Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp3088395ybt; Mon, 29 Jun 2020 15:03:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwJ9RzQ/zmTj0Mr1aWuQyUuuAxEet7kbVd4Q7h7NdqjyPuybEbFizsoGp8myZHOQoTgk+K/ X-Received: by 2002:a17:906:f49:: with SMTP id h9mr16543796ejj.155.1593468218986; Mon, 29 Jun 2020 15:03:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593468218; cv=none; d=google.com; s=arc-20160816; b=gRZa9kOClSUYmiXgeyRhDAY4R3g/oLUZHAajMIYZwMGrXAAVZ/jHJSmzO/HOQTtraF VKob45pxXVyxXnl9IsHMh7iUxxjAyzR+k+874NT2yK25p5zC2xZ6ml7jorsx/+mqBFKx RuXvTxE1zajvYPFDu1Osg3C8ZVlV4Es9E7fw2Q03Mbw7okPC3FE3PWgYkEwjPschr07Z AGZPZYprqOXo7Z6bP38s/PepxZpT3v1EdEZuUcQsDkv42NtNPPwJ8QX/SNMj13+HwGbz 5JqZ60eeNF582gJJeTlcj2tHui4O5JH6lK4dp9z3FyRGZ9a/uJ+UpBf2Loev+CgViA2O y5zA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=IHJTzGCsJQR+NsYmUBVydumG9YEEJWY6FEvh0iNChQQ=; b=heYTaeDysUrCjaIN3uObFcHlZuOg41+P1IGcUsO8k13XUar+cT5JuC6bkqe9n3ptYW LUxa7TSEeBo6WdyaBSutCQZGQzcyv7gEuN4xRvBB8pfttcTH2kiF+NbyS1QXK2nODNj9 ILHGKP0eQQKF1qDzL1fXqs7kEPiajfy2ieFcfEM6XYLzC78uidXpmBwsdj/a2GKKrPjQ SncpcNCytX1vZZf+b7Z8cSD55/6p3czsFUh/yZLwFx+XiBofyTxAAJWKVs7di7WpHkhn UiZymW4CHzHLgnEAY/LpWI4RiB0aXGn+dpaoiJkmX4WUbosSpgS8m444MF+olOP1lcls ZabA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DNwePhBp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d5si542590ejm.223.2020.06.29.15.03.15; Mon, 29 Jun 2020 15:03:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DNwePhBp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387441AbgF2WBw (ORCPT + 99 others); Mon, 29 Jun 2020 18:01:52 -0400 Received: from mail.kernel.org ([198.145.29.99]:56790 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726248AbgF2SfY (ORCPT ); Mon, 29 Jun 2020 14:35:24 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 22A94246F0; Mon, 29 Jun 2020 15:20:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593444036; bh=N0ijplVvcF9uZZu2JhVQaZooxRDw2w5dSphqSIH3Ues=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DNwePhBpU7mCNWm7uy37TKScrR1Rq/UbL0seA4C0ye0H3Rif3r4Ph+SUavBAMQHIl HmA+odM3qR8GpOqOFsMYsvJxjzT4BWQUmGzB7IOjB5rhSAj+NugXgZVdRaSJ8IflTL rBUAuouNF7xUqWqFTM6o/IU1PvvmnXUAhgbV6oR8= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Lu Baolu , Lalithambika Krishnakumar , Mika Westerberg , Ashok Raj , Joerg Roedel , Sasha Levin Subject: [PATCH 5.7 143/265] iommu/vt-d: Enable PCI ACS for platform opt in hint Date: Mon, 29 Jun 2020 11:16:16 -0400 Message-Id: <20200629151818.2493727-144-sashal@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200629151818.2493727-1-sashal@kernel.org> References: <20200629151818.2493727-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.7.7-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.7.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.7.7-rc1 X-KernelTest-Deadline: 2020-07-01T15:14+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Lu Baolu [ Upstream commit 50310600ebda74b9988467e2e6128711c7ba56fc ] PCI ACS is disabled if Intel IOMMU is off by default or intel_iommu=off is used in command line. Unfortunately, Intel IOMMU will be forced on if there're devices sitting on an external facing PCI port that is marked as untrusted (for example, thunderbolt peripherals). That means, PCI ACS is disabled while Intel IOMMU is forced on to isolate those devices. As the result, the devices of an MFD will be grouped by a single group even the ACS is supported on device. [ 0.691263] pci 0000:00:07.1: Adding to iommu group 3 [ 0.691277] pci 0000:00:07.2: Adding to iommu group 3 [ 0.691292] pci 0000:00:07.3: Adding to iommu group 3 Fix it by requesting PCI ACS when Intel IOMMU is detected with platform opt in hint. Fixes: 89a6079df791a ("iommu/vt-d: Force IOMMU on for platform opt in hint") Co-developed-by: Lalithambika Krishnakumar Signed-off-by: Lalithambika Krishnakumar Signed-off-by: Lu Baolu Reviewed-by: Mika Westerberg Cc: Mika Westerberg Cc: Ashok Raj Link: https://lore.kernel.org/r/20200622231345.29722-5-baolu.lu@linux.intel.com Signed-off-by: Joerg Roedel Signed-off-by: Sasha Levin --- drivers/iommu/dmar.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/iommu/dmar.c b/drivers/iommu/dmar.c index f77dae7ba7d40..7df5621bba8de 100644 --- a/drivers/iommu/dmar.c +++ b/drivers/iommu/dmar.c @@ -898,7 +898,8 @@ int __init detect_intel_iommu(void) if (!ret) ret = dmar_walk_dmar_table((struct acpi_table_dmar *)dmar_tbl, &validate_drhd_cb); - if (!ret && !no_iommu && !iommu_detected && !dmar_disabled) { + if (!ret && !no_iommu && !iommu_detected && + (!dmar_disabled || dmar_platform_optin())) { iommu_detected = 1; /* Make sure ACS will be enabled */ pci_request_acs(); -- 2.25.1