]> xenbits.xensource.com Git - people/tklengyel/xen.git/commitdiff
xen/iommu: x86: Don't try to free page tables is the IOMMU is not enabled
authorJulien Grall <jgrall@amazon.com>
Fri, 26 Feb 2021 10:56:38 +0000 (10:56 +0000)
committerJulien Grall <jgrall@amazon.com>
Tue, 2 Mar 2021 09:51:14 +0000 (09:51 +0000)
When using CONFIG_BIGMEM=y, the page_list cannot be accessed whilst it
is is unitialized. However, iommu_free_pgtables() will be called even if
the domain is not using an IOMMU.

Consequently, Xen will try to go through the page list and deference a
NULL pointer.

Bail out early if the domain is not using an IOMMU.

Fixes: 15bc9a1ef51c ("x86/iommu: add common page-table allocator")
Signed-off-by: Julien Grall <jgrall@amazon.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Release-Acked-by: Ian Jackson <iwj@xenproject.org>
xen/drivers/passthrough/x86/iommu.c

index cea1032b3d02d17a0c05d8f8728eb76994db2042..58a330e8224795b74be01acf0fa81c6b57ba8d7f 100644 (file)
@@ -267,6 +267,9 @@ int iommu_free_pgtables(struct domain *d)
     struct page_info *pg;
     unsigned int done = 0;
 
+    if ( !is_iommu_enabled(d) )
+        return 0;
+
     while ( (pg = page_list_remove_head(&hd->arch.pgtables.list)) )
     {
         free_domheap_page(pg);