[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v2] xen/arm: fix gnttab_need_iommu_mapping


  • To: Julien Grall <julien@xxxxxxx>
  • From: Rahul Singh <Rahul.Singh@xxxxxxx>
  • Date: Thu, 11 Feb 2021 13:20:18 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wppvBNXAkeePmECt9ThaeEuI+ynslVOSJoZD4o1RTgI=; b=dt/JPG27jBt6jg/V+q3J+UaMYpZCaHRxI6F/RlGxG0SvhHrUjf29Mz9PvyLAH1FnUIJ/InsFVBr6gWQAbhM3ERnhRJUkYSyPUEVJDSRGRv0Rv2wwy9AlREDXd7Fl6xpDVxee1Cqwb+nHcUAN4eVUKNQMNWxZqCvhnwtNTpaAalgUGcaZHuerKY0FZ3qb3ak6bEvBGEUdSK9jJjrN0qT8ZzLVpmZ3g5sXoxuCGtPawJXgYIvas3+Us96bhoq3Z00dhRa6E3YkjMTFlT+AyEZifwHLzANax8yfKBes71pT9BOOssVywS8qbz4EOr90dGMN+3Qeewwi2EolsAQRTkD56g==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=V6XTlC26IjbYFw58bCVZwefnEQ6N73Rh/nLaOYWoPgWuTWqnigGJg5Ijsj+gStCRgXPTfbBe8XO3ZdbtiVHfiEoPgN5JJZUTbkL6SG9cESIb8Hl+oLWvVdaxuVpkisrCe9lJihaYaplvta/aQI5MzHnlPIWYvGX6+tbnpmZaIwHuarEaI7ZNowzxSfYSCxBA9miEvrkj7MMNpisyFblQolalc2LcNSngwgX45BcN4GVbET/mkSYVCvhDBf8wnfQ2UmQrIwc/a65R4hiNzF8mLo5h6HzsJxSeKPqv3H2izj3+0xD7wfOV5KPMD4YfCc/LRCARIDQeOD+rXLutOt77mQ==
  • Authentication-results-original: xen.org; dkim=none (message not signed) header.d=none;xen.org; dmarc=none action=none header.from=arm.com;
  • Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>, "lucmiccio@xxxxxxxxx" <lucmiccio@xxxxxxxxx>, xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Bertrand Marquis <Bertrand.Marquis@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Stefano Stabellini <stefano.stabellini@xxxxxxxxxx>
  • Delivery-date: Thu, 11 Feb 2021 13:20:50 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: xen.org; dkim=none (message not signed) header.d=none;xen.org; dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHW/ks46k4kUfhzpk6LTniK0S/PbqpPzhoAgAB7ugCAATYRAIAAKYkAgAAJgACAABz0AIABJMKA
  • Thread-topic: [PATCH v2] xen/arm: fix gnttab_need_iommu_mapping

Hello Julien,

> On 10 Feb 2021, at 7:52 pm, Julien Grall <julien@xxxxxxx> wrote:
> 
> 
> 
> On 10/02/2021 18:08, Rahul Singh wrote:
>> Hello Julien,
>>> On 10 Feb 2021, at 5:34 pm, Julien Grall <julien@xxxxxxx> wrote:
>>> 
>>> Hi,
>>> 
>>> On 10/02/2021 15:06, Rahul Singh wrote:
>>>>> On 9 Feb 2021, at 8:36 pm, Stefano Stabellini <sstabellini@xxxxxxxxxx> 
>>>>> wrote:
>>>>> 
>>>>> On Tue, 9 Feb 2021, Rahul Singh wrote:
>>>>>>> On 8 Feb 2021, at 6:49 pm, Stefano Stabellini <sstabellini@xxxxxxxxxx> 
>>>>>>> wrote:
>>>>>>> 
>>>>>>> Commit 91d4eca7add broke gnttab_need_iommu_mapping on ARM.
>>>>>>> The offending chunk is:
>>>>>>> 
>>>>>>> #define gnttab_need_iommu_mapping(d)                    \
>>>>>>> -    (is_domain_direct_mapped(d) && need_iommu(d))
>>>>>>> +    (is_domain_direct_mapped(d) && need_iommu_pt_sync(d))
>>>>>>> 
>>>>>>> On ARM we need gnttab_need_iommu_mapping to be true for dom0 when it is
>>>>>>> directly mapped and IOMMU is enabled for the domain, like the old check
>>>>>>> did, but the new check is always false.
>>>>>>> 
>>>>>>> In fact, need_iommu_pt_sync is defined as dom_iommu(d)->need_sync and
>>>>>>> need_sync is set as:
>>>>>>> 
>>>>>>>   if ( !is_hardware_domain(d) || iommu_hwdom_strict )
>>>>>>>       hd->need_sync = !iommu_use_hap_pt(d);
>>>>>>> 
>>>>>>> iommu_use_hap_pt(d) means that the page-table used by the IOMMU is the
>>>>>>> P2M. It is true on ARM. need_sync means that you have a separate IOMMU
>>>>>>> page-table and it needs to be updated for every change. need_sync is set
>>>>>>> to false on ARM. Hence, gnttab_need_iommu_mapping(d) is false too,
>>>>>>> which is wrong.
>>>>>>> 
>>>>>>> As a consequence, when using PV network from a domU on a system where
>>>>>>> IOMMU is on from Dom0, I get:
>>>>>>> 
>>>>>>> (XEN) smmu: /smmu@fd800000: Unhandled context fault: fsr=0x402, 
>>>>>>> iova=0x8424cb148, fsynr=0xb0001, cb=0
>>>>>>> [   68.290307] macb ff0e0000.ethernet eth0: DMA bus error: HRESP not OK
>>>>>>> 
>>>>>>> The fix is to go back to something along the lines of the old
>>>>>>> implementation of gnttab_need_iommu_mapping.
>>>>>>> 
>>>>>>> Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxx>
>>>>>>> Fixes: 91d4eca7add
>>>>>>> Backport: 4.12+
>>>>>>> 
>>>>>>> ---
>>>>>>> 
>>>>>>> Given the severity of the bug, I would like to request this patch to be
>>>>>>> backported to 4.12 too, even if 4.12 is security-fixes only since Oct
>>>>>>> 2020.
>>>>>>> 
>>>>>>> For the 4.12 backport, we can use iommu_enabled() instead of
>>>>>>> is_iommu_enabled() in the implementation of gnttab_need_iommu_mapping.
>>>>>>> 
>>>>>>> Changes in v2:
>>>>>>> - improve commit message
>>>>>>> - add is_iommu_enabled(d) to the check
>>>>>>> ---
>>>>>>> xen/include/asm-arm/grant_table.h | 2 +-
>>>>>>> 1 file changed, 1 insertion(+), 1 deletion(-)
>>>>>>> 
>>>>>>> diff --git a/xen/include/asm-arm/grant_table.h 
>>>>>>> b/xen/include/asm-arm/grant_table.h
>>>>>>> index 6f585b1538..0ce77f9a1c 100644
>>>>>>> --- a/xen/include/asm-arm/grant_table.h
>>>>>>> +++ b/xen/include/asm-arm/grant_table.h
>>>>>>> @@ -89,7 +89,7 @@ int replace_grant_host_mapping(unsigned long gpaddr, 
>>>>>>> mfn_t mfn,
>>>>>>>    (((i) >= nr_status_frames(t)) ? INVALID_GFN : 
>>>>>>> (t)->arch.status_gfn[i])
>>>>>>> 
>>>>>>> #define gnttab_need_iommu_mapping(d)                    \
>>>>>>> -    (is_domain_direct_mapped(d) && need_iommu_pt_sync(d))
>>>>>>> +    (is_domain_direct_mapped(d) && is_iommu_enabled(d))
>>>>>>> 
>>>>>>> #endif /* __ASM_GRANT_TABLE_H__ */
>>>>>> 
>>>>>> I tested the patch and while creating the guest I observed the below 
>>>>>> warning from Linux for block device.
>>>>>> https://elixir.bootlin.com/linux/v4.3/source/drivers/block/xen-blkback/xenbus.c#L258
>>>>> 
>>>>> So you are creating a guest with "xl create" in dom0 and you see the
>>>>> warnings below printed by the Dom0 kernel? I imagine the domU has a
>>>>> virtual "disk" of some sort.
>>>> Yes you are right I am trying to create the guest with "xl create” and 
>>>> before that, I created the logical volume and trying to attach the logical 
>>>> volume
>>>> block to the domain with “xl block-attach”. I observed this error with the 
>>>> "xl block-attach” command.
>>>> This issue occurs after applying this patch as what I observed this patch 
>>>> introduce the calls to iommu_legacy_{, un}map() to map the grant pages for
>>>> IOMMU that touches the page-tables. I am not sure but what I observed is 
>>>> that something is written wrong when iomm_unmap calls unmap the pages
>>>> because of that issue is observed.
>>> 
>>> Can you clarify what you mean by "written wrong"? What sort of error do you 
>>> see in the iommu_unmap()?
>> I might be wrong as per my understanding for ARM we are sharing the P2M 
>> between CPU and IOMMU always and the map_grant_ref() function is written in 
>> such a way that we have to call iommu_legacy_{, un}map() only if P2M is not 
>> shared.
> 
> map_grant_ref() will call the IOMMU if gnttab_need_iommu_mapping() returns 
> true. I don't really see where this is assuming the P2M is not shared.
> 
> In fact, on x86, this will always be false for HVM domain (they support both 
> shared and separate page-tables).
> 
>> As we are sharing the P2M when we call the iommu_map() function it will 
>> overwrite the existing GFN -> MFN ( For DOM0 GFN is same as MFN) entry and 
>> when we call iommu_unmap() it will unmap the  (GFN -> MFN ) entry from the 
>> page-table.
> AFAIK, there should be nothing mapped at that GFN because the page belongs to 
> the guest. At worse, we would overwrite a mapping that is the same.

Sorry I should have mention before backend/frontend is dom0 in this case and 
GFN is mapped. I am trying to attach the block device to DOM0

dd if=/dev/zero of=test.img bs=1024 count=0 seek=1024
xl block-attach 0 phy:test.img xvda w

> 
> Although, I agree that we may end up to remove the entry early and therefore 
> we could get an IOMMU fault (this is not your case here). But that's not an 
> Arm-only problem.
> 
>> Next time when map_grant_ref() tries to map the same frame it will try to 
>> get the corresponding GFN but there will no entry in P2M as iommu_unmap() 
>> already unmapped the GFN because of that this error might be observed.
> I am afraid, I don't understand what you mean by "try to get the 
> corresponding GFN".  Can you give a pointer to the code?

I mean to say to get the GFN from frame "struct grant_entry_v1 { …. .frame } 
http://xenbits.xen.org/gitweb/?p=xen.git;a=blob;f=xen/common/grant_table.c;h=280b7969b6d5821010675182eaf0ea29fc332dd4;hb=HEAD#l1124

> 
>> Sequence of events that results the issue :
>> gnttab_map_grant_ref (GFN=a99fb MFN=a99fb)
> 
> Can you clarify whether the GFN is from the local domain (e.g. dom0/backend) 
> or the remote domain (e.g. the frontend)?

Both backend/frontend in the same domain dom0 .
> 
>> arm_iommu_map_page() DOMID:0 dfn = a99fb mfn = a99fb
>> gnttab_map_grant_ref ( GFN=d9913 MFN=d9913)
>> arm_iommu_map_page() DOMID:0 dfn = d9913 mfn = d9913
>> gnttab_map_grant_ref ( GFN=d9846 MFN=d9846)
>> arm_iommu_map_page() DOMID:0 dfn = d9846 mfn = d9846
>> gnttab_map_grant_ref (GFN=a8474 MFN=a8474)
>> arm_iommu_map_page() DOMID:0 dfn = a8474 mfn = a8474
>> arm_iommu_unmap_page() DOMID:0 dfn = a99fb
>> arm_iommu_unmap_page() DOMID:0 dfn = d9913
>> arm_iommu_unmap_page() DOMID:0 dfn = d9846
>> arm_iommu_unmap_page() DOMID:0 dfn = a8474
>> Try to map the same frame that is unmapped earlier by iommu_unmap call()
>> gnttab_map_grant_ref (GFN=a99fb MFN=0xffffffff).-> Not able to find the GFN 
>> in p2m error is observed after that.
> 
> The iommu_map()/iommu_unmap() should only modify the dom0 P2M. It should not 
> modify the guest P2M.

Yes as in this case backend/frontend in same dom0 that why P2M is modified.
> 
> When Dom0 issue a request to map a grant we will:
>  1) Look-up the guest P2M to find the corresponding MFN
>  2) Do all the sanity check
>  3) Map the page in dom0's P2M at the address requested (host_addr)
>  4) Issue iommu_map() to get a 1:1 mapping in the P2M
> 
> So are you saying that the guest P2M walk has failed?

No. I mean to say GFN is unmapped by iommu_unmap()  earlier and later point of 
time when we get the request to map the same frame that is failed as we will 
not be able to get GFN from frame get_paged_frame() in function map_grant_ref().

Regards,
Rahul
> Cheers,
> 
> -- 
> Julien Grall


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.