Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp3088428ybt; Mon, 29 Jun 2020 15:03:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx/B3gLtwyOch2/woRJT58pCz9t0kuG9DpwSdoJuT187+sFzHlRZBey+n9mgZa0hKSpAu1D X-Received: by 2002:a17:906:ae56:: with SMTP id lf22mr15570584ejb.59.1593468221285; Mon, 29 Jun 2020 15:03:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593468221; cv=none; d=google.com; s=arc-20160816; b=ssiqg2foKu/BLyuWjopOeycyoqeh5jJhX0tw9ygOblFnjsy3DPNol/MFrUhBHUz20Z ZAR+x/jkiR2q9iz/N8E5Eycifta8pYB4Ze5MbSWu8rWV0OTnckVIgzb78NC4C8aacdkM iN9edKSsrvf6pVJkncUGi2dvfYhEqKaWUEUV3LZr0D/9WIA+WmipeOVlEBVgGyhWpEKW S25/RDJXCWF1AVvCbEABAvJW9PhmH02W6QMOTR6rk6t10TZbh0LoeokgJPgQfMmkzgb9 XRgxU0C9WAEWNupmSJfpJlGmmsxhOQk4c93Rk7gowA+SvNLcqstii6ZnBXi6dda9XFhL 2P0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=WkWMUBpGaFHRJcYXpn3OFfLTgs71JWH6xkHU1ezxzFs=; b=oEZSo34ZYHgJxnwPQZy1SUx4hJfAgseHE3kjJD1ubx8lsn8xjcOPX8Mvgv/qL2oylM Ej1x+XaJIQ5BS3EnH+qlwpjnQQYCRZei1/8GeJAtITmzZv50YSYBQeH/kMrK6FzGqT4N Lwb5Us2Aqaw9br66liqrrgC5Z6UnqkRjxwnESO0PYNz0N87GGOFtnk8NNd4S9KH/C787 8M6qn2V293cO39D8Cl2V1GF3PZi7ZnmPEcNJagz2LbcWAm0wS2MQdXBFetzBCJmi/L7G cGC+8hdVTG48TtSYQX/vPF1K1S5cXY/iZl79mqW/7wTVzC97J7jv2HSqdV/PHimRuUhz Pkpg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xfcFr44I; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m16si539934eji.77.2020.06.29.15.03.17; Mon, 29 Jun 2020 15:03:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xfcFr44I; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387785AbgF2WBo (ORCPT + 99 others); Mon, 29 Jun 2020 18:01:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:56792 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726251AbgF2SfY (ORCPT ); Mon, 29 Jun 2020 14:35:24 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2B8A3246EE; Mon, 29 Jun 2020 15:20:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593444034; bh=+kFvMppVPhbb1Jbt3yVA+kAco1Bh+AKTYk60GeSAHeo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=xfcFr44IHwtqW740QHre5TD7xZZNhGDD/D3bOUM6b7sGfuk4M0vQPdEauHkZCfm5X 1zgsBvICU1G/1XKen09CWlNh7CIr3SJjawvxQJD2VATWvFLXwOFZlxafuXrpfCjQSf 6nckHmlURt2swsoZzJQoKm3fUTf+TeNWUbj+VEgw= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Lu Baolu , Xin Zeng , Joerg Roedel , Sasha Levin Subject: [PATCH 5.7 142/265] iommu/vt-d: Set U/S bit in first level page table by default Date: Mon, 29 Jun 2020 11:16:15 -0400 Message-Id: <20200629151818.2493727-143-sashal@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200629151818.2493727-1-sashal@kernel.org> References: <20200629151818.2493727-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.7.7-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.7.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.7.7-rc1 X-KernelTest-Deadline: 2020-07-01T15:14+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Lu Baolu [ Upstream commit 16ecf10e815d70d11d2300243f4a3b4c7c5acac7 ] When using first-level translation for IOVA, currently the U/S bit in the page table is cleared which implies DMA requests with user privilege are blocked. As the result, following error messages might be observed when passing through a device to user level: DMAR: DRHD: handling fault status reg 3 DMAR: [DMA Read] Request device [41:00.0] PASID 1 fault addr 7ecdcd000 [fault reason 129] SM: U/S set 0 for first-level translation with user privilege This fixes it by setting U/S bit in the first level page table and makes IOVA over first level compatible with previous second-level translation. Fixes: b802d070a52a1 ("iommu/vt-d: Use iova over first level") Reported-by: Xin Zeng Signed-off-by: Lu Baolu Link: https://lore.kernel.org/r/20200622231345.29722-3-baolu.lu@linux.intel.com Signed-off-by: Joerg Roedel Signed-off-by: Sasha Levin --- drivers/iommu/intel-iommu.c | 5 ++--- include/linux/intel-iommu.h | 1 + 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c index fde7aba49b746..a0b9ea0805210 100644 --- a/drivers/iommu/intel-iommu.c +++ b/drivers/iommu/intel-iommu.c @@ -943,7 +943,7 @@ static struct dma_pte *pfn_to_dma_pte(struct dmar_domain *domain, domain_flush_cache(domain, tmp_page, VTD_PAGE_SIZE); pteval = ((uint64_t)virt_to_dma_pfn(tmp_page) << VTD_PAGE_SHIFT) | DMA_PTE_READ | DMA_PTE_WRITE; if (domain_use_first_level(domain)) - pteval |= DMA_FL_PTE_XD; + pteval |= DMA_FL_PTE_XD | DMA_FL_PTE_US; if (cmpxchg64(&pte->val, 0ULL, pteval)) /* Someone else set it while we were thinking; use theirs. */ free_pgtable_page(tmp_page); @@ -2034,7 +2034,6 @@ static inline void context_set_sm_rid2pasid(struct context_entry *context, unsigned long pasid) { context->hi |= pasid & ((1 << 20) - 1); - context->hi |= (1 << 20); } /* @@ -2326,7 +2325,7 @@ static int __domain_mapping(struct dmar_domain *domain, unsigned long iov_pfn, attr = prot & (DMA_PTE_READ | DMA_PTE_WRITE | DMA_PTE_SNP); if (domain_use_first_level(domain)) - attr |= DMA_FL_PTE_PRESENT | DMA_FL_PTE_XD; + attr |= DMA_FL_PTE_PRESENT | DMA_FL_PTE_XD | DMA_FL_PTE_US; if (!sg) { sg_res = nr_pages; diff --git a/include/linux/intel-iommu.h b/include/linux/intel-iommu.h index de23fb95fe918..64a5335046b00 100644 --- a/include/linux/intel-iommu.h +++ b/include/linux/intel-iommu.h @@ -40,6 +40,7 @@ #define DMA_PTE_SNP BIT_ULL(11) #define DMA_FL_PTE_PRESENT BIT_ULL(0) +#define DMA_FL_PTE_US BIT_ULL(2) #define DMA_FL_PTE_XD BIT_ULL(63) #define CONTEXT_TT_MULTI_LEVEL 0 -- 2.25.1