[PATCH] KVM: ARM: Don't use set_pte_ext (a.k.a. Fix the voodoo bug!)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



From: Christoffer Dall <cdall@xxxxxxxxxxxxxxx>

The set_pte_ext function orr'ed the RDONLY bit onto the PTEs, which is
bit[7], which is HAP[1] and causes writable access to the pages.

This was unfortunate.

Cc: Nicolas Viennot <nviennot@xxxxxxxxxxxxxxx>
Cc: Jeremy C. Andrus <jeremya@xxxxxxxxxxxxxxx>
Signed-off-by: Christoffer Dall <c.dall@xxxxxxxxxxxxxxxxxxxxxx>
---
 arch/arm/kvm/mmu.c |   27 +++++++++++++++------------
 1 file changed, 15 insertions(+), 12 deletions(-)

diff --git a/arch/arm/kvm/mmu.c b/arch/arm/kvm/mmu.c
index 7b0e6e5..720bbd5 100644
--- a/arch/arm/kvm/mmu.c
+++ b/arch/arm/kvm/mmu.c
@@ -41,6 +41,16 @@ static void kvm_tlb_flush_vmid(struct kvm *kvm)
 	kvm_call_hyp(__kvm_tlb_flush_vmid, kvm);
 }
 
+static void set_pte(pte_t *pte, pte_t new_pte)
+{
+	*pte = new_pte;
+	/*
+	 * flush_pmd_entry just takes a void pointer and cleans the necessary
+	 * cache entries, so we can reuse the function for ptes.
+	 */
+	flush_pmd_entry(pte);
+}
+
 static int mmu_topup_memory_cache(struct kvm_mmu_memory_cache *cache,
 				  int min, int max)
 {
@@ -140,13 +150,13 @@ static void create_hyp_pte_mappings(pmd_t *pmd, unsigned long start,
 		pte = pte_offset_kernel(pmd, addr);
 		if (pfn_base) {
 			BUG_ON(pfn_valid(*pfn_base));
-			set_pte_ext(pte, pfn_pte(*pfn_base, prot), 0);
+			set_pte(pte, pfn_pte(*pfn_base, prot));
 			(*pfn_base)++;
 		} else {
 			struct page *page;
 			BUG_ON(!virt_addr_valid(addr));
 			page = virt_to_page(addr);
-			set_pte_ext(pte, mk_pte(page, prot), 0);
+			set_pte(pte, mk_pte(page, prot));
 		}
 
 	}
@@ -393,7 +403,7 @@ static void stage2_clear_pte(struct kvm *kvm, phys_addr_t addr)
 		return;
 
 	pte = pte_offset_kernel(pmd, addr);
-	set_pte_ext(pte, __pte(0), 0);
+	set_pte(pte, __pte(0));
 
 	page = virt_to_page(pte);
 	put_page(page);
@@ -459,7 +469,7 @@ static int stage2_set_pte(struct kvm *kvm, struct kvm_mmu_memory_cache *cache,
 
 	/* Create 2nd stage page table mapping - Level 3 */
 	old_pte = *pte;
-	set_pte_ext(pte, *new_pte, 0);
+	set_pte(pte, *new_pte);
 	if (pte_present(old_pte))
 		kvm_tlb_flush_vmid(kvm);
 	else
@@ -576,14 +586,7 @@ static int user_mem_abort(struct kvm_vcpu *vcpu, phys_addr_t fault_ipa,
 
 out_unlock:
 	spin_unlock(&vcpu->kvm->mmu_lock);
-	/*
-	 * XXX TODO FIXME:
--        * This is _really_ *weird* !!!
--        * We should be calling the _clean version, because we set the pfn dirty
-	 * if we map the page writable, but this causes memory failures in
-	 * guests under heavy memory pressure on the host and heavy swapping.
-	 */
-	kvm_release_pfn_dirty(pfn);
+	kvm_release_pfn_clean(pfn);
 	return 0;
 }
 
-- 
1.7.9.5

_______________________________________________
kvmarm mailing list
kvmarm@xxxxxxxxxxxxxxxxxxxxx
https://lists.cs.columbia.edu/cucslists/listinfo/kvmarm


[Index of Archives]     [Linux KVM]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux