Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2772311pxb; Tue, 9 Mar 2021 10:24:58 -0800 (PST) X-Google-Smtp-Source: ABdhPJzty9G92OyMnpETt8WEi5+oJCjG3ugi1YoBvoPiNIM1j6UCl5eadMtE4TRVbFMk4DuJnpV5 X-Received: by 2002:a05:6402:b21:: with SMTP id bo1mr5618160edb.368.1615314297992; Tue, 09 Mar 2021 10:24:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1615314297; cv=none; d=google.com; s=arc-20160816; b=a29fTbZ1QXPnaz7Ni/CNanCXXhlvYyXpE9DfPGYoM4LNpBsgMDygkL0E0e5WWORJeG G+l/0/Iq7WFlOiL87t5YBMhmfwF8iiIKjUq+OzJzAaccycCJaEVogfTfA14v1TpYCup1 3BUWsh8FA51dnj/qMObTk3J7Yl65rkNn4kVfD9/gWjEsbjaoJv+at76JMbVj1C9r3eeV Vhe4woM8JC1SHwfSEIEwGcOZ52thuCs0Juk5rgZrUaITyQjONZW8VMMfa7IuAwSUbJ7F 06siUtTQ4NveZjGjKM7OA1Pbqg0KJ4LqA4b/1vVXq8UKeaY1687sKOPNAVeau5kHvd0x Fu4A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=0Vl1UL44z/aTdn8OLiHHiAq4xAI007KFGxxjlakr82Y=; b=SdqUCp3cfCz8AsqF8ZCEaectjMMA0O2IhWusjgJRWZ3bQkKHevPa5c1EJ+6KknNYWS 3tQHr5VuTdNTCFFUNKuuSOjFsys3AVcIUUTpAjDMnxmLnGsgVmNP6Vc6Z0g/fMjdy7JW P37J3TbMKXtT22kNpSADfBR7m1rz+E0YqU2inAJVNPU1QBOKcGTqJL1/zshUiU8E6gOe UC1anHXhyg9N8VxV3hre+IkplW7/O/EZvl0YbJHdyzcvQOrBq9mVFBqYGsuO/OO8yWq9 BbeFrDQlxWBC94zozKcBT7hRZOQcWkqc/FXx7GMc0f7lq30YWujA9n8inMjyY5vX98e4 uSVg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@yandex-team.com header.s=default header.b=zVRWLv8P; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=yandex-team.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x21si9493171edv.185.2021.03.09.10.24.35; Tue, 09 Mar 2021 10:24:57 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@yandex-team.com header.s=default header.b=zVRWLv8P; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=yandex-team.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231139AbhCISXc (ORCPT + 99 others); Tue, 9 Mar 2021 13:23:32 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53220 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230421AbhCISXT (ORCPT ); Tue, 9 Mar 2021 13:23:19 -0500 Received: from forwardcorp1j.mail.yandex.net (forwardcorp1j.mail.yandex.net [IPv6:2a02:6b8:0:1619::183]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A90BDC06174A; Tue, 9 Mar 2021 10:23:18 -0800 (PST) Received: from iva8-d077482f1536.qloud-c.yandex.net (iva8-d077482f1536.qloud-c.yandex.net [IPv6:2a02:6b8:c0c:2f26:0:640:d077:482f]) by forwardcorp1j.mail.yandex.net (Yandex) with ESMTP id B90F22E155F; Tue, 9 Mar 2021 21:23:16 +0300 (MSK) Received: from iva4-f06c35e68a0a.qloud-c.yandex.net (iva4-f06c35e68a0a.qloud-c.yandex.net [2a02:6b8:c0c:152e:0:640:f06c:35e6]) by iva8-d077482f1536.qloud-c.yandex.net (mxbackcorp/Yandex) with ESMTP id nGrNUzJpes-NGJiWD5g; Tue, 09 Mar 2021 21:23:16 +0300 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex-team.com; s=default; t=1615314196; bh=0Vl1UL44z/aTdn8OLiHHiAq4xAI007KFGxxjlakr82Y=; h=In-Reply-To:Message-Id:References:Date:Subject:To:From:Cc; b=zVRWLv8PUuRRFwFJlAU3O+Lf/NsLmTMhxM7QY9k+4X+UveL1+1hbYt7ExTJ4Mj4AS iIeYStOUXmGM6oR4KwwY9buMkth7RXYR125Dk7QYiqdgHCnhs1c8zKfnyphXm6rtJ4 