public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Baolu Lu <baolu.lu@linux.intel.com>
To: Nicolin Chen <nicolinc@nvidia.com>,
	joro@8bytes.org, kevin.tian@intel.com, jgg@nvidia.com
Cc: will@kernel.org, robin.murphy@arm.com, iommu@lists.linux.dev,
	linux-kernel@vger.kernel.org, xueshuai@linux.alibaba.com
Subject: Re: [PATCH rc v7 3/6] iommu: Fix pasid attach in pci_dev_reset_iommu_prepare/done()
Date: Fri, 24 Apr 2026 13:49:52 +0800	[thread overview]
Message-ID: <9752ce24-a5f2-491d-b6fb-9e6d81f0cb67@linux.intel.com> (raw)
In-Reply-To: <3f1b73fa5162e55ffbe497508aeea1fc7cee6e2c.1776551790.git.nicolinc@nvidia.com>

On 4/19/26 07:41, Nicolin Chen wrote:
> Now the helpers handle per-gdev resets. So use the per-device API properly
> to attach/detach PASIDs. Also add max_pasids check as other callers.
> 
> Fixes: c279e83953d9 ("iommu: Introduce pci_dev_reset_iommu_prepare/done()")
> Cc:stable@vger.kernel.org
> Reported-by: Shuai Xue<xueshuai@linux.alibaba.com>
> Closes:https://lore.kernel.org/all/ad858513-09fc-455e-bbc5- 
> fe38a225cc78@linux.alibaba.com/
> Reviewed-by: Shuai Xue<xueshuai@linux.alibaba.com>
> Reviewed-by: Jason Gunthorpe<jgg@nvidia.com>
> Reviewed-by: Kevin Tian<kevin.tian@intel.com>
> Signed-off-by: Nicolin Chen<nicolinc@nvidia.com>
> ---
>   drivers/iommu/iommu.c | 25 ++++++++++++++++++-------
>   1 file changed, 18 insertions(+), 7 deletions(-)
> 
> diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c
> index d5d9102b9d750..e9ffa562b614f 100644
> --- a/drivers/iommu/iommu.c
> +++ b/drivers/iommu/iommu.c
> @@ -4026,9 +4026,14 @@ int pci_dev_reset_iommu_prepare(struct pci_dev *pdev)
>   	 * The pasid_array is mostly fenced by group->mutex, except one reader
>   	 * in iommu_attach_handle_get(), so it's safe to read without xa_lock.
>   	 */
> -	xa_for_each_start(&group->pasid_array, pasid, entry, 1)
> -		iommu_remove_dev_pasid(&pdev->dev, pasid,
> -				       pasid_array_entry_to_domain(entry));
> +	if (pdev->dev.iommu->max_pasids > 0) {
> +		xa_for_each_start(&group->pasid_array, pasid, entry, 1) {
> +			struct iommu_domain *pasid_dom =
> +				pasid_array_entry_to_domain(entry);
> +
> +			iommu_remove_dev_pasid(&pdev->dev, pasid, pasid_dom);
> +		}
> +	}
>   
>   	group->recovery_cnt++;
>   	return ret;
> @@ -4090,10 +4095,16 @@ void pci_dev_reset_iommu_done(struct pci_dev *pdev)
>   	 * The pasid_array is mostly fenced by group->mutex, except one reader
>   	 * in iommu_attach_handle_get(), so it's safe to read without xa_lock.
>   	 */
> -	xa_for_each_start(&group->pasid_array, pasid, entry, 1)
> -		WARN_ON(__iommu_set_group_pasid(
> -			pasid_array_entry_to_domain(entry), group, pasid,
> -			group->blocking_domain));
> +	if (pdev->dev.iommu->max_pasids > 0) {
> +		xa_for_each_start(&group->pasid_array, pasid, entry, 1) {
> +			struct iommu_domain *pasid_dom =
> +				pasid_array_entry_to_domain(entry);
> +
> +			WARN_ON(pasid_dom->ops->set_dev_pasid(
> +				pasid_dom, &pdev->dev, pasid,
> +				group->blocking_domain));
> +		}
> +	}
>   
>   	if (!WARN_ON(group->recovery_cnt == 0))
>   		group->recovery_cnt--;

I don’t think this patch fixes a real-world issue though it has the
"Fixes:" tag. Logically, if pdev->dev.iommu->max_pasids == 0, there
should be no domains attached to any pasid. Consequently,
group->pasid_array should be empty, and the xa_for_each loop is just a
no-op.

I understand this was a result of Sashko's review comments, but I don't
think it worth a formal fix. I admit I might be overlooking something,
so please correct me if I am wrong.

Thanks,
baolu

  reply	other threads:[~2026-04-24  5:52 UTC|newest]

Thread overview: 21+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-04-18 23:41 [PATCH rc v7 0/6] iommu: Fix pci_dev_reset_iommu_prepare/done() Nicolin Chen
2026-04-18 23:41 ` [PATCH rc v7 1/6] iommu: Fix kdocs of pci_dev_reset_iommu_done() Nicolin Chen
2026-04-24  5:09   ` Baolu Lu
2026-04-18 23:41 ` [PATCH rc v7 2/6] iommu: Replace per-group resetting_domain with per-gdev blocked flag Nicolin Chen
2026-04-24  5:27   ` Baolu Lu
2026-04-18 23:41 ` [PATCH rc v7 3/6] iommu: Fix pasid attach in pci_dev_reset_iommu_prepare/done() Nicolin Chen
2026-04-24  5:49   ` Baolu Lu [this message]
2026-04-24 19:28     ` Nicolin Chen
2026-04-18 23:41 ` [PATCH rc v7 4/6] iommu: Fix nested pci_dev_reset_iommu_prepare/done() Nicolin Chen
2026-04-24  6:12   ` Baolu Lu
2026-04-18 23:41 ` [PATCH rc v7 5/6] iommu: Fix ATS invalidation timeouts during __iommu_remove_group_pasid() Nicolin Chen
2026-04-21  7:15   ` Tian, Kevin
2026-04-21 17:57     ` Nicolin Chen
2026-04-22  2:03       ` Tian, Kevin
2026-04-24  6:23   ` Baolu Lu
2026-04-24 19:39     ` Nicolin Chen
2026-04-18 23:41 ` [PATCH rc v7 6/6] iommu: Fix UAF in pci_dev_reset_iommu_done() due to concurrent detach Nicolin Chen
2026-04-21  7:41   ` Tian, Kevin
2026-04-21 18:10     ` Nicolin Chen
2026-04-22  1:56       ` Tian, Kevin
2026-04-24  6:44   ` Baolu Lu

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=9752ce24-a5f2-491d-b6fb-9e6d81f0cb67@linux.intel.com \
    --to=baolu.lu@linux.intel.com \
    --cc=iommu@lists.linux.dev \
    --cc=jgg@nvidia.com \
    --cc=joro@8bytes.org \
    --cc=kevin.tian@intel.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=nicolinc@nvidia.com \
    --cc=robin.murphy@arm.com \
    --cc=will@kernel.org \
    --cc=xueshuai@linux.alibaba.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox