Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp700259pxb; Wed, 11 Nov 2020 14:08:37 -0800 (PST) X-Google-Smtp-Source: ABdhPJx9+pLAEZCa8+I1aPOnnwX8D6JmvOo0bN4QwgjPDMmuQfsLledBmMFIMYbTmC+2txeRkK65 X-Received: by 2002:a05:6402:1153:: with SMTP id g19mr1843053edw.312.1605132517316; Wed, 11 Nov 2020 14:08:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605132517; cv=none; d=google.com; s=arc-20160816; b=SUde7xF2J8nJyqciSvqPpgwyeghVDrQraFCSbXkwNX8p0FY9O3DbuM0dyHIuaDhc4e Ye3FfjGCkBhCE8W8t3LPoo9atJtLS7FFaLjSlcs66h5EkfW2wjrlhg8MMu66d1RCbXIT gFH72MpnoexyKIcPIsjyq6nSCnpShD0FlDYnGGM7uxSDcRKae+F5Ri/TLQ41KHe2wJ63 LT0tZ9GV1PAazudQ7wxVsCJMbNFdMjVSUNwIECX2kc2V9ke61Wvd34cqki28OjVYKOW8 gytf2y80pBctxY/5Tj4GY4sycI/Lxyy/lIz5FgvSO5qp/AVd1lkloQZOmlQuyDR2ngz8 lz/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:robot-unsubscribe :robot-id:message-id:mime-version:references:in-reply-to:cc:subject :to:reply-to:sender:from:dkim-signature:dkim-signature:date; bh=eTDO01Vr/s4R/zNC/gaqopIce2jceYVkAkhNTJzqJYE=; b=XK4DTYXpt6FsoaVB1HrEOFcL9J2c+7jQwX7eyitClHQXOp2SD4xwaGDQLNKl/Zzpwf iwcHh5AiFEkxuz7cHw302rg+I10QH+IQ0TI4QrH8Asn7f/vWp0qosHyQYFYe7uJDjvgC m8LpzwxKWk45gqVYpIY1L/SCgBzVvQn9a8XXaRnyHO6ZRnI1i/RMkqoGLHQrQo2CwOgk RrCY9m/kNBZbTDPjw/TsUNRF+LPPGEt/4Z9isr3SQODaF9F/CZUkxE6FouCGUfr3+0CM hog2QCjEwTapjIlLwf7j3MNYMFmPExCSv96A/7uumVKolC5seURbTMTkvMDUpwi4YMIw eLnQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=jGKkguJ8; dkim=neutral (no key) header.i=@linutronix.de header.b=15WPm8Ih; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l14si2432745edq.543.2020.11.11.14.08.13; Wed, 11 Nov 2020 14:08:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=jGKkguJ8; dkim=neutral (no key) header.i=@linutronix.de header.b=15WPm8Ih; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727162AbgKKWGl (ORCPT + 99 others); Wed, 11 Nov 2020 17:06:41 -0500 Received: from Galois.linutronix.de ([193.142.43.55]:40808 "EHLO galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726671AbgKKWGk (ORCPT ); Wed, 11 Nov 2020 17:06:40 -0500 Date: Wed, 11 Nov 2020 22:06:36 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1605132398; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=eTDO01Vr/s4R/zNC/gaqopIce2jceYVkAkhNTJzqJYE=; b=jGKkguJ8psvP+HAMqoTx4Sf7K8a5v0z0rmunYQewKioNStM9cn8oBlFsLRid0jkRQyWtjm +a2tXCEtAhXzUc+YBa523ZDRQXZqsFYEOWcFli8+ju9TvWNGyezY6EEsaGXqIs25Uey1Qw 9lMGPfRXiV+uHUMWlsv/heGeIWnpYlTBVd9P5djh86ehUslZS74wDlJkZDWG25cUpimaCj 8zu/f0e13lO15ovl1++pRMly3wR1yJm6p8q9+wkyS8cj/CieVk44ugUGYUcjBHrD4kbzFk pR7h09cuIbkQJoUF60Pctws4RwsTsuKJVlrosCKNAK82HJ2tcWuAXWOp2LqFYA== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1605132398; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=eTDO01Vr/s4R/zNC/gaqopIce2jceYVkAkhNTJzqJYE=; b=15WPm8IhRlDD77+j1QWO0ogyB0jfGuGDu3Nzc2KHHb/Ljvfgr2lKcJjkOgHe6rI/iyfiax sAU/xoRPQios8OBg== From: "tip-bot2 for David Woodhouse" Sender: tip-bot2@linutronix.de Reply-to: linux-kernel@vger.kernel.org To: linux-tip-commits@vger.kernel.org Subject: [tip: x86/apic] iommu/amd: Don't register interrupt remapping irqdomain when IR is disabled Cc: David Woodhouse , Thomas Gleixner , x86@kernel.org, linux-kernel@vger.kernel.org In-Reply-To: <20201111144322.1659970-1-dwmw2@infradead.org> References: <20201111144322.1659970-1-dwmw2@infradead.org> MIME-Version: 1.0 Message-ID: <160513239668.11244.7104408892860202809.tip-bot2@tip-bot2> Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The following commit has been merged into the x86/apic branch of tip: Commit-ID: 2df985f5e44c43f5d29d8cc3aaa8e8ac697e9de6 Gitweb: https://git.kernel.org/tip/2df985f5e44c43f5d29d8cc3aaa8e8ac697e9de6 Author: David Woodhouse AuthorDate: Wed, 11 Nov 2020 14:43:20 Committer: Thomas Gleixner CommitterDate: Wed, 11 Nov 2020 23:01:58 +01:00 iommu/amd: Don't register interrupt remapping irqdomain when IR is disabled Registering the remapping irq domain unconditionally is potentially allowing I/O-APIC and MSI interrupts to be parented in the IOMMU IR domain even when IR is disabled. Don't do that. Signed-off-by: David Woodhouse Signed-off-by: Thomas Gleixner Link: https://lore.kernel.org/r/20201111144322.1659970-1-dwmw2@infradead.org --- drivers/iommu/amd/init.c | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/drivers/iommu/amd/init.c b/drivers/iommu/amd/init.c index c2769f2..a94b96f 100644 --- a/drivers/iommu/amd/init.c +++ b/drivers/iommu/amd/init.c @@ -1601,9 +1601,11 @@ static int __init init_iommu_one(struct amd_iommu *iommu, struct ivhd_header *h) if (ret) return ret; - ret = amd_iommu_create_irq_domain(iommu); - if (ret) - return ret; + if (amd_iommu_irq_remap) { + ret = amd_iommu_create_irq_domain(iommu); + if (ret) + return ret; + } /* * Make sure IOMMU is not considered to translate itself. The IVRS