Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp589880rwb; Fri, 13 Jan 2023 01:29:51 -0800 (PST) X-Google-Smtp-Source: AMrXdXtem/CTlPL+7LnWyZPR6wPrZQL/5KISPtJo7FqxDDrEGndoG4+mN8KCrYJE9GUHRw9+EliF X-Received: by 2002:a05:6402:5006:b0:499:d1ca:6d82 with SMTP id p6-20020a056402500600b00499d1ca6d82mr11242848eda.31.1673602191097; Fri, 13 Jan 2023 01:29:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673602191; cv=none; d=google.com; s=arc-20160816; b=Y/pwLkqygr6qEEfHl886IUnR3JrAdGm9iVaH969Ae4i/VczS3qPGbvRAeAhP2/uscX fTW7qYTKTr7YP9dq2Q8IZ0wmhsBvlb6YfMRuyTVleL2sMv7IdcstvVy5f6cR5KaYgbC5 8aaw4n0AAKzw87wv2LQ/HEmccb7yBJ4J/mGRBCutQcxRpG0yvjEr2RKCJ8OxAQXArRHP iLNDzQpgKsw3CCpqaXDbhUVDbRUKJJsSAUCUkZxRIEpu1OLgs3aS0bfv9AbyRkfKui/s M0MH0BjHfuNkj0e0hcdm5KU/bFfXvfU8IYwifJOuQVFWQr+tb1XiuoR/Gemx400Wz2gB CoxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :content-language:references:cc:to:subject:user-agent:mime-version :date:message-id; bh=soezL663m917sskQWdlBnt424r9Ps8eyC+w7cYcSXhI=; b=rkZbPEWRTISbuCzJ2hxAR91ztcIsBujrjoBFUfy0j7Q4D2rFzlNaYn17bFW4AmorTx jD3EaDoMdR87EjPPtLSDl1+kxtzj1g+CYQXEREogUMcF05qYCn5ucqtpWBh4uTRYv1XH WaXWQkxtj6HqOP/TnTVYELi9tJqax7E/VW67LSBK4K66jqwPkv5UmLQfyq09otjde84q FYAA9C9QI3TnihqDtz/TzT34Z+USARYH+n8btVXyqeYBpTljkw14Lyjdu3DORE6PDEj4 sQtJn90BP4L3vBnEwbLqxDnUVlE/kFTj0kM8XL9i1eH6rM0JhcY1ssrHHKx5hwDYj7se 2jHA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y7-20020a056402270700b00484c1c9d72bsi23920243edd.621.2023.01.13.01.29.38; Fri, 13 Jan 2023 01:29:51 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236698AbjAMIwG (ORCPT + 51 others); Fri, 13 Jan 2023 03:52:06 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57076 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231757AbjAMIvy (ORCPT ); Fri, 13 Jan 2023 03:51:54 -0500 Received: from cmx-mtlrgo002.bell.net (mta-mtl-005.bell.net [209.71.208.25]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D84F92DDE; Fri, 13 Jan 2023 00:51:51 -0800 (PST) X-RG-CM-BuS: 0 X-RG-CM-SC: 0 X-RG-CM: Clean X-Originating-IP: [70.54.81.233] X-RG-Env-Sender: matt.fagnani@bell.net X-RG-Rigid: 63BEA74E00368DA8 X-CM-Envelope: MS4xfMO0h9SdN8nX7ahKqJAnwBx0kI5T7bBDzJXocUrYwH1kW+W30bJdUbcztbSCJYfs3yGwPHsM/AI2o5J8irrvtYeQW2CGo3UKUijKq3JXK7UQn7I6XTq/ dhY35uIxSG24T0go+/q8lG/3FG/trFCvISDZGvxpRA8lcEd6vIE7biphOziS7Rm1iu+MPv3i+4WnKIuDLajAoU4fKem522MKJpTl6cIYpKKIL6Vvn8K+5Yi0 TKxIRNGI+1cBtPwAVscMErGxfFzMro9sa1LejKszpB9BtPaODxxHrdTYkp5UwGhDpqlq7wu+CSVcC8JrnWOW/Xdbu3VBJvmWUiNFFi7RDDS3m1MW0MEAnnAZ urRV0NM1RKjjhR1g1ulCwjoUcK7H6SDwNmcVExvwdCBQaUQEPgeAvbY0Vdn4pV9Tnii4VgKH+hBIjQidKfK3KRwLpaKPTuN1ecSEoThRJtG69GktiYyI1RHz oT+7WyoY5OEdqvjndkBcRoPCJ3/b9y0lMzo3e1q5++MzvP/CuULBoFjejuMvLeU80EGbVlGNtGJpgIQa X-CM-Analysis: v=2.4 cv=d6kzizvE c=1 sm=1 tr=0 ts=63c11b9c a=qajjuPryiup/b0YLLwyWzQ==:117 a=qajjuPryiup/b0YLLwyWzQ==:17 a=IkcTkHD0fZMA:10 a=lAgNKBcoAAAA:8 a=VwQbUJbxAAAA:8 a=FBHGMhGWAAAA:8 a=Ikd4Dj_1AAAA:8 a=zd2uoN0lAAAA:8 a=QyXUC8HyAAAA:8 a=Ne1ftY4lhRxtKY2kgkIA:9 a=QEXdDO2ut3YA:10 a=-FEs8UIgK8oA:10 a=drE6d5tx1tjNRBs8zHOc:22 a=AjGcO6oz07-iQ99wixmX:22 a=9gvnlMMaQFpL9xblJ6ne:22 Received: from [192.168.2.10] (70.54.81.233) by cmx-mtlrgo002.bell.net (5.8.807) (authenticated as matt.fagnani@bell.net) id 63BEA74E00368DA8; Fri, 13 Jan 2023 03:51:40 -0500 Message-ID: Date: Fri, 13 Jan 2023 03:51:38 -0500 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/110.0 Thunderbird/110.0a1 Subject: Re: [PATCH v2 1/1] PCI: Add translated request only flag for pci_enable_pasid() To: Baolu Lu , Bjorn Helgaas , Joerg Roedel Cc: =?UTF-8?Q?Christian_K=C3=B6nig?= , Jason Gunthorpe , Kevin Tian , Vasant Hegde , Tony Zhu , linux-pci@vger.kernel.org, iommu@lists.linux.dev, linux-kernel@vger.kernel.org References: <20230113014409.752405-1-baolu.lu@linux.intel.com> Content-Language: en-US From: Matt Fagnani In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Baolu, Yes, you can add the tested-by tag for me. Thanks, Matt On 1/13/23 03:49, Baolu Lu wrote: > On 2023/1/13 16:15, Matt Fagnani wrote: >> Baolu, >> >> 6.2-rc3 with v2 of this patch applied booted normally without the >> black screen problem. regzbot by Thorsten Leemhuis recommends adding >> the following link tag to the previous discussion at >> https://linux-regtracking.leemhuis.info/regzbot/mainline/ "When >> fixing, add this to the commit message to make regzbot notice patch >> postings and commits to resolve the issue:" Link: >> https://lore.kernel.org/r/15d0f9ff-2a56-b3e9-5b45-e6b23300ae3b@leemhuis.info/ > > Sure. I will add below: > > Fixes: 201007ef707a ("PCI: Enable PASID only when ACS RR & UF enabled > on upstream path") > Reported-by: Matt Fagnani > Link: https://bugzilla.kernel.org/show_bug.cgi?id=216865 > Link: > https://lore.kernel.org/r/15d0f9ff-2a56-b3e9-5b45-e6b23300ae3b@leemhuis.info/ > > By the way, can I add your tested-by? > > -- > Best regards, > baolu > >> >> Thanks, >> >> Matt >> >> On 1/12/23 20:44, Lu Baolu wrote: >>> The PCIe fabric routes Memory Requests based on the TLP address, >>> ignoring >>> the PASID. In order to ensure system integrity, commit 201007ef707a >>> ("PCI: >>> Enable PASID only when ACS RR & UF enabled on upstream path") requires >>> some ACS features being supported on device's upstream path when >>> enabling >>> PCI/PASID. >>> >>> One alternative is ATS which lets the device resolve the PASID+addr >>> pair >>> before a memory request is made into a routeable TLB address through >>> the >>> TA. Those resolved addresses are then cached on the device instead of >>> in the IOMMU TLB and the device always sets the translated bit for >>> PASID. >>> One example of those devices are AMD graphic devices that always >>> have ACS >>> or ATS enabled together with PASID. >>> >>> This adds a flag parameter in the pci_enable_pasid() helper, with which >>> the device driver could opt-in the fact that device always sets the >>> translated bit for PASID. >>> >>> It also applies this opt-in for AMD graphic devices. Without this >>> change, >>> kernel boots to black screen on a system with below AMD graphic device: >>> >>> 00:01.0 VGA compatible controller: Advanced Micro Devices, Inc. >>>          [AMD/ATI] Wani [Radeon R5/R6/R7 Graphics] (rev ca) >>>          (prog-if 00 [VGA controller]) >>>     DeviceName: ATI EG BROADWAY >>>     Subsystem: Hewlett-Packard Company Device 8332 >>> >>> At present, it is a common practice to enable/disable PCI PASID in the >>> iommu drivers. Considering that the device driver knows more about the >>> specific device, we will follow up by moving pci_enable_pasid() into >>> the specific device drivers. >>> >>> Fixes: 201007ef707a ("PCI: Enable PASID only when ACS RR & UF >>> enabled on upstream path") >>> Link: https://bugzilla.kernel.org/show_bug.cgi?id=216865 >>> Reported-by: Matt Fagnani >>> Suggested-by: Jason Gunthorpe >>> Suggested-by: Christian König >>> Signed-off-by: Lu Baolu >>> --- >>>   include/linux/pci-ats.h                     | 6 ++++-- >>>   drivers/iommu/amd/iommu.c                   | 2 +- >>>   drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c | 2 +- >>>   drivers/iommu/intel/iommu.c                 | 3 ++- >>>   drivers/pci/ats.c                           | 8 ++++++-- >>>   5 files changed, 14 insertions(+), 7 deletions(-) >>> >>> Change log: >>> v2: >>>   - Convert the bool to a named flag; >>>   - Convert TRANSLED to XLATED. >>> >>> v1: >>>   - >>> https://lore.kernel.org/linux-iommu/20230112084629.737653-1-baolu.lu@linux.intel.com/ >>> >>> diff --git a/include/linux/pci-ats.h b/include/linux/pci-ats.h >>> index df54cd5b15db..750fca736ef4 100644 >>> --- a/include/linux/pci-ats.h >>> +++ b/include/linux/pci-ats.h >>> @@ -4,6 +4,8 @@ >>>   #include >>> +#define PCI_PASID_XLATED_REQ_ONLY    BIT(0) >>> + >>>   #ifdef CONFIG_PCI_ATS >>>   /* Address Translation Service */ >>>   bool pci_ats_supported(struct pci_dev *dev); >>> @@ -35,12 +37,12 @@ static inline bool pci_pri_supported(struct >>> pci_dev *pdev) >>>   #endif /* CONFIG_PCI_PRI */ >>>   #ifdef CONFIG_PCI_PASID >>> -int pci_enable_pasid(struct pci_dev *pdev, int features); >>> +int pci_enable_pasid(struct pci_dev *pdev, int features, int flags); >>>   void pci_disable_pasid(struct pci_dev *pdev); >>>   int pci_pasid_features(struct pci_dev *pdev); >>>   int pci_max_pasids(struct pci_dev *pdev); >>>   #else /* CONFIG_PCI_PASID */ >>> -static inline int pci_enable_pasid(struct pci_dev *pdev, int features) >>> +static inline int pci_enable_pasid(struct pci_dev *pdev, int >>> features, int flags) >>>   { return -EINVAL; } >>>   static inline void pci_disable_pasid(struct pci_dev *pdev) { } >>>   static inline int pci_pasid_features(struct pci_dev *pdev) >>> diff --git a/drivers/iommu/amd/iommu.c b/drivers/iommu/amd/iommu.c >>> index cbeaab55c0db..64a8c03d7dfa 100644 >>> --- a/drivers/iommu/amd/iommu.c >>> +++ b/drivers/iommu/amd/iommu.c >>> @@ -1700,7 +1700,7 @@ static int pdev_pri_ats_enable(struct pci_dev >>> *pdev) >>>       int ret; >>>       /* Only allow access to user-accessible