From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 88C32C433FE for ; Mon, 31 Jan 2022 06:42:08 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235513AbiAaGmG (ORCPT ); Mon, 31 Jan 2022 01:42:06 -0500 Received: from mga03.intel.com ([134.134.136.65]:58817 "EHLO mga03.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232348AbiAaGmF (ORCPT ); Mon, 31 Jan 2022 01:42:05 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1643611325; x=1675147325; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=NzR5WVLsAbh7rkG2YhVbwAZdDUygwE0mUXpLIgrwZ/Q=; b=d44Qgx/hidnwWkSjbQetiunam+bvaDAz6ZPJMZMMpI711tzHrImyfquC l3D2N5kc6+KqA1c+BajmFiNmdHidjZIbfK2z7vV+w4nmNe1zeZT17UU9d 4bnFAeB2qMHzvtjkLF8yD82DJUnY6hyQhL93IEAl+HbzfsxGKw+jju1cm mKzOKGQKzfUKLuDoV462AeVMJQi5GJG/QokMTM1Vy4mu2dpsvm7IOzK4S J8hhypjVJUzm8H8th/vgD8EJt+AjgRq+O+V5KeZ5jxNcMd/cYww68D+4v yBW22v316oHUKHHnQBsShnYoucMOaUL77ae9UeSYBVjSKdjgJ5zrSRwx2 A==; X-IronPort-AV: E=McAfee;i="6200,9189,10243"; a="247362622" X-IronPort-AV: E=Sophos;i="5.88,330,1635231600"; d="scan'208";a="247362622" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Jan 2022 22:42:05 -0800 X-IronPort-AV: E=Sophos;i="5.88,330,1635231600"; d="scan'208";a="626278379" Received: from lahna.fi.intel.com (HELO lahna) ([10.237.72.162]) by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Jan 2022 22:42:00 -0800 Received: by lahna (sSMTP sendmail emulation); Mon, 31 Jan 2022 08:41:36 +0200 Date: Mon, 31 Jan 2022 08:41:36 +0200 From: Mika Westerberg To: "Rafael J. Wysocki" Cc: Rajat Jain , Greg Kroah-Hartman , Bjorn Helgaas , Len Brown , Bjorn Helgaas , ACPI Devel Maling List , Linux PCI , Linux Kernel Mailing List , Rajat Jain , Dmitry Torokhov , Jesse Barnes , Jean-Philippe Brucker , Pavel Machek , Oliver O'Halloran , Joerg Roedel Subject: Re: [PATCH] PCI: ACPI: Allow internal devices to be marked as untrusted Message-ID: References: <20220121214117.GA1154852@bhelgaas> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo Precedence: bulk List-ID: X-Mailing-List: linux-pci@vger.kernel.org Hi, On Sun, Jan 30, 2022 at 03:30:39PM +0100, Rafael J. Wysocki wrote: > > I'm open to doing so if the others also feel the same way. IMHO > > though, the semantics of ACPI "DmaProperty" differ from the semantics > > of the property I'm proposing here. > > > > The current (documented) semantics (of "DmaProperty"): *This device > > (root port) is trusted*, but any devices downstream are not to be > > trusted. > > > > What I need and am proposing (new "UntrustedDevice"): *This device as > > well as any downstream devices* are untrusted. > > > > Note that there may be firmware implementing "DmaProperty" already out > > there (for windows), and if we decide to use it for my purposes, then > > there shall be a discrepancy in how Linux uses that property vs > > Windows. Is that acceptable? > > It may be confusing, so I'd rather not do that. > > The platform firmware will use it with the Windows use case in mind > and if it has side effects in Linux, problems are likely to appear in > the field. > > So the question is rather not about it being acceptable, but about > whether or not this is generally going to work. I was kind of implying that we could perhaps contact Microsoft and ask them if the wording could be changed to cover all the devices, not just PCIe root ports. I think this is something they will also need for things like internal WI-FI controllers. If that's not possible then no objections adding "UntrustedDevice". We just need to deal with the "DmaProperty" anyway and both end up setting pdev->untrusted in the similar manner.