[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v4] xen/iommu: cleanup iommu related domctl handling
On Wed, 20 Apr 2022, Juergen Gross wrote: > Today iommu_do_domctl() is being called from arch_do_domctl() in the > "default:" case of a switch statement. This has led already to crashes > due to unvalidated parameters. > > Fix that by moving the call of iommu_do_domctl() to the main switch > statement of do_domctl(). > > Signed-off-by: Juergen Gross <jgross@xxxxxxxx> For the ARM side: Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> I have no opinion on the ENOSYS vs EOPNOTSUPP discussion. > --- > V3: > - new patch > V4: > - add iommu_do_domctl() stub for !CONFIG_HAS_PASSTHROUGH (Andrew Cooper, > Jan Beulich) > --- > xen/arch/arm/domctl.c | 11 +---------- > xen/arch/x86/domctl.c | 2 +- > xen/common/domctl.c | 7 +++++++ > xen/include/xen/iommu.h | 12 +++++++++--- > 4 files changed, 18 insertions(+), 14 deletions(-) > > diff --git a/xen/arch/arm/domctl.c b/xen/arch/arm/domctl.c > index 6245af6d0b..1baf25c3d9 100644 > --- a/xen/arch/arm/domctl.c > +++ b/xen/arch/arm/domctl.c > @@ -176,16 +176,7 @@ long arch_do_domctl(struct xen_domctl *domctl, struct > domain *d, > return rc; > } > default: > - { > - int rc; > - > - rc = subarch_do_domctl(domctl, d, u_domctl); > - > - if ( rc == -ENOSYS ) > - rc = iommu_do_domctl(domctl, d, u_domctl); > - > - return rc; > - } > + return subarch_do_domctl(domctl, d, u_domctl); > } > } > > diff --git a/xen/arch/x86/domctl.c b/xen/arch/x86/domctl.c > index a6aae500a3..c9699bb868 100644 > --- a/xen/arch/x86/domctl.c > +++ b/xen/arch/x86/domctl.c > @@ -1380,7 +1380,7 @@ long arch_do_domctl( > break; > > default: > - ret = iommu_do_domctl(domctl, d, u_domctl); > + ret = -ENOSYS; > break; > } > > diff --git a/xen/common/domctl.c b/xen/common/domctl.c > index 5879117580..0a866e3132 100644 > --- a/xen/common/domctl.c > +++ b/xen/common/domctl.c > @@ -871,6 +871,13 @@ long cf_check > do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl) > copyback = 1; > break; > > + case XEN_DOMCTL_assign_device: > + case XEN_DOMCTL_test_assign_device: > + case XEN_DOMCTL_deassign_device: > + case XEN_DOMCTL_get_device_group: > + ret = iommu_do_domctl(op, d, u_domctl); > + break; > + > default: > ret = arch_do_domctl(op, d, u_domctl); > break; > diff --git a/xen/include/xen/iommu.h b/xen/include/xen/iommu.h > index 3a83981464..c6bbb65bbf 100644 > --- a/xen/include/xen/iommu.h > +++ b/xen/include/xen/iommu.h > @@ -341,8 +341,17 @@ struct domain_iommu { > /* Does the IOMMU pagetable need to be kept synchronized with the P2M */ > #ifdef CONFIG_HAS_PASSTHROUGH > #define need_iommu_pt_sync(d) (dom_iommu(d)->need_sync) > + > +int iommu_do_domctl(struct xen_domctl *domctl, struct domain *d, > + XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl); > #else > #define need_iommu_pt_sync(d) ({ (void)(d); false; }) > + > +static inline int iommu_do_domctl(struct xen_domctl *domctl, struct domain > *d, > + XEN_GUEST_HANDLE_PARAM(xen_domctl_t) > u_domctl) > +{ > + return -ENOSYS; > +} > #endif > > int __must_check iommu_suspend(void); > @@ -356,9 +365,6 @@ int iommu_do_pci_domctl(struct xen_domctl *, struct > domain *d, > XEN_GUEST_HANDLE_PARAM(xen_domctl_t)); > #endif > > -int iommu_do_domctl(struct xen_domctl *, struct domain *d, > - XEN_GUEST_HANDLE_PARAM(xen_domctl_t)); > - > void iommu_dev_iotlb_flush_timeout(struct domain *d, struct pci_dev *pdev); > > /* > -- > 2.34.1 >
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |