iommufd/iova_bitmap: Bounds check mapped::pages access
[ Upstream commit a4ab7dedaee0e39b15653c5fd0367e420739f7ef ] Dirty IOMMU hugepages reported on a base page page-size granularity can lead to an attempt to set dirty pages in the bitmap beyond the limits that are pinned. Bounds check the page index of the array we are trying to access is within the limits before we kmap() and return otherwise. While it is also a defensive check, this is also in preparation to defer setting bits (outside the mapped range) to the next iteration(s) when the pages become available. Fixes: b058ea3ab5af ("vfio/iova_bitmap: refactor iova_bitmap_set() to better handle page boundaries") Link: https://lore.kernel.org/r/20240202133415.23819-2-joao.m.martins@oracle.com Signed-off-by: Joao Martins <joao.m.martins@oracle.com> Tested-by: Avihai Horon <avihaih@nvidia.com> Signed-off-by: Jason Gunthorpe <jgg@nvidia.com> Signed-off-by: Sasha Levin <sashal@kernel.org>
This commit is contained in:
parent
bc569f86f9
commit
634745054a
@ -406,6 +406,7 @@ void iova_bitmap_set(struct iova_bitmap *bitmap,
|
||||
mapped->pgshift) + mapped->pgoff * BITS_PER_BYTE;
|
||||
unsigned long last_bit = (((iova + length - 1) - mapped->iova) >>
|
||||
mapped->pgshift) + mapped->pgoff * BITS_PER_BYTE;
|
||||
unsigned long last_page_idx = mapped->npages - 1;
|
||||
|
||||
do {
|
||||
unsigned int page_idx = cur_bit / BITS_PER_PAGE;
|
||||
@ -414,6 +415,9 @@ void iova_bitmap_set(struct iova_bitmap *bitmap,
|
||||
last_bit - cur_bit + 1);
|
||||
void *kaddr;
|
||||
|
||||
if (unlikely(page_idx > last_page_idx))
|
||||
break;
|
||||
|
||||
kaddr = kmap_local_page(mapped->pages[page_idx]);
|
||||
bitmap_set(kaddr, offset, nbits);
|
||||
kunmap_local(kaddr);
|
||||
|
Loading…
x
Reference in New Issue
Block a user