Received: by 2002:a17:90a:88:0:0:0:0 with SMTP id a8csp57474pja; Fri, 22 Nov 2019 03:24:45 -0800 (PST) X-Google-Smtp-Source: APXvYqzGf2qWJBIrGCVYmZyNJ+pVtMiU3HJ+IY8vPcMHLUzNQPJItY5oOTlCS6V7JaxWwXI5FKLG X-Received: by 2002:a50:b685:: with SMTP id d5mr412300ede.276.1574421885263; Fri, 22 Nov 2019 03:24:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574421885; cv=none; d=google.com; s=arc-20160816; b=taVWRmWfREBH1NYQ82VElGpTGe8b1VlQ0JHSBNZGHwBCS98Ef9wkj5spFYTf5wre5G 6OW3qj7R2vF0iSmU2Z2SXgwnzivCd19o/Kj9Sq/rLtcOWgz9G1JJgsMkx26zR+uB5cBg Ry3qXw0nfGVgSCcrPrUi42VxqiGsASuuScpTqALQdoKTtswkOcuboqnBsHjPGDH+lweN DX3YOrZbSCiCnJbk6vk4d86h4MJJXgVIOifZIIDcEUgvj+nZu630ygXv/zqettGhURyN LUHQZmjy1/zaiaR4AQNcbKatSWNVQK+8g52NJHVgqB+LHHtN/vjhf88BI1OEfhd8fReg yjgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JHEW/Z6vRtbBSUIwz0325V9uLFcGdj87MQr+ipAvl/Q=; b=j1d2Elr6MjmcoNIxUrQG1atdScNEhXDCW0m+/LUHp1SpJH3XGCWrl3MAfeVT+t5Fdi 0HXxRgtewqObm6J69kdTUOvTrh9A2xkcV6Gkt0GsO8Qg/+FAZbC4+P29NvK77y2S2ACo 9mGPSYyUM2KTu/Q67tg0R/9BQociTAch0S0zd6upW+yUes5kF2imO9obLAKNnyG16oSv xjn3m53Ed26XVe9EOB42Oc1GDn7HFtkUNR+GDQjm0ISwT0qWVpwP1zKKR8XxOZNpHyb8 A8upiLoJrMMPRohZYMOvyinf3/ezcoxDEUE8LeRtqThNsA9W3parDA7LYIztpI2HRtuD 63Xw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HhO3x5bK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z15si3842033eju.310.2019.11.22.03.24.20; Fri, 22 Nov 2019 03:24:45 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HhO3x5bK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729202AbfKVKql (ORCPT + 99 others); Fri, 22 Nov 2019 05:46:41 -0500 Received: from mail.kernel.org ([198.145.29.99]:53872 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727746AbfKVKqi (ORCPT ); Fri, 22 Nov 2019 05:46:38 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D2AE5205C9; Fri, 22 Nov 2019 10:46:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1574419597; bh=h18vsG2/dOzyz5ekVxrrjJAtpSd/yKL1s/yBtgCB0t8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HhO3x5bKVME22TqgYNxtPKTo11IxqrOi6Oqm0RQrJIPCd6kPX4IbnuJWJfWZLOxCB VP5i10e1jqABx1M7KOMR5VD8VxnIcMuQTmohhGEldX9mOFaBycOCdXyu7QyeTacSAy /IHQkT11fURgoO/4a2b8mbxjnMeq8u+t2kRrTmE4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Gage Eads , Ashok Raj , Alex Williamson , Sasha Levin Subject: [PATCH 4.9 123/222] vfio/pci: Mask buggy SR-IOV VF INTx support Date: Fri, 22 Nov 2019 11:27:43 +0100 Message-Id: <20191122100911.959197110@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191122100830.874290814@linuxfoundation.org> References: <20191122100830.874290814@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alex Williamson [ Upstream commit db04264fe9bc0f2b62e036629f9afb530324b693 ] The SR-IOV spec requires that VFs must report zero for the INTx pin register as VFs are precluded from INTx support. It's much easier for the host kernel to understand whether a device is a VF and therefore whether a non-zero pin register value is bogus than it is to do the same in userspace. Override the INTx count for such devices and virtualize