Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp510686ybt; Wed, 1 Jul 2020 03:56:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyOCQXuPvI401p2TkiaAAS2+S6Jqm/T8Ie/2gByAXk5gA0tbyTIN5cTUpHTT2H+uyjs//lV X-Received: by 2002:a17:906:1f4f:: with SMTP id d15mr22055244ejk.206.1593600961202; Wed, 01 Jul 2020 03:56:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593600961; cv=none; d=google.com; s=arc-20160816; b=LEBieABqGU1nbTT66401jKGRDw5sX6OF+Z4/Tnt8PYenu/vaHCR0L/xi3Wo17LcsEp Vui/SfFhXofBmlnLQ/SVgbskj3uuRFm1pCBBMB09vOmxZ0Q4TRriv4udOiOW3PZr5G6/ Nt90rM/eHGLfYrESwceQf/TEOHAP6LegTB1Pq9BP3fVnqdyR7U5ZHRMPZegn2o3OBsNW y3JGou5rO+1qGLwvXfChp/iz1buT/AFh4DZiwZJHbUwGfV8Uoieqf/gXZu+/IXQOI4d2 hjqrzWQNz0QuBJLyJwnbQo25aydgBICfd93Q/Lah6GjCsitpJ+U2Gb0nGaquujaE8wdw JQ+g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=9QxjkvnwJCWpJVdQtX8P4z3ZQX30MQxk5USwxudCXXk=; b=KzFsv7Flzbf9OSXJh2nTovrPMuEZ2GihgPnfDq/99LgWhpSQF6nckcVYs8eOT48JAI AsSeFbo2IwQS+kqe/BH06TJvCWkZRi4+67CA2GZi4TOmFrwpib7ttGqNAjWHFCyiktG0 CfohGDEY7Sw+xXVnT7S7eAFS1P18kivifsOd6UMTXEnha0FK6yFQbFYFSXCmrjEI2tij EC7cWpKEKOGVTZ8kz7U5lOmnUsosg/jRbOD2E71D4aMOv/JzV8HdsWYUxwpsXmkTyZ5m 0bUj9tSN6x3bmWz1mDHjYCYitLv4oqMDpyWIV0twHOdCyrGhh9VNIuh37br1/NXZxDBk 67DA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k13si3679967ejq.296.2020.07.01.03.55.37; Wed, 01 Jul 2020 03:56:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730134AbgGAKxN (ORCPT + 99 others); Wed, 1 Jul 2020 06:53:13 -0400 Received: from foss.arm.com ([217.140.110.172]:57020 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729892AbgGAKxN (ORCPT ); Wed, 1 Jul 2020 06:53:13 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id B597030E; Wed, 1 Jul 2020 03:53:12 -0700 (PDT) Received: from [10.57.21.32] (unknown [10.57.21.32]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id BB9483F73C; Wed, 1 Jul 2020 03:53:08 -0700 (PDT) Subject: Re: [PATCH v3 00/34] iommu: Move iommu_group setup to IOMMU core code To: Qian Cai , Joerg Roedel Cc: Heiko Stuebner , Bjorn Andersson , linux-tegra@vger.kernel.org, Thierry Reding , Daniel Drake , Will Deacon , Jean-Philippe Brucker , linux-samsung-soc@vger.kernel.org, iommu@lists.linux-foundation.org, Krzysztof Kozlowski , Jonathan Hunter , linux-rockchip@lists.infradead.org, Andy Gross , jonathan.derrick@intel.com, linux-s390@vger.kernel.org, linux-arm-msm@vger.kernel.org, linux-mediatek@lists.infradead.org, Matthias Brugger , virtualization@lists.linux-foundation.org, Gerald Schaefer , David Woodhouse , linux-kernel@vger.kernel.org, Kukjin Kim References: <20200429133712.31431-1-joro@8bytes.org> <20200701004020.GA6221@lca.pw> From: Robin Murphy Message-ID: <9b0ef27a-f249-a90b-9899-e53b946f83cc@arm.com> Date: Wed, 1 Jul 2020 11:53:07 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Thunderbird/68.9.0 MIME-Version: 1.0 In-Reply-To: <20200701004020.GA6221@lca.pw> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020-07-01 01:40, Qian Cai wrote: > Looks like this patchset introduced an use-after-free on arm-smmu-v3. > > Reproduced using mlx5, > > # echo 1 > /sys/class/net/enp11s0f1np1/device/sriov_numvfs > # echo 0 > /sys/class/net/enp11s0f1np1/device/sriov_numvfs > > The .config, > https://github.com/cailca/linux-mm/blob/master/arm64.config > > Looking at the free stack, > > iommu_release_device->iommu_group_remove_device > > was introduced in 07/34 ("iommu: Add probe_device() and release_device() > call-backs"). Right, iommu_group_remove_device can tear down the group and call ->domain_free before the driver has any knowledge of the last device going away via the ->release_device call. I guess the question is do we simply flip the call order in iommu_release_device() so drivers can easily clean up their internal per-device state first, or do we now want them to be robust against freeing domains with devices still nominally attached? Robin.