Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp100881imu; Tue, 8 Jan 2019 15:29:06 -0800 (PST) X-Google-Smtp-Source: ALg8bN6uFxPl4jjnWfHHBJXsZzEx+1QJ8b/52PspW88c4WNBwHU7BwbS8VyvSPwUVlioU29lH5vq X-Received: by 2002:a63:f94c:: with SMTP id q12mr3254743pgk.91.1546990146234; Tue, 08 Jan 2019 15:29:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546990146; cv=none; d=google.com; s=arc-20160816; b=sDKucD15iHox8TQ4uLYaEaUBTqKoEaAko2WSb1Socc3h5wFbHKWJA7uDcek/gjwkDN 5IQGEU7o18rTOUo4kLsVmN+mmwoR2n42vV1EImEl4oNVM49XuADqXc3ZwZSKDhxunWBs Fld3gWrNreq9Y4lAlobX9d4jkV/Qn3T8TTkEfeaGQ3ee0VFnzqG+Ezu/iZGqT8qhAZlh 3WpZRI7SFuarJtoaB1CSfY3LljFcCBWSEIJInpa+HRS1jUynaDgG8xO555KUTkP2nEI+ e7r4OWkAhxWXJGZWeQrBVGb3i/M4KKEJyaUqZpgTRnNkjTSEjwIBp9a5GGFxiXBsADKE CLIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=lkt/BKtFOG6vU0R9o+WeThDX9HjziVmIv/wmJ7rBM8c=; b=Qlddp8oDFRP380uYu8RqIsK3Uhd6dTMFTFEtX6Upg69FqeWZ51QIVOclHp/igoi6gU CwdUiFqu4i6QhxI+RC7IK3xWme9vOmc2X5PldXw3a1UPXyYPtoyHdoxjF+11t/+NAjOW AD1BbAVorwL9/1kwnYt3thoMLIme440KFYiswE9mal/3mBhQG4RN86SVwMGKTx6QcETC UfuVKxSnw8jKxMJWMmvQDJs3lVvRcSGdz6nCRszMXfeiojNiQnaG9OTtSaGuhUe/PPSx eNE0PiIgcpD8cs+6XlNbZA+jdfSrYL8+TLkTx/9Wr3SszoNfUgCRHgMBB6Efgn5jNWP7 tLsw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SpFC4Cug; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f4si63642876plf.370.2019.01.08.15.28.51; Tue, 08 Jan 2019 15:29:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SpFC4Cug; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731057AbfAHT6x (ORCPT + 99 others); Tue, 8 Jan 2019 14:58:53 -0500 Received: from mail.kernel.org ([198.145.29.99]:36896 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730391AbfAHT31 (ORCPT ); Tue, 8 Jan 2019 14:29:27 -0500 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 09A75217D9; Tue, 8 Jan 2019 19:29:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1546975766; bh=zpKBx+Mr14lsVMT+rVCB0LfSUJmnEFxpb6RSAuLos4Y=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SpFC4CugkqmPKPAVlEurMKIGmTyJ2r/Wl4v+bpgRX7tQlS2jENpE2NwYUbFuMo5ih V3cqWOosPVPWv6V0bcjXF0AXRMtfx5YqwE9onIeZXi2znmuFOysoa8lnrB4XhlcTcC ghh6MnlWX+pflUnDAZDaiLdeAgM7kRw+LFW/0muQ= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Suraj Jitindar Singh , Paul Mackerras , Sasha Levin , kvm-ppc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Subject: [PATCH AUTOSEL 4.20 108/117] KVM: PPC: Book3S HV: Apply combination of host and l1 pte rc for nested guest Date: Tue, 8 Jan 2019 14:26:16 -0500 Message-Id: <20190108192628.121270-108-sashal@kernel.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20190108192628.121270-1-sashal@kernel.org> References: <20190108192628.121270-1-sashal@kernel.org> MIME-Version: 1.0 X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Suraj Jitindar Singh [ Upstream commit 8b23eee4e55a32a2b51a180dfd27a8d214acc7a1 ] The shadow page table contains ptes for translations from nested guest address to host address. Currently when creating these ptes we take the rc bits from the pte for the L1 guest address to host address translation. This is incorrect as we must also factor in the rc bits from the pte for the nested guest address to L1 guest address translation (as contained in the L1 guest partition table for the nested guest). By not calculating these bits correctly L1 may not have been correctly notified when it needed to update its rc bits in the partition table it maintains for its nested guest. Modify the code so that the rc bits in the resultant pte for the L2->L0 translation are the 'and' of the rc bits in the L2->L1 pte and the L1->L0 pte, also accounting for whether this was a write access when setting the dirty bit. Signed-off-by: Suraj Jitindar Singh Signed-off-by: Paul Mackerras Signed-off-by: Sasha Levin --- arch/powerpc/kvm/book3s_hv_nested.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/arch/powerpc/kvm/book3s_hv_nested.c b/arch/powerpc/kvm/book3s_hv_nested.c index fc64535e4c00..f8176ae3a5a7 100644 --- a/arch/powerpc/kvm/book3s_hv_nested.c +++ b/arch/powerpc/kvm/book3s_hv_nested.c @@ -1229,6 +1229,9 @@ static long int __kvmhv_nested_page_fault(struct kvm_vcpu *vcpu, perm |= gpte.may_read ? 0UL : _PAGE_READ; perm |= gpte.may_write ? 0UL : _PAGE_WRITE; perm |= gpte.may_execute ? 0UL : _PAGE_EXEC; + /* Only set accessed/dirty (rc) bits if set in host and l1 guest ptes */ + perm |= (gpte.rc & _PAGE_ACCESSED) ? 0UL : _PAGE_ACCESSED; + perm |= ((gpte.rc & _PAGE_DIRTY) && writing) ? 0UL : _PAGE_DIRTY; pte = __pte(pte_val(pte) & ~perm); /* What size pte can we insert? */ -- 2.19.1