On Fri, Jun 24, 2022 at 06:41:02AM -0700, Jerry Snitselaar wrote: > On Fri, Jun 24, 2022 at 09:43:30AM +0800, Baolu Lu wrote: > > On 2022/6/24 09:14, Jerry Snitselaar wrote: > > > On Fri, Jun 24, 2022 at 08:55:08AM +0800, Baolu Lu wrote: > > > > On 2022/6/24 01:02, Jerry Snitselaar wrote: > > > > > Hi Baolu & Dave, > > > > > > > > > > I noticed last night that on a Sapphire Rapids system if you boot > > > > > without > > > > > intel_iommu=on, the idxd driver will crash during probe in > > > > > iommu_sva_bind_device(). > > > > > Should there be a sanity check before calling dev_iommu_ops(), or is > > > > > the expectation > > > > > that the caller would verify it is safe to call? This seemed to be > > > > > uncovered by > > > > > the combination of 3f6634d997db ("iommu: Use right way to retrieve > > > > > iommu_ops"), and > > > > > 42a1b73852c4 ("dmaengine: idxd: Separate user and kernel pasid > > > > > enabling"). > > > > > > > > > > [ 21.423729] BUG: kernel NULL pointer dereference, address: > > > > > 0000000000000038 > > > > > [ 21.445108] #PF: supervisor read access in kernel mode > > > > > [ 21.450912] #PF: error_code(0x0000) - not-present page > > > > > [ 21.456706] PGD 0 > > > > > [ 21.459047] Oops: 0000 [#1] PREEMPT SMP NOPTI > > > > > [ 21.464004] CPU: 0 PID: 1420 Comm: kworker/0:3 Not tainted > > > > > 5.19.0-0.rc3.27.eln120.x86_64 #1 > > > > > [ 21.464011] Hardware name: Intel Corporation > > > > > EAGLESTREAM/EAGLESTREAM, BIOS EGSDCRB1.SYS.0067.D12.2110190954 > > > > > 10/19/2021 > > > > > [ 21.464015] Workqueue: events work_for_cpu_fn > > > > > [ 21.464030] RIP: 0010:iommu_sva_bind_device+0x1d/0xe0 > > > > > [ 21.464046] Code: c3 cc 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 > > > > > 00 00 41 57 41 56 49 89 d6 41 55 41 54 55 53 48 83 ec 08 48 8b 87 d8 > > > > > 02 00 00 <48> 8b 40 38 48 8b 50 10 48 83 7a 70 00 48 89 14 24 0f 84 > > > > > 91 00 00 > > > > > [ 21.464050] RSP: 0018:ff7245d9096b7db8 EFLAGS: 00010296 > > > > > [ 21.464054] RAX: 0000000000000000 RBX: ff1eadeec8a51000 RCX: > > > > > 0000000000000000 > > > > > [ 21.464058] RDX: ff7245d9096b7e24 RSI: 0000000000000000 RDI: > > > > > ff1eadeec8a510d0 > > > > > [ 21.464060] RBP: ff1eadeec8a51000 R08: ffffffffb1a12300 R09: > > > > > ff1eadffbfce25b4 > > > > > [ 21.464062] R10: ffffffffffffffff R11: 0000000000000038 R12: > > > > > ffffffffc09f8000 > > > > > [ 21.464065] R13: ff1eadeec8a510d0 R14: ff7245d9096b7e24 R15: > > > > > ff1eaddf54429000 > > > > > [ 21.464067] FS: 0000000000000000(0000) GS:ff1eadee7f600000(0000) > > > > > knlGS:0000000000000000 > > > > > [ 21.464070] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > > > > > [ 21.464072] CR2: 0000000000000038 CR3: 00000008c0e10006 CR4: > > > > > 0000000000771ef0 > > > > > [ 21.464074] DR0: 0000000000000000 DR1: 0000000000000000 DR2: > > > > > 0000000000000000 > > > > > [ 21.464076] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: > > > > > 0000000000000400 > > > > > [ 21.464078] PKRU: 55555554 > > > > > [ 21.464079] Call Trace: > > > > > [ 21.464083] <TASK> > > > > > [ 21.464092] idxd_pci_probe+0x259/0x1070 [idxd] > > > > > [ 21.464121] local_pci_probe+0x3e/0x80 > > > > > [ 21.464132] work_for_cpu_fn+0x13/0x20 > > > > > [ 21.464136] process_one_work+0x1c4/0x380 > > > > > [ 21.464143] worker_thread+0x1ab/0x380 > > > > > [ 21.464147] ? _raw_spin_lock_irqsave+0x23/0x50 > > > > > [ 21.464158] ? process_one_work+0x380/0x380 > > > > > [ 21.464161] kthread+0xe6/0x110 > > > > > [ 21.464168] ? kthread_complete_and_exit+0x20/0x20 > > > > > [ 21.464172] ret_from_fork+0x1f/0x30 > > > > > > > > > > I figure either there needs to be a check in iommu_sva_bind_device, or > > > > > idxd needs to check in idxd_enable_system_pasid that that > > > > > idxd->pdev->dev.iommu is not null before it tries calling > > > > > iommu_sva_bind_device. > > > > > > > > As documented around the iommu_sva_bind_device() interface: > > > > > > > > * iommu_dev_enable_feature(dev, IOMMU_DEV_FEAT_SVA) must be called > > > > first, > > > > to > > > > * initialize the required SVA features. > > > > > > > > idxd->pdev->dev.iommu should be checked in there. > > > > > > > > Dave, any thoughts? > > > > > > > > Best regards, > > > > baolu > > > > > > Duh, sorry I missed that in the comments. > > > > > > It calls iommu_dev_enable_feature(), but then goes into code that > > > calls iommu_sva_bind_device whether or not iommu_dev_enable_feature() > > > fails. > > > > > > You also will get the following warning if you don't have scalable > > > mode enabled (either not enabled by default, or if enabled by default > > > and passed intel_iommu=on,sm_off): > > > > If scalable mode is disabled, iommu_dev_enable_feature(IOMMU_SVA) will > > return failure, hence driver should not call iommu_sva_bind_device(). > > I guess below will disappear if above is fixed in the idxd driver. > > > > Best regards, > > baolu > > > > It looks like there was a recent maintainer change, and Fenghua is now > the maintainer. Fenghua thoughts on this? With 42a1b73852c4 > ("dmaengine: idxd: Separate user and kernel pasid enabling") the code > no longer depends on iommu_dev_feature_enable succeeding. Testing with > something like this works (ran dmatest without sm_on, and > dsa_user_test_runner.sh with sm_on, plus booting with various > intel_iommu= combinations): > > diff --git a/drivers/dma/idxd/init.c b/drivers/dma/idxd/init.c > index 355fb3ef4cbf..5b49fd5c1e25 100644 > --- a/drivers/dma/idxd/init.c > +++ b/drivers/dma/idxd/init.c > @@ -514,13 +514,14 @@ static int idxd_probe(struct idxd_device *idxd) > if (IS_ENABLED(CONFIG_INTEL_IDXD_SVM) && sva) { > if (iommu_dev_enable_feature(dev, IOMMU_DEV_FEAT_SVA)) > dev_warn(dev, "Unable to turn on user SVA > feature.\n"); > - else > + else { > set_bit(IDXD_FLAG_USER_PASID_ENABLED, &idxd->flags); > > - if (idxd_enable_system_pasid(idxd)) > - dev_warn(dev, "No in-kernel DMA with PASID.\n"); > - else > - set_bit(IDXD_FLAG_PASID_ENABLED, &idxd->flags); > + if (idxd_enable_system_pasid(idxd)) > + dev_warn(dev, "No in-kernel DMA with > PASID.\n"); > + else > + set_bit(IDXD_FLAG_PASID_ENABLED, > &idxd->flags); > + } > } else if (!sva) { > dev_warn(dev, "User forced SVA off via module param.\n"); > } > > The commit description is a bit confusing, because it talks about there > being no dependency, but ties user pasid to enabling/disabling the SVA > feature, which system pasid would depend on as well. > > Regards, > Jerry
Things like that warning message "Unable to turn on user SVA feature" when iommu_dev_enable_feature fails though seems to be misleading with user inserted in there. I'll leave it to the idxd folks to figure out. > > > > > > > [ 24.645784] idxd 0000:6a:01.0: enabling device (0144 -> 0146) > > > [ 24.645871] idxd 0000:6a:01.0: Unable to turn on user SVA feature. > > > [ 24.645932] ------------[ cut here ]------------ > > > [ 24.645935] WARNING: CPU: 0 PID: 422 at > > > drivers/iommu/intel/pasid.c:253 intel_pasid_get_entry.isra.0+0xcd/0xe0 > > > [ 24.675872] Modules linked in: intel_uncore(+) drm_ttm_helper > > > isst_if_mbox_pci(+) idxd(+) snd i2c_i801(+) isst_if_mmio ttm > > > isst_if_common mei fjes(+) soundcore intel_vsec i2c_ismt i2c_smbus > > > idxd_bus ipmi_ssif acpi_ipmi ipmi_si acpi_pad acpi_power_meter > > > pfr_telemetry pfr_update vfat fat fuse xfs crct10dif_pclmul crc32_pclmul > > > crc32c_intel ghash_clmulni_intel igc wmi pinctrl_emmitsburg ipmi_devintf > > > ipmi_msghandler > > > [ 24.716612] CPU: 0 PID: 422 Comm: kworker/0:2 Not tainted > > > 5.19.0-0.rc3.27.eln120.x86_64 #1 > > > [ 24.716621] Hardware name: Intel Corporation EAGLESTREAM/EAGLESTREAM, > > > BIOS EGSDCRB1.SYS.0067.D12.2110190954 10/19/2021 > > > [ 24.716625] Workqueue: events work_for_cpu_fn > > > [ 24.716645] RIP: 0010:intel_pasid_get_entry.isra.0+0xcd/0xe0 > > > [ 24.716656] Code: a9 d1 ff ff 48 89 c7 48 85 c0 75 9e 31 c0 5b 5d 41 > > > 5c 41 5d c3 cc 41 83 e4 3f 5b 5d 49 c1 e4 06 4a 8d 04 27 41 5c 41 5d c3 > > > cc <0f> 0b 31 c0 eb de 48 8b 05 e6 dd 59 01 eb 87 0f 1f 40 00 0f 1f 44 > > > [ 24.716664] RSP: 0018:ff848155c79bfd00 EFLAGS: 00010046 > > > [ 24.716671] RAX: 0000000000000206 RBX: ff3deaf807bfdcc0 RCX: > > > 0000000000000001 > > > [ 24.716677] RDX: 0000000000000000 RSI: 0000000000000001 RDI: > > > ff3deb0789f53240 > > > [ 24.716682] RBP: ff3deb0789f53780 R08: 0000000000000001 R09: > > > 0000000000000003 > > > [ 24.716688] R10: ff848155c79bfcf8 R11: 0000000000000000 R12: > > > 0000000000000003 > > > [ 24.716693] R13: 0000000000000001 R14: 0000000000000001 R15: > > > ffffffff84e10000 > > > [ 24.716700] FS: 0000000000000000(0000) GS:ff3deb073f600000(0000) > > > knlGS:0000000000000000 > > > [ 24.716705] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > > > [ 24.716709] CR2: 0000558a19e81c58 CR3: 0000000108252005 CR4: > > > 0000000000771ef0 > > > [ 24.716714] DR0: 0000000000000000 DR1: 0000000000000000 DR2: > > > 0000000000000000 > > > [ 24.716719] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: > > > 0000000000000400 > > > [ 24.716723] PKRU: 55555554 > > > [ 24.716726] Call Trace: > > > [ 24.716731] <TASK> > > > [ 24.716738] intel_pasid_setup_first_level+0x36/0x200 > > > [ 24.716753] intel_svm_bind+0x2f8/0x3a0 > > > [ 24.716767] iommu_sva_bind_device+0x9b/0xe0 > > > [ 24.716785] idxd_pci_probe+0x259/0x1070 [idxd] > > > [ 24.716866] local_pci_probe+0x3e/0x80 > > > [ 24.716890] work_for_cpu_fn+0x13/0x20 > > > [ 24.716900] process_one_work+0x1c4/0x380 > > > [ 24.716912] worker_thread+0x1ab/0x380 > > > [ 24.716922] ? _raw_spin_lock_irqsave+0x23/0x50 > > > [ 24.716945] ? process_one_work+0x380/0x380 > > > [ 24.716954] kthread+0xe6/0x110 > > > [ 24.716967] ? kthread_complete_and_exit+0x20/0x20 > > > [ 24.716976] ret_from_fork+0x1f/0x30 > > > [ 24.716999] </TASK> > > > [ 24.717000] ---[ end trace 0000000000000000 ]--- > > > [ 24.717019] ------------[ cut here ]------------ > > > > > > regards, > > > Jerry > > > > > > _______________________________________________ iommu mailing list iommu@lists.linux-foundation.org https://lists.linuxfoundation.org/mailman/listinfo/iommu