summaryrefslogtreecommitdiffstats
path: root/drivers/iommu
diff options
context:
space:
mode:
authorLu Baolu2019-08-06 02:14:09 +0200
committerJoerg Roedel2019-08-09 17:35:25 +0200
commit3a18844dcf89e636b2d0cbf577e3963b0bcb6d23 (patch)
treed2e1a012c4e47e8a5d1740ae19f12d366ebac4b4 /drivers/iommu
parentiommu/vt-d: Detach domain before using a private one (diff)
downloadkernel-qcow2-linux-3a18844dcf89e636b2d0cbf577e3963b0bcb6d23.tar.gz
kernel-qcow2-linux-3a18844dcf89e636b2d0cbf577e3963b0bcb6d23.tar.xz
kernel-qcow2-linux-3a18844dcf89e636b2d0cbf577e3963b0bcb6d23.zip
iommu/vt-d: Fix possible use-after-free of private domain
Multiple devices might share a private domain. One real example is a pci bridge and all devices behind it. When remove a private domain, make sure that it has been detached from all devices to avoid use-after-free case. Cc: Ashok Raj <ashok.raj@intel.com> Cc: Jacob Pan <jacob.jun.pan@linux.intel.com> Cc: Kevin Tian <kevin.tian@intel.com> Cc: Alex Williamson <alex.williamson@redhat.com> Fixes: 942067f1b6b97 ("iommu/vt-d: Identify default domains replaced with private") Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com> Tested-by: Alex Williamson <alex.williamson@redhat.com> Signed-off-by: Joerg Roedel <jroedel@suse.de>
Diffstat (limited to 'drivers/iommu')
-rw-r--r--drivers/iommu/intel-iommu.c3
1 files changed, 2 insertions, 1 deletions
diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c
index 37259b7f95a7..12d094d08c0a 100644
--- a/drivers/iommu/intel-iommu.c
+++ b/drivers/iommu/intel-iommu.c
@@ -4791,7 +4791,8 @@ static void __dmar_remove_one_dev_info(struct device_domain_info *info)
/* free the private domain */
if (domain->flags & DOMAIN_FLAG_LOSE_CHILDREN &&
- !(domain->flags & DOMAIN_FLAG_STATIC_IDENTITY))
+ !(domain->flags & DOMAIN_FLAG_STATIC_IDENTITY) &&
+ list_empty(&domain->devices))
domain_exit(info->domain);
free_devinfo_mem(info);