From mboxrd@z Thu Jan 1 00:00:00 1970 From: Alex Williamson Subject: Re: [PATCH] vfio powerpc: implemented IOMMU driver for VFIO Date: Wed, 12 Dec 2012 07:36:13 -0700 Message-ID: <1355322973.3224.203.camel@bling.home> References: <1354557206.1809.377.camel@bling.home> <1354865693-8060-1-git-send-email-aik@ozlabs.ru> <1354899707.3224.86.camel@bling.home> <50C82B3C.1060006@ozlabs.ru> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Paul Mackerras , linuxppc-dev@lists.ozlabs.org, David Gibson To: Alexey Kardashevskiy Return-path: In-Reply-To: <50C82B3C.1060006@ozlabs.ru> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: linuxppc-dev-bounces+glppe-linuxppc-embedded-2=m.gmane.org@lists.ozlabs.org Sender: "Linuxppc-dev" List-Id: kvm.vger.kernel.org On Wed, 2012-12-12 at 17:59 +1100, Alexey Kardashevskiy wrote: > On 08/12/12 04:01, Alex Williamson wrote: > >> + case VFIO_IOMMU_MAP_DMA: { > >> + vfio_iommu_spapr_tce_dma_map param; > >> + struct iommu_table *tbl = container->tbl; > >> + enum dma_data_direction direction; > >> + unsigned long locked, lock_limit; > >> + > >> + if (WARN_ON(!tbl)) > >> + return -ENXIO; > >> + > >> + minsz = offsetofend(vfio_iommu_spapr_tce_dma_map, size); > >> + > >> + if (copy_from_user(¶m, (void __user *)arg, minsz)) > >> + return -EFAULT; > >> + > >> + if (param.argsz < minsz) > >> + return -EINVAL; > >> + > >> + if ((param.flags & VFIO_DMA_MAP_FLAG_READ) && > >> + (param.flags & VFIO_DMA_MAP_FLAG_WRITE)) > >> + direction = DMA_BIDIRECTIONAL; > >> + else if (param.flags & VFIO_DMA_MAP_FLAG_READ) > >> + direction = DMA_TO_DEVICE; > >> + else if (param.flags & VFIO_DMA_MAP_FLAG_WRITE) > >> + direction = DMA_FROM_DEVICE; > >> + else > >> + return -EINVAL; > > > > flags needs to be sanitized too. Return EINVAL if any unknown bit is > > set or else sloppy users may make it very difficult to make use of those > > flag bits later. > > > It already returns -EINVAL on any bit set except READ/WRITE, no? No. I could pass flags ~0 through there to get a read/write mapping and cause you problems if you later want to define another bit. Thanks, Alex