Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp1767353pxb; Wed, 9 Feb 2022 04:10:11 -0800 (PST) X-Google-Smtp-Source: ABdhPJyptFUsEzLAyUEqMQXkhGybva5IFU7T3TYf5j8L5n2jqG0uSK9+X/nJBbT0yoS8gddqlgaN X-Received: by 2002:a05:6402:d0d:: with SMTP id eb13mr2184154edb.186.1644408610725; Wed, 09 Feb 2022 04:10:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644408610; cv=none; d=google.com; s=arc-20160816; b=L0QdhL9TPQc8FpUaYKuCBJOYwQQrPPcPBkIlgeWGtFAaA3V3vcEPufr68ste2RL5PB ayQRUV3hHyBNOjTJE8DCzIZkx78K9Dr6462DLy2dcbIVhr22HmISRoGkCjZGiGhEf+Wm KREoT6CUr2E6O5njTdUEJB+z/vt9mLVlc5/g9rr3xVsYCZW3VtnqbfBrn2kmggWWcYPd G+4s5slCOQyak3OKgREf1rvajyHM/KAOp+TaY3w7HF5hoswOb7l4cBojvaqIIxrTVGx9 SHcuJNoJTp167RySvEwU+P+99HPM40pRKxXSHDbBtkhtfP0afeDm3uAu3naizOh91Yys jeEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=DYNXR2DtuxF1ISLzpPLoyEyGiOJ7sBlng/Jv7KiUcBE=; b=Q97Ob9UlMDJjdyn/DkYRCudPOeQn5vCqXyFL9L8Mf7lPvhdymgDQ6t61i4oqKSHY28 g7sY0Rv7+dQwQ07QcKNK1+s6sfXYDeYPPWjfxc7ao/sMAjb95+CyNsloLQM73fv/fqve cQK3oF6v15nSCEqylburCYC7+m+9O31h3PjqajEL6Cw70c9l+tf1+coERJ1zNh3x3mkn eWO0uDDu6fsTybq1rF8EqwXdxNGwRZ+QVZvGiO/b+kuPNCbCpCghqef16dj3XVhjyrGW 1FaRxMpRsQ8ilHwYhIk8N6vcBz/Qe9pj1yBmRPNXbt9WOSyYWmc7IX5KYjFQsNx/al2h WeYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=VxlJfskh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ds1si7074317ejc.1.2022.02.09.04.09.45; Wed, 09 Feb 2022 04:10:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=VxlJfskh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233443AbiBIAYH (ORCPT + 99 others); Tue, 8 Feb 2022 19:24:07 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35664 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229956AbiBIAYG (ORCPT ); Tue, 8 Feb 2022 19:24:06 -0500 Received: from mail-pj1-x1031.google.com (mail-pj1-x1031.google.com [IPv6:2607:f8b0:4864:20::1031]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 25E73C06173B for ; Tue, 8 Feb 2022 16:24:04 -0800 (PST) Received: by mail-pj1-x1031.google.com with SMTP id t14-20020a17090a3e4e00b001b8f6032d96so623724pjm.2 for ; Tue, 08 Feb 2022 16:24:04 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=DYNXR2DtuxF1ISLzpPLoyEyGiOJ7sBlng/Jv7KiUcBE=; b=VxlJfskh25n9CGF6UK57dB54CJXlDoep5C3N0smYrTdby67X/6qk5Sk7HFgMDS+nGY AzoiVQXLD0zX8n/JzPWPnuoJP4lce+qxe7/XN61DoUql4/ek5ls0IMNRKeE94m0bm/gY cfT5FrbMtbIqBaACvO397ODwQRm/U6DIWtJ6dhWxc0WDClqqFyqNLeTFfHsevZWbE5q3 cwzPNdId6TH00LMJppPQxBnP9hhTWODlnfeYkG/m3Ojtz4sIieW0oyczghQl9ZkyeB1T cdpt7CxfDkihd9SNrVTXaJx8ESUyXBr7GN+fbte3Yb50ycgG7mu3UVHP/0wuM8FLqbbg LlGA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=DYNXR2DtuxF1ISLzpPLoyEyGiOJ7sBlng/Jv7KiUcBE=; b=qYu6TWFZ3DS4k2Gs9Rs6hU72clnH/X3e0bQVl5DXvT45GUTUjzIPoNYzE8D9tF4L0n ZUmu08tkhRGK8tzldO7Zyp/ZHR2hpHQRy7hpKFe/Ep9XFe7O2I1+mW9wPWkMpDAUtraz 6nQnZVdfKiKl2oMl7nUnGXW+LWgnLkJiCY824OQal2S35DLaQB5RrNHSC6mYpbQqR7Ib bFERu0mK5QvqVpvGaZRzquoneI8B9ZJui2+pfDlbgUdDvzje2YzSSXfvCsTCahGkAuzj QzzopVgKC//4pbPbHWMi9S9veBMcS7VKS587CaCcRBzaf3iAt0x2PindKPwAgCLs/UZH 1nuQ== X-Gm-Message-State: AOAM530nvwPY/jn37dHwM6ol/Tfupv9Ze3/46qw3Vp98T80fNpInmFWN miupWDQupSH3k4vqB/8E32CpBg/7+SXM5ulgXukFEPVnFE5h5A== X-Received: by 2002:a17:90a:5303:: with SMTP id x3mr64365pjh.64.1644366243349; Tue, 08 Feb 2022 16:24:03 -0800 (PST) MIME-Version: 1.0 References: <20220202020103.2149130-1-rajatja@google.com> In-Reply-To: <20220202020103.2149130-1-rajatja@google.com> From: Rajat Jain Date: Tue, 8 Feb 2022 16:23:27 -0800 Message-ID: Subject: Re: [PATCH v2 1/2] PCI: Allow internal devices to be marked as untrusted To: Rob Herring , "Rafael J. Wysocki" , Len Brown , linux-pci@vger.kernel.org, devicetree@vger.kernel.org, Mika Westerberg , Greg Kroah-Hartman , Bjorn Helgaas , Bjorn Helgaas , ACPI Devel Maling List , Linux Kernel Mailing List , Rajat Jain , Dmitry Torokhov , Jesse Barnes , Jean-Philippe Brucker , Pavel Machek , "Oliver O'Halloran" , Joerg Roedel Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello Folks, On Tue, Feb 1, 2022 at 6:01 PM Rajat Jain wrote: > > Today the pci_dev->untrusted is set for any devices sitting downstream > an external facing port (determined via "ExternalFacingPort" or the > "external-facing" properties). > > However, currently there is no way for internal devices to be marked as > untrusted. > > There are use-cases though, where a platform would like to treat an > internal device as untrusted (perhaps because it runs untrusted firmware > or offers an attack surface by handling untrusted network data etc). > > Introduce a new "UntrustedDevice" property that can be used by the > firmware to mark any device as untrusted. Just to unite the threads (from https://www.spinics.net/lists/linux-pci/msg120221.html). I did reach out to Microsoft but they haven't acknowledged my email. I also pinged them again yesterday, but I suspect I may not be able to break the ice. So this patch may be ready to go in my opinion. I don't see any outstanding comments on this patch, but please let me know if you have any comments. Thanks & Best Regards, Rajat > > Signed-off-by: Rajat Jain > --- > v2: * Also use the same property for device tree based systems. > * Add documentation (next patch) > > drivers/pci/of.c | 2 ++ > drivers/pci/pci-acpi.c | 1 + > drivers/pci/pci.c | 9 +++++++++ > drivers/pci/pci.h | 2 ++ > 4 files changed, 14 insertions(+) > > diff --git a/drivers/pci/of.c b/drivers/pci/of.c > index cb2e8351c2cc..e8b804664b69 100644 > --- a/drivers/pci/of.c > +++ b/drivers/pci/of.c > @@ -24,6 +24,8 @@ void pci_set_of_node(struct pci_dev *dev) > dev->devfn); > if (dev->dev.of_node) > dev->dev.fwnode = &dev->dev.of_node->fwnode; > + > + pci_set_untrusted(dev); > } > > void pci_release_of_node(struct pci_dev *dev) > diff --git a/drivers/pci/pci-acpi.c b/drivers/pci/pci-acpi.c > index a42dbf448860..2bffbd5c6114 100644 > --- a/drivers/pci/pci-acpi.c > +++ b/drivers/pci/pci-acpi.c > @@ -1356,6 +1356,7 @@ void pci_acpi_setup(struct device *dev, struct acpi_device *adev) > > pci_acpi_optimize_delay(pci_dev, adev->handle); > pci_acpi_set_external_facing(pci_dev); > + pci_set_untrusted(pci_dev); > pci_acpi_add_edr_notifier(pci_dev); > > pci_acpi_add_pm_notifier(adev, pci_dev); > diff --git a/drivers/pci/pci.c b/drivers/pci/pci.c > index 9ecce435fb3f..41e887c27004 100644 > --- a/drivers/pci/pci.c > +++ b/drivers/pci/pci.c > @@ -6869,3 +6869,12 @@ static int __init pci_realloc_setup_params(void) > return 0; > } > pure_initcall(pci_realloc_setup_params); > + > +void pci_set_untrusted(struct pci_dev *pdev) > +{ > + u8 val; > + > + if (!device_property_read_u8(&pdev->dev, "UntrustedDevice", &val) > + && val) > + pdev->untrusted = 1; > +} > diff --git a/drivers/pci/pci.h b/drivers/pci/pci.h > index 3d60cabde1a1..6c273ce5e0ba 100644 > --- a/drivers/pci/pci.h > +++ b/drivers/pci/pci.h > @@ -761,4 +761,6 @@ static inline pci_power_t mid_pci_get_power_state(struct pci_dev *pdev) > } > #endif > > +void pci_set_untrusted(struct pci_dev *pdev); > + > #endif /* DRIVERS_PCI_H */ > -- > 2.35.0.rc2.247.g8bbb082509-goog >