the pin register to provide a consistent view of the device to the user. As this is clearly a spec violation, warn about it to support hardware validation, but also provide a known whitelist as it doesn't do much good to continue complaining if the hardware vendor doesn't plan to fix it. Known devices with this issue: 8086:270c Tested-by: Gage Eads Reviewed-by: Ashok Raj Signed-off-by: Alex Williamson Signed-off-by: Sasha Levin --- drivers/vfio/pci/vfio_pci.c | 8 ++++++-- drivers/vfio/pci/vfio_pci_config.c | 27 +++++++++++++++++++++++++++ 2 files changed, 33 insertions(+), 2 deletions(-) diff --git a/drivers/vfio/pci/vfio_pci.c b/drivers/vfio/pci/vfio_pci.c index a1a712d18e028..da3f0ed18c769 100644 --- a/drivers/vfio/pci/vfio_pci.c +++ b/drivers/vfio/pci/vfio_pci.c @@ -426,10 +426,14 @@ static int vfio_pci_get_irq_count(struct vfio_pci_device *vdev, int irq_type) { if (irq_type == VFIO_PCI_INTX_IRQ_INDEX) { u8 pin; + + if (!IS_ENABLED(CONFIG_VFIO_PCI_INTX) || + vdev->nointx || vdev->pdev->is_virtfn) + return 0; + pci_read_config_byte(vdev->pdev, PCI_INTERRUPT_PIN, &pin); - if (IS_ENABLED(CONFIG_VFIO_PCI_INTX) && !vdev->nointx && pin) - return 1; + return pin ? 1 : 0; } else if (irq_type == VFIO_PCI_MSI_IRQ_INDEX) { u8 pos; u16 flags; diff --git a/drivers/vfio/pci/vfio_pci_config.c b/drivers/vfio/pci/vfio_pci_config.c index 06a20ea183dd6..84905d074c4ff 100644 --- a/drivers/vfio/pci/vfio_pci_config.c +++ b/drivers/vfio/pci/vfio_pci_config.c @@ -1608,6 +1608,15 @@ static int vfio_ecap_init(struct vfio_pci_device *vdev) return 0; } +/* + * Nag about hardware bugs, hopefully to have vendors fix them, but at least + * to collect a list of dependencies for the VF INTx pin quirk below. + */ +static const struct pci_device_id known_bogus_vf_intx_pin[] = { + { PCI_DEVICE(PCI_VENDOR_ID_INTEL, 0x270c) }, + {} +}; + /* * For each device we allocate a pci_config_map that indicates the * capability occupying each dword and thus the struct perm_bits we @@ -1673,6 +1682,24 @@ int vfio_config_init(struct vfio_pci_device *vdev) if (pdev->is_virtfn) { *(__le16 *)&vconfig[PCI_VENDOR_ID] = cpu_to_le16(pdev->vendor); *(__le16 *)&vconfig[PCI_DEVICE_ID] = cpu_to_le16(pdev->device); + + /* + * Per SR-IOV spec rev 1.1, 3.4.1.18 the interrupt pin register + * does not apply to VFs and VFs must implement this register + * as read-only with value zero. Userspace is not readily able + * to identify whether a device is a VF and thus that the pin + * definition on the device is bogus should it violate this + * requirement. We already virtualize the pin register for + * other purposes, so we simply need to replace the bogus value + * and consider VFs when we determine INTx IRQ count. + */ + if (vconfig[PCI_INTERRUPT_PIN] && + !pci_match_id(known_bogus_vf_intx_pin, pdev)) + pci_warn(pdev, + "Hardware bug: VF reports bogus INTx pin %d\n", + vconfig[PCI_INTERRUPT_PIN]); + + vconfig[PCI_INTERRUPT_PIN] = 0; /* Gratuitous for good VFs */ } if (!IS_ENABLED(CONFIG_VFIO_PCI_INTX) || vdev->nointx) -- 2.20.1