Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp927905ybl; Wed, 28 Aug 2019 07:19:25 -0700 (PDT) X-Google-Smtp-Source: APXvYqwInLOqDYaSMp2IB34dGf4ueU77u+oFr8PxTKQsGxiJlsUxrwaKoWW+emIn/oEdH52Df7fj X-Received: by 2002:a17:902:a607:: with SMTP id u7mr4603098plq.43.1567001965048; Wed, 28 Aug 2019 07:19:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567001965; cv=none; d=google.com; s=arc-20160816; b=b1n5SfcMYvN+CJsBCEhTZ/A5xktggQRFvHh5Va9RTzbhOIX4c8b/NJiNWzHktLSAGX JrbILv3cMg87zmmNbuhDEnpvak1FwmFMTftvMrtncTIG5j7+mdjsG1F++kWp3kqqoyNF piPJ/3IVJLCsxd5GSj9cWcicZlCClU3A6HufkLL4eA4AULPDUzn4pxc9jgRkN356TcYW OXU+6VC5Q22pOYgZcdzNu3RcUimnBAAYUC/ypdzviQK1n/r3U0+dQtyWT3J4FVnHV+f1 VIc2CaJhtmlP6srzZxMBiwGt9T0x1XX+V3g8E2zWDrIhTkLKLMGkdqG8hMHAi4hbeNCM Qutw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:organization:message-id:date:subject:cc:to :from; bh=xRTMBNhbTtMhqXYj/xIklX0RCPDMm5I+OUZYd+iAsRE=; b=dluwQCFRgF8rA2hHnWsw8+aTLFJa7YNwvl3ymdDVdwJqYd2W9/63Pu1sVq9jcjObSl MfliEYGp0l0XBPYKL1iZ4goMX5r/6yPOUwn9He8lgQeYP6RFdI39h5cxU9Sfm/IobREr fh0djBIwVwJ2B0gxMY6oNx/E24sTC31/m2oEh5E5i9vsCKw73O6ug0TQt7y2RAbiYp3K L+TpEBkJVMVofQDJkn1OPnBqco1aY2ZBJkAxa2X11bzzJ5TmeELeW7x7o1LrSo9v/VN0 cizItw/o6wtHkQi2R9tJYk9Nt0LkRcS0YaTTkDi+ja7k5IIgSszCrrRKg105cjbjN+yN 7ZRQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f189si2563904pfa.283.2019.08.28.07.19.09; Wed, 28 Aug 2019 07:19:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726437AbfH1OSD (ORCPT + 99 others); Wed, 28 Aug 2019 10:18:03 -0400 Received: from mga07.intel.com ([134.134.136.100]:64707 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726395AbfH1OSD (ORCPT ); Wed, 28 Aug 2019 10:18:03 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 28 Aug 2019 07:18:02 -0700 X-IronPort-AV: E=Sophos;i="5.64,441,1559545200"; d="scan'208";a="174924210" Received: from jkrzyszt-desk.igk.intel.com (HELO jkrzyszt-desk.ger.corp.intel.com) ([172.22.244.17]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 28 Aug 2019 07:18:00 -0700 From: Janusz Krzysztofik To: Lu Baolu Cc: David Woodhouse , Joerg Roedel , iommu@lists.linux-foundation.org, intel-gfx@lists.freedesktop.org, linux-kernel@vger.kernel.org, =?utf-8?B?TWljaGHFgg==?= Wajdeczko Subject: Re: [RFC PATCH] iommu/vt-d: Fix IOMMU field not populated on device hot re-plug Date: Wed, 28 Aug 2019 16:17:53 +0200 Message-ID: <3275480.HMaYE7B3nd@jkrzyszt-desk.ger.corp.intel.com> Organization: Intel Technology Poland sp. z o.o. - ul. Slowackiego 173, 80-298 Gdansk - KRS 101882 - NIP 957-07-52-316 In-Reply-To: <8f505c10-6256-c561-1aea-b3817388c5b2@linux.intel.com> References: <20190822142922.31526-1-janusz.krzysztofik@linux.intel.com> <29020717.Hl6jQjRASr@jkrzyszt-desk.ger.corp.intel.com> <8f505c10-6256-c561-1aea-b3817388c5b2@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wednesday, August 28, 2019 2:56:18 AM CEST Lu Baolu wrote: > Hi Janusz, > > On 8/27/19 5:35 PM, Janusz Krzysztofik wrote: > > Hi Lu, > > > > On Monday, August 26, 2019 10:29:12 AM CEST Lu Baolu wrote: > >> Hi Janusz, > >> > >> On 8/26/19 4:15 PM, Janusz Krzysztofik wrote: > >>> Hi Lu, > >>> > >>> On Friday, August 23, 2019 3:51:11 AM CEST Lu Baolu wrote: > >>>> Hi, > >>>> > >>>> On 8/22/19 10:29 PM, Janusz Krzysztofik wrote: > >>>>> When a perfectly working i915 device is hot unplugged (via sysfs) and > >>>>> hot re-plugged again, its dev->archdata.iommu field is not populated > >>>>> again with an IOMMU pointer. As a result, the device probe fails on > >>>>> DMA mapping error during scratch page setup. > >>>>> > >>>>> It looks like that happens because devices are not detached from their > >>>>> MMUIO bus before they are removed on device unplug. Then, when an > >>>>> already registered device/IOMMU association is identified by the > >>>>> reinstantiated device's bus and function IDs on IOMMU bus re-attach > >>>>> attempt, the device's archdata is not populated with IOMMU information > >>>>> and the bad happens. > >>>>> > >>>>> I'm not sure if this is a proper fix but it works for me so at least it > >>>>> confirms correctness of my analysis results, I believe. So far I > >>>>> haven't been able to identify a good place where the possibly missing > >>>>> IOMMU bus detach on device unplug operation could be added. > >>>> > >>>> Which kernel version are you testing with? Does it contain below commit? > >>>> > >>>> commit 458b7c8e0dde12d140e3472b80919cbb9ae793f4 > >>>> Author: Lu Baolu > >>>> Date: Thu Aug 1 11:14:58 2019 +0800 > >>> > >>> I was using an internal branch based on drm-tip which didn't contain this > >>> commit yet. Fortunately it has been already merged into drm-tip over last > >>> weekend and has effectively fixed the issue. > >> > >> Thanks for testing this. > > > > My testing appeared not sufficiently exhaustive. The fix indeed resolved my > > initially discovered issue of not being able to rebind the i915 driver to a > > re-plugged device, however it brought another, probably more serious problem > > to light. > > > > When an open i915 device is hot unplugged, IOMMU bus notifier now cleans up > > IOMMU info for the device on PCI device remove while the i915 driver is still > > not released, kept by open file descriptors. Then, on last device close, > > cleanup attempts lead to kernel panic raised from intel_unmap() on unresolved > > IOMMU domain. > > We should avoid kernel panic when a intel_unmap() is called against > a non-existent domain. Does that mean you suggest to replace BUG_ON(!domain); with something like if (WARN_ON(!domain)) return; and to not care of orphaned mappings left allocated? Is there a way to inform users that their active DMA mappings are no longer valid and they shouldn't call dma_unmap_*()? > But we shouldn't expect the IOMMU driver not > cleaning up the domain info when a device remove notification comes and > wait until all file descriptors being closed, right? Shouldn't then the IOMMU driver take care of cleaning up resources still allocated on device remove before it invalidates and forgets their pointers? Thanks, Janusz > Best regards, > Baolu > > > > > With commit 458b7c8e0dde reverted and my fix applied, both late device close > > and device re-plug work for me. However, I can realize that's probably still > > not a complete solution, possibly missing some protection against reuse of a > > removed device other than for cleanup. If you think that's the right way to > > go, I can work more on that. > > > > I've had a look at other drivers and found AMD is using somehow similar > > approach. On the other hand, looking at the IOMMU common code I couldn't > > identify any arrangement that would support deferred device cleanup. > > > > If that approach is not acceptable for Intel IOMMU, please suggest a way you'd > > like to have it resolved and I can try to implement it. > > > > Thanks, > > Janusz > > > >> Best regards, > >> Lu Baolu > >> >