pages */ >>> -    ret = pci_enable_pasid(pdev, 0); >>> +    ret = pci_enable_pasid(pdev, 0, PCI_PASID_XLATED_REQ_ONLY); >>>       if (ret) >>>           goto out_err; >>> diff --git a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c >>> b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c >>> index ab160198edd6..891bf53c45dc 100644 >>> --- a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c >>> +++ b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c >>> @@ -2350,7 +2350,7 @@ static int arm_smmu_enable_pasid(struct >>> arm_smmu_master *master) >>>       if (num_pasids <= 0) >>>           return num_pasids; >>> -    ret = pci_enable_pasid(pdev, features); >>> +    ret = pci_enable_pasid(pdev, features, 0); >>>       if (ret) { >>>           dev_err(&pdev->dev, "Failed to enable PASID\n"); >>>           return ret; >>> diff --git a/drivers/iommu/intel/iommu.c b/drivers/iommu/intel/iommu.c >>> index 59df7e42fd53..5cc13f02a5ac 100644 >>> --- a/drivers/iommu/intel/iommu.c >>> +++ b/drivers/iommu/intel/iommu.c >>> @@ -1425,7 +1425,8 @@ static void iommu_enable_pci_caps(struct >>> device_domain_info *info) >>>          undefined. So always enable PASID support on devices which >>>          have it, even if we can't yet know if we're ever going to >>>          use it. */ >>> -    if (info->pasid_supported && !pci_enable_pasid(pdev, >>> info->pasid_supported & ~1)) >>> +    if (info->pasid_supported && >>> +        !pci_enable_pasid(pdev, info->pasid_supported & ~1, 0)) >>>           info->pasid_enabled = 1; >>>       if (info->pri_supported && >>> diff --git a/drivers/pci/ats.c b/drivers/pci/ats.c >>> index f9cc2e10b676..3a2d9e0ba1d8 100644 >>> --- a/drivers/pci/ats.c >>> +++ b/drivers/pci/ats.c >>> @@ -353,12 +353,15 @@ void pci_pasid_init(struct pci_dev *pdev) >>>    * pci_enable_pasid - Enable the PASID capability >>>    * @pdev: PCI device structure >>>    * @features: Features to enable >>> + * @flags: device-specific flags >>> + *   - PCI_PASID_XLATED_REQ_ONLY: The PCI device only issues PASID >>> + *                                memory requests of translated type. >>>    * >>>    * Returns 0 on success, negative value on error. This function >>> checks >>>    * whether the features are actually supported by the device and >>> returns >>>    * an error if not. >>>    */ >>> -int pci_enable_pasid(struct pci_dev *pdev, int features) >>> +int pci_enable_pasid(struct pci_dev *pdev, int features, int flags) >>>   { >>>       u16 control, supported; >>>       int pasid = pdev->pasid_cap; >>> @@ -382,7 +385,8 @@ int pci_enable_pasid(struct pci_dev *pdev, int >>> features) >>>       if (!pasid) >>>           return -EINVAL; >>> -    if (!pci_acs_path_enabled(pdev, NULL, PCI_ACS_RR | PCI_ACS_UF)) >>> +    if (!(flags & PCI_PASID_XLATED_REQ_ONLY) && >>> +        !pci_acs_path_enabled(pdev, NULL, PCI_ACS_RR | PCI_ACS_UF)) >>>           return -EINVAL; >>>       pci_read_config_word(pdev, pasid + PCI_PASID_CAP, &supported); >