Linux IOMMU Development
 help / color / mirror / Atom feed
From: Robin Murphy <robin.murphy@arm.com>
To: Baolu Lu <baolu.lu@linux.intel.com>,
	Jason Gunthorpe <jgg@nvidia.com>,
	iommu@lists.linux.dev, Joerg Roedel <joro@8bytes.org>,
	llvm@lists.linux.dev, Nathan Chancellor <nathan@kernel.org>,
	Nick Desaulniers <ndesaulniers@google.com>,
	Miguel Ojeda <ojeda@kernel.org>, Tom Rix <trix@redhat.com>,
	Will Deacon <will@kernel.org>
Cc: Kevin Tian <kevin.tian@intel.com>, Nicolin Chen <nicolinc@nvidia.com>
Subject: Re: [PATCH v2 12/14] iommu: Consolidate the default_domain setup to one function
Date: Thu, 30 Mar 2023 15:29:00 +0100	[thread overview]
Message-ID: <559f8b71-6636-b4b8-27c4-bd0764baa741@arm.com> (raw)
In-Reply-To: <19197c52-139e-c3c5-2771-42323d38c045@linux.intel.com>

On 2023-03-30 13:37, Baolu Lu wrote:
> On 2023/3/30 7:40, Jason Gunthorpe wrote:
>> +/**
>> + * iommu_setup_default_domain - Set the default_domain for the group
>> + * @group: Group to change
>> + * @target_type: Domain type to set as the default_domain
>> + *
>> + * Allocate a default domain and set it as the current domain on the 
>> group. If
>> + * the group already has a default domain it will be changed to the 
>> target_type.
>> + * When target_type is 0 the default domain is selected based on 
>> driver and
>> + * system preferences.
>> + */
>> +static int iommu_setup_default_domain(struct iommu_group *group,
>> +                      int target_type)
>> +{
>> +    struct group_device *gdev;
>> +    struct iommu_domain *dom;
>> +    struct bus_type *bus =
>> +        list_first_entry(&group->devices, struct group_device, list)
>> +            ->dev->bus;
>> +    int ret;
>> +
>> +    lockdep_assert_held(&group->mutex);
>> +
>> +    target_type = iommu_get_default_domain_type(group, target_type);
>> +    if (target_type < 0)
>> +        return -EINVAL;
>> +
>> +    if (group->default_domain && group->default_domain->type == 
>> target_type)
>> +        return 0;
>> +
>> +    dom = __iommu_domain_alloc(bus, target_type);
>> +    if (!dom && target_type != IOMMU_DOMAIN_DMA) {
>> +        dom = __iommu_domain_alloc(bus, IOMMU_DOMAIN_DMA);
>> +        if (dom)
>> +            pr_warn("Failed to allocate default IOMMU domain of type 
>> %u for group %s - Falling back to IOMMU_DOMAIN_DMA",
>> +                target_type, group->name);
>> +    }
> 
> The background of the code above is that some ARM IOMMU drivers only
> support DMA mapping domain and do not support identity domain.
> Therefore, during boot, if the allocation of identity domain fails, a
> DMA mapping domain is used instead.
> 
> However, this does not apply to use cases that change the default domain
> through sysfs. In such cases, it seems that we should directly return
> failure (-ENODEV) and tell the user that the iommu driver does not
> support identity domain.
> 
>> +
>> +    /*
>> +     * There are still some drivers which don't support default 
>> domains, so
>> +     * we ignore the failure and leave group->default_domain NULL.
>> +     *
>> +     * We assume that the iommu driver starts up the device in
>> +     * 'set_platform_dma_ops' mode if it does not support default 
>> domains.
>> +     */
>> +    if (!dom) {
>> +        ret = 0;
>> +        goto out_set;
>> +    }
> 
> Should we call set_platform_dma_ops here? The existing default domain
> (if exists) will be freed below. But the iommu driver doesn't know about
> this. It probably will create a UAF case?
> 
>> +
>> +    ret = __iommu_group_set_domain_internal(group, dom,
>> +                        IOMMU_SET_DOMAIN_WITH_DEFERRED);
>> +    if (ret) {
>> +        /*
>> +         * An attach_dev failure may result in some devices being left
>> +         * attached to dom. This is not cleaned up until release_device
>> +         * is called. Thus we can't always free dom on failure, we have
>> +         * no choice but to stick the broken domain into
>> +         * group->default_domain to defer the free and try to continue.
>> +         */
>> +        if (list_count_nodes(&group->devices) > 1)
>> +            goto out_set;
>> +
>> +        iommu_domain_free(dom);
>> +        dom = NULL;
>> +        goto out_set;
>> +    }
>> +
>> +    /* The domain must be attached before we can establish any 
>> mappings */
>> +    for_each_group_device(group, gdev)
>> +        iommu_create_device_direct_mappings(dom, gdev->dev);
> 
> It's better to move creating direct mappings before setting the domain
> to the group devices.
> 
> The VT-d platforms allow the firmware to access the memory regions
> defined in RMRR ACPI table. If we set an empty domain to the device
> while the firmware DMA accesses the RMRR memory, it might result in
> spurious DMA faults.

Yes, logically IOMMU_RESV_DIRECT and IOMMU_RESV_DIRECT_RELAXABLE regions 
*must* be mapped before their device is attached, in order to guarantee 
continuity. Yes, this means the RMR stuff for Arm SMMU still isn't truly 
working properly - it still needs domain_alloc fixing to get rid of the 
whole horrible "finalise on first attach" idiom, which sadly I haven't 
had time to get back to yet :(

Thanks,
Robin.

