From: Baolu Lu <baolu.lu@linux.intel.com>
To: Nicolin Chen <nicolinc@nvidia.com>,
joro@8bytes.org, kevin.tian@intel.com, jgg@nvidia.com
Cc: will@kernel.org, robin.murphy@arm.com, iommu@lists.linux.dev,
linux-kernel@vger.kernel.org, xueshuai@linux.alibaba.com
Subject: Re: [PATCH rc v7 3/6] iommu: Fix pasid attach in pci_dev_reset_iommu_prepare/done()
Date: Fri, 24 Apr 2026 13:49:52 +0800 [thread overview]
Message-ID: <9752ce24-a5f2-491d-b6fb-9e6d81f0cb67@linux.intel.com> (raw)
In-Reply-To: <3f1b73fa5162e55ffbe497508aeea1fc7cee6e2c.1776551790.git.nicolinc@nvidia.com>
On 4/19/26 07:41, Nicolin Chen wrote:
> Now the helpers handle per-gdev resets. So use the per-device API properly
> to attach/detach PASIDs. Also add max_pasids check as other callers.
>
> Fixes: c279e83953d9 ("iommu: Introduce pci_dev_reset_iommu_prepare/done()")
> Cc:stable@vger.kernel.org
> Reported-by: Shuai Xue<xueshuai@linux.alibaba.com>
> Closes:https://lore.kernel.org/all/ad858513-09fc-455e-bbc5-
> fe38a225cc78@linux.alibaba.com/
> Reviewed-by: Shuai Xue<xueshuai@linux.alibaba.com>
> Reviewed-by: Jason Gunthorpe<jgg@nvidia.com>
> Reviewed-by: Kevin Tian<kevin.tian@intel.com>
> Signed-off-by: Nicolin Chen<nicolinc@nvidia.com>
> ---
> drivers/iommu/iommu.c | 25 ++++++++++++++++++-------
> 1 file changed, 18 insertions(+), 7 deletions(-)
>
> diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c
> index d5d9102b9d750..e9ffa562b614f 100644
> --- a/drivers/iommu/iommu.c
> +++ b/drivers/iommu/iommu.c
> @@ -4026,9 +4026,14 @@ int pci_dev_reset_iommu_prepare(struct pci_dev *pdev)
> * The pasid_array is mostly fenced by group->mutex, except one reader
> * in iommu_attach_handle_get(), so it's safe to read without xa_lock.
> */
> - xa_for_each_start(&group->pasid_array, pasid, entry, 1)
> - iommu_remove_dev_pasid(&pdev->dev, pasid,
> - pasid_array_entry_to_domain(entry));
> + if (pdev->dev.iommu->max_pasids > 0) {
> + xa_for_each_start(&group->pasid_array, pasid, entry, 1) {
> + struct iommu_domain *pasid_dom =
> + pasid_array_entry_to_domain(entry);
> +
> + iommu_remove_dev_pasid(&pdev->dev, pasid, pasid_dom);
> + }
> + }
>
> group->recovery_cnt++;
> return ret;
> @@ -4090,10 +4095,16 @@ void pci_dev_reset_iommu_done(struct pci_dev *pdev)
> * The pasid_array is mostly fenced by group->mutex, except one reader
> * in iommu_attach_handle_get(), so it's safe to read without xa_lock.
> */
> - xa_for_each_start(&group->pasid_array, pasid, entry, 1)
> - WARN_ON(__iommu_set_group_pasid(
> - pasid_array_entry_to_domain(entry), group, pasid,
> - group->blocking_domain));
> + if (pdev->dev.iommu->max_pasids > 0) {
> + xa_for_each_start(&group->pasid_array, pasid, entry, 1) {
> + struct iommu_domain *pasid_dom =
> + pasid_array_entry_to_domain(entry);
> +
> + WARN_ON(pasid_dom->ops->set_dev_pasid(
> + pasid_dom, &pdev->dev, pasid,
> + group->blocking_domain));
> + }
> + }
>
> if (!WARN_ON(group->recovery_cnt == 0))
> group->recovery_cnt--;
I don’t think this patch fixes a real-world issue though it has the
"Fixes:" tag. Logically, if pdev->dev.iommu->max_pasids == 0, there
should be no domains attached to any pasid. Consequently,
group->pasid_array should be empty, and the xa_for_each loop is just a
no-op.
I understand this was a result of Sashko's review comments, but I don't
think it worth a formal fix. I admit I might be overlooking something,
so please correct me if I am wrong.
Thanks,
baolu
next prev parent reply other threads:[~2026-04-24 5:52 UTC|newest]
Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-18 23:41 [PATCH rc v7 0/6] iommu: Fix pci_dev_reset_iommu_prepare/done() Nicolin Chen
2026-04-18 23:41 ` [PATCH rc v7 1/6] iommu: Fix kdocs of pci_dev_reset_iommu_done() Nicolin Chen
2026-04-24 5:09 ` Baolu Lu
2026-04-18 23:41 ` [PATCH rc v7 2/6] iommu: Replace per-group resetting_domain with per-gdev blocked flag Nicolin Chen
2026-04-24 5:27 ` Baolu Lu
2026-04-18 23:41 ` [PATCH rc v7 3/6] iommu: Fix pasid attach in pci_dev_reset_iommu_prepare/done() Nicolin Chen
2026-04-24 5:49 ` Baolu Lu [this message]
2026-04-24 19:28 ` Nicolin Chen
2026-04-18 23:41 ` [PATCH rc v7 4/6] iommu: Fix nested pci_dev_reset_iommu_prepare/done() Nicolin Chen
2026-04-24 6:12 ` Baolu Lu
2026-04-18 23:41 ` [PATCH rc v7 5/6] iommu: Fix ATS invalidation timeouts during __iommu_remove_group_pasid() Nicolin Chen
2026-04-21 7:15 ` Tian, Kevin
2026-04-21 17:57 ` Nicolin Chen
2026-04-22 2:03 ` Tian, Kevin
2026-04-24 6:23 ` Baolu Lu
2026-04-24 19:39 ` Nicolin Chen
2026-04-18 23:41 ` [PATCH rc v7 6/6] iommu: Fix UAF in pci_dev_reset_iommu_done() due to concurrent detach Nicolin Chen
2026-04-21 7:41 ` Tian, Kevin
2026-04-21 18:10 ` Nicolin Chen
2026-04-22 1:56 ` Tian, Kevin
2026-04-24 6:44 ` Baolu Lu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=9752ce24-a5f2-491d-b6fb-9e6d81f0cb67@linux.intel.com \
--to=baolu.lu@linux.intel.com \
--cc=iommu@lists.linux.dev \
--cc=jgg@nvidia.com \
--cc=joro@8bytes.org \
--cc=kevin.tian@intel.com \
--cc=linux-kernel@vger.kernel.org \
--cc=nicolinc@nvidia.com \
--cc=robin.murphy@arm.com \
--cc=will@kernel.org \
--cc=xueshuai@linux.alibaba.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.