Received: by 2002:a05:7412:b995:b0:f9:9502:5bb8 with SMTP id it21csp3935549rdb; Thu, 28 Dec 2023 05:10:25 -0800 (PST) X-Google-Smtp-Source: AGHT+IFn9rMj1jkso7cbLPoVb0olH9xBIWh+cE7uSWlHbWN+VnWyhZp8TILojH5rBPAkq74lz4Q3 X-Received: by 2002:a50:c049:0:b0:552:d790:ce07 with SMTP id u9-20020a50c049000000b00552d790ce07mr7179481edd.36.1703769025715; Thu, 28 Dec 2023 05:10:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1703769025; cv=none; d=google.com; s=arc-20160816; b=YgZfAoIHO2N2v6SXKPavUEkbuEqnOTHKvIOVNFdQS0z7nrVND3UEqnFrastpqOrMCb /7gC0EKe+PcKkw7pBW7t3aJsW9KCcm+OJVuLmpXc3hhU35NUG48h6643cmdjFXQKu3KH q16vk7p8N0q7Tw6+C2896Gv2FV2lrHOoTAQwwTezjG7QO4kJv5PY9TfRcwO4wNFcpg8r 0hsDuolY5X5h+lG9Xrfe3a6yrtp8zsuMJjebnK//S9EAIOSnZPjAtB17JWiHMN8CClA4 9nw5PEuCxvuL35eyvYwRToOhQgpzxCd+ZEIUbMIVjgynOntGO7BFmppceoeVhU65Ysce TYqQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:cc:to:subject :user-agent:mime-version:list-unsubscribe:list-subscribe:list-id :precedence:date:message-id:dkim-signature; bh=5ZxpoqoVcqMb7k/+v4LVqAMzWb2lF/MowfeTQu6JcdU=; fh=5zLOwD0S3wC96OEpeaArQtHf0AZNszbOE0b79dRPq+g=; b=ILQxm2mllIXDbW6nruwXTpOkNZUw5Zrzy143ZrB+oyGNLmg0qaU0XGzpLcuDG7A5ZE udG/0GJGz5sewbRwF9YyiINPSF7VQOYX6zwYV9l1ea7QS8U6mkdhIB3nFrNOSFH+Pegp H4HfxGghdEnCBw+0Y+yKTJM7+kiCXDRHzaBQDG+zAy5LNTm84dCktEoYYEWmWHwLXTnf ri4OPO3i6UHep0BW6U8l91/s3XqA0z26t4Cp7MWEG2YWr990ioGvV6Nf947RKwqwSt0R EZyp6i/a9VDk3PEriHZNQHh482N3PHV0ybIzNyvdNBGDrzkwqaMSqhzYmLV4YRBBRlDi XMyQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=ecqsIWj3; spf=pass (google.com: domain of linux-kernel+bounces-12668-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-12668-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id z13-20020a056402274d00b00553561914a4si7294935edd.368.2023.12.28.05.10.25 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 28 Dec 2023 05:10:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-12668-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=ecqsIWj3; spf=pass (google.com: domain of linux-kernel+bounces-12668-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-12668-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 313041F24377 for ; Thu, 28 Dec 2023 13:10:25 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 303B379EF; Thu, 28 Dec 2023 13:10:17 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="ecqsIWj3" X-Original-To: linux-kernel@vger.kernel.org Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.151]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 1DDB979C6; Thu, 28 Dec 2023 13:10:13 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=linux.intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1703769014; x=1735305014; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to:content-transfer-encoding; bh=+h48D15/TNyIh+MOL0pe6S5/Owyp+lm7qG0IVc8QWuw=; b=ecqsIWj3/SlvYxiJdvQQ+jMFkjwvrob97Z5f24GKDHLN0Y2E1TNbOXSI tbB65H+6Rkjit3obz2CpR0EnuzqlrDGNFcphJcfCPmdDgp3nYoR6kTjFX uWmFBp4KvhdXtWl+cKBXgau33ZmA3OLzJ6TcBjaF8qhqKoUFjx2sRdQzf kQ9a6lT1Wa8OoNNP5wb176u2L5S8/g63yMr7TgGQDC7AO1DKNXsJj5MVz e/t/iGFWmqYpaEShk3h7HxXRrMA72H2SwrGEnNA4TGCV3a6v6lEG1dFR2 1UIchmJ2zJ8hATbMFiSJfTl28CdvHk6/PiYNcB5tnPHLmtpvCUeW3CN3T w==; X-IronPort-AV: E=McAfee;i="6600,9927,10936"; a="376701617" X-IronPort-AV: E=Sophos;i="6.04,312,1695711600"; d="scan'208";a="376701617" Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Dec 2023 05:10:13 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10936"; a="848946415" X-IronPort-AV: E=Sophos;i="6.04,312,1695711600"; d="scan'208";a="848946415" Received: from zhaohaif-mobl.ccr.corp.intel.com (HELO [10.249.169.62]) ([10.249.169.62]) by fmsmga004-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Dec 2023 05:10:10 -0800 Message-ID: Date: Thu, 28 Dec 2023 21:10:08 +0800 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [RFC PATCH v9 5/5] iommu/vt-d: don't loop for timeout ATS Invalidation request forever To: "Tian, Kevin" , "bhelgaas@google.com" , "baolu.lu@linux.intel.com" , "dwmw2@infradead.org" , "will@kernel.org" , "robin.murphy@arm.com" , "lukas@wunner.de" Cc: "linux-pci@vger.kernel.org" , "iommu@lists.linux.dev" , "linux-kernel@vger.kernel.org" References: <20231228001646.587653-1-haifeng.zhao@linux.intel.com> <20231228001646.587653-6-haifeng.zhao@linux.intel.com> From: Ethan Zhao In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit On 12/28/2023 4:38 PM, Tian, Kevin wrote: >> From: Ethan Zhao >> Sent: Thursday, December 28, 2023 8:17 AM >> >> When the ATS Invalidation request timeout happens, the qi_submit_sync() >> will restart and loop for the invalidation request forever till it is >> done, it will block another Invalidation thread such as the fq_timer >> to issue invalidation request, cause the system lockup as following >> >> [exception RIP: native_queued_spin_lock_slowpath+92] >> >> RIP: ffffffffa9d1025c RSP: ffffb202f268cdc8 RFLAGS: 00000002 >> >> RAX: 0000000000000101 RBX: ffffffffab36c2a0 RCX: 0000000000000000 >> >> RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffab36c2a0 >> >> RBP: ffffffffab36c2a0 R8: 0000000000000001 R9: 0000000000000000 >> >> R10: 0000000000000010 R11: 0000000000000018 R12: 0000000000000000 >> >> R13: 0000000000000004 R14: ffff9e10d71b1c88 R15: ffff9e10d71b1980 >> >> ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018 >> >> #12 [ffffb202f268cdc8] native_queued_spin_lock_slowpath at >> ffffffffa9d1025c >> >> #13 [ffffb202f268cdc8] do_raw_spin_lock at ffffffffa9d121f1 >> >> #14 [ffffb202f268cdd8] _raw_spin_lock_irqsave at ffffffffaa51795b >> >> #15 [ffffb202f268cdf8] iommu_flush_dev_iotlb at ffffffffaa20df48 >> >> #16 [ffffb202f268ce28] iommu_flush_iova at ffffffffaa20e182 >> >> #17 [ffffb202f268ce60] iova_domain_flush at ffffffffaa220e27 >> >> #18 [ffffb202f268ce70] fq_flush_timeout at ffffffffaa221c9d >> >> #19 [ffffb202f268cea8] call_timer_fn at ffffffffa9d46661 >> >> #20 [ffffb202f268cf08] run_timer_softirq at ffffffffa9d47933 >> >> #21 [ffffb202f268cf98] __softirqentry_text_start at ffffffffaa8000e0 >> >> #22 [ffffb202f268cff0] asm_call_sysvec_on_stack at ffffffffaa60114f >> --- --- >> (the left part of exception see the hotplug case of ATS capable device) >> >> If one endpoint device just no response to the ATS Invalidation request, >> but is not gone, it will bring down the whole system, to avoid such >> case, don't try the timeout ATS Invalidation request forever. >> >> Signed-off-by: Ethan Zhao >> --- >> drivers/iommu/intel/dmar.c | 2 +- >> 1 file changed, 1 insertion(+), 1 deletion(-) >> >> diff --git a/drivers/iommu/intel/dmar.c b/drivers/iommu/intel/dmar.c >> index 76903a8bf963..206ab0b7294f 100644 >> --- a/drivers/iommu/intel/dmar.c >> +++ b/drivers/iommu/intel/dmar.c >> @@ -1457,7 +1457,7 @@ int qi_submit_sync(struct intel_iommu *iommu, >> struct qi_desc *desc, >> reclaim_free_desc(qi); >> raw_spin_unlock_irqrestore(&qi->q_lock, flags); >> >> - if (rc == -EAGAIN) >> + if (rc == -EAGAIN && type !=QI_DIOTLB_TYPE && type != >> QI_DEIOTLB_TYPE) >> goto restart; >> > this change is moot. > > -EAGAIN is set only when hardware detects a ATS invalidation completion > timeout in qi_check_fault(). so above just essentially kills the restart logic. This change is intended to break the restar login when device-TLB invalidation timeout happens, we don't know how long the ITE took if the device is just no reponse. > > I'd wait for the maintainer of this driver to comment. this part doesn't > look good but there might be some history reason so carefulness must > be paid. I would like to know the reason a hole is left here to hang the driver forever. Thanks, Ethan