Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp322797ybt; Mon, 6 Jul 2020 10:09:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyEJWP+SICfKOpc5hGkdCK8+sDa9OrU9uAgmxRLxBSLsuly/EVgMD3ADJSE1TTz2xDg5WkR X-Received: by 2002:a50:e689:: with SMTP id z9mr9627538edm.131.1594055365976; Mon, 06 Jul 2020 10:09:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594055365; cv=none; d=google.com; s=arc-20160816; b=Rnx/QUe1sbpp7an6rpNOKGTsgjsNgGxHQJft5Bj+puZruBMSLxvOgX+Nd5V6DBxqr4 dzbwWfwJJgyPgsa3JK5KJG87SukmOIBEEf6aWjvqXmCC3pRHxXv/RaxLciFnJ/RCxbHm ODo2osmVTHzZ0rqlWGoLqQVdgHGhhrFNXU/6EJETgGr0HZSWu/1JnSv1w1iCRN/iEHi1 UGIT+yMpLu4B8XtHWc+tolnyWgoLERlF07cvB7mOfN4kEsTXAHp3UgnDeeprDrCbdIpD qH3xebttLnW+TNLexxqrJd7uVlXyGW2EpyuqrkFfLRjWHH7+As8snd7L52jX0wzuNuDe RKSg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:message-id:subject:cc:to:from:date:dkim-signature; bh=R0AIIJesRH2sjZaiNmjWJ4wIz5Gv8wZOF1SVz0xVgDY=; b=iOAu/NEzyogxGYqdm+fPQAUbbG1OxuJRqfvhnhJdYJuAEW7TJr9rVHRZ+ZHyBrC5v+ I+vLkATnz2yItVIxkYqqkuNbrKFkyy1SWYO9TRK0OBFcsfqv6ivDW8BxEhz60CX+HfoQ i+dkKhuVGHeYkVC1AMQRC4to/1QA3aap1s441l6VoljHz0mDqD395ybDFgqzh/am1HXl EDG78d6EjmFqdO285Zq2suO+ZndL5HYxb7NHln8iP2wlKjW5Wo1eleGMG9gN47idnKmU nm+aazvWmpZ2hUVCmRR7pew3hNtJBTk5za0QT+Q5fIR1/SgcCQklxzz7uwJL6NsfkFnX nb1w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="bTn70ba/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cb9si13338479ejb.176.2020.07.06.10.09.02; Mon, 06 Jul 2020 10:09:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="bTn70ba/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729629AbgGFRHj (ORCPT + 99 others); Mon, 6 Jul 2020 13:07:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:50448 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729478AbgGFRHj (ORCPT ); Mon, 6 Jul 2020 13:07:39 -0400 Received: from localhost (mobile-166-175-191-139.mycingular.net [166.175.191.139]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3B60621582; Mon, 6 Jul 2020 17:07:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594055258; bh=cgNaJHVbncoKaqoIbXTBer9BB2nT8TXGZr+shQ3g/Xs=; h=Date:From:To:Cc:Subject:In-Reply-To:From; b=bTn70ba/xuVwnxBCjc4lESFrm5pgWMuOMTIBxZY74YZ8UuoFBHzJvM0rbGpRChWZP /If90R9yPSWmBDE8XSdiC23JSZBjzIoDHXMltHgbv1FswHQbry2CAC1qVeO8AiYWog PhOIsaTPF8/VDgpwRsVq2HtQZIguzla6VUrLfzwg= Date: Mon, 6 Jul 2020 12:07:36 -0500 From: Bjorn Helgaas To: Rajat Jain Cc: David Woodhouse , Lu Baolu , Joerg Roedel , Bjorn Helgaas , "Rafael J. Wysocki" , Len Brown , iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org, linux-pci@vger.kernel.org, linux-acpi@vger.kernel.org, Raj Ashok , lalithambika.krishnakumar@intel.com, Mika Westerberg , Jean-Philippe Brucker , Prashant Malani , Benson Leung , Todd Broch , Alex Levin , Mattias Nissler , Rajat Jain , Bernie Keany , Aaron Durbin , Diego Rivas , Duncan Laurie , Furquan Shaikh , Jesse Barnes , Christian Kellner , Alex Williamson , Greg Kroah-Hartman , oohall@gmail.com, Saravana Kannan , Suzuki K Poulose , Arnd Bergmann , Heikki Krogerus Subject: Re: [PATCH v2 3/7] PCI/ACS: Enable PCI_ACS_TB for untrusted/external-facing devices Message-ID: <20200706170736.GA125844@bjorn-Precision-5520> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200630044943.3425049-4-rajatja@google.