mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-12 05:48:39 +08:00
KVM: s390: remove change-recording override support
Change-recording override (CO) was never implemented in any machine. According to the architecture it is unpredictable if a translation-specification exception will be recognized if the bit is set and EDAT1 does not apply. Therefore the easiest solution is to simply ignore the bit. This also fixes commitcd1836f583
("KVM: s390: instruction-execution-protection support"). A guest may enable instruction-execution-protection (IEP) but not EDAT1. In such a case the guest_translate() function (arch/s390/kvm/gaccess.c) will report a specification exception on pages that have the IEP bit set while it should not. It might make sense to add full IEP support to guest_translate() and the GACC_IFETCH case. However, as far as I can tell the GACC_IFETCH case is currently only used after an instruction was executed in order to fetch the failing instruction. So there is no additional problem *currently*. Fixes:cd1836f583
("KVM: s390: instruction-execution-protection support") Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com> Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
This commit is contained in:
parent
97da3854c5
commit
232b8e3b1d
@ -168,8 +168,7 @@ union page_table_entry {
|
|||||||
unsigned long z : 1; /* Zero Bit */
|
unsigned long z : 1; /* Zero Bit */
|
||||||
unsigned long i : 1; /* Page-Invalid Bit */
|
unsigned long i : 1; /* Page-Invalid Bit */
|
||||||
unsigned long p : 1; /* DAT-Protection Bit */
|
unsigned long p : 1; /* DAT-Protection Bit */
|
||||||
unsigned long co : 1; /* Change-Recording Override */
|
unsigned long : 9;
|
||||||
unsigned long : 8;
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -745,8 +744,6 @@ static unsigned long guest_translate(struct kvm_vcpu *vcpu, unsigned long gva,
|
|||||||
return PGM_PAGE_TRANSLATION;
|
return PGM_PAGE_TRANSLATION;
|
||||||
if (pte.z)
|
if (pte.z)
|
||||||
return PGM_TRANSLATION_SPEC;
|
return PGM_TRANSLATION_SPEC;
|
||||||
if (pte.co && !edat1)
|
|
||||||
return PGM_TRANSLATION_SPEC;
|
|
||||||
dat_protection |= pte.p;
|
dat_protection |= pte.p;
|
||||||
raddr.pfra = pte.pfra;
|
raddr.pfra = pte.pfra;
|
||||||
real_address:
|
real_address:
|
||||||
@ -1182,7 +1179,7 @@ int kvm_s390_shadow_fault(struct kvm_vcpu *vcpu, struct gmap *sg,
|
|||||||
rc = gmap_read_table(sg->parent, pgt + vaddr.px * 8, &pte.val);
|
rc = gmap_read_table(sg->parent, pgt + vaddr.px * 8, &pte.val);
|
||||||
if (!rc && pte.i)
|
if (!rc && pte.i)
|
||||||
rc = PGM_PAGE_TRANSLATION;
|
rc = PGM_PAGE_TRANSLATION;
|
||||||
if (!rc && (pte.z || (pte.co && sg->edat_level < 1)))
|
if (!rc && pte.z)
|
||||||
rc = PGM_TRANSLATION_SPEC;
|
rc = PGM_TRANSLATION_SPEC;
|
||||||
shadow_page:
|
shadow_page:
|
||||||
pte.p |= dat_protection;
|
pte.p |= dat_protection;
|
||||||
|
Loading…
Reference in New Issue
Block a user