From: "Raj, Ashok" <ashok.raj@intel.com>
To: Alex Williamson <alex.williamson@redhat.com>
Cc: linux-pci@vger.kernel.org, Bjorn Helgaas <bhelgaas@google.com>,
linux-kernel@vger.kernel.org, iommu@lists.linux-foundation.org,
Lu Baolu <baolu.lu@linux.intel.com>,
Darrel Goeddel <DGoeddel@forcepoint.com>,
Mark Scott <mscott@forcepoint.com>,
Romil Sharma <rsharma@forcepoint.com>,
Joerg Roedel <joro@8bytes.org>, Ashok Raj <ashok.raj@intel.com>
Subject: Re: [PATCH] iommu: Relax ACS requirement for RCiEP devices.
Date: Tue, 5 May 2020 07:56:06 -0700 [thread overview]
Message-ID: <20200505145605.GA13690@otc-nc-03> (raw)
In-Reply-To: <20200505080514.01153835@x1.home>
On Tue, May 05, 2020 at 08:05:14AM -0600, Alex Williamson wrote:
> On Mon, 4 May 2020 23:11:07 -0700
> "Raj, Ashok" <ashok.raj@intel.com> wrote:
>
> > Hi Alex
> >
> > + Joerg, accidently missed in the Cc.
> >
> > On Mon, May 04, 2020 at 11:19:36PM -0600, Alex Williamson wrote:
> > > On Mon, 4 May 2020 21:42:16 -0700
> > > Ashok Raj <ashok.raj@intel.com> wrote:
> > >
> > > > PCIe Spec recommends we can relax ACS requirement for RCIEP devices.
> > > >
> > > > PCIe 5.0 Specification.
> > > > 6.12 Access Control Services (ACS)
> > > > Implementation of ACS in RCiEPs is permitted but not required. It is
> > > > explicitly permitted that, within a single Root Complex, some RCiEPs
> > > > implement ACS and some do not. It is strongly recommended that Root Complex
> > > > implementations ensure that all accesses originating from RCiEPs
> > > > (PFs and VFs) without ACS capability are first subjected to processing by
> > > > the Translation Agent (TA) in the Root Complex before further decoding and
> > > > processing. The details of such Root Complex handling are outside the scope
> > > > of this specification.
> > > >
> > >
> > > Is the language here really strong enough to make this change? ACS is
> > > an optional feature, so being permitted but not required is rather
> > > meaningless. The spec is also specifically avoiding the words "must"
> > > or "shall" and even when emphasized with "strongly", we still only have
> > > a recommendation that may or may not be honored. This seems like a
> > > weak basis for assuming that RCiEPs universally honor this
> > > recommendation. Thanks,
> > >
> >
> > We are speaking about PCIe spec, where people write it about 5 years ahead
> > and every vendor tries to massage their product behavior with vague
> > words like this.. :)
> >
> > But honestly for any any RCiEP, or even integrated endpoints, there
> > is no way to send them except up north. These aren't behind a RP.
>
> But they are multi-function devices and the spec doesn't define routing
> within multifunction packages. A single function RCiEP will already be
> assumed isolated within its own group.
That's right. The other two devices only have legacy PCI headers. So
they can't claim to be RCiEP's but just integrated endpoints. The legacy
devices don't even have a PCIe header.
I honestly don't know why these are groped as MFD's in the first place.
>
> > I did check with couple folks who are part of the SIG, and seem to agree
> > that ACS treatment for RCiEP's doesn't mean much.
> >
> > I understand the language isn't strong, but it doesn't seem like ACS should
> > be a strong requirement for RCiEP's and reasonable to relax.
> >
> > What are your thoughts?
>
> I think hardware vendors have ACS at their disposal to clarify when
> isolation is provided, otherwise vendors can submit quirks, but I don't
> see that the "strongly recommended" phrasing is sufficient to assume
> isolation between multifunction RCiEPs. Thanks,
You point is that integrated MFD endpoints, without ACS, there is no
gaurantee to SW that they are isolated.
As far as a quirk, do you think:
- a cmdline optput for integrated endpoints, and RCiEP's suffice?
along with a compile time default that is strict enforcement
- typical vid/did type exception list?
A more generic way to ask for exception would be scalable until we can stop
those type of integrated devices. Or we need to maintain these device lists
for eternity.
Cheers,
Ashok
next prev parent reply other threads:[~2020-05-05 14:56 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-05-05 4:42 [PATCH] iommu: Relax ACS requirement for RCiEP devices Ashok Raj
2020-05-05 5:19 ` Alex Williamson
2020-05-05 6:11 ` Raj, Ashok
2020-05-05 14:05 ` Alex Williamson
2020-05-05 14:56 ` Raj, Ashok [this message]
2020-05-05 15:34 ` Alex Williamson
2020-05-26 18:06 ` Raj, Ashok
2020-05-26 18:26 ` Alex Williamson
2020-05-26 18:34 ` Raj, Ashok
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200505145605.GA13690@otc-nc-03 \
--to=ashok.raj@intel.com \
--cc=DGoeddel@forcepoint.com \
--cc=alex.williamson@redhat.com \
--cc=baolu.lu@linux.intel.com \
--cc=bhelgaas@google.com \
--cc=iommu@lists.linux-foundation.org \
--cc=joro@8bytes.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-pci@vger.kernel.org \
--cc=mscott@forcepoint.com \
--cc=rsharma@forcepoint.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox