From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pl1-f175.google.com (mail-pl1-f175.google.com [209.85.214.175]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6FC5D33A9DA for ; Wed, 20 May 2026 19:50:45 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.175 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1779306646; cv=none; b=im+WWbgbza4GXTXyz/QzEyn/wdbGpR/WeUdDieJq3008LT7WKjYFV9/GFbDhKOOuexjMeJV2fax/bBcGJPlpYjCpqNU7V/AHUvbMmML/GV6SHtXgUihG4yiGQxBHp4giNbcmYsZxfUTd/o1V5d5GhBT/iunHgNzNWVC5j5ODEfM= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1779306646; c=relaxed/simple; bh=38oreodTd3a6pgd9iHihqPkmarP5WZdM5RpNKRkZshU=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=AWqvSMvjcM4035s2rxrVj9RaCEbjHWRJFXFDzhqX40qmzFrIzQmZC9rm3Y1cwfysXth8Az4N+o3iKvC6m1KzqVXtP5Emx4a9aFp2T3U3iv1kPtJRUbg4fsGbrNY+r/kcT0R5GY86A7Bfu3+kZ3hvvlMObf46J8mYAtna0LjJKPU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=qOkM6CJ3; arc=none smtp.client-ip=209.85.214.175 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="qOkM6CJ3" Received: by mail-pl1-f175.google.com with SMTP id d9443c01a7336-2b46da8c48eso1175ad.1 for ; Wed, 20 May 2026 12:50:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20251104; t=1779306645; x=1779911445; darn=vger.kernel.org; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=zGlZIIGtCBSMFz+AR7h4nxPLAjxI6s+Py2Of2qTbbXE=; b=qOkM6CJ3PRTIuXFlbIEte4u+2ePR75ptmPuG2AH+B2HVX3inE5WOBxxyWtS7kLmTPe nEVG1uK0cEQa941gTNQ+qQ5femZeSPLN/qmEsAPNLhGroRMsPs0Pu9QjGHbUq5GX6DL/ EKxpFeavb7BsKEpInoZYBasq1TSnMmB0mCSo/+Q9x0JuNYRR2MdQyEvp+ymqD1C5qYel 8jsrTfPouc7qRdktuBaD6LEpoWJUI9BBC6rJs6rkcRsdJTaK9DYQJnfABUEVUBFO3S+G GiIIRfNYeGD14Z83995wDzSZMk9lZEJ/Byv34q6EijImOuwTV5cmoUdfOetPrM6Rzxr/ R7+A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779306645; x=1779911445; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-gg:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=zGlZIIGtCBSMFz+AR7h4nxPLAjxI6s+Py2Of2qTbbXE=; b=HDjnY5hnuDeqCLOdj6w3tYJesxxUb1YmUME746obQYQOKBBkAQzKTUHuCimYbgiuaX zndjPDA95YVbw69s5jqDI5IltqLArIRfVgVeYRrHc8i0UN20Wgsxil6R4Gdv6MpZfz9d B2bS+IoLUYqBZVOozQRnFOsH5cgV+7mzCk863fAL2Sjak8mNH3UAdar//+9oTVJU5sgM /hrmhK+RY7p5sCvyis5/vozDZF4O0QJ/f49oTTZBZdnSDCB7o1bASgtLdAGbWNNtbVJ+ hpAzQL8BciO/FjDnzPy3TXHZX90Z1WWK1PS1WeLRiyQIVVEu06J/k4Svp8vgFL7n10Sv vfqA== X-Forwarded-Encrypted: i=1; AFNElJ+wdc1nZiowNBc6pJ5uctzlE7NsFvTTJrecYooPE06Hvtlbab3KKVvJGkd0HbBMH/s0Fbzel9BE0fSRGlg=@vger.kernel.org X-Gm-Message-State: AOJu0Yw+1GDDClZcl3jf9EejWeOkH8UAlZQ+cGrbZAw2sxp7ywJo/hQp HYBbwM5WGPF+NEmtbfgmMrvshcAYGoCJAp9H28b23CeIK1xZz3nebVshRA+aSdcU9Q== X-Gm-Gg: Acq92OEd6vt9kYt/XbgOgwR8p/mWsOA5VRWezcwOT8LJ+I94hZEjGUB8+QMK03nvHL/ uSHd27u0X/+yOX2SnDet47ZT4gLkoFTPpKWGrpMSVYBAL90WVauHRdCFPgC++SrETlvAxuE0R35 jtalTl1OJBbz4xQmi+e8tSW2/pAUNeIMLlUFBxuo74agzLFq3phVY6sRLpSGY7p4wlk2byofKaY mmSeNtqA3Y3acUfG5xqiJD+3gUOg4s0b9yDRQZkTM5dF5mSqp8CHMg7eJ8992880GbZnYaC5NgU zfRLEKoZQjMxYw+thL4WDQyCs4ceNc9oifsUI0z0QN/kwvNbBpb0GJgCebJSdY+VOOHSsw4Gvhi Slqy86UsxT8pWW5OkSWh6X9RftUDtmi2qcKZDYUAzSNpEnXs7pXfyZAq5/RmGy4g4AAGnb29uc5 4L7UK8Jcz9d2l9njGqaMNWByjikZ59zmrwq642LgXyaQbOqG7M4bs7qb7VQkEDiNsSszliTA== X-Received: by 2002:a17:902:ce0a:b0:2bd:6dad:3dfd with SMTP id d9443c01a7336-2be9f6d571amr560625ad.27.1779306644147; Wed, 20 May 2026 12:50:44 -0700 (PDT) Received: from google.com (153.46.83.34.bc.googleusercontent.com. [34.83.46.153]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-84149619c9dsm224416b3a.36.2026.05.20.12.50.43 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 May 2026 12:50:43 -0700 (PDT) Date: Wed, 20 May 2026 19:50:40 +0000 From: Samiullah Khawaja To: Pranjal Shrivastava Cc: David Woodhouse , Lu Baolu , Joerg Roedel , Will Deacon , Jason Gunthorpe , YiFei Zhu , Robin Murphy , Kevin Tian , Alex Williamson , Shuah Khan , iommu@lists.linux.dev, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, Saeed Mahameed , Adithya Jayachandran , Parav Pandit , Leon Romanovsky , William Tu , Pratyush Yadav , Pasha Tatashin , David Matlack , Andrew Morton , Chris Li , Vipin Sharma Subject: Re: [PATCH v2 12/16] iommufd: Implement ioctl to mark HWPT for preservation Message-ID: References: <20260427175633.1978233-1-skhawaja@google.com> <20260427175633.1978233-13-skhawaja@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: On Tue, May 19, 2026 at 11:05:02PM +0000, Pranjal Shrivastava wrote: >On Mon, Apr 27, 2026 at 05:56:29PM +0000, Samiullah Khawaja wrote: >> From: YiFei Zhu >> >> Userspace provides a token to mark the HWPT for preservation. Note that >> this token is not the LUO token that is used to preserve the iommufd. >> Once all the required HWPT are marked for preservation, the user can >> preserve the iommufd into LUO. The iommufd will preserve the HWPTs that >> are marked for preservation. >> >> The marked HWPTs are tracked using a new XArray mark protected by a new >> liveupdate mutex. This mutex will also be used during iommufd >> preservation to protect against any race with the mark preserve ioctl. >> >> The HWPT token will be used during restore to identify this HWPT. The >> restoration logic is not implemented and will be added later. >> >> Signed-off-by: YiFei Zhu >> Signed-off-by: Samiullah Khawaja > [snip] > >> +int iommufd_hwpt_liveupdate_mark_preserve(struct iommufd_ucmd *ucmd) >> +{ >> + struct iommu_hwpt_liveupdate_mark_preserve *cmd = ucmd->cmd; >> + struct iommufd_hwpt_paging *hwpt_target; >> + struct iommufd_hwpt_paging *hwpt_paging; >> + struct iommufd_ctx *ictx = ucmd->ictx; >> + struct iommufd_object *obj; >> + unsigned long index; >> + int rc = 0; >> + >> + hwpt_target = iommufd_get_hwpt_paging(ucmd, cmd->hwpt_id); >> + if (IS_ERR(hwpt_target)) >> + return PTR_ERR(hwpt_target); >> + >> + mutex_lock(&ictx->liveupdate_mutex); >> + >> + xa_lock(&ictx->objects); >> + xa_for_each_marked(&ictx->objects, index, obj, IOMMUFD_OBJ_LIVEUPDATE_MARK) { >> + if (WARN_ON_ONCE(obj->type != IOMMUFD_OBJ_HWPT_PAGING)) >> + continue; >> + >> + hwpt_paging = to_hwpt_paging(container_of(obj, struct iommufd_hw_pagetable, obj)); >> + if (hwpt_paging->liveupdate_token == cmd->hwpt_token) { >> + rc = -EADDRINUSE; >> + goto out_unlock; >> + } >> + } >> + > >Nit: What happens if the user calls this IOCTL on an HWPT that is already >marked but passes a different token? > >The xa_for_each_marked loop will not match the new token (so it bypasses >-EADDRINUSE case) and the code will silently overwrite the HWPT's >existing token? > >Since there is no unmark / update UAPI, It can be a fair policy as well, >but maybe we should call it out explicitly, maybe a log like: >dev_warn("Overwriting token to %d ...") ? Agreed. I will do this. > >If NOT, then we should avoid overwriting the token and scream with >retval like -EINVAL & dev_err in dmesg. > >> + __xa_set_mark(&ictx->objects, hwpt_target->common.obj.id, IOMMUFD_OBJ_LIVEUPDATE_MARK); >> + hwpt_target->liveupdate_token = cmd->hwpt_token; >> + >> +out_unlock: >> + xa_unlock(&ictx->objects); >> + mutex_unlock(&ictx->liveupdate_mutex); >> + iommufd_put_object(ictx, &hwpt_target->common.obj); >> + return rc; >> +} > >With those two nits addressed, > >Reviewed-by: Pranjal Shrivastava > >Thanks, >Praan Thanks, Sami