Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp1282070ybg; Tue, 2 Jun 2020 06:10:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxny8PM80z9vflP4/Cf//rKERzewiyzFUaN12Y/Sr8Cv6S4hmT8BYMAMgDfC8d/SFVaIAGs X-Received: by 2002:a17:906:704c:: with SMTP id r12mr23009087ejj.308.1591103424415; Tue, 02 Jun 2020 06:10:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591103424; cv=none; d=google.com; s=arc-20160816; b=QVRCe0tMkk3eh1ZOmxtX0i3mVQi3QBbu8FFg1bURmymMpRwNIITwTbsE4UstPH8d7w 9T7lyhhS7nJ+eaVeANjL94nyfRUGACwwJ5FT+cgUgVStPHQtoO+zrB9b7hzJ26W9v1Oh I+kqIhzqyM29IZzilxiTtquGGoqHR3Mian0bJKU23WacRVEKTQUTzlyt3QOFlq5KyYab yznGgPU45k5a08IiIU54+2tUP9SpzRIrzCstBmA5AV5fhztQpixtzgZJX9AvINZAvee1 mCK+BAhb4SFxQFjZB1P+Q2LkCDQSCzUpN49pC0Y2ITtxsVQSUGp5md8nBihY69xBKwJV JP7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=Fze16zWKQ5Kp9sb7vwFWYCHBpuf7VC2Yx4I/kKKgTZc=; b=vebsHUwgmF/yr+/ZhrP5w+FkMElTlHkXatN5X/YjibMLDZjoMz+9scUui3pEgv5Qlm FWB5SAu3FCrD/fuu0K23Lziul1cUjSdp3tIxviDI4d0gKFMmAAp+gr5WgmYaYQtuKjyz wzBG/8xpgUwn5U7u5+C1U/5/kwoqR3GxMM5UFYc288l7nlW5ktXc3Vfe7tQXgBuEpaLw XeZSLBKr8XSuY2N5QF6rx4ShgZJ6XpctMQS8jnSUuvz417FkQW5lXeunAbdch0jyNd7q VXWri+05+wN2UoB1hqarRkesp65fg/kbH+YiSrYs/HgzSwQwqBjxj6pNIKiKMNQaFQpC Zq5w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g4si1419295ejb.192.2020.06.02.06.10.01; Tue, 02 Jun 2020 06:10:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728558AbgFBNHW (ORCPT + 99 others); Tue, 2 Jun 2020 09:07:22 -0400 Received: from foss.arm.com ([217.140.110.172]:50674 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728584AbgFBNHR (ORCPT ); Tue, 2 Jun 2020 09:07:17 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id A7A811FB; Tue, 2 Jun 2020 06:07:15 -0700 (PDT) Received: from [10.57.10.95] (unknown [10.57.10.95]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 1BE473F305; Tue, 2 Jun 2020 06:07:13 -0700 (PDT) Subject: Re: [PATCH] iommu/dma: limit iova free size to unmmaped iova To: guptap@codeaurora.org Cc: mhocko@suse.com, owner-linux-mm@kvack.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org, linux-mm@kvack.org, iommu@lists.linux-foundation.org, Andrew Morton References: <20200521113004.12438-1-guptap@codeaurora.org> <7aaa8dcc-6a47-f256-431d-2a1b034b4076@arm.com> <90662ef3123dbf2e93f9718ee5cc14a7@codeaurora.org> <2d873ab9-ebb9-3c2d-f129-55a036ab47d0@arm.com> <4ba082d3bb965524157704ea1ffb1ff4@codeaurora.org> From: Robin Murphy Message-ID: <9b5f8501-6e6e-0cd2-7f98-7cfea13051d7@arm.com> Date: Tue, 2 Jun 2020 14:07:12 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Thunderbird/68.8.0 MIME-Version: 1.0 In-Reply-To: <4ba082d3bb965524157704ea1ffb1ff4@codeaurora.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020-05-26 08:19, guptap@codeaurora.org wrote: > On 2020-05-22 14:54, Robin Murphy wrote: >> On 2020-05-22 07:25, guptap@codeaurora.org wrote: >>> On 2020-05-22 01:46, Robin Murphy wrote: >>>> On 2020-05-21 12:30, Prakash Gupta wrote: >>> I agree, we shouldn't be freeing the partial iova. Instead just making >>> sure if unmap was successful should be sufficient before freeing >>> iova. So change >>> can instead be something like this: >>> >>> -    iommu_dma_free_iova(cookie, dma_addr, size); >>> +    if (unmapped) >>> +        iommu_dma_free_iova(cookie, dma_addr, size); >>> >>>> TBH my gut feeling here is that you're really just trying to treat a >>>> symptom of another bug elsewhere, namely some driver calling >>>> dma_unmap_* or dma_free_* with the wrong address or size in the first >>>> place. >>>> >>> This condition would arise only if driver calling dma_unmap/free_* >>> with 0 >>> iova_pfn. This will be flagged with a warning during unmap but will >>> trigger >>> panic later on while doing unrelated dma_map/unmap_*. If unmapped has >>> already >>> failed for invalid iova, there is no reason we should consider this >>> as valid >>> iova and free. This part should be fixed. >> >> I disagree. In general, if drivers call the DMA API incorrectly it is >> liable to lead to data loss, memory corruption, and various other >> unpleasant misbehaviour - it is not the DMA layer's job to attempt to >> paper over driver bugs. >> >> There *is* an argument for downgrading the BUG_ON() in >> iova_magazine_free_pfns() to a WARN_ON(), since frankly it isn't a >> sufficiently serious condition to justify killing the whole machine >> immediately, but NAK to bodging the iommu-dma mid-layer to "fix" that. >> A serious bug already happened elsewhere, so trying to hide the >> fallout really doesn't help anyone. >> > Sorry for delayed response, it was a long weekend. > I agree that invalid DMA API call can result in unexpected issues and > client > should fix it, but then the present behavior makes it difficult to catch > cases > when driver is making wrong DMA API calls. When invalid iova pfn is > passed it > doesn't fail then and there, though DMA layer is aware of iova being > invalid. It > fails much after that in the context of an valid map/unmap, with BUG_ON(). > > Downgrading BUG_ON() to WARN_ON() in iova_magazine_free_pfns() will not > help > much as invalid iova will cause NULL pointer dereference. Obviously I didn't mean a literal s/BUG/WARN/ substitution - some additional control flow to actually handle the error case was implied. I'll write up the patch myself, since it's easier than further debating. > I see no reason why DMA layer wants to free an iova for which unmapped > failed. > IMHO queuing an invalid iova (which already failed unmap) to rcache which > eventually going to crash the system looks like iommu-dma layer issue. What if the unmap fails because the address range is already entirely unmapped? Freeing the IOVA (or at least attempting to) would be logically appropriate in that case. In fact some IOMMU drivers might not even consider that a failure, so the DMA layer may not even be aware that it's been handed a bogus unallocated address. The point is that unmapping *doesn't* fail under normal and correct operation, so the DMA layer should not expect to have to handle it. Even if it does happen, that's a highly exceptional case that the DMA layer cannot recover from by itself; at best it can just push the problem elsewhere. It's pretty hard to justify doing extra work to simply move an exceptional problem around without really addressing it. And in this particular case, personally I would *much* rather see warnings spewing from both the pagetable and IOVA code as early as possible to clearly indicate that the DMA layer itself has been thrown out of sync, than just have warnings that might represent some other source of pagetable corruption (or at worst, depending on the pagetable code, no warnings at all and only have dma_map_*() calls quietly start failing much, much later due to all the IOVA space having been leaked by bad unmaps). Robin.