Received: by 2002:a05:7412:8598:b0:f9:33c2:5753 with SMTP id n24csp332663rdh; Mon, 18 Dec 2023 23:27:38 -0800 (PST) X-Google-Smtp-Source: AGHT+IGltnEJoICCBd5gQBaxXtjHAijfawKGJWqYA83Uy1x7wR+HlxANDzXnX3Tk/8LbMG7rH3ab X-Received: by 2002:a05:620a:8396:b0:77d:a48a:62f3 with SMTP id pb22-20020a05620a839600b0077da48a62f3mr20693329qkn.60.1702970858586; Mon, 18 Dec 2023 23:27:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702970858; cv=none; d=google.com; s=arc-20160816; b=VLM8Yed2GcZkjNhfnEEqMi6lB2blz+6friNtdSIsAM+UpbnBJqkgbTppfxwbQsqGMv 2xUgLiA4JYFG8EU2oTQNl8iUP1hdJibid/0EudUPChhx+s/nWuL1ZruklE7bSxYei6f7 e4QKLmgx/8eZu6vB7R4wnwmgCOtkihmHi6zYxJdlz6dH6hNzaYeJ37b1XRqCBdEpewpF DjIIJeMOlYdMltfSzM4vuCs9P8LdjoqLxt5/y5tuxKrUckZe262nECZuCTkBBp85chGE SYfTOQCea7Cm+rCqE+KWlCu9Gr1e12TmGRsBFF8cPFmji+AbIrf8qdYUsPq9AFFp4CaQ bxyA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:references:cc:to:from:subject :user-agent:mime-version:list-unsubscribe:list-subscribe:list-id :precedence:date:message-id:dkim-signature; bh=uKZx9iXv2izqoNON7Fpp1JEcgw6ChvPRwY6QmorW2JI=; fh=duo5qI6QjS1rF1Y7tMIuXrrx56QAJs3kfIHacGw6ElU=; b=n2KmEoMvWVtCwGX5c1eCAh3AwAeGxjqX/KsBiDiTWS8lejfVICAdhuUYx5fWha9zQ7 MwNWG8iJ/MtHvqV2raXRcNDUaOa9jRo1YwhX49gXEWZm4Cy4OAQQnkUfgUeLUmf6TuX+ CTqnXhXPA3mXJAtGYrC1IDNmSrC0OWb0vFJOEeGcQAGik3tYjBzBbyNXNL0j5BThpK2n EUG4zJXpgJ8EBE0QLYIn947Xcb4lmT74GctUYBBGP94opdq3bI/DjxYOahwvHAqvuXhV qc7l1wEXzla5GWI6DI2P/BQTuG5f6sufXzCZpfWXTF1IQLjwXMlD5/0vzowVCqVEGas/ 6RRg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=GMdQvwlF; spf=pass (google.com: domain of linux-kernel+bounces-4805-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-4805-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id br16-20020a05620a461000b0077d5f7ae3desi27200427qkb.300.2023.12.18.23.27.38 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 18 Dec 2023 23:27:38 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-4805-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=GMdQvwlF; spf=pass (google.com: domain of linux-kernel+bounces-4805-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-4805-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 41E7F1C236C7 for ; Tue, 19 Dec 2023 07:27:38 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id E164BC134; Tue, 19 Dec 2023 07:27:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="GMdQvwlF" X-Original-To: linux-kernel@vger.kernel.org Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.13]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id DCDB412B78; Tue, 19 Dec 2023 07:27:26 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=linux.intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1702970846; x=1734506846; h=message-id:date:mime-version:subject:from:to:cc: references:in-reply-to:content-transfer-encoding; bh=jk9Sunb7zq+cjBpGeZgBIoAaNdMTUVPZFGJR1ag5ERo=; b=GMdQvwlFV8p3vF2rlKClKmCop+DT+qaJNrEtlaGxteREBEEDKyxNPdon 4/Nhz5oLVrAoD8fe5joRSabCFM6XgE15pqj4Gbppg//ycEMCfNHEEFSWM 1+YvxUZkSIUcuBF1ntfjS8vqW127IoY1P5I+ZxPWrX3PZP6QrowlaCSV2 zO0oeCbXwVcDwKPS8mKBQtlYrzvMGqHRKXnX157Nda67pPrI3p4w9cpFz JEYcCcQjpPTC/+uVN+oStVr5/UBEorC/nsj7ZlC1FADeiAHe8aKM+Ui1B BY0ClJWHafECS4Y5u7dOY7RdH2GbFREAny8bW94n3koYaMmqNueZ6mI5T w==; X-IronPort-AV: E=McAfee;i="6600,9927,10928"; a="2711583" X-IronPort-AV: E=Sophos;i="6.04,287,1695711600"; d="scan'208";a="2711583" Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orvoesa105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Dec 2023 23:27:26 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10928"; a="810130383" X-IronPort-AV: E=Sophos;i="6.04,287,1695711600"; d="scan'208";a="810130383" Received: from zhaohaif-mobl.ccr.corp.intel.com (HELO [10.93.26.36]) ([10.93.26.36]) by orsmga001-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Dec 2023 23:27:23 -0800 Message-ID: <53591775-b93c-4963-b57b-8027e39a6ecc@linux.intel.com> Date: Tue, 19 Dec 2023 15:27:14 +0800 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v3 2/2] iommu/vt-d: don's issue devTLB flush request when device is disconnected From: Ethan Zhao To: Baolu Lu Cc: linux-pci@vger.kernel.org, iommu@lists.linux.dev, linux-kernel@vger.kernel.org, bhelgaas@google.com, dwmw2@infradead.org, will@kernel.org, robin.murphy@arm.com, lukas@wunner.de References: <20231217114902.3836260-1-haifeng.zhao@linux.intel.com> <20231217114902.3836260-3-haifeng.zhao@linux.intel.com> <2fa95471-e22e-46b7-8f23-f4e6abbbd69b@linux.intel.com> In-Reply-To: <2fa95471-e22e-46b7-8f23-f4e6abbbd69b@linux.intel.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Baolu, On 12/19/2023 3:16 PM, Ethan Zhao wrote: > > On 12/19/2023 2:57 PM, Baolu Lu wrote: >> On 2023/12/19 14:49, Ethan Zhao wrote: >>>>> diff --git a/drivers/iommu/intel/pasid.c >>>>> b/drivers/iommu/intel/pasid.c >>>>> index 74e8e4c17e81..182eb5df244d 100644 >>>>> --- a/drivers/iommu/intel/pasid.c >>>>> +++ b/drivers/iommu/intel/pasid.c >>>>> @@ -476,6 +476,23 @@ devtlb_invalidation_with_pasid(struct >>>>> intel_iommu *iommu, >>>>>   { >>>>>       struct device_domain_info *info; >>>>>       u16 sid, qdep, pfsid; >>>>> +    struct pci_dev *pdev; >>>>> + >>>>> +    pdev = to_pci_dev(dev); >>>>> +    if (!pdev) >>>>> +        return; >>>>> + >>>>> +    /* >>>>> +     * If endpoint device's link was brough down by user's pci >>>>> configuration >>>>> +     * access to it's hotplug capable slot link control register, >>>>> as sequence >>>>> +     * response for DLLSC, pciehp_ist() will set the device >>>>> error_state to >>>>> +     * pci_channel_io_perm_failure. Checking device's state here >>>>> to avoid >>>>> +     * issuing meaningless devTLB flush request to it, that might >>>>> cause lockup >>>>> +     * warning or deadlock because too long time waiting in >>>>> interrupt context. >>>>> +     */ >>>>> + >>>>> +    if (pci_dev_is_disconnected(pdev)) >>>>> +        return; >>>>>         info = dev_iommu_priv_get(dev); >>>>>       if (!info || !info->ats_enabled) >>>> >>>> It's likely better to check the device status after verifying >>>> ats_enabled. How about below change? >>>> >>>> diff --git a/drivers/iommu/intel/pasid.c b/drivers/iommu/intel/pasid.c >>>> index 74e8e4c17e81..fa19c6cdfd8b 100644 >>>> --- a/drivers/iommu/intel/pasid.c >>>> +++ b/drivers/iommu/intel/pasid.c >>>> @@ -481,6 +481,9 @@ devtlb_invalidation_with_pasid(struct >>>> intel_iommu *iommu, >>>>         if (!info || !info->ats_enabled) >>>>                 return; >>>> >>>> +       if (pci_dev_is_disconnected(to_pci_dev(dev))) >>> >>> I like this kind of simplicity, but rationalist always brings me >>> back to the no-error(ugly) >>> >>> style.  ???? >> >> The rational is that Intel IOMMU driver only supports PCI ATS. So if >> device is marked as ATS supported, then it must be a PCI device. >> Therefore, it's safe to convert it to pci_device with to_pci_dev(). > > Fair engough ! > > May I use  your reviewed-by sign in next version after that ? Thanks, Ethan > Thanks, > > Ethan > >> >> If you move this up before ATS checking, then you need to check >> dev_is_pci(). >> >> Best regards, >> baolu >> >