From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-wm1-f41.google.com (mail-wm1-f41.google.com [209.85.128.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 140697083D for ; Wed, 5 Feb 2025 13:36:41 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.41 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1738762603; cv=none; b=Wj1Sqecawe0JFzWhX/1rK/x3kzHWTeG4c3cDfdg0VmkMXM1CS3STObE9PC5MCiqwYbgp1zw6k7se0vND0kt4/w+Z06iDg+HDj3Ct2/5AeFyw5kV4WtpZ9VBzkCrGG6B70eHUHDbaJ8NWgYmDMqAhbWNLmzXLSzHclKEZHr322vA= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1738762603; c=relaxed/simple; bh=mp9HoxO6TA8BwWFZLool1CPyAEZW4XDbFIr6YzcpduE=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=DrcNEbkgRaGYKsaG16RaShGZrgl1nj6kN3K+e5bcgzvSijTLhrqYF7q/qvN5VSVKnFXmVJL3O097DgWEljlW40MVXruMw/9V4RVVmYrYuaZT2A0xY/DeunOOzYCPCEGFIBr+lZ+CoE3bC1cEACqxnI3sIu5NSrXpi2NvkWHGxCQ= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=NkdhFY4H; arc=none smtp.client-ip=209.85.128.41 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="NkdhFY4H" Received: by mail-wm1-f41.google.com with SMTP id 5b1f17b1804b1-436202dd7f6so77654505e9.0 for ; Wed, 05 Feb 2025 05:36:41 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1738762600; x=1739367400; darn=vger.kernel.org; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:from:date:from:to :cc:subject:date:message-id:reply-to; bh=25qxsmD7FJX9q8ti6skHEnaD8hQH8wQXyucRPM/iUuU=; b=NkdhFY4HMJlA7A+EoqqvoE4WzssQNJ0kOptZ2aybJhPh3H0s5xij1MvWnsvotFopyc 7W1Px3r8jmoebyonSZf8Zi6nggAQB6GLjNXVDXI3rLzzl3npwkaSbZuLHddAq477Rl52 jeHNPfCXNxJA54jjdAZ4b7wUp/qEcmnqJcBorxHzZRvn2tGim7nKh6vMaA0VEBdjkn12 7ESGEL95Qu/x3W7SYqypgBW8Uws3E9UGdBjlvh4vOQgg+JM7D3K+pgH/r7c8VkZdZm84 86kdr8sXvMnExRkFUMvHmwNmfTVcxE8ScGxI52Rrib3NXQIc19mYJbd3uzN+xecz0eG1 v1Xg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1738762600; x=1739367400; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=25qxsmD7FJX9q8ti6skHEnaD8hQH8wQXyucRPM/iUuU=; b=CHlVs9HfH50EovnH3paYe70mVDzah45+uTSsGWrz4qMwAjicUielZKawWWBIDca64e dELBs0TN3Dtolz8PndgwSyfTNrcIPax7/kqK7k+n1BI1hTlBz6b51aQVWkxWtpMrUYJf hGZ2ZYgqQtrreNQpajmvvoO1918pg8v+tkwY1O3C7ZlvVvLp3iZYuKVpc4cl8zI73ovD ifaiT7JLQLveThWk87jroSsBDKDGhDJQv8GT1IytX8LilWq2QDDsUWu+QW3zX73tcMC8 peGC0W1DCAMVUn56KOK/XUSVZTQT23jGGWnUoNTfpHwLJ/Jbi/p8rwxPrjEqqsPiBrFa KVnA== X-Forwarded-Encrypted: i=1; AJvYcCWL6q9oOEUnOaXb3j9L7hpMQpGvlczd/HFiaJUfr6XasnQa9IkTa9PM9LB7vP8HabcoHU625YEZryAq/PM=@vger.kernel.org X-Gm-Message-State: AOJu0Yz5nD0IIkth+1IBQYnnD119CLuO32JqAfXzf+DKNRt/ht42EsoM tRCkNhzRUd+vAeCQLANaQrbaSoBVo6P9x26FvSTuh/angyb5Nwvp X-Gm-Gg: ASbGncunY1IRieHlKcwPrqGqLHynnco4DwF4ixKvJMjG87br+8sIfvdDWrwUjyZUBAN jW0VwAa9HdW2k4TRnz/Dws1DV4W3GPVAAvJWXX3VHan0AmFfkBCnVWxKM8cNvFucm4aiQfgzpBC 6GO8jJTeZr6qd3ax4373SFHzFJ7TVQfgdbby1RnUFWP3jKzVBYSBfcW8lnTX4zwlcxony4dpNsj nYrptzXVlZbJyyINpFA2WmpPuc7iIv2alrK+yKCCObSWwM0v/dMMC6P4IJ+bnDPkhw/eN5JO/fH ADdv5SYokLhOZ9cS X-Google-Smtp-Source: AGHT+IE8amJVXyAnREAQ170V3BU+lI01ghztADCVY6XG5cSihE83Nt/NFSjGoNx/mxp22MItkH1j5Q== X-Received: by 2002:a05:600c:1d1e:b0:435:294:f1c8 with SMTP id 5b1f17b1804b1-4390d574e09mr20181015e9.28.1738762599998; Wed, 05 Feb 2025 05:36:39 -0800 (PST) Received: from Red ([2a01:cb1d:894:1200:4a02:2aff:fe07:1efc]) by smtp.googlemail.com with ESMTPSA id 5b1f17b1804b1-4390da88e33sm21245135e9.31.2025.02.05.05.36.39 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 05 Feb 2025 05:36:39 -0800 (PST) Date: Wed, 5 Feb 2025 14:36:37 +0100 From: Corentin Labbe To: Robin Murphy Cc: joro@8bytes.org, suravee.suthikulpanit@amd.com, will@kernel.org, iommu@lists.linux.dev, linux-kernel@vger.kernel.org Subject: Re: iommu: flood of ahci 0000:e6:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x0055 address=0xa14a4000 flags=0x0070] Message-ID: References: <42a8ca6f-a881-4b4c-9ddb-bf3f2bc6f539@arm.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <42a8ca6f-a881-4b4c-9ddb-bf3f2bc6f539@arm.com> Le Mon, Feb 03, 2025 at 01:01:45PM +0000, Robin Murphy a écrit : > On 2025-02-03 9:05 am, Corentin Labbe wrote: > > Hello > > > > I have a supermicro server which is flooded of kernel message: > > ahci 0000:e6:00.0: AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x0055 address=0xa14a4000 flags=0x0070] > > > > The server works perfectly anyway. > > It happens with official ubuntu kernel vmlinuz-6.8.0-51-generic. > > I tried also a custom 6.12.6, same problem. > > > > I tried to update bios, no change. > > I tried iommu=soft, no change. > > > > I dont know what to do next. > > > > Regards > > > > > IOMMU group 83 e6:00.0 SATA controller [0106]: Marvell Technology Group Ltd. 88SE9230 PCIe 2.0 x2 4-port SATA 6 Gb/s RAID Controller [1b4b:9230] (rev 11) > > Wow, a Marvell SATA controller doing something other than the usual > phantom function quirk, that's a nice change :D > > I'd guess that firmware has left it running for something like legacy > IDE emulation (if that's still a thing?) or its own soft-RAID driver, > but neglected to declare an IVMD entry to described the reserved memory > region(s) it's using for that. A smoking gun would be if 0xa14a4000 > matches some firmware-reserved PA in the system memory map. In that > case, if you're lucky you might have some firmware/BIOS option to > disable fancy behaviour and leave it in plain AHCI mode. Otherwise, > booting with "iommu.passthrough=1" (or the even bigger hammer of > "amd_iommu=off") should at least allow you to ignore the issue. > Hello Thanks for your help There was no AHCI option in the BIOS (appart hotplug enable). Adding iommu.passthrough=1 lead to absence of thoses messages. Unfortunatly, my example is not correct, the address is mostly random: dmesg |grep IO_PAGE_FAULT | grep -o 'address=0x[0-9a-f]*' | sort | uniq -c | wc -l 9297 dmesg |grep IO_PAGE_FAULT | grep -o 'address=0x[0-9a-f]*' | sort | uniq -c | head 2 address=0x1101f000 2 address=0x1101f004 3 address=0x1102f000 1 address=0x1102f004 2 address=0x1102f008 2 address=0x1102f010 2 address=0x11043000 2 address=0x11043004 1 address=0x11047000 1 address=0x11047004 dmesg |grep IO_PAGE_FAULT | grep -o 'address=0x[0-9a-f]*' | sort | uniq -c | tail 2 address=0xfffffffffe751004 2 address=0xfffffffffe7e6000 2 address=0xfffffffffe7e6004 4 address=0xfffffffffe823000 3 address=0xfffffffffe823004 2 address=0xfffffffffe830000 2 address=0xfffffffffe830004 3 address=0xfffffffffe833000 1 address=0xfffffffffe833004 1 address=0xfffffffffe833008 But the domain/flags are always the same Full dmesg (without IOMMU messages) https://kernel.montjoie.ovh/dmesg.0 The server is doing qemu GPU passthough via VFIO. I believe (aka I need to re-verify) that message start whatever qemu starts or not. Thanks Regards