• Julien Grall's avatar
    xen/iommu: x86: Clear the root page-table before freeing the page-tables · 9bd9695a
    Julien Grall authored
    The new per-domain IOMMU page-table allocator will now free the
    page-tables when domain's resources are relinquished. However, the
    per-domain IOMMU structure will still contain a dangling pointer to
    the root page-table.
    
    Xen may access the IOMMU page-tables afterwards at least in the case of
    PV domain:
    
    (XEN) Xen call trace:
    (XEN)    [<ffff82d04025b4b2>] R iommu.c#addr_to_dma_page_maddr+0x12e/0x1d8
    (XEN)    [<ffff82d04025b695>] F iommu.c#intel_iommu_unmap_page+0x5d/0xf8
    (XEN)    [<ffff82d0402695f3>] F iommu_unmap+0x9c/0x129
    (XEN)    [<ffff82d0402696a6>] F iommu_legacy_unmap+0x26/0x63
    (XEN)    [<ffff82d04033c5c7>] F mm.c#cleanup_page_mappings+0x139/0x144
    (XEN)    [<ffff82d04033c61d>] F put_page+0x4b/0xb3
    (XEN)    [<ffff82d04033c87f>] F put_page_from_l1e+0x136/0x13b
    (XEN)    [<ffff82d04033cada>] F devalidate_page+0x256/0x8dc
    (XEN)    [<ffff82d04033d396>] F mm.c#_put_page_type+0x236/0x47e
    (XEN)    [<ffff82d04033d64d>] F mm.c#put_pt_page+0x6f/0x80
    (XEN)    [<ffff82d04033d8d6>] F mm.c#put_page_from_l2e+0x8a/0xcf
    (XEN)    [<ffff82d04033cc27>] F devalidate_page+0x3a3/0x8dc
    (XEN)    [<ffff82d04033d396>] F mm.c#_put_page_type+0x236/0x47e
    (XEN)    [<ffff82d04033d64d>] F mm.c#put_pt_page+0x6f/0x80
    (XEN)    [<ffff82d04033d807>] F mm.c#put_page_from_l3e+0x8a/0xcf
    (XEN)    [<ffff82d04033cdf0>] F devalidate_page+0x56c/0x8dc
    (XEN)    [<ffff82d04033d396>] F mm.c#_put_page_type+0x236/0x47e
    (XEN)    [<ffff82d04033d64d>] F mm.c#put_pt_page+0x6f/0x80
    (XEN)    [<ffff82d04033d6c7>] F mm.c#put_page_from_l4e+0x69/0x6d
    (XEN)    [<ffff82d04033cf24>] F devalidate_page+0x6a0/0x8dc
    (XEN)    [<ffff82d04033d396>] F mm.c#_put_page_type+0x236/0x47e
    (XEN)    [<ffff82d04033d92e>] F put_page_type_preemptible+0x13/0x15
    (XEN)    [<ffff82d04032598a>] F domain.c#relinquish_memory+0x1ff/0x4e9
    (XEN)    [<ffff82d0403295f2>] F domain_relinquish_resources+0x2b6/0x36a
    (XEN)    [<ffff82d040205cdf>] F domain_kill+0xb8/0x141
    (XEN)    [<ffff82d040236cac>] F do_domctl+0xb6f/0x18e5
    (XEN)    [<ffff82d04031d098>] F pv_hypercall+0x2f0/0x55f
    (XEN)    [<ffff82d04039b432>] F lstar_enter+0x112/0x120
    
    This will result to a use after-free and possibly an host crash or
    memory corruption.
    
    It would not be possible to free the page-tables further down in
    domain_relinquish_resources() because cleanup_page_mappings() will only
    be called when the last reference on the page dropped. This may happen
    much later if another domain still hold a reference.
    
    After all the PCI devices have been de-assigned, nobody should use the
    IOMMU page-tables and it is therefore pointless to try to modify them.
    
    So we can simply clear any reference to the root page-table in the
    per-domain IOMMU structure. This requires to introduce a new callback of
    the method will depend on the IOMMU driver used.
    
    Take the opportunity to add an ASSERT() in arch_iommu_domain_destroy()
    to check if we freed all the IOMMU page tables.
    
    Fixes: 3eef6d07
    
     ("x86/iommu: convert VT-d code to use new page table allocator")
    Signed-off-by: default avatarJulien Grall <jgrall@amazon.com>
    Reviewed-by: default avatarJan Beulich <jbeulich@suse.com>
    Reviewed-by: default avatarKevin Tian <kevin.tian@intel.com>
    Release-Acked-by: default avatarIan Jackson <iwj@xenproject.org>
    9bd9695a
pci_amd_iommu.c 17.7 KB