From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 2C334A328D for ; Tue, 22 Oct 2019 10:22:10 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 60D244CE4; Tue, 22 Oct 2019 10:22:05 +0200 (CEST) Received: from us-smtp-delivery-1.mimecast.com (us-smtp-2.mimecast.com [205.139.110.61]) by dpdk.org (Postfix) with ESMTP id 95A384C90 for ; Tue, 22 Oct 2019 10:22:03 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1571732522; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=qL9GhC0UMM0SnICdLjt5qf+Rvie016JKARNmhOEm6vI=; b=ZJWrKqtRNPyKLPqmFz14luGPjPHGILbrT63fiA/HXCeCXxNopPvZkJmgpp6tfBXfUz98Ko 40Yikm6uhx+T7Gqo8v7TYkXdiAd8FxXSvMLXx9QGbXL384pLFsWRoPxCfqbOAMykgcO+T6 ncN5m3kMXmn7iuNdNlaGJT+HxzFbROA= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-102-SQ45gMkBN-KneRrF1FRn8A-1; Tue, 22 Oct 2019 04:22:00 -0400 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 006781800D6A; Tue, 22 Oct 2019 08:22:00 +0000 (UTC) Received: from dmarchan.remote.csb (ovpn-204-129.brq.redhat.com [10.40.204.129]) by smtp.corp.redhat.com (Postfix) with ESMTP id 5EB2860C57; Tue, 22 Oct 2019 08:21:57 +0000 (UTC) From: David Marchand To: dev@dpdk.org Cc: maxime.coquelin@redhat.com, Ferruh Yigit Date: Tue, 22 Oct 2019 10:21:42 +0200 Message-Id: <1571732503-30424-2-git-send-email-david.marchand@redhat.com> In-Reply-To: <1571732503-30424-1-git-send-email-david.marchand@redhat.com> References: <1571313388-32142-1-git-send-email-david.marchand@redhat.com> <1571732503-30424-1-git-send-email-david.marchand@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-MC-Unique: SQ45gMkBN-KneRrF1FRn8A-1 X-Mimecast-Spam-Score: 0 Content-Type: text/plain; charset=WINDOWS-1252 Content-Transfer-Encoding: quoted-printable Subject: [dpdk-dev] [PATCH v3 1/2] bus/pci: check IO permissions for UIO only X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" On x86, calling inb/outb special instructions (used in UIO ioport read/write parts) is only possible if the right IO permissions has been granted. The only user of this API (the net/virtio pmd) checks this unconditionnaly but this should be hidden by the rte_pci_ioport API itself and only checked when the device is bound to a UIO driver. Signed-off-by: David Marchand --- Changelog since v2: - do not switch to pci_ioport_map in igb_uio case, add a check on iopl there too, Changelog since v1: - change log message level from DEBUG to ERR, - add device name in log message, --- drivers/bus/pci/bsd/pci.c | 5 +++++ drivers/bus/pci/linux/pci.c | 6 ++++++ drivers/bus/pci/linux/pci_uio.c | 6 ++++++ 3 files changed, 17 insertions(+) diff --git a/drivers/bus/pci/bsd/pci.c b/drivers/bus/pci/bsd/pci.c index 7777179..ebbfeb1 100644 --- a/drivers/bus/pci/bsd/pci.c +++ b/drivers/bus/pci/bsd/pci.c @@ -539,6 +539,11 @@ rte_pci_ioport_map(struct rte_pci_device *dev, int bar= , =09switch (dev->kdrv) { #if defined(RTE_ARCH_X86) =09case RTE_KDRV_NIC_UIO: +=09=09if (rte_eal_iopl_init() !=3D 0) { +=09=09=09RTE_LOG(ERR, EAL, "%s(): insufficient ioport permissions for PCI = device %s\n", +=09=09=09=09__func__, dev->name); +=09=09=09return -1; +=09=09} =09=09if ((uintptr_t) dev->mem_resource[bar].addr <=3D UINT16_MAX) { =09=09=09p->base =3D (uintptr_t)dev->mem_resource[bar].addr; =09=09=09ret =3D 0; diff --git a/drivers/bus/pci/linux/pci.c b/drivers/bus/pci/linux/pci.c index 318db19..740a2cd 100644 --- a/drivers/bus/pci/linux/pci.c +++ b/drivers/bus/pci/linux/pci.c @@ -657,6 +657,12 @@ pci_ioport_map(struct rte_pci_device *dev, int bar __r= te_unused, =09int found =3D 0; =09size_t linesz; =20 +=09if (rte_eal_iopl_init() !=3D 0) { +=09=09RTE_LOG(ERR, EAL, "%s(): insufficient ioport permissions for PCI dev= ice %s\n", +=09=09=09__func__, dev->name); +=09=09return -1; +=09} + =09snprintf(pci_id, sizeof(pci_id), PCI_PRI_FMT, =09=09 dev->addr.domain, dev->addr.bus, =09=09 dev->addr.devid, dev->addr.function); diff --git a/drivers/bus/pci/linux/pci_uio.c b/drivers/bus/pci/linux/pci_ui= o.c index e031361..6dca05a 100644 --- a/drivers/bus/pci/linux/pci_uio.c +++ b/drivers/bus/pci/linux/pci_uio.c @@ -375,6 +375,12 @@ pci_uio_ioport_map(struct rte_pci_device *dev, int bar= , =09int uio_num; =09unsigned long start; =20 +=09if (rte_eal_iopl_init() !=3D 0) { +=09=09RTE_LOG(ERR, EAL, "%s(): insufficient ioport permissions for PCI dev= ice %s\n", +=09=09=09__func__, dev->name); +=09=09return -1; +=09} + =09uio_num =3D pci_get_uio_dev(dev, dirname, sizeof(dirname), 0); =09if (uio_num < 0) =09=09return -1; --=20 1.8.3.1