Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp6509796pxb; Wed, 17 Feb 2021 06:31:46 -0800 (PST) X-Google-Smtp-Source: ABdhPJwQ4mm6Rx9UYHtzPGgxrfcGRqRxgqL8BdiUeHa2vDPQjIV8eAVoyFJcRZbH2lhUMjEkXmRF X-Received: by 2002:a17:907:d21:: with SMTP id gn33mr14628263ejc.242.1613572306224; Wed, 17 Feb 2021 06:31:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613572306; cv=none; d=google.com; s=arc-20160816; b=T6R4k4NvzJgRJzDrptS1mudvYcWcWlgpe/fx2OLHRZLwhaWPGZHlqbhfBQaByYLk8s ZYWe6h0Y2S8rvwtqpZCXFnHYZ0NtVfqd2NMgQz3WcYRbEbeeWUtU+jWuEgCV0wh8jeNR OVTxTK0FO3fvfu3zk4oVUdsYYY3G9UPwMdXcP3bDkCTdLgszR3zgItL5B8t0RJf/7eer FH/nzg+X7MhYxwGRfJ8emMKYMRbI9eIOmL7de6feUotFsGZLiJlbEIi1JOExnYzTsudb BN8VxwwDVz2XhSX/s6qqGWxOC06SWxEEx5sXcgl3+lLtDfwh3DTetbIpBdqRO9pD3aRb XVQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=/M/W/rry6PW248aDe81ggUEdVdPjrAZqjQQ99mtBe3k=; b=c8tO0z94X/u3zmJRXWwGBSImFbf85DgQYY+OWxVx+2v6YXSyf9LBEkR3htR4xjF/xy U8xFkk8qw7/g7SYD/r5ZCG3F0HPYuoeM6XbIW/0seOSlPgxYn22OYvdeb84ZyHc3L4FM c3P80itTk9sAisGfS8pFt4kQa6RKp2JW2zI2SOFCg/hSd4Rxxqv8hIfKwwuMp9SC8dhw 7w906fBbwZEA9PGpyNm/p6P4dItvAJB0X/OzPAtNHOFBnCf+tHUWpXlC++GaXMQzr+YD I3bD/dr+omzde9yGFXQvi9UOZLaB9zRewg9yBkyhPYdo6Ct+r+PTVDY68ZBTbGLxQttK s5mQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@yandex-team.com header.s=default header.b=0tTT32VP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=yandex-team.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n12si1690278eja.210.2021.02.17.06.31.22; Wed, 17 Feb 2021 06:31:46 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@yandex-team.com header.s=default header.b=0tTT32VP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=yandex-team.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233416AbhBQO3t (ORCPT + 99 others); Wed, 17 Feb 2021 09:29:49 -0500 Received: from forwardcorp1p.mail.yandex.net ([77.88.29.217]:49796 "EHLO forwardcorp1p.mail.yandex.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233328AbhBQO3m (ORCPT ); Wed, 17 Feb 2021 09:29:42 -0500 X-Greylist: delayed 8976 seconds by postgrey-1.27 at vger.kernel.org; Wed, 17 Feb 2021 09:29:40 EST Received: from myt5-23f0be3aa648.qloud-c.yandex.net (myt5-23f0be3aa648.qloud-c.yandex.net [IPv6:2a02:6b8:c12:3e29:0:640:23f0:be3a]) by forwardcorp1p.mail.yandex.net (Yandex) with ESMTP id E89CE2E0C61; Wed, 17 Feb 2021 17:28:57 +0300 (MSK) Received: from myt5-70c90f7d6d7d.qloud-c.yandex.net (myt5-70c90f7d6d7d.qloud-c.yandex.net [2a02:6b8:c12:3e2c:0:640:70c9:f7d]) by myt5-23f0be3aa648.qloud-c.yandex.net (mxbackcorp/Yandex) with ESMTP id bPjqwWRHUA-SvxaPpXq; Wed, 17 Feb 2021 17:28:57 +0300 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex-team.com; s=default; t=1613572137; bh=/M/W/rry6PW248aDe81ggUEdVdPjrAZqjQQ99mtBe3k=; h=Message-Id:Date:Subject:To:From:Cc; b=0tTT32VPUOg0z6LDzc8HPZL7d+d+PsB/jnFYWLRT2W3Nx0ZQqEhQPu5Vgl4mDACv/ jzmSZRbdIPVH/coLWDDW0dtNFTi8c2sWCb1xIobGnBma8wAzB5fNXbw89N0R5+FF0K zxVqX78wxQq6HHVH0faWVIV2B4F9FvO1C2lJLueg= Authentication-Results: myt5-23f0be3aa648.qloud-c.yandex.net; dkim=pass header.i=@yandex-team.com Received: from dynamic-vpn.dhcp.yndx.net (dynamic-vpn.dhcp.yndx.net [2a02:6b8:b080:6619::1:17]) by myt5-70c90f7d6d7d.qloud-c.yandex.net (smtpcorp/Yandex) with ESMTPSA id IlngOxqDDd-SuoS9OgN; Wed, 17 Feb 2021 17:28:57 +0300 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client certificate not present) From: Andrey Ryabinin To: Joerg Roedel Cc: Will Deacon , iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org, Qian Cai , valesini@yandex-team.ru, Andrey Ryabinin , stable@vger.kernel.org Subject: [PATCH] iommu/amd: Fix sleeping in atomic in increase_address_space() Date: Wed, 17 Feb 2021 17:30:04 +0300 Message-Id: <20210217143004.19165-1-arbn@yandex-team.com> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org increase_address_space() calls get_zeroed_page(gfp) under spin_lock with disabled interrupts. gfp flags passed to increase_address_space() may allow sleeping, so it comes to this: BUG: sleeping function called from invalid context at mm/page_alloc.c:4342 in_atomic(): 1, irqs_disabled(): 1, pid: 21555, name: epdcbbf1qnhbsd8 Call Trace: dump_stack+0x66/0x8b ___might_sleep+0xec/0x110 __alloc_pages_nodemask+0x104/0x300 get_zeroed_page+0x15/0x40 iommu_map_page+0xdd/0x3e0 amd_iommu_map+0x50/0x70 iommu_map+0x106/0x220 vfio_iommu_type1_ioctl+0x76e/0x950 [vfio_iommu_type1] do_vfs_ioctl+0xa3/0x6f0 ksys_ioctl+0x66/0x70 __x64_sys_ioctl+0x16/0x20 do_syscall_64+0x4e/0x100 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Fix this by moving get_zeroed_page() out of spin_lock/unlock section. Fixes: 754265bcab ("iommu/amd: Fix race in increase_address_space()") Signed-off-by: Andrey Ryabinin Cc: --- drivers/iommu/amd/iommu.c | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/drivers/iommu/amd/iommu.c b/drivers/iommu/amd/iommu.c index f0adbc48fd17..9256f84f5ebf 100644 --- a/drivers/iommu/amd/iommu.c +++ b/drivers/iommu/amd/iommu.c @@ -1502,6 +1502,10 @@ static bool increase_address_space(struct protection_domain *domain, bool ret = true; u64 *pte; + pte = (void *)get_zeroed_page(gfp); + if (!pte) + return false; + spin_lock_irqsave(&domain->lock, flags); amd_iommu_domain_get_pgtable(domain, &pgtable); @@ -1513,10 +1517,6 @@ static bool increase_address_space(struct protection_domain *domain, if (WARN_ON_ONCE(pgtable.mode == PAGE_MODE_6_LEVEL)) goto out; - pte = (void *)get_zeroed_page(gfp); - if (!pte) - goto out; - *pte = PM_LEVEL_PDE(pgtable.mode, iommu_virt_to_phys(pgtable.root)); pgtable.root = pte; @@ -1530,10 +1530,12 @@ static bool increase_address_space(struct protection_domain *domain, */ amd_iommu_domain_set_pgtable(domain, pte, pgtable.mode); + pte = NULL; ret = true; out: spin_unlock_irqrestore(&domain->lock, flags); + free_page((unsigned long)pte); return ret; } -- 2.26.2