Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp799637pxb; Mon, 16 Aug 2021 18:42:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwmdhN8uDSK9vDYZfZW1Ct5pJeREDCosOPJjVwmcPCqOXjZrIxo8PceVwuuIRNlapIF9pjT X-Received: by 2002:a92:b312:: with SMTP id p18mr622169ilh.233.1629164533125; Mon, 16 Aug 2021 18:42:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629164533; cv=none; d=google.com; s=arc-20160816; b=QwPo3GfX85FRY1zHUth9AyGm2EFuEZHah29STo9GhmBKnAV1MYpSOBBih+3Fc0pSi/ IzSbZrPnk7zkLWqrqAcMl5gb7/kVCVgZAMKAA3jbaMuK0osY0yF9BJce0fKMHy2B3qJF pXUtY9APqBN1VpR5zgjtNz/FFH1L+qss00fTIBD+saEWmTKRacRMoo2eMz86Y1Ku/O2v HwmQ0WV2hed1DZGh3TPj/MScIscFZHoatWu12OADH4X6pyXPl5zYlFZOi4OljSJSRcN+ frL5t8YWC2W1N2KkS2g4bmh/pMJ3xM2xn5jldVdrTqD4mtbdKMWqKPmQv8EhpDjrYQwg 4Hkg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=0R67WoufU00ip9iCX9fzqxnYQeyaIOPhgbue6hEnOr0=; b=Lb0MPkDTxrpOU6KI7JK5FTay7bHe5ls24p4j51fqpdClF0MS1Evl0STWPmO3WbEqIF e9JDT88l34J1u17RIzFOLT9gpeCBM0fxXGQJNWOda+C6DLKDZwenkx8p5d588Z1Tf8pl bIHRu+JtmVy/I0iJe4N+gQgJjMwhAxkH+jl1KeqwPLsVziR9gQUXci6XsYY/t2Wc+PbJ fnq8zvWTtj/Rt8Mz1d2b1U2Gcaw33yXANQns3xRAIu+kUTKd68KM1zasWivfP3bETFq8 gpOAa4yt/XzemOwZL4euEMeAweHE3mIpNbZlnIAWq311wAcGoPrhfwbby21TWtVDn3SM SHJA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=hGbL19jj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y196si947499iof.86.2021.08.16.18.42.02; Mon, 16 Aug 2021 18:42:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=hGbL19jj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236509AbhHQBkQ (ORCPT + 99 others); Mon, 16 Aug 2021 21:40:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50246 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236195AbhHQBkK (ORCPT ); Mon, 16 Aug 2021 21:40:10 -0400 Received: from mail-pj1-x1035.google.com (mail-pj1-x1035.google.com [IPv6:2607:f8b0:4864:20::1035]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6C594C061764 for ; Mon, 16 Aug 2021 18:39:38 -0700 (PDT) Received: by mail-pj1-x1035.google.com with SMTP id qe12-20020a17090b4f8c00b00179321cbae7so3452926pjb.2 for ; Mon, 16 Aug 2021 18:39:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=0R67WoufU00ip9iCX9fzqxnYQeyaIOPhgbue6hEnOr0=; b=hGbL19jjWmHw8nAYUHXwd8NF210L0j0CKbQtv+UXtex88TvrhqprciQmwNHIS0iMmi 5ATsVQMY0ldRD8AXbp+JAdqVjUoSp3Qy170JJ3zv01+GhaYRkC4bH/h/5IZ9LZbpWFde 8OEVXS6yybPBAntb6tibkwpW/cQF8JVQkN3iQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=0R67WoufU00ip9iCX9fzqxnYQeyaIOPhgbue6hEnOr0=; b=ObPpoIQiA3pP2JiOwZZjZiFgDEFVU6TFa7y2v/gQ97bEPNq7664PqGp+xPe/9ldzZP wCqlEJk09kFvm0cdspdymlVGP74iyanB/V9WhA9UIDlKS9t0dmfdU2NZUElPIDtrOga1 RF/Q8AhfpMMCHavpiwCI531eYqmmhxAYGUKvWgjvBfFWoeYzryX+MjfGbPLLqqe9XSdR qlTEhdcmh1mEoBcfVNQsUgnEL5L4jGLYcFpClebNk6jHw7BxsKgmsaOo7L7fkZiXeepX DG1dv3n8yZNb6YNjICeIlSjL5XvRbI9wDxlwVQL+qHok5OReAf/V3gh82HOuoxPYQST1 1tWg== X-Gm-Message-State: AOAM533nmzug0cCy3Fkx+EFW4I3t2x0sPT7dgIOhE8N2UGNd1Nsw0MIx uAdNBDOSQl2xwwvZp4mB+hsf6Q== X-Received: by 2002:a63:480a:: with SMTP id v10mr958746pga.113.1629164378063; Mon, 16 Aug 2021 18:39:38 -0700 (PDT) Received: from localhost ([2401:fa00:8f:203:6864:767c:2ff8:749d]) by smtp.gmail.com with UTF8SMTPSA id t38sm394013pfg.207.2021.08.16.18.39.36 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 16 Aug 2021 18:39:37 -0700 (PDT) From: David Stevens X-Google-Original-From: David Stevens To: Robin Murphy , Christoph Hellwig Cc: Joerg Roedel , Will Deacon , Lu Baolu , Tom Murphy , iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org, David Stevens Subject: [PATCH v6 6/7] swiotlb: support aligned swiotlb buffers Date: Tue, 17 Aug 2021 10:38:51 +0900 Message-Id: <20210817013852.3222824-7-stevensd@google.com> X-Mailer: git-send-email 2.33.0.rc1.237.g0d66db33f3-goog In-Reply-To: <20210817013852.3222824-1-stevensd@google.com> References: <20210817013852.3222824-1-stevensd@google.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: David Stevens Add an argument to swiotlb_tbl_map_single that specifies the desired alignment of the allocated buffer. This is used by dma-iommu to ensure the buffer is aligned to the iova granule size when using swiotlb with untrusted sub-granule mappings. This addresses an issue where adjacent slots could be exposed to the untrusted device if IO_TLB_SIZE < iova granule < PAGE_SIZE. Signed-off-by: David Stevens Reviewed-by: Christoph Hellwig --- drivers/iommu/dma-iommu.c | 4 ++-- drivers/xen/swiotlb-xen.c | 2 +- include/linux/swiotlb.h | 3 ++- kernel/dma/swiotlb.c | 11 +++++++---- 4 files changed, 12 insertions(+), 8 deletions(-) diff --git a/drivers/iommu/dma-iommu.c b/drivers/iommu/dma-iommu.c index 49a0d4de5f6c..6738420fc081 100644 --- a/drivers/iommu/dma-iommu.c +++ b/drivers/iommu/dma-iommu.c @@ -800,8 +800,8 @@ static dma_addr_t iommu_dma_map_page(struct device *dev, struct page *page, size_t padding_size; aligned_size = iova_align(iovad, size); - phys = swiotlb_tbl_map_single(dev, phys, size, - aligned_size, dir, attrs); + phys = swiotlb_tbl_map_single(dev, phys, size, aligned_size, + iova_mask(iovad), dir, attrs); if (phys == DMA_MAPPING_ERROR) return DMA_MAPPING_ERROR; diff --git a/drivers/xen/swiotlb-xen.c b/drivers/xen/swiotlb-xen.c index 24d11861ac7d..8b03d2c93428 100644 --- a/drivers/xen/swiotlb-xen.c +++ b/drivers/xen/swiotlb-xen.c @@ -382,7 +382,7 @@ static dma_addr_t xen_swiotlb_map_page(struct device *dev, struct page *page, */ trace_swiotlb_bounced(dev, dev_addr, size, swiotlb_force); - map = swiotlb_tbl_map_single(dev, phys, size, size, dir, attrs); + map = swiotlb_tbl_map_single(dev, phys, size, size, 0, dir, attrs); if (map == (phys_addr_t)DMA_MAPPING_ERROR) return DMA_MAPPING_ERROR; diff --git a/include/linux/swiotlb.h b/include/linux/swiotlb.h index 216854a5e513..93d82e43eb3a 100644 --- a/include/linux/swiotlb.h +++ b/include/linux/swiotlb.h @@ -44,7 +44,8 @@ extern void __init swiotlb_update_mem_attributes(void); phys_addr_t swiotlb_tbl_map_single(struct device *hwdev, phys_addr_t phys, size_t mapping_size, size_t alloc_size, - enum dma_data_direction dir, unsigned long attrs); + unsigned int alloc_aligned_mask, enum dma_data_direction dir, + unsigned long attrs); extern void swiotlb_tbl_unmap_single(struct device *hwdev, phys_addr_t tlb_addr, diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c index e50df8d8f87e..d4c45d8cd1fa 100644 --- a/kernel/dma/swiotlb.c +++ b/kernel/dma/swiotlb.c @@ -427,7 +427,7 @@ static unsigned int wrap_index(struct io_tlb_mem *mem, unsigned int index) * allocate a buffer from that IO TLB pool. */ static int find_slots(struct device *dev, phys_addr_t orig_addr, - size_t alloc_size) + size_t alloc_size, unsigned int alloc_align_mask) { struct io_tlb_mem *mem = io_tlb_default_mem; unsigned long boundary_mask = dma_get_seg_boundary(dev); @@ -450,6 +450,7 @@ static int find_slots(struct device *dev, phys_addr_t orig_addr, stride = (iotlb_align_mask >> IO_TLB_SHIFT) + 1; if (alloc_size >= PAGE_SIZE) stride = max(stride, stride << (PAGE_SHIFT - IO_TLB_SHIFT)); + stride = max(stride, (alloc_align_mask >> IO_TLB_SHIFT) + 1); spin_lock_irqsave(&mem->lock, flags); if (unlikely(nslots > mem->nslabs - mem->used)) @@ -504,7 +505,8 @@ static int find_slots(struct device *dev, phys_addr_t orig_addr, phys_addr_t swiotlb_tbl_map_single(struct device *dev, phys_addr_t orig_addr, size_t mapping_size, size_t alloc_size, - enum dma_data_direction dir, unsigned long attrs) + unsigned int alloc_align_mask, enum dma_data_direction dir, + unsigned long attrs) { struct io_tlb_mem *mem = io_tlb_default_mem; unsigned int offset = swiotlb_align_offset(dev, orig_addr); @@ -524,7 +526,8 @@ phys_addr_t swiotlb_tbl_map_single(struct device *dev, phys_addr_t orig_addr, return (phys_addr_t)DMA_MAPPING_ERROR; } - index = find_slots(dev, orig_addr, alloc_size + offset); + index = find_slots(dev, orig_addr, + alloc_size + offset, alloc_align_mask); if (index == -1) { if (!(attrs & DMA_ATTR_NO_WARN)) dev_warn_ratelimited(dev, @@ -636,7 +639,7 @@ dma_addr_t swiotlb_map(struct device *dev, phys_addr_t paddr, size_t size, trace_swiotlb_bounced(dev, phys_to_dma(dev, paddr), size, swiotlb_force); - swiotlb_addr = swiotlb_tbl_map_single(dev, paddr, size, size, dir, + swiotlb_addr = swiotlb_tbl_map_single(dev, paddr, size, size, 0, dir, attrs); if (swiotlb_addr == (phys_addr_t)DMA_MAPPING_ERROR) return DMA_MAPPING_ERROR; -- 2.33.0.rc1.237.g0d66db33f3-goog