> 
>> +
>> +out_set:
>> +    if (group->default_domain)
>> +        iommu_domain_free(group->default_domain);
>> +    group->default_domain = dom;
>> +    return ret;
>> +}
> 
> Best regards,
> baolu

  reply	other threads:[~2023-03-30 14:29 UTC|newest]

Thread overview: 52+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-03-29 23:40 [PATCH v2 00/14] Consolidate the error handling around device attachment Jason Gunthorpe
2023-03-29 23:40 ` [PATCH v2 01/14] iommu: Replace iommu_group_device_count() with list_count_nodes() Jason Gunthorpe
2023-03-30  6:22   ` Baolu Lu
2023-04-04  9:15   ` Tian, Kevin
2023-03-29 23:40 ` [PATCH v2 02/14] iommu: Add for_each_group_device() Jason Gunthorpe
2023-03-29 23:52   ` Miguel Ojeda
2023-03-30 14:28     ` Jason Gunthorpe
2023-05-09 13:12       ` Miguel Ojeda
2023-05-10  1:01         ` Jason Gunthorpe
2023-03-30  6:23   ` Baolu Lu
2023-04-04  9:16   ` Tian, Kevin
2023-03-29 23:40 ` [PATCH v2 03/14] iommu: Make __iommu_group_set_domain() handle error unwind Jason Gunthorpe
2023-03-30  6:23   ` Baolu Lu
2023-03-29 23:40 ` [PATCH v2 04/14] iommu: Use __iommu_group_set_domain() for __iommu_attach_group() Jason Gunthorpe
2023-03-30  6:23   ` Baolu Lu
2023-03-29 23:40 ` [PATCH v2 05/14] iommu: Use __iommu_group_set_domain() in iommu_change_dev_def_domain() Jason Gunthorpe
2023-03-30  6:24   ` Baolu Lu
2023-04-04  9:16   ` Tian, Kevin
2023-03-29 23:40 ` [PATCH v2 06/14] iommu: Replace __iommu_group_dma_first_attach() with set_domain Jason Gunthorpe
2023-03-30  6:24   ` Baolu Lu
2023-03-29 23:40 ` [PATCH v2 07/14] iommu: Make iommu_group_do_dma_first_attach() simpler Jason Gunthorpe
2023-03-30  6:42   ` Baolu Lu
2023-03-30 14:41     ` Jason Gunthorpe
2023-03-31  2:21       ` Baolu Lu
2023-04-04  9:17   ` Tian, Kevin
2023-03-29 23:40 ` [PATCH v2 08/14] iommu: Make iommu_group_do_dma_first_attach() work with owned groups Jason Gunthorpe
2023-03-30  6:45   ` Baolu Lu
2023-03-30 15:54   ` Robin Murphy
2023-03-30 16:49     ` Jason Gunthorpe
2023-04-04  9:21   ` Tian, Kevin
2023-03-29 23:40 ` [PATCH v2 09/14] iommu: Fix iommu_probe_device() to attach the right domain Jason Gunthorpe
2023-03-30  7:33   ` Baolu Lu
2023-04-04  9:25   ` Tian, Kevin
2023-03-29 23:40 ` [PATCH v2 10/14] iommu: Remove the assignment of group->domain during default domain alloc Jason Gunthorpe
2023-03-30  7:33   ` Baolu Lu
2023-03-29 23:40 ` [PATCH v2 11/14] iommu: Consolidate the code to calculate the target default domain type Jason Gunthorpe
2023-03-30 11:51   ` Baolu Lu
2023-04-04  9:39   ` Tian, Kevin
2023-04-04 18:51     ` Jason Gunthorpe
2023-03-29 23:40 ` [PATCH v2 12/14] iommu: Consolidate the default_domain setup to one function Jason Gunthorpe
2023-03-30 12:37   ` Baolu Lu
2023-03-30 14:29     ` Robin Murphy [this message]
2023-03-30 14:45       ` Jason Gunthorpe
2023-03-30 15:42         ` Jason Gunthorpe
2023-04-04 11:29           ` Robin Murphy
2023-03-30 15:36     ` Jason Gunthorpe
2023-03-30 18:23       ` Robin Murphy
2023-03-30 19:01         ` Jason Gunthorpe
2023-03-29 23:40 ` [PATCH v2 13/14] iommu: Remove __iommu_group_for_each_dev() Jason Gunthorpe
2023-03-30 12:40   ` Baolu Lu
2023-03-29 23:40 ` [PATCH v2 14/14] iommu: Tidy the control flow in iommu_group_store_type() Jason Gunthorpe
2023-03-30 12:45   ` Baolu Lu

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=559f8b71-6636-b4b8-27c4-bd0764baa741@arm.com \
    --to=robin.murphy@arm.com \
    --cc=baolu.lu@linux.intel.com \
    --cc=iommu@lists.linux.dev \
    --cc=jgg@nvidia.com \
    --cc=joro@8bytes.org \
    --cc=kevin.tian@intel.com \
    --cc=llvm@lists.linux.dev \
    --cc=nathan@kernel.org \
    --cc=ndesaulniers@google.com \
    --cc=nicolinc@nvidia.com \
    --cc=ojeda@kernel.org \
    --cc=trix@redhat.com \
    --cc=will@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox