Received: by 2002:a05:7412:798b:b0:fc:a2b0:25d7 with SMTP id fb11csp672377rdb; Thu, 22 Feb 2024 16:24:11 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCU5pEPeL7kKoOpsdwWpYtqjLAEFdYE/slF6Dz3Og7arIK0l9K2XMc4YRAJ+ZncNqv6iE2rAGzHHG3bGStZ++XaNBU7EAG31AVWitpBO5w== X-Google-Smtp-Source: AGHT+IFow+7Xvq+XCC/RVHXFJ5Qp32Y6LnukFEjVQoOa0v2Vf8EIyGCoEytvRmSi68t5rQjPcbLZ X-Received: by 2002:a05:6214:419d:b0:68f:6f65:350a with SMTP id ld29-20020a056214419d00b0068f6f65350amr827696qvb.36.1708647851088; Thu, 22 Feb 2024 16:24:11 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708647851; cv=pass; d=google.com; s=arc-20160816; b=lmf5yR7euOcGgCJxGUsJsNn1qiKX7lWU+zSnblqfmiKl9l1sip6yBJNOQLFOhrt5ng eq2/W9ZgHys5T3VauxLjrwYu88wvfXBL/V/culKwSQZvoxPkLyOShlGVnXWgut/9IUpC 0d+0r5asNtbOmK+iso5FmwxUTDtZyxy5qQGh0sXKNpEbbY1eIV0eJmJO3vDsHtxhwFWY Dybjn2x4nmEz6uP8TS3KBbMpdTOduQAae3njcZVwNCPj5C6MyO6Ma1lZ4gaFCHSQShlB 6wBn5T3N3yqNma11lZVSCGACtQBhKHv6Wyz0AyabVZkBbJK806eJf7yRHcHYWLYT0h9T /Qiw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :user-agent:references:message-id:in-reply-to:subject:cc:to:from :date:dkim-signature; bh=Kp9MaQtA3SlLPzLTGCdI4K3blbc03cCZuTy/v5YOTUU=; fh=7BDNGsOE9f/HMDOJwAIXydlfrgcJlqca6UI7Zksb/Gw=; b=wGwHjc0aPAE7AyMFbsSvctsEy427LlJVU1Qcl7Kp2+tM233Aq+F81Wh7jJE79vyBel InnzboloR7kF6daKxnscSFI2vXxZM/z7gYj9L/QHsxroCJpK6Gl72lid+ASpA3c1j7Uj 4M44vnCSOSyzdjXx62oZwsZ1nUCvpyPsicFTMDg4RBacYIpWX25tXOccSvcwFo8mpxAt izycXIv6joQtnfxcTiqP8IbznJ4aah6791N2YM7VyRohA4md+Ysz4w3ZUmZdeQljIWFp 0RW5B1xbMfteo3J1TJHhmaMHN9LSyusfbp7EX2lZjAtrBBCDKTCSM4xRpNRvvdYd29QL zsHQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Jl+0Mx5F; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-77568-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-77568-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id 8-20020a0562140d6800b0068f1041351bsi14067020qvs.221.2024.02.22.16.24.10 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 22 Feb 2024 16:24:11 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-77568-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Jl+0Mx5F; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-77568-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-77568-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id C4EC01C21A14 for ; Fri, 23 Feb 2024 00:24:10 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id CFC6228EB; Fri, 23 Feb 2024 00:23:54 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="Jl+0Mx5F" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D344019B; Fri, 23 Feb 2024 00:23:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708647833; cv=none; b=lQc1N2aUTw3mlTfOZ9XyTHJ81zK8REyewzSyUeqrD0FDz8QzGn5nqT+QROXKBnZr6cyzbzaBoVPm+JWvVd/WphY29mi8cfk3iF/z3r8gOKlv47OF+mIJ92EsFMPy91eWZFdPeqI94vK9cXvvB4VBR14DN6v89quHzOkZfLOyAhY= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708647833; c=relaxed/simple; bh=N50MF0FEA09+JdWWeSvMMaGLUQyg9qJDly4KxW/WH/E=; h=Date:From:To:cc:Subject:In-Reply-To:Message-ID:References: MIME-Version:Content-Type; b=Fy2tiK7QBxbzeTBNOQdXSKyFiwhjIX9B2Vzt6dzFS8w0k6ikCIC9KXRcfOWoPS36RYxMaL8jIKnlnaTkwSnETOpThaLNnB6OGFajidKVnSa68N4Jn12oSJ8vKwRIC/NRqVcB2J8LryC3OBUN12uSfRX8GVA3u2KLTnLdfNFJZRE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=Jl+0Mx5F; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 73C99C433C7; Fri, 23 Feb 2024 00:23:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1708647833; bh=N50MF0FEA09+JdWWeSvMMaGLUQyg9qJDly4KxW/WH/E=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=Jl+0Mx5FR+/lTfq3bBupa6egNmH/ZvbEnlWJLi7B0LT49a8HDDkw9VRnwuer3NtUz G7fdAwswNBE4Mak1W1T/wp1OUGuxg3UMITwset0GoLfaZblcN8lMQKR3eDyqLrT2Ac rhGhgjJsCXOnHrPAOvz75j36TkWXbr70dezzFDhMOvEAxwMAu3iwraUHU6O3Rs9B8X jamAjUL6RXaFCPCnLZPWJIfJMLcDN9qQbXIcW64fpMgF/wIFTlOLZ6fqP9OppflKQO aDQkrepAuXioLa2VBKcgNjeXUNBYnUDLF71P4pQBhaXth2/TsjVNAwv/lmFOd7mzhO rp4ZNAOSWcQrg== Date: Thu, 22 Feb 2024 16:23:49 -0800 (PST) From: Stefano Stabellini X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop To: Jiqian Chen cc: Juergen Gross , Stefano Stabellini , Oleksandr Tyshchenko , Boris Ostrovsky , Bjorn Helgaas , "Rafael J . Wysocki" , Len Brown , =?UTF-8?Q?Roger_Pau_Monn=C3=A9?= , xen-devel@lists.xenproject.org, linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, linux-acpi@vger.kernel.org, Stewart Hildebrand , Huang Rui , Huang Rui Subject: Re: [RFC KERNEL PATCH v4 2/3] xen/pvh: Setup gsi for passthrough device In-Reply-To: <20240105062217.349645-3-Jiqian.Chen@amd.com> Message-ID: References: <20240105062217.349645-1-Jiqian.Chen@amd.com> <20240105062217.349645-3-Jiqian.Chen@amd.com> User-Agent: Alpine 2.22 (DEB 394 2020-01-19) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII On Fri, 5 Jan 2024, Jiqian Chen wrote: > In PVH dom0, the gsis don't get registered, but the gsi of > a passthrough device must be configured for it to be able to be > mapped into a domU. > > When assign a device to passthrough, proactively setup the gsi > of the device during that process. > > Co-developed-by: Huang Rui > Signed-off-by: Jiqian Chen > --- > arch/x86/xen/enlighten_pvh.c | 90 ++++++++++++++++++++++++++++++ > drivers/acpi/pci_irq.c | 2 +- > drivers/xen/xen-pciback/pci_stub.c | 8 +++ > include/linux/acpi.h | 1 + > include/xen/acpi.h | 6 ++ > 5 files changed, 106 insertions(+), 1 deletion(-) > > diff --git a/arch/x86/xen/enlighten_pvh.c b/arch/x86/xen/enlighten_pvh.c > index ada3868c02c2..ecadd966c684 100644 > --- a/arch/x86/xen/enlighten_pvh.c > +++ b/arch/x86/xen/enlighten_pvh.c > @@ -1,6 +1,7 @@ > // SPDX-License-Identifier: GPL-2.0 > #include > #include > +#include > > #include > > @@ -25,6 +26,95 @@ > bool __ro_after_init xen_pvh; > EXPORT_SYMBOL_GPL(xen_pvh); > > +typedef struct gsi_info { > + int gsi; > + int trigger; > + int polarity; > +} gsi_info_t; > + > +struct acpi_prt_entry { > + struct acpi_pci_id id; > + u8 pin; > + acpi_handle link; > + u32 index; /* GSI, or link _CRS index */ > +}; > + > +static int xen_pvh_get_gsi_info(struct pci_dev *dev, > + gsi_info_t *gsi_info) > +{ > + int gsi; > + u8 pin = 0; > + struct acpi_prt_entry *entry; > + int trigger = ACPI_LEVEL_SENSITIVE; > + int polarity = acpi_irq_model == ACPI_IRQ_MODEL_GIC ? > + ACPI_ACTIVE_HIGH : ACPI_ACTIVE_LOW; > + > + if (dev) > + pin = dev->pin; This is minor, but you can just move the pin = dev->pin after the !dev check below. With that change, and assuming the Xen-side and QEMU-side patches are accepted: Reviewed-by: Stefano Stabellini > + if (!dev || !pin || !gsi_info) > + return -EINVAL; > + > + entry = acpi_pci_irq_lookup(dev, pin); > + if (entry) { > + if (entry->link) > + gsi = acpi_pci_link_allocate_irq(entry->link, > + entry->index, > + &trigger, &polarity, > + NULL); > + else > + gsi = entry->index; > + } else > + gsi = -1; > + > + if (gsi < 0) > + return -EINVAL; > + > + gsi_info->gsi = gsi; > + gsi_info->trigger = trigger; > + gsi_info->polarity = polarity; > + > + return 0; > +} > + > +static int xen_pvh_setup_gsi(gsi_info_t *gsi_info) > +{ > + struct physdev_setup_gsi setup_gsi; > + > + if (!gsi_info) > + return -EINVAL; > + > + setup_gsi.gsi = gsi_info->gsi; > + setup_gsi.triggering = (gsi_info->trigger == ACPI_EDGE_SENSITIVE ? 0 : 1); > + setup_gsi.polarity = (gsi_info->polarity == ACPI_ACTIVE_HIGH ? 0 : 1); > + > + return HYPERVISOR_physdev_op(PHYSDEVOP_setup_gsi, &setup_gsi); > +} > + > +int xen_pvh_passthrough_gsi(struct pci_dev *dev) > +{ > + int ret; > + gsi_info_t gsi_info; > + > + if (!dev) > + return -EINVAL; > + > + ret = xen_pvh_get_gsi_info(dev, &gsi_info); > + if (ret) { > + xen_raw_printk("Fail to get gsi info!\n"); > + return ret; > + } > + > + ret = xen_pvh_setup_gsi(&gsi_info); > + if (ret == -EEXIST) { > + xen_raw_printk("Already setup the GSI :%d\n", gsi_info.gsi); > + ret = 0; > + } else if (ret) > + xen_raw_printk("Fail to setup GSI (%d)!\n", gsi_info.gsi); > + > + return ret; > +} > +EXPORT_SYMBOL_GPL(xen_pvh_passthrough_gsi); > + > void __init xen_pvh_init(struct boot_params *boot_params) > { > u32 msr; > diff --git a/drivers/acpi/pci_irq.c b/drivers/acpi/pci_irq.c > index ff30ceca2203..630fe0a34bc6 100644 > --- a/drivers/acpi/pci_irq.c > +++ b/drivers/acpi/pci_irq.c > @@ -288,7 +288,7 @@ static int acpi_reroute_boot_interrupt(struct pci_dev *dev, > } > #endif /* CONFIG_X86_IO_APIC */ > > -static struct acpi_prt_entry *acpi_pci_irq_lookup(struct pci_dev *dev, int pin) > +struct acpi_prt_entry *acpi_pci_irq_lookup(struct pci_dev *dev, int pin) > { > struct acpi_prt_entry *entry = NULL; > struct pci_dev *bridge; > diff --git a/drivers/xen/xen-pciback/pci_stub.c b/drivers/xen/xen-pciback/pci_stub.c > index 46c40ec8a18e..22d4380d2b04 100644 > --- a/drivers/xen/xen-pciback/pci_stub.c > +++ b/drivers/xen/xen-pciback/pci_stub.c > @@ -20,6 +20,7 @@ > #include > #include > #include > +#include > #include > #include > #include > @@ -435,6 +436,13 @@ static int pcistub_init_device(struct pci_dev *dev) > goto config_release; > pci_restore_state(dev); > } > + > + if (xen_initial_domain() && xen_pvh_domain()) { > + err = xen_pvh_passthrough_gsi(dev); > + if (err) > + goto config_release; > + } > + > /* Now disable the device (this also ensures some private device > * data is setup before we export) > */ > diff --git a/include/linux/acpi.h b/include/linux/acpi.h > index 4db54e928b36..7ea3be981cc3 100644 > --- a/include/linux/acpi.h > +++ b/include/linux/acpi.h > @@ -360,6 +360,7 @@ void acpi_unregister_gsi (u32 gsi); > > struct pci_dev; > > +struct acpi_prt_entry *acpi_pci_irq_lookup(struct pci_dev *dev, int pin); > int acpi_pci_irq_enable (struct pci_dev *dev); > void acpi_penalize_isa_irq(int irq, int active); > bool acpi_isa_irq_available(int irq); > diff --git a/include/xen/acpi.h b/include/xen/acpi.h > index b1e11863144d..17c4d37f1e60 100644 > --- a/include/xen/acpi.h > +++ b/include/xen/acpi.h > @@ -67,10 +67,16 @@ static inline void xen_acpi_sleep_register(void) > acpi_suspend_lowlevel = xen_acpi_suspend_lowlevel; > } > } > +int xen_pvh_passthrough_gsi(struct pci_dev *dev); > #else > static inline void xen_acpi_sleep_register(void) > { > } > + > +static inline int xen_pvh_passthrough_gsi(struct pci_dev *dev) > +{ > + return -1; > +} > #endif > > #endif /* _XEN_ACPI_H */ > -- > 2.34.1 >