Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp951506pxx; Thu, 29 Oct 2020 20:00:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw5PPXaFEBqasTTavf/v3TUpqTasV0SvRRNFvU9nfO97esyvDnju47UF96eSy0j/S3Y5d8w X-Received: by 2002:a17:906:110b:: with SMTP id h11mr463486eja.156.1604026835786; Thu, 29 Oct 2020 20:00:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1604026835; cv=none; d=google.com; s=arc-20160816; b=0Aea6JcTNZNEFhyhXSWMSArUGZTErZU4n4Ci7aFt/NaWurZky5lYRmzHFi8h5qCOWA dSkG4TXABGbssYI9i7lGgT0ztnJzXz2pHU/rC8Kgn/2nPj3qpc2iyjnk9HejmmpJgjLf dntoSXk7JmWzsAc8mNuAYj0+UE+1ARug4B7smQ4eB638x0jzMbuW4lsmkAZvS5O0f4Oq qSegfHtU3dTBcHEriNBWoiGgHXQ+naDqkMdDtW5LJZpQE2rbdjn01aQqt56LEys+xcwp alckYuZJ6ZC2bdPv1rF04mWy8hFKWedSh+SsuF5sIEk6q1lovc3kdNUWP5E9b/OESNvJ vOaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:ironport-sdr:ironport-sdr; bh=TaU34mRTT+VE7hiqOJBwq/rtKRuriAu++4XS8PFs6eI=; b=ZmlM/qVuoeXd7E4f2c+xfOKnzFBEvusnux6jRRMwFr1MBTFN9LH1mmzRjcgex+Pn4k WTnna3mCG7jMH/0PiML20bqSR/k+cwpJsUwguWFrmga67EEJekHvVx4VIdy4CFesn0QJ 8lOQShOySkt4LWyhoeyRFgC+rqJY3XZbIF0F/9i5m0aOaaZO9KFrHypENVze6X72F2vP Q558gFlXKDNC/fSBeXjQaxpxO2iVDEwWJzVAJnf0liLKWaypuNyhut17Yy4QfIv2bCAC A/3uYffh6YkMML3wMxqj0v5O2yEtI07VmVYnx+X0kMSN0Ddq+f6YmfY3Xr+ZjLi1wKOR 99uw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f22si2719141ejc.49.2020.10.29.20.00.13; Thu, 29 Oct 2020 20:00:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726410AbgJ3C61 (ORCPT + 99 others); Thu, 29 Oct 2020 22:58:27 -0400 Received: from mga18.intel.com ([134.134.136.126]:23856 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726342AbgJ3C6R (ORCPT ); Thu, 29 Oct 2020 22:58:17 -0400 IronPort-SDR: M8nWjXFH30GTTZnpmzHLGigkUs5IiHWQJMucIblk06jaKrFqGgGuCQ/m7TZcC7/EgT/9MhgH76 j1KlcJdxx+ZQ== X-IronPort-AV: E=McAfee;i="6000,8403,9789"; a="156326126" X-IronPort-AV: E=Sophos;i="5.77,431,1596524400"; d="scan'208";a="156326126" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 29 Oct 2020 19:58:16 -0700 IronPort-SDR: uL0VWrOYLs8oaetVA266Zi8E2ifbVqy3XTPqUkkhkLyIlQNQgyUd0gPHaw/vpg/xyDvhXrGEXc 9QGAWFvV3VMA== X-IronPort-AV: E=Sophos;i="5.77,431,1596524400"; d="scan'208";a="469374401" Received: from yisun1-ubuntu2.bj.intel.com ([10.238.144.104]) by orsmga004-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-SHA; 29 Oct 2020 19:58:14 -0700 From: Yi Sun To: joro@8bytes.org, dwmw2@infradead.org, baolu.lu@linux.intel.com, jean-philippe@linaro.org Cc: iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org, yi.l.liu@intel.com, jacob.jun.pan@linux.intel.com, Yi Sun Subject: [PATCH v2 1/2] iommu/vt-d: Fix sid not set issue in intel_svm_bind_gpasid() Date: Fri, 30 Oct 2020 10:37:23 +0800 Message-Id: <1604025444-6954-2-git-send-email-yi.y.sun@linux.intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1604025444-6954-1-git-send-email-yi.y.sun@linux.intel.com> References: <1604025444-6954-1-git-send-email-yi.y.sun@linux.intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Liu Yi L Should get correct sid and set it into sdev. Because we execute 'sdev->sid != req->rid' in the loop of prq_event_thread(). Fixes: eb8d93ea3c1d ("iommu/vt-d: Report page request faults for guest SVA") Signed-off-by: Liu Yi L Signed-off-by: Yi Sun --- drivers/iommu/intel/svm.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/drivers/iommu/intel/svm.c b/drivers/iommu/intel/svm.c index f1861fa..7584669 100644 --- a/drivers/iommu/intel/svm.c +++ b/drivers/iommu/intel/svm.c @@ -279,6 +279,7 @@ int intel_svm_bind_gpasid(struct iommu_domain *domain, struct device *dev, struct intel_iommu *iommu = device_to_iommu(dev, NULL, NULL); struct intel_svm_dev *sdev = NULL; struct dmar_domain *dmar_domain; + struct device_domain_info *info; struct intel_svm *svm = NULL; int ret = 0; @@ -310,6 +311,10 @@ int intel_svm_bind_gpasid(struct iommu_domain *domain, struct device *dev, if (data->hpasid <= 0 || data->hpasid >= PASID_MAX) return -EINVAL; + info = get_domain_info(dev); + if (!info) + return -EINVAL; + dmar_domain = to_dmar_domain(domain); mutex_lock(&pasid_mutex); @@ -357,6 +362,7 @@ int intel_svm_bind_gpasid(struct iommu_domain *domain, struct device *dev, goto out; } sdev->dev = dev; + sdev->sid = PCI_DEVID(info->bus, info->devfn); /* Only count users if device has aux domains */ if (iommu_dev_feature_enabled(dev, IOMMU_DEV_FEAT_AUX)) -- 2.7.4