Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp3541065pxb; Wed, 14 Apr 2021 07:51:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyipqg187etprKNbMHTr1FRRD/5S/9SkSxlhwI18xZ0sYpG66/4+ok6/au1+NvbSCxZE+Ek X-Received: by 2002:a17:902:c410:b029:eb:279:f53b with SMTP id k16-20020a170902c410b02900eb0279f53bmr16229209plk.33.1618411869013; Wed, 14 Apr 2021 07:51:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618411869; cv=none; d=google.com; s=arc-20160816; b=VvGjz1vlZuTydbNqeFDBxSaP4qnqrGih92SIaO6QHS3d3TEJnmFQqVcnrIUOmbLkx4 jPheDrcg9/dpI7xD711kPyUXo0/J7opHWfH/2F75kROfgWVwmBQNrQu+4DMeMwrPcbpl CGznnZeZJdXt86eur9lUC9gTExuCuRjcEFXNH7CrQzZ3sT1I8Spi+sau+L+9M4We+wot OHZlREPYMHF0WPKA0qUApw0ANvrZECU6/NGF1jmCf9H+7k8DLRNNKxVJxzm2mZdO1WS0 JpuFF++YgJnDcjNzrIaavfQSxHK9vKzbuYe10vqII5/i0vbZgGxtERGvbJCI5Jjv7GJL fK9g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=epXw3irDvsvZFL4o434NpborWULmmHYE5K7OMVRyRAI=; b=VCYP2ZGsyFLOL87ihrH/619zeLF1KNWLotPBaABTd9YdvTL1h417tUSBfEirf2y4+m AQercGmTMxXirwvQXWcqcd5kChd9groRHaw8867kLdirSgnO8grTXDt4854cO4jz5cjJ aoWBpn9B4eZOaUXKSRaQOV1zvX2rofMJtKdMMOCqIiWBb0n+8BXY2UasfpE4DtX76ZxV bMZliEQRNQZqqJvlXShGQ52qpthS0aemgB57KSBupzRP7kzslXbdrbjrRm5m5SOE/xSy 8j7lZm1R19Bn21SV2OeTHxVht2mLea/8mrhB4bcmbML7RIYNji6x1j7JC0V6vcb9RVwM Thzg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=p7Sxm7w9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f12si25496966pfa.256.2021.04.14.07.50.56; Wed, 14 Apr 2021 07:51:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=p7Sxm7w9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343665AbhDNIaG (ORCPT + 99 others); Wed, 14 Apr 2021 04:30:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39420 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1350064AbhDNI3f (ORCPT ); Wed, 14 Apr 2021 04:29:35 -0400 Received: from mail-wm1-x333.google.com (mail-wm1-x333.google.com [IPv6:2a00:1450:4864:20::333]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 73E5DC061574 for ; Wed, 14 Apr 2021 01:29:13 -0700 (PDT) Received: by mail-wm1-x333.google.com with SMTP id o21-20020a1c4d150000b029012e52898006so428071wmh.0 for ; Wed, 14 Apr 2021 01:29:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=epXw3irDvsvZFL4o434NpborWULmmHYE5K7OMVRyRAI=; b=p7Sxm7w9vNyyhaZiiyz/88cew7fUg3K8H2EC02WrUDTOxJ+2hC/CbH8VY3rrYvX7eO uXMzbiDRMr6+nUahA7p0JZigYAC26pMFHDdVxyyTBvUtSCN17kVwhxyOtanZ2m1yrU0a PIzpBpDOKr+9R/QEzcW2792Htj+Sp/VfoWh6o0mux4Fa8voOp7Fv7ufJr7RHhlXRQmhP oaymv49jrNB2zFc/5CRVufR87V5BwOu1+7EZ1mEtQP/dNOzv+xaz6A5TPrLkgu2nffad Frd3gdc3Xk7xN5YU2hiw2L6CdAZFkZkbMw4G9LTDk8d3atgG7ZlqgojFSKM36b+gAg9q 25XQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=epXw3irDvsvZFL4o434NpborWULmmHYE5K7OMVRyRAI=; b=VfK45o42K4AOGQBXzAQ3Zjnd9LpPB4/TMQtMteIFACbjY5I2PEg0Rs6OnNPZiDUyMM Z4cSzbUIsMHnom0Uzn5oPKb1lcua25J+sdTnJu+dSz8CgwXM7V8g/jeqqyRv6pMf0xmE l0vLDRqwGYM+MrA9PeXESlmLUhsFfKNVCMH8LfMWIvjNoZ+GcWvuWrIF2ghmCNfNqTDp pL5snxwFvfUZGXoFns30k/SIApDGW/VBre4ddBCeZc7BdiIBH/B4MaonQlYlbi9k82nc wV5bn+TQjfsupmbM6g3MnvOXcQOK2RAXtu6msaIMYnX3RlD9jVVKSHWfzSuqMKaDb2OQ OrNA== X-Gm-Message-State: AOAM532MDAz7/4Kkd74gxgSYXY1P2gR8UdHv+zg62YFPQPKyDUHI/jNY slfYkvC3QUstPW+/aDuTIGXG6g== X-Received: by 2002:a7b:c8ce:: with SMTP id f14mr1765553wml.113.1618388952091; Wed, 14 Apr 2021 01:29:12 -0700 (PDT) Received: from localhost.localdomain ([2001:1715:4e26:a7e0:116c:c27a:3e7f:5eaf]) by smtp.gmail.com with ESMTPSA id c12sm23850730wro.6.2021.04.14.01.29.11 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 14 Apr 2021 01:29:11 -0700 (PDT) From: Jean-Philippe Brucker To: tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, x86@kernel.org Cc: hpa@zytor.com, linux-kernel@vger.kernel.org, joro@8bytes.org, will@kernel.org, iommu@lists.linux-foundation.org, robin.murphy@arm.com, hch@lst.de, Jean-Philippe Brucker Subject: [PATCH] x86/dma: Tear down DMA ops on driver unbind Date: Wed, 14 Apr 2021 10:26:34 +0200 Message-Id: <20210414082633.877461-1-jean-philippe@linaro.org> X-Mailer: git-send-email 2.31.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Since commit 08a27c1c3ecf ("iommu: Add support to change default domain of an iommu group") a user can switch a device between IOMMU and direct DMA through sysfs. This doesn't work for AMD IOMMU at the moment because dev->dma_ops is not cleared when switching from a DMA to an identity IOMMU domain. The DMA layer thus attempts to use the dma-iommu ops on an identity domain, causing an oops: # echo 0000:00:05.0 > /sys/sys/bus/pci/drivers/e1000e/unbind # echo identity > /sys/bus/pci/devices/0000:00:05.0/iommu_group/type # echo 0000:00:05.0 > /sys/sys/bus/pci/drivers/e1000e/bind ... [ 190.017587] BUG: kernel NULL pointer dereference, address: 0000000000000028 ... [ 190.027375] Call Trace: [ 190.027561] iommu_dma_alloc+0xd0/0x100 [ 190.027840] e1000e_setup_tx_resources+0x56/0x90 [ 190.028173] e1000e_open+0x75/0x5b0 Implement arch_teardown_dma_ops() on x86 to clear the device's dma_ops pointer during driver unbind. Fixes: 08a27c1c3ecf ("iommu: Add support to change default domain of an iommu group") Signed-off-by: Jean-Philippe Brucker --- arch/x86/Kconfig | 1 + arch/x86/kernel/pci-dma.c | 7 +++++++ 2 files changed, 8 insertions(+) diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index 2792879d398e..2c90f8de3e20 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -85,6 +85,7 @@ config X86 select ARCH_HAS_STRICT_MODULE_RWX select ARCH_HAS_SYNC_CORE_BEFORE_USERMODE select ARCH_HAS_SYSCALL_WRAPPER + select ARCH_HAS_TEARDOWN_DMA_OPS if IOMMU_DMA select ARCH_HAS_UBSAN_SANITIZE_ALL select ARCH_HAS_DEBUG_WX select ARCH_HAVE_NMI_SAFE_CMPXCHG diff --git a/arch/x86/kernel/pci-dma.c b/arch/x86/kernel/pci-dma.c index de234e7a8962..60a4ec22d849 100644 --- a/arch/x86/kernel/pci-dma.c +++ b/arch/x86/kernel/pci-dma.c @@ -154,3 +154,10 @@ static void via_no_dac(struct pci_dev *dev) DECLARE_PCI_FIXUP_CLASS_FINAL(PCI_VENDOR_ID_VIA, PCI_ANY_ID, PCI_CLASS_BRIDGE_PCI, 8, via_no_dac); #endif + +#ifdef CONFIG_ARCH_HAS_TEARDOWN_DMA_OPS +void arch_teardown_dma_ops(struct device *dev) +{ + set_dma_ops(dev, NULL); +} +#endif -- 2.31.1