Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3483862imm; Mon, 4 Jun 2018 04:30:10 -0700 (PDT) X-Google-Smtp-Source: ADUXVKJpKlCFaIOudU/vZ98x9dkJqulK5MvASCsOiWUTk7g7yqe1W5YCxIoOMhECxD8mgwlVbPfh X-Received: by 2002:a62:5841:: with SMTP id m62-v6mr20700940pfb.116.1528111810672; Mon, 04 Jun 2018 04:30:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528111810; cv=none; d=google.com; s=arc-20160816; b=ge4QVIRWytXfr6fwcU0goW1vIbZiREfe12d1wg9Hg0fwO0sD8k10fzlye2FtIKS28Y 59ruia+qyS6OWGzH2nYiIUx6zlIMuofnbu5/gWFr/1PwRqnhz7Pu0cjrQ3jANdN34ER3 LYp41hOyA65yPLhMKljjMR8j4VSupAbbdLpkspPInDg8MyFxckgZlOm3XCf3v7Jk+29H L7nZ1CwhvKxNW2issGrHH6LHL0UD8gMyoayB5XFZ+Vcnb69RzhpP66mUG1yOqdhuaLxa vuowH440IxTX9ocZTqcyuSUQ0PgQEmp3piOdj+dxsUZkSSxKsueCwiOsjgGghAUFQ0UF hOEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:cc:references:to :subject:arc-authentication-results; bh=0OSYKphPCpe5rzmXvnQ3jPJgsrtctRZsB4Vmq4ioy1c=; b=DtrIZjVtnijeUdd08KuYu8OmW4aogf+3vZCWycGSw/qjhQYOJDzyWqeaX/UFqk9728 N0a1VnlaDdha2EMyWtSHkhT6E+c+s133QvDoHKtZzEAikeWRyzLKDixczGVxexXf+wwF Wm61i6Tvme3E1+J2LbAO9jIh5HkqnBsPQdRpUp8yPRNCXEVb4IZK20YZ/9qKpW6BNGLj jf/eWJXay+0U61oQSBhNvcNAwwkVPTuDyZMfw5p7Dy22mU5ILzySDPqUdOuEk6GCr6dJ 6vzW5JN13A9gNA3fZhpUcnrhHPjRLW4qX+uwCKNN/vXe5GzpNF4IAP/ILJkaej76qC8d 9bMg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a7-v6si37148593pgd.338.2018.06.04.04.29.55; Mon, 04 Jun 2018 04:30:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752011AbeFDL2j (ORCPT + 99 others); Mon, 4 Jun 2018 07:28:39 -0400 Received: from szxga04-in.huawei.com ([45.249.212.190]:8632 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751473AbeFDL2h (ORCPT ); Mon, 4 Jun 2018 07:28:37 -0400 Received: from DGGEMS411-HUB.china.huawei.com (unknown [172.30.72.60]) by Forcepoint Email with ESMTP id A110EAD46B1F0; Mon, 4 Jun 2018 19:28:23 +0800 (CST) Received: from [127.0.0.1] (10.177.23.164) by DGGEMS411-HUB.china.huawei.com (10.3.19.211) with Microsoft SMTP Server id 14.3.382.0; Mon, 4 Jun 2018 19:28:16 +0800 Subject: Re: [PATCH 3/7] iommu: prepare for the non-strict mode support To: Robin Murphy , Will Deacon , Matthias Brugger , Rob Clark , Joerg Roedel , linux-mediatek , linux-arm-msm , linux-arm-kernel , iommu , linux-kernel References: <1527752569-18020-1-git-send-email-thunder.leizhen@huawei.com> <1527752569-18020-4-git-send-email-thunder.leizhen@huawei.com> CC: Hanjun Guo , Libin , "Guozhu Li" , Xinwei Hu From: "Leizhen (ThunderTown)" Message-ID: <5B152234.80607@huawei.com> Date: Mon, 4 Jun 2018 19:27:48 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.5.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.177.23.164] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2018/5/31 21:04, Robin Murphy wrote: > On 31/05/18 08:42, Zhen Lei wrote: >> In common, a IOMMU unmap operation follow the below steps: >> 1. remove the mapping in page table of the specified iova range >> 2. execute tlbi command to invalid the mapping which is cached in TLB >> 3. wait for the above tlbi operation to be finished >> 4. free the IOVA resource >> 5. free the physical memory resource >> >> This maybe a problem when unmap is very frequently, the combination of tlbi >> and wait operation will consume a lot of time. A feasible method is put off >> tlbi and iova-free operation, when accumulating to a certain number or >> reaching a specified time, execute only one tlbi_all command to clean up >> TLB, then free the backup IOVAs. Mark as non-strict mode. >> >> But it must be noted that, although the mapping has already been removed in >> the page table, it maybe still exist in TLB. And the freed physical memory >> may also be reused for others. So a attacker can persistent access to memory >> based on the just freed IOVA, to obtain sensible data or corrupt memory. So >> the VFIO should always