Message ID | 20221015153409.918775-1-olekstysh@gmail.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:4ac7:0:0:0:0:0 with SMTP id y7csp691981wrs; Sat, 15 Oct 2022 08:50:45 -0700 (PDT) X-Google-Smtp-Source: AMsMyM57OmV6Q/SuYBVHfY3bLInMxI24D4MJsW6cRqupChh83+GP7BA8BW8p7Tgt27yVlbOaEsx+ X-Received: by 2002:a05:6402:2b85:b0:457:6216:d251 with SMTP id fj5-20020a0564022b8500b004576216d251mr2815050edb.56.1665849045769; Sat, 15 Oct 2022 08:50:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665849045; cv=none; d=google.com; s=arc-20160816; b=Db+Ic5MTMsT/oz4Y+EverO8K1lptbScRa0Ao4J2xa+B0oAE9RB7TRgSfNYIilLyUlm bR5Bs8uNBAnDnXpnedPwg8eGKksYwW4UHJEuihNPE87Jg3IOwx86chH/c6KiDjUj8YXJ KWqPpSbJqc61pcTiYW1egQoEpKVWWKrdGDSXmiEBvGhyD0VFNKRXSmhH8nd8cK/vrXPs wHSRxM7uUTIgq1vdrBTGLHAelKjxZ1tAEyJ6xjwxPzKVewvUNhAmJNpk4IIxK+a0Iw3f PvhZmqL8b5xx2+t6/A6jb/u0E0CSNDrOJfevpBC1YL+fL46tWLlhTnS7cpq5tXy1Qgic QTow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=ihOcqD/n8ZbX79lkXyTkddNqF22IgCuKxZEVGwB7Rsg=; b=Auc099Gtw/fGiD0R0CDSf8DOL6TzTTTLR8ApNqtD6KqcoGSUFkOf3B0K6CRpw0E9Ni pduxWh+meLeAjcrKZ6BtgswOtOY7aM/o0BfrMG4/xIlQ37B7ZeSYNcOak1uoYkuX75tl gdraO2pBMIeWEQ3sFwV3XsLDeXw4v6bF1XBt24Cja0BE4ukixnPNW3aw81OQpci5tKt/ BOZhey1Uv/oeMpN3Y93V53Mu+4TJLFkOSdmbNT8xxJgIxiYjyErqjKFGepiKs+gUQDWB zzKadk+6fuR3ZVuta+JbIUa8z5LNWGEtaVYQkbr01e5AhUpswLL8Vlf89J63hRGIwrV2 5jFg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=WxtdSw3R; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id mp30-20020a1709071b1e00b0078e27ef9510si3667046ejc.747.2022.10.15.08.50.17; Sat, 15 Oct 2022 08:50:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=WxtdSw3R; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229757AbiJOPfC (ORCPT <rfc822;rhyswoolcott@gmail.com> + 99 others); Sat, 15 Oct 2022 11:35:02 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47432 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229567AbiJOPfB (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Sat, 15 Oct 2022 11:35:01 -0400 Received: from mail-lj1-x22d.google.com (mail-lj1-x22d.google.com [IPv6:2a00:1450:4864:20::22d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2B8441EECB for <linux-kernel@vger.kernel.org>; Sat, 15 Oct 2022 08:34:41 -0700 (PDT) Received: by mail-lj1-x22d.google.com with SMTP id a6so9244114ljq.5 for <linux-kernel@vger.kernel.org>; Sat, 15 Oct 2022 08:34:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=ihOcqD/n8ZbX79lkXyTkddNqF22IgCuKxZEVGwB7Rsg=; b=WxtdSw3RVuokIk3VH0NlorLEv9hGbzMu1BXjJPFPg6tTUBAUACrJhaEons33ymTpay fsFTwfQbxQXLaSloPF8amM8JbNWOvBoQDVDLQP4T3JaPpsQauZT0geTwDcC7UyPymBz8 jnssWruJPe8g8dSeLpOrsbUEq2F3+WhotoQAeYxn0ytN33tQlg/cXg0w2K8+0o7dJ1lQ Fw9775uiwSMOsdy4oI1MLmDmKbuLHlD4bukfDsQASTZnmUa4nWgMHliZqbE9lx5bNeLn A/CtiP/rcDTETgtCh/oXjOsYxKX/0caViUXXDHU/1f9YJjOsTyTeiIU09NDlUTGoeKfL QZpw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=ihOcqD/n8ZbX79lkXyTkddNqF22IgCuKxZEVGwB7Rsg=; b=tu12Z6DTspMaluQLMQEnh6m0jZNv/cNWSC1m2j0w8VK6ZrmnkhEZuiV66PtAbv5Aw7 SXvyYJqGzS0lKCuwr14lCDzwOuTQNH7rT8UJ7zteSHLpJZD4XKT1UORb8S49iRMpo0OD rODKltJ6RIzLChwg+Fbsab1wdrztEmlgeGZs/dPJUfVMR4tdx/by1PrzgVQEx5e5MwrV ueV9nGdb/UlKoxO8pQRDasoYkJLk7XFRtgafTU9Q0FqIqpHoOfjIiA7dq9PRVwgwEm4T 5BhR9N7fCPuWrWuIvC72NWD25ClHp6SJF9wYTIXSaqNZirUIJyC/9P5AGkyPmLMq6NYq cHYw== X-Gm-Message-State: ACrzQf0wdt2Z+JDRfCxSYnTpPuP/P98U6t3QyDfdxsvDXhfHNJrv/mov 0njics6RplxWkiqdGnRAmISv+R2OfjV5sw== X-Received: by 2002:a05:651c:158f:b0:26b:dd9c:dca5 with SMTP id h15-20020a05651c158f00b0026bdd9cdca5mr1153297ljq.400.1665848078845; Sat, 15 Oct 2022 08:34:38 -0700 (PDT) Received: from otyshchenko.router ([212.22.223.21]) by smtp.gmail.com with ESMTPSA id i11-20020a0565123e0b00b00497a3e2a191sm773548lfv.112.2022.10.15.08.34.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 15 Oct 2022 08:34:38 -0700 (PDT) From: Oleksandr Tyshchenko <olekstysh@gmail.com> To: xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org Cc: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com>, Stefano Stabellini <sstabellini@kernel.org>, Juergen Gross <jgross@suse.com> Subject: [PATCH V2] xen/virtio: Handle PCI devices which Host controller is described in DT Date: Sat, 15 Oct 2022 18:34:09 +0300 Message-Id: <20221015153409.918775-1-olekstysh@gmail.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1746769328886840387?= X-GMAIL-MSGID: =?utf-8?q?1746769328886840387?= |
Series |
[V2] xen/virtio: Handle PCI devices which Host controller is described in DT
|
|
Commit Message
Oleksandr Tyshchenko
Oct. 15, 2022, 3:34 p.m. UTC
From: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> Use the same "xen-grant-dma" device concept for the PCI devices behind device-tree based PCI Host controller, but with one modification. Unlike for platform devices, we cannot use generic IOMMU bindings (iommus property), as we need to support more flexible configuration. The problem is that PCI devices under the single PCI Host controller may have the backends running in different Xen domains and thus have different endpoints ID (backend domains ID). So use generic PCI-IOMMU bindings instead (iommu-map/iommu-map-mask properties) which allows us to describe relationship between PCI devices and backend domains ID properly. Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> --- Slightly RFC. This is needed to support Xen grant mappings for virtio-pci devices on Arm at some point in the future. The Xen toolstack side is not completely ready yet. Here, for PCI devices we use more flexible way to pass backend domid to the guest than for platform devices. Changes V1 -> V2: - update commit description - rebase - rework to use generic PCI-IOMMU bindings instead of generic IOMMU bindings Previous discussion is at: https://lore.kernel.org/xen-devel/20221006174804.2003029-1-olekstysh@gmail.com/ Based on: https://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git/log/?h=for-linus-6.1 --- drivers/xen/grant-dma-ops.c | 87 ++++++++++++++++++++++++++++++++----- 1 file changed, 76 insertions(+), 11 deletions(-)
Comments
On Sat, 15 Oct 2022, Oleksandr Tyshchenko wrote: > From: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> > > Use the same "xen-grant-dma" device concept for the PCI devices > behind device-tree based PCI Host controller, but with one modification. > Unlike for platform devices, we cannot use generic IOMMU bindings > (iommus property), as we need to support more flexible configuration. > The problem is that PCI devices under the single PCI Host controller > may have the backends running in different Xen domains and thus have > different endpoints ID (backend domains ID). Hi Oleksandr, From another email I understood that you successfully managed to describe in device tree all the individual virtio pci devices so that you can have iommu-map/iommu-map-mask properties under each virtio device node. Is that right? If that is the case, then I would rather jump straight to that approach because I think it is far better than this one. Cheers, Stefano > So use generic PCI-IOMMU bindings instead (iommu-map/iommu-map-mask > properties) which allows us to describe relationship between PCI > devices and backend domains ID properly. > > Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> > --- > Slightly RFC. This is needed to support Xen grant mappings for virtio-pci devices > on Arm at some point in the future. The Xen toolstack side is not completely ready yet. > Here, for PCI devices we use more flexible way to pass backend domid to the guest > than for platform devices. > > Changes V1 -> V2: > - update commit description > - rebase > - rework to use generic PCI-IOMMU bindings instead of generic IOMMU bindings > > Previous discussion is at: > https://lore.kernel.org/xen-devel/20221006174804.2003029-1-olekstysh@gmail.com/ > > Based on: > https://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git/log/?h=for-linus-6.1 > --- > drivers/xen/grant-dma-ops.c | 87 ++++++++++++++++++++++++++++++++----- > 1 file changed, 76 insertions(+), 11 deletions(-) > > diff --git a/drivers/xen/grant-dma-ops.c b/drivers/xen/grant-dma-ops.c > index daa525df7bdc..b79d9d6ce154 100644 > --- a/drivers/xen/grant-dma-ops.c > +++ b/drivers/xen/grant-dma-ops.c > @@ -10,6 +10,7 @@ > #include <linux/module.h> > #include <linux/dma-map-ops.h> > #include <linux/of.h> > +#include <linux/pci.h> > #include <linux/pfn.h> > #include <linux/xarray.h> > #include <linux/virtio_anchor.h> > @@ -292,12 +293,55 @@ static const struct dma_map_ops xen_grant_dma_ops = { > .dma_supported = xen_grant_dma_supported, > }; > > +static struct device_node *xen_dt_get_pci_host_node(struct device *dev) > +{ > + struct pci_dev *pdev = to_pci_dev(dev); > + struct pci_bus *bus = pdev->bus; > + > + /* Walk up to the root bus to look for PCI Host controller */ > + while (!pci_is_root_bus(bus)) > + bus = bus->parent; > + > + return of_node_get(bus->bridge->parent->of_node); > +} > + > +static struct device_node *xen_dt_get_node(struct device *dev) > +{ > + if (dev_is_pci(dev)) > + return xen_dt_get_pci_host_node(dev); > + > + return of_node_get(dev->of_node); > +} > + > +static int xen_dt_map_id(struct device *dev, struct device_node **iommu_np, > + u32 *sid) > +{ > + struct pci_dev *pdev = to_pci_dev(dev); > + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); > + struct device_node *host_np; > + int ret; > + > + host_np = xen_dt_get_pci_host_node(dev); > + if (!host_np) > + return -ENODEV; > + > + ret = of_map_id(host_np, rid, "iommu-map", "iommu-map-mask", iommu_np, sid); > + of_node_put(host_np); > + > + return ret; > +} > + > static bool xen_is_dt_grant_dma_device(struct device *dev) > { > - struct device_node *iommu_np; > + struct device_node *iommu_np = NULL; > bool has_iommu; > > - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); > + if (dev_is_pci(dev)) { > + if (xen_dt_map_id(dev, &iommu_np, NULL)) > + return false; > + } else > + iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); > + > has_iommu = iommu_np && > of_device_is_compatible(iommu_np, "xen,grant-dma"); > of_node_put(iommu_np); > @@ -307,9 +351,17 @@ static bool xen_is_dt_grant_dma_device(struct device *dev) > > bool xen_is_grant_dma_device(struct device *dev) > { > + struct device_node *np; > + > /* XXX Handle only DT devices for now */ > - if (dev->of_node) > - return xen_is_dt_grant_dma_device(dev); > + np = xen_dt_get_node(dev); > + if (np) { > + bool ret; > + > + ret = xen_is_dt_grant_dma_device(dev); > + of_node_put(np); > + return ret; > + } > > return false; > } > @@ -325,12 +377,19 @@ bool xen_virtio_mem_acc(struct virtio_device *dev) > static int xen_dt_grant_init_backend_domid(struct device *dev, > struct xen_grant_dma_data *data) > { > - struct of_phandle_args iommu_spec; > + struct of_phandle_args iommu_spec = { .args_count = 1 }; > > - if (of_parse_phandle_with_args(dev->of_node, "iommus", "#iommu-cells", > - 0, &iommu_spec)) { > - dev_err(dev, "Cannot parse iommus property\n"); > - return -ESRCH; > + if (dev_is_pci(dev)) { > + if (xen_dt_map_id(dev, &iommu_spec.np, iommu_spec.args)) { > + dev_err(dev, "Cannot translate ID\n"); > + return -ESRCH; > + } > + } else { > + if (of_parse_phandle_with_args(dev->of_node, "iommus", "#iommu-cells", > + 0, &iommu_spec)) { > + dev_err(dev, "Cannot parse iommus property\n"); > + return -ESRCH; > + } > } > > if (!of_device_is_compatible(iommu_spec.np, "xen,grant-dma") || > @@ -354,6 +413,7 @@ static int xen_dt_grant_init_backend_domid(struct device *dev, > void xen_grant_setup_dma_ops(struct device *dev) > { > struct xen_grant_dma_data *data; > + struct device_node *np; > > data = find_xen_grant_dma_data(dev); > if (data) { > @@ -365,8 +425,13 @@ void xen_grant_setup_dma_ops(struct device *dev) > if (!data) > goto err; > > - if (dev->of_node) { > - if (xen_dt_grant_init_backend_domid(dev, data)) > + np = xen_dt_get_node(dev); > + if (np) { > + int ret; > + > + ret = xen_dt_grant_init_backend_domid(dev, data); > + of_node_put(np); > + if (ret) > goto err; > } else if (IS_ENABLED(CONFIG_XEN_VIRTIO_FORCE_GRANT)) { > dev_info(dev, "Using dom0 as backend\n"); > -- > 2.25.1 >
On 18.10.22 03:33, Stefano Stabellini wrote: Hello Stefano > On Sat, 15 Oct 2022, Oleksandr Tyshchenko wrote: >> From: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >> >> Use the same "xen-grant-dma" device concept for the PCI devices >> behind device-tree based PCI Host controller, but with one modification. >> Unlike for platform devices, we cannot use generic IOMMU bindings >> (iommus property), as we need to support more flexible configuration. >> The problem is that PCI devices under the single PCI Host controller >> may have the backends running in different Xen domains and thus have >> different endpoints ID (backend domains ID). > Hi Oleksandr, > > From another email I understood that you successfully managed to > describe in device tree all the individual virtio pci devices so that > you can have iommu-map/iommu-map-mask properties under each virtio > device node. Is that right? No. Here [1] I mentioned that I had experimented with PCI-IOMMU bindings (iommu-map/iommu-map-mask properties) as IOMMU bindings (iommu property) is insufficient for us and got it worked. Also I provided a link to the current patch. Sorry, if I was unclear. Just to be clear: We do not describe in device-tree all the individual virtio-pci devices (and we do not have to), we only describe generic PCI host bridge node. So we have only a *single* iommu-map property under that PCI host bridge node. The iommu-map property in turn describes the IOMMU connections for the endpoints within that PCI Host bridge according to: https://www.kernel.org/doc/Documentation/devicetree/bindings/pci/pci-iommu.txt For the instance, the following iommu-map property under that PCI host bridge node describes the relationship between IOMMU and two PCI devices (0000:00:01.0 and 0000:00:02.0): iommu-map = <0x08 0xfde9 0x01 0x08 0x10 0xfde9 0x02 0x08>; For 0000:00:01.0 we pass the endpoint ID 1 (backend domid 1) For 0000:00:02.0 we pass the endpoint ID 2 (backend domid 2) Other PCI devices (i.e 0000:00:03.0) are untranslated (are not required to use grants for the virtio). > > If that is the case, then I would rather jump straight to that approach > because I think it is far better than this one. Please see above, I don't have any other approach except the one implemented in current patch. [1] https://lore.kernel.org/xen-devel/16485bc9-0e2a-788a-93b8-453cc9ef0d3c@epam.com/ > > Cheers, > > Stefano > > > >> So use generic PCI-IOMMU bindings instead (iommu-map/iommu-map-mask >> properties) which allows us to describe relationship between PCI >> devices and backend domains ID properly. >> >> Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >> --- >> Slightly RFC. This is needed to support Xen grant mappings for virtio-pci devices >> on Arm at some point in the future. The Xen toolstack side is not completely ready yet. >> Here, for PCI devices we use more flexible way to pass backend domid to the guest >> than for platform devices. >> >> Changes V1 -> V2: >> - update commit description >> - rebase >> - rework to use generic PCI-IOMMU bindings instead of generic IOMMU bindings >> >> Previous discussion is at: >> https://urldefense.com/v3/__https://lore.kernel.org/xen-devel/20221006174804.2003029-1-olekstysh@gmail.com/__;!!GF_29dbcQIUBPA!1mSETxg8CRohlL5OpYo0VaLBXtbWRLZlam9QABMP_YUzsYcrn8no1FxBPvhQnNRCSzp3pkC1dXIgmhdaZmJ3oyV6yWUy3w$ [lore[.]kernel[.]org] >> >> Based on: >> https://urldefense.com/v3/__https://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git/log/?h=for-linus-6.1__;!!GF_29dbcQIUBPA!1mSETxg8CRohlL5OpYo0VaLBXtbWRLZlam9QABMP_YUzsYcrn8no1FxBPvhQnNRCSzp3pkC1dXIgmhdaZmJ3oyWa-6yyug$ [git[.]kernel[.]org] >> --- >> drivers/xen/grant-dma-ops.c | 87 ++++++++++++++++++++++++++++++++----- >> 1 file changed, 76 insertions(+), 11 deletions(-) >> >> diff --git a/drivers/xen/grant-dma-ops.c b/drivers/xen/grant-dma-ops.c >> index daa525df7bdc..b79d9d6ce154 100644 >> --- a/drivers/xen/grant-dma-ops.c >> +++ b/drivers/xen/grant-dma-ops.c >> @@ -10,6 +10,7 @@ >> #include <linux/module.h> >> #include <linux/dma-map-ops.h> >> #include <linux/of.h> >> +#include <linux/pci.h> >> #include <linux/pfn.h> >> #include <linux/xarray.h> >> #include <linux/virtio_anchor.h> >> @@ -292,12 +293,55 @@ static const struct dma_map_ops xen_grant_dma_ops = { >> .dma_supported = xen_grant_dma_supported, >> }; >> >> +static struct device_node *xen_dt_get_pci_host_node(struct device *dev) >> +{ >> + struct pci_dev *pdev = to_pci_dev(dev); >> + struct pci_bus *bus = pdev->bus; >> + >> + /* Walk up to the root bus to look for PCI Host controller */ >> + while (!pci_is_root_bus(bus)) >> + bus = bus->parent; >> + >> + return of_node_get(bus->bridge->parent->of_node); >> +} >> + >> +static struct device_node *xen_dt_get_node(struct device *dev) >> +{ >> + if (dev_is_pci(dev)) >> + return xen_dt_get_pci_host_node(dev); >> + >> + return of_node_get(dev->of_node); >> +} >> + >> +static int xen_dt_map_id(struct device *dev, struct device_node **iommu_np, >> + u32 *sid) >> +{ >> + struct pci_dev *pdev = to_pci_dev(dev); >> + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); >> + struct device_node *host_np; >> + int ret; >> + >> + host_np = xen_dt_get_pci_host_node(dev); >> + if (!host_np) >> + return -ENODEV; >> + >> + ret = of_map_id(host_np, rid, "iommu-map", "iommu-map-mask", iommu_np, sid); >> + of_node_put(host_np); >> + >> + return ret; >> +} >> + >> static bool xen_is_dt_grant_dma_device(struct device *dev) >> { >> - struct device_node *iommu_np; >> + struct device_node *iommu_np = NULL; >> bool has_iommu; >> >> - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >> + if (dev_is_pci(dev)) { >> + if (xen_dt_map_id(dev, &iommu_np, NULL)) >> + return false; >> + } else >> + iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >> + >> has_iommu = iommu_np && >> of_device_is_compatible(iommu_np, "xen,grant-dma"); >> of_node_put(iommu_np); >> @@ -307,9 +351,17 @@ static bool xen_is_dt_grant_dma_device(struct device *dev) >> >> bool xen_is_grant_dma_device(struct device *dev) >> { >> + struct device_node *np; >> + >> /* XXX Handle only DT devices for now */ >> - if (dev->of_node) >> - return xen_is_dt_grant_dma_device(dev); >> + np = xen_dt_get_node(dev); >> + if (np) { >> + bool ret; >> + >> + ret = xen_is_dt_grant_dma_device(dev); >> + of_node_put(np); >> + return ret; >> + } >> >> return false; >> } >> @@ -325,12 +377,19 @@ bool xen_virtio_mem_acc(struct virtio_device *dev) >> static int xen_dt_grant_init_backend_domid(struct device *dev, >> struct xen_grant_dma_data *data) >> { >> - struct of_phandle_args iommu_spec; >> + struct of_phandle_args iommu_spec = { .args_count = 1 }; >> >> - if (of_parse_phandle_with_args(dev->of_node, "iommus", "#iommu-cells", >> - 0, &iommu_spec)) { >> - dev_err(dev, "Cannot parse iommus property\n"); >> - return -ESRCH; >> + if (dev_is_pci(dev)) { >> + if (xen_dt_map_id(dev, &iommu_spec.np, iommu_spec.args)) { >> + dev_err(dev, "Cannot translate ID\n"); >> + return -ESRCH; >> + } >> + } else { >> + if (of_parse_phandle_with_args(dev->of_node, "iommus", "#iommu-cells", >> + 0, &iommu_spec)) { >> + dev_err(dev, "Cannot parse iommus property\n"); >> + return -ESRCH; >> + } >> } >> >> if (!of_device_is_compatible(iommu_spec.np, "xen,grant-dma") || >> @@ -354,6 +413,7 @@ static int xen_dt_grant_init_backend_domid(struct device *dev, >> void xen_grant_setup_dma_ops(struct device *dev) >> { >> struct xen_grant_dma_data *data; >> + struct device_node *np; >> >> data = find_xen_grant_dma_data(dev); >> if (data) { >> @@ -365,8 +425,13 @@ void xen_grant_setup_dma_ops(struct device *dev) >> if (!data) >> goto err; >> >> - if (dev->of_node) { >> - if (xen_dt_grant_init_backend_domid(dev, data)) >> + np = xen_dt_get_node(dev); >> + if (np) { >> + int ret; >> + >> + ret = xen_dt_grant_init_backend_domid(dev, data); >> + of_node_put(np); >> + if (ret) >> goto err; >> } else if (IS_ENABLED(CONFIG_XEN_VIRTIO_FORCE_GRANT)) { >> dev_info(dev, "Using dom0 as backend\n"); >> -- >> 2.25.1 >> -- Regards, Oleksandr Tyshchenko
