diff options
author | Lu Baolu <baolu.lu@linux.intel.com> | 2023-10-25 21:42:16 -0700 |
---|---|---|
committer | Jason Gunthorpe <jgg@nvidia.com> | 2023-10-26 11:16:34 -0300 |
commit | 03476e687eb07b94f7cdb07cd3c7c4304b6c58b3 (patch) | |
tree | d0bbe96bfb768815520c4131006e9b7032f5eb33 /drivers/iommu/iommufd/io_pagetable.c | |
parent | b41e38e225398191aaa0f1115d6234f57ffd0741 (diff) | |
download | lwn-03476e687eb07b94f7cdb07cd3c7c4304b6c58b3.tar.gz lwn-03476e687eb07b94f7cdb07cd3c7c4304b6c58b3.zip |
iommu/vt-d: Disallow read-only mappings to nest parent domain
When remapping hardware is configured by system software in scalable mode
as Nested (PGTT=011b) and with PWSNP field Set in the PASID-table-entry,
it may Set Accessed bit and Dirty bit (and Extended Access bit if enabled)
in first-stage page-table entries even when second-stage mappings indicate
that corresponding first-stage page-table is Read-Only.
As the result, contents of pages designated by VMM as Read-Only can be
modified by IOMMU via PML5E (PML4E for 4-level tables) access as part of
address translation process due to DMAs issued by Guest.
This disallows read-only mappings in the domain that is supposed to be used
as nested parent. Reference from Sapphire Rapids Specification Update [1],
errata details, SPR17. Userspace should know this limitation by checking
the IOMMU_HW_INFO_VTD_ERRATA_772415_SPR17 flag reported in the IOMMU_GET_HW_INFO
ioctl.
[1] https://www.intel.com/content/www/us/en/content-details/772415/content-details.html
Link: https://lore.kernel.org/r/20231026044216.64964-9-yi.l.liu@intel.com
Reviewed-by: Kevin Tian <kevin.tian@intel.com>
Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com>
Signed-off-by: Yi Liu <yi.l.liu@intel.com>
Signed-off-by: Jason Gunthorpe <jgg@nvidia.com>
Diffstat (limited to 'drivers/iommu/iommufd/io_pagetable.c')
0 files changed, 0 insertions, 0 deletions