Skip to content

Commit 03476e6

Browse files
LuBaolujgunthorpe
authored andcommitted
iommu/vt-d: Disallow read-only mappings to nest parent domain
When remapping hardware is configured by system software in scalable mode as Nested (PGTT=011b) and with PWSNP field Set in the PASID-table-entry, it may Set Accessed bit and Dirty bit (and Extended Access bit if enabled) in first-stage page-table entries even when second-stage mappings indicate that corresponding first-stage page-table is Read-Only. As the result, contents of pages designated by VMM as Read-Only can be modified by IOMMU via PML5E (PML4E for 4-level tables) access as part of address translation process due to DMAs issued by Guest. This disallows read-only mappings in the domain that is supposed to be used as nested parent. Reference from Sapphire Rapids Specification Update [1], errata details, SPR17. Userspace should know this limitation by checking the IOMMU_HW_INFO_VTD_ERRATA_772415_SPR17 flag reported in the IOMMU_GET_HW_INFO ioctl. [1] https://www.intel.com/content/www/us/en/content-details/772415/content-details.html Link: https://lore.kernel.org/r/20231026044216.64964-9-yi.l.liu@intel.com Reviewed-by: Kevin Tian <kevin.tian@intel.com> Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com> Signed-off-by: Yi Liu <yi.l.liu@intel.com> Signed-off-by: Jason Gunthorpe <jgg@nvidia.com>
1 parent b41e38e commit 03476e6

File tree

2 files changed

+17
-1
lines changed

2 files changed

+17
-1
lines changed

drivers/iommu/intel/iommu.c

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2194,6 +2194,11 @@ __domain_mapping(struct dmar_domain *domain, unsigned long iov_pfn,
21942194
if ((prot & (DMA_PTE_READ|DMA_PTE_WRITE)) == 0)
21952195
return -EINVAL;
21962196

2197+
if (!(prot & DMA_PTE_WRITE) && domain->nested_parent) {
2198+
pr_err_ratelimited("Read-only mapping is disallowed on the domain which serves as the parent in a nested configuration, due to HW errata (ERRATA_772415_SPR17)\n");
2199+
return -EINVAL;
2200+
}
2201+
21972202
attr = prot & (DMA_PTE_READ | DMA_PTE_WRITE | DMA_PTE_SNP);
21982203
attr |= DMA_FL_PTE_PRESENT;
21992204
if (domain->use_first_level) {
@@ -4850,6 +4855,7 @@ static void *intel_iommu_hw_info(struct device *dev, u32 *length, u32 *type)
48504855
if (!vtd)
48514856
return ERR_PTR(-ENOMEM);
48524857

4858+
vtd->flags = IOMMU_HW_INFO_VTD_ERRATA_772415_SPR17;
48534859
vtd->cap_reg = iommu->cap;
48544860
vtd->ecap_reg = iommu->ecap;
48554861
*length = sizeof(*vtd);

include/uapi/linux/iommufd.h

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -443,10 +443,20 @@ struct iommu_hwpt_alloc {
443443
};
444444
#define IOMMU_HWPT_ALLOC _IO(IOMMUFD_TYPE, IOMMUFD_CMD_HWPT_ALLOC)
445445

446+
/**
447+
* enum iommu_hw_info_vtd_flags - Flags for VT-d hw_info
448+
* @IOMMU_HW_INFO_VTD_ERRATA_772415_SPR17: If set, disallow read-only mappings
449+
* on a nested_parent domain.
450+
* https://www.intel.com/content/www/us/en/content-details/772415/content-details.html
451+
*/
452+
enum iommu_hw_info_vtd_flags {
453+
IOMMU_HW_INFO_VTD_ERRATA_772415_SPR17 = 1 << 0,
454+
};
455+
446456
/**
447457
* struct iommu_hw_info_vtd - Intel VT-d hardware information
448458
*
449-
* @flags: Must be 0
459+
* @flags: Combination of enum iommu_hw_info_vtd_flags
450460
* @__reserved: Must be 0
451461
*
452462
* @cap_reg: Value of Intel VT-d capability register defined in VT-d spec

0 commit comments

Comments
 (0)