On Tue, 18 Oct 2022, Oleksandr Tyshchenko wrote: > On 18.10.22 03:33, Stefano Stabellini wrote: > > On Sat, 15 Oct 2022, Oleksandr Tyshchenko wrote: > >> From: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> > >> > >> Use the same "xen-grant-dma" device concept for the PCI devices > >> behind device-tree based PCI Host controller, but with one modification. > >> Unlike for platform devices, we cannot use generic IOMMU bindings > >> (iommus property), as we need to support more flexible configuration. > >> The problem is that PCI devices under the single PCI Host controller > >> may have the backends running in different Xen domains and thus have > >> different endpoints ID (backend domains ID). > > Hi Oleksandr, > > > > From another email I understood that you successfully managed to > > describe in device tree all the individual virtio pci devices so that > > you can have iommu-map/iommu-map-mask properties under each virtio > > device node. Is that right? > > No. Here [1] I mentioned that I had experimented with PCI-IOMMU bindings > (iommu-map/iommu-map-mask properties) as IOMMU bindings (iommu property) > is insufficient for us and got it worked. > Also I provided a link to the current patch. Sorry, if I was unclear. > > Just to be clear: > > We do not describe in device-tree all the individual virtio-pci devices > (and we do not have to), we only describe generic PCI host bridge node. > So we have only a *single* iommu-map property under that PCI host bridge > node. > The iommu-map property in turn describes the IOMMU connections for the > endpoints within that PCI Host bridge according to: > https://www.kernel.org/doc/Documentation/devicetree/bindings/pci/pci-iommu.txt > > For the instance, the following iommu-map property under that PCI host > bridge node describes the relationship between IOMMU and two PCI devices > (0000:00:01.0 and 0000:00:02.0): > iommu-map = <0x08 0xfde9 0x01 0x08 0x10 0xfde9 0x02 0x08>; > For 0000:00:01.0 we pass the endpoint ID 1 (backend domid 1) > For 0000:00:02.0 we pass the endpoint ID 2 (backend domid 2) > Other PCI devices (i.e 0000:00:03.0) are untranslated (are not required > to use grants for the virtio). That's great! I misunderstood. Actually I wonder if iommu-map might be suitable also for hotplug devices (as long as the backend domid is known beforehand). I think that should work? It should be possible to specify PCI device IDs even if those device IDs are not present yet? If this work, it could be the best solution actually. > > If that is the case, then I would rather jump straight to that approach > > because I think it is far better than this one. > > Please see above, I don't have any other approach except the one > implemented in current patch. > > [1] > https://lore.kernel.org/xen-devel/16485bc9-0e2a-788a-93b8-453cc9ef0d3c@epam.com/ > > > > > > Cheers, > > > > Stefano > > > > > > > >> So use generic PCI-IOMMU bindings instead (iommu-map/iommu-map-mask > >> properties) which allows us to describe relationship between PCI > >> devices and backend domains ID properly. > >> > >> Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> > >> --- > >> Slightly RFC. This is needed to support Xen grant mappings for virtio-pci devices > >> on Arm at some point in the future. The Xen toolstack side is not completely ready yet. > >> Here, for PCI devices we use more flexible way to pass backend domid to the guest > >> than for platform devices. > >> > >> Changes V1 -> V2: > >> - update commit description > >> - rebase > >> - rework to use generic PCI-IOMMU bindings instead of generic IOMMU bindings > >> > >> Previous discussion is at: > >> https://urldefense.com/v3/__https://lore.kernel.org/xen-devel/20221006174804.2003029-1-olekstysh@gmail.com/__;!!GF_29dbcQIUBPA!1mSETxg8CRohlL5OpYo0VaLBXtbWRLZlam9QABMP_YUzsYcrn8no1FxBPvhQnNRCSzp3pkC1dXIgmhdaZmJ3oyV6yWUy3w$ [lore[.]kernel[.]org] > >> > >> Based on: > >> https://urldefense.com/v3/__https://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git/log/?h=for-linus-6.1__;!!GF_29dbcQIUBPA!1mSETxg8CRohlL5OpYo0VaLBXtbWRLZlam9QABMP_YUzsYcrn8no1FxBPvhQnNRCSzp3pkC1dXIgmhdaZmJ3oyWa-6yyug$ [git[.]kernel[.]org] > >> --- > >> drivers/xen/grant-dma-ops.c | 87 ++++++++++++++++++++++++++++++++----- > >> 1 file changed, 76 insertions(+), 11 deletions(-) > >> > >> diff --git a/drivers/xen/grant-dma-ops.c b/drivers/xen/grant-dma-ops.c > >> index daa525df7bdc..b79d9d6ce154 100644 > >> --- a/drivers/xen/grant-dma-ops.c > >> +++ b/drivers/xen/grant-dma-ops.c > >> @@ -10,6 +10,7 @@ > >> #include <linux/module.h> > >> #include <linux/dma-map-ops.h> > >> #include <linux/of.h> > >> +#include <linux/pci.h> > >> #include <linux/pfn.h> > >> #include <linux/xarray.h> > >> #include <linux/virtio_anchor.h> > >> @@ -292,12 +293,55 @@ static const struct dma_map_ops xen_grant_dma_ops = { > >> .dma_supported = xen_grant_dma_supported, > >> }; > >> > >> +static struct device_node *xen_dt_get_pci_host_node(struct device *dev) > >> +{ > >> + struct pci_dev *pdev = to_pci_dev(dev); > >> + struct pci_bus *bus = pdev->bus; > >> + > >> + /* Walk up to the root bus to look for PCI Host controller */ > >> + while (!pci_is_root_bus(bus)) > >> + bus = bus->parent; > >> + > >> + return of_node_get(bus->bridge->parent->of_node); > >> +} > >> + > >> +static struct device_node *xen_dt_get_node(struct device *dev) > >> +{ > >> + if (dev_is_pci(dev)) > >> + return xen_dt_get_pci_host_node(dev); > >> + > >> + return of_node_get(dev->of_node); > >> +} > >> + > >> +static int xen_dt_map_id(struct device *dev, struct device_node **iommu_np, > >> + u32 *sid) > >> +{ > >> + struct pci_dev *pdev = to_pci_dev(dev); > >> + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); > >> + struct device_node *host_np; > >> + int ret; > >> + > >> + host_np = xen_dt_get_pci_host_node(dev); > >> + if (!host_np) > >> + return -ENODEV; > >> + > >> + ret = of_map_id(host_np, rid, "iommu-map", "iommu-map-mask", iommu_np, sid); > >> + of_node_put(host_np); > >> + > >> + return ret; > >> +} > >> + > >> static bool xen_is_dt_grant_dma_device(struct device *dev) > >> { > >> - struct device_node *iommu_np; > >> + struct device_node *iommu_np = NULL; > >> bool has_iommu; > >> > >> - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); > >> + if (dev_is_pci(dev)) { > >> + if (xen_dt_map_id(dev, &iommu_np, NULL)) > >> + return false; > >> + } else > >> + iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); > >> + > >> has_iommu = iommu_np && > >> of_device_is_compatible(iommu_np, "xen,grant-dma"); > >> of_node_put(iommu_np); > >> @@ -307,9 +351,17 @@ static bool xen_is_dt_grant_dma_device(struct device *dev) > >> > >> bool xen_is_grant_dma_device(struct device *dev) > >> { > >> + struct device_node *np; > >> + > >> /* XXX Handle only DT devices for now */ > >> - if (dev->of_node) > >> - return xen_is_dt_grant_dma_device(dev); > >> + np = xen_dt_get_node(dev); > >> + if (np) { > >> + bool ret; > >> + > >> + ret = xen_is_dt_grant_dma_device(dev); > >> + of_node_put(np); > >> + return ret; > >> + } > >> > >> return false; > >> } > >> @@ -325,12 +377,19 @@ bool xen_virtio_mem_acc(struct virtio_device *dev) > >> static int xen_dt_grant_init_backend_domid(struct device *dev, > >> struct xen_grant_dma_data *data) > >> { > >> - struct of_phandle_args iommu_spec; > >> + struct of_phandle_args iommu_spec = { .args_count = 1 }; > >> > >> - if (of_parse_phandle_with_args(dev->of_node, "iommus", "#iommu-cells", > >> - 0, &iommu_spec)) { > >> - dev_err(dev, "Cannot parse iommus property\n"); > >> - return -ESRCH; > >> + if (dev_is_pci(dev)) { > >> + if (xen_dt_map_id(dev, &iommu_spec.np, iommu_spec.args)) { > >> + dev_err(dev, "Cannot translate ID\n"); > >> + return -ESRCH; > >> + } > >> + } else { > >> + if (of_parse_phandle_with_args(dev->of_node, "iommus", "#iommu-cells", > >> + 0, &iommu_spec)) { > >> + dev_err(dev, "Cannot parse iommus property\n"); > >> + return -ESRCH; > >> + } > >> } > >> > >> if (!of_device_is_compatible(iommu_spec.np, "xen,grant-dma") || > >> @@ -354,6 +413,7 @@ static int xen_dt_grant_init_backend_domid(struct device *dev, > >> void xen_grant_setup_dma_ops(struct device *dev) > >> { > >> struct xen_grant_dma_data *data; > >> + struct device_node *np; > >> > >> data = find_xen_grant_dma_data(dev); > >> if (data) { > >> @@ -365,8 +425,13 @@ void xen_grant_setup_dma_ops(struct device *dev) > >> if (!data) > >> goto err; > >> > >> - if (dev->of_node) { > >> - if (xen_dt_grant_init_backend_domid(dev, data)) > >> + np = xen_dt_get_node(dev); > >> + if (np) { > >> + int ret; > >> + > >> + ret = xen_dt_grant_init_backend_domid(dev, data); > >> + of_node_put(np); > >> + if (ret) > >> goto err; > >> } else if (IS_ENABLED(CONFIG_XEN_VIRTIO_FORCE_GRANT)) { > >> dev_info(dev, "Using dom0 as backend\n"); > >> -- > >> 2.25.1 > >> > -- > Regards, > > Oleksandr Tyshchenko >
On Sat, 15 Oct 2022, Oleksandr Tyshchenko wrote: > From: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> > > Use the same "xen-grant-dma" device concept for the PCI devices > behind device-tree based PCI Host controller, but with one modification. > Unlike for platform devices, we cannot use generic IOMMU bindings > (iommus property), as we need to support more flexible configuration. > The problem is that PCI devices under the single PCI Host controller > may have the backends running in different Xen domains and thus have > different endpoints ID (backend domains ID). > > So use generic PCI-IOMMU bindings instead (iommu-map/iommu-map-mask > properties) which allows us to describe relationship between PCI > devices and backend domains ID properly. > > Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> Now that I understood the approach and the reasons for it, I can review the patch :-) Please add an example of the bindings in the commit message. > --- > Slightly RFC. This is needed to support Xen grant mappings for virtio-pci devices > on Arm at some point in the future. The Xen toolstack side is not completely ready yet. > Here, for PCI devices we use more flexible way to pass backend domid to the guest > than for platform devices. > > Changes V1 -> V2: > - update commit description > - rebase > - rework to use generic PCI-IOMMU bindings instead of generic IOMMU bindings > > Previous discussion is at: > https://lore.kernel.org/xen-devel/20221006174804.2003029-1-olekstysh@gmail.com/ > > Based on: > https://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git/log/?h=for-linus-6.1 > --- > drivers/xen/grant-dma-ops.c | 87 ++++++++++++++++++++++++++++++++----- > 1 file changed, 76 insertions(+), 11 deletions(-) > > diff --git a/drivers/xen/grant-dma-ops.c b/drivers/xen/grant-dma-ops.c > index daa525df7bdc..b79d9d6ce154 100644 > --- a/drivers/xen/grant-dma-ops.c > +++ b/drivers/xen/grant-dma-ops.c > @@ -10,6 +10,7 @@ > #include <linux/module.h> > #include <linux/dma-map-ops.h> > #include <linux/of.h> > +#include <linux/pci.h> > #include <linux/pfn.h> > #include <linux/xarray.h> > #include <linux/virtio_anchor.h> > @@ -292,12 +293,55 @@ static const struct dma_map_ops xen_grant_dma_ops = { > .dma_supported = xen_grant_dma_supported, > }; > > +static struct device_node *xen_dt_get_pci_host_node(struct device *dev) > +{ > + struct pci_dev *pdev = to_pci_dev(dev); > + struct pci_bus *bus = pdev->bus; > + > + /* Walk up to the root bus to look for PCI Host controller */ > + while (!pci_is_root_bus(bus)) > + bus = bus->parent; > + > + return of_node_get(bus->bridge->parent->of_node); > +} It seems silly that we need to walk the hierachy that way, but I couldn't find another way to do it > +static struct device_node *xen_dt_get_node(struct device *dev) > +{ > + if (dev_is_pci(dev)) > + return xen_dt_get_pci_host_node(dev); > + > + return of_node_get(dev->of_node); > +} > + > +static int xen_dt_map_id(struct device *dev, struct device_node **iommu_np, > + u32 *sid) > +{ > + struct pci_dev *pdev = to_pci_dev(dev); > + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); > + struct device_node *host_np; > + int ret; > + > + host_np = xen_dt_get_pci_host_node(dev); > + if (!host_np) > + return -ENODEV; > + > + ret = of_map_id(host_np, rid, "iommu-map", "iommu-map-mask", iommu_np, sid); > + of_node_put(host_np); > + return ret; > +} > + > static bool xen_is_dt_grant_dma_device(struct device *dev) > { > - struct device_node *iommu_np; > + struct device_node *iommu_np = NULL; > bool has_iommu; > > - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); > + if (dev_is_pci(dev)) { > + if (xen_dt_map_id(dev, &iommu_np, NULL)) > + return false; > + } else > + iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); > + > has_iommu = iommu_np && > of_device_is_compatible(iommu_np, "xen,grant-dma"); > of_node_put(iommu_np); > @@ -307,9 +351,17 @@ static bool xen_is_dt_grant_dma_device(struct device *dev) > > bool xen_is_grant_dma_device(struct device *dev) > { > + struct device_node *np; > + > /* XXX Handle only DT devices for now */ > - if (dev->of_node) > - return xen_is_dt_grant_dma_device(dev); > + np = xen_dt_get_node(dev); > + if (np) { > + bool ret; > + > + ret = xen_is_dt_grant_dma_device(dev); > + of_node_put(np); > + return ret; > + } We don't need to walk the PCI hierachy twice. Maybe we can add the of_node check directly to xen_is_dt_grant_dma_device? > return false; > } > @@ -325,12 +377,19 @@ bool xen_virtio_mem_acc(struct virtio_device *dev) > static int xen_dt_grant_init_backend_domid(struct device *dev, > struct xen_grant_dma_data *data) > { > - struct of_phandle_args iommu_spec; > + struct of_phandle_args iommu_spec = { .args_count = 1 }; > > - if (of_parse_phandle_with_args(dev->of_node, "iommus", "#iommu-cells", > - 0, &iommu_spec)) { > - dev_err(dev, "Cannot parse iommus property\n"); > - return -ESRCH; > + if (dev_is_pci(dev)) { > + if (xen_dt_map_id(dev, &iommu_spec.np, iommu_spec.args)) { > + dev_err(dev, "Cannot translate ID\n"); > + return -ESRCH; > + } > + } else { > + if (of_parse_phandle_with_args(dev->of_node, "iommus", "#iommu-cells", > + 0, &iommu_spec)) { > + dev_err(dev, "Cannot parse iommus property\n"); > + return -ESRCH; > + } > } > > if (!of_device_is_compatible(iommu_spec.np, "xen,grant-dma") || > @@ -354,6 +413,7 @@ static int xen_dt_grant_init_backend_domid(struct device *dev, > void xen_grant_setup_dma_ops(struct device *dev) > { > struct xen_grant_dma_data *data; > + struct device_node *np; > > data = find_xen_grant_dma_data(dev); > if (data) { > @@ -365,8 +425,13 @@ void xen_grant_setup_dma_ops(struct device *dev) > if (!data) > goto err; > > - if (dev->of_node) { > - if (xen_dt_grant_init_backend_domid(dev, data)) > + np = xen_dt_get_node(dev); > + if (np) { > + int ret; > + > + ret = xen_dt_grant_init_backend_domid(dev, data); > + of_node_put(np); > + if (ret) > goto err; > } else if (IS_ENABLED(CONFIG_XEN_VIRTIO_FORCE_GRANT)) { > dev_info(dev, "Using dom0 as backend\n"); > -- > 2.25.1 >
On 10/19/22 03:58, Stefano Stabellini wrote: > On Sat, 15 Oct 2022, Oleksandr Tyshchenko wrote: >> From: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >> >> Use the same "xen-grant-dma" device concept for the PCI devices >> behind device-tree based PCI Host controller, but with one modification. >> Unlike for platform devices, we cannot use generic IOMMU bindings >> (iommus property), as we need to support more flexible configuration. >> The problem is that PCI devices under the single PCI Host controller >> may have the backends running in different Xen domains and thus have >> different endpoints ID (backend domains ID). >> >> So use generic PCI-IOMMU bindings instead (iommu-map/iommu-map-mask >> properties) which allows us to describe relationship between PCI >> devices and backend domains ID properly. >> >> Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> > > Now that I understood the approach and the reasons for it, I can review > the patch :-) > > Please add an example of the bindings in the commit message. > > >> --- >> Slightly RFC. This is needed to support Xen grant mappings for virtio-pci devices >> on Arm at some point in the future. The Xen toolstack side is not completely ready yet. >> Here, for PCI devices we use more flexible way to pass backend domid to the guest >> than for platform devices. >> >> Changes V1 -> V2: >> - update commit description >> - rebase >> - rework to use generic PCI-IOMMU bindings instead of generic IOMMU bindings >> >> Previous discussion is at: >> https://lore.kernel.org/xen-devel/20221006174804.2003029-1-olekstysh@gmail.com/ >> >> Based on: >> https://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git/log/?h=for-linus-6.1 >> --- >> drivers/xen/grant-dma-ops.c | 87 ++++++++++++++++++++++++++++++++----- >> 1 file changed, 76 insertions(+), 11 deletions(-) >> >> diff --git a/drivers/xen/grant-dma-ops.c b/drivers/xen/grant-dma-ops.c >> index daa525df7bdc..b79d9d6ce154 100644 >> --- a/drivers/xen/grant-dma-ops.c >> +++ b/drivers/xen/grant-dma-ops.c >> @@ -10,6 +10,7 @@ >> #include <linux/module.h> >> #include <linux/dma-map-ops.h> >> #include <linux/of.h> >> +#include <linux/pci.h> >> #include <linux/pfn.h> >> #include <linux/xarray.h> >> #include <linux/virtio_anchor.h> >> @@ -292,12 +293,55 @@ static const struct dma_map_ops xen_grant_dma_ops = { >> .dma_supported = xen_grant_dma_supported, >> }; >> >> +static struct device_node *xen_dt_get_pci_host_node(struct device *dev) >> +{ >> + struct pci_dev *pdev = to_pci_dev(dev); >> + struct pci_bus *bus = pdev->bus; >> + >> + /* Walk up to the root bus to look for PCI Host controller */ >> + while (!pci_is_root_bus(bus)) >> + bus = bus->parent; >> + >> + return of_node_get(bus->bridge->parent->of_node); >> +} > > It seems silly that we need to walk the hierachy that way, but I > couldn't find another way to do it > > >> +static struct device_node *xen_dt_get_node(struct device *dev) >> +{ >> + if (dev_is_pci(dev)) >> + return xen_dt_get_pci_host_node(dev); >> + >> + return of_node_get(dev->of_node); >> +} >> + >> +static int xen_dt_map_id(struct device *dev, struct device_node **iommu_np, >> + u32 *sid) >> +{ >> + struct pci_dev *pdev = to_pci_dev(dev); >> + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); >> + struct device_node *host_np; >> + int ret; >> + >> + host_np = xen_dt_get_pci_host_node(dev); >> + if (!host_np) >> + return -ENODEV; >> + >> + ret = of_map_id(host_np, rid, "iommu-map", "iommu-map-mask", iommu_np, sid); >> + of_node_put(host_np); >> + return ret; >> +} >> + >> static bool xen_is_dt_grant_dma_device(struct device *dev) >> { >> - struct device_node *iommu_np; >> + struct device_node *iommu_np = NULL; >> bool has_iommu; >> >> - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >> + if (dev_is_pci(dev)) { >> + if (xen_dt_map_id(dev, &iommu_np, NULL)) >> + return false; >> + } else >> + iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >> + >> has_iommu = iommu_np && >> of_device_is_compatible(iommu_np, "xen,grant-dma"); >> of_node_put(iommu_np); >> @@ -307,9 +351,17 @@ static bool xen_is_dt_grant_dma_device(struct device *dev) >> >> bool xen_is_grant_dma_device(struct device *dev) >> { >> + struct device_node *np; >> + >> /* XXX Handle only DT devices for now */ >> - if (dev->of_node) >> - return xen_is_dt_grant_dma_device(dev); >> + np = xen_dt_get_node(dev); >> + if (np) { >> + bool ret; >> + >> + ret = xen_is_dt_grant_dma_device(dev); >> + of_node_put(np); >> + return ret; >> + } > > We don't need to walk the PCI hierachy twice. Maybe we can add the > of_node check directly to xen_is_dt_grant_dma_device? > I think in general we could pass directly the host bridge device if dev_is_pci(dev) (which can be retrieved with pci_get_host_bridge_device(to_pci_dev(dev), and after done with it pci_put_host_bridge_device(phb)). So that, xen_is_dt_grant_dma_device() and xen_dt_grant_init_backend_domid() won't need to discover it themselves. This will simplify the code. > >> return false; >> } >> @@ -325,12 +377,19 @@ bool xen_virtio_mem_acc(struct virtio_device *dev) >> static int xen_dt_grant_init_backend_domid(struct device *dev, >> struct xen_grant_dma_data *data) >> { >> - struct of_phandle_args iommu_spec; >> + struct of_phandle_args iommu_spec = { .args_count = 1 }; >> >> - if (of_parse_phandle_with_args(dev->of_node, "iommus", "#iommu-cells", >> - 0, &iommu_spec)) { >> - dev_err(dev, "Cannot parse iommus property\n"); >> - return -ESRCH; >> + if (dev_is_pci(dev)) { >> + if (xen_dt_map_id(dev, &iommu_spec.np, iommu_spec.args)) { >> + dev_err(dev, "Cannot translate ID\n"); >> + return -ESRCH; >> + } >> + } else { >> + if (of_parse_phandle_with_args(dev->of_node, "iommus", "#iommu-cells", >> + 0, &iommu_spec)) { >> + dev_err(dev, "Cannot parse iommus property\n"); >> + return -ESRCH; >> + } >> } >> >> if (!of_device_is_compatible(iommu_spec.np, "xen,grant-dma") || >> @@ -354,6 +413,7 @@ static int xen_dt_grant_init_backend_domid(struct device *dev, >> void xen_grant_setup_dma_ops(struct device *dev) >> { >> struct xen_grant_dma_data *data; >> + struct device_node *np; >> >> data = find_xen_grant_dma_data(dev); >> if (data) { >> @@ -365,8 +425,13 @@ void xen_grant_setup_dma_ops(struct device *dev) >> if (!data) >> goto err; >> >> - if (dev->of_node) { >> - if (xen_dt_grant_init_backend_domid(dev, data)) >> + np = xen_dt_get_node(dev); >> + if (np) { >> + int ret; >> + >> + ret = xen_dt_grant_init_backend_domid(dev, data); >> + of_node_put(np); >> + if (ret) >> goto err; >> } else if (IS_ENABLED(CONFIG_XEN_VIRTIO_FORCE_GRANT)) { >> dev_info(dev, "Using dom0 as backend\n"); >> -- >> 2.25.1 >> >
On 19.10.22 03:34, Stefano Stabellini wrote: Hello Stefano > On Tue, 18 Oct 2022, Oleksandr Tyshchenko wrote: >> On 18.10.22 03:33, Stefano Stabellini wrote: >>> On Sat, 15 Oct 2022, Oleksandr Tyshchenko wrote: >>>> From: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >>>> >>>> Use the same "xen-grant-dma" device concept for the PCI devices >>>> behind device-tree based PCI Host controller, but with one modification. >>>> Unlike for platform devices, we cannot use generic IOMMU bindings >>>> (iommus property), as we need to support more flexible configuration. >>>> The problem is that PCI devices under the single PCI Host controller >>>> may have the backends running in different Xen domains and thus have >>>> different endpoints ID (backend domains ID). >>> Hi Oleksandr, >>> >>> From another email I understood that you successfully managed to >>> describe in device tree all the individual virtio pci devices so that >>> you can have iommu-map/iommu-map-mask properties under each virtio >>> device node. Is that right? >> No. Here [1] I mentioned that I had experimented with PCI-IOMMU bindings >> (iommu-map/iommu-map-mask properties) as IOMMU bindings (iommu property) >> is insufficient for us and got it worked. >> Also I provided a link to the current patch. Sorry, if I was unclear. >> >> Just to be clear: >> >> We do not describe in device-tree all the individual virtio-pci devices >> (and we do not have to), we only describe generic PCI host bridge node. >> So we have only a *single* iommu-map property under that PCI host bridge >> node. >> The iommu-map property in turn describes the IOMMU connections for the >> endpoints within that PCI Host bridge according to: >> https://urldefense.com/v3/__https://www.kernel.org/doc/Documentation/devicetree/bindings/pci/pci-iommu.txt__;!!GF_29dbcQIUBPA!078KT_6M5f7P5_m6O2EotvWED-yuSZKHzzqykDoW5DPtQOWJQeoZB4QWsJCqCkP-wFtLry5TiLAz3uhNnB2ccNY9CsN57Q$ [kernel[.]org] >> >> For the instance, the following iommu-map property under that PCI host >> bridge node describes the relationship between IOMMU and two PCI devices >> (0000:00:01.0 and 0000:00:02.0): >> iommu-map = <0x08 0xfde9 0x01 0x08 0x10 0xfde9 0x02 0x08>; >> For 0000:00:01.0 we pass the endpoint ID 1 (backend domid 1) >> For 0000:00:02.0 we pass the endpoint ID 2 (backend domid 2) >> Other PCI devices (i.e 0000:00:03.0) are untranslated (are not required >> to use grants for the virtio). > That's great! I misunderstood. Actually I wonder if iommu-map might be > suitable also for hotplug devices (as long as the backend domid is known > beforehand). I think that should work? I don't see at the moment any reasons why actually not. I assume, it would also work. For hotplug devices the arch_setup_dma_ops() -> ... -> xen_grant_setup_dma_ops() will also be called as it is called for *boot* devices, isn't it? > It should be possible to specify > PCI device IDs even if those device IDs are not present yet? I may mistake, but I think, yes. I think, nothing prevents us from doing so when creating PCI Host bridge node in the toolstack (or Xen if it is a dom0less). I think, we do not violate anything. We just describe the IOMMU mapping scheme for PCI devices. If PCI device with specified RID appears at some point in future, the corresponding SID (backend domid) will be assigned to it, if not appears - nothing bad will happen. I think, this is similar to interrupt-map property where we describe the interrupt mapping scheme for PCI devices. > > If this work, it could be the best solution actually. thanks, I cannot say for sure whether it will 100% work as we don't have a working hotplug at the moment, so it is not possible to re-check, but I don't see why that solution won't work for us. > > >>> If that is the case, then I would rather jump straight to that approach >>> because I think it is far better than this one. >> Please see above, I don't have any other approach except the one >> implemented in current patch. >> >> [1] >> https://urldefense.com/v3/__https://lore.kernel.org/xen-devel/16485bc9-0e2a-788a-93b8-453cc9ef0d3c@epam.com/__;!!GF_29dbcQIUBPA!078KT_6M5f7P5_m6O2EotvWED-yuSZKHzzqykDoW5DPtQOWJQeoZB4QWsJCqCkP-wFtLry5TiLAz3uhNnB2ccNaoN0AUOw$ [lore[.]kernel[.]org] >> >> >>> Cheers, >>> >>> Stefano >>> >>> >>> >>>> So use generic PCI-IOMMU bindings instead (iommu-map/iommu-map-mask >>>> properties) which allows us to describe relationship between PCI >>>> devices and backend domains ID properly. >>>> >>>> Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >>>> --- >>>> Slightly RFC. This is needed to support Xen grant mappings for virtio-pci devices >>>> on Arm at some point in the future. The Xen toolstack side is not completely ready yet. >>>> Here, for PCI devices we use more flexible way to pass backend domid to the guest >>>> than for platform devices. >>>> >>>> Changes V1 -> V2: >>>> - update commit description >>>> - rebase >>>> - rework to use generic PCI-IOMMU bindings instead of generic IOMMU bindings >>>> >>>> Previous discussion is at: >>>> https://urldefense.com/v3/__https://lore.kernel.org/xen-devel/20221006174804.2003029-1-olekstysh@gmail.com/__;!!GF_29dbcQIUBPA!1mSETxg8CRohlL5OpYo0VaLBXtbWRLZlam9QABMP_YUzsYcrn8no1FxBPvhQnNRCSzp3pkC1dXIgmhdaZmJ3oyV6yWUy3w$ [lore[.]kernel[.]org] >>>> >>>> Based on: >>>> https://urldefense.com/v3/__https://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git/log/?h=for-linus-6.1__;!!GF_29dbcQIUBPA!1mSETxg8CRohlL5OpYo0VaLBXtbWRLZlam9QABMP_YUzsYcrn8no1FxBPvhQnNRCSzp3pkC1dXIgmhdaZmJ3oyWa-6yyug$ [git[.]kernel[.]org] >>>> --- >>>> drivers/xen/grant-dma-ops.c | 87 ++++++++++++++++++++++++++++++++----- >>>> 1 file changed, 76 insertions(+), 11 deletions(-) >>>> >>>> diff --git a/drivers/xen/grant-dma-ops.c b/drivers/xen/grant-dma-ops.c >>>> index daa525df7bdc..b79d9d6ce154 100644 >>>> --- a/drivers/xen/grant-dma-ops.c >>>> +++ b/drivers/xen/grant-dma-ops.c >>>> @@ -10,6 +10,7 @@ >>>> #include <linux/module.h> >>>> #include <linux/dma-map-ops.h> >>>> #include <linux/of.h> >>>> +#include <linux/pci.h> >>>> #include <linux/pfn.h> >>>> #include <linux/xarray.h> >>>> #include <linux/virtio_anchor.h> >>>> @@ -292,12 +293,55 @@ static const struct dma_map_ops xen_grant_dma_ops = { >>>> .dma_supported = xen_grant_dma_supported, >>>> }; >>>> >>>> +static struct device_node *xen_dt_get_pci_host_node(struct device *dev) >>>> +{ >>>> + struct pci_dev *pdev = to_pci_dev(dev); >>>> + struct pci_bus *bus = pdev->bus; >>>> + >>>> + /* Walk up to the root bus to look for PCI Host controller */ >>>> + while (!pci_is_root_bus(bus)) >>>> + bus = bus->parent; >>>> + >>>> + return of_node_get(bus->bridge->parent->of_node); >>>> +} >>>> + >>>> +static struct device_node *xen_dt_get_node(struct device *dev) >>>> +{ >>>> + if (dev_is_pci(dev)) >>>> + return xen_dt_get_pci_host_node(dev); >>>> + >>>> + return of_node_get(dev->of_node); >>>> +} >>>> + >>>> +static int xen_dt_map_id(struct device *dev, struct device_node **iommu_np, >>>> + u32 *sid) >>>> +{ >>>> + struct pci_dev *pdev = to_pci_dev(dev); >>>> + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); >>>> + struct device_node *host_np; >>>> + int ret; >>>> + >>>> + host_np = xen_dt_get_pci_host_node(dev); >>>> + if (!host_np) >>>> + return -ENODEV; >>>> + >>>> + ret = of_map_id(host_np, rid, "iommu-map", "iommu-map-mask", iommu_np, sid); >>>> + of_node_put(host_np); >>>> + >>>> + return ret; >>>> +} >>>> + >>>> static bool xen_is_dt_grant_dma_device(struct device *dev) >>>> { >>>> - struct device_node *iommu_np; >>>> + struct device_node *iommu_np = NULL; >>>> bool has_iommu; >>>> >>>> - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >>>> + if (dev_is_pci(dev)) { >>>> + if (xen_dt_map_id(dev, &iommu_np, NULL)) >>>> + return false; >>>> + } else >>>> + iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >>>> + >>>> has_iommu = iommu_np && >>>> of_device_is_compatible(iommu_np, "xen,grant-dma"); >>>> of_node_put(iommu_np); >>>> @@ -307,9 +351,17 @@ static bool xen_is_dt_grant_dma_device(struct device *dev) >>>> >>>> bool xen_is_grant_dma_device(struct device *dev) >>>> { >>>> + struct device_node *np; >>>> + >>>> /* XXX Handle only DT devices for now */ >>>> - if (dev->of_node) >>>> - return xen_is_dt_grant_dma_device(dev); >>>> + np = xen_dt_get_node(dev); >>>> + if (np) { >>>> + bool ret; >>>> + >>>> + ret = xen_is_dt_grant_dma_device(dev); >>>> + of_node_put(np); >>>> + return ret; >>>> + } >>>> >>>> return false; >>>> } >>>> @@ -325,12 +377,19 @@ bool xen_virtio_mem_acc(struct virtio_device *dev) >>>> static int xen_dt_grant_init_backend_domid(struct device *dev, >>>> struct xen_grant_dma_data *data) >>>> { >>>> - struct of_phandle_args iommu_spec; >>>> + struct of_phandle_args iommu_spec = { .args_count = 1 }; >>>> >>>> - if (of_parse_phandle_with_args(dev->of_node, "iommus", "#iommu-cells", >>>> - 0, &iommu_spec)) { >>>> - dev_err(dev, "Cannot parse iommus property\n"); >>>> - return -ESRCH; >>>> + if (dev_is_pci(dev)) { >>>> + if (xen_dt_map_id(dev, &iommu_spec.np, iommu_spec.args)) { >>>> + dev_err(dev, "Cannot translate ID\n"); >>>> + return -ESRCH; >>>> + } >>>> + } else { >>>> + if (of_parse_phandle_with_args(dev->of_node, "iommus", "#iommu-cells", >>>> + 0, &iommu_spec)) { >>>> + dev_err(dev, "Cannot parse iommus property\n"); >>>> + return -ESRCH; >>>> + } >>>> } >>>> >>>> if (!of_device_is_compatible(iommu_spec.np, "xen,grant-dma") || >>>> @@ -354,6 +413,7 @@ static int xen_dt_grant_init_backend_domid(struct device *dev, >>>> void xen_grant_setup_dma_ops(struct device *dev) >>>> { >>>> struct xen_grant_dma_data *data; >>>> + struct device_node *np; >>>> >>>> data = find_xen_grant_dma_data(dev); >>>> if (data) { >>>> @@ -365,8 +425,13 @@ void xen_grant_setup_dma_ops(struct device *dev) >>>> if (!data) >>>> goto err; >>>> >>>> - if (dev->of_node) { >>>> - if (xen_dt_grant_init_backend_domid(dev, data)) >>>> + np = xen_dt_get_node(dev); >>>> + if (np) { >>>> + int ret; >>>> + >>>> + ret = xen_dt_grant_init_backend_domid(dev, data); >>>> + of_node_put(np); >>>> + if (ret) >>>> goto err; >>>> } else if (IS_ENABLED(CONFIG_XEN_VIRTIO_FORCE_GRANT)) { >>>> dev_info(dev, "Using dom0 as backend\n"); >>>> -- >>>> 2.25.1 >>>> >> -- >> Regards, >> >> Oleksandr Tyshchenko >> -- Regards, Oleksandr Tyshchenko
On 19.10.22 03:58, Stefano Stabellini wrote: Hello Stefano > On Sat, 15 Oct 2022, Oleksandr Tyshchenko wrote: >> From: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >> >> Use the same "xen-grant-dma" device concept for the PCI devices >> behind device-tree based PCI Host controller, but with one modification. >> Unlike for platform devices, we cannot use generic IOMMU bindings >> (iommus property), as we need to support more flexible configuration. >> The problem is that PCI devices under the single PCI Host controller >> may have the backends running in different Xen domains and thus have >> different endpoints ID (backend domains ID). >> >> So use generic PCI-IOMMU bindings instead (iommu-map/iommu-map-mask >> properties) which allows us to describe relationship between PCI >> devices and backend domains ID properly. >> >> Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> > Now that I understood the approach and the reasons for it, I can review > the patch :-) perfect, thanks. > > Please add an example of the bindings in the commit message. ok, will do > > >> --- >> Slightly RFC. This is needed to support Xen grant mappings for virtio-pci devices >> on Arm at some point in the future. The Xen toolstack side is not completely ready yet. >> Here, for PCI devices we use more flexible way to pass backend domid to the guest >> than for platform devices. >> >> Changes V1 -> V2: >> - update commit description >> - rebase >> - rework to use generic PCI-IOMMU bindings instead of generic IOMMU bindings >> >> Previous discussion is at: >> https://urldefense.com/v3/__https://lore.kernel.org/xen-devel/20221006174804.2003029-1-olekstysh@gmail.com/__;!!GF_29dbcQIUBPA!xJPdZO3-3Wmgo_79HuDsD53RkH_eAN96NmwuwFE7dArt_xNYGdD6LeLsq4B_QPrrvX-x23tJl6jQlNqgyNjgzT2NE3Pqjg$ [lore[.]kernel[.]org] >> >> Based on: >> https://urldefense.com/v3/__https://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git/log/?h=for-linus-6.1__;!!GF_29dbcQIUBPA!xJPdZO3-3Wmgo_79HuDsD53RkH_eAN96NmwuwFE7dArt_xNYGdD6LeLsq4B_QPrrvX-x23tJl6jQlNqgyNjgzT2J40LOxg$ [git[.]kernel[.]org] >> --- >> drivers/xen/grant-dma-ops.c | 87 ++++++++++++++++++++++++++++++++----- >> 1 file changed, 76 insertions(+), 11 deletions(-) >> >> diff --git a/drivers/xen/grant-dma-ops.c b/drivers/xen/grant-dma-ops.c >> index daa525df7bdc..b79d9d6ce154 100644 >> --- a/drivers/xen/grant-dma-ops.c >> +++ b/drivers/xen/grant-dma-ops.c >> @@ -10,6 +10,7 @@ >> #include <linux/module.h> >> #include <linux/dma-map-ops.h> >> #include <linux/of.h> >> +#include <linux/pci.h> >> #include <linux/pfn.h> >> #include <linux/xarray.h> >> #include <linux/virtio_anchor.h> >> @@ -292,12 +293,55 @@ static const struct dma_map_ops xen_grant_dma_ops = { >> .dma_supported = xen_grant_dma_supported, >> }; >> >> +static struct device_node *xen_dt_get_pci_host_node(struct device *dev) >> +{ >> + struct pci_dev *pdev = to_pci_dev(dev); >> + struct pci_bus *bus = pdev->bus; >> + >> + /* Walk up to the root bus to look for PCI Host controller */ >> + while (!pci_is_root_bus(bus)) >> + bus = bus->parent; >> + >> + return of_node_get(bus->bridge->parent->of_node); >> +} > It seems silly that we need to walk the hierachy that way, but I > couldn't find another way to do it I also couldn't, but is it a really problem? This code is only gets called during initialization. > > >> +static struct device_node *xen_dt_get_node(struct device *dev) >> +{ >> + if (dev_is_pci(dev)) >> + return xen_dt_get_pci_host_node(dev); >> + >> + return of_node_get(dev->of_node); >> +} >> + >> +static int xen_dt_map_id(struct device *dev, struct device_node **iommu_np, >> + u32 *sid) >> +{ >> + struct pci_dev *pdev = to_pci_dev(dev); >> + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); >> + struct device_node *host_np; >> + int ret; >> + >> + host_np = xen_dt_get_pci_host_node(dev); >> + if (!host_np) >> + return -ENODEV; >> + >> + ret = of_map_id(host_np, rid, "iommu-map", "iommu-map-mask", iommu_np, sid); >> + of_node_put(host_np); >> + return ret; >> +} >> + >> static bool xen_is_dt_grant_dma_device(struct device *dev) >> { >> - struct device_node *iommu_np; >> + struct device_node *iommu_np = NULL; >> bool has_iommu; >> >> - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >> + if (dev_is_pci(dev)) { >> + if (xen_dt_map_id(dev, &iommu_np, NULL)) >> + return false; >> + } else >> + iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >> + >> has_iommu = iommu_np && >> of_device_is_compatible(iommu_np, "xen,grant-dma"); >> of_node_put(iommu_np); >> @@ -307,9 +351,17 @@ static bool xen_is_dt_grant_dma_device(struct device *dev) >> >> bool xen_is_grant_dma_device(struct device *dev) >> { >> + struct device_node *np; >> + >> /* XXX Handle only DT devices for now */ >> - if (dev->of_node) >> - return xen_is_dt_grant_dma_device(dev); >> + np = xen_dt_get_node(dev); >> + if (np) { >> + bool ret; >> + >> + ret = xen_is_dt_grant_dma_device(dev); >> + of_node_put(np); >> + return ret; >> + } > We don't need to walk the PCI hierachy twice. Maybe we can add the > of_node check directly to xen_is_dt_grant_dma_device? Good point. I was thinking that we would likely need the following construct is the future: if (np) /* DT device */ return xen_is_dt_grant_dma_device(dev); else /* ACPI device */ return xen_is_acpi_grant_dma_device(dev); So, if we use the check directly in xen_is_dt_grant_dma_device() and it returns false we won't be able to recognize a reason then (whether dev is not related to DT, or it is related to DT but it is not a "xen,grant-dma" device). But, I am ok to eliminate one walk right now, then we will see. xen_is_grant_dma_device() will became the following: bool xen_is_grant_dma_device(struct device *dev) { return xen_is_dt_grant_dma_device(dev); } xen_is_dt_grant_dma_device() will need to gain a check that dev->of_node is not a NULL. Shall I? > > >> return false; >> } >> @@ -325,12 +377,19 @@ bool xen_virtio_mem_acc(struct virtio_device *dev) >> static int xen_dt_grant_init_backend_domid(struct device *dev, >> struct xen_grant_dma_data *data) >> { >> - struct of_phandle_args iommu_spec; >> + struct of_phandle_args iommu_spec = { .args_count = 1 }; >> >> - if (of_parse_phandle_with_args(dev->of_node, "iommus", "#iommu-cells", >> - 0, &iommu_spec)) { >> - dev_err(dev, "Cannot parse iommus property\n"); >> - return -ESRCH; >> + if (dev_is_pci(dev)) { >> + if (xen_dt_map_id(dev, &iommu_spec.np, iommu_spec.args)) { >> + dev_err(dev, "Cannot translate ID\n"); >> + return -ESRCH; >> + } >> + } else { >> + if (of_parse_phandle_with_args(dev->of_node, "iommus", "#iommu-cells", >> + 0, &iommu_spec)) { >> + dev_err(dev, "Cannot parse iommus property\n"); >> + return -ESRCH; >> + } >> } >> >> if (!of_device_is_compatible(iommu_spec.np, "xen,grant-dma") || >> @@ -354,6 +413,7 @@ static int xen_dt_grant_init_backend_domid(struct device *dev, >> void xen_grant_setup_dma_ops(struct device *dev) >> { >> struct xen_grant_dma_data *data; >> + struct device_node *np; >> >> data = find_xen_grant_dma_data(dev); >> if (data) { >> @@ -365,8 +425,13 @@ void xen_grant_setup_dma_ops(struct device *dev) >> if (!data) >> goto err; >> >> - if (dev->of_node) { >> - if (xen_dt_grant_init_backend_domid(dev, data)) >> + np = xen_dt_get_node(dev); >> + if (np) { >> + int ret; >> + >> + ret = xen_dt_grant_init_backend_domid(dev, data); >> + of_node_put(np); >> + if (ret) >> goto err; >> } else if (IS_ENABLED(CONFIG_XEN_VIRTIO_FORCE_GRANT)) { >> dev_info(dev, "Using dom0 as backend\n"); >> -- >> 2.25.1 >> -- Regards, Oleksandr Tyshchenko
On 19.10.22 11:47, Xenia Ragiadakou wrote: Hello Xenia > On 10/19/22 03:58, Stefano Stabellini wrote: >> On Sat, 15 Oct 2022, Oleksandr Tyshchenko wrote: >>> From: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >>> >>> Use the same "xen-grant-dma" device concept for the PCI devices >>> behind device-tree based PCI Host controller, but with one >>> modification. >>> Unlike for platform devices, we cannot use generic IOMMU bindings >>> (iommus property), as we need to support more flexible configuration. >>> The problem is that PCI devices under the single PCI Host controller >>> may have the backends running in different Xen domains and thus have >>> different endpoints ID (backend domains ID). >>> >>> So use generic PCI-IOMMU bindings instead (iommu-map/iommu-map-mask >>> properties) which allows us to describe relationship between PCI >>> devices and backend domains ID properly. >>> >>> Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >> >> Now that I understood the approach and the reasons for it, I can review >> the patch :-) >> >> Please add an example of the bindings in the commit message. >> >> >>> --- >>> Slightly RFC. This is needed to support Xen grant mappings for >>> virtio-pci devices >>> on Arm at some point in the future. The Xen toolstack side is not >>> completely ready yet. >>> Here, for PCI devices we use more flexible way to pass backend domid >>> to the guest >>> than for platform devices. >>> >>> Changes V1 -> V2: >>> - update commit description >>> - rebase >>> - rework to use generic PCI-IOMMU bindings instead of generic >>> IOMMU bindings >>> >>> Previous discussion is at: >>> https://urldefense.com/v3/__https://lore.kernel.org/xen-devel/20221006174804.2003029-1-olekstysh@gmail.com/__;!!GF_29dbcQIUBPA!3-vq7Edm3XfKtD5cnNjnOzDQvuo_XrhJ73yH-nPfqOkGGU0IjLG7R7MR_nAJCAPeOutHRLT44wKYwQwz3SauACie_ZAy$ >>> [lore[.]kernel[.]org] >>> >>> Based on: >>> https://urldefense.com/v3/__https://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git/log/?h=for-linus-6.1__;!!GF_29dbcQIUBPA!3-vq7Edm3XfKtD5cnNjnOzDQvuo_XrhJ73yH-nPfqOkGGU0IjLG7R7MR_nAJCAPeOutHRLT44wKYwQwz3SauAEnMDHAq$ >>> [git[.]kernel[.]org] >>> --- >>> drivers/xen/grant-dma-ops.c | 87 >>> ++++++++++++++++++++++++++++++++----- >>> 1 file changed, 76 insertions(+), 11 deletions(-) >>> >>> diff --git a/drivers/xen/grant-dma-ops.c b/drivers/xen/grant-dma-ops.c >>> index daa525df7bdc..b79d9d6ce154 100644 >>> --- a/drivers/xen/grant-dma-ops.c >>> +++ b/drivers/xen/grant-dma-ops.c >>> @@ -10,6 +10,7 @@ >>> #include <linux/module.h> >>> #include <linux/dma-map-ops.h> >>> #include <linux/of.h> >>> +#include <linux/pci.h> >>> #include <linux/pfn.h> >>> #include <linux/xarray.h> >>> #include <linux/virtio_anchor.h> >>> @@ -292,12 +293,55 @@ static const struct dma_map_ops >>> xen_grant_dma_ops = { >>> .dma_supported = xen_grant_dma_supported, >>> }; >>> +static struct device_node *xen_dt_get_pci_host_node(struct device >>> *dev) >>> +{ >>> + struct pci_dev *pdev = to_pci_dev(dev); >>> + struct pci_bus *bus = pdev->bus; >>> + >>> + /* Walk up to the root bus to look for PCI Host controller */ >>> + while (!pci_is_root_bus(bus)) >>> + bus = bus->parent; >>> + >>> + return of_node_get(bus->bridge->parent->of_node); >>> +} >> >> It seems silly that we need to walk the hierachy that way, but I >> couldn't find another way to do it >> >> >>> +static struct device_node *xen_dt_get_node(struct device *dev) >>> +{ >>> + if (dev_is_pci(dev)) >>> + return xen_dt_get_pci_host_node(dev); >>> + >>> + return of_node_get(dev->of_node); >>> +} >>> + >>> +static int xen_dt_map_id(struct device *dev, struct device_node >>> **iommu_np, >>> + u32 *sid) >>> +{ >>> + struct pci_dev *pdev = to_pci_dev(dev); >>> + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); >>> + struct device_node *host_np; >>> + int ret; >>> + >>> + host_np = xen_dt_get_pci_host_node(dev); >>> + if (!host_np) >>> + return -ENODEV; >>> + >>> + ret = of_map_id(host_np, rid, "iommu-map", "iommu-map-mask", >>> iommu_np, sid); >>> + of_node_put(host_np); >>> + return ret; >>> +} >>> + >>> static bool xen_is_dt_grant_dma_device(struct device *dev) >>> { >>> - struct device_node *iommu_np; >>> + struct device_node *iommu_np = NULL; >>> bool has_iommu; >>> - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >>> + if (dev_is_pci(dev)) { >>> + if (xen_dt_map_id(dev, &iommu_np, NULL)) >>> + return false; >>> + } else >>> + iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >>> + >>> has_iommu = iommu_np && >>> of_device_is_compatible(iommu_np, "xen,grant-dma"); >>> of_node_put(iommu_np); >>> @@ -307,9 +351,17 @@ static bool xen_is_dt_grant_dma_device(struct >>> device *dev) >>> bool xen_is_grant_dma_device(struct device *dev) >>> { >>> + struct device_node *np; >>> + >>> /* XXX Handle only DT devices for now */ >>> - if (dev->of_node) >>> - return xen_is_dt_grant_dma_device(dev); >>> + np = xen_dt_get_node(dev); >>> + if (np) { >>> + bool ret; >>> + >>> + ret = xen_is_dt_grant_dma_device(dev); >>> + of_node_put(np); >>> + return ret; >>> + } >> >> We don't need to walk the PCI hierachy twice. Maybe we can add the >> of_node check directly to xen_is_dt_grant_dma_device? >> > > I think in general we could pass directly the host bridge device if > dev_is_pci(dev) (which can be retrieved with > pci_get_host_bridge_device(to_pci_dev(dev), and after done with it > pci_put_host_bridge_device(phb)). > So that, xen_is_dt_grant_dma_device() and > xen_dt_grant_init_backend_domid() won't need to discover it themselves. > This will simplify the code. Good point. I have some remark. Can we use pci_find_host_bridge() instead? This way we don't have to add #include "../pci/pci.h", and have to drop reference afterwards. With that xen_dt_get_pci_host_node() will became the following: static struct device_node *xen_dt_get_pci_host_node(struct device *dev) { struct pci_host_bridge *bridge = pci_find_host_bridge(to_pci_dev(dev)->bus); return of_node_get(bridge->dev.parent->of_node); } With Stefano's suggestion, we won't walk the PCI hierarchy twice when executing xen_is_grant_dma_device() for PCI device: xen_is_grant_dma_device() -> xen_is_dt_grant_dma_device() -> xen_dt_map_id() -> xen_dt_get_pci_host_node() What do you think? > >> >>> return false; >>> } >>> @@ -325,12 +377,19 @@ bool xen_virtio_mem_acc(struct virtio_device >>> *dev) >>> static int xen_dt_grant_init_backend_domid(struct device *dev, >>> struct xen_grant_dma_data *data) >>> { >>> - struct of_phandle_args iommu_spec; >>> + struct of_phandle_args iommu_spec = { .args_count = 1 }; >>> - if (of_parse_phandle_with_args(dev->of_node, "iommus", >>> "#iommu-cells", >>> - 0, &iommu_spec)) { >>> - dev_err(dev, "Cannot parse iommus property\n"); >>> - return -ESRCH; >>> + if (dev_is_pci(dev)) { >>> + if (xen_dt_map_id(dev, &iommu_spec.np, iommu_spec.args)) { >>> + dev_err(dev, "Cannot translate ID\n"); >>> + return -ESRCH; >>> + } >>> + } else { >>> + if (of_parse_phandle_with_args(dev->of_node, "iommus", >>> "#iommu-cells", >>> + 0, &iommu_spec)) { >>> + dev_err(dev, "Cannot parse iommus property\n"); >>> + return -ESRCH; >>> + } >>> } >>> if (!of_device_is_compatible(iommu_spec.np, "xen,grant-dma") || >>> @@ -354,6 +413,7 @@ static int >>> xen_dt_grant_init_backend_domid(struct device *dev, >>> void xen_grant_setup_dma_ops(struct device *dev) >>> { >>> struct xen_grant_dma_data *data; >>> + struct device_node *np; >>> data = find_xen_grant_dma_data(dev); >>> if (data) { >>> @@ -365,8 +425,13 @@ void xen_grant_setup_dma_ops(struct device *dev) >>> if (!data) >>> goto err; >>> - if (dev->of_node) { >>> - if (xen_dt_grant_init_backend_domid(dev, data)) >>> + np = xen_dt_get_node(dev); >>> + if (np) { >>> + int ret; >>> + >>> + ret = xen_dt_grant_init_backend_domid(dev, data); >>> + of_node_put(np); >>> + if (ret) >>> goto err; >>> } else if (IS_ENABLED(CONFIG_XEN_VIRTIO_FORCE_GRANT)) { >>> dev_info(dev, "Using dom0 as backend\n"); >>> -- >>> 2.25.1 >>> >> > -- Regards, Oleksandr Tyshchenko
On Wed, 19 Oct 2022, Oleksandr Tyshchenko wrote: > On 19.10.22 03:58, Stefano Stabellini wrote: > > On Sat, 15 Oct 2022, Oleksandr Tyshchenko wrote: > >> From: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> > >> > >> Use the same "xen-grant-dma" device concept for the PCI devices > >> behind device-tree based PCI Host controller, but with one modification. > >> Unlike for platform devices, we cannot use generic IOMMU bindings > >> (iommus property), as we need to support more flexible configuration. > >> The problem is that PCI devices under the single PCI Host controller > >> may have the backends running in different Xen domains and thus have > >> different endpoints ID (backend domains ID). > >> > >> So use generic PCI-IOMMU bindings instead (iommu-map/iommu-map-mask > >> properties) which allows us to describe relationship between PCI > >> devices and backend domains ID properly. > >> > >> Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> > > Now that I understood the approach and the reasons for it, I can review > > the patch :-) > > perfect, thanks. > > > > > > Please add an example of the bindings in the commit message. > > ok, will do > > > > > > > >> --- > >> Slightly RFC. This is needed to support Xen grant mappings for virtio-pci devices > >> on Arm at some point in the future. The Xen toolstack side is not completely ready yet. > >> Here, for PCI devices we use more flexible way to pass backend domid to the guest > >> than for platform devices. > >> > >> Changes V1 -> V2: > >> - update commit description > >> - rebase > >> - rework to use generic PCI-IOMMU bindings instead of generic IOMMU bindings > >> > >> Previous discussion is at: > >> https://urldefense.com/v3/__https://lore.kernel.org/xen-devel/20221006174804.2003029-1-olekstysh@gmail.com/__;!!GF_29dbcQIUBPA!xJPdZO3-3Wmgo_79HuDsD53RkH_eAN96NmwuwFE7dArt_xNYGdD6LeLsq4B_QPrrvX-x23tJl6jQlNqgyNjgzT2NE3Pqjg$ [lore[.]kernel[.]org] > >> > >> Based on: > >> https://urldefense.com/v3/__https://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git/log/?h=for-linus-6.1__;!!GF_29dbcQIUBPA!xJPdZO3-3Wmgo_79HuDsD53RkH_eAN96NmwuwFE7dArt_xNYGdD6LeLsq4B_QPrrvX-x23tJl6jQlNqgyNjgzT2J40LOxg$ [git[.]kernel[.]org] > >> --- > >> drivers/xen/grant-dma-ops.c | 87 ++++++++++++++++++++++++++++++++----- > >> 1 file changed, 76 insertions(+), 11 deletions(-) > >> > >> diff --git a/drivers/xen/grant-dma-ops.c b/drivers/xen/grant-dma-ops.c > >> index daa525df7bdc..b79d9d6ce154 100644 > >> --- a/drivers/xen/grant-dma-ops.c > >> +++ b/drivers/xen/grant-dma-ops.c > >> @@ -10,6 +10,7 @@ > >> #include <linux/module.h> > >> #include <linux/dma-map-ops.h> > >> #include <linux/of.h> > >> +#include <linux/pci.h> > >> #include <linux/pfn.h> > >> #include <linux/xarray.h> > >> #include <linux/virtio_anchor.h> > >> @@ -292,12 +293,55 @@ static const struct dma_map_ops xen_grant_dma_ops = { > >> .dma_supported = xen_grant_dma_supported, > >> }; > >> > >> +static struct device_node *xen_dt_get_pci_host_node(struct device *dev) > >> +{ > >> + struct pci_dev *pdev = to_pci_dev(dev); > >> + struct pci_bus *bus = pdev->bus; > >> + > >> + /* Walk up to the root bus to look for PCI Host controller */ > >> + while (!pci_is_root_bus(bus)) > >> + bus = bus->parent; > >> + > >> + return of_node_get(bus->bridge->parent->of_node); > >> +} > > It seems silly that we need to walk the hierachy that way, but I > > couldn't find another way to do it > > I also couldn't, but is it a really problem? This code is only gets > called during initialization. > > > > > > > >> +static struct device_node *xen_dt_get_node(struct device *dev) > >> +{ > >> + if (dev_is_pci(dev)) > >> + return xen_dt_get_pci_host_node(dev); > >> + > >> + return of_node_get(dev->of_node); > >> +} > >> + > >> +static int xen_dt_map_id(struct device *dev, struct device_node **iommu_np, > >> + u32 *sid) > >> +{ > >> + struct pci_dev *pdev = to_pci_dev(dev); > >> + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); > >> + struct device_node *host_np; > >> + int ret; > >> + > >> + host_np = xen_dt_get_pci_host_node(dev); > >> + if (!host_np) > >> + return -ENODEV; > >> + > >> + ret = of_map_id(host_np, rid, "iommu-map", "iommu-map-mask", iommu_np, sid); > >> + of_node_put(host_np); > >> + return ret; > >> +} > >> + > >> static bool xen_is_dt_grant_dma_device(struct device *dev) > >> { > >> - struct device_node *iommu_np; > >> + struct device_node *iommu_np = NULL; > >> bool has_iommu; > >> > >> - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); > >> + if (dev_is_pci(dev)) { > >> + if (xen_dt_map_id(dev, &iommu_np, NULL)) > >> + return false; > >> + } else > >> + iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); > >> + > >> has_iommu = iommu_np && > >> of_device_is_compatible(iommu_np, "xen,grant-dma"); > >> of_node_put(iommu_np); > >> @@ -307,9 +351,17 @@ static bool xen_is_dt_grant_dma_device(struct device *dev) > >> > >> bool xen_is_grant_dma_device(struct device *dev) > >> { > >> + struct device_node *np; > >> + > >> /* XXX Handle only DT devices for now */ > >> - if (dev->of_node) > >> - return xen_is_dt_grant_dma_device(dev); > >> + np = xen_dt_get_node(dev); > >> + if (np) { > >> + bool ret; > >> + > >> + ret = xen_is_dt_grant_dma_device(dev); > >> + of_node_put(np); > >> + return ret; > >> + } > > We don't need to walk the PCI hierachy twice. Maybe we can add the > > of_node check directly to xen_is_dt_grant_dma_device? > > > Good point. I was thinking that we would likely need the following > construct is the future: > > > if (np) /* DT device */ > return xen_is_dt_grant_dma_device(dev); > else /* ACPI device */ > return xen_is_acpi_grant_dma_device(dev); > > > So, if we use the check directly in xen_is_dt_grant_dma_device() and it > returns false we won't be able to recognize a reason then > (whether dev is not related to DT, or it is related to DT but it is not > a "xen,grant-dma" device). That problem can easily be solved by having xen_is_dt_grant_dma_device return more than 2 possible values. It could return an int for example, with 3 valid values. > But, I am ok to eliminate one walk right now, then we will see. > > xen_is_grant_dma_device() will became the following: > > bool xen_is_grant_dma_device(struct device *dev) > { > return xen_is_dt_grant_dma_device(dev); > } > > xen_is_dt_grant_dma_device() will need to gain a check that dev->of_node > is not a NULL. > > > Shall I?
On 10/19/22 22:41, Oleksandr Tyshchenko wrote: Hi Oleksandr > > On 19.10.22 11:47, Xenia Ragiadakou wrote: > > Hello Xenia > >> On 10/19/22 03:58, Stefano Stabellini wrote: >>> On Sat, 15 Oct 2022, Oleksandr Tyshchenko wrote: >>>> From: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >>>> >>>> Use the same "xen-grant-dma" device concept for the PCI devices >>>> behind device-tree based PCI Host controller, but with one >>>> modification. >>>> Unlike for platform devices, we cannot use generic IOMMU bindings >>>> (iommus property), as we need to support more flexible configuration. >>>> The problem is that PCI devices under the single PCI Host controller >>>> may have the backends running in different Xen domains and thus have >>>> different endpoints ID (backend domains ID). >>>> >>>> So use generic PCI-IOMMU bindings instead (iommu-map/iommu-map-mask >>>> properties) which allows us to describe relationship between PCI >>>> devices and backend domains ID properly. >>>> >>>> Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >>> >>> Now that I understood the approach and the reasons for it, I can review >>> the patch :-) >>> >>> Please add an example of the bindings in the commit message. >>> >>> >>>> --- >>>> Slightly RFC. This is needed to support Xen grant mappings for >>>> virtio-pci devices >>>> on Arm at some point in the future. The Xen toolstack side is not >>>> completely ready yet. >>>> Here, for PCI devices we use more flexible way to pass backend domid >>>> to the guest >>>> than for platform devices. >>>> >>>> Changes V1 -> V2: >>>> - update commit description >>>> - rebase >>>> - rework to use generic PCI-IOMMU bindings instead of generic >>>> IOMMU bindings >>>> >>>> Previous discussion is at: >>>> https://urldefense.com/v3/__https://lore.kernel.org/xen-devel/20221006174804.2003029-1-olekstysh@gmail.com/__;!!GF_29dbcQIUBPA!3-vq7Edm3XfKtD5cnNjnOzDQvuo_XrhJ73yH-nPfqOkGGU0IjLG7R7MR_nAJCAPeOutHRLT44wKYwQwz3SauACie_ZAy$ >>>> [lore[.]kernel[.]org] >>>> >>>> Based on: >>>> https://urldefense.com/v3/__https://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git/log/?h=for-linus-6.1__;!!GF_29dbcQIUBPA!3-vq7Edm3XfKtD5cnNjnOzDQvuo_XrhJ73yH-nPfqOkGGU0IjLG7R7MR_nAJCAPeOutHRLT44wKYwQwz3SauAEnMDHAq$ >>>> [git[.]kernel[.]org] >>>> --- >>>> drivers/xen/grant-dma-ops.c | 87 >>>> ++++++++++++++++++++++++++++++++----- >>>> 1 file changed, 76 insertions(+), 11 deletions(-) >>>> >>>> diff --git a/drivers/xen/grant-dma-ops.c b/drivers/xen/grant-dma-ops.c >>>> index daa525df7bdc..b79d9d6ce154 100644 >>>> --- a/drivers/xen/grant-dma-ops.c >>>> +++ b/drivers/xen/grant-dma-ops.c >>>> @@ -10,6 +10,7 @@ >>>> #include <linux/module.h> >>>> #include <linux/dma-map-ops.h> >>>> #include <linux/of.h> >>>> +#include <linux/pci.h> >>>> #include <linux/pfn.h> >>>> #include <linux/xarray.h> >>>> #include <linux/virtio_anchor.h> >>>> @@ -292,12 +293,55 @@ static const struct dma_map_ops >>>> xen_grant_dma_ops = { >>>> .dma_supported = xen_grant_dma_supported, >>>> }; >>>> +static struct device_node *xen_dt_get_pci_host_node(struct device >>>> *dev) >>>> +{ >>>> + struct pci_dev *pdev = to_pci_dev(dev); >>>> + struct pci_bus *bus = pdev->bus; >>>> + >>>> + /* Walk up to the root bus to look for PCI Host controller */ >>>> + while (!pci_is_root_bus(bus)) >>>> + bus = bus->parent; >>>> + >>>> + return of_node_get(bus->bridge->parent->of_node); >>>> +} >>> >>> It seems silly that we need to walk the hierachy that way, but I >>> couldn't find another way to do it >>> >>> >>>> +static struct device_node *xen_dt_get_node(struct device *dev) >>>> +{ >>>> + if (dev_is_pci(dev)) >>>> + return xen_dt_get_pci_host_node(dev); >>>> + >>>> + return of_node_get(dev->of_node); >>>> +} >>>> + >>>> +static int xen_dt_map_id(struct device *dev, struct device_node >>>> **iommu_np, >>>> + u32 *sid) >>>> +{ >>>> + struct pci_dev *pdev = to_pci_dev(dev); >>>> + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); >>>> + struct device_node *host_np; >>>> + int ret; >>>> + >>>> + host_np = xen_dt_get_pci_host_node(dev); >>>> + if (!host_np) >>>> + return -ENODEV; >>>> + >>>> + ret = of_map_id(host_np, rid, "iommu-map", "iommu-map-mask", >>>> iommu_np, sid); >>>> + of_node_put(host_np); >>>> + return ret; >>>> +} >>>> + >>>> static bool xen_is_dt_grant_dma_device(struct device *dev) >>>> { >>>> - struct device_node *iommu_np; >>>> + struct device_node *iommu_np = NULL; >>>> bool has_iommu; >>>> - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >>>> + if (dev_is_pci(dev)) { >>>> + if (xen_dt_map_id(dev, &iommu_np, NULL)) >>>> + return false; >>>> + } else >>>> + iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >>>> + >>>> has_iommu = iommu_np && >>>> of_device_is_compatible(iommu_np, "xen,grant-dma"); >>>> of_node_put(iommu_np); >>>> @@ -307,9 +351,17 @@ static bool xen_is_dt_grant_dma_device(struct >>>> device *dev) >>>> bool xen_is_grant_dma_device(struct device *dev) >>>> { >>>> + struct device_node *np; >>>> + >>>> /* XXX Handle only DT devices for now */ >>>> - if (dev->of_node) >>>> - return xen_is_dt_grant_dma_device(dev); >>>> + np = xen_dt_get_node(dev); >>>> + if (np) { >>>> + bool ret; >>>> + >>>> + ret = xen_is_dt_grant_dma_device(dev); >>>> + of_node_put(np); >>>> + return ret; >>>> + } >>> >>> We don't need to walk the PCI hierachy twice. Maybe we can add the >>> of_node check directly to xen_is_dt_grant_dma_device? >>> >> >> I think in general we could pass directly the host bridge device if >> dev_is_pci(dev) (which can be retrieved with >> pci_get_host_bridge_device(to_pci_dev(dev), and after done with it >> pci_put_host_bridge_device(phb)). >> So that, xen_is_dt_grant_dma_device() and >> xen_dt_grant_init_backend_domid() won't need to discover it themselves. >> This will simplify the code. > > > Good point. I have some remark. Can we use pci_find_host_bridge() > instead? This way we don't have to add #include "../pci/pci.h", and have > to drop reference afterwards. > > With that xen_dt_get_pci_host_node() will became the following: > > > static struct device_node *xen_dt_get_pci_host_node(struct device *dev) > { > struct pci_host_bridge *bridge = > pci_find_host_bridge(to_pci_dev(dev)->bus); > > return of_node_get(bridge->dev.parent->of_node); > } > You are right. I prefer your version instead of the above. > > With Stefano's suggestion, we won't walk the PCI hierarchy twice when > executing xen_is_grant_dma_device() for PCI device: > > xen_is_grant_dma_device() -> xen_is_dt_grant_dma_device() -> > xen_dt_map_id() -> xen_dt_get_pci_host_node() > > > What do you think? > I was thinking passing the device_node along with the device in the function arguments. More specifically, of doing this (not tested, just an idea): bool xen_is_grant_dma_device(struct device *dev) { struct device_node *np; bool has_iommu = false; /* XXX Handle only DT devices for now */ np = xen_dt_get_node(dev); if (np) has_iommu = xen_is_dt_grant_dma_device(dev, np); of_node_put(np); return has_iommu; } static bool xen_is_dt_grant_dma_device(struct device *dev, struct device_node *np) { struct device_node *iommu_np = NULL; bool has_iommu; if (dev_is_pci(dev)) { struct pci_dev *pdev = to_pci_dev(dev); u32 id = PCI_DEVID(pdev->bus->number, pdev->devfn); of_map_id(np, id, "iommu-map", "iommu-map-mask", &iommu_np, NULL); } else { iommu_np = of_parse_phandle(np, "iommus", 0); } has_iommu = iommu_np && of_device_is_compatible(iommu_np, "xen,grant-dma"); of_node_put(iommu_np); return has_iommu; } I 'm wondering ... is it possible for the host bridge device node to have the iommus property set? meaning that all of its pci devs will have the same backend? >> >>> >>>> return false; >>>> } >>>> @@ -325,12 +377,19 @@ bool xen_virtio_mem_acc(struct virtio_device >>>> *dev) >>>> static int xen_dt_grant_init_backend_domid(struct device *dev, >>>> struct xen_grant_dma_data *data) >>>> { >>>> - struct of_phandle_args iommu_spec; >>>> + struct of_phandle_args iommu_spec = { .args_count = 1 }; >>>> - if (of_parse_phandle_with_args(dev->of_node, "iommus", >>>> "#iommu-cells", >>>> - 0, &iommu_spec)) { >>>> - dev_err(dev, "Cannot parse iommus property\n"); >>>> - return -ESRCH; >>>> + if (dev_is_pci(dev)) { >>>> + if (xen_dt_map_id(dev, &iommu_spec.np, iommu_spec.args)) { >>>> + dev_err(dev, "Cannot translate ID\n"); >>>> + return -ESRCH; >>>> + } >>>> + } else { >>>> + if (of_parse_phandle_with_args(dev->of_node, "iommus", >>>> "#iommu-cells", >>>> + 0, &iommu_spec)) { >>>> + dev_err(dev, "Cannot parse iommus property\n"); >>>> + return -ESRCH; >>>> + } >>>> } >>>> if (!of_device_is_compatible(iommu_spec.np, "xen,grant-dma") || >>>> @@ -354,6 +413,7 @@ static int >>>> xen_dt_grant_init_backend_domid(struct device *dev, >>>> void xen_grant_setup_dma_ops(struct device *dev) >>>> { >>>> struct xen_grant_dma_data *data; >>>> + struct device_node *np; >>>> data = find_xen_grant_dma_data(dev); >>>> if (data) { >>>> @@ -365,8 +425,13 @@ void xen_grant_setup_dma_ops(struct device *dev) >>>> if (!data) >>>> goto err; >>>> - if (dev->of_node) { >>>> - if (xen_dt_grant_init_backend_domid(dev, data)) >>>> + np = xen_dt_get_node(dev); >>>> + if (np) { >>>> + int ret; >>>> + >>>> + ret = xen_dt_grant_init_backend_domid(dev, data); >>>> + of_node_put(np); >>>> + if (ret) >>>> goto err; >>>> } else if (IS_ENABLED(CONFIG_XEN_VIRTIO_FORCE_GRANT)) { >>>> dev_info(dev, "Using dom0 as backend\n"); >>>> -- >>>> 2.25.1 >>>> >>> >>
On 20.10.22 11:24, Xenia Ragiadakou wrote: > On 10/19/22 22:41, Oleksandr Tyshchenko wrote: > > Hi Oleksandr Hello Xenia > >> >> On 19.10.22 11:47, Xenia Ragiadakou wrote: >> >> Hello Xenia >> >>> On 10/19/22 03:58, Stefano Stabellini wrote: >>>> On Sat, 15 Oct 2022, Oleksandr Tyshchenko wrote: >>>>> From: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >>>>> >>>>> Use the same "xen-grant-dma" device concept for the PCI devices >>>>> behind device-tree based PCI Host controller, but with one >>>>> modification. >>>>> Unlike for platform devices, we cannot use generic IOMMU bindings >>>>> (iommus property), as we need to support more flexible configuration. >>>>> The problem is that PCI devices under the single PCI Host controller >>>>> may have the backends running in different Xen domains and thus have >>>>> different endpoints ID (backend domains ID). >>>>> >>>>> So use generic PCI-IOMMU bindings instead (iommu-map/iommu-map-mask >>>>> properties) which allows us to describe relationship between PCI >>>>> devices and backend domains ID properly. >>>>> >>>>> Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >>>> >>>> Now that I understood the approach and the reasons for it, I can >>>> review >>>> the patch :-) >>>> >>>> Please add an example of the bindings in the commit message. >>>> >>>> >>>>> --- >>>>> Slightly RFC. This is needed to support Xen grant mappings for >>>>> virtio-pci devices >>>>> on Arm at some point in the future. The Xen toolstack side is not >>>>> completely ready yet. >>>>> Here, for PCI devices we use more flexible way to pass backend domid >>>>> to the guest >>>>> than for platform devices. >>>>> >>>>> Changes V1 -> V2: >>>>> - update commit description >>>>> - rebase >>>>> - rework to use generic PCI-IOMMU bindings instead of generic >>>>> IOMMU bindings >>>>> >>>>> Previous discussion is at: >>>>> https://urldefense.com/v3/__https://lore.kernel.org/xen-devel/20221006174804.2003029-1-olekstysh@gmail.com/__;!!GF_29dbcQIUBPA!3-vq7Edm3XfKtD5cnNjnOzDQvuo_XrhJ73yH-nPfqOkGGU0IjLG7R7MR_nAJCAPeOutHRLT44wKYwQwz3SauACie_ZAy$ >>>>> >>>>> [lore[.]kernel[.]org] >>>>> >>>>> Based on: >>>>> https://urldefense.com/v3/__https://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git/log/?h=for-linus-6.1__;!!GF_29dbcQIUBPA!3-vq7Edm3XfKtD5cnNjnOzDQvuo_XrhJ73yH-nPfqOkGGU0IjLG7R7MR_nAJCAPeOutHRLT44wKYwQwz3SauAEnMDHAq$ >>>>> >>>>> [git[.]kernel[.]org] >>>>> --- >>>>> drivers/xen/grant-dma-ops.c | 87 >>>>> ++++++++++++++++++++++++++++++++----- >>>>> 1 file changed, 76 insertions(+), 11 deletions(-) >>>>> >>>>> diff --git a/drivers/xen/grant-dma-ops.c >>>>> b/drivers/xen/grant-dma-ops.c >>>>> index daa525df7bdc..b79d9d6ce154 100644 >>>>> --- a/drivers/xen/grant-dma-ops.c >>>>> +++ b/drivers/xen/grant-dma-ops.c >>>>> @@ -10,6 +10,7 @@ >>>>> #include <linux/module.h> >>>>> #include <linux/dma-map-ops.h> >>>>> #include <linux/of.h> >>>>> +#include <linux/pci.h> >>>>> #include <linux/pfn.h> >>>>> #include <linux/xarray.h> >>>>> #include <linux/virtio_anchor.h> >>>>> @@ -292,12 +293,55 @@ static const struct dma_map_ops >>>>> xen_grant_dma_ops = { >>>>> .dma_supported = xen_grant_dma_supported, >>>>> }; >>>>> +static struct device_node *xen_dt_get_pci_host_node(struct device >>>>> *dev) >>>>> +{ >>>>> + struct pci_dev *pdev = to_pci_dev(dev); >>>>> + struct pci_bus *bus = pdev->bus; >>>>> + >>>>> + /* Walk up to the root bus to look for PCI Host controller */ >>>>> + while (!pci_is_root_bus(bus)) >>>>> + bus = bus->parent; >>>>> + >>>>> + return of_node_get(bus->bridge->parent->of_node); >>>>> +} >>>> >>>> It seems silly that we need to walk the hierachy that way, but I >>>> couldn't find another way to do it >>>> >>>> >>>>> +static struct device_node *xen_dt_get_node(struct device *dev) >>>>> +{ >>>>> + if (dev_is_pci(dev)) >>>>> + return xen_dt_get_pci_host_node(dev); >>>>> + >>>>> + return of_node_get(dev->of_node); >>>>> +} >>>>> + >>>>> +static int xen_dt_map_id(struct device *dev, struct device_node >>>>> **iommu_np, >>>>> + u32 *sid) >>>>> +{ >>>>> + struct pci_dev *pdev = to_pci_dev(dev); >>>>> + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); >>>>> + struct device_node *host_np; >>>>> + int ret; >>>>> + >>>>> + host_np = xen_dt_get_pci_host_node(dev); >>>>> + if (!host_np) >>>>> + return -ENODEV; >>>>> + >>>>> + ret = of_map_id(host_np, rid, "iommu-map", "iommu-map-mask", >>>>> iommu_np, sid); >>>>> + of_node_put(host_np); >>>>> + return ret; >>>>> +} >>>>> + >>>>> static bool xen_is_dt_grant_dma_device(struct device *dev) >>>>> { >>>>> - struct device_node *iommu_np; >>>>> + struct device_node *iommu_np = NULL; >>>>> bool has_iommu; >>>>> - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >>>>> + if (dev_is_pci(dev)) { >>>>> + if (xen_dt_map_id(dev, &iommu_np, NULL)) >>>>> + return false; >>>>> + } else >>>>> + iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >>>>> + >>>>> has_iommu = iommu_np && >>>>> of_device_is_compatible(iommu_np, "xen,grant-dma"); >>>>> of_node_put(iommu_np); >>>>> @@ -307,9 +351,17 @@ static bool xen_is_dt_grant_dma_device(struct >>>>> device *dev) >>>>> bool xen_is_grant_dma_device(struct device *dev) >>>>> { >>>>> + struct device_node *np; >>>>> + >>>>> /* XXX Handle only DT devices for now */ >>>>> - if (dev->of_node) >>>>> - return xen_is_dt_grant_dma_device(dev); >>>>> + np = xen_dt_get_node(dev); >>>>> + if (np) { >>>>> + bool ret; >>>>> + >>>>> + ret = xen_is_dt_grant_dma_device(dev); >>>>> + of_node_put(np); >>>>> + return ret; >>>>> + } >>>> >>>> We don't need to walk the PCI hierachy twice. Maybe we can add the >>>> of_node check directly to xen_is_dt_grant_dma_device? >>>> >>> >>> I think in general we could pass directly the host bridge device if >>> dev_is_pci(dev) (which can be retrieved with >>> pci_get_host_bridge_device(to_pci_dev(dev), and after done with it >>> pci_put_host_bridge_device(phb)). >>> So that, xen_is_dt_grant_dma_device() and >>> xen_dt_grant_init_backend_domid() won't need to discover it themselves. >>> This will simplify the code. >> >> >> Good point. I have some remark. Can we use pci_find_host_bridge() >> instead? This way we don't have to add #include "../pci/pci.h", and have >> to drop reference afterwards. >> >> With that xen_dt_get_pci_host_node() will became the following: >> >> >> static struct device_node *xen_dt_get_pci_host_node(struct device *dev) >> { >> struct pci_host_bridge *bridge = >> pci_find_host_bridge(to_pci_dev(dev)->bus); >> >> return of_node_get(bridge->dev.parent->of_node); >> } >> > > You are right. I prefer your version instead of the above. ok, thanks > > >> >> With Stefano's suggestion, we won't walk the PCI hierarchy twice when >> executing xen_is_grant_dma_device() for PCI device: >> >> xen_is_grant_dma_device() -> xen_is_dt_grant_dma_device() -> >> xen_dt_map_id() -> xen_dt_get_pci_host_node() >> >> >> What do you think? >> > > I was thinking passing the device_node along with the device in the > function arguments. More specifically, of doing this (not tested, just > an idea): > > bool xen_is_grant_dma_device(struct device *dev) > { > struct device_node *np; > bool has_iommu = false; > > /* XXX Handle only DT devices for now */ > np = xen_dt_get_node(dev); > if (np) > has_iommu = xen_is_dt_grant_dma_device(dev, np); > of_node_put(np); > return has_iommu; > } > > static bool xen_is_dt_grant_dma_device(struct device *dev, > struct device_node *np) > { > struct device_node *iommu_np = NULL; > bool has_iommu; > > if (dev_is_pci(dev)) { > struct pci_dev *pdev = to_pci_dev(dev); > u32 id = PCI_DEVID(pdev->bus->number, pdev->devfn); > of_map_id(np, id, "iommu-map", "iommu-map-mask", &iommu_np, > NULL); > } else { > iommu_np = of_parse_phandle(np, "iommus", 0); > } > > has_iommu = iommu_np && of_device_is_compatible(iommu_np, > "xen,grant-dma"); > of_node_put(iommu_np); > > return has_iommu; > } I got it. xen_is_grant_dma_device() for V3 won't call xen_dt_get_node(), but call xen_is_dt_grant_dma_device() directly. static bool xen_is_dt_grant_dma_device(struct device *dev) { struct device_node *iommu_np = NULL; bool has_iommu; if (dev_is_pci(dev)) { if (xen_dt_map_id(dev, &iommu_np, NULL)) return false; } else if (dev->of_node) iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); else return false; has_iommu = iommu_np && of_device_is_compatible(iommu_np, "xen,grant-dma"); of_node_put(iommu_np); return has_iommu; } bool xen_is_grant_dma_device(struct device *dev) { /* XXX Handle only DT devices for now */ return xen_is_dt_grant_dma_device(dev); } > > I 'm wondering ... is it possible for the host bridge device node to > have the iommus property set? meaning that all of its pci devs will > have the same backend? Good question. I think, it is possible... This is technically what V1 is doing. Are you asking because to support "iommus" for PCI devices as well to describe that use-case with all PCI devices having the same endpoint ID (backend ID)? If yes, I think, this could be still described by "iommu-map" property, something like that (if we don't want to describe mapping for each PCI device one-by-one). iommu-map = <0x0 &iommu X 0x1>; iommu-map-mask = <0x0>; where the X is backend ID. It feels to me that it should be written down somewhere that for platform devices we expect "iommus" and for PCI devices we expect "iommu-map/iommu-map-mask" to be present. > > >>> >>>> >>>>> return false; >>>>> } >>>>> @@ -325,12 +377,19 @@ bool xen_virtio_mem_acc(struct virtio_device >>>>> *dev) >>>>> static int xen_dt_grant_init_backend_domid(struct device *dev, >>>>> struct xen_grant_dma_data *data) >>>>> { >>>>> - struct of_phandle_args iommu_spec; >>>>> + struct of_phandle_args iommu_spec = { .args_count = 1 }; >>>>> - if (of_parse_phandle_with_args(dev->of_node, "iommus", >>>>> "#iommu-cells", >>>>> - 0, &iommu_spec)) { >>>>> - dev_err(dev, "Cannot parse iommus property\n"); >>>>> - return -ESRCH; >>>>> + if (dev_is_pci(dev)) { >>>>> + if (xen_dt_map_id(dev, &iommu_spec.np, iommu_spec.args)) { >>>>> + dev_err(dev, "Cannot translate ID\n"); >>>>> + return -ESRCH; >>>>> + } >>>>> + } else { >>>>> + if (of_parse_phandle_with_args(dev->of_node, "iommus", >>>>> "#iommu-cells", >>>>> + 0, &iommu_spec)) { >>>>> + dev_err(dev, "Cannot parse iommus property\n"); >>>>> + return -ESRCH; >>>>> + } >>>>> } >>>>> if (!of_device_is_compatible(iommu_spec.np, >>>>> "xen,grant-dma") || >>>>> @@ -354,6 +413,7 @@ static int >>>>> xen_dt_grant_init_backend_domid(struct device *dev, >>>>> void xen_grant_setup_dma_ops(struct device *dev) >>>>> { >>>>> struct xen_grant_dma_data *data; >>>>> + struct device_node *np; >>>>> data = find_xen_grant_dma_data(dev); >>>>> if (data) { >>>>> @@ -365,8 +425,13 @@ void xen_grant_setup_dma_ops(struct device *dev) >>>>> if (!data) >>>>> goto err; >>>>> - if (dev->of_node) { >>>>> - if (xen_dt_grant_init_backend_domid(dev, data)) >>>>> + np = xen_dt_get_node(dev); >>>>> + if (np) { >>>>> + int ret; >>>>> + >>>>> + ret = xen_dt_grant_init_backend_domid(dev, data); >>>>> + of_node_put(np); >>>>> + if (ret) >>>>> goto err; >>>>> } else if (IS_ENABLED(CONFIG_XEN_VIRTIO_FORCE_GRANT)) { >>>>> dev_info(dev, "Using dom0 as backend\n"); >>>>> -- >>>>> 2.25.1 >>>>> >>>> >>> > -- Regards, Oleksandr Tyshchenko
On 10/20/22 17:12, Oleksandr Tyshchenko wrote: > > On 20.10.22 11:24, Xenia Ragiadakou wrote: >> On 10/19/22 22:41, Oleksandr Tyshchenko wrote: >> >> Hi Oleksandr > > > Hello Xenia > > >> >>> >>> On 19.10.22 11:47, Xenia Ragiadakou wrote: >>> >>> Hello Xenia >>> >>>> On 10/19/22 03:58, Stefano Stabellini wrote: >>>>> On Sat, 15 Oct 2022, Oleksandr Tyshchenko wrote: >>>>>> From: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >>>>>> >>>>>> Use the same "xen-grant-dma" device concept for the PCI devices >>>>>> behind device-tree based PCI Host controller, but with one >>>>>> modification. >>>>>> Unlike for platform devices, we cannot use generic IOMMU bindings >>>>>> (iommus property), as we need to support more flexible configuration. >>>>>> The problem is that PCI devices under the single PCI Host controller >>>>>> may have the backends running in different Xen domains and thus have >>>>>> different endpoints ID (backend domains ID). >>>>>> >>>>>> So use generic PCI-IOMMU bindings instead (iommu-map/iommu-map-mask >>>>>> properties) which allows us to describe relationship between PCI >>>>>> devices and backend domains ID properly. >>>>>> >>>>>> Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >>>>> >>>>> Now that I understood the approach and the reasons for it, I can >>>>> review >>>>> the patch :-) >>>>> >>>>> Please add an example of the bindings in the commit message. >>>>> >>>>> >>>>>> --- >>>>>> Slightly RFC. This is needed to support Xen grant mappings for >>>>>> virtio-pci devices >>>>>> on Arm at some point in the future. The Xen toolstack side is not >>>>>> completely ready yet. >>>>>> Here, for PCI devices we use more flexible way to pass backend domid >>>>>> to the guest >>>>>> than for platform devices. >>>>>> >>>>>> Changes V1 -> V2: >>>>>> - update commit description >>>>>> - rebase >>>>>> - rework to use generic PCI-IOMMU bindings instead of generic >>>>>> IOMMU bindings >>>>>> >>>>>> Previous discussion is at: >>>>>> https://urldefense.com/v3/__https://lore.kernel.org/xen-devel/20221006174804.2003029-1-olekstysh@gmail.com/__;!!GF_29dbcQIUBPA!3-vq7Edm3XfKtD5cnNjnOzDQvuo_XrhJ73yH-nPfqOkGGU0IjLG7R7MR_nAJCAPeOutHRLT44wKYwQwz3SauACie_ZAy$ >>>>>> >>>>>> [lore[.]kernel[.]org] >>>>>> >>>>>> Based on: >>>>>> https://urldefense.com/v3/__https://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git/log/?h=for-linus-6.1__;!!GF_29dbcQIUBPA!3-vq7Edm3XfKtD5cnNjnOzDQvuo_XrhJ73yH-nPfqOkGGU0IjLG7R7MR_nAJCAPeOutHRLT44wKYwQwz3SauAEnMDHAq$ >>>>>> >>>>>> [git[.]kernel[.]org] >>>>>> --- >>>>>> drivers/xen/grant-dma-ops.c | 87 >>>>>> ++++++++++++++++++++++++++++++++----- >>>>>> 1 file changed, 76 insertions(+), 11 deletions(-) >>>>>> >>>>>> diff --git a/drivers/xen/grant-dma-ops.c >>>>>> b/drivers/xen/grant-dma-ops.c >>>>>> index daa525df7bdc..b79d9d6ce154 100644 >>>>>> --- a/drivers/xen/grant-dma-ops.c >>>>>> +++ b/drivers/xen/grant-dma-ops.c >>>>>> @@ -10,6 +10,7 @@ >>>>>> #include <linux/module.h> >>>>>> #include <linux/dma-map-ops.h> >>>>>> #include <linux/of.h> >>>>>> +#include <linux/pci.h> >>>>>> #include <linux/pfn.h> >>>>>> #include <linux/xarray.h> >>>>>> #include <linux/virtio_anchor.h> >>>>>> @@ -292,12 +293,55 @@ static const struct dma_map_ops >>>>>> xen_grant_dma_ops = { >>>>>> .dma_supported = xen_grant_dma_supported, >>>>>> }; >>>>>> +static struct device_node *xen_dt_get_pci_host_node(struct device >>>>>> *dev) >>>>>> +{ >>>>>> + struct pci_dev *pdev = to_pci_dev(dev); >>>>>> + struct pci_bus *bus = pdev->bus; >>>>>> + >>>>>> + /* Walk up to the root bus to look for PCI Host controller */ >>>>>> + while (!pci_is_root_bus(bus)) >>>>>> + bus = bus->parent; >>>>>> + >>>>>> + return of_node_get(bus->bridge->parent->of_node); >>>>>> +} >>>>> >>>>> It seems silly that we need to walk the hierachy that way, but I >>>>> couldn't find another way to do it >>>>> >>>>> >>>>>> +static struct device_node *xen_dt_get_node(struct device *dev) >>>>>> +{ >>>>>> + if (dev_is_pci(dev)) >>>>>> + return xen_dt_get_pci_host_node(dev); >>>>>> + >>>>>> + return of_node_get(dev->of_node); >>>>>> +} >>>>>> + >>>>>> +static int xen_dt_map_id(struct device *dev, struct device_node >>>>>> **iommu_np, >>>>>> + u32 *sid) >>>>>> +{ >>>>>> + struct pci_dev *pdev = to_pci_dev(dev); >>>>>> + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); >>>>>> + struct device_node *host_np; >>>>>> + int ret; >>>>>> + >>>>>> + host_np = xen_dt_get_pci_host_node(dev); >>>>>> + if (!host_np) >>>>>> + return -ENODEV; >>>>>> + >>>>>> + ret = of_map_id(host_np, rid, "iommu-map", "iommu-map-mask", >>>>>> iommu_np, sid); >>>>>> + of_node_put(host_np); >>>>>> + return ret; >>>>>> +} >>>>>> + >>>>>> static bool xen_is_dt_grant_dma_device(struct device *dev) >>>>>> { >>>>>> - struct device_node *iommu_np; >>>>>> + struct device_node *iommu_np = NULL; >>>>>> bool has_iommu; >>>>>> - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >>>>>> + if (dev_is_pci(dev)) { >>>>>> + if (xen_dt_map_id(dev, &iommu_np, NULL)) >>>>>> + return false; >>>>>> + } else >>>>>> + iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >>>>>> + >>>>>> has_iommu = iommu_np && >>>>>> of_device_is_compatible(iommu_np, "xen,grant-dma"); >>>>>> of_node_put(iommu_np); >>>>>> @@ -307,9 +351,17 @@ static bool xen_is_dt_grant_dma_device(struct >>>>>> device *dev) >>>>>> bool xen_is_grant_dma_device(struct device *dev) >>>>>> { >>>>>> + struct device_node *np; >>>>>> + >>>>>> /* XXX Handle only DT devices for now */ >>>>>> - if (dev->of_node) >>>>>> - return xen_is_dt_grant_dma_device(dev); >>>>>> + np = xen_dt_get_node(dev); >>>>>> + if (np) { >>>>>> + bool ret; >>>>>> + >>>>>> + ret = xen_is_dt_grant_dma_device(dev); >>>>>> + of_node_put(np); >>>>>> + return ret; >>>>>> + } >>>>> >>>>> We don't need to walk the PCI hierachy twice. Maybe we can add the >>>>> of_node check directly to xen_is_dt_grant_dma_device? >>>>> >>>> >>>> I think in general we could pass directly the host bridge device if >>>> dev_is_pci(dev) (which can be retrieved with >>>> pci_get_host_bridge_device(to_pci_dev(dev), and after done with it >>>> pci_put_host_bridge_device(phb)). >>>> So that, xen_is_dt_grant_dma_device() and >>>> xen_dt_grant_init_backend_domid() won't need to discover it themselves. >>>> This will simplify the code. >>> >>> >>> Good point. I have some remark. Can we use pci_find_host_bridge() >>> instead? This way we don't have to add #include "../pci/pci.h", and have >>> to drop reference afterwards. >>> >>> With that xen_dt_get_pci_host_node() will became the following: >>> >>> >>> static struct device_node *xen_dt_get_pci_host_node(struct device *dev) >>> { >>> struct pci_host_bridge *bridge = >>> pci_find_host_bridge(to_pci_dev(dev)->bus); >>> >>> return of_node_get(bridge->dev.parent->of_node); >>> } >>> >> >> You are right. I prefer your version instead of the above. > > > ok, thanks > > >> >> >>> >>> With Stefano's suggestion, we won't walk the PCI hierarchy twice when >>> executing xen_is_grant_dma_device() for PCI device: >>> >>> xen_is_grant_dma_device() -> xen_is_dt_grant_dma_device() -> >>> xen_dt_map_id() -> xen_dt_get_pci_host_node() >>> >>> >>> What do you think? >>> >> >> I was thinking passing the device_node along with the device in the >> function arguments. More specifically, of doing this (not tested, just >> an idea): >> >> bool xen_is_grant_dma_device(struct device *dev) >> { >> struct device_node *np; >> bool has_iommu = false; >> >> /* XXX Handle only DT devices for now */ >> np = xen_dt_get_node(dev); >> if (np) >> has_iommu = xen_is_dt_grant_dma_device(dev, np); >> of_node_put(np); >> return has_iommu; >> } >> >> static bool xen_is_dt_grant_dma_device(struct device *dev, >> struct device_node *np) >> { >> struct device_node *iommu_np = NULL; >> bool has_iommu; >> >> if (dev_is_pci(dev)) { >> struct pci_dev *pdev = to_pci_dev(dev); >> u32 id = PCI_DEVID(pdev->bus->number, pdev->devfn); >> of_map_id(np, id, "iommu-map", "iommu-map-mask", &iommu_np, >> NULL); >> } else { >> iommu_np = of_parse_phandle(np, "iommus", 0); >> } >> >> has_iommu = iommu_np && of_device_is_compatible(iommu_np, >> "xen,grant-dma"); >> of_node_put(iommu_np); >> >> return has_iommu; >> } > > > I got it. > > xen_is_grant_dma_device() for V3 won't call xen_dt_get_node(), but call > xen_is_dt_grant_dma_device() directly. > > static bool xen_is_dt_grant_dma_device(struct device *dev) > { > struct device_node *iommu_np = NULL; > bool has_iommu; > > if (dev_is_pci(dev)) { > if (xen_dt_map_id(dev, &iommu_np, NULL)) > return false; > } else if (dev->of_node) > iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); > else > return false; > > has_iommu = iommu_np && > of_device_is_compatible(iommu_np, "xen,grant-dma"); > of_node_put(iommu_np); > > return has_iommu; > } > > bool xen_is_grant_dma_device(struct device *dev) > { > /* XXX Handle only DT devices for now */ > return xen_is_dt_grant_dma_device(dev); > } > > Ok. One difference, that I see from the previous, is that here you don't use the dynamic interface when you access the dev->of_node (of_node_get/of_node_put). Before, this was guarded through the external xen_dt_get_node(). I suspect that the same needs to be done for the function xen_grant_setup_dma_ops(). There, also, the code walks up to the root bus twice. >> >> I 'm wondering ... is it possible for the host bridge device node to >> have the iommus property set? meaning that all of its pci devs will >> have the same backend? > > Good question. I think, it is possible... This is technically what V1 is > doing. > > > Are you asking because to support "iommus" for PCI devices as well to > describe that use-case with all PCI devices having the same endpoint ID > (backend ID)? > If yes, I think, this could be still described by "iommu-map" property, > something like that (if we don't want to describe mapping for each PCI > device one-by-one). > > iommu-map = <0x0 &iommu X 0x1>; > > iommu-map-mask = <0x0>; > > where the X is backend ID. > > > It feels to me that it should be written down somewhere that for > platform devices we expect "iommus" and for PCI devices we expect > "iommu-map/iommu-map-mask" to be present. Thanks for the clarification, now I got it. Yes I agree. >> >> >>>> >>>>> >>>>>> return false; >>>>>> } >>>>>> @@ -325,12 +377,19 @@ bool xen_virtio_mem_acc(struct virtio_device >>>>>> *dev) >>>>>> static int xen_dt_grant_init_backend_domid(struct device *dev, >>>>>> struct xen_grant_dma_data *data) >>>>>> { >>>>>> - struct of_phandle_args iommu_spec; >>>>>> + struct of_phandle_args iommu_spec = { .args_count = 1 }; >>>>>> - if (of_parse_phandle_with_args(dev->of_node, "iommus", >>>>>> "#iommu-cells", >>>>>> - 0, &iommu_spec)) { >>>>>> - dev_err(dev, "Cannot parse iommus property\n"); >>>>>> - return -ESRCH; >>>>>> + if (dev_is_pci(dev)) { >>>>>> + if (xen_dt_map_id(dev, &iommu_spec.np, iommu_spec.args)) { >>>>>> + dev_err(dev, "Cannot translate ID\n"); >>>>>> + return -ESRCH; >>>>>> + } >>>>>> + } else { >>>>>> + if (of_parse_phandle_with_args(dev->of_node, "iommus", >>>>>> "#iommu-cells", >>>>>> + 0, &iommu_spec)) { >>>>>> + dev_err(dev, "Cannot parse iommus property\n"); >>>>>> + return -ESRCH; >>>>>> + } >>>>>> } >>>>>> if (!of_device_is_compatible(iommu_spec.np, >>>>>> "xen,grant-dma") || >>>>>> @@ -354,6 +413,7 @@ static int >>>>>> xen_dt_grant_init_backend_domid(struct device *dev, >>>>>> void xen_grant_setup_dma_ops(struct device *dev) >>>>>> { >>>>>> struct xen_grant_dma_data *data; >>>>>> + struct device_node *np; >>>>>> data = find_xen_grant_dma_data(dev); >>>>>> if (data) { >>>>>> @@ -365,8 +425,13 @@ void xen_grant_setup_dma_ops(struct device *dev) >>>>>> if (!data) >>>>>> goto err; >>>>>> - if (dev->of_node) { >>>>>> - if (xen_dt_grant_init_backend_domid(dev, data)) >>>>>> + np = xen_dt_get_node(dev); >>>>>> + if (np) { >>>>>> + int ret; >>>>>> + >>>>>> + ret = xen_dt_grant_init_backend_domid(dev, data); >>>>>> + of_node_put(np); >>>>>> + if (ret) >>>>>> goto err; >>>>>> } else if (IS_ENABLED(CONFIG_XEN_VIRTIO_FORCE_GRANT)) { >>>>>> dev_info(dev, "Using dom0 as backend\n"); >>>>>> -- >>>>>> 2.25.1 >>>>>> >>>>> >>>> >>
On 20.10.22 21:11, Xenia Ragiadakou wrote: Hello Xenia > On 10/20/22 17:12, Oleksandr Tyshchenko wrote: >> >> On 20.10.22 11:24, Xenia Ragiadakou wrote: >>> On 10/19/22 22:41, Oleksandr Tyshchenko wrote: >>> >>> Hi Oleksandr >> >> >> Hello Xenia >> >> >>> >>>> >>>> On 19.10.22 11:47, Xenia Ragiadakou wrote: >>>> >>>> Hello Xenia >>>> >>>>> On 10/19/22 03:58, Stefano Stabellini wrote: >>>>>> On Sat, 15 Oct 2022, Oleksandr Tyshchenko wrote: >>>>>>> From: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >>>>>>> >>>>>>> Use the same "xen-grant-dma" device concept for the PCI devices >>>>>>> behind device-tree based PCI Host controller, but with one >>>>>>> modification. >>>>>>> Unlike for platform devices, we cannot use generic IOMMU bindings >>>>>>> (iommus property), as we need to support more flexible >>>>>>> configuration. >>>>>>> The problem is that PCI devices under the single PCI Host >>>>>>> controller >>>>>>> may have the backends running in different Xen domains and thus >>>>>>> have >>>>>>> different endpoints ID (backend domains ID). >>>>>>> >>>>>>> So use generic PCI-IOMMU bindings instead (iommu-map/iommu-map-mask >>>>>>> properties) which allows us to describe relationship between PCI >>>>>>> devices and backend domains ID properly. >>>>>>> >>>>>>> Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >>>>>> >>>>>> Now that I understood the approach and the reasons for it, I can >>>>>> review >>>>>> the patch :-) >>>>>> >>>>>> Please add an example of the bindings in the commit message. >>>>>> >>>>>> >>>>>>> --- >>>>>>> Slightly RFC. This is needed to support Xen grant mappings for >>>>>>> virtio-pci devices >>>>>>> on Arm at some point in the future. The Xen toolstack side is not >>>>>>> completely ready yet. >>>>>>> Here, for PCI devices we use more flexible way to pass backend >>>>>>> domid >>>>>>> to the guest >>>>>>> than for platform devices. >>>>>>> >>>>>>> Changes V1 -> V2: >>>>>>> - update commit description >>>>>>> - rebase >>>>>>> - rework to use generic PCI-IOMMU bindings instead of generic >>>>>>> IOMMU bindings >>>>>>> >>>>>>> Previous discussion is at: >>>>>>> https://urldefense.com/v3/__https://lore.kernel.org/xen-devel/20221006174804.2003029-1-olekstysh@gmail.com/__;!!GF_29dbcQIUBPA!3-vq7Edm3XfKtD5cnNjnOzDQvuo_XrhJ73yH-nPfqOkGGU0IjLG7R7MR_nAJCAPeOutHRLT44wKYwQwz3SauACie_ZAy$ >>>>>>> >>>>>>> >>>>>>> [lore[.]kernel[.]org] >>>>>>> >>>>>>> Based on: >>>>>>> https://urldefense.com/v3/__https://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git/log/?h=for-linus-6.1__;!!GF_29dbcQIUBPA!3-vq7Edm3XfKtD5cnNjnOzDQvuo_XrhJ73yH-nPfqOkGGU0IjLG7R7MR_nAJCAPeOutHRLT44wKYwQwz3SauAEnMDHAq$ >>>>>>> >>>>>>> >>>>>>> [git[.]kernel[.]org] >>>>>>> --- >>>>>>> drivers/xen/grant-dma-ops.c | 87 >>>>>>> ++++++++++++++++++++++++++++++++----- >>>>>>> 1 file changed, 76 insertions(+), 11 deletions(-) >>>>>>> >>>>>>> diff --git a/drivers/xen/grant-dma-ops.c >>>>>>> b/drivers/xen/grant-dma-ops.c >>>>>>> index daa525df7bdc..b79d9d6ce154 100644 >>>>>>> --- a/drivers/xen/grant-dma-ops.c >>>>>>> +++ b/drivers/xen/grant-dma-ops.c >>>>>>> @@ -10,6 +10,7 @@ >>>>>>> #include <linux/module.h> >>>>>>> #include <linux/dma-map-ops.h> >>>>>>> #include <linux/of.h> >>>>>>> +#include <linux/pci.h> >>>>>>> #include <linux/pfn.h> >>>>>>> #include <linux/xarray.h> >>>>>>> #include <linux/virtio_anchor.h> >>>>>>> @@ -292,12 +293,55 @@ static const struct dma_map_ops >>>>>>> xen_grant_dma_ops = { >>>>>>> .dma_supported = xen_grant_dma_supported, >>>>>>> }; >>>>>>> +static struct device_node *xen_dt_get_pci_host_node(struct >>>>>>> device >>>>>>> *dev) >>>>>>> +{ >>>>>>> + struct pci_dev *pdev = to_pci_dev(dev); >>>>>>> + struct pci_bus *bus = pdev->bus; >>>>>>> + >>>>>>> + /* Walk up to the root bus to look for PCI Host controller */ >>>>>>> + while (!pci_is_root_bus(bus)) >>>>>>> + bus = bus->parent; >>>>>>> + >>>>>>> + return of_node_get(bus->bridge->parent->of_node); >>>>>>> +} >>>>>> >>>>>> It seems silly that we need to walk the hierachy that way, but I >>>>>> couldn't find another way to do it >>>>>> >>>>>> >>>>>>> +static struct device_node *xen_dt_get_node(struct device *dev) >>>>>>> +{ >>>>>>> + if (dev_is_pci(dev)) >>>>>>> + return xen_dt_get_pci_host_node(dev); >>>>>>> + >>>>>>> + return of_node_get(dev->of_node); >>>>>>> +} >>>>>>> + >>>>>>> +static int xen_dt_map_id(struct device *dev, struct device_node >>>>>>> **iommu_np, >>>>>>> + u32 *sid) >>>>>>> +{ >>>>>>> + struct pci_dev *pdev = to_pci_dev(dev); >>>>>>> + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); >>>>>>> + struct device_node *host_np; >>>>>>> + int ret; >>>>>>> + >>>>>>> + host_np = xen_dt_get_pci_host_node(dev); >>>>>>> + if (!host_np) >>>>>>> + return -ENODEV; >>>>>>> + >>>>>>> + ret = of_map_id(host_np, rid, "iommu-map", "iommu-map-mask", >>>>>>> iommu_np, sid); >>>>>>> + of_node_put(host_np); >>>>>>> + return ret; >>>>>>> +} >>>>>>> + >>>>>>> static bool xen_is_dt_grant_dma_device(struct device *dev) >>>>>>> { >>>>>>> - struct device_node *iommu_np; >>>>>>> + struct device_node *iommu_np = NULL; >>>>>>> bool has_iommu; >>>>>>> - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >>>>>>> + if (dev_is_pci(dev)) { >>>>>>> + if (xen_dt_map_id(dev, &iommu_np, NULL)) >>>>>>> + return false; >>>>>>> + } else >>>>>>> + iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >>>>>>> + >>>>>>> has_iommu = iommu_np && >>>>>>> of_device_is_compatible(iommu_np, "xen,grant-dma"); >>>>>>> of_node_put(iommu_np); >>>>>>> @@ -307,9 +351,17 @@ static bool xen_is_dt_grant_dma_device(struct >>>>>>> device *dev) >>>>>>> bool xen_is_grant_dma_device(struct device *dev) >>>>>>> { >>>>>>> + struct device_node *np; >>>>>>> + >>>>>>> /* XXX Handle only DT devices for now */ >>>>>>> - if (dev->of_node) >>>>>>> - return xen_is_dt_grant_dma_device(dev); >>>>>>> + np = xen_dt_get_node(dev); >>>>>>> + if (np) { >>>>>>> + bool ret; >>>>>>> + >>>>>>> + ret = xen_is_dt_grant_dma_device(dev); >>>>>>> + of_node_put(np); >>>>>>> + return ret; >>>>>>> + } >>>>>> >>>>>> We don't need to walk the PCI hierachy twice. Maybe we can add the >>>>>> of_node check directly to xen_is_dt_grant_dma_device? >>>>>> >>>>> >>>>> I think in general we could pass directly the host bridge device if >>>>> dev_is_pci(dev) (which can be retrieved with >>>>> pci_get_host_bridge_device(to_pci_dev(dev), and after done with it >>>>> pci_put_host_bridge_device(phb)). >>>>> So that, xen_is_dt_grant_dma_device() and >>>>> xen_dt_grant_init_backend_domid() won't need to discover it >>>>> themselves. >>>>> This will simplify the code. >>>> >>>> >>>> Good point. I have some remark. Can we use pci_find_host_bridge() >>>> instead? This way we don't have to add #include "../pci/pci.h", and >>>> have >>>> to drop reference afterwards. >>>> >>>> With that xen_dt_get_pci_host_node() will became the following: >>>> >>>> >>>> static struct device_node *xen_dt_get_pci_host_node(struct device >>>> *dev) >>>> { >>>> struct pci_host_bridge *bridge = >>>> pci_find_host_bridge(to_pci_dev(dev)->bus); >>>> >>>> return of_node_get(bridge->dev.parent->of_node); >>>> } >>>> >>> >>> You are right. I prefer your version instead of the above. >> >> >> ok, thanks >> >> >>> >>> >>>> >>>> With Stefano's suggestion, we won't walk the PCI hierarchy twice when >>>> executing xen_is_grant_dma_device() for PCI device: >>>> >>>> xen_is_grant_dma_device() -> xen_is_dt_grant_dma_device() -> >>>> xen_dt_map_id() -> xen_dt_get_pci_host_node() >>>> >>>> >>>> What do you think? >>>> >>> >>> I was thinking passing the device_node along with the device in the >>> function arguments. More specifically, of doing this (not tested, just >>> an idea): >>> >>> bool xen_is_grant_dma_device(struct device *dev) >>> { >>> struct device_node *np; >>> bool has_iommu = false; >>> >>> /* XXX Handle only DT devices for now */ >>> np = xen_dt_get_node(dev); >>> if (np) >>> has_iommu = xen_is_dt_grant_dma_device(dev, np); >>> of_node_put(np); >>> return has_iommu; >>> } >>> >>> static bool xen_is_dt_grant_dma_device(struct device *dev, >>> struct device_node *np) >>> { >>> struct device_node *iommu_np = NULL; >>> bool has_iommu; >>> >>> if (dev_is_pci(dev)) { >>> struct pci_dev *pdev = to_pci_dev(dev); >>> u32 id = PCI_DEVID(pdev->bus->number, pdev->devfn); >>> of_map_id(np, id, "iommu-map", "iommu-map-mask", &iommu_np, >>> NULL); >>> } else { >>> iommu_np = of_parse_phandle(np, "iommus", 0); >>> } >>> >>> has_iommu = iommu_np && of_device_is_compatible(iommu_np, >>> "xen,grant-dma"); >>> of_node_put(iommu_np); >>> >>> return has_iommu; >>> } >> >> >> I got it. >> >> xen_is_grant_dma_device() for V3 won't call xen_dt_get_node(), but call >> xen_is_dt_grant_dma_device() directly. >> >> static bool xen_is_dt_grant_dma_device(struct device *dev) >> { >> struct device_node *iommu_np = NULL; >> bool has_iommu; >> >> if (dev_is_pci(dev)) { >> if (xen_dt_map_id(dev, &iommu_np, NULL)) >> return false; >> } else if (dev->of_node) >> iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >> else >> return false; >> >> has_iommu = iommu_np && >> of_device_is_compatible(iommu_np, "xen,grant-dma"); >> of_node_put(iommu_np); >> >> return has_iommu; >> } >> >> bool xen_is_grant_dma_device(struct device *dev) >> { >> /* XXX Handle only DT devices for now */ >> return xen_is_dt_grant_dma_device(dev); >> } >> >> > > Ok. One difference, that I see from the previous, is that here you > don't use the dynamic interface when you access the dev->of_node > (of_node_get/of_node_put). Before, this was guarded through the > external xen_dt_get_node(). > > I suspect that the same needs to be done for the function > xen_grant_setup_dma_ops(). There, also, the code walks up to the root > bus twice. Hmm, xen_dt_grant_init_backend_domid() should only be called if we deal with device-tree based device. I think you are completely right, thanks! In order to address both your comments, I think I need to rework the code (taking into the account your example with xen_is_dt_grant_dma_device() provided a few letters ago and extrapolate this example to xen_dt_grant_init_backend_domid()). Below the patch (not tested) which seems to address both your comments (also I dropped xen_dt_map_id() and squashed xen_dt_get_pci_host_node() with xen_dt_get_node()). diff --git a/drivers/xen/grant-dma-ops.c b/drivers/xen/grant-dma-ops.c index daa525df7bdc..dae24dbd2ef7 100644 --- a/drivers/xen/grant-dma-ops.c +++ b/drivers/xen/grant-dma-ops.c @@ -10,6 +10,7 @@ #include <linux/module.h> #include <linux/dma-map-ops.h> #include <linux/of.h> +#include <linux/pci.h> #include <linux/pfn.h> #include <linux/xarray.h> #include <linux/virtio_anchor.h> @@ -292,12 +293,33 @@ static const struct dma_map_ops xen_grant_dma_ops = { .dma_supported = xen_grant_dma_supported, }; -static bool xen_is_dt_grant_dma_device(struct device *dev) +static struct device_node *xen_dt_get_node(struct device *dev) { - struct device_node *iommu_np; + if (dev_is_pci(dev)) { + struct pci_dev *pdev = to_pci_dev(dev); + struct pci_host_bridge *bridge = pci_find_host_bridge(pdev->bus); + + return of_node_get(bridge->dev.parent->of_node); + } + + return of_node_get(dev->of_node); +} + +static bool xen_is_dt_grant_dma_device(struct device *dev, + struct device_node *np) +{ + struct device_node *iommu_np = NULL; bool has_iommu; - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); + if (dev_is_pci(dev)) { + struct pci_dev *pdev = to_pci_dev(dev); + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); + + if (of_map_id(np, rid, "iommu-map", "iommu-map-mask", &iommu_np, NULL)) + return false; + } else + iommu_np = of_parse_phandle(np, "iommus", 0); + has_iommu = iommu_np && of_device_is_compatible(iommu_np, "xen,grant-dma"); of_node_put(iommu_np); @@ -307,9 +329,17 @@ static bool xen_is_dt_grant_dma_device(struct device *dev) bool xen_is_grant_dma_device(struct device *dev) { + struct device_node *np; + /* XXX Handle only DT devices for now */ - if (dev->of_node) - return xen_is_dt_grant_dma_device(dev); + np = xen_dt_get_node(dev); + if (np) { + bool ret; + + ret = xen_is_dt_grant_dma_device(dev, np); + of_node_put(np); + return ret; + } return false; } @@ -323,14 +353,26 @@ bool xen_virtio_mem_acc(struct virtio_device *dev) } static int xen_dt_grant_init_backend_domid(struct device *dev, + struct device_node *np, struct xen_grant_dma_data *data) { - struct of_phandle_args iommu_spec; + struct of_phandle_args iommu_spec = { .args_count = 1 }; - if (of_parse_phandle_with_args(dev->of_node, "iommus", "#iommu-cells", - 0, &iommu_spec)) { - dev_err(dev, "Cannot parse iommus property\n"); - return -ESRCH; + if (dev_is_pci(dev)) { + struct pci_dev *pdev = to_pci_dev(dev); + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); + + if (of_map_id(np, rid, "iommu-map", "iommu-map-mask", &iommu_spec.np, + iommu_spec.args)) { + dev_err(dev, "Cannot translate ID\n"); + return -ESRCH; + } + } else { + if (of_parse_phandle_with_args(np, "iommus", "#iommu-cells", + 0, &iommu_spec)) { + dev_err(dev, "Cannot parse iommus property\n"); + return -ESRCH; + } } if (!of_device_is_compatible(iommu_spec.np, "xen,grant-dma") || @@ -354,6 +396,7 @@ static int xen_dt_grant_init_backend_domid(struct device *dev, void xen_grant_setup_dma_ops(struct device *dev) { struct xen_grant_dma_data *data; + struct device_node *np; data = find_xen_grant_dma_data(dev); if (data) { @@ -365,8 +408,13 @@ void xen_grant_setup_dma_ops(struct device *dev) if (!data) goto err; - if (dev->of_node) { - if (xen_dt_grant_init_backend_domid(dev, data)) + np = xen_dt_get_node(dev); + if (np) { + int ret; + + ret = xen_dt_grant_init_backend_domid(dev, np, data); + of_node_put(np); + if (ret) goto err; } else if (IS_ENABLED(CONFIG_XEN_VIRTIO_FORCE_GRANT)) { dev_info(dev, "Using dom0 as backend\n"); Does it look ok now? > > >>> >>> I 'm wondering ... is it possible for the host bridge device node to >>> have the iommus property set? meaning that all of its pci devs will >>> have the same backend? >> >> Good question. I think, it is possible... This is technically what V1 is >> doing. >> >> >> Are you asking because to support "iommus" for PCI devices as well to >> describe that use-case with all PCI devices having the same endpoint ID >> (backend ID)? >> If yes, I think, this could be still described by "iommu-map" property, >> something like that (if we don't want to describe mapping for each PCI >> device one-by-one). >> >> iommu-map = <0x0 &iommu X 0x1>; >> >> iommu-map-mask = <0x0>; >> >> where the X is backend ID. >> >> >> It feels to me that it should be written down somewhere that for >> platform devices we expect "iommus" and for PCI devices we expect >> "iommu-map/iommu-map-mask" to be present. > > Thanks for the clarification, now I got it. Yes I agree. ok, good > >>> >>> >>>>> >>>>>> >>>>>>> return false; >>>>>>> } >>>>>>> @@ -325,12 +377,19 @@ bool xen_virtio_mem_acc(struct virtio_device >>>>>>> *dev) >>>>>>> static int xen_dt_grant_init_backend_domid(struct device *dev, >>>>>>> struct xen_grant_dma_data *data) >>>>>>> { >>>>>>> - struct of_phandle_args iommu_spec; >>>>>>> + struct of_phandle_args iommu_spec = { .args_count = 1 }; >>>>>>> - if (of_parse_phandle_with_args(dev->of_node, "iommus", >>>>>>> "#iommu-cells", >>>>>>> - 0, &iommu_spec)) { >>>>>>> - dev_err(dev, "Cannot parse iommus property\n"); >>>>>>> - return -ESRCH; >>>>>>> + if (dev_is_pci(dev)) { >>>>>>> + if (xen_dt_map_id(dev, &iommu_spec.np, iommu_spec.args)) { >>>>>>> + dev_err(dev, "Cannot translate ID\n"); >>>>>>> + return -ESRCH; >>>>>>> + } >>>>>>> + } else { >>>>>>> + if (of_parse_phandle_with_args(dev->of_node, "iommus", >>>>>>> "#iommu-cells", >>>>>>> + 0, &iommu_spec)) { >>>>>>> + dev_err(dev, "Cannot parse iommus property\n"); >>>>>>> + return -ESRCH; >>>>>>> + } >>>>>>> } >>>>>>> if (!of_device_is_compatible(iommu_spec.np, >>>>>>> "xen,grant-dma") || >>>>>>> @@ -354,6 +413,7 @@ static int >>>>>>> xen_dt_grant_init_backend_domid(struct device *dev, >>>>>>> void xen_grant_setup_dma_ops(struct device *dev) >>>>>>> { >>>>>>> struct xen_grant_dma_data *data; >>>>>>> + struct device_node *np; >>>>>>> data = find_xen_grant_dma_data(dev); >>>>>>> if (data) { >>>>>>> @@ -365,8 +425,13 @@ void xen_grant_setup_dma_ops(struct device >>>>>>> *dev) >>>>>>> if (!data) >>>>>>> goto err; >>>>>>> - if (dev->of_node) { >>>>>>> - if (xen_dt_grant_init_backend_domid(dev, data)) >>>>>>> + np = xen_dt_get_node(dev); >>>>>>> + if (np) { >>>>>>> + int ret; >>>>>>> + >>>>>>> + ret = xen_dt_grant_init_backend_domid(dev, data); >>>>>>> + of_node_put(np); >>>>>>> + if (ret) >>>>>>> goto err; >>>>>>> } else if (IS_ENABLED(CONFIG_XEN_VIRTIO_FORCE_GRANT)) { >>>>>>> dev_info(dev, "Using dom0 as backend\n"); >>>>>>> -- >>>>>>> 2.25.1 >>>>>>> >>>>>> >>>>> >>> > -- Regards, Oleksandr Tyshchenko
On 10/20/22 23:07, Oleksandr Tyshchenko wrote: Hi Oleksandr > > On 20.10.22 21:11, Xenia Ragiadakou wrote: > > Hello Xenia > > >> On 10/20/22 17:12, Oleksandr Tyshchenko wrote: >>> >>> On 20.10.22 11:24, Xenia Ragiadakou wrote: >>>> On 10/19/22 22:41, Oleksandr Tyshchenko wrote: >>>> >>>> Hi Oleksandr >>> >>> >>> Hello Xenia >>> >>> >>>> >>>>> >>>>> On 19.10.22 11:47, Xenia Ragiadakou wrote: >>>>> >>>>> Hello Xenia >>>>> >>>>>> On 10/19/22 03:58, Stefano Stabellini wrote: >>>>>>> On Sat, 15 Oct 2022, Oleksandr Tyshchenko wrote: >>>>>>>> From: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >>>>>>>> >>>>>>>> Use the same "xen-grant-dma" device concept for the PCI devices >>>>>>>> behind device-tree based PCI Host controller, but with one >>>>>>>> modification. >>>>>>>> Unlike for platform devices, we cannot use generic IOMMU bindings >>>>>>>> (iommus property), as we need to support more flexible >>>>>>>> configuration. >>>>>>>> The problem is that PCI devices under the single PCI Host >>>>>>>> controller >>>>>>>> may have the backends running in different Xen domains and thus >>>>>>>> have >>>>>>>> different endpoints ID (backend domains ID). >>>>>>>> >>>>>>>> So use generic PCI-IOMMU bindings instead (iommu-map/iommu-map-mask >>>>>>>> properties) which allows us to describe relationship between PCI >>>>>>>> devices and backend domains ID properly. >>>>>>>> >>>>>>>> Signed-off-by: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >>>>>>> >>>>>>> Now that I understood the approach and the reasons for it, I can >>>>>>> review >>>>>>> the patch :-) >>>>>>> >>>>>>> Please add an example of the bindings in the commit message. >>>>>>> >>>>>>> >>>>>>>> --- >>>>>>>> Slightly RFC. This is needed to support Xen grant mappings for >>>>>>>> virtio-pci devices >>>>>>>> on Arm at some point in the future. The Xen toolstack side is not >>>>>>>> completely ready yet. >>>>>>>> Here, for PCI devices we use more flexible way to pass backend >>>>>>>> domid >>>>>>>> to the guest >>>>>>>> than for platform devices. >>>>>>>> >>>>>>>> Changes V1 -> V2: >>>>>>>> - update commit description >>>>>>>> - rebase >>>>>>>> - rework to use generic PCI-IOMMU bindings instead of generic >>>>>>>> IOMMU bindings >>>>>>>> >>>>>>>> Previous discussion is at: >>>>>>>> https://urldefense.com/v3/__https://lore.kernel.org/xen-devel/20221006174804.2003029-1-olekstysh@gmail.com/__;!!GF_29dbcQIUBPA!3-vq7Edm3XfKtD5cnNjnOzDQvuo_XrhJ73yH-nPfqOkGGU0IjLG7R7MR_nAJCAPeOutHRLT44wKYwQwz3SauACie_ZAy$ >>>>>>>> >>>>>>>> >>>>>>>> [lore[.]kernel[.]org] >>>>>>>> >>>>>>>> Based on: >>>>>>>> https://urldefense.com/v3/__https://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git/log/?h=for-linus-6.1__;!!GF_29dbcQIUBPA!3-vq7Edm3XfKtD5cnNjnOzDQvuo_XrhJ73yH-nPfqOkGGU0IjLG7R7MR_nAJCAPeOutHRLT44wKYwQwz3SauAEnMDHAq$ >>>>>>>> >>>>>>>> >>>>>>>> [git[.]kernel[.]org] >>>>>>>> --- >>>>>>>> drivers/xen/grant-dma-ops.c | 87 >>>>>>>> ++++++++++++++++++++++++++++++++----- >>>>>>>> 1 file changed, 76 insertions(+), 11 deletions(-) >>>>>>>> >>>>>>>> diff --git a/drivers/xen/grant-dma-ops.c >>>>>>>> b/drivers/xen/grant-dma-ops.c >>>>>>>> index daa525df7bdc..b79d9d6ce154 100644 >>>>>>>> --- a/drivers/xen/grant-dma-ops.c >>>>>>>> +++ b/drivers/xen/grant-dma-ops.c >>>>>>>> @@ -10,6 +10,7 @@ >>>>>>>> #include <linux/module.h> >>>>>>>> #include <linux/dma-map-ops.h> >>>>>>>> #include <linux/of.h> >>>>>>>> +#include <linux/pci.h> >>>>>>>> #include <linux/pfn.h> >>>>>>>> #include <linux/xarray.h> >>>>>>>> #include <linux/virtio_anchor.h> >>>>>>>> @@ -292,12 +293,55 @@ static const struct dma_map_ops >>>>>>>> xen_grant_dma_ops = { >>>>>>>> .dma_supported = xen_grant_dma_supported, >>>>>>>> }; >>>>>>>> +static struct device_node *xen_dt_get_pci_host_node(struct >>>>>>>> device >>>>>>>> *dev) >>>>>>>> +{ >>>>>>>> + struct pci_dev *pdev = to_pci_dev(dev); >>>>>>>> + struct pci_bus *bus = pdev->bus; >>>>>>>> + >>>>>>>> + /* Walk up to the root bus to look for PCI Host controller */ >>>>>>>> + while (!pci_is_root_bus(bus)) >>>>>>>> + bus = bus->parent; >>>>>>>> + >>>>>>>> + return of_node_get(bus->bridge->parent->of_node); >>>>>>>> +} >>>>>>> >>>>>>> It seems silly that we need to walk the hierachy that way, but I >>>>>>> couldn't find another way to do it >>>>>>> >>>>>>> >>>>>>>> +static struct device_node *xen_dt_get_node(struct device *dev) >>>>>>>> +{ >>>>>>>> + if (dev_is_pci(dev)) >>>>>>>> + return xen_dt_get_pci_host_node(dev); >>>>>>>> + >>>>>>>> + return of_node_get(dev->of_node); >>>>>>>> +} >>>>>>>> + >>>>>>>> +static int xen_dt_map_id(struct device *dev, struct device_node >>>>>>>> **iommu_np, >>>>>>>> + u32 *sid) >>>>>>>> +{ >>>>>>>> + struct pci_dev *pdev = to_pci_dev(dev); >>>>>>>> + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); >>>>>>>> + struct device_node *host_np; >>>>>>>> + int ret; >>>>>>>> + >>>>>>>> + host_np = xen_dt_get_pci_host_node(dev); >>>>>>>> + if (!host_np) >>>>>>>> + return -ENODEV; >>>>>>>> + >>>>>>>> + ret = of_map_id(host_np, rid, "iommu-map", "iommu-map-mask", >>>>>>>> iommu_np, sid); >>>>>>>> + of_node_put(host_np); >>>>>>>> + return ret; >>>>>>>> +} >>>>>>>> + >>>>>>>> static bool xen_is_dt_grant_dma_device(struct device *dev) >>>>>>>> { >>>>>>>> - struct device_node *iommu_np; >>>>>>>> + struct device_node *iommu_np = NULL; >>>>>>>> bool has_iommu; >>>>>>>> - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >>>>>>>> + if (dev_is_pci(dev)) { >>>>>>>> + if (xen_dt_map_id(dev, &iommu_np, NULL)) >>>>>>>> + return false; >>>>>>>> + } else >>>>>>>> + iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >>>>>>>> + >>>>>>>> has_iommu = iommu_np && >>>>>>>> of_device_is_compatible(iommu_np, "xen,grant-dma"); >>>>>>>> of_node_put(iommu_np); >>>>>>>> @@ -307,9 +351,17 @@ static bool xen_is_dt_grant_dma_device(struct >>>>>>>> device *dev) >>>>>>>> bool xen_is_grant_dma_device(struct device *dev) >>>>>>>> { >>>>>>>> + struct device_node *np; >>>>>>>> + >>>>>>>> /* XXX Handle only DT devices for now */ >>>>>>>> - if (dev->of_node) >>>>>>>> - return xen_is_dt_grant_dma_device(dev); >>>>>>>> + np = xen_dt_get_node(dev); >>>>>>>> + if (np) { >>>>>>>> + bool ret; >>>>>>>> + >>>>>>>> + ret = xen_is_dt_grant_dma_device(dev); >>>>>>>> + of_node_put(np); >>>>>>>> + return ret; >>>>>>>> + } >>>>>>> >>>>>>> We don't need to walk the PCI hierachy twice. Maybe we can add the >>>>>>> of_node check directly to xen_is_dt_grant_dma_device? >>>>>>> >>>>>> >>>>>> I think in general we could pass directly the host bridge device if >>>>>> dev_is_pci(dev) (which can be retrieved with >>>>>> pci_get_host_bridge_device(to_pci_dev(dev), and after done with it >>>>>> pci_put_host_bridge_device(phb)). >>>>>> So that, xen_is_dt_grant_dma_device() and >>>>>> xen_dt_grant_init_backend_domid() won't need to discover it >>>>>> themselves. >>>>>> This will simplify the code. >>>>> >>>>> >>>>> Good point. I have some remark. Can we use pci_find_host_bridge() >>>>> instead? This way we don't have to add #include "../pci/pci.h", and >>>>> have >>>>> to drop reference afterwards. >>>>> >>>>> With that xen_dt_get_pci_host_node() will became the following: >>>>> >>>>> >>>>> static struct device_node *xen_dt_get_pci_host_node(struct device >>>>> *dev) >>>>> { >>>>> struct pci_host_bridge *bridge = >>>>> pci_find_host_bridge(to_pci_dev(dev)->bus); >>>>> >>>>> return of_node_get(bridge->dev.parent->of_node); >>>>> } >>>>> >>>> >>>> You are right. I prefer your version instead of the above. >>> >>> >>> ok, thanks >>> >>> >>>> >>>> >>>>> >>>>> With Stefano's suggestion, we won't walk the PCI hierarchy twice when >>>>> executing xen_is_grant_dma_device() for PCI device: >>>>> >>>>> xen_is_grant_dma_device() -> xen_is_dt_grant_dma_device() -> >>>>> xen_dt_map_id() -> xen_dt_get_pci_host_node() >>>>> >>>>> >>>>> What do you think? >>>>> >>>> >>>> I was thinking passing the device_node along with the device in the >>>> function arguments. More specifically, of doing this (not tested, just >>>> an idea): >>>> >>>> bool xen_is_grant_dma_device(struct device *dev) >>>> { >>>> struct device_node *np; >>>> bool has_iommu = false; >>>> >>>> /* XXX Handle only DT devices for now */ >>>> np = xen_dt_get_node(dev); >>>> if (np) >>>> has_iommu = xen_is_dt_grant_dma_device(dev, np); >>>> of_node_put(np); >>>> return has_iommu; >>>> } >>>> >>>> static bool xen_is_dt_grant_dma_device(struct device *dev, >>>> struct device_node *np) >>>> { >>>> struct device_node *iommu_np = NULL; >>>> bool has_iommu; >>>> >>>> if (dev_is_pci(dev)) { >>>> struct pci_dev *pdev = to_pci_dev(dev); >>>> u32 id = PCI_DEVID(pdev->bus->number, pdev->devfn); >>>> of_map_id(np, id, "iommu-map", "iommu-map-mask", &iommu_np, >>>> NULL); >>>> } else { >>>> iommu_np = of_parse_phandle(np, "iommus", 0); >>>> } >>>> >>>> has_iommu = iommu_np && of_device_is_compatible(iommu_np, >>>> "xen,grant-dma"); >>>> of_node_put(iommu_np); >>>> >>>> return has_iommu; >>>> } >>> >>> >>> I got it. >>> >>> xen_is_grant_dma_device() for V3 won't call xen_dt_get_node(), but call >>> xen_is_dt_grant_dma_device() directly. >>> >>> static bool xen_is_dt_grant_dma_device(struct device *dev) >>> { >>> struct device_node *iommu_np = NULL; >>> bool has_iommu; >>> >>> if (dev_is_pci(dev)) { >>> if (xen_dt_map_id(dev, &iommu_np, NULL)) >>> return false; >>> } else if (dev->of_node) >>> iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >>> else >>> return false; >>> >>> has_iommu = iommu_np && >>> of_device_is_compatible(iommu_np, "xen,grant-dma"); >>> of_node_put(iommu_np); >>> >>> return has_iommu; >>> } >>> >>> bool xen_is_grant_dma_device(struct device *dev) >>> { >>> /* XXX Handle only DT devices for now */ >>> return xen_is_dt_grant_dma_device(dev); >>> } >>> >>> >> >> Ok. One difference, that I see from the previous, is that here you >> don't use the dynamic interface when you access the dev->of_node >> (of_node_get/of_node_put). Before, this was guarded through the >> external xen_dt_get_node(). >> >> I suspect that the same needs to be done for the function >> xen_grant_setup_dma_ops(). There, also, the code walks up to the root >> bus twice. > > > Hmm, xen_dt_grant_init_backend_domid() should only be called if we deal > with device-tree based device. > > I think you are completely right, thanks! > > In order to address both your comments, I think I need to rework the > code (taking into the account your example with xen_is_dt_grant_dma_device() > > provided a few letters ago and extrapolate this example to > xen_dt_grant_init_backend_domid()). Below the patch (not tested) which > seems to address both your comments (also I dropped > > xen_dt_map_id() and squashed xen_dt_get_pci_host_node() with > xen_dt_get_node()). > > > diff --git a/drivers/xen/grant-dma-ops.c b/drivers/xen/grant-dma-ops.c > index daa525df7bdc..dae24dbd2ef7 100644 > --- a/drivers/xen/grant-dma-ops.c > +++ b/drivers/xen/grant-dma-ops.c > @@ -10,6 +10,7 @@ > #include <linux/module.h> > #include <linux/dma-map-ops.h> > #include <linux/of.h> > +#include <linux/pci.h> > #include <linux/pfn.h> > #include <linux/xarray.h> > #include <linux/virtio_anchor.h> > @@ -292,12 +293,33 @@ static const struct dma_map_ops xen_grant_dma_ops = { > .dma_supported = xen_grant_dma_supported, > }; > > -static bool xen_is_dt_grant_dma_device(struct device *dev) > +static struct device_node *xen_dt_get_node(struct device *dev) > { > - struct device_node *iommu_np; > + if (dev_is_pci(dev)) { > + struct pci_dev *pdev = to_pci_dev(dev); > + struct pci_host_bridge *bridge = > pci_find_host_bridge(pdev->bus); > + > + return of_node_get(bridge->dev.parent->of_node); > + } > + > + return of_node_get(dev->of_node); > +} > + It does not seem right to me to expose the struct pci_host_bridge (which we would need to check if it is null by the way). I would prefer your version for the above i.e static struct device_node *xen_dt_get_node(struct device *dev) { if (dev_is_pci(dev)) { struct pci_bus *bus = to_pci_dev(dev)->bus; /* Walk up to the root bus to look for PCI Host controller */ while (!pci_is_root_bus(bus)) bus = bus->parent; return of_node_get(bus->bridge->parent->of_node); } return of_node_get(dev->of_node); } > +static bool xen_is_dt_grant_dma_device(struct device *dev, > + struct device_node *np) > +{ > + struct device_node *iommu_np = NULL; > bool has_iommu; > > - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); > + if (dev_is_pci(dev)) { > + struct pci_dev *pdev = to_pci_dev(dev); > + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); > + > + if (of_map_id(np, rid, "iommu-map", "iommu-map-mask", > &iommu_np, NULL)) > + return false; > + } else > + iommu_np = of_parse_phandle(np, "iommus", 0); > + > has_iommu = iommu_np && > of_device_is_compatible(iommu_np, "xen,grant-dma"); > of_node_put(iommu_np); > @@ -307,9 +329,17 @@ static bool xen_is_dt_grant_dma_device(struct > device *dev) > > bool xen_is_grant_dma_device(struct device *dev) > { > + struct device_node *np; > + > /* XXX Handle only DT devices for now */ > - if (dev->of_node) > - return xen_is_dt_grant_dma_device(dev); > + np = xen_dt_get_node(dev); > + if (np) { > + bool ret; > + > + ret = xen_is_dt_grant_dma_device(dev, np); > + of_node_put(np); > + return ret; > + } > > return false; > } > @@ -323,14 +353,26 @@ bool xen_virtio_mem_acc(struct virtio_device *dev) > } > > static int xen_dt_grant_init_backend_domid(struct device *dev, > + struct device_node *np, > struct xen_grant_dma_data *data) > { > - struct of_phandle_args iommu_spec; > + struct of_phandle_args iommu_spec = { .args_count = 1 }; > > - if (of_parse_phandle_with_args(dev->of_node, "iommus", > "#iommu-cells", > - 0, &iommu_spec)) { > - dev_err(dev, "Cannot parse iommus property\n"); > - return -ESRCH; > + if (dev_is_pci(dev)) { > + struct pci_dev *pdev = to_pci_dev(dev); > + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); > + > + if (of_map_id(np, rid, "iommu-map", "iommu-map-mask", > &iommu_spec.np, > + iommu_spec.args)) { > + dev_err(dev, "Cannot translate ID\n"); > + return -ESRCH; > + } > + } else { > + if (of_parse_phandle_with_args(np, "iommus", "#iommu-cells", > + 0, &iommu_spec)) { > + dev_err(dev, "Cannot parse iommus property\n"); > + return -ESRCH; > + } > } > IMO, instead of passing struct xen_grant_dma_data *data to xen_dt_grant_init_backend_domid(), you could pass domid_t *backend_domid (e.g xen_dt_grant_init_backend_domid(dev, np, &data->backend_domid)). I think this way the internal struct xen_grant_dma_datain is manipulated in a single place and xen_dt_grant_init_backend_domid() does not depend on it. > if (!of_device_is_compatible(iommu_spec.np, "xen,grant-dma") || > @@ -354,6 +396,7 @@ static int xen_dt_grant_init_backend_domid(struct > device *dev, > void xen_grant_setup_dma_ops(struct device *dev) > { > struct xen_grant_dma_data *data; > + struct device_node *np; > > data = find_xen_grant_dma_data(dev); > if (data) { > @@ -365,8 +408,13 @@ void xen_grant_setup_dma_ops(struct device *dev) > if (!data) > goto err; > > - if (dev->of_node) { > - if (xen_dt_grant_init_backend_domid(dev, data)) > + np = xen_dt_get_node(dev); > + if (np) { > + int ret; > + > + ret = xen_dt_grant_init_backend_domid(dev, np, data); > + of_node_put(np); > + if (ret) > goto err; > } else if (IS_ENABLED(CONFIG_XEN_VIRTIO_FORCE_GRANT)) { > dev_info(dev, "Using dom0 as backend\n"); > > > Does it look ok now? That is what I had in mind. I do not know if Stefano agrees with this approach. >> >> >>>> >>>> I 'm wondering ... is it possible for the host bridge device node to >>>> have the iommus property set? meaning that all of its pci devs will >>>> have the same backend? >>> >>> Good question. I think, it is possible... This is technically what V1 is >>> doing. >>> >>> >>> Are you asking because to support "iommus" for PCI devices as well to >>> describe that use-case with all PCI devices having the same endpoint ID >>> (backend ID)? >>> If yes, I think, this could be still described by "iommu-map" property, >>> something like that (if we don't want to describe mapping for each PCI >>> device one-by-one). >>> >>> iommu-map = <0x0 &iommu X 0x1>; >>> >>> iommu-map-mask = <0x0>; >>> >>> where the X is backend ID. >>> >>> >>> It feels to me that it should be written down somewhere that for >>> platform devices we expect "iommus" and for PCI devices we expect >>> "iommu-map/iommu-map-mask" to be present. >> >> Thanks for the clarification, now I got it. Yes I agree. > > > ok, good > > >> >>>> >>>> >>>>>> >>>>>>> >>>>>>>> return false; >>>>>>>> } >>>>>>>> @@ -325,12 +377,19 @@ bool xen_virtio_mem_acc(struct virtio_device >>>>>>>> *dev) >>>>>>>> static int xen_dt_grant_init_backend_domid(struct device *dev, >>>>>>>> struct xen_grant_dma_data *data) >>>>>>>> { >>>>>>>> - struct of_phandle_args iommu_spec; >>>>>>>> + struct of_phandle_args iommu_spec = { .args_count = 1 }; >>>>>>>> - if (of_parse_phandle_with_args(dev->of_node, "iommus", >>>>>>>> "#iommu-cells", >>>>>>>> - 0, &iommu_spec)) { >>>>>>>> - dev_err(dev, "Cannot parse iommus property\n"); >>>>>>>> - return -ESRCH; >>>>>>>> + if (dev_is_pci(dev)) { >>>>>>>> + if (xen_dt_map_id(dev, &iommu_spec.np, iommu_spec.args)) { >>>>>>>> + dev_err(dev, "Cannot translate ID\n"); >>>>>>>> + return -ESRCH; >>>>>>>> + } >>>>>>>> + } else { >>>>>>>> + if (of_parse_phandle_with_args(dev->of_node, "iommus", >>>>>>>> "#iommu-cells", >>>>>>>> + 0, &iommu_spec)) { >>>>>>>> + dev_err(dev, "Cannot parse iommus property\n"); >>>>>>>> + return -ESRCH; >>>>>>>> + } >>>>>>>> } >>>>>>>> if (!of_device_is_compatible(iommu_spec.np, >>>>>>>> "xen,grant-dma") || >>>>>>>> @@ -354,6 +413,7 @@ static int >>>>>>>> xen_dt_grant_init_backend_domid(struct device *dev, >>>>>>>> void xen_grant_setup_dma_ops(struct device *dev) >>>>>>>> { >>>>>>>> struct xen_grant_dma_data *data; >>>>>>>> + struct device_node *np; >>>>>>>> data = find_xen_grant_dma_data(dev); >>>>>>>> if (data) { >>>>>>>> @@ -365,8 +425,13 @@ void xen_grant_setup_dma_ops(struct device >>>>>>>> *dev) >>>>>>>> if (!data) >>>>>>>> goto err; >>>>>>>> - if (dev->of_node) { >>>>>>>> - if (xen_dt_grant_init_backend_domid(dev, data)) >>>>>>>> + np = xen_dt_get_node(dev); >>>>>>>> + if (np) { >>>>>>>> + int ret; >>>>>>>> + >>>>>>>> + ret = xen_dt_grant_init_backend_domid(dev, data); >>>>>>>> + of_node_put(np); >>>>>>>> + if (ret) >>>>>>>> goto err; >>>>>>>> } else if (IS_ENABLED(CONFIG_XEN_VIRTIO_FORCE_GRANT)) { >>>>>>>> dev_info(dev, "Using dom0 as backend\n"); >>>>>>>> -- >>>>>>>> 2.25.1 >>>>>>>> >>>>>>> >>>>>> >>>> >>
