[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240916113102.710522-14-jgowans@amazon.com>
Date: Mon, 16 Sep 2024 13:31:02 +0200
From: James Gowans <jgowans@...zon.com>
To: <linux-kernel@...r.kernel.org>
CC: Jason Gunthorpe <jgg@...pe.ca>, Kevin Tian <kevin.tian@...el.com>, "Joerg
Roedel" <joro@...tes.org>, Krzysztof WilczyĆski
<kw@...ux.com>, Will Deacon <will@...nel.org>, Robin Murphy
<robin.murphy@....com>, Mike Rapoport <rppt@...nel.org>, "Madhavan T.
Venkataraman" <madvenka@...ux.microsoft.com>, <iommu@...ts.linux.dev>, "Sean
Christopherson" <seanjc@...gle.com>, Paolo Bonzini <pbonzini@...hat.com>,
<kvm@...r.kernel.org>, David Woodhouse <dwmw2@...radead.org>, Lu Baolu
<baolu.lu@...ux.intel.com>, Alexander Graf <graf@...zon.de>,
<anthony.yznaga@...cle.com>, <steven.sistare@...cle.com>,
<nh-open-source@...zon.com>, "Saenz Julienne, Nicolas" <nsaenz@...zon.es>
Subject: [RFC PATCH 13/13] iommufd, guestmemfs: Pin files when mapped for persistent DMA
Ordinarily after kexec the new kernel would have no idea that some files
are still actually in use as DMA targets, this could allow the files to
be deleted while still actually in use behind the scenes. This would
allow use-after-frees of the persistent memory.
To prevent this, add the ability to do long term (across kexec) pinning
of files in guestmemfs. Iommufd is updated to use this when mapping a
file into a persistent domain. As long as the file has pins it cannot be
deleted.
A hand-wavy alternative would be to use something like the iommufd's
storage domain and actually do this at the PFN level.
---
drivers/iommu/iommufd/ioas.c | 4 ++++
drivers/iommu/iommufd/iommufd_private.h | 5 +++++
drivers/iommu/iommufd/serialise.c | 9 ++++++++-
fs/guestmemfs/file.c | 20 ++++++++++++++++++++
fs/guestmemfs/guestmemfs.h | 1 +
fs/guestmemfs/inode.c | 4 ++++
include/linux/guestmemfs.h | 8 ++++++++
7 files changed, 50 insertions(+), 1 deletion(-)
diff --git a/drivers/iommu/iommufd/ioas.c b/drivers/iommu/iommufd/ioas.c
index ce76b41d2d72..8b7fa3d17e8a 100644
--- a/drivers/iommu/iommufd/ioas.c
+++ b/drivers/iommu/iommufd/ioas.c
@@ -233,6 +233,7 @@ int iommufd_ioas_map(struct iommufd_ucmd *ucmd)
mmap_read_unlock(mm);
return -EFAULT;
}
+ ioas->pinned_file_handle = guestmemfs_pin_file(vma->vm_file);
mmap_read_unlock(mm);
#else
return -EFAULT;
@@ -331,6 +332,9 @@ int iommufd_ioas_unmap(struct iommufd_ucmd *ucmd)
&unmapped);
if (rc)
goto out_put;
+
+ if (ioas->pinned_file_handle)
+ guestmemfs_unpin_file(ioas->pinned_file_handle);
}
cmd->length = unmapped;
diff --git a/drivers/iommu/iommufd/iommufd_private.h b/drivers/iommu/iommufd/iommufd_private.h
index 94612cec2814..597a54a1adf3 100644
--- a/drivers/iommu/iommufd/iommufd_private.h
+++ b/drivers/iommu/iommufd/iommufd_private.h
@@ -260,12 +260,17 @@ struct iommufd_object *_iommufd_object_alloc(struct iommufd_ctx *ictx,
* An iommu_domain & iommfd_hw_pagetable will be automatically selected
* for a device based on the hwpt_list. If no suitable iommu_domain
* is found a new iommu_domain will be created.
+ *
+ * If this IOAS is pinning a file for persistent DMA, pinned_file_handle will
+ * be set to a non-zero value. When unmapping this IOAS the file will be
+ * unpinned.
