci_dev *dev) +{ + struct xen_device_domain_owner *owner; + + list_for_each_entry(owner, &dev_domain_list, list) { + if (owner->dev == dev) + return owner; + } + return NULL; +} + +int xen_find_device_domain_owner(struct pci_dev *dev) +{ + struct xen_device_domain_owner *owner; + int domain = -ENODEV; + + spin_lock(&dev_domain_list_spinlock); + owner = find_device(dev); + if (owner) + domain = owner->domain; + spin_unlock(&dev_domain_list_spinlock); + return domain; +} +EXPORT_SYMBOL_GPL(xen_find_device_domain_owner); + +int xen_register_device_domain_owner(struct pci_dev *dev, uint16_t domain) +{ + struct xen_device_domain_owner *owner; + + owner = kzalloc(sizeof(struct xen_device_domain_owner), GFP_KERNEL); + if (!owner) + return -ENODEV; + + spin_lock(&dev_domain_list_spinlock); + if (find_device(dev)) { + spin_unlock(&dev_domain_list_spinlock); + kfree(owner); + return -EEXIST; + } + owner->domain = domain; + owner->dev = dev; + list_add_tail(&owner->list, &dev_domain_list); + spin_unlock(&dev_domain_list_spinlock); + return 0; +} +EXPORT_SYMBOL_GPL(xen_register_device_domain_owner); + +int xen_unregister_device_domain_owner(struct pci_dev *dev) +{ + struct xen_device_domain_owner *owner; + + spin_lock(&dev_domain_list_spinlock); + owner = find_device(dev); + if (!owner) { + spin_unlock(&dev_domain_list_spinlock); + return -ENODEV; + } + list_del(&owner->list); + spin_unlock(&dev_domain_list_spinlock); + kfree(owner); + return 0; +} +EXPORT_SYMBOL_GPL(xen_unregister_device_domain_owner); +#endif diff --git a/drivers/xen/xen-pciback/conf_space_header.c b/drivers/xen/xen-pciback/conf_space_header.c index ac45cdc38e85..981435103af1 100644 --- a/drivers/xen/xen-pciback/conf_space_header.c +++ b/drivers/xen/xen-pciback/conf_space_header.c @@ -236,8 +236,12 @@ static void *bar_init(struct pci_dev *dev, int offset) else { pos = (offset - PCI_BASE_ADDRESS_0) / 4; if (pos && (res[pos - 1].flags & IORESOURCE_MEM_64)) { - bar->val = res[pos - 1].start >> 32; - bar->len_val = -resource_size(&res[pos - 1]) >> 32; + /* + * Use ">> 16 >> 16" instead of direct ">> 32" shift + * to avoid warnings on 32-bit architectures. + */ + bar->val = res[pos - 1].start >> 16 >> 16; + bar->len_val = -resource_size(&res[pos - 1]) >> 16 >> 16; return bar; } } diff --git a/drivers/xen/xen-pciback/pci_stub.c b/drivers/xen/xen-pciback/pci_stub.c index f8e4faa96ad6..bba527620507 100644 --- a/drivers/xen/xen-pciback/pci_stub.c +++ b/drivers/xen/xen-pciback/pci_stub.c @@ -19,7 +19,8 @@ #include #include #include -#include +#include +#include #include #include #include "pciback.h" diff --git a/drivers/xen/xen-pciback/xenbus.c b/drivers/xen/xen-pciback/xenbus.c index f8ba2903a3ff..bde63ef677b8 100644 --- a/drivers/xen/xen-pciback/xenbus.c +++ b/drivers/xen/xen-pciback/xenbus.c @@ -14,7 +14,7 @@ #include #include #include -#include +#include #include "pciback.h" #define INVALID_EVTCHN_IRQ (-1) diff --git a/include/xen/pci.h b/include/xen/pci.h new file mode 100644 index 000000000000..b8337cf85fd1 --- /dev/null +++ b/include/xen/pci.h @@ -0,0 +1,28 @@ +/* SPDX-License-Identifier: GPL-2.0 */ + +#ifndef __XEN_PCI_H__ +#define __XEN_PCI_H__ + +#if defined(CONFIG_XEN_DOM0) +int xen_find_device_domain_owner(struct pci_dev *dev); +int xen_register_device_domain_owner(struct pci_dev *dev, uint16_t domain); +int xen_unregister_device_domain_owner(struct pci_dev *dev); +#else +static inline int xen_find_device_domain_owner(struct pci_dev *dev) +{ + return -1; +} + +static inline int xen_register_device_domain_owner(struct pci_dev *dev, + uint16_t domain) +{ + return -1; +} + +static inline int xen_unregister_device_domain_owner(struct pci_dev *dev) +{ + return -1; +} +#endif + +#endif -- 2.25.1