Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp840305ybl; Fri, 23 Aug 2019 09:06:27 -0700 (PDT) X-Google-Smtp-Source: APXvYqwLWeYBWDYAkvy5aa3nwMdTmCzql0uYpmoXq9zZHJfwmZmgme9ItxkZvNJiDt/fe+q5MJ5c X-Received: by 2002:a65:4b8b:: with SMTP id t11mr4669590pgq.130.1566576387354; Fri, 23 Aug 2019 09:06:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566576387; cv=none; d=google.com; s=arc-20160816; b=UXcpJVjADgWrpjTQ6tQkavgeSYNtu0TdYTQXabftOwMQTGCdWEnyHwbzx+HE4LlCjY k27PK04JKj2cf6L6zYy+A1DCR1yF9dovcUWsrLkUzy9P9B0ercxYHyqxIQnNpCKtZWFU 5KIhmyskgZGha+5Z0WzN58nsbUKP1W1PaBpX2Ge41DLYEM8XYkn3lCB08Lq4hMzrK6o3 KBQEn/qPoBV0HoKCOSKAvlVHImIxQrq7l9h0fdej+MvtmqgUgNP7J1qi8+NWmTCm4y1c TFVTZPKIbNztBmcD7qnst5LTXzXLDEkFsNF6+KSmQLkdmJJxq2Y/LI2LKSDBFWWCEdxA LP2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:cc; bh=Z9hghof2Q1x1geYavmSDb0QY+55ILN6mZO7gqnRwzwM=; b=uciWNWVJqrlfQshLpj9ifFXCNWkubq4EOqcf3PbWv8igKxIqMq1Oph4WaLr59+7VFp uHOCKnw0Zv+VGG4cEhwjYr2u/T1wHPcnAN688gIcM2tKIXzHdzZ/nf5o2ySva3wYXZFk sqEsNYEhZuqFRDOKjCqmZ8Swa6FkvTEUfocdBxTxMfFsOFYHZdLgJtwtmSSib6lpbjrf L3r2UUypMuh4pWGvrM0C0PEou1EOsSHLtydwpCn792lomAmpD8+83WeV8isFey7qfQUo uanQocoDa6ZDmL7hNB8AkMsoIqqjyqS5ccU1kEFNHhSC6jLUrkIoxRnncQheA5y4Ck4m JOzg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r14si2984703pli.257.2019.08.23.09.06.10; Fri, 23 Aug 2019 09:06:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388272AbfHWBwY (ORCPT + 99 others); Thu, 22 Aug 2019 21:52:24 -0400 Received: from mga05.intel.com ([192.55.52.43]:25107 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1733139AbfHWBwY (ORCPT ); Thu, 22 Aug 2019 21:52:24 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga105.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 22 Aug 2019 18:52:24 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.64,419,1559545200"; d="scan'208";a="173330337" Received: from allen-box.sh.intel.com (HELO [10.239.159.136]) ([10.239.159.136]) by orsmga008.jf.intel.com with ESMTP; 22 Aug 2019 18:52:21 -0700 Cc: baolu.lu@linux.intel.com, iommu@lists.linux-foundation.org, intel-gfx@lists.freedesktop.org, linux-kernel@vger.kernel.org, =?UTF-8?Q?Micha=c5=82_Wajdeczko?= Subject: Re: [RFC PATCH] iommu/vt-d: Fix IOMMU field not populated on device hot re-plug To: Janusz Krzysztofik , David Woodhouse , Joerg Roedel References: <20190822142922.31526-1-janusz.krzysztofik@linux.intel.com> From: Lu Baolu Message-ID: <00f1a3a7-7ff6-e9a0-d9de-a177af6fd64b@linux.intel.com> Date: Fri, 23 Aug 2019 09:51:11 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <20190822142922.31526-1-janusz.krzysztofik@linux.intel.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On 8/22/19 10:29 PM, Janusz Krzysztofik wrote: > When a perfectly working i915 device is hot unplugged (via sysfs) and > hot re-plugged again, its dev->archdata.iommu field is not populated > again with an IOMMU pointer. As a result, the device probe fails on > DMA mapping error during scratch page setup. > > It looks like that happens because devices are not detached from their > MMUIO bus before they are removed on device unplug. Then, when an > already registered device/IOMMU association is identified by the > reinstantiated device's bus and function IDs on IOMMU bus re-attach > attempt, the device's archdata is not populated with IOMMU information > and the bad happens. > > I'm not sure if this is a proper fix but it works for me so at least it > confirms correctness of my analysis results, I believe. So far I > haven't been able to identify a good place where the possibly missing > IOMMU bus detach on device unplug operation could be added. Which kernel version are you testing with? Does it contain below commit? commit 458b7c8e0dde12d140e3472b80919cbb9ae793f4 Author: Lu Baolu Date: Thu Aug 1 11:14:58 2019 +0800 iommu/vt-d: Detach domain when move device out of group When removing a device from an iommu group, the domain should be detached from the device. Otherwise, the stale domain info will still be cached by the driver and the driver will refuse to attach any domain to the device again. Cc: Ashok Raj Cc: Jacob Pan Cc: Kevin Tian Fixes: b7297783c2bb6 ("iommu/vt-d: Remove duplicated code for device hotplug") Reported-and-tested-by: Vlad Buslov Suggested-by: Robin Murphy Link: https://lkml.org/lkml/2019/7/26/1133 Signed-off-by: Lu Baolu Signed-off-by: Joerg Roedel Best regards, Lu Baolu > > Signed-off-by: Janusz Krzysztofik > --- > drivers/iommu/intel-iommu.c | 3 +++ > 1 file changed, 3 insertions(+) > > diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c > index 12d094d08c0a..7cdcd0595408 100644 > --- a/drivers/iommu/intel-iommu.c > +++ b/drivers/iommu/intel-iommu.c > @@ -2477,6 +2477,9 @@ static struct dmar_domain *dmar_insert_one_dev_info(struct intel_iommu *iommu, > if (info2) { > found = info2->domain; > info2->dev = dev; > + > + if (dev && !dev->archdata.iommu) > + dev->archdata.iommu = info2; > } > } > >