*/
struct iommufd_ioas {
struct iommufd_object obj;
struct io_pagetable iopt;
struct mutex mutex;
struct list_head hwpt_list;
+ unsigned long pinned_file_handle;
};
static inline struct iommufd_ioas *iommufd_get_ioas(struct iommufd_ctx *ictx,
diff --git a/drivers/iommu/iommufd/serialise.c b/drivers/iommu/iommufd/serialise.c
index baac7d6150cb..d95e150c3dd9 100644
--- a/drivers/iommu/iommufd/serialise.c
+++ b/drivers/iommu/iommufd/serialise.c
@@ -16,6 +16,7 @@
* account_mode = u8
* ioases = [
* {
+ * pinned_file_handle = u64
* areas = [
* ]
* }
@@ -48,6 +49,9 @@ static int serialise_iommufd(void *fdt, struct iommufd_ctx *ictx)
snprintf(name, sizeof(name), "%lu", obj_idx);
err |= fdt_begin_node(fdt, name);
+ err |= fdt_property(fdt, "pinned-file-handle",
+ &ioas->pinned_file_handle, sizeof(ioas->pinned_file_handle));
+
for (area = iopt_area_iter_first(&ioas->iopt, 0, ULONG_MAX); area;
area = iopt_area_iter_next(area, 0, ULONG_MAX)) {
unsigned long iova_start, iova_len;
@@ -119,15 +123,18 @@ static int rehydrate_iommufd(char *iommufd_name)
snprintf(kho_path, sizeof(kho_path), "/iommufd/iommufds/%s/ioases", iommufd_name);
fdt_for_each_subnode(off, fdt, fdt_path_offset(fdt, kho_path)) {
struct iommufd_ioas *ioas;
+ int len;
int range_off;
+ const unsigned long *pinned_file_handle;
ioas = iommufd_ioas_alloc(ictx);
+ pinned_file_handle = fdt_getprop(fdt, off, "pinned-file-handle", &len);
+ ioas->pinned_file_handle = *pinned_file_handle;
iommufd_object_finalize(ictx, &ioas->obj);
fdt_for_each_subnode(range_off, fdt, off) {
const unsigned long *iova_start, *iova_len;
const int *iommu_prot;
- int len;
struct iopt_area *area = iopt_area_alloc();
iova_start = fdt_getprop(fdt, range_off, "iova-start", &len);
diff --git a/fs/guestmemfs/file.c b/fs/guestmemfs/file.c
index ecacaf200a31..d7840831df03 100644
--- a/fs/guestmemfs/file.c
+++ b/fs/guestmemfs/file.c
@@ -109,3 +109,23 @@ bool is_guestmemfs_file(struct file const *file)
{
return file && file->f_op == &guestmemfs_file_fops;
}
+
+unsigned long guestmemfs_pin_file(struct file *file)
+{
+ struct guestmemfs_inode *inode =
+ guestmemfs_get_persisted_inode(file->f_inode->i_sb,
+ file->f_inode->i_ino);
+
+ atomic_inc(&inode->long_term_pins);
+ return file->f_inode->i_ino;
+}
+
+void guestmemfs_unpin_file(unsigned long pin_handle)
+{
+ struct guestmemfs_inode *inode =
+ guestmemfs_get_persisted_inode(guestmemfs_sb, pin_handle);
+ int new;
+
+ new = atomic_dec_return(&inode->long_term_pins);
+ WARN_ON(new < 0);
+}
diff --git a/fs/guestmemfs/guestmemfs.h b/fs/guestmemfs/guestmemfs.h
index 91cc06ae45a5..d107ad0e3323 100644
--- a/fs/guestmemfs/guestmemfs.h
+++ b/fs/guestmemfs/guestmemfs.h
@@ -42,6 +42,7 @@ struct guestmemfs_inode {
char filename[GUESTMEMFS_FILENAME_LEN];
void *mappings;
int num_mappings;
+ atomic_t long_term_pins;
};
void guestmemfs_initialise_inode_store(struct super_block *sb);
diff --git a/fs/guestmemfs/inode.c b/fs/guestmemfs/inode.c
index d521b35d4992..6bc0abbde8d1 100644
--- a/fs/guestmemfs/inode.c
+++ b/fs/guestmemfs/inode.c
@@ -151,6 +151,10 @@ static int guestmemfs_unlink(struct inode *dir, struct dentry *dentry)
ino = guestmemfs_get_persisted_inode(dir->i_sb, dir->i_ino)->child_ino;
+ inode = guestmemfs_get_persisted_inode(dir->i_sb, dentry->d_inode->i_ino);
+ if (atomic_read(&inode->long_term_pins))
+ return -EBUSY;
+
/* Special case for first file in dir */
if (ino == dentry->d_inode->i_ino) {
guestmemfs_get_persisted_inode(dir->i_sb, dir->i_ino)->child_ino =
diff --git a/include/linux/guestmemfs.h b/include/linux/guestmemfs.h
index c5cd7b6a5630..c2018b4f38fd 100644
--- a/include/linux/guestmemfs.h
+++ b/include/linux/guestmemfs.h
@@ -20,4 +20,12 @@ inline bool is_guestmemfs_file(struct file const *filp)
}
#endif
+/*
+ * Ensure that the file cannot be deleted or have its memory changed
+ * until it is unpinned. The returned value is a handle which can be
+ * used to un-pin the file.
+ */
+unsigned long guestmemfs_pin_file(struct file *file);
+void guestmemfs_unpin_file(unsigned long pin_handle);
+
#endif
--
2.34.1
Powered by blists - more mailing lists