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 29, 2020 at 09:49:39PM -0700, Rajat Jain wrote: > When enabling ACS, enable translation blocking for external facing ports > and untrusted devices. > > Signed-off-by: Rajat Jain > --- > v2: Commit log change > > drivers/pci/pci.c | 4 ++++ > drivers/pci/quirks.c | 11 +++++++++++ > 2 files changed, 15 insertions(+) > > diff --git a/drivers/pci/pci.c b/drivers/pci/pci.c > index d2ff987585855..79853b52658a2 100644 > --- a/drivers/pci/pci.c > +++ b/drivers/pci/pci.c > @@ -3330,6 +3330,10 @@ static void pci_std_enable_acs(struct pci_dev *dev) > /* Upstream Forwarding */ > ctrl |= (cap & PCI_ACS_UF); > > + if (dev->external_facing || dev->untrusted) > + /* Translation Blocking */ > + ctrl |= (cap & PCI_ACS_TB); > + > pci_write_config_word(dev, pos + PCI_ACS_CTRL, ctrl); > } > > diff --git a/drivers/pci/quirks.c b/drivers/pci/quirks.c > index b341628e47527..6294adeac4049 100644 > --- a/drivers/pci/quirks.c > +++ b/drivers/pci/quirks.c > @@ -4934,6 +4934,13 @@ static void pci_quirk_enable_intel_rp_mpc_acs(struct pci_dev *dev) > } > } > > +/* > + * Currently this quirk does the equivalent of > + * PCI_ACS_RR | PCI_ACS_CR | PCI_ACS_UF | PCI_ACS_SV Nit: Reorder these as in c8de8ed2dcaa ("PCI: Make ACS quirk implementations more uniform") so they match other similar lists in the code. But more to the point: we have a bunch of other quirks for devices that do not have an ACS capability but *do* provide some ACS-like features. Most of them support PCI_ACS_SV | PCI_ACS_RR | PCI_ACS_CR | PCI_ACS_UF because that's what we usually want. But I bet some of them also actually provide the equivalent of PCI_ACS_TB. REQ_ACS_FLAGS doesn't include PCI_ACS_TB. Is there anything we need to do on the pci_acs_enabled() side to check for PCI_ACS_TB, and consequently, to update any of the quirks for devices that provide it? > + * > + * Currently missing, it also needs to do equivalent of PCI_ACS_TB, > + * if dev->external_facing || dev->untrusted > + */ > static int pci_quirk_enable_intel_pch_acs(struct pci_dev *dev) > { > if (!pci_quirk_intel_pch_acs_match(dev)) > @@ -4973,6 +4980,10 @@ static int pci_quirk_enable_intel_spt_pch_acs(struct pci_dev *dev) > ctrl |= (cap & PCI_ACS_CR); > ctrl |= (cap & PCI_ACS_UF); > > + if (dev->external_facing || dev->untrusted) > + /* Translation Blocking */ > + ctrl |= (cap & PCI_ACS_TB); > + > pci_write_config_dword(dev, pos + INTEL_SPT_ACS_CTRL, ctrl); > > pci_info(dev, "Intel SPT PCH root port ACS workaround enabled\n"); > -- > 2.27.0.212.ge8ba1cc988-goog >