Received: by 2002:a25:b323:0:0:0:0:0 with SMTP id l35csp356024ybj; Thu, 19 Sep 2019 15:38:39 -0700 (PDT) X-Google-Smtp-Source: APXvYqziWcYA+Nm/XEPCVVtic+m9OeYumhlYRtIoZx1OndjVhFeSr/ZFaRJukNyM+sAGXTgX8baN X-Received: by 2002:aa7:db12:: with SMTP id t18mr18770400eds.156.1568932719849; Thu, 19 Sep 2019 15:38:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568932719; cv=none; d=google.com; s=arc-20160816; b=w1YxrP9UHN9CWBvwwEvGbHFVnSRTtiaiNA5502ilCqZigtnblcLtEGoLHwUT/PqBSw UGD2XhUxRZM1NyVMkZRTlP8ogHLHODYuW4aRNpKnNfCWvj2/33tZaqfVix8BAC4hDLqT BU4sCrVz3eo5vzjgYqZKhYtO6zWLcI8Jwx+w65CltDRw8+VrRtQavJuAGeN5fBe9RuO2 gS+jSWlvr6mhekv4yO6cJ/ySlbH5jkGBTGZkJLn5ZFDvzaMf663N2zcbbznJbBOSUBGz /EeFa2g4jC6U9izTFoVVX350TpmGWdsPkwBkUcwglA/rsZ6+GTGh8ljeQAa/Sf46sK1s pgzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=cnHGg3Xu3kBgoxNdS2QnbG7vA/+0fR+xPGtNU+LDvXI=; b=RsOMN89MD6T/b16fBDKh3xTwmNtspt4LxULVN7ArQZko2jXyHLpwcTwHmgTZXBy9sA oFt5xtMeTUzbhvvUuKGJNTsWLHSyYgMzpCubxKR24KdLU7WTxT+raZ+dccbsEBZxVm2Z 6b+yrYRPVc67NGMg9i1a3/cp7DAcUDDBOyYFA1KeHgTxpCrsQRKI0C/kAisHHkXp5z5j VduW6x1viNvYy5vhSw5HynCpAhgwBkR1SKy37dD2fZRK0ZClrBCRz5iB5IqexPIOZa1E TbMc2bOKq+OuYkTKJBIUwOGwEkz2B8p0W2DII5wA4e3BDM1z1KO7Pj5LBwIsv7GJADOQ ZLYQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=OzQQ+wxE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p14si108671edc.227.2019.09.19.15.38.17; Thu, 19 Sep 2019 15:38:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=OzQQ+wxE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2406324AbfISW3b (ORCPT + 99 others); Thu, 19 Sep 2019 18:29:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:58870 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2406496AbfISWRi (ORCPT ); Thu, 19 Sep 2019 18:17:38 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7176D20678; Thu, 19 Sep 2019 22:17:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568931457; bh=jiWQb9vIJcyuQQYnH8FA+Q2/8IDnSEMWoxN1zIuW1pQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=OzQQ+wxEuthAyvifT2k9MGaeR4xr+y/b+bR9lIaDFuxEPlcO63zdpTI4+q075tkxS Mn8ts7CJhG5bqpCbbyC65xq7nQYar+R1A+bG6nQCq+05fMlA9g43iy9uYyOcRA+MIv eRTRw75kARO4xvdcjgUEO/l2a47Qj+mlzVNwOju8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Qian Cai , Joerg Roedel , Sasha Levin Subject: [PATCH 4.14 53/59] iommu/amd: Fix race in increase_address_space() Date: Fri, 20 Sep 2019 00:04:08 +0200 Message-Id: <20190919214808.119566137@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190919214755.852282682@linuxfoundation.org> References: <20190919214755.852282682@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Joerg Roedel [ Upstream commit 754265bcab78a9014f0f99cd35e0d610fcd7dfa7 ] After the conversion to lock-less dma-api call the increase_address_space() function can be called without any locking. Multiple CPUs could potentially race for increasing the address space, leading to invalid domain->mode settings and invalid page-tables. This has been happening in the wild under high IO load and memory pressure. Fix the race by locking this operation. The function is called infrequently so that this does not introduce a performance regression in the dma-api path again. Reported-by: Qian Cai Fixes: 256e4621c21a ('iommu/amd: Make use of the generic IOVA allocator') Signed-off-by: Joerg Roedel Signed-off-by: Sasha Levin --- drivers/iommu/amd_iommu.c | 16 +++++++++++----- 1 file changed, 11 insertions(+), 5 deletions(-) diff --git a/drivers/iommu/amd_iommu.c b/drivers/iommu/amd_iommu.c index 822c85226a29f..a1174e61daf4e 100644 --- a/drivers/iommu/amd_iommu.c +++ b/drivers/iommu/amd_iommu.c @@ -1337,18 +1337,21 @@ static void domain_flush_devices(struct protection_domain *domain) * another level increases the size of the address space by 9 bits to a size up * to 64 bits. */ -static bool increase_address_space(struct protection_domain *domain, +static void increase_address_space(struct protection_domain *domain, gfp_t gfp) { + unsigned long flags; u64 *pte; - if (domain->mode == PAGE_MODE_6_LEVEL) + spin_lock_irqsave(&domain->lock, flags); + + if (WARN_ON_ONCE(domain->mode == PAGE_MODE_6_LEVEL)) /* address space already 64 bit large */ - return false; + goto out; pte = (void *)get_zeroed_page(gfp); if (!pte) - return false; + goto out; *pte = PM_LEVEL_PDE(domain->mode, iommu_virt_to_phys(domain->pt_root)); @@ -1356,7 +1359,10 @@ static bool increase_address_space(struct protection_domain *domain, domain->mode += 1; domain->updated = true; - return true; +out: + spin_unlock_irqrestore(&domain->lock, flags); + + return; } static u64 *alloc_pte(struct protection_domain *domain, -- 2.20.1