Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp904512ybm; Fri, 29 May 2020 15:18:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxzdII5vVbQ4TyQnDjbE/gGZz7tlAHB7h8jgE9SLNpR4esKYZ8rBTEhCxBxER5QPciVbGoV X-Received: by 2002:a50:ac84:: with SMTP id x4mr10917107edc.124.1590790734366; Fri, 29 May 2020 15:18:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590790734; cv=none; d=google.com; s=arc-20160816; b=zbozb2Rjxc2lZtAezchdjSlgGYx+dtDgfvICvaUotVF43n3yAEDXA4v5VXdB6tpjQy ubmMXb7wdiI2BLDE7O5jUXMyVEKaL7gowbdyywKQ0ZfDzOTjU5G0eZltN95lZwsKFLzP 7s79vLbKOFjWmoNQ21rYYbMayeNBOuOTOBHlMdCp/1WZPnBXg6N72v/FH37EhnX0hGDr PoQqaoMdr8irjCOz3DzW4hSRbq2vm/ED4DBjqUN9aBNAA8BuBhwwywStAeFeeAZREGr3 dkEEjCJAF9Mrhs02QrCcfknLVaED93PlcPXWOsZyquB4qwnAHkFKu77ayKuhab8N7tuS i4Qg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:mail-followup-to:reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=RyWRgA39MpCS4B1s1Q6dcjnQ39Nmyes8pkIQMz0S9CE=; b=dZnTiEc4mClt+H14MFSh0w5pAQxVU5+/Zz02GqhyJAw9jZn8xDpGH1XlW5LCPx0W+d m+fDliPYMJhIrCUUbNiJBg67lIl2AblLA4NOuK1mhfXyG102MID7Ooxs1p6cCQde1xWZ XqRfksuKsUZGGgVWAJUYsnos1MNzRX9bcJLkO9AJ7djAfAFY/fQPz8R/NqfK+RZWsCr/ GwuXGM0NQGWxdytu+VEvrGug4gWisUfkVu/HxDqPbvCpsJ7O5tbJvf0VK70YwI96nrnV x+8846NUiW/EhP8xr338ORUJqqEqm/snEMrQ6e3DR2itjV+9ypYzfqSjX86iYd9cmSkl Zinw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=HyEydRMZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k8si6360558ejs.101.2020.05.29.15.18.31; Fri, 29 May 2020 15:18:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=HyEydRMZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728347AbgE2WQg (ORCPT + 99 others); Fri, 29 May 2020 18:16:36 -0400 Received: from us-smtp-delivery-1.mimecast.com ([205.139.110.120]:31410 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728293AbgE2WQf (ORCPT ); Fri, 29 May 2020 18:16:35 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1590790592; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:in-reply-to:in-reply-to: references:references; bh=RyWRgA39MpCS4B1s1Q6dcjnQ39Nmyes8pkIQMz0S9CE=; b=HyEydRMZTLGrdMZrhync1yjF80RTDrg5tllQ8JcDCwKF5HM1gHuL3kxdX10bl+DQhabkyB EDrpC3oDmktZI9oHoT+zfWbnRFMzHocyzPSUi8rG5h98NqPmqzMk5OClHcNQUB2gyoJsoz lvtDt5pyQRDGMJtCC3WFSCxzW0AhSkg= Received: from mail-qv1-f71.google.com (mail-qv1-f71.google.com [209.85.219.71]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-70-EhuGd2nqNqe-erIDJ3fKiQ-1; Fri, 29 May 2020 18:16:26 -0400 X-MC-Unique: EhuGd2nqNqe-erIDJ3fKiQ-1 Received: by mail-qv1-f71.google.com with SMTP id t11so3505270qvv.11 for ; Fri, 29 May 2020 15:16:26 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:reply-to :mail-followup-to:references:mime-version:content-disposition :in-reply-to; bh=RyWRgA39MpCS4B1s1Q6dcjnQ39Nmyes8pkIQMz0S9CE=; b=L+jNomxvD410OpeVEBE3vX0oSh0fFSXBf5pFVh6Nm+5m7p2B9J4Ybv0ffRG1JxFIIf hnkahNl4ypXcdcjV+Xv1GmEQUGTWcoGCmYUvH0BvUqzNdmo41SmS6qn+M4anJ5if/KdP WTnGOowqc5M9w7+8J17Vhwq5qLrCvM2jgxgL44ztt/K9/5/7WAO1H9RCjei+fUmPncpR 3M9zSp6NJcJ4lSBqGn2mzuIvdloFgejy9dQ/bRvEOFv4T7Iz97373pa1GBmlVGYYTtqE b9m9m7DetShDMgFmva2E3kizh+HHMHzTi10zBV+W/3Dw7yo0vswldSuo/oUf4esiavDO wbzg== X-Gm-Message-State: AOAM533+nodllKzv1sfgW8QJv+Ue+/9EAkW8xINU/sCLEug1Z5lhsITj lWIuGWLUW2ymkceVGKIgvCvHMG6HQxDWU9CVm3337495nw6yq0pAIIonqdDE05RSax7gVNbHvEX gPwH+ZW4/AxJ8aDjyrUrQ5izE X-Received: by 2002:a37:6188:: with SMTP id v130mr4562267qkb.138.1590790585935; Fri, 29 May 2020 15:16:25 -0700 (PDT) X-Received: by 2002:a37:6188:: with SMTP id v130mr4562246qkb.138.1590790585671; Fri, 29 May 2020 15:16:25 -0700 (PDT) Received: from localhost (ip70-163-223-149.ph.ph.cox.net. [70.163.223.149]) by smtp.gmail.com with ESMTPSA id w13sm8244813qkb.91.2020.05.29.15.16.24 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 May 2020 15:16:24 -0700 (PDT) Date: Fri, 29 May 2020 15:16:23 -0700 From: Jerry Snitselaar To: Joerg Roedel Cc: Will Deacon , Robin Murphy , Marek Szyprowski , Kukjin Kim , Krzysztof Kozlowski , David Woodhouse , Lu Baolu , Andy Gross , Bjorn Andersson , Matthias Brugger , Rob Clark , Heiko Stuebner , Gerald Schaefer , Thierry Reding , Jonathan Hunter , Jean-Philippe Brucker , linux-s390@vger.kernel.org, linux-samsung-soc@vger.kernel.org, linux-arm-msm@vger.kernel.org, linux-kernel@vger.kernel.org, virtualization@lists.linux-foundation.org, linux-rockchip@lists.infradead.org, iommu@lists.linux-foundation.org, linux-mediatek@lists.infradead.org, linux-tegra@vger.kernel.org Subject: Re: [PATCH v2 00/33] iommu: Move iommu_group setup to IOMMU core code Message-ID: <20200529221623.qc6twmpzryh7nkvb@cantor> Reply-To: Jerry Snitselaar Mail-Followup-To: Joerg Roedel , Will Deacon , Robin Murphy , Marek Szyprowski , Kukjin Kim , Krzysztof Kozlowski , David Woodhouse , Lu Baolu , Andy Gross , Bjorn Andersson , Matthias Brugger , Rob Clark , Heiko Stuebner , Gerald Schaefer , Thierry Reding , Jonathan Hunter , Jean-Philippe Brucker , linux-s390@vger.kernel.org, linux-samsung-soc@vger.kernel.org, linux-arm-msm@vger.kernel.org, linux-kernel@vger.kernel.org, virtualization@lists.linux-foundation.org, linux-rockchip@lists.infradead.org, iommu@lists.linux-foundation.org, linux-mediatek@lists.infradead.org, linux-tegra@vger.kernel.org References: <20200414131542.25608-1-joro@8bytes.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Disposition: inline In-Reply-To: <20200414131542.25608-1-joro@8bytes.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue Apr 14 20, Joerg Roedel wrote: >Hi, > >here is the second version of this patch-set. The first version with >some more introductory text can be found here: > > https://lore.kernel.org/lkml/20200407183742.4344-1-joro@8bytes.org/ > >Changes v1->v2: > > * Rebased to v5.7-rc1 > > * Re-wrote the arm-smmu changes as suggested by Robin Murphy > > * Re-worked the Exynos patches to hopefully not break the > driver anymore > > * Fixed a missing mutex_unlock() reported by Marek Szyprowski, > thanks for that. > >There is also a git-branch available with these patches applied: > > https://git.kernel.org/pub/scm/linux/kernel/git/joro/linux.git/log/?h=iommu-probe-device-v2 > >Please review. > >Thanks, > > Joerg > >Joerg Roedel (32): > iommu: Move default domain allocation to separate function > iommu/amd: Implement iommu_ops->def_domain_type call-back > iommu/vt-d: Wire up iommu_ops->def_domain_type > iommu/amd: Remove dma_mask check from check_device() > iommu/amd: Return -ENODEV in add_device when device is not handled by > IOMMU > iommu: Add probe_device() and remove_device() call-backs > iommu: Move default domain allocation to iommu_probe_device() > iommu: Keep a list of allocated groups in __iommu_probe_device() > iommu: Move new probe_device path to separate function > iommu: Split off default domain allocation from group assignment > iommu: Move iommu_group_create_direct_mappings() out of > iommu_group_add_device() > iommu: Export bus_iommu_probe() and make is safe for re-probing > iommu/amd: Remove dev_data->passthrough > iommu/amd: Convert to probe/release_device() call-backs > iommu/vt-d: Convert to probe/release_device() call-backs > iommu/arm-smmu: Convert to probe/release_device() call-backs > iommu/pamu: Convert to probe/release_device() call-backs > iommu/s390: Convert to probe/release_device() call-backs > iommu/virtio: Convert to probe/release_device() call-backs > iommu/msm: Convert to probe/release_device() call-backs > iommu/mediatek: Convert to probe/release_device() call-backs > iommu/mediatek-v1 Convert to probe/release_device() call-backs > iommu/qcom: Convert to probe/release_device() call-backs > iommu/rockchip: Convert to probe/release_device() call-backs > iommu/tegra: Convert to probe/release_device() call-backs > iommu/renesas: Convert to probe/release_device() call-backs > iommu/omap: Remove orphan_dev tracking > iommu/omap: Convert to probe/release_device() call-backs > iommu/exynos: Use first SYSMMU in controllers list for IOMMU core > iommu/exynos: Convert to probe/release_device() call-backs > iommu: Remove add_device()/remove_device() code-paths > iommu: Unexport iommu_group_get_for_dev() > >Sai Praneeth Prakhya (1): > iommu: Add def_domain_type() callback in iommu_ops > > drivers/iommu/amd_iommu.c | 97 ++++---- > drivers/iommu/amd_iommu_types.h | 1 - > drivers/iommu/arm-smmu-v3.c | 38 +-- > drivers/iommu/arm-smmu.c | 39 ++-- > drivers/iommu/exynos-iommu.c | 24 +- > drivers/iommu/fsl_pamu_domain.c | 22 +- > drivers/iommu/intel-iommu.c | 68 +----- > drivers/iommu/iommu.c | 393 +++++++++++++++++++++++++------- > drivers/iommu/ipmmu-vmsa.c | 60 ++--- > drivers/iommu/msm_iommu.c | 34 +-- > drivers/iommu/mtk_iommu.c | 24 +- > drivers/iommu/mtk_iommu_v1.c | 50 ++-- > drivers/iommu/omap-iommu.c | 99 ++------ > drivers/iommu/qcom_iommu.c | 24 +- > drivers/iommu/rockchip-iommu.c | 26 +-- > drivers/iommu/s390-iommu.c | 22 +- > drivers/iommu/tegra-gart.c | 24 +- > drivers/iommu/tegra-smmu.c | 31 +-- > drivers/iommu/virtio-iommu.c | 41 +--- > include/linux/iommu.h | 21 +- > 20 files changed, 533 insertions(+), 605 deletions(-) > >-- >2.17.1 > >_______________________________________________ >iommu mailing list >iommu@lists.linux-foundation.org >https://lists.linuxfoundation.org/mailman/listinfo/iommu > Hi Joerg, With this patchset, I have an epyc system where if I boot with iommu=nopt and force a dump I will see some io page faults for a nic on the system. The vmcore is harvested and the system reboots. I haven't reproduced it on other systems yet, but without the patchset I don't see the io page faults during the kdump. Regards, Jerry