Received: by 2002:ab2:6816:0:b0:1f9:5764:f03e with SMTP id t22csp1037056lqo; Fri, 17 May 2024 08:54:16 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWkpapNSHIWsWUxsejTG0+MgzcHQoziWeb4e4kvGZNV+uKirjH0Yq/R4vkUkPf3WLb7KYtnI8FpMZSUK5D8Rrf3cuVIgMg3SDvCWsm2Gg== X-Google-Smtp-Source: AGHT+IGYYJubH7wdtmARjccARpOWsyqGTY2jEqG1nudxynbfJgpVyoslK8/EnllVj8UR/Jxh0m+F X-Received: by 2002:a05:690c:b9d:b0:61b:3454:dbeb with SMTP id 00721157ae682-622affefd33mr254673627b3.46.1715961256453; Fri, 17 May 2024 08:54:16 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1715961256; cv=pass; d=google.com; s=arc-20160816; b=a+KQQje8QAs9vSBbUZLFmyYI0Ml0rtADNIGqwYWar94Sg6cXDbee/5uOvaXllPB8rN btiz1ESSx5BPQbkP72WAVfG21t/NFVH+0PxEbzdhClpnVtRytVzKbC2rWVzTIKaImvfm GR3zCZNY634JpC0KIml5e8LJ2C9Csmec6pMRn3gC0+ZP8BNgd0U1EzIBal+hwDfHwG0i /qR4V/Iu5xdhrxu6RjKTlqMO1zrZ0eNctlslcLZPT0S+iCzG6BVy/vW8cHDypxtTcixT EHcNyaJB2l1N5/g0qhixszWgLemfnpxfTtBuAtE90LM/0vio1FMkWRS7DN1ytRY1wLKx btlw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :references:message-id:subject:cc:to:from:date:dkim-signature; bh=DG0jKqywJmYPZtEkQ4yb1Wz+sniBONy5u9KhxoyaZJ4=; fh=ronBGqFxz4/ykhjFldAd244Sq4tyYP/UydDZVvVA1yE=; b=kMB4LIKNHY+WfS/TyG7gVPyZvYYUxE2IHGlUfXMJkQXzK3MmSaXF0EY30bkq6Bu6JW CaUJHEpzmHzmv/Ah5oj/U/tsAbAhoav74RIr3r4WvWAwpiN49Dni5fs4bUyj14CML3XD 5IrX2ioPxFnkqPqcaibzUBdWmSlCVN9giFXwmExlLJztNGTPEUsDJS6F4zonV3ffLNlY occePPsJKT6eLnLs3H10rZtc3THrsXjqTQHhFXFvoovacS8/14gQgETu7pi8A/eEcvCE mVYc9Ve3wqYqjWvrK5nGrQ7H+TbU6b7e3GnFThmVesX/z0XuaatkmEhEc9Zkj6LBgmF9 dgsQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=IUU1SdOq; arc=pass (i=1 spf=pass spfdomain=redhat.com dkim=pass dkdomain=redhat.com dmarc=pass fromdomain=redhat.com); spf=pass (google.com: domain of linux-kernel+bounces-182319-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-182319-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id d75a77b69052e-43df56f6a3fsi182275351cf.797.2024.05.17.08.54.16 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 May 2024 08:54:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-182319-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=IUU1SdOq; arc=pass (i=1 spf=pass spfdomain=redhat.com dkim=pass dkdomain=redhat.com dmarc=pass fromdomain=redhat.com); spf=pass (google.com: domain of linux-kernel+bounces-182319-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-182319-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 24A911C21545 for ; Fri, 17 May 2024 15:54:16 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9818012F5B4; Fri, 17 May 2024 15:54:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="IUU1SdOq" Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 517B0399 for ; Fri, 17 May 2024 15:54:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.133.124 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715961247; cv=none; b=lmx4sZR3DtLeBRk1+JgU/QxZ+TLubFl4eDiYVkyO4HEUnr1Qmu9wrZbbpirRvg4BoRxThO8Ze+NeB2hZOAfPzM2Rdzg9CGZP2doik7nEgE7wh22WUSsQ2c7bElgYyB2Y0wSg7EEDQpF7xUDHMNE2GCph3H/wZbju5O7PWWOH/po= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715961247; c=relaxed/simple; bh=GtR205AL/6z6bhbjj9jZVXspU9EbN88dltK9qhVAKwY=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=iL53klWWSnJVy5WHEOlZ9HjpdaRtK5NobwSg1ShuaKCjjv4t6o+Ct05omCIn7II9PL5ChNCLoafB8n7LmheKi2dgsAnLHklQvzvUTNKNl1NTcG/8UkKzDTS5M867nn9aeeAqlMGi1U2iVyDVESQdu8LWT+iN91ezjvEW0Xx7uCE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=IUU1SdOq; arc=none smtp.client-ip=170.10.133.124 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1715961244; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=DG0jKqywJmYPZtEkQ4yb1Wz+sniBONy5u9KhxoyaZJ4=; b=IUU1SdOq2jnTtlH4xORCmCpdGKbvo39eYjtXRnkwDSzeUDl36Gtx87sx08IdtbHmg3zpok vIH7bIEO9Ag/ygoG3wQe4u/8SrzitVkwld1WOqNEB8ZjgH38qeGLV/ikIa0u4LXwQps2Op oPY3QdGXzKiNvPhNDCGwaig9DPvGJiU= Received: from mail-qk1-f199.google.com (mail-qk1-f199.google.com [209.85.222.199]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-618-Wym8ifxMNeWfMQsi8v8o-w-1; Fri, 17 May 2024 11:54:03 -0400 X-MC-Unique: Wym8ifxMNeWfMQsi8v8o-w-1 Received: by mail-qk1-f199.google.com with SMTP id af79cd13be357-792c26500adso1238508585a.0 for ; Fri, 17 May 2024 08:54:03 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1715961242; x=1716566042; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=DG0jKqywJmYPZtEkQ4yb1Wz+sniBONy5u9KhxoyaZJ4=; b=Q6EbtinRUB/9sTyogSgw4fYQp/gnraDvJb8AOlC8FYuFwW7SZ4nAoRRkkqCBNfexa0 ZQCE+tp73oZq9I6sVWD6NKdSnbbWqKydGriASpYjfaJswnizQBLwoSVSouL01NQF3BWb qaBe7Dxgny7HqCJUd138xFDjoNnoHJFF+r3PEyOFKAT2qu/TkLRVivmBh86KM7VPAc5p 4hg4qSYS3Nwc+bLY4Rk/S+1ipcRpGXJ0KWSW/mGuhANHIh1AaDG9qrCjBfQHKSusDiXf rCKvrRsE4IoR+CwVgMWgN/z2JKHfAszbWkZB0XbDp4S5PzQOgTLEUACyHCJWcasLQP8y JsIA== X-Forwarded-Encrypted: i=1; AJvYcCXmqkRr0SEVwIeVPMXWMa/ddab+X9+8pughLwZQ9sKk58Bc+wPr3BhPRB6TF8NVK1oQzsm8Etuk4D/IvG1lpz3Z8QIk3Fv85MXZ2i5s X-Gm-Message-State: AOJu0YynH8MKVZ3eDw5U66Y0QEQJvfn2+NLy/ksuk/rCGIPBAihLKPBI 5YHwFtcNGXJjq7KCwt+x0RMvPIpXW67cxnMRJF91plimXKTTRA3DMlqGdXT9lILytwGCBivydIL tSYYdUBBR4a6JU2znDzp/xtOwszQYbktU0hbAKdwqEeq6Kq2aHSnlX0nBosDKVQ== X-Received: by 2002:a05:620a:3711:b0:792:a479:a149 with SMTP id af79cd13be357-792c75efae3mr2858670285a.55.1715961242585; Fri, 17 May 2024 08:54:02 -0700 (PDT) X-Received: by 2002:a05:620a:3711:b0:792:a479:a149 with SMTP id af79cd13be357-792c75efae3mr2858665285a.55.1715961242014; Fri, 17 May 2024 08:54:02 -0700 (PDT) Received: from localhost (ip98-179-76-110.ph.ph.cox.net. [98.179.76.110]) by smtp.gmail.com with ESMTPSA id af79cd13be357-792bf2fc57asm913121485a.81.2024.05.17.08.54.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 May 2024 08:54:01 -0700 (PDT) Date: Fri, 17 May 2024 08:54:00 -0700 From: Jerry Snitselaar To: Robin Murphy Cc: Jon Hunter , Joerg Roedel , Christoph Hellwig , Vineet Gupta , Russell King , Catalin Marinas , Will Deacon , Huacai Chen , WANG Xuerui , Thomas Bogendoerfer , Paul Walmsley , Palmer Dabbelt , Albert Ou , Lorenzo Pieralisi , Hanjun Guo , Sudeep Holla , "K. Y. Srinivasan" , Haiyang Zhang , Wei Liu , Dexuan Cui , Suravee Suthikulpanit , David Woodhouse , Lu Baolu , Niklas Schnelle , Matthew Rosato , Gerald Schaefer , Jean-Philippe Brucker , Rob Herring , Frank Rowand , Marek Szyprowski , Jason Gunthorpe , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-acpi@vger.kernel.org, iommu@lists.linux.dev, devicetree@vger.kernel.org, Jason Gunthorpe , "linux-tegra@vger.kernel.org" Subject: Re: [PATCH v4 5/7] iommu/dma: Make limit checks self-contained Message-ID: References: <243d441d-dda8-442a-a495-83bf9725a14c@nvidia.com> <48c39306-c226-4e7f-a013-d679ca80157e@arm.com> <46fc1b7f-7d10-4233-b089-aa173ad3bbeb@nvidia.com> <981c85f3-6d43-4c2b-a440-88bf81a18e55@arm.