Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp1646326rwb; Sun, 14 Aug 2022 08:39:02 -0700 (PDT) X-Google-Smtp-Source: AA6agR6+CLOFc8A6oGBCDW8Pfydsx5XatDuKx8sUQ5Kj3+SQzS12g5dPfgsciA8cW2nQcNqXu0TI X-Received: by 2002:a17:907:761b:b0:738:4c1c:7dd with SMTP id jx27-20020a170907761b00b007384c1c07ddmr1171806ejc.563.1660491541882; Sun, 14 Aug 2022 08:39:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660491541; cv=none; d=google.com; s=arc-20160816; b=X81t4FcLw1lfwn4lsN0UgXI/DbkNI/upQ0yS0s72oViqyVPHhhE2VrWApuJFkylLsb SmZZ6J76hDqNJlCgOGnHRYIFBHO+71eysuzrY+DA3btUPtOe6rohujXoZ92oudaQbuDv +PEYORNPRSAfnu0HiQmvuUe9cFNER05RWCRYD5H09dfPMfz9pUsKJ1z1ft8nHR2yWi7V InLzBILB0QaKRcyhqmr4ptlOh3ocINUe07dHK5xPETotkZ+zHSmpYJmFDHpWIYhkbN9E UOf9+iqGQ5RQmgK+ZoEoEKdHaJGqNFcRDuL03S2PL0DuT5/Evd2RYnYnThJh4yVm+FIu CgTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=8MT1su1tyu1uA2wyFn2oUzQLjiefAtV9FtVItaixKcs=; b=JZegJF82GPlkDANxPeyebz+sVJiqkTkhGutxSc/qcNkHGXxMXRG/dEwER+3hVBGObo DNGWkxDQghQapcWQDFFZF2mDL89JXtsfq8PbVLti1z2/K+K0O92fiYbdJFZ0BMeWz6GE cKx/LOgIfEeI5tpUOuMDUbAYDC65zPzYZnZtFnIlMgKK0963DPi8BrXuT8YWAgidflTj Q9mT1ZZxJEra6Rn8r/RFxLX7WJhY1szqZlV/wspyuNVK1kNHm0sLoRMs+gKDfXC/g+/z 4fN1hPe/zDzxYOm2v01/mu/aJkgphssqbFrSalPoVf/mj8Rw3OGNwXNmFcLpvZ9srhKX Tihw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=qY8jbHtD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id mp27-20020a1709071b1b00b0073083c63edcsi6000382ejc.306.2022.08.14.08.38.36; Sun, 14 Aug 2022 08:39:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=qY8jbHtD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231976AbiHNPYy (ORCPT + 99 others); Sun, 14 Aug 2022 11:24:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33100 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231681AbiHNPYr (ORCPT ); Sun, 14 Aug 2022 11:24:47 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A770D65FC; Sun, 14 Aug 2022 08:24:45 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 45314B80B27; Sun, 14 Aug 2022 15:24:44 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3DB55C433C1; Sun, 14 Aug 2022 15:24:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1660490682; bh=XoTiZoUVZX4pd9WYhnysuZkslFJxFicRZdPAq2tGTyg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qY8jbHtDgFw+1QDEpQXs29aR9mg2W/H3kXt4M2OTl/PBSFo90AHNcf6yZv2InJ57Q RwLI2RlwJx9UuKmGe76eqkoXymSLuoW7Yh5WUDuEuIOuUecBJt+Njz3b46O0Q+3ZG7 Sq/VI9csD/HF3tnbSv1rMdKf9D3oEFb92x39gCmwWSLbqiOkcmeMgSvDKZsMzM97+n W0COnuCX024WS+lQez0VOfpRn23GOKGUzvLjZLiptqwx9/PMoQ6z/vg9Mcnjj5+n9J p4KvVNnLjMNFMUAy0fPTdh7i/2ABbtbQTEutY+A3lgEvWcIp5zFCchzGF5GEgmeNi9 KnJQQVU+kCzfA== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Pavan Chebbi , Michael Chan , Bjorn Helgaas , Sasha Levin , linux-pci@vger.kernel.org Subject: [PATCH AUTOSEL 5.19 03/64] PCI: Add ACS quirk for Broadcom BCM5750x NICs Date: Sun, 14 Aug 2022 11:23:36 -0400 Message-Id: <20220814152437.2374207-3-sashal@kernel.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220814152437.2374207-1-sashal@kernel.org> References: <20220814152437.2374207-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.2 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Pavan Chebbi [ Upstream commit afd306a65cedb9589564bdb23a0c368abc4215fd ] The Broadcom BCM5750x NICs may be multi-function devices. They do not advertise ACS capability. Peer-to-peer transactions are not possible between the individual functions, so it is safe to treat them as fully isolated. Add an ACS quirk for these devices so the functions can be in independent IOMMU groups and attached individually to userspace applications using VFIO. Link: https://lore.kernel.org/r/1654796507-28610-1-git-send-email-michael.chan@broadcom.com Signed-off-by: Pavan Chebbi Signed-off-by: Michael Chan Signed-off-by: Bjorn Helgaas Signed-off-by: Sasha Levin --- drivers/pci/quirks.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/drivers/pci/quirks.c b/drivers/pci/quirks.c index 41aeaa235132..2e68f50bc7ae 100644 --- a/drivers/pci/quirks.c +++ b/drivers/pci/quirks.c @@ -4924,6 +4924,9 @@ static const struct pci_dev_acs_enabled { { PCI_VENDOR_ID_AMPERE, 0xE00C, pci_quirk_xgene_acs }, /* Broadcom multi-function device */ { PCI_VENDOR_ID_BROADCOM, 0x16D7, pci_quirk_mf_endpoint_acs }, + { PCI_VENDOR_ID_BROADCOM, 0x1750, pci_quirk_mf_endpoint_acs }, + { PCI_VENDOR_ID_BROADCOM, 0x1751, pci_quirk_mf_endpoint_acs }, + { PCI_VENDOR_ID_BROADCOM, 0x1752, pci_quirk_mf_endpoint_acs }, { PCI_VENDOR_ID_BROADCOM, 0xD714, pci_quirk_brcm_acs }, /* Amazon Annapurna Labs */ { PCI_VENDOR_ID_AMAZON_ANNAPURNA_LABS, 0x0031, pci_quirk_al_acs }, -- 2.35.1