On 21.10.22 09:08, Xenia Ragiadakou wrote: Hello Xenia > On 10/20/22 23:07, Oleksandr Tyshchenko wrote: > Hi Oleksandr >> >> On 20.10.22 21:11, Xenia Ragiadakou wrote: >> >> Hello Xenia >> >> >>> On 10/20/22 17:12, Oleksandr Tyshchenko wrote: >>>> >>>> On 20.10.22 11:24, Xenia Ragiadakou wrote: >>>>> On 10/19/22 22:41, Oleksandr Tyshchenko wrote: >>>>> >>>>> Hi Oleksandr >>>> >>>> >>>> Hello Xenia >>>> >>>> >>>>> >>>>>> >>>>>> On 19.10.22 11:47, Xenia Ragiadakou wrote: >>>>>> >>>>>> Hello Xenia >>>>>> >>>>>>> On 10/19/22 03:58, Stefano Stabellini wrote: >>>>>>>> On Sat, 15 Oct 2022, Oleksandr Tyshchenko wrote: >>>>>>>>> From: Oleksandr Tyshchenko <oleksandr_tyshchenko@epam.com> >>>>>>>>> >>>>>>>>> Use the same "xen-grant-dma" device concept for the PCI devices >>>>>>>>> behind device-tree based PCI Host controller, but with one >>>>>>>>> modification. >>>>>>>>> Unlike for platform devices, we cannot use generic IOMMU bindings >>>>>>>>> (iommus property), as we need to support more flexible >>>>>>>>> configuration. >>>>>>>>> The problem is that PCI devices under the single PCI Host >>>>>>>>> controller >>>>>>>>> may have the backends running in different Xen domains and thus >>>>>>>>> have >>>>>>>>> different endpoints ID (backend domains ID). >>>>>>>>> >>>>>>>>> So use generic PCI-IOMMU bindings instead >>>>>>>>> (iommu-map/iommu-map-mask >>>>>>>>> properties) which allows us to describe relationship between PCI >>>>>>>>> devices and backend domains ID properly. >>>>>>>>> >>>>>>>>> Signed-off-by: Oleksandr Tyshchenko >>>>>>>>> <oleksandr_tyshchenko@epam.com> >>>>>>>> >>>>>>>> Now that I understood the approach and the reasons for it, I can >>>>>>>> review >>>>>>>> the patch :-) >>>>>>>> >>>>>>>> Please add an example of the bindings in the commit message. >>>>>>>> >>>>>>>> >>>>>>>>> --- >>>>>>>>> Slightly RFC. This is needed to support Xen grant mappings for >>>>>>>>> virtio-pci devices >>>>>>>>> on Arm at some point in the future. The Xen toolstack side is not >>>>>>>>> completely ready yet. >>>>>>>>> Here, for PCI devices we use more flexible way to pass backend >>>>>>>>> domid >>>>>>>>> to the guest >>>>>>>>> than for platform devices. >>>>>>>>> >>>>>>>>> Changes V1 -> V2: >>>>>>>>> - update commit description >>>>>>>>> - rebase >>>>>>>>> - rework to use generic PCI-IOMMU bindings instead of >>>>>>>>> generic >>>>>>>>> IOMMU bindings >>>>>>>>> >>>>>>>>> Previous discussion is at: >>>>>>>>> https://urldefense.com/v3/__https://lore.kernel.org/xen-devel/20221006174804.2003029-1-olekstysh@gmail.com/__;!!GF_29dbcQIUBPA!3-vq7Edm3XfKtD5cnNjnOzDQvuo_XrhJ73yH-nPfqOkGGU0IjLG7R7MR_nAJCAPeOutHRLT44wKYwQwz3SauACie_ZAy$ >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> [lore[.]kernel[.]org] >>>>>>>>> >>>>>>>>> Based on: >>>>>>>>> https://urldefense.com/v3/__https://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git/log/?h=for-linus-6.1__;!!GF_29dbcQIUBPA!3-vq7Edm3XfKtD5cnNjnOzDQvuo_XrhJ73yH-nPfqOkGGU0IjLG7R7MR_nAJCAPeOutHRLT44wKYwQwz3SauAEnMDHAq$ >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> [git[.]kernel[.]org] >>>>>>>>> --- >>>>>>>>> drivers/xen/grant-dma-ops.c | 87 >>>>>>>>> ++++++++++++++++++++++++++++++++----- >>>>>>>>> 1 file changed, 76 insertions(+), 11 deletions(-) >>>>>>>>> >>>>>>>>> diff --git a/drivers/xen/grant-dma-ops.c >>>>>>>>> b/drivers/xen/grant-dma-ops.c >>>>>>>>> index daa525df7bdc..b79d9d6ce154 100644 >>>>>>>>> --- a/drivers/xen/grant-dma-ops.c >>>>>>>>> +++ b/drivers/xen/grant-dma-ops.c >>>>>>>>> @@ -10,6 +10,7 @@ >>>>>>>>> #include <linux/module.h> >>>>>>>>> #include <linux/dma-map-ops.h> >>>>>>>>> #include <linux/of.h> >>>>>>>>> +#include <linux/pci.h> >>>>>>>>> #include <linux/pfn.h> >>>>>>>>> #include <linux/xarray.h> >>>>>>>>> #include <linux/virtio_anchor.h> >>>>>>>>> @@ -292,12 +293,55 @@ static const struct dma_map_ops >>>>>>>>> xen_grant_dma_ops = { >>>>>>>>> .dma_supported = xen_grant_dma_supported, >>>>>>>>> }; >>>>>>>>> +static struct device_node *xen_dt_get_pci_host_node(struct >>>>>>>>> device >>>>>>>>> *dev) >>>>>>>>> +{ >>>>>>>>> + struct pci_dev *pdev = to_pci_dev(dev); >>>>>>>>> + struct pci_bus *bus = pdev->bus; >>>>>>>>> + >>>>>>>>> + /* Walk up to the root bus to look for PCI Host >>>>>>>>> controller */ >>>>>>>>> + while (!pci_is_root_bus(bus)) >>>>>>>>> + bus = bus->parent; >>>>>>>>> + >>>>>>>>> + return of_node_get(bus->bridge->parent->of_node); >>>>>>>>> +} >>>>>>>> >>>>>>>> It seems silly that we need to walk the hierachy that way, but I >>>>>>>> couldn't find another way to do it >>>>>>>> >>>>>>>> >>>>>>>>> +static struct device_node *xen_dt_get_node(struct device *dev) >>>>>>>>> +{ >>>>>>>>> + if (dev_is_pci(dev)) >>>>>>>>> + return xen_dt_get_pci_host_node(dev); >>>>>>>>> + >>>>>>>>> + return of_node_get(dev->of_node); >>>>>>>>> +} >>>>>>>>> + >>>>>>>>> +static int xen_dt_map_id(struct device *dev, struct device_node >>>>>>>>> **iommu_np, >>>>>>>>> + u32 *sid) >>>>>>>>> +{ >>>>>>>>> + struct pci_dev *pdev = to_pci_dev(dev); >>>>>>>>> + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); >>>>>>>>> + struct device_node *host_np; >>>>>>>>> + int ret; >>>>>>>>> + >>>>>>>>> + host_np = xen_dt_get_pci_host_node(dev); >>>>>>>>> + if (!host_np) >>>>>>>>> + return -ENODEV; >>>>>>>>> + >>>>>>>>> + ret = of_map_id(host_np, rid, "iommu-map", "iommu-map-mask", >>>>>>>>> iommu_np, sid); >>>>>>>>> + of_node_put(host_np); >>>>>>>>> + return ret; >>>>>>>>> +} >>>>>>>>> + >>>>>>>>> static bool xen_is_dt_grant_dma_device(struct device *dev) >>>>>>>>> { >>>>>>>>> - struct device_node *iommu_np; >>>>>>>>> + struct device_node *iommu_np = NULL; >>>>>>>>> bool has_iommu; >>>>>>>>> - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >>>>>>>>> + if (dev_is_pci(dev)) { >>>>>>>>> + if (xen_dt_map_id(dev, &iommu_np, NULL)) >>>>>>>>> + return false; >>>>>>>>> + } else >>>>>>>>> + iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >>>>>>>>> + >>>>>>>>> has_iommu = iommu_np && >>>>>>>>> of_device_is_compatible(iommu_np, >>>>>>>>> "xen,grant-dma"); >>>>>>>>> of_node_put(iommu_np); >>>>>>>>> @@ -307,9 +351,17 @@ static bool >>>>>>>>> xen_is_dt_grant_dma_device(struct >>>>>>>>> device *dev) >>>>>>>>> bool xen_is_grant_dma_device(struct device *dev) >>>>>>>>> { >>>>>>>>> + struct device_node *np; >>>>>>>>> + >>>>>>>>> /* XXX Handle only DT devices for now */ >>>>>>>>> - if (dev->of_node) >>>>>>>>> - return xen_is_dt_grant_dma_device(dev); >>>>>>>>> + np = xen_dt_get_node(dev); >>>>>>>>> + if (np) { >>>>>>>>> + bool ret; >>>>>>>>> + >>>>>>>>> + ret = xen_is_dt_grant_dma_device(dev); >>>>>>>>> + of_node_put(np); >>>>>>>>> + return ret; >>>>>>>>> + } >>>>>>>> >>>>>>>> We don't need to walk the PCI hierachy twice. Maybe we can add the >>>>>>>> of_node check directly to xen_is_dt_grant_dma_device? >>>>>>>> >>>>>>> >>>>>>> I think in general we could pass directly the host bridge device if >>>>>>> dev_is_pci(dev) (which can be retrieved with >>>>>>> pci_get_host_bridge_device(to_pci_dev(dev), and after done with it >>>>>>> pci_put_host_bridge_device(phb)). >>>>>>> So that, xen_is_dt_grant_dma_device() and >>>>>>> xen_dt_grant_init_backend_domid() won't need to discover it >>>>>>> themselves. >>>>>>> This will simplify the code. >>>>>> >>>>>> >>>>>> Good point. I have some remark. Can we use pci_find_host_bridge() >>>>>> instead? This way we don't have to add #include "../pci/pci.h", and >>>>>> have >>>>>> to drop reference afterwards. >>>>>> >>>>>> With that xen_dt_get_pci_host_node() will became the following: >>>>>> >>>>>> >>>>>> static struct device_node *xen_dt_get_pci_host_node(struct device >>>>>> *dev) >>>>>> { >>>>>> struct pci_host_bridge *bridge = >>>>>> pci_find_host_bridge(to_pci_dev(dev)->bus); >>>>>> >>>>>> return of_node_get(bridge->dev.parent->of_node); >>>>>> } >>>>>> >>>>> >>>>> You are right. I prefer your version instead of the above. >>>> >>>> >>>> ok, thanks >>>> >>>> >>>>> >>>>> >>>>>> >>>>>> With Stefano's suggestion, we won't walk the PCI hierarchy twice >>>>>> when >>>>>> executing xen_is_grant_dma_device() for PCI device: >>>>>> >>>>>> xen_is_grant_dma_device() -> xen_is_dt_grant_dma_device() -> >>>>>> xen_dt_map_id() -> xen_dt_get_pci_host_node() >>>>>> >>>>>> >>>>>> What do you think? >>>>>> >>>>> >>>>> I was thinking passing the device_node along with the device in the >>>>> function arguments. More specifically, of doing this (not tested, >>>>> just >>>>> an idea): >>>>> >>>>> bool xen_is_grant_dma_device(struct device *dev) >>>>> { >>>>> struct device_node *np; >>>>> bool has_iommu = false; >>>>> >>>>> /* XXX Handle only DT devices for now */ >>>>> np = xen_dt_get_node(dev); >>>>> if (np) >>>>> has_iommu = xen_is_dt_grant_dma_device(dev, np); >>>>> of_node_put(np); >>>>> return has_iommu; >>>>> } >>>>> >>>>> static bool xen_is_dt_grant_dma_device(struct device *dev, >>>>> struct device_node *np) >>>>> { >>>>> struct device_node *iommu_np = NULL; >>>>> bool has_iommu; >>>>> >>>>> if (dev_is_pci(dev)) { >>>>> struct pci_dev *pdev = to_pci_dev(dev); >>>>> u32 id = PCI_DEVID(pdev->bus->number, pdev->devfn); >>>>> of_map_id(np, id, "iommu-map", "iommu-map-mask", &iommu_np, >>>>> NULL); >>>>> } else { >>>>> iommu_np = of_parse_phandle(np, "iommus", 0); >>>>> } >>>>> >>>>> has_iommu = iommu_np && of_device_is_compatible(iommu_np, >>>>> "xen,grant-dma"); >>>>> of_node_put(iommu_np); >>>>> >>>>> return has_iommu; >>>>> } >>>> >>>> >>>> I got it. >>>> >>>> xen_is_grant_dma_device() for V3 won't call xen_dt_get_node(), but >>>> call >>>> xen_is_dt_grant_dma_device() directly. >>>> >>>> static bool xen_is_dt_grant_dma_device(struct device *dev) >>>> { >>>> struct device_node *iommu_np = NULL; >>>> bool has_iommu; >>>> >>>> if (dev_is_pci(dev)) { >>>> if (xen_dt_map_id(dev, &iommu_np, NULL)) >>>> return false; >>>> } else if (dev->of_node) >>>> iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >>>> else >>>> return false; >>>> >>>> has_iommu = iommu_np && >>>> of_device_is_compatible(iommu_np, "xen,grant-dma"); >>>> of_node_put(iommu_np); >>>> >>>> return has_iommu; >>>> } >>>> >>>> bool xen_is_grant_dma_device(struct device *dev) >>>> { >>>> /* XXX Handle only DT devices for now */ >>>> return xen_is_dt_grant_dma_device(dev); >>>> } >>>> >>>> >>> >>> Ok. One difference, that I see from the previous, is that here you >>> don't use the dynamic interface when you access the dev->of_node >>> (of_node_get/of_node_put). Before, this was guarded through the >>> external xen_dt_get_node(). >>> >>> I suspect that the same needs to be done for the function >>> xen_grant_setup_dma_ops(). There, also, the code walks up to the root >>> bus twice. >> >> >> Hmm, xen_dt_grant_init_backend_domid() should only be called if we deal >> with device-tree based device. >> >> I think you are completely right, thanks! >> >> In order to address both your comments, I think I need to rework the >> code (taking into the account your example with >> xen_is_dt_grant_dma_device() >> >> provided a few letters ago and extrapolate this example to >> xen_dt_grant_init_backend_domid()). Below the patch (not tested) which >> seems to address both your comments (also I dropped >> >> xen_dt_map_id() and squashed xen_dt_get_pci_host_node() with >> xen_dt_get_node()). >> >> >> diff --git a/drivers/xen/grant-dma-ops.c b/drivers/xen/grant-dma-ops.c >> index daa525df7bdc..dae24dbd2ef7 100644 >> --- a/drivers/xen/grant-dma-ops.c >> +++ b/drivers/xen/grant-dma-ops.c >> @@ -10,6 +10,7 @@ >> #include <linux/module.h> >> #include <linux/dma-map-ops.h> >> #include <linux/of.h> >> +#include <linux/pci.h> >> #include <linux/pfn.h> >> #include <linux/xarray.h> >> #include <linux/virtio_anchor.h> >> @@ -292,12 +293,33 @@ static const struct dma_map_ops >> xen_grant_dma_ops = { >> .dma_supported = xen_grant_dma_supported, >> }; >> >> -static bool xen_is_dt_grant_dma_device(struct device *dev) >> +static struct device_node *xen_dt_get_node(struct device *dev) >> { >> - struct device_node *iommu_np; >> + if (dev_is_pci(dev)) { >> + struct pci_dev *pdev = to_pci_dev(dev); >> + struct pci_host_bridge *bridge = >> pci_find_host_bridge(pdev->bus); >> + >> + return of_node_get(bridge->dev.parent->of_node); >> + } >> + >> + return of_node_get(dev->of_node); >> +} >> + > > It does not seem right to me to expose the struct pci_host_bridge > (which we would need to check if it is null by the way). I would > prefer your version for the above i.e > static struct device_node *xen_dt_get_node(struct device *dev) > { > if (dev_is_pci(dev)) { > struct pci_bus *bus = to_pci_dev(dev)->bus; > > /* Walk up to the root bus to look for PCI Host controller */ > while (!pci_is_root_bus(bus)) > bus = bus->parent; > return of_node_get(bus->bridge->parent->of_node); > } > > return of_node_get(dev->of_node); > } ok, will return it back > >> +static bool xen_is_dt_grant_dma_device(struct device *dev, >> + struct device_node *np) >> +{ >> + struct device_node *iommu_np = NULL; >> bool has_iommu; >> >> - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); >> + if (dev_is_pci(dev)) { >> + struct pci_dev *pdev = to_pci_dev(dev); >> + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); >> + >> + if (of_map_id(np, rid, "iommu-map", "iommu-map-mask", >> &iommu_np, NULL)) >> + return false; >> + } else >> + iommu_np = of_parse_phandle(np, "iommus", 0); >> + >> has_iommu = iommu_np && >> of_device_is_compatible(iommu_np, >> "xen,grant-dma"); >> of_node_put(iommu_np); >> @@ -307,9 +329,17 @@ static bool xen_is_dt_grant_dma_device(struct >> device *dev) >> >> bool xen_is_grant_dma_device(struct device *dev) >> { >> + struct device_node *np; >> + >> /* XXX Handle only DT devices for now */ >> - if (dev->of_node) >> - return xen_is_dt_grant_dma_device(dev); >> + np = xen_dt_get_node(dev); >> + if (np) { >> + bool ret; >> + >> + ret = xen_is_dt_grant_dma_device(dev, np); >> + of_node_put(np); >> + return ret; >> + } >> >> return false; >> } > >> @@ -323,14 +353,26 @@ bool xen_virtio_mem_acc(struct virtio_device *dev) >> } >> >> static int xen_dt_grant_init_backend_domid(struct device *dev, >> + struct device_node *np, >> struct >> xen_grant_dma_data *data) >> { >> - struct of_phandle_args iommu_spec; >> + struct of_phandle_args iommu_spec = { .args_count = 1 }; >> >> - if (of_parse_phandle_with_args(dev->of_node, "iommus", >> "#iommu-cells", >> - 0, &iommu_spec)) { >> - dev_err(dev, "Cannot parse iommus property\n"); >> - return -ESRCH; >> + if (dev_is_pci(dev)) { >> + struct pci_dev *pdev = to_pci_dev(dev); >> + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); >> + >> + if (of_map_id(np, rid, "iommu-map", "iommu-map-mask", >> &iommu_spec.np, >> + iommu_spec.args)) { >> + dev_err(dev, "Cannot translate ID\n"); >> + return -ESRCH; >> + } >> + } else { >> + if (of_parse_phandle_with_args(np, "iommus", >> "#iommu-cells", >> + 0, &iommu_spec)) { >> + dev_err(dev, "Cannot parse iommus property\n"); >> + return -ESRCH; >> + } >> } >> > > IMO, instead of passing struct xen_grant_dma_data *data to > xen_dt_grant_init_backend_domid(), you could pass domid_t > *backend_domid (e.g xen_dt_grant_init_backend_domid(dev, np, > &data->backend_domid)). > I think this way the internal struct xen_grant_dma_datain is > manipulated in a single place and xen_dt_grant_init_backend_domid() > does not depend on it. Although I think it is not directly related to current patch, I agree we could make this change as we touch the list of arguments for xen_dt_grant_init_backend_domid() anyway. > > >> if (!of_device_is_compatible(iommu_spec.np, >> "xen,grant-dma") || >> @@ -354,6 +396,7 @@ static int xen_dt_grant_init_backend_domid(struct >> device *dev, >> void xen_grant_setup_dma_ops(struct device *dev) >> { >> struct xen_grant_dma_data *data; >> + struct device_node *np; >> >> data = find_xen_grant_dma_data(dev); >> if (data) { >> @@ -365,8 +408,13 @@ void xen_grant_setup_dma_ops(struct device *dev) >> if (!data) >> goto err; >> >> - if (dev->of_node) { >> - if (xen_dt_grant_init_backend_domid(dev, data)) >> + np = xen_dt_get_node(dev); >> + if (np) { >> + int ret; >> + >> + ret = xen_dt_grant_init_backend_domid(dev, np, data); >> + of_node_put(np); >> + if (ret) >> goto err; >> } else if (IS_ENABLED(CONFIG_XEN_VIRTIO_FORCE_GRANT)) { >> dev_info(dev, "Using dom0 as backend\n"); >> >> >> Does it look ok now? > > That is what I had in mind. Great, thanks! > I do not know if Stefano agrees with this approach. We will see > >>> >>> >>>>> >>>>> I 'm wondering ... is it possible for the host bridge device node to >>>>> have the iommus property set? meaning that all of its pci devs will >>>>> have the same backend? >>>> >>>> Good question. I think, it is possible... This is technically what >>>> V1 is >>>> doing. >>>> >>>> >>>> Are you asking because to support "iommus" for PCI devices as well to >>>> describe that use-case with all PCI devices having the same >>>> endpoint ID >>>> (backend ID)? >>>> If yes, I think, this could be still described by "iommu-map" >>>> property, >>>> something like that (if we don't want to describe mapping for each PCI >>>> device one-by-one). >>>> >>>> iommu-map = <0x0 &iommu X 0x1>; >>>> >>>> iommu-map-mask = <0x0>; >>>> >>>> where the X is backend ID. >>>> >>>> >>>> It feels to me that it should be written down somewhere that for >>>> platform devices we expect "iommus" and for PCI devices we expect >>>> "iommu-map/iommu-map-mask" to be present. >>> >>> Thanks for the clarification, now I got it. Yes I agree. >> >> >> ok, good >> >> >>> >>>>> >>>>> >>>>>>> >>>>>>>> >>>>>>>>> return false; >>>>>>>>> } >>>>>>>>> @@ -325,12 +377,19 @@ bool xen_virtio_mem_acc(struct >>>>>>>>> virtio_device >>>>>>>>> *dev) >>>>>>>>> static int xen_dt_grant_init_backend_domid(struct device >>>>>>>>> *dev, >>>>>>>>> struct xen_grant_dma_data *data) >>>>>>>>> { >>>>>>>>> - struct of_phandle_args iommu_spec; >>>>>>>>> + struct of_phandle_args iommu_spec = { .args_count = 1 }; >>>>>>>>> - if (of_parse_phandle_with_args(dev->of_node, "iommus", >>>>>>>>> "#iommu-cells", >>>>>>>>> - 0, &iommu_spec)) { >>>>>>>>> - dev_err(dev, "Cannot parse iommus property\n"); >>>>>>>>> - return -ESRCH; >>>>>>>>> + if (dev_is_pci(dev)) { >>>>>>>>> + if (xen_dt_map_id(dev, &iommu_spec.np, >>>>>>>>> iommu_spec.args)) { >>>>>>>>> + dev_err(dev, "Cannot translate ID\n"); >>>>>>>>> + return -ESRCH; >>>>>>>>> + } >>>>>>>>> + } else { >>>>>>>>> + if (of_parse_phandle_with_args(dev->of_node, "iommus", >>>>>>>>> "#iommu-cells", >>>>>>>>> + 0, &iommu_spec)) { >>>>>>>>> + dev_err(dev, "Cannot parse iommus property\n"); >>>>>>>>> + return -ESRCH; >>>>>>>>> + } >>>>>>>>> } >>>>>>>>> if (!of_device_is_compatible(iommu_spec.np, >>>>>>>>> "xen,grant-dma") || >>>>>>>>> @@ -354,6 +413,7 @@ static int >>>>>>>>> xen_dt_grant_init_backend_domid(struct device *dev, >>>>>>>>> void xen_grant_setup_dma_ops(struct device *dev) >>>>>>>>> { >>>>>>>>> struct xen_grant_dma_data *data; >>>>>>>>> + struct device_node *np; >>>>>>>>> data = find_xen_grant_dma_data(dev); >>>>>>>>> if (data) { >>>>>>>>> @@ -365,8 +425,13 @@ void xen_grant_setup_dma_ops(struct device >>>>>>>>> *dev) >>>>>>>>> if (!data) >>>>>>>>> goto err; >>>>>>>>> - if (dev->of_node) { >>>>>>>>> - if (xen_dt_grant_init_backend_domid(dev, data)) >>>>>>>>> + np = xen_dt_get_node(dev); >>>>>>>>> + if (np) { >>>>>>>>> + int ret; >>>>>>>>> + >>>>>>>>> + ret = xen_dt_grant_init_backend_domid(dev, data); >>>>>>>>> + of_node_put(np); >>>>>>>>> + if (ret) >>>>>>>>> goto err; >>>>>>>>> } else if (IS_ENABLED(CONFIG_XEN_VIRTIO_FORCE_GRANT)) { >>>>>>>>> dev_info(dev, "Using dom0 as backend\n"); >>>>>>>>> -- >>>>>>>>> 2.25.1 >>>>>>>>> >>>>>>>> >>>>>>> >>>>> >>> > -- Regards, Oleksandr Tyshchenko
diff --git a/drivers/xen/grant-dma-ops.c b/drivers/xen/grant-dma-ops.c index daa525df7bdc..b79d9d6ce154 100644 --- a/drivers/xen/grant-dma-ops.c +++ b/drivers/xen/grant-dma-ops.c @@ -10,6 +10,7 @@ #include <linux/module.h> #include <linux/dma-map-ops.h> #include <linux/of.h> +#include <linux/pci.h> #include <linux/pfn.h> #include <linux/xarray.h> #include <linux/virtio_anchor.h> @@ -292,12 +293,55 @@ static const struct dma_map_ops xen_grant_dma_ops = { .dma_supported = xen_grant_dma_supported, }; +static struct device_node *xen_dt_get_pci_host_node(struct device *dev) +{ + struct pci_dev *pdev = to_pci_dev(dev); + struct pci_bus *bus = pdev->bus; + + /* Walk up to the root bus to look for PCI Host controller */ + while (!pci_is_root_bus(bus)) + bus = bus->parent; + + return of_node_get(bus->bridge->parent->of_node); +} + +static struct device_node *xen_dt_get_node(struct device *dev) +{ + if (dev_is_pci(dev)) + return xen_dt_get_pci_host_node(dev); + + return of_node_get(dev->of_node); +} + +static int xen_dt_map_id(struct device *dev, struct device_node **iommu_np, + u32 *sid) +{ + struct pci_dev *pdev = to_pci_dev(dev); + u32 rid = PCI_DEVID(pdev->bus->number, pdev->devfn); + struct device_node *host_np; + int ret; + + host_np = xen_dt_get_pci_host_node(dev); + if (!host_np) + return -ENODEV; + + ret = of_map_id(host_np, rid, "iommu-map", "iommu-map-mask", iommu_np, sid); + of_node_put(host_np); + + return ret; +} + static bool xen_is_dt_grant_dma_device(struct device *dev) { - struct device_node *iommu_np; + struct device_node *iommu_np = NULL; bool has_iommu; - iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); + if (dev_is_pci(dev)) { + if (xen_dt_map_id(dev, &iommu_np, NULL)) + return false; + } else + iommu_np = of_parse_phandle(dev->of_node, "iommus", 0); + has_iommu = iommu_np && of_device_is_compatible(iommu_np, "xen,grant-dma"); of_node_put(iommu_np); @@ -307,9 +351,17 @@ static bool xen_is_dt_grant_dma_device(struct device *dev) bool xen_is_grant_dma_device(struct device *dev) { + struct device_node *np; + /* XXX Handle only DT devices for now */ - if (dev->of_node) - return xen_is_dt_grant_dma_device(dev); + np = xen_dt_get_node(dev); + if (np) { + bool ret; + + ret = xen_is_dt_grant_dma_device(dev); + of_node_put(np); + return ret; + } return false; } @@ -325,12 +377,19 @@ bool xen_virtio_mem_acc(struct virtio_device *dev) static int xen_dt_grant_init_backend_domid(struct device *dev, struct xen_grant_dma_data *data) { - struct of_phandle_args iommu_spec; + struct of_phandle_args iommu_spec = { .args_count = 1 }; - if (of_parse_phandle_with_args(dev->of_node, "iommus", "#iommu-cells", - 0, &iommu_spec)) { - dev_err(dev, "Cannot parse iommus property\n"); - return -ESRCH; + if (dev_is_pci(dev)) { + if (xen_dt_map_id(dev, &iommu_spec.np, iommu_spec.args)) { + dev_err(dev, "Cannot translate ID\n"); + return -ESRCH; + } + } else { + if (of_parse_phandle_with_args(dev->of_node, "iommus", "#iommu-cells", + 0, &iommu_spec)) { + dev_err(dev, "Cannot parse iommus property\n"); + return -ESRCH; + } } if (!of_device_is_compatible(iommu_spec.np, "xen,grant-dma") || @@ -354,6 +413,7 @@ static int xen_dt_grant_init_backend_domid(struct device *dev, void xen_grant_setup_dma_ops(struct device *dev) { struct xen_grant_dma_data *data; + struct device_node *np; data = find_xen_grant_dma_data(dev); if (data) { @@ -365,8 +425,13 @@ void xen_grant_setup_dma_ops(struct device *dev) if (!data) goto err; - if (dev->of_node) { - if (xen_dt_grant_init_backend_domid(dev, data)) + np = xen_dt_get_node(dev); + if (np) { + int ret; + + ret = xen_dt_grant_init_backend_domid(dev, data); + of_node_put(np); + if (ret) goto err; } else if (IS_ENABLED(CONFIG_XEN_VIRTIO_FORCE_GRANT)) { dev_info(dev, "Using dom0 as backend\n");