Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1172510pxa; Thu, 13 Aug 2020 02:22:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzEoG1DA+9amJLUo6vrUwc9DNifDEiV+Dyz8g8/VFq+yjAlD6/DkmZJn4SOG33fwqqvO/sB X-Received: by 2002:a50:f288:: with SMTP id f8mr3850534edm.247.1597310530745; Thu, 13 Aug 2020 02:22:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597310530; cv=none; d=google.com; s=arc-20160816; b=qwtTkvSRHNm9PfhIpzKXWv/w/OwkYYj+lvar3P34biHf1j1Zl9TyyftRONrGQbtpsd CswrlGZZ02KrHzB0vnzQp0YnXA2lNUZzLlzgOymAhS9kHPAwesWEso4XDQU6U8JMbuTQ mMjlErvjkpbMbYVK28sswpZy4iuqC7nlZkssi/342TP0VsNkDOpcoCuGBpbLFoIOPrQG pDteE12vEeWBUWKxfzflEXPZmJ+kj/4LzCR2NALw+n3RRkxBOLVslxScmJbWH9cX+6kZ lEO949GVCZi/oUbCb9TiSB7veQ0nRi/GpjlAxpivMsTtWIDyF8nyQeRJxAuU5551xK4J 6XVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=EBJ+ExoQy5aEoL39b9C9uVKH38XogTRSFkeFcEtzNJ8=; b=BIDD634LcgTKQ5SDfLlysb2gn3JAgBtkXp7uS+cZD6pqmESsVFY9362vvORAT0O/rl E6wHnuGKf7w7wcDLg48h+ayJNb+7vaXsa4whH7Tq+dhWXPRo3klGBMtNiCZP7dsRn98T dfy6ggHyRwOeAOR4WJeGY2hHSGRg/COYt30dKvz3Kzs4qBQO91qlRxeVXjgLZUkOFw3z 8NHTcHYHh5/Rfi7VZsjSPTYVFPyhhEwj/o/T/b7ABCfncJvxwKlBEH52y+ly1muCr5SI P523F1F6dtOLnd1D8DH3n8kNxe4iw/9ysnORxGzZJRKDtQmGp32ljOTORWg5FqohRH0P QIJA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=KfjW80zN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x8si2894093ejs.414.2020.08.13.02.21.48; Thu, 13 Aug 2020 02:22:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=KfjW80zN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726578AbgHMJUE (ORCPT + 99 others); Thu, 13 Aug 2020 05:20:04 -0400 Received: from us-smtp-delivery-1.mimecast.com ([207.211.31.120]:57234 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726053AbgHMJUE (ORCPT ); Thu, 13 Aug 2020 05:20:04 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1597310402; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=EBJ+ExoQy5aEoL39b9C9uVKH38XogTRSFkeFcEtzNJ8=; b=KfjW80zN2srPkXWSAMeeVL9AR2sKaDrFC7cgb936RjxkHD3OZ9VsUF0KMLMI9o4aOaCGhF ZAxyc/VZPb76y7CwovCEHxZKshBAdi60hH36rfMGY9LVCSfDL3wI46UUlRu8nBouI+R3P+ ESYQawshnRrSVZDR60myMwpJyRBcfhk= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-255-2iC1flfpOPGgncnuADpR8w-1; Thu, 13 Aug 2020 05:19:58 -0400 X-MC-Unique: 2iC1flfpOPGgncnuADpR8w-1 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id C290B85B66C; Thu, 13 Aug 2020 09:19:56 +0000 (UTC) Received: from [10.36.113.93] (ovpn-113-93.ams2.redhat.com [10.36.113.93]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 7CB87600C5; Thu, 13 Aug 2020 09:19:48 +0000 (UTC) Subject: Re: [PATCH v7 7/7] iommu/vt-d: Check UAPI data processed by IOMMU core To: Jacob Pan , iommu@lists.linux-foundation.org, LKML , Joerg Roedel , Alex Williamson Cc: Lu Baolu , David Woodhouse , Yi Liu , "Tian, Kevin" , Raj Ashok , Christoph Hellwig , Jean-Philippe Brucker , Jonathan Corbet References: <1596068467-49322-1-git-send-email-jacob.jun.pan@linux.intel.com> <1596068467-49322-8-git-send-email-jacob.jun.pan@linux.intel.com> From: Auger Eric Message-ID: <1b131401-a9a3-3641-99cc-430d9b51efa5@redhat.com> Date: Thu, 13 Aug 2020 11:19:46 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0 MIME-Version: 1.0 In-Reply-To: <1596068467-49322-8-git-send-email-jacob.jun.pan@linux.intel.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Jacob, On 7/30/20 2:21 AM, Jacob Pan wrote: > IOMMU generic layer already does sanity checks UAPI data for version > match and argsz range under generic information. > Remove the redundant version check from VT-d driver and check for vendor > specific data size. > > Signed-off-by: Jacob Pan > --- > drivers/iommu/intel/iommu.c | 3 +-- > drivers/iommu/intel/svm.c | 7 +++++-- > 2 files changed, 6 insertions(+), 4 deletions(-) > > diff --git a/drivers/iommu/intel/iommu.c b/drivers/iommu/intel/iommu.c > index 021f62078f52..7e03cca31a0e 100644 > --- a/drivers/iommu/intel/iommu.c > +++ b/drivers/iommu/intel/iommu.c > @@ -5391,8 +5391,7 @@ intel_iommu_sva_invalidate(struct iommu_domain *domain, struct device *dev, > int ret = 0; > u64 size = 0; > > - if (!inv_info || !dmar_domain || > - inv_info->version != IOMMU_CACHE_INVALIDATE_INFO_VERSION_1) > + if (!inv_info || !dmar_domain) > return -EINVAL; > > if (!dev || !dev_is_pci(dev)) > diff --git a/drivers/iommu/intel/svm.c b/drivers/iommu/intel/svm.c > index 713b3a218483..55ea11e9c0f5 100644 > --- a/drivers/iommu/intel/svm.c > +++ b/drivers/iommu/intel/svm.c > @@ -240,8 +240,11 @@ int intel_svm_bind_gpasid(struct iommu_domain *domain, struct device *dev, > if (WARN_ON(!iommu) || !data) > return -EINVAL; > > - if (data->version != IOMMU_GPASID_BIND_VERSION_1 || > - data->format != IOMMU_PASID_FORMAT_INTEL_VTD) > + if (data->format != IOMMU_PASID_FORMAT_INTEL_VTD) > + return -EINVAL; > + > + /* IOMMU core ensures argsz is more than the start of the union */ > + if (data->argsz < offsetofend(struct iommu_gpasid_bind_data, vendor.vtd)) > return -EINVAL; Shouldn't you test the vendor flags here? intel_pasid_setup_bind_data() only checks valid ones but not ~mask. Thanks Eric > > if (!dev_is_pci(dev)) >