Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp2289544imc; Tue, 12 Mar 2019 10:40:20 -0700 (PDT) X-Google-Smtp-Source: APXvYqzpnvL7O/a1s1sa/VzWAeVgvgKa88JiRv2ZMZAC3yJGPkqpkdeqtpWqX1Eshya99aPErEFY X-Received: by 2002:a17:902:9a88:: with SMTP id w8mr41134382plp.8.1552412420614; Tue, 12 Mar 2019 10:40:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552412420; cv=none; d=google.com; s=arc-20160816; b=IgXQUKU6vLHjZcl4DdN139QLv/7DCAsdUIraR1JEHAolpJ1LiUh6CETRhkxFwoCBev DbN3Rt4PEkWGIZExuKom6VUh0yEAMkvAuNnpwVyI3GGkpV2uHM2f5hxswQEiw0k7Vd1M Ot2kU+JJBEH8UctdY8INMi0WvkRfPR+rCOzX/qgZTfSH2cCYJDoNteNG9amyZ5afAw8q s5q8HktfwiFghwQttwXlPllffN7lDIlNO3Ese8ApGdNW4XxvV/Mle3Zx34Yir1K2x/oi 5h4ruDfYtM68+1cW3Fd001sgOg4XZr4g0MMlpu1Gh9b4nS/JozQLgbHSfwQuGJU0W3Mv I7+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=RFZIB8EX7iq/QAd+V0b1t7pRsMiwU76IQv9hPRpRo7Q=; b=RRFD7MU6vR6nWiVvaDUJjEba83wz07MHOT7PrTTp2Pu6W/FCNW5to8lBUyZBnXJb93 LEEMvzfIqiogc+iRz8SziNP2bszEt5ncqGcR6EpejpzBK+s8eK3Z37PivnKYL3OZlJZ+ dYD3yqBG5sqYv0oY+Z/y5mo9jrKB77sKw2NAS6Euaem1kFkpyC/Zj+q8DksXKNQZr57X 048FD0k1YBL9QSXt2/9xyz0J7aetxIvC2YnIqPCcYVmZVbXnoVY/vI49r934x6kX63eE QE2W8Qt+/J8Y4fStzNDTz2YdeQDjpvvvdExZdndonJPGZpye+jtPWB2heybFmPJoZk/S dADw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mxASmGjH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n189si7734465pga.46.2019.03.12.10.40.05; Tue, 12 Mar 2019 10:40:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mxASmGjH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729567AbfCLRjK (ORCPT + 99 others); Tue, 12 Mar 2019 13:39:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:58400 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729115AbfCLRQZ (ORCPT ); Tue, 12 Mar 2019 13:16:25 -0400 Received: from localhost (unknown [104.133.8.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 843342087C; Tue, 12 Mar 2019 17:16:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552410983; bh=iUEhQArM1tNQKd8sckRDVb1L56MPraFnMhHiwx2EoBs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mxASmGjHeRcSDk+eo11zkDSyRnjGHXk2EFEqvY7LigCSOYrNX0Zz2UTn+4EN5xCPY +zwmPEVl9QD8IJ0BD/jtVwCMUui6pdoCTz9uWVZG7aQ+pfleKrrTVKzEbAa0AX9aAT pZeuJ8XE46gyDSQeNNwjZd4e5B0VubvPFA2MNBso= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Boris Ostrovsky , Joerg Roedel , Brijesh Singh , Suravee Suthikulpanit , Joerg Roedel , Sasha Levin Subject: [PATCH 4.14 051/135] iommu/amd: Fix IOMMU page flush when detach device from a domain Date: Tue, 12 Mar 2019 10:08:18 -0700 Message-Id: <20190312170345.874395653@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190312170341.127810985@linuxfoundation.org> References: <20190312170341.127810985@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 9825bd94e3a2baae1f4874767ae3a7d4c049720e ] When a VM is terminated, the VFIO driver detaches all pass-through devices from VFIO domain by clearing domain id and page table root pointer from each device table entry (DTE), and then invalidates the DTE. Then, the VFIO driver unmap pages and invalidate IOMMU pages. Currently, the IOMMU driver keeps track of which IOMMU and how many devices are attached to the domain. When invalidate IOMMU pages, the driver checks if the IOMMU is still attached to the domain before issuing the invalidate page command. However, since VFIO has already detached all devices from the domain, the subsequent INVALIDATE_IOMMU_PAGES commands are being skipped as there is no IOMMU attached to the domain. This results in data corruption and could cause the PCI device to end up in indeterministic state. Fix this by invalidate IOMMU pages when detach a device, and before decrementing the per-domain device reference counts. Cc: Boris Ostrovsky Suggested-by: Joerg Roedel Co-developed-by: Brijesh Singh Signed-off-by: Brijesh Singh Signed-off-by: Suravee Suthikulpanit Fixes: 6de8ad9b9ee0 ('x86/amd-iommu: Make iommu_flush_pages aware of multiple IOMMUs') Signed-off-by: Joerg Roedel Signed-off-by: Sasha Levin --- drivers/iommu/amd_iommu.c | 15 +++++++++++---- 1 file changed, 11 insertions(+), 4 deletions(-) diff --git a/drivers/iommu/amd_iommu.c b/drivers/iommu/amd_iommu.c index 0c0acf6fda87..78b97f31a1f2 100644 --- a/drivers/iommu/amd_iommu.c +++ b/drivers/iommu/amd_iommu.c @@ -1919,6 +1919,7 @@ static void do_attach(struct iommu_dev_data *dev_data, static void do_detach(struct iommu_dev_data *dev_data) { + struct protection_domain *domain = dev_data->domain; struct amd_iommu *iommu; u16 alias; @@ -1934,10 +1935,6 @@ static void do_detach(struct iommu_dev_data *dev_data) iommu = amd_iommu_rlookup_table[dev_data->devid]; alias = dev_data->alias; - /* decrease reference counters */ - dev_data->domain->dev_iommu[iommu->index] -= 1; - dev_data->domain->dev_cnt -= 1; - /* Update data structures */ dev_data->domain = NULL; list_del(&dev_data->list); @@ -1947,6 +1944,16 @@ static void do_detach(struct iommu_dev_data *dev_data) /* Flush the DTE entry */ device_flush_dte(dev_data); + + /* Flush IOTLB */ + domain_flush_tlb_pde(domain); + + /* Wait for the flushes to finish */ + domain_flush_complete(domain); + + /* decrease reference counters - needs to happen after the flushes */ + domain->dev_iommu[iommu->index] -= 1; + domain->dev_cnt -= 1; } /* -- 2.19.1