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <981c85f3-6d43-4c2b-a440-88bf81a18e55@arm.com> On Fri, May 17, 2024 at 04:03:57PM GMT, Robin Murphy wrote: > On 17/05/2024 3:21 pm, Jon Hunter wrote: > > > > On 15/05/2024 15:59, Robin Murphy wrote: > > > Hi Jon, > > > > > > On 2024-05-14 2:27 pm, Jon Hunter wrote: > > > > Hi Robin, > > > > > > > > On 19/04/2024 17:54, Robin Murphy wrote: > > > > > It's now easy to retrieve the device's DMA limits if we want to check > > > > > them against the domain aperture, so do that ourselves instead of > > > > > relying on them being passed through the callchain. > > > > > > > > > > Reviewed-by: Jason Gunthorpe > > > > > Tested-by: Hanjun Guo > > > > > Signed-off-by: Robin Murphy > > > > > --- > > > > > ? drivers/iommu/dma-iommu.c | 21 +++++++++------------ > > > > > ? 1 file changed, 9 insertions(+), 12 deletions(-) > > > > > > > > > > diff --git a/drivers/iommu/dma-iommu.c b/drivers/iommu/dma-iommu.c > > > > > index a3039005b696..f542eabaefa4 100644 > > > > > --- a/drivers/iommu/dma-iommu.c > > > > > +++ b/drivers/iommu/dma-iommu.c > > > > > @@ -660,19 +660,16 @@ static void > > > > > iommu_dma_init_options(struct iommu_dma_options *options, > > > > > ? /** > > > > > ?? * iommu_dma_init_domain - Initialise a DMA mapping domain > > > > > ?? * @domain: IOMMU domain previously prepared by > > > > > iommu_get_dma_cookie() > > > > > - * @base: IOVA at which the mappable address space starts > > > > > - * @limit: Last address of the IOVA space > > > > > ?? * @dev: Device the domain is being initialised for > > > > > ?? * > > > > > - * @base and @limit + 1 should be exact multiples of IOMMU > > > > > page granularity to > > > > > - * avoid rounding surprises. If necessary, we reserve the > > > > > page at address 0 > > > > > + * If the geometry and dma_range_map include address 0, we > > > > > reserve that page > > > > > ?? * to ensure it is an invalid IOVA. It is safe to > > > > > reinitialise a domain, but > > > > > ?? * any change which could make prior IOVAs invalid will fail. > > > > > ?? */ > > > > > -static int iommu_dma_init_domain(struct iommu_domain > > > > > *domain, dma_addr_t base, > > > > > -???????????????? dma_addr_t limit, struct device *dev) > > > > > +static int iommu_dma_init_domain(struct iommu_domain > > > > > *domain, struct device *dev) > > > > > ? { > > > > > ????? struct iommu_dma_cookie *cookie = domain->iova_cookie; > > > > > +??? const struct bus_dma_region *map = dev->dma_range_map; > > > > > ????? unsigned long order, base_pfn; > > > > > ????? struct iova_domain *iovad; > > > > > ????? int ret; > > > > > @@ -684,18 +681,18 @@ static int > > > > > iommu_dma_init_domain(struct iommu_domain *domain, > > > > > dma_addr_t base, > > > > > ????? /* Use the smallest supported page size for IOVA granularity */ > > > > > ????? order = __ffs(domain->pgsize_bitmap); > > > > > -??? base_pfn = max_t(unsigned long, 1, base >> order); > > > > > +??? base_pfn = 1; > > > > > ????? /* Check the domain allows at least some access to the > > > > > device... */ > > > > > -??? if (domain->geometry.force_aperture) { > > > > > +??? if (map) { > > > > > +??????? dma_addr_t base = dma_range_map_min(map); > > > > > ????????? if (base > domain->geometry.aperture_end || > > > > > -??????????? limit < domain->geometry.aperture_start) { > > > > > +??????????? dma_range_map_max(map) < > > > > > domain->geometry.aperture_start) { > > > > > ????????????? pr_warn("specified DMA range outside IOMMU > > > > > capability\n"); > > > > > ????????????? return -EFAULT; > > > > > ????????? } > > > > > ????????? /* ...then finally give it a kicking to make sure it fits */ > > > > > -??????? base_pfn = max_t(unsigned long, base_pfn, > > > > > -??????????????? domain->geometry.aperture_start >> order); > > > > > +??????? base_pfn = max(base, > > > > > domain->geometry.aperture_start) >> order; > > > > > ????? } > > > > > ????? /* start_pfn is always nonzero for an > > > > > already-initialised domain */ > > > > > @@ -1760,7 +1757,7 @@ void iommu_setup_dma_ops(struct device > > > > > *dev, u64 dma_base, u64 dma_limit) > > > > > ?????? * underlying IOMMU driver needs to support via the > > > > > dma-iommu layer. > > > > > ?????? */ > > > > > ????? if (iommu_is_dma_domain(domain)) { > > > > > -??????? if (iommu_dma_init_domain(domain, dma_base, dma_limit, dev)) > > > > > +??????? if (iommu_dma_init_domain(domain, dev)) > > > > > ????????????? goto out_err; > > > > > ????????? dev->dma_ops = &iommu_dma_ops; > > > > > ????? } > > > > > > > > > > > > I have noticed some random test failures on Tegra186 and > > > > Tegra194 and bisect is pointing to this commit. Reverting this > > > > along with the various dependencies does fix the problem. On > > > > Tegra186 CPU hotplug is failing and on Tegra194 suspend is > > > > failing. Unfortunately, on neither platform do I see any > > > > particular crash but the boards hang somewhere. > > > > > > That is... thoroughly bemusing :/ Not only is there supposed to be > > > no real functional change here - we should merely be recalculating > > > the same information from dev->dma_range_map that the callers were > > > already doing to generate the base/limit arguments - but the act of > > > initially setting up a default domain for a device behind an IOMMU > > > should have no connection whatsoever to suspend and especially not > > > to CPU hotplug. > > > > > > Yes it does look odd, but this is what bisect reported ... > > > > git bisect start > > # good: [a38297e3fb012ddfa7ce0321a7e5a8daeb1872b6] Linux 6.9 > > git bisect good a38297e3fb012ddfa7ce0321a7e5a8daeb1872b6 > > # bad: [6ba6c795dc73c22ce2c86006f17c4aa802db2a60] Add linux-next > > specific files for 20240513 > > git bisect bad 6ba6c795dc73c22ce2c86006f17c4aa802db2a60 > > # good: [29e7f949865a023a21ecdfbd82d68ac697569f34] Merge branch 'main' > > of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next.git > > git bisect good 29e7f949865a023a21ecdfbd82d68ac697569f34 > > # skip: [150e6cc14e51f2a07034106a4529cdaafd812c46] Merge branch 'next' > > of git://git.kernel.org/pub/scm/linux/kernel/git/dtor/input.git > > git bisect skip 150e6cc14e51f2a07034106a4529cdaafd812c46 > > # good: [f5d75327d30af49acf2e4b55f35ce2e6c45d1287] drm/amd/display: Fix > > invalid Copyright notice > > git bisect good f5d75327d30af49acf2e4b55f35ce2e6c45d1287 > > # skip: [f1ec9a9ffc526df7c9523006c2abbb8ea554cdd8] Merge branch > > 'for-next' of > > git://git.kernel.org/pub/scm/linux/kernel/git/krzk/linux-dt.git > > git bisect skip f1ec9a9ffc526df7c9523006c2abbb8ea554cdd8 > > # bad: [f091e93306e0429ebb7589b9874590b6a9705e64] dma-mapping: Simplify > > arch_setup_dma_ops() > > git bisect bad f091e93306e0429ebb7589b9874590b6a9705e64 > > # good: [91cfd679f9e8b9a7bf2f26adf66eff99dbe2026b] ACPI/IORT: Handle > > memory address size limits as limits > > git bisect good 91cfd679f9e8b9a7bf2f26adf66eff99dbe2026b > > # bad: [ad4750b07d3462ce29a0c9b1e88b2a1f9795290e] iommu/dma: Make limit > > checks self-contained > > git bisect bad ad4750b07d3462ce29a0c9b1e88b2a1f9795290e > > # good: [fece6530bf4b59b01a476a12851e07751e73d69f] dma-mapping: Add > > helpers for dma_range_map bounds > > git bisect good fece6530bf4b59b01a476a12851e07751e73d69f > > # first bad commit: [ad4750b07d3462ce29a0c9b1e88b2a1f9795290e] > > iommu/dma: Make limit checks self-contained > > > > There is a couple skips in there and so I will try this again. > > > > > > If you have any ideas on things we can try let me know. > > > > > > Since the symptom seems inexplicable, I'd throw the usual memory > > > debugging stuff like KASAN at it first. I'd also try > > > "no_console_suspend" to check whether any late output is being > > > missed in the suspend case (and if it's already broken, then any > > > additional issues that may be caused by the console itself hopefully > > > shouldn't matter). > > > > > > For more base-covering, do you have the "arm64: Properly clean up > > > iommu-dma remnants" fix in there already as well? That bug has > > > bisected to patch #6 each time though, so I do still suspect that > > > what you're seeing is likely something else. It does seem > > > potentially significant that those Tegra platforms are making fairly > > > wide use of dma-ranges, but there's no clear idea forming out of > > > that observation just yet... > > > > I was hoping it was the same issue other people had reported, > > but the fix provided did not help. I have also tried today's > > -next and I am still seeing the issue. > > > > I should have more time next week to look at this further. Let > > me confirm which change is causing this and add more debug. > > Thanks. From staring at the code I think I've spotted one subtlety which > may not be quite as intended - can you see if the diff below helps? It > occurs to me that suspend and CPU hotplug may not *cause* the symptom, > but they could certainly stall if one or more relevant CPUs is *already* > stuck in a loop somewhere... > > Thanks, > Robin. I ran into an issue with arm-smmu as well with an nvidia orin system. From what I could see with the system, which seemed a bit odd to me, was it had a bridge and a wireless nic in the same iommu group, and had a mapping for the bridge at 0xffff000. It was failing when it tried to set up pci resources for the wireless nic as it was trying to map it to 0xffff000 and arm_lpae_map path would reject it since there already was a mapping there. I'll try to spend more time with it today if I can grab one of the systems. > > ----->8----- > diff --git a/drivers/iommu/dma-iommu.c b/drivers/iommu/dma-iommu.c > index 89a53c2f2cf9..85eb1846c637 100644 > --- a/drivers/iommu/dma-iommu.c > +++ b/drivers/iommu/dma-iommu.c > @@ -686,6 +686,7 @@ static int iommu_dma_init_domain(struct iommu_domain *domain, struct device *dev > /* Check the domain allows at least some access to the device... */ > if (map) { > dma_addr_t base = dma_range_map_min(map); > + base = max(base, (dma_addr_t)1 << order); > if (base > domain->geometry.aperture_end || > dma_range_map_max(map) < domain->geometry.aperture_start) { > pr_warn("specified DMA range outside IOMMU capability\n");