Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3505589imu; Mon, 7 Jan 2019 04:44:53 -0800 (PST) X-Google-Smtp-Source: ALg8bN7Qa+ytaJS4ZrurApK1tuFoQy2VTo8nWxH9wVD8/k5J3zO7jO38avSyFXEIAraTePqtghI0 X-Received: by 2002:a17:902:b48b:: with SMTP id y11mr59127187plr.200.1546865093487; Mon, 07 Jan 2019 04:44:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546865093; cv=none; d=google.com; s=arc-20160816; b=z3ApoMMcgKou8OW8zNYOhBu+k7yc+LBUUlDeQQKqEG07JnqJ3+6y7vtwOxebO+EHMp URJxELOHE7ZUdsFcfTIJS50GP/q2R/erBNSplsKA7p5bEgUWU/17l3GEnMCvyh9fdud4 rc/0SwSNdbMw3gfZLpDbeTDcgmwvpyc/JlvWfRGkWWbGoa1+sR1ygXLVH82esdCnRdTl QcEms5K9bk68jSkYlf0gciznN4l8pqbq7UhlU+dhlZnWeAEbjWpNi5HngAg0Ee3pEKOa 0Iwqh6G6hs3rYzDjXDvHqLpLkIKNpZujEGRvVQ8c2PvW2LJooSlkV6wnGh/JcD+89QNr Bhew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=3d/JpTa8NJSCa7nY2q+nq3nIlhDFU64hGK7Q3sxbIIo=; b=tMOKVI6/SfLYvQ5fLOA4YsdFVfxDp2pvcEAkLFZWiJTjF3IOwsAMJa5Nk68h8XX4v8 DzedrYjPq4tJ/EkMLWHSpavMuwbDbrxIEXHZL3XPoBLqk4YHO+cZzynuV32hpE4+b0va GYuroEsgmJl5KMi9U26y5SljJ0b2ut2imn74p7HpZi+RDPd8hBPvWWwHnAyg4olArz6g QEPWR2E3rAvlNQiYU6lZ2Wuhff7J7psc+WgQ8T/5IsgJV4Pa9RD8ye16/6h68PTIPP+z eQOZWLh0Q+rgYmadVMvZvCrfRp8/tLu28A0n+Myey085tKapzW6H3sdc6ceW6XfoEVDx /hIQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Vqvx9AIB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v25si22599660pfj.139.2019.01.07.04.44.38; Mon, 07 Jan 2019 04:44:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Vqvx9AIB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728177AbfAGMlk (ORCPT + 99 others); Mon, 7 Jan 2019 07:41:40 -0500 Received: from mail.kernel.org ([198.145.29.99]:56860 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727277AbfAGMle (ORCPT ); Mon, 7 Jan 2019 07:41:34 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 43DB52183E; Mon, 7 Jan 2019 12:41:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1546864892; bh=tAbwMxcGkArG8wGT2odcNUqXpcapeF0Vf9JKPKjhACU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Vqvx9AIBrqA43/BbQq696+VHS6agx1LR1ZdgUAhzjljkSkleGMM2xV0Q1H5n1/1tN BMam+ygFA5szAShPP5ayMIrXFu09La0jC8RFAfVRKepDf6Tnv9mkjX85min6wG6iAD e20tkH/dP108KhPJzKfFzJm3nAujf/GvYHdPUOqg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Paul Mackerras Subject: [PATCH 4.20 058/145] KVM: PPC: Book3S HV: Fix race between kvm_unmap_hva_range and MMU mode switch Date: Mon, 7 Jan 2019 13:31:35 +0100 Message-Id: <20190107104444.886183565@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190107104437.308206189@linuxfoundation.org> References: <20190107104437.308206189@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ From: Paul Mackerras commit 234ff0b729ad882d20f7996591a964965647addf upstream. Testing has revealed an occasional crash which appears to be caused by a race between kvmppc_switch_mmu_to_hpt and kvm_unmap_hva_range_hv. The symptom is a NULL pointer dereference in __find_linux_pte() called from kvm_unmap_radix() with kvm->arch.pgtable == NULL. Looking at kvmppc_switch_mmu_to_hpt(), it does indeed clear kvm->arch.pgtable (via kvmppc_free_radix()) before setting kvm->arch.radix to NULL, and there is nothing to prevent kvm_unmap_hva_range_hv() or the other MMU callback functions from being called concurrently with kvmppc_switch_mmu_to_hpt() or kvmppc_switch_mmu_to_radix(). This patch therefore adds calls to spin_lock/unlock on the kvm->mmu_lock around the assignments to kvm->arch.radix, and makes sure that the partition-scoped radix tree or HPT is only freed after changing kvm->arch.radix. This also takes the kvm->mmu_lock in kvmppc_rmap_reset() to make sure that the clearing of each rmap array (one per memslot) doesn't happen concurrently with use of the array in the kvm_unmap_hva_range_hv() or the other MMU callbacks. Fixes: 18c3640cefc7 ("KVM: PPC: Book3S HV: Add infrastructure for running HPT guests on radix host") Cc: stable@vger.kernel.org # v4.15+ Signed-off-by: Paul Mackerras Signed-off-by: Greg Kroah-Hartman --- arch/powerpc/kvm/book3s_64_mmu_hv.c | 3 +++ arch/powerpc/kvm/book3s_hv.c | 17 +++++++++++------ 2 files changed, 14 insertions(+), 6 deletions(-) --- a/arch/powerpc/kvm/book3s_64_mmu_hv.c +++ b/arch/powerpc/kvm/book3s_64_mmu_hv.c @@ -743,12 +743,15 @@ void kvmppc_rmap_reset(struct kvm *kvm) srcu_idx = srcu_read_lock(&kvm->srcu); slots = kvm_memslots(kvm); kvm_for_each_memslot(memslot, slots) { + /* Mutual exclusion with kvm_unmap_hva_range etc. */ + spin_lock(&kvm->mmu_lock); /* * This assumes it is acceptable to lose reference and * change bits across a reset. */ memset(memslot->arch.rmap, 0, memslot->npages * sizeof(*memslot->arch.rmap)); + spin_unlock(&kvm->mmu_lock); } srcu_read_unlock(&kvm->srcu, srcu_idx); } --- a/arch/powerpc/kvm/book3s_hv.c +++ b/arch/powerpc/kvm/book3s_hv.c @@ -4532,12 +4532,15 @@ int kvmppc_switch_mmu_to_hpt(struct kvm { if (nesting_enabled(kvm)) kvmhv_release_all_nested(kvm); + kvmppc_rmap_reset(kvm); + kvm->arch.process_table = 0; + /* Mutual exclusion with kvm_unmap_hva_range etc. */ + spin_lock(&kvm->mmu_lock); + kvm->arch.radix = 0; + spin_unlock(&kvm->mmu_lock); kvmppc_free_radix(kvm); kvmppc_update_lpcr(kvm, LPCR_VPM1, LPCR_VPM1 | LPCR_UPRT | LPCR_GTSE | LPCR_HR); - kvmppc_rmap_reset(kvm); - kvm->arch.radix = 0; - kvm->arch.process_table = 0; return 0; } @@ -4549,12 +4552,14 @@ int kvmppc_switch_mmu_to_radix(struct kv err = kvmppc_init_vm_radix(kvm); if (err) return err; - + kvmppc_rmap_reset(kvm); + /* Mutual exclusion with kvm_unmap_hva_range etc. */ + spin_lock(&kvm->mmu_lock); + kvm->arch.radix = 1; + spin_unlock(&kvm->mmu_lock); kvmppc_free_hpt(&kvm->arch.hpt); kvmppc_update_lpcr(kvm, LPCR_UPRT | LPCR_GTSE | LPCR_HR, LPCR_VPM1 | LPCR_UPRT | LPCR_GTSE | LPCR_HR); - kvmppc_rmap_reset(kvm); - kvm->arch.radix = 1; return 0; }