From mboxrd@z Thu Jan 1 00:00:00 1970 From: Jacob Pan Subject: Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling Date: Mon, 6 Nov 2017 10:47:09 -0800 Message-ID: <20171106104709.06b38f7c@jacob-builder> References: <644c3e01654f8bd48d669c36e424959d6ef0e27e.1506607370.git.robin.murphy@arm.com> <1507035334.29211.105.camel@infradead.org> <20171006144309.GA30803@8bytes.org> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Cc: leedom-ut6Up61K2wZBDgjK7y7TUQ@public.gmane.org, herbert-lOAM2aK0SrRLBo1qDEOMRrpzq4S04n8Q@public.gmane.org, David Woodhouse , linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org, linux-crypto-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, Harsh-ut6Up61K2wZBDgjK7y7TUQ@public.gmane.org To: Joerg Roedel Return-path: In-Reply-To: <20171006144309.GA30803-zLv9SwRftAIdnm+yROfE0A@public.gmane.org> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: iommu-bounces-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org Errors-To: iommu-bounces-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org List-Id: linux-crypto.vger.kernel.org On Fri, 6 Oct 2017 16:43:09 +0200 Joerg Roedel wrote: > On Tue, Oct 03, 2017 at 07:05:17PM +0100, Robin Murphy wrote: > > Now, there are indeed plenty of drivers and subsystems which do > > work on lists of explicitly single pages - anything doing some > > variant of "addr = kmap_atomic(sg_page(sg)) + sg->offset;" is easy > > to spot - but I don't think DMA API implementations are in a > > position to make any kind of assumption; nearly all of them just > > shut up and handle sg->length bytes from sg_phys(sg) without > > questioning the caller, and I reckon that's exactly what they > > should be doing. > > I agree with that, it is not explicitly forbidden to have an > sg->offset > PAGE_SIZE and most IOMMU drivers handle this case. > > So this is a problem I'd like to see resolved in the VT-d driver too. > If nobody comes up with a correct fix soon I'll apply this one and > rip out the large-page support from __domain_mapping() to make it > work. > Hi All, Just to give an update on the offline debugging of this issue. With Robin's patch applied, I was able to reproduce the failure with similar configuration that Jain helped to set up. I added trace prints just to see the map/unmap activities leading to the DMAR fault. When fault occurs, the trace shows there is an unmap to the offending iova pfn. So I think this is a separate problem than Robin's patch is fixing. I think we should move forward to merge this patch upstream and stable. The remaining problem is likely a race condition between unmap and DMA activities. Here a brief extracted log, ee3d7 is the iova pfn in question. #1. map sg pfn ee3d7 -0 [076] 74124.154254: bprint: __domain_mapping: vpfn:ee3d7, pgoff=2126, np:1, da:ee3d784e, len:1464 , ppfn:1849c9c #2. unmap ee3d7000 -0 [054] 74124.154301: bprint: intel_unmap: Device 0000:18:00.4 unmapping: pfn ee3d7-ee3d7 -0 [076] 74124.154301: bprint: __domain_mapping: lvlpg:1, nrpg 0, vpfn:ec2ff, ppfn:183221a, sg_res:0 -0 [059] 74124.154302: bprint: __domain_mapping: lvlpg:1, nrpg 0, vpfn:ee719, ppfn:c3e4dd, sg_res:0 -0 [076] 74124.154302: bprint: __domain_mapping: vpfn:f183b, pgoff=78, np:1, da:f183b04e, len:1464, #3. DMA to unmapped address ee3d7000, DMAR fault raised. +2.952861] dmar_fault: 6 callbacks suppressed +0.000002] DMAR: DRHD: handling fault status reg 2 +0.005588] turning tracing off +0.003592] DMAR: [DMA Write] Request device [18:00.4] fault addr ee3d7000 [fault reason 05] PTE Write access is not set -0 [000] 74124.156906: bputs: 0xffffffffb259916bs: turning tracing off Thanks, Jacob > Speaking of __domain_mapping(), this function is a big unmaintainable > mess which should be split and rewritten. A clean and maintainable > rewrite can alse re-add the large-page support. > > > Regards, > > Joerg > > _______________________________________________ > iommu mailing list > iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org > https://lists.linuxfoundation.org/mailman/listinfo/iommu [Jacob Pan] From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754663AbdKFSqR (ORCPT ); Mon, 6 Nov 2017 13:46:17 -0500 Received: from mga03.intel.com ([134.134.136.65]:55815 "EHLO mga03.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753867AbdKFSqQ (ORCPT ); Mon, 6 Nov 2017 13:46:16 -0500 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.44,353,1505804400"; d="scan'208";a="146583106" Date: Mon, 6 Nov 2017 10:47:09 -0800 From: Jacob Pan To: Joerg Roedel Cc: Robin Murphy , leedom@chelsio.com, herbert@gondor.apana.org.au, linux-kernel@vger.kernel.org, iommu@lists.linux-foundation.org, linux-crypto@vger.kernel.org, David Woodhouse , Harsh@chelsio.com, jacob.jun.pan@linux.intel.com, Alex Williamson Subject: Re: [PATCH] iommu/vt-d: Fix scatterlist offset handling Message-ID: <20171106104709.06b38f7c@jacob-builder> In-Reply-To: <20171006144309.GA30803@8bytes.org> References: <644c3e01654f8bd48d669c36e424959d6ef0e27e.1506607370.git.robin.murphy@arm.com> <1507035334.29211.105.camel@infradead.org> <20171006144309.GA30803@8bytes.org> Organization: OTC X-Mailer: Claws Mail 3.13.2 (GTK+ 2.24.30; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 6 Oct 2017 16:43:09 +0200 Joerg Roedel wrote: > On Tue, Oct 03, 2017 at 07:05:17PM +0100, Robin Murphy wrote: > > Now, there are indeed plenty of drivers and subsystems which do > > work on lists of explicitly single pages - anything doing some > > variant of "addr = kmap_atomic(sg_page(sg)) + sg->offset;" is easy > > to spot - but I don't think DMA API implementations are in a > > position to make any kind of assumption; nearly all of them just > > shut up and handle sg->length bytes from sg_phys(sg) without > > questioning the caller, and I reckon that's exactly what they > > should be doing. > > I agree with that, it is not explicitly forbidden to have an > sg->offset > PAGE_SIZE and most IOMMU drivers handle this case. > > So this is a problem I'd like to see resolved in the VT-d driver too. > If nobody comes up with a correct fix soon I'll apply this one and > rip out the large-page support from __domain_mapping() to make it > work. > Hi All, Just to give an update on the offline debugging of this issue. With Robin's patch applied, I was able to reproduce the failure with similar configuration that Jain helped to set up. I added trace prints just to see the map/unmap activities leading to the DMAR fault. When fault occurs, the trace shows there is an unmap to the offending iova pfn. So I think this is a separate problem than Robin's patch is fixing. I think we should move forward to merge this patch upstream and stable. The remaining problem is likely a race condition between unmap and DMA activities. Here a brief extracted log, ee3d7 is the iova pfn in question. #1. map sg pfn ee3d7 -0 [076] 74124.154254: bprint: __domain_mapping: vpfn:ee3d7, pgoff=2126, np:1, da:ee3d784e, len:1464 , ppfn:1849c9c #2. unmap ee3d7000 -0 [054] 74124.154301: bprint: intel_unmap: Device 0000:18:00.4 unmapping: pfn ee3d7-ee3d7 -0 [076] 74124.154301: bprint: __domain_mapping: lvlpg:1, nrpg 0, vpfn:ec2ff, ppfn:183221a, sg_res:0 -0 [059] 74124.154302: bprint: __domain_mapping: lvlpg:1, nrpg 0, vpfn:ee719, ppfn:c3e4dd, sg_res:0 -0 [076] 74124.154302: bprint: __domain_mapping: vpfn:f183b, pgoff=78, np:1, da:f183b04e, len:1464, #3. DMA to unmapped address ee3d7000, DMAR fault raised. +2.952861] dmar_fault: 6 callbacks suppressed +0.000002] DMAR: DRHD: handling fault status reg 2 +0.005588] turning tracing off +0.003592] DMAR: [DMA Write] Request device [18:00.4] fault addr ee3d7000 [fault reason 05] PTE Write access is not set -0 [000] 74124.156906: bputs: 0xffffffffb259916bs: turning tracing off Thanks, Jacob > Speaking of __domain_mapping(), this function is a big unmaintainable > mess which should be split and rewritten. A clean and maintainable > rewrite can alse re-add the large-page support. > > > Regards, > > Joerg > > _______________________________________________ > iommu mailing list > iommu@lists.linux-foundation.org > https://lists.linuxfoundation.org/mailman/listinfo/iommu [Jacob Pan]