Expand the VFIO DMABUF revocation state to three states:
Not revoked, temporarily revoked, and permanently revoked.

The first two are for existing transient revocation, e.g. across a
function reset, and the DMABUF is put into the last in response to a
new ioctl(VFIO_DEVICE_PCI_DMABUF_REVOKE) request.

This VFIO device fd ioctl passes a DMABUF by fd and requests that the
DMABUF is permanently revoked.  On success, it's guaranteed that the
buffer can never be imported/attached/mmap()ed in future, that dynamic
imports have been cleanly detached, and all mappings made
inaccessible/PTEs zapped.

This is useful for lifecycle management, to reclaim VFIO PCI BAR
ranges previously delegated to a subordinate client process: The
driver process can ensure that the loaned resources are revoked when
the client is deemed "done", and exported ranges can be safely re-used
elsewhere.

Signed-off-by: Matt Evans <[email protected]>
---
 drivers/vfio/pci/vfio_pci_core.c   |  16 +++-
 drivers/vfio/pci/vfio_pci_dmabuf.c | 136 ++++++++++++++++++++---------
 drivers/vfio/pci/vfio_pci_priv.h   |  14 ++-
 include/uapi/linux/vfio.h          |  30 +++++++
 4 files changed, 154 insertions(+), 42 deletions(-)

diff --git a/drivers/vfio/pci/vfio_pci_core.c b/drivers/vfio/pci/vfio_pci_core.c
index 4f411a0b980c..c7760dd3a5f0 100644
--- a/drivers/vfio/pci/vfio_pci_core.c
+++ b/drivers/vfio/pci/vfio_pci_core.c
@@ -1461,6 +1461,18 @@ static int vfio_pci_ioctl_ioeventfd(struct 
vfio_pci_core_device *vdev,
                                  ioeventfd.fd);
 }
 
+static int vfio_pci_ioctl_dmabuf_revoke(struct vfio_pci_core_device *vdev,
+                                       struct vfio_device_ioeventfd __user 
*arg)
+{
+       unsigned long minsz = offsetofend(struct vfio_pci_dmabuf_revoke, 
dmabuf_fd);
+       struct vfio_pci_dmabuf_revoke revoke;
+
+       if (copy_from_user(&revoke, arg, minsz))
+               return -EFAULT;
+
+       return vfio_pci_dma_buf_revoke(vdev, revoke.dmabuf_fd);
+}
+
 long vfio_pci_core_ioctl(struct vfio_device *core_vdev, unsigned int cmd,
                         unsigned long arg)
 {
@@ -1483,6 +1495,8 @@ long vfio_pci_core_ioctl(struct vfio_device *core_vdev, 
unsigned int cmd,
                return vfio_pci_ioctl_reset(vdev, uarg);
        case VFIO_DEVICE_SET_IRQS:
                return vfio_pci_ioctl_set_irqs(vdev, uarg);
+       case VFIO_DEVICE_PCI_DMABUF_REVOKE:
+               return vfio_pci_ioctl_dmabuf_revoke(vdev, uarg);
        default:
                return -ENOTTY;
        }
@@ -1690,7 +1704,7 @@ static vm_fault_t vfio_pci_mmap_huge_fault(struct 
vm_fault *vmf,
                         * change occurs whilst holding memory_lock,
                         * so protects against racing faults.
                         */
-                       if (priv->revoked)
+                       if (priv->status != VFIO_PCI_DMABUF_OK)
                                ret = VM_FAULT_SIGBUS;
                        else
                                ret = vfio_pci_vmf_insert_pfn(vdev, vmf, pfn, 
order);
diff --git a/drivers/vfio/pci/vfio_pci_dmabuf.c 
b/drivers/vfio/pci/vfio_pci_dmabuf.c
index ab665db66904..362207cf7e71 100644
--- a/drivers/vfio/pci/vfio_pci_dmabuf.c
+++ b/drivers/vfio/pci/vfio_pci_dmabuf.c
@@ -18,7 +18,7 @@ static int vfio_pci_dma_buf_attach(struct dma_buf *dmabuf,
        if (!attachment->peer2peer)
                return -EOPNOTSUPP;
 
-       if (priv->revoked)
+       if (priv->status != VFIO_PCI_DMABUF_OK)
                return -ENODEV;
 
        if (!dma_buf_attach_revocable(attachment))
@@ -32,7 +32,7 @@ static int vfio_pci_dma_buf_mmap(struct dma_buf *dmabuf, 
struct vm_area_struct *
        struct vfio_pci_dma_buf *priv = dmabuf->priv;
        u64 req_len, req_start;
 
-       if (priv->revoked)
+       if (priv->status != VFIO_PCI_DMABUF_OK)
                return -ENODEV;
        if ((vma->vm_flags & VM_SHARED) == 0)
                return -EINVAL;
@@ -72,7 +72,7 @@ vfio_pci_dma_buf_map(struct dma_buf_attachment *attachment,
 
        dma_resv_assert_held(priv->dmabuf->resv);
 
-       if (priv->revoked)
+       if (priv->status != VFIO_PCI_DMABUF_OK)
                return ERR_PTR(-ENODEV);
 
        ret = dma_buf_phys_vec_to_sgt(attachment, priv->provider,
@@ -243,7 +243,8 @@ static int vfio_pci_dmabuf_export(struct 
vfio_pci_core_device *vdev,
        INIT_LIST_HEAD(&priv->dmabufs_elm);
        down_write(&vdev->memory_lock);
        dma_resv_lock(priv->dmabuf->resv, NULL);
-       priv->revoked = !status_ok;
+       priv->status = status_ok ? VFIO_PCI_DMABUF_OK :
+               VFIO_PCI_DMABUF_TEMP_REVOKED;
        list_add_tail(&priv->dmabufs_elm, &vdev->dmabufs);
        dma_resv_unlock(priv->dmabuf->resv);
        up_write(&vdev->memory_lock);
@@ -274,7 +275,7 @@ int vfio_pci_dma_buf_iommufd_map(struct dma_buf_attachment 
*attachment,
                return -EOPNOTSUPP;
 
        priv = attachment->dmabuf->priv;
-       if (priv->revoked)
+       if (priv->status != VFIO_PCI_DMABUF_OK)
                return -ENODEV;
 
        /* More than one range to iommufd will require proper DMABUF support */
@@ -518,6 +519,48 @@ int vfio_pci_core_mmap_prep_dmabuf(struct 
vfio_pci_core_device *vdev,
        return ret;
 }
 
+static void __vfio_pci_dma_buf_revoke(struct vfio_pci_dma_buf *priv, bool 
revoked,
+                                     bool permanently)
+{
+       if ((priv->status == VFIO_PCI_DMABUF_PERM_REVOKED) ||
+           (priv->status == VFIO_PCI_DMABUF_OK && !revoked) ||
+           (priv->status == VFIO_PCI_DMABUF_TEMP_REVOKED && revoked && 
!permanently)) {
+               return;
+       }
+
+       dma_resv_lock(priv->dmabuf->resv, NULL);
+       if (revoked)
+               priv->status = permanently ?
+                       VFIO_PCI_DMABUF_PERM_REVOKED : 
VFIO_PCI_DMABUF_TEMP_REVOKED;
+       dma_buf_invalidate_mappings(priv->dmabuf);
+       dma_resv_wait_timeout(priv->dmabuf->resv,
+                             DMA_RESV_USAGE_BOOKKEEP, false,
+                             MAX_SCHEDULE_TIMEOUT);
+       dma_resv_unlock(priv->dmabuf->resv);
+       if (revoked) {
+               kref_put(&priv->kref, vfio_pci_dma_buf_done);
+               wait_for_completion(&priv->comp);
+               unmap_mapping_range(priv->dmabuf->file->f_mapping,
+                                   0, priv->size, 1);
+       } else {
+               /*
+                * Kref is initialize again, because when revoke
+                * was performed the reference counter was decreased
+                * to zero to trigger completion.
+                */
+               kref_init(&priv->kref);
+               /*
+                * There is no need to wait as no mapping was
+                * performed when the previous status was
+                * priv->status == *REVOKED.
+                */
+               reinit_completion(&priv->comp);
+               dma_resv_lock(priv->dmabuf->resv, NULL);
+               priv->status = VFIO_PCI_DMABUF_OK;
+               dma_resv_unlock(priv->dmabuf->resv);
+       }
+}
+
 void vfio_pci_dma_buf_move(struct vfio_pci_core_device *vdev, bool revoked)
 {
        struct vfio_pci_dma_buf *priv;
@@ -526,45 +569,13 @@ void vfio_pci_dma_buf_move(struct vfio_pci_core_device 
*vdev, bool revoked)
        lockdep_assert_held_write(&vdev->memory_lock);
        /*
         * Holding memory_lock ensures a racing VMA fault observes
-        * priv->revoked properly.
+        * priv->status properly.
         */
 
        list_for_each_entry_safe(priv, tmp, &vdev->dmabufs, dmabufs_elm) {
                if (!get_file_active(&priv->dmabuf->file))
                        continue;
-
-               if (priv->revoked != revoked) {
-                       dma_resv_lock(priv->dmabuf->resv, NULL);
-                       if (revoked)
-                               priv->revoked = true;
-                       dma_buf_invalidate_mappings(priv->dmabuf);
-                       dma_resv_wait_timeout(priv->dmabuf->resv,
-                                             DMA_RESV_USAGE_BOOKKEEP, false,
-                                             MAX_SCHEDULE_TIMEOUT);
-                       dma_resv_unlock(priv->dmabuf->resv);
-                       if (revoked) {
-                               kref_put(&priv->kref, vfio_pci_dma_buf_done);
-                               wait_for_completion(&priv->comp);
-                               
unmap_mapping_range(priv->dmabuf->file->f_mapping,
-                                                   0, priv->size, 1);
-                       } else {
-                               /*
-                                * Kref is initialize again, because when revoke
-                                * was performed the reference counter was 
decreased
-                                * to zero to trigger completion.
-                                */
-                               kref_init(&priv->kref);
-                               /*
-                                * There is no need to wait as no mapping was
-                                * performed when the previous status was
-                                * priv->revoked == true.
-                                */
-                               reinit_completion(&priv->comp);
-                               dma_resv_lock(priv->dmabuf->resv, NULL);
-                               priv->revoked = false;
-                               dma_resv_unlock(priv->dmabuf->resv);
-                       }
-               }
+               __vfio_pci_dma_buf_revoke(priv, revoked, false);
                fput(priv->dmabuf->file);
        }
 }
@@ -582,7 +593,7 @@ void vfio_pci_dma_buf_cleanup(struct vfio_pci_core_device 
*vdev)
                dma_resv_lock(priv->dmabuf->resv, NULL);
                list_del_init(&priv->dmabufs_elm);
                priv->vdev = NULL;
-               priv->revoked = true;
+               priv->status = VFIO_PCI_DMABUF_PERM_REVOKED;
                dma_buf_invalidate_mappings(priv->dmabuf);
                dma_resv_wait_timeout(priv->dmabuf->resv,
                                      DMA_RESV_USAGE_BOOKKEEP, false,
@@ -597,3 +608,48 @@ void vfio_pci_dma_buf_cleanup(struct vfio_pci_core_device 
*vdev)
        }
        up_write(&vdev->memory_lock);
 }
+
+#ifdef CONFIG_VFIO_PCI_DMABUF
+int vfio_pci_dma_buf_revoke(struct vfio_pci_core_device *vdev, int dmabuf_fd)
+{
+       struct vfio_pci_core_device *db_vdev;
+       struct dma_buf *dmabuf;
+       struct vfio_pci_dma_buf *priv;
+       int ret = 0;
+
+       dmabuf = dma_buf_get(dmabuf_fd);
+       if (IS_ERR(dmabuf))
+               return PTR_ERR(dmabuf);
+
+       /*
+        * The DMABUF is a user-provided fd, so sanity-check it's
+        * really a vfio_pci_dma_buf _and_ relates to the VFIO device
+        * that it was provided for:
+        */
+       if (dmabuf->ops != &vfio_pci_dmabuf_ops) {
+               ret = -ENODEV;
+               goto out_put_buf;
+       }
+
+       priv = dmabuf->priv;
+       db_vdev = READ_ONCE(priv->vdev);
+
+       if (!db_vdev || db_vdev != vdev) {
+               ret = -ENODEV;
+               goto out_put_buf;
+       }
+
+       scoped_guard(rwsem_read, &vdev->memory_lock) {
+               if (priv->status == VFIO_PCI_DMABUF_PERM_REVOKED) {
+                       ret = -EBADFD;
+                       break;
+               }
+               __vfio_pci_dma_buf_revoke(priv, true, true);
+       }
+
+ out_put_buf:
+       dma_buf_put(dmabuf);
+
+       return ret;
+}
+#endif /* CONFIG_VFIO_PCI_DMABUF */
diff --git a/drivers/vfio/pci/vfio_pci_priv.h b/drivers/vfio/pci/vfio_pci_priv.h
index b16a8d22563c..c5a9e06bf81a 100644
--- a/drivers/vfio/pci/vfio_pci_priv.h
+++ b/drivers/vfio/pci/vfio_pci_priv.h
@@ -23,6 +23,12 @@ struct vfio_pci_ioeventfd {
        bool                    test_mem;
 };
 
+enum vfio_pci_dma_buf_status {
+       VFIO_PCI_DMABUF_OK = 0,
+       VFIO_PCI_DMABUF_TEMP_REVOKED = 1,
+       VFIO_PCI_DMABUF_PERM_REVOKED = 2,
+};
+
 struct vfio_pci_dma_buf {
        struct dma_buf *dmabuf;
        struct vfio_pci_core_device *vdev;
@@ -34,7 +40,7 @@ struct vfio_pci_dma_buf {
        u32 nr_ranges;
        struct kref kref;
        struct completion comp;
-       u8 revoked : 1;
+       enum vfio_pci_dma_buf_status status;
 };
 
 extern const struct vm_operations_struct vfio_pci_mmap_ops;
@@ -140,6 +146,7 @@ void vfio_pci_dma_buf_move(struct vfio_pci_core_device 
*vdev, bool revoked);
 int vfio_pci_core_feature_dma_buf(struct vfio_pci_core_device *vdev, u32 flags,
                                  struct vfio_device_feature_dma_buf __user 
*arg,
                                  size_t argsz);
+int vfio_pci_dma_buf_revoke(struct vfio_pci_core_device *vdev, int dmabuf_fd);
 #else
 static inline int
 vfio_pci_core_feature_dma_buf(struct vfio_pci_core_device *vdev, u32 flags,
@@ -148,6 +155,11 @@ vfio_pci_core_feature_dma_buf(struct vfio_pci_core_device 
*vdev, u32 flags,
 {
        return -ENOTTY;
 }
+static inline int vfio_pci_dma_buf_revoke(struct vfio_pci_core_device *vdev,
+                                         int dmabuf_fd)
+{
+       return -ENODEV;
+}
 #endif
 
 #endif
diff --git a/include/uapi/linux/vfio.h b/include/uapi/linux/vfio.h
index bb7b89330d35..c1b3fa880aa1 100644
--- a/include/uapi/linux/vfio.h
+++ b/include/uapi/linux/vfio.h
@@ -1307,6 +1307,36 @@ struct vfio_precopy_info {
 
 #define VFIO_MIG_GET_PRECOPY_INFO _IO(VFIO_TYPE, VFIO_BASE + 21)
 
+/**
+ * VFIO_DEVICE_PCI_DMABUF_REVOKE - _IO(VFIO_TYPE, VFIO_BASE + 22)
+ *
+ * This ioctl is used on the device FD, and requests that access to
+ * the buffer corresponding to the DMABUF FD parameter is immediately
+ * and permanently revoked.  On successful return, the buffer is not
+ * accessible through any mmap() or dma-buf import.  The request fails
+ * if the buffer is pinned; otherwise, the exporter marks the buffer
+ * as inaccessible and uses the move_notify callback to inform
+ * importers of the change.  The buffer is permanently disabled, and
+ * VFIO refuses all map, mmap, attach, etc. requests.
+ *
+ * Returns:
+ *
+ * Return: 0 on success, -1 and errno set on failure:
+ *
+ *  ENODEV if the associated dmabuf FD no longer exists/is closed,
+ *         or is not a DMABUF created for this device.
+ *  EINVAL if the dmabuf_fd parameter isn't a DMABUF.
+ *  EBADF if the dmabuf_fd parameter isn't a valid file number.
+ *  EBADFD if the buffer has already been revoked.
+ *
+ */
+struct vfio_pci_dmabuf_revoke {
+       __u32 argsz;
+       __u32 dmabuf_fd;
+};
+
+#define VFIO_DEVICE_PCI_DMABUF_REVOKE _IO(VFIO_TYPE, VFIO_BASE + 22)
+
 /*
  * Upon VFIO_DEVICE_FEATURE_SET, allow the device to be moved into a low power
  * state with the platform-based power management.  Device use of lower power
-- 
2.47.3

Reply via email to