From: Baolu Lu <baolu.lu@linux.intel.com>
To: Nicolin Chen <nicolinc@nvidia.com>,
joro@8bytes.org, kevin.tian@intel.com, jgg@nvidia.com
Cc: will@kernel.org, robin.murphy@arm.com, iommu@lists.linux.dev,
linux-kernel@vger.kernel.org, xueshuai@linux.alibaba.com
Subject: Re: [PATCH rc v7 3/6] iommu: Fix pasid attach in pci_dev_reset_iommu_prepare/done()
Date: Fri, 24 Apr 2026 13:49:52 +0800 [thread overview]
Message-ID: <9752ce24-a5f2-491d-b6fb-9e6d81f0cb67@linux.intel.com> (raw)
In-Reply-To: <3f1b73fa5162e55ffbe497508aeea1fc7cee6e2c.1776551790.git.nicolinc@nvidia.com>
On 4/19/26 07:41, Nicolin Chen wrote:
> Now the helpers handle per-gdev resets. So use the per-device API properly
> to attach/detach PASIDs. Also add max_pasids check as other callers.
>
> Fixes: c279e83953d9 ("iommu: Introduce pci_dev_reset_iommu_prepare/done()")
> Cc:stable@vger.kernel.org
> Reported-by: Shuai Xue<xueshuai@linux.alibaba.com>
> Closes:https://lore.kernel.org/all/ad858513-09fc-455e-bbc5-
> fe38a225cc78@linux.alibaba.com/
> Reviewed-by: Shuai Xue<xueshuai@linux.alibaba.com>
> Reviewed-by: Jason Gunthorpe<jgg@nvidia.com>
> Reviewed-by: Kevin Tian<kevin.tian@intel.com>
> Signed-off-by: Nicolin Chen<nicolinc@nvidia.com>
> ---
> drivers/iommu/iommu.c | 25 ++++++++++++++++++-------
> 1 file changed, 18 insertions(+), 7 deletions(-)
>
> diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c
> index d5d9102b9d750..e9ffa562b614f 100644
> --- a/drivers/iommu/iommu.c
> +++ b/drivers/iommu/iommu.c
> @@ -4026,9 +4026,14 @@ int pci_dev_reset_iommu_prepare(struct pci_dev *pdev)
> * The pasid_array is mostly fenced by group->mutex, except one reader
> * in iommu_attach_handle_get(), so it's safe to read without xa_lock.
> */
> - xa_for_each_start(&group->pasid_array, pasid, entry, 1)
> - iommu_remove_dev_pasid(&pdev->dev, pasid,
> - pasid_array_entry_to_domain(entry));
> + if (pdev->dev.iommu->max_pasids > 0) {
> + xa_for_each_start(&group->pasid_array, pasid, entry, 1) {
> + struct iommu_domain *pasid_dom =
> + pasid_array_entry_to_domain(entry);
> +
> + iommu_remove_dev_pasid(&pdev->dev, pasid, pasid_dom);
> + }
> + }
>
> group->recovery_cnt++;
> return ret;
> @@ -4090,10 +4095,16 @@ void pci_dev_reset_iommu_done(struct pci_dev *pdev)
> * The pasid_array is mostly fenced by group->mutex, except one reader
> * in iommu_attach_handle_get(), so it's safe to read without xa_lock.
> */
> - xa_for_each_start(&group->pasid_array, pasid, entry, 1)
> - WARN_ON(__iommu_set_group_pasid(
> - pasid_array_entry_to_domain(entry), group, pasid,
> - group->blocking_domain));
> + if (pdev->dev.iommu->max_pasids > 0) {
> + xa_for_each_start(&group->pasid_array, pasid, entry, 1) {
> + struct iommu_domain *pasid_dom =
> + pasid_array_entry_to_domain(entry);
> +
> + WARN_ON(pasid_dom->ops->set_dev_pasid(
> + pasid_dom, &pdev->dev, pasid,
> + group->blocking_domain));
> + }
> + }
>
> if (!WARN_ON(group->recovery_cnt == 0))
> group->recovery_cnt--;
I don’t think this patch fixes a real-world issue though it has the
"Fixes:" tag. Logically, if pdev->dev.iommu->max_pasids == 0, there
should be no domains attached to any pasid. Consequently,
group->pasid_array should be empty, and the xa_for_each loop is just a
no-op.
I understand this was a result of Sashko's review comments, but I don't
think it worth a formal fix. I admit I might be overlooking something,
so please correct me if I am wrong.
Thanks,
baolu
next prev parent reply other threads:[~2026-04-24 5:52 UTC|newest]
Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-18 23:41 [PATCH rc v7 0/6] iommu: Fix pci_dev_reset_iommu_prepare/done() Nicolin Chen
2026-04-18 23:41 ` [PATCH rc v7 1/6] iommu: Fix kdocs of pci_dev_reset_iommu_done() Nicolin Chen
2026-04-24 5:09 ` Baolu Lu
2026-04-18 23:41 ` [PATCH rc v7 2/6] iommu: Replace per-group resetting_domain with per-gdev blocked flag Nicolin Chen
2026-04-24 5:27 ` Baolu Lu
2026-04-18 23:41 ` [PATCH rc v7 3/6] iommu: Fix pasid attach in pci_dev_reset_iommu_prepare/done() Nicolin Chen
2026-04-24 5:49 ` Baolu Lu [this message]
2026-04-24 19:28 ` Nicolin Chen
2026-04-18 23:41 ` [PATCH rc v7 4/6] iommu: Fix nested pci_dev_reset_iommu_prepare/done() Nicolin Chen
2026-04-24 6:12 ` Baolu Lu
2026-04-18 23:41 ` [PATCH rc v7 5/6] iommu: Fix ATS invalidation timeouts during __iommu_remove_group_pasid() Nicolin Chen
2026-04-21 7:15 ` Tian, Kevin
2026-04-21 17:57 ` Nicolin Chen
2026-04-22 2:03 ` Tian, Kevin
2026-04-24 6:23 ` Baolu Lu
2026-04-24 19:39 ` Nicolin Chen
2026-04-18 23:41 ` [PATCH rc v7 6/6] iommu: Fix UAF in pci_dev_reset_iommu_done() due to concurrent detach Nicolin Chen
2026-04-21 7:41 ` Tian, Kevin
2026-04-21 18:10 ` Nicolin Chen
2026-04-22 1:56 ` Tian, Kevin
2026-04-24 6:44 ` Baolu Lu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=9752ce24-a5f2-491d-b6fb-9e6d81f0cb67@linux.intel.com \
--to=baolu.lu@linux.intel.com \
--cc=iommu@lists.linux.dev \
--cc=jgg@nvidia.com \
--cc=joro@8bytes.org \
--cc=kevin.tian@intel.com \
--cc=linux-kernel@vger.kernel.org \
--cc=nicolinc@nvidia.com \
--cc=robin.murphy@arm.com \
--cc=will@kernel.org \
--cc=xueshuai@linux.alibaba.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox