AMD pointed out it's unsafe to update the device-table while iommu is enabled. It turns out that device-table pointer update is split up into two 32bit writes in the IOMMU hardware. So updating it while the IOMMU is enabled could have some nasty side effects. The only way to work around this is to allocate the device-table below 4GB if translation is pre-enabled in kdump kernel. If allocation failed, still use the old one. Signed-off-by: Baoquan He <bhe at redhat.com> --- drivers/iommu/amd_iommu_init.c | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/drivers/iommu/amd_iommu_init.c b/drivers/iommu/amd_iommu_init.c index d362b63..f17f297 100644 --- a/drivers/iommu/amd_iommu_init.c +++ b/drivers/iommu/amd_iommu_init.c @@ -2149,11 +2149,23 @@ static void early_enable_iommu(struct amd_iommu *iommu) */ static void early_enable_iommus(void) { + struct dev_table_entry *dev_tbl; struct amd_iommu *iommu; bool is_pre_enabled = false; for_each_iommu(iommu) { if (translation_pre_enabled(iommu)) { + gfp_t gfp_flag = GFP_KERNEL | __GFP_ZERO | GFP_DMA32;; + + dev_tbl = (void *)__get_free_pages(gfp_flag, + get_order(dev_table_size)); + if (dev_tbl != NULL) { + memcpy(dev_tbl, amd_iommu_dev_table, dev_table_size); + free_pages((unsigned long)amd_iommu_dev_table, + get_order(dev_table_size)); + amd_iommu_dev_table = dev_tbl; + } + is_pre_enabled = true; break; } -- 2.5.5