choose the strict mode. >> >> This patch just add a new parameter for the unmap operation, to help the >> upper functions capable choose which mode to be applied. > > This seems like it might be better handled by a flag in io_pgtable_cfg->quirks. This interface change on its own looks rather invasive, and teh fact that it ends up only being used to pass through a constant property of the domain (which is already known by the point io_pgtable_alloc() is called) implies that it is indeed the wrong level of abstraction. > Sound good. Thanks for your suggestion, I will try it in v2. >> No functional changes. >> >> Signed-off-by: Zhen Lei >> --- >> drivers/iommu/arm-smmu-v3.c | 2 +- >> drivers/iommu/arm-smmu.c | 2 +- >> drivers/iommu/io-pgtable-arm-v7s.c | 6 +++--- >> drivers/iommu/io-pgtable-arm.c | 6 +++--- >> drivers/iommu/io-pgtable.h | 2 +- >> drivers/iommu/ipmmu-vmsa.c | 2 +- >> drivers/iommu/msm_iommu.c | 2 +- >> drivers/iommu/mtk_iommu.c | 2 +- >> drivers/iommu/qcom_iommu.c | 2 +- >> include/linux/iommu.h | 2 ++ > > Plus things specific to io-pgtable shouldn't really be spilling into the core API header either. > > Robin. > >> 10 files changed, 15 insertions(+), 13 deletions(-) >> >> diff --git a/drivers/iommu/arm-smmu-v3.c b/drivers/iommu/arm-smmu-v3.c >> index 4402187..59b3387 100644 >> --- a/drivers/iommu/arm-smmu-v3.c >> +++ b/drivers/iommu/arm-smmu-v3.c >> @@ -1767,7 +1767,7 @@ static int arm_smmu_map(struct iommu_domain *domain, unsigned long iova, >> if (!ops) >> return 0; >> - return ops->unmap(ops, iova, size); >> + return ops->unmap(ops, iova, size, IOMMU_STRICT); >> } >> static void arm_smmu_flush_iotlb_all(struct iommu_domain *domain) >> diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c >> index 69e7c60..253e807 100644 >> --- a/drivers/iommu/arm-smmu.c >> +++ b/drivers/iommu/arm-smmu.c >> @@ -1249,7 +1249,7 @@ static size_t arm_smmu_unmap(struct iommu_domain *domain, unsigned long iova, >> if (!ops) >> return 0; >> - return ops->unmap(ops, iova, size); >> + return ops->unmap(ops, iova, size, IOMMU_STRICT); >> } >> static void arm_smmu_iotlb_sync(struct iommu_domain *domain) >> diff --git a/drivers/iommu/io-pgtable-arm-v7s.c b/drivers/iommu/io-pgtable-arm-v7s.c >> index 10e4a3d..799eced 100644 >> --- a/drivers/iommu/io-pgtable-arm-v7s.c >> +++ b/drivers/iommu/io-pgtable-arm-v7s.c >> @@ -658,7 +658,7 @@ static size_t __arm_v7s_unmap(struct arm_v7s_io_pgtable *data, >> } >> static size_t arm_v7s_unmap(struct io_pgtable_ops *ops, unsigned long iova, >> - size_t size) >> + size_t size, int strict) >> { >> struct arm_v7s_io_pgtable *data = io_pgtable_ops_to_data(ops); >> @@ -883,7 +883,7 @@ static int __init arm_v7s_do_selftests(void) >> size = 1UL << __ffs(cfg.pgsize_bitmap); >> while (i < loopnr) { >> iova_start = i * SZ_16M; >> - if (ops->unmap(ops, iova_start + size, size) != size) >> + if (ops->unmap(ops, iova_start + size, size, IOMMU_STRICT) != size) >> return __FAIL(ops); >> /* Remap of partial unmap */ >> @@ -902,7 +902,7 @@ static int __init arm_v7s_do_selftests(void) >> while (i != BITS_PER_LONG) { >> size = 1UL << i; >> - if (ops->unmap(ops, iova, size) != size) >> + if (ops->unmap(ops, iova, size, IOMMU_STRICT) != size) >> return __FAIL(ops); >> if (ops->iova_to_phys(ops, iova + 42)) >> diff --git a/drivers/iommu/io-pgtable-arm.c b/drivers/iommu/io-pgtable-arm.c >> index 39c2a05..e0f52db 100644 >> --- a/drivers/iommu/io-pgtable-arm.c >> +++ b/drivers/iommu/io-pgtable-arm.c >> @@ -624,7 +624,7 @@ static size_t __arm_lpae_unmap(struct arm_lpae_io_pgtable *data, >> } >> static size_t arm_lpae_unmap(struct io_pgtable_ops *ops, unsigned long iova, >> - size_t size) >> + size_t size, int strict) >> { >> struct arm_lpae_io_pgtable *data = io_pgtable_ops_to_data(ops); >> arm_lpae_iopte *ptep = data->pgd; >> @@ -1108,7 +1108,7 @@ static int __init arm_lpae_run_tests(struct io_pgtable_cfg *cfg) >> /* Partial unmap */ >> size = 1UL << __ffs(cfg->pgsize_bitmap); >> - if (ops->unmap(ops, SZ_1G + size, size) != size) >> + if (ops->unmap(ops, SZ_1G + size, size, IOMMU_STRICT) != size) >> return __FAIL(ops, i); >> /* Remap of partial unmap */ >> @@ -1124,7 +1124,7 @@ static int __init arm_lpae_run_tests(struct io_pgtable_cfg *cfg) >> while (j != BITS_PER_LONG) { >> size = 1UL << j; >> - if (ops->unmap(ops, iova, size) != size) >> + if (ops->unmap(ops, iova, size, IOMMU_STRICT) != size) >> return __FAIL(ops, i); >> if (ops->iova_to_phys(ops, iova + 42)) >> diff --git a/drivers/iommu/io-pgtable.h b/drivers/iommu/io-pgtable.h >> index 2df7909..2908806 100644 >> --- a/drivers/iommu/io-pgtable.h >> +++ b/drivers/iommu/io-pgtable.h >> @@ -120,7 +120,7 @@ struct io_pgtable_ops { >> int (*map)(struct io_pgtable_ops *ops, unsigned long iova, >> phys_addr_t paddr, size_t size, int prot); >> size_t (*unmap)(struct io_pgtable_ops *ops, unsigned long iova, >> - size_t size); >> + size_t size, int strict); >> phys_addr_t (*iova_to_phys)(struct io_pgtable_ops *ops, >> unsigned long iova); >> }; >> diff --git a/drivers/iommu/ipmmu-vmsa.c b/drivers/iommu/ipmmu-vmsa.c >> index 40ae6e8..e6d9e11 100644 >> --- a/drivers/iommu/ipmmu-vmsa.c >> +++ b/drivers/iommu/ipmmu-vmsa.c >> @@ -716,7 +716,7 @@ static size_t ipmmu_unmap(struct iommu_domain *io_domain, unsigned long iova, >> { >> struct ipmmu_vmsa_domain *domain = to_vmsa_domain(io_domain); >> - return domain->iop->unmap(domain->iop, iova, size); >> + return domain->iop->unmap(domain->iop, iova, size, IOMMU_STRICT); >> } >> static void ipmmu_iotlb_sync(struct iommu_domain *io_domain) >> diff --git a/drivers/iommu/msm_iommu.c b/drivers/iommu/msm_iommu.c >> index 0d33504..180fa3d 100644 >> --- a/drivers/iommu/msm_iommu.c >> +++ b/drivers/iommu/msm_iommu.c >> @@ -532,7 +532,7 @@ static size_t msm_iommu_unmap(struct iommu_domain *domain, unsigned long iova, >> unsigned long flags; >> spin_lock_irqsave(&priv->pgtlock, flags); >> - len = priv->iop->unmap(priv->iop, iova, len); >> + len = priv->iop->unmap(priv->iop, iova, len, IOMMU_STRICT); >> spin_unlock_irqrestore(&priv->pgtlock, flags); >> return len; >> diff --git a/drivers/iommu/mtk_iommu.c b/drivers/iommu/mtk_iommu.c >> index f2832a1..54661ed 100644 >> --- a/drivers/iommu/mtk_iommu.c >> +++ b/drivers/iommu/mtk_iommu.c >> @@ -386,7 +386,7 @@ static size_t mtk_iommu_unmap(struct iommu_domain *domain, >> size_t unmapsz; >> spin_lock_irqsave(&dom->pgtlock, flags); >> - unmapsz = dom->iop->unmap(dom->iop, iova, size); >> + unmapsz = dom->iop->unmap(dom->iop, iova, size, IOMMU_STRICT); >> spin_unlock_irqrestore(&dom->pgtlock, flags); >> return unmapsz; >> diff --git a/drivers/iommu/qcom_iommu.c b/drivers/iommu/qcom_iommu.c >> index 65b9c99..90abde1 100644 >> --- a/drivers/iommu/qcom_iommu.c >> +++ b/drivers/iommu/qcom_iommu.c >> @@ -444,7 +444,7 @@ static size_t qcom_iommu_unmap(struct iommu_domain *domain, unsigned long iova, >> */ >> pm_runtime_get_sync(qcom_domain->iommu->dev); >> spin_lock_irqsave(&qcom_domain->pgtbl_lock, flags); >> - ret = ops->unmap(ops, iova, size); >> + ret = ops->unmap(ops, iova, size, IOMMU_STRICT); >> spin_unlock_irqrestore(&qcom_domain->pgtbl_lock, flags); >> pm_runtime_put_sync(qcom_domain->iommu->dev); >> diff --git a/include/linux/iommu.h b/include/linux/iommu.h >> index 19938ee..39b3150 100644 >> --- a/include/linux/iommu.h >> +++ b/include/linux/iommu.h >> @@ -86,6 +86,8 @@ struct iommu_domain_geometry { >> #define IOMMU_DOMAIN_DMA (__IOMMU_DOMAIN_PAGING | \ >> __IOMMU_DOMAIN_DMA_API) >> +#define IOMMU_STRICT 1 >> + >> struct iommu_domain { >> unsigned type; >> const struct iommu_ops *ops; >> > > . > -- Thanks! BestRegards