From: Alex Williamson <alex.williamson@redhat.com>
To: Steve Sistare <steven.sistare@oracle.com>
Cc: kvm@vger.kernel.org, Cornelia Huck <cohuck@redhat.com>,
Jason Gunthorpe <jgg@nvidia.com>
Subject: Re: [PATCH V1 1/2] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
Date: Tue, 13 Dec 2022 09:26:10 -0700 [thread overview]
Message-ID: <20221213092610.636686fc.alex.williamson@redhat.com> (raw)
In-Reply-To: <1670946416-155307-2-git-send-email-steven.sistare@oracle.com>
On Tue, 13 Dec 2022 07:46:55 -0800
Steve Sistare <steven.sistare@oracle.com> wrote:
> Disable the VFIO_UPDATE_VADDR capability if mediated devices are present.
> Their kernel threads could be blocked indefinitely by a misbehaving
> userland while trying to pin/unpin pages while vaddrs are being updated.
Fixes: c3cbab24db38 ("vfio/type1: implement interfaces to update vaddr")
> Signed-off-by: Steve Sistare <steven.sistare@oracle.com>
> ---
> drivers/vfio/vfio_iommu_type1.c | 25 ++++++++++++++++++++++++-
> include/uapi/linux/vfio.h | 6 +++++-
> 2 files changed, 29 insertions(+), 2 deletions(-)
>
> diff --git a/drivers/vfio/vfio_iommu_type1.c b/drivers/vfio/vfio_iommu_type1.c
> index 23c24fe..f81e925 100644
> --- a/drivers/vfio/vfio_iommu_type1.c
> +++ b/drivers/vfio/vfio_iommu_type1.c
> @@ -1343,6 +1343,10 @@ static int vfio_dma_do_unmap(struct vfio_iommu *iommu,
>
> mutex_lock(&iommu->lock);
>
> + /* Cannot update vaddr if mdev is present. */
> + if (invalidate_vaddr && !list_empty(&iommu->emulated_iommu_groups))
> + goto unlock;
> +
> pgshift = __ffs(iommu->pgsize_bitmap);
> pgsize = (size_t)1 << pgshift;
>
> @@ -2189,6 +2193,10 @@ static int vfio_iommu_type1_attach_group(void *iommu_data,
>
> mutex_lock(&iommu->lock);
>
> + /* Prevent an mdev from sneaking in while vaddr flags are used. */
> + if (iommu->vaddr_invalid_count && type == VFIO_EMULATED_IOMMU)
> + goto out_unlock;
Why only mdev devices? If we restrict that the user cannot attach a
group while there are invalid vaddrs, and the pin/unpin pages and
dma_rw interfaces are restricted to cases where vaddr_invalid_count is
zero, then we can get rid of all the code to handle waiting for vaddrs.
ie. we could still revert:
898b9eaeb3fe ("vfio/type1: block on invalid vaddr")
487ace134053 ("vfio/type1: implement notify callback")
ec5e32940cc9 ("vfio: iommu driver notify callback")
It appears to me it might be easiest to lead with a clean revert of
these, then follow-up imposing the usage restrictions, and I'd go ahead
and add WARN_ON error paths to the pin/unpin/dma_rw paths to make sure
nobody enters those paths with an elevated invalid count. Thanks,
Alex
> +
> /* Check for duplicates */
> if (vfio_iommu_find_iommu_group(iommu, iommu_group))
> goto out_unlock;
> @@ -2660,6 +2668,20 @@ static int vfio_domains_have_enforce_cache_coherency(struct vfio_iommu *iommu)
> return ret;
> }
>
> +/*
> + * Disable this feature if mdevs are present. They cannot safely pin/unpin
> + * while vaddrs are being updated.
> + */
> +static int vfio_iommu_can_update_vaddr(struct vfio_iommu *iommu)
> +{
> + int ret;
> +
> + mutex_lock(&iommu->lock);
> + ret = list_empty(&iommu->emulated_iommu_groups);
> + mutex_unlock(&iommu->lock);
> + return ret;
> +}
> +
> static int vfio_iommu_type1_check_extension(struct vfio_iommu *iommu,
> unsigned long arg)
> {
> @@ -2668,8 +2690,9 @@ static int vfio_iommu_type1_check_extension(struct vfio_iommu *iommu,
> case VFIO_TYPE1v2_IOMMU:
> case VFIO_TYPE1_NESTING_IOMMU:
> case VFIO_UNMAP_ALL:
> - case VFIO_UPDATE_VADDR:
> return 1;
> + case VFIO_UPDATE_VADDR:
> + return iommu && vfio_iommu_can_update_vaddr(iommu);
> case VFIO_DMA_CC_IOMMU:
> if (!iommu)
> return 0;
> diff --git a/include/uapi/linux/vfio.h b/include/uapi/linux/vfio.h
> index d7d8e09..6d36b84 100644
> --- a/include/uapi/linux/vfio.h
> +++ b/include/uapi/linux/vfio.h
> @@ -49,7 +49,11 @@
> /* Supports VFIO_DMA_UNMAP_FLAG_ALL */
> #define VFIO_UNMAP_ALL 9
>
> -/* Supports the vaddr flag for DMA map and unmap */
> +/*
> + * Supports the vaddr flag for DMA map and unmap. Not supported for mediated
> + * devices, so this capability is subject to change as groups are added or
> + * removed.
> + */
> #define VFIO_UPDATE_VADDR 10
>
> /*
next prev parent reply other threads:[~2022-12-13 16:27 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-12-13 15:46 [PATCH V1 0/2] fixes for virtual address update Steve Sistare
2022-12-13 15:46 ` [PATCH V1 1/2] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR Steve Sistare
2022-12-13 16:26 ` Alex Williamson [this message]
2022-12-13 16:54 ` Steven Sistare
2022-12-13 17:31 ` Alex Williamson
2022-12-13 17:42 ` Steven Sistare
2022-12-13 15:46 ` [PATCH V1 2/2] vfio/type1: prevent locked_vm underflow Steve Sistare
2022-12-13 18:02 ` Alex Williamson
2022-12-13 18:17 ` Steven Sistare
2022-12-13 18:21 ` Steven Sistare
2022-12-13 19:29 ` Alex Williamson
2022-12-13 19:40 ` Steven Sistare
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20221213092610.636686fc.alex.williamson@redhat.com \
--to=alex.williamson@redhat.com \
--cc=cohuck@redhat.com \
--cc=jgg@nvidia.com \
--cc=kvm@vger.kernel.org \
--cc=steven.sistare@oracle.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox