From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pj1-f73.google.com (mail-pj1-f73.google.com [209.85.216.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3BE9C357CF4 for ; Tue, 12 May 2026 18:48:58 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.73 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778611740; cv=none; b=aakIN5mRy4NJuFeWDY5RMwoMnk37+vmaMifFRtu4PTPhJEIT3wYfvNltDdvNwA8r8jLGII5lGi5hMiItjNDekKmOJQ+A3ojrkyhS5QgFgC+ri9x3wUrFOauddifRmZKtN+vYJbYRFXDe51zwlALdgJUZlULs0m/AauIrVD2H6AI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778611740; c=relaxed/simple; bh=RCiKjoRbpHsraC604M14uiXH3eoPSHxq9Qeuw/6zUV4=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=uQnH0vYBGivff3dyrRLnG2VcrDYVrfVjI31FSVETRKcfrOeHk8bsnzver2ikYhmt4hiZPsMqQzljoL4QqQ78Nb74RJMHZ72hIvQVn5i4WnpcT2/MfDQcsSHI699HsFOcZ3h/2iFSH3qFsLBA2HMhXDqXtFoaoqWHNocVNcX2ejg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--dmatlack.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=KADhh+qk; arc=none smtp.client-ip=209.85.216.73 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--dmatlack.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="KADhh+qk" Received: by mail-pj1-f73.google.com with SMTP id 98e67ed59e1d1-368b01f8adeso1622296a91.0 for ; Tue, 12 May 2026 11:48:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20251104; t=1778611737; x=1779216537; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=TGo/6CdqO8ibA5eNqLaT5PlJcsuc1WV9zdpDClCuOsU=; b=KADhh+qkyjDbu7uEFbmVubPEgQlEtcaXY14Ge4WAzOZGyXnRkc/ea7EblsO3RkcQlS P5FJ1fD6uVXUt4PZ56vQAXYPhvycNQjyzKcQZ/pFNkgEp0o+8qAP4fP++arxPWuQ908G qywO7J+Locl6wL8iedjSnme56RkCl0Jk9Xbf4UoP1x6k2XO91W2vpMCKPBMe9rt6Haz3 f/q1S3p4rF4NExIVEfQBrnc7Od8qkQL1iotZswv1jpH+H6J1KoG7ctHhHcGPU/w+4nVX kZbdDBIuDYmEhbkH3JpOb/UaRsQYTRCexo+CnNJhmUH9ZUe5So+eU4G+S759m7G0NXxY izeQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1778611737; x=1779216537; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=TGo/6CdqO8ibA5eNqLaT5PlJcsuc1WV9zdpDClCuOsU=; b=eWxS6Zw8cawe+QHUAAhug7FO3MRc4kYRJ+8xgtY7Ms2U8oxtoU/aNZzpHZYBNRjIlV bMheRPm1cGOrOQYmEUQZXY5eWeEHXnwtBes2dNFibmU8HvX4vEtxMUV8NgwpHRrhIgE5 6GQStnmE5px41y9QOi7XjLhyAi8XnPsHynPtkPgTG2VZwlPE6O52ist0H8q9kV9FevzP Yt0WX/KTiTVexG8ngYGTbtAKj0YHu5cyvxliKDAyuCAlJH9/U9zWoUvVpDX3MV1WT+NI di9W0QO9ZGwml/Gx/qRmnjAkchuTzi9ibUc/KPboTpgjPuQ0r2flaNsb+FFlqJpqivmM p1nA== X-Forwarded-Encrypted: i=1; AFNElJ/dfqc9BvOeYrXNmudvYvQ3P4Fieu+8LyywrI9FL3nZhxoKgrzlHSzJBnW1O/GsZYiVgumgaDqJdr0=@vger.kernel.org X-Gm-Message-State: AOJu0YzGn+4xIJiIi0CEMeoYOrX5CFbte7T5K/R1RTqCiZfvcqqnnYhB 0mBo2SbMbsXKjyOuwbgpFiaxg+waBob2QNAzRysrBISp2wiea2phnBf/6rCFR3NqnGHkiLAltU3 0zCqPjBS8OF5Ifg== X-Received: from pfblu4.prod.google.com ([2002:a05:6a00:7484:b0:82f:7d56:a149]) (user=dmatlack job=prod-delivery.src-stubby-dispatcher) by 2002:a05:6a21:9995:b0:3ab:13f4:c71d with SMTP id adf61e73a8af0-3ad991e88d4mr5416489637.33.1778611737089; Tue, 12 May 2026 11:48:57 -0700 (PDT) Date: Tue, 12 May 2026 18:48:42 +0000 In-Reply-To: <20260512184846.119396-1-dmatlack@google.com> Precedence: bulk X-Mailing-List: linux-doc@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20260512184846.119396-1-dmatlack@google.com> X-Mailer: git-send-email 2.54.0.563.g4f69b47b94-goog Message-ID: <20260512184846.119396-8-dmatlack@google.com> Subject: [PATCH v5 07/11] PCI: liveupdate: Inherit ACS flags in incoming preserved devices From: David Matlack To: kexec@lists.infradead.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-pci@vger.kernel.org Cc: Adithya Jayachandran , Alexander Graf , Alex Williamson , Bjorn Helgaas , Chris Li , David Matlack , David Rientjes , Jacob Pan , Jason Gunthorpe , Jonathan Corbet , Josh Hilke , Leon Romanovsky , Lukas Wunner , Mike Rapoport , Parav Pandit , Pasha Tatashin , Pranjal Shrivastava , Pratyush Yadav , Saeed Mahameed , Samiullah Khawaja , Shuah Khan , Vipin Sharma , William Tu , Yi Liu Content-Type: text/plain; charset="UTF-8" Inherit Access Control Services (ACS) flags on all incoming preserved devices (endpoints and upstream bridges) during a Live Update. Inheriting ACS flags avoids changing routing rules while memory transactions are in flight from preserved devices. This is also strictly necessary to ensure that IOMMU group assignments do not change across a Live Update for preserved devices, as changing ACS configurations can split or merge IOMMU groups. Cache the inherited ACS controls established by the previous kernel in struct pci_dev so that ACS controls do not change after a reset (pci_restore_state() calls pci_enable_acs()). Signed-off-by: David Matlack --- drivers/pci/liveupdate.c | 49 ++++++++++++++++++++++++++++++++++ drivers/pci/liveupdate.h | 11 ++++++++ drivers/pci/pci.c | 5 ++++ include/linux/pci_liveupdate.h | 6 +++++ 4 files changed, 71 insertions(+) diff --git a/drivers/pci/liveupdate.c b/drivers/pci/liveupdate.c index d8e06afde2c7..e3cd6d76636c 100644 --- a/drivers/pci/liveupdate.c +++ b/drivers/pci/liveupdate.c @@ -120,6 +120,18 @@ * This enables the PCI core and any drivers bound to the bridge to participate * in the Live Update so that preserved endpoints can continue issuing memory * transactions during the Live Update. + * + * Handling Preserved Devices + * ========================== + * + * The PCI core treats preserved devices differently than non-preserved devices. + * This section enumerates those differences. + * + * * The PCI core inherits all ACS flags enabled on incoming preserved devices + * rather than assigning new ones. This ensures that TLPs are routed the same + * way after Live Update and ensures that IOMMU groups do not change. Note + * that a device will use its inherited ACS flags for the lifetime of its + * struct pci_dev (i.e. even after pci_liveupdate_finish()). */ #define pr_fmt(fmt) "PCI: liveupdate: " fmt @@ -361,6 +373,16 @@ static int pci_liveupdate_preserve_device_new(struct pci_ser *ser, struct pci_de { int i; + /* + * Do not preserve a devices that rely on device-specific ACS + * equivalents (for now) since that would complicate keeping ACS + * flags constant across Live Update. + */ + if (dev->dev_flags & PCI_DEV_FLAGS_ACS_ENABLED_QUIRK) { + pci_warn(dev, "Refusing to preserve device that relies on ACS quirks\n"); + return -EINVAL; + } + if (ser->nr_devices == ser->max_nr_devices) return -ENOSPC; @@ -571,6 +593,7 @@ void pci_liveupdate_setup_device(struct pci_dev *dev) pci_info(dev, "Device was preserved by previous kernel across Live Update\n"); guard(write_lock)(&dev->liveupdate.lock); dev->liveupdate.incoming = dev_ser; + dev->liveupdate.was_preserved = true; /* * Hold the ref on the incoming FLB until pci_liveupdate_finish() so @@ -671,6 +694,32 @@ void pci_liveupdate_finish(struct pci_dev *dev) } EXPORT_SYMBOL_GPL(pci_liveupdate_finish); +void pci_liveupdate_init_acs(struct pci_dev *dev) +{ + guard(read_lock)(&dev->liveupdate.lock); + + if (!dev->acs_cap || !dev->liveupdate.incoming) + return; + + pci_read_config_word(dev, dev->acs_cap + PCI_ACS_CTRL, &dev->liveupdate.acs_ctrl); +} + +bool pci_liveupdate_inherit_acs(struct pci_dev *dev) +{ + guard(read_lock)(&dev->liveupdate.lock); + + /* + * Use liveupdate.was_preserved instead of liveupdate.incoming since the + * device's ACS controls should not change even after the device is + * finished participating in the Live Update. + */ + if (!dev->acs_cap || !dev->liveupdate.was_preserved) + return false; + + pci_write_config_word(dev, dev->acs_cap + PCI_ACS_CTRL, dev->liveupdate.acs_ctrl); + return true; +} + /** * pci_liveupdate_is_incoming() - Check if a device is incoming preserved * @dev: The PCI device to check diff --git a/drivers/pci/liveupdate.h b/drivers/pci/liveupdate.h index 0bd3e961d5c5..c0826ca717e3 100644 --- a/drivers/pci/liveupdate.h +++ b/drivers/pci/liveupdate.h @@ -14,6 +14,8 @@ void pci_liveupdate_setup_device(struct pci_dev *dev); void pci_liveupdate_cleanup_device(struct pci_dev *dev); bool pci_liveupdate_inherit_buses(void); +void pci_liveupdate_init_acs(struct pci_dev *dev); +bool pci_liveupdate_inherit_acs(struct pci_dev *dev); #else static inline void pci_liveupdate_setup_device(struct pci_dev *dev) { @@ -27,6 +29,15 @@ static inline bool pci_liveupdate_inherit_buses(void) { return false; } + +static inline void pci_liveupdate_init_acs(struct pci_dev *dev) +{ +} + +static inline bool pci_liveupdate_inherit_acs(struct pci_dev *dev) +{ + return false; +} #endif #endif /* DRIVERS_PCI_LIVEUPDATE_H */ diff --git a/drivers/pci/pci.c b/drivers/pci/pci.c index 8f7cfcc00090..cd2c1f2ada92 100644 --- a/drivers/pci/pci.c +++ b/drivers/pci/pci.c @@ -33,6 +33,7 @@ #include #include #include +#include "liveupdate.h" #include "pci.h" DEFINE_MUTEX(pci_slot_mutex); @@ -1017,6 +1018,9 @@ void pci_enable_acs(struct pci_dev *dev) bool enable_acs = false; int pos; + if (pci_liveupdate_inherit_acs(dev)) + return; + /* If an iommu is present we start with kernel default caps */ if (pci_acs_enable) { if (pci_dev_specific_enable_acs(dev)) @@ -3657,6 +3661,7 @@ void pci_acs_init(struct pci_dev *dev) pci_read_config_word(dev, pos + PCI_ACS_CAP, &dev->acs_capabilities); pci_disable_broken_acs_cap(dev); + pci_liveupdate_init_acs(dev); } /** diff --git a/include/linux/pci_liveupdate.h b/include/linux/pci_liveupdate.h index 1c2ee32ad058..34f9900c7d29 100644 --- a/include/linux/pci_liveupdate.h +++ b/include/linux/pci_liveupdate.h @@ -18,11 +18,17 @@ * @lock: Lock used to protect members of struct pci_liveupdate. * @outgoing: State preserved for the next kernel. * @incoming: State preserved by the previous kernel. + * @acs_ctrl: ACS features established by the previous kernel. + * @was_preserved: True if this struct pci_dev was preserved by the previous + * kernel. Unlike @incoming, this field is not cleared after + * the device is finished participating in Live Update. */ struct pci_liveupdate { rwlock_t lock; struct pci_dev_ser *outgoing; struct pci_dev_ser *incoming; + u16 acs_ctrl; + unsigned int was_preserved:1; }; struct pci_dev; -- 2.54.0.563.g4f69b47b94-goog