Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp2163081imm; Sat, 30 Jun 2018 12:24:59 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKASybB+RwdALXdx4ZhohdmoT/HbBMCZ7duIM8ek7FS3D9ZD1atEQUQHAeDA9jCNx3jjVGU X-Received: by 2002:a17:902:1025:: with SMTP id b34-v6mr19509004pla.112.1530386699464; Sat, 30 Jun 2018 12:24:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530386699; cv=none; d=google.com; s=arc-20160816; b=yMct9R/KtdkqmfUmJojsMUxRCUJ7bWjLuDziXDAKV40tVlQDJIguW+rFByPdyPwMW4 CPYJ8uPKiHBa0MwjYsPrfGfqaXCZdZUbZU4bTx3QZM32+FNvs5I24YMF+G34JixAboDc ovusz+P5CmaXwEL6ONNDPhBU6E7fIGkFxkXVGbAqkrOzbxwsgWYNY17tgonqmp1e03wj oOqlWCAicmGi5R1e/YYcJJapMshTGlGEaDCCxrUy0vfA5P7GfmSWm/ecZ+mjJEkj/KF6 yU8dZN5q8D5J3qvzCPgoJIsWINiUm/eGnqPVaqoQFt0ODPrxMh2IleIxUUXc9hsuzlbI 1otA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=p3KBqG1itLeeF16mOH/6ZPxRmKSqFjymw7/0xxxtHFg=; b=ZQBCyje9Ij4vfBDZf4q84pcz1LWU6w1iruxPjMlPTA4xQ4SjnT0tV/aL3yhTEPE/9v g8NJmPVeD65kZLwobdqZH1NFOK48RBRlrVVP18lokiAdKmAudkTRfoj6c4+PHxiYf2DB WBO1f2GlgTDpXJqLGPqJknkZlUD2Dr8oGWseoGNd7smBLmhRsjZr4ibMdJG77o5VbRnZ sknZxDrU8YCMf3qFBgsKU3GF6gLZhHva2//a3eAUNp0W5gtzjZCSQCUtGGJNcAdmID9C +3r0khDFTnPuQ1IeA71vzLknAXt+jXu27cF3+RsQkLpz1n7bU6phkVG2DxGcoR5iEsqD LcaA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=N8uGi9OJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ce9-v6si11933644plb.364.2018.06.30.12.24.44; Sat, 30 Jun 2018 12:24:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=N8uGi9OJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751683AbeF3TYG (ORCPT + 99 others); Sat, 30 Jun 2018 15:24:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:35050 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751450AbeF3TYF (ORCPT ); Sat, 30 Jun 2018 15:24:05 -0400 Received: from localhost (unknown [69.71.4.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AA14F240E3; Sat, 30 Jun 2018 19:24:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1530386644; bh=lpnlRBT36rooQPFX3qan3jron4LMfmGE/bH06GC/oR4=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=N8uGi9OJsVRkLy4RKgitehaIKeeSUv6u75uItuyujavgZbDgeSVOOJ11Ipse69a2+ 0zG1yBfRkGlsI3UDklOplqzEDYlfm4g3EakIDj3Ds/KY+AxPQDdvbUN82AwW7uo1qj YU8mfwAvR1112dqe5nAf5XDnWvyGXvm2fu3IyumU= Date: Sat, 30 Jun 2018 14:24:03 -0500 From: Bjorn Helgaas To: Sinan Kaya Cc: linux-pci@vger.kernel.org, linux-arm-msm@vger.kernel.org, Bjorn Helgaas , open list , linux-arm-kernel@lists.infradead.org Subject: Re: [PATCH V3] PCI: Enable PASID when End-to-End TLP is supported by all bridges Message-ID: <20180630192403.GC9547@bhelgaas-glaptop.roam.corp.google.com> References: <1530372264-20653-1-git-send-email-okaya@codeaurora.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1530372264-20653-1-git-send-email-okaya@codeaurora.org> User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Jun 30, 2018 at 11:24:24AM -0400, Sinan Kaya wrote: > A PCIe endpoint carries the process address space identifier (PASID) in > the TLP prefix as part of the memory read/write transaction. The address > information in the TLP is relevant only for a given PASID context. > > An IOMMU takes PASID value and the address information from the > TLP to look up the physical address in the system. > > PASID is an End-End TLP Prefix (PCIe r4.0, sec 6.20). Sec 2.2.10.2 says > > It is an error to receive a TLP with an End-End TLP Prefix by a > Receiver that does not support End-End TLP Prefixes. A TLP in > violation of this rule is handled as a Malformed TLP. This is a > reported error associated with the Receiving Port (see Section 6.2). > > Prevent error condition by proactively requiring End-to-End TLP > prefix to be supported on the entire data path between the endpoint and > the root port before enabling PASID. > > Signed-off-by: Sinan Kaya Applied to pci/virtualization for v4.19, thanks! > --- > drivers/pci/ats.c | 3 +++ > drivers/pci/probe.c | 24 ++++++++++++++++++++++++ > include/linux/pci.h | 1 + > include/uapi/linux/pci_regs.h | 1 + > 4 files changed, 29 insertions(+) > > diff --git a/drivers/pci/ats.c b/drivers/pci/ats.c > index 4923a2a..5b78f3b 100644 > --- a/drivers/pci/ats.c > +++ b/drivers/pci/ats.c > @@ -273,6 +273,9 @@ int pci_enable_pasid(struct pci_dev *pdev, int features) > if (WARN_ON(pdev->pasid_enabled)) > return -EBUSY; > > + if (!pdev->eetlp_prefix_path) > + return -EINVAL; > + > pos = pci_find_ext_capability(pdev, PCI_EXT_CAP_ID_PASID); > if (!pos) > return -EINVAL; > diff --git a/drivers/pci/probe.c b/drivers/pci/probe.c > index ac876e3..39fd3ac 100644 > --- a/drivers/pci/probe.c > +++ b/drivers/pci/probe.c > @@ -2042,6 +2042,29 @@ static void pci_configure_ltr(struct pci_dev *dev) > #endif > } > > +static void pci_configure_eetlp_prefix(struct pci_dev *dev) > +{ > +#ifdef CONFIG_PCI_PASID > + struct pci_dev *bridge; > + u32 cap; > + > + if (!pci_is_pcie(dev)) > + return; > + > + pcie_capability_read_dword(dev, PCI_EXP_DEVCAP2, &cap); > + if (!(cap & PCI_EXP_DEVCAP2_E2ETLP)) > + return; > + > + if (pci_pcie_type(dev) == PCI_EXP_TYPE_ROOT_PORT) > + dev->eetlp_prefix_path = 1; > + else { > + bridge = pci_upstream_bridge(dev); > + if (bridge && bridge->eetlp_prefix_path) > + dev->eetlp_prefix_path = 1; > + } > +#endif > +} > + > static void pci_configure_device(struct pci_dev *dev) > { > struct hotplug_params hpp; > @@ -2051,6 +2074,7 @@ static void pci_configure_device(struct pci_dev *dev) > pci_configure_extended_tags(dev, NULL); > pci_configure_relaxed_ordering(dev); > pci_configure_ltr(dev); > + pci_configure_eetlp_prefix(dev); > > memset(&hpp, 0, sizeof(hpp)); > ret = pci_get_hp_params(dev, &hpp); > diff --git a/include/linux/pci.h b/include/linux/pci.h > index 340029b..6ba8184 100644 > --- a/include/linux/pci.h > +++ b/include/linux/pci.h > @@ -350,6 +350,7 @@ struct pci_dev { > unsigned int ltr_path:1; /* Latency Tolerance Reporting > supported from root to here */ > #endif > + unsigned int eetlp_prefix_path:1; /* End-to-End TLP Prefix */ > > pci_channel_state_t error_state; /* Current connectivity state */ > struct device dev; /* Generic device interface */ > diff --git a/include/uapi/linux/pci_regs.h b/include/uapi/linux/pci_regs.h > index 4da87e2..a617ab2 100644 > --- a/include/uapi/linux/pci_regs.h > +++ b/include/uapi/linux/pci_regs.h > @@ -636,6 +636,7 @@ > #define PCI_EXP_DEVCAP2_OBFF_MASK 0x000c0000 /* OBFF support mechanism */ > #define PCI_EXP_DEVCAP2_OBFF_MSG 0x00040000 /* New message signaling */ > #define PCI_EXP_DEVCAP2_OBFF_WAKE 0x00080000 /* Re-use WAKE# for OBFF */ > +#define PCI_EXP_DEVCAP2_E2ETLP 0x00200000 /* End-to-End TLP Prefix */ > #define PCI_EXP_DEVCTL2 40 /* Device Control 2 */ > #define PCI_EXP_DEVCTL2_COMP_TIMEOUT 0x000f /* Completion Timeout Value */ > #define PCI_EXP_DEVCTL2_COMP_TMOUT_DIS 0x0010 /* Completion Timeout Disable */ > -- > 2.7.4 > > > _______________________________________________ > linux-arm-kernel mailing list > linux-arm-kernel@lists.infradead.org > http://lists.infradead.org/mailman/listinfo/linux-arm-kernel