Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp327876pxu; Tue, 1 Dec 2020 12:15:34 -0800 (PST) X-Google-Smtp-Source: ABdhPJyWImg1P7SCcVU6TbkNSA91AXSGZnQIVkkqkJz5G6UR7ygbKw/a7RhMuNivphQOM4SPomlq X-Received: by 2002:aa7:d297:: with SMTP id w23mr4958219edq.374.1606853734355; Tue, 01 Dec 2020 12:15:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606853734; cv=none; d=google.com; s=arc-20160816; b=icOHCLoepS6ZWCX7fkmnS/DJftcA8WSqG31MUlfK7eXa1wDLre6Gl0U8trZ+Jhjjfc pUQPmKvpimTooDkFJ5crKRWxxv+ZNGfq3Mkfa0AIXLLO6vABZcXHHLPcCtj1zacJ5ikp YIkcyz8/WACrF1wCikGoidGqzBUdEJ6y5zFnhQojFQiaqvwvSxV4QdWs4e+Wr3bqRZmU OsdDcEwDXK6u6yogVsuU7Xs7rLjm3vZghzpSrPbK4obUy/IWNGlxIvKnMCoFlSTulY/c /ZogPl5nJrDUaZQBIxVGwO7FSJ/yxgkzEa3e/+jV1RTwL89qu/tICNalk93382j7Vz9/ pDvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:subject:cc:to:from; bh=nQZ9MGCiuRzgAHlX9C0xg7Rxcwr8AI5e00szDaOM8eA=; b=NctAR+k4yWEHlnx0OzNcA8rEiLapWylFigVRMyItwaaa7Kb01OdUPEgaHHFjJZy8yd TTAtmaDgqh20R+L76yjl53mNuskwMUXiCNChexV0MKR6fEZpSDHQg5+NibmcorRyM5cy rRtKiGR1K26ilHygHdUQ/3yjzYzIS2cGA4lthqQH6rKODiavwg3MT4pG+NV45NxFohSc 8sYErTy5MOeKO4jwOdt3CkXHfbCPzs3Rd3KGxZ3Pst/6NukwrOK3GxEwN4QWpVMWyvrj J34WzcnB9nzKOPuZt4Woygbb3rzDVePn0XAEatYqKGkhs9/FoRvwXTkGmsqWv62ezm1s 5NSQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dx19si586265ejb.535.2020.12.01.12.15.11; Tue, 01 Dec 2020 12:15:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730208AbgLAUL1 (ORCPT + 99 others); Tue, 1 Dec 2020 15:11:27 -0500 Received: from szxga04-in.huawei.com ([45.249.212.190]:8175 "EHLO szxga04-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727450AbgLAUL1 (ORCPT ); Tue, 1 Dec 2020 15:11:27 -0500 Received: from DGGEMS407-HUB.china.huawei.com (unknown [172.30.72.59]) by szxga04-in.huawei.com (SkyGuard) with ESMTP id 4CltWG2qksz15PTY; Wed, 2 Dec 2020 04:10:18 +0800 (CST) Received: from DESKTOP-TMVL5KK.china.huawei.com (10.174.186.123) by DGGEMS407-HUB.china.huawei.com (10.3.19.207) with Microsoft SMTP Server id 14.3.487.0; Wed, 2 Dec 2020 04:10:37 +0800 From: Yanan Wang To: , , Marc Zyngier , Catalin Marinas , Will Deacon , James Morse , "Julien Thierry" , Suzuki K Poulose , Gavin Shan , Quentin Perret CC: , , , , , , , Yanan Wang Subject: [PATCH v2 0/3] Fix several bugs in KVM stage 2 translation Date: Wed, 2 Dec 2020 04:10:31 +0800 Message-ID: <20201201201034.116760-1-wangyanan55@huawei.com> X-Mailer: git-send-email 2.8.4.windows.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.174.186.123] X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When installing a new pte entry or updating an old valid entry in stage 2 translation, we use get_page()/put_page() to record page_count of the page-table pages. PATCH 1/3 aims to fix incorrect use of get_page()/put_page() in stage 2, which might make page-table pages unable to be freed when unmapping a range. When dirty logging of a guest with hugepages is finished, we should merge tables back into a block entry if adjustment of huge mapping is found necessary. In addition to installing the block entry, we should not only free the non-huge page-table pages but also invalidate all the TLB entries of non-huge mappings for the block. PATCH 2/3 adds enough TLBI when merging tables into a block entry. The rewrite of page-table code and fault handling add two different handlers for "just relaxing permissions" and "map by stage2 page-table walk", that's good improvement. Yet, in function user_mem_abort(), conditions where we choose the above two fault handlers are not strictly distinguished. This will causes guest errors such as infinite-loop (soft lockup will occur in result), because of calling the inappropriate fault handler. So, a solution that can strictly distinguish conditions is introduced in PATCH 3/3. Changes from v1: * In PATCH 1/3, introduce a more concise fix. * In PATCH 2/3, using full S2 TLB invalidation when merging tables into a block entry. Yanan Wang (3): KVM: arm64: Fix possible memory leak in kvm stage2 KVM: arm64: Fix handling of merging tables into a block entry KVM: arm64: Add usage of stage 2 fault lookup level in user_mem_abort() arch/arm64/include/asm/esr.h | 1 + arch/arm64/include/asm/kvm_emulate.h | 5 +++++ arch/arm64/kvm/hyp/pgtable.c | 11 ++++++++++- arch/arm64/kvm/mmu.c | 11 +++++++++-- 4 files changed, 25 insertions(+), 3 deletions(-) -- 2.19.1