9RKPJpoKsfwwAuJWJxmaKnYWggFKdeh/iLiGUIbA= Authentication-Results: iva8-d077482f1536.qloud-c.yandex.net; dkim=pass header.i=@yandex-team.com Received: from dynamic-vpn.dhcp.yndx.net (dynamic-vpn.dhcp.yndx.net [2a02:6b8:b081:203::1:15]) by iva4-f06c35e68a0a.qloud-c.yandex.net (smtpcorp/Yandex) with ESMTPSA id T5bJwzP5HK-NGnW4HcN; Tue, 09 Mar 2021 21:23:16 +0300 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client certificate not present) From: Andrey Ryabinin To: gregkh@linuxfoundation.org, stable@vger.kernel.org Cc: jroedel@suse.de, will@kernel.org, linux-kernel@vger.kernel.org, Andrey Ryabinin Subject: [PATCH stable 5.4] iommu/amd: Fix sleeping in atomic in increase_address_space() Date: Tue, 9 Mar 2021 21:24:30 +0300 Message-Id: <20210309182430.18849-4-arbn@yandex-team.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20210309182430.18849-1-arbn@yandex-team.com> References: <161512522533161@kroah.com> <20210309182430.18849-1-arbn@yandex-team.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org commit 140456f994195b568ecd7fc2287a34eadffef3ca upstream. increase_address_space() calls get_zeroed_page(gfp) under spin_lock with disabled interrupts. gfp flags passed to increase_address_space() may allow sleeping, so it comes to this: BUG: sleeping function called from invalid context at mm/page_alloc.c:4342 in_atomic(): 1, irqs_disabled(): 1, pid: 21555, name: epdcbbf1qnhbsd8 Call Trace: dump_stack+0x66/0x8b ___might_sleep+0xec/0x110 __alloc_pages_nodemask+0x104/0x300 get_zeroed_page+0x15/0x40 iommu_map_page+0xdd/0x3e0 amd_iommu_map+0x50/0x70 iommu_map+0x106/0x220 vfio_iommu_type1_ioctl+0x76e/0x950 [vfio_iommu_type1] do_vfs_ioctl+0xa3/0x6f0 ksys_ioctl+0x66/0x70 __x64_sys_ioctl+0x16/0x20 do_syscall_64+0x4e/0x100 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Fix this by moving get_zeroed_page() out of spin_lock/unlock section. Fixes: 754265bcab ("iommu/amd: Fix race in increase_address_space()") Signed-off-by: Andrey Ryabinin Acked-by: Will Deacon Link: https://lore.kernel.org/r/20210217143004.19165-1-arbn@yandex-team.com Signed-off-by: Joerg Roedel Signed-off-by: Andrey Ryabinin --- drivers/iommu/amd_iommu.c | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/drivers/iommu/amd_iommu.c b/drivers/iommu/amd_iommu.c index 7b724f7b27a99..c392930253a30 100644 --- a/drivers/iommu/amd_iommu.c +++ b/drivers/iommu/amd_iommu.c @@ -1469,25 +1469,27 @@ static bool increase_address_space(struct protection_domain *domain, bool ret = false; u64 *pte; + pte = (void *)get_zeroed_page(gfp); + if (!pte) + return false; + spin_lock_irqsave(&domain->lock, flags); if (address <= PM_LEVEL_SIZE(domain->mode) || WARN_ON_ONCE(domain->mode == PAGE_MODE_6_LEVEL)) goto out; - pte = (void *)get_zeroed_page(gfp); - if (!pte) - goto out; - *pte = PM_LEVEL_PDE(domain->mode, iommu_virt_to_phys(domain->pt_root)); domain->pt_root = pte; domain->mode += 1; + pte = NULL; ret = true; out: spin_unlock_irqrestore(&domain->lock, flags); + free_page((unsigned long)pte); return ret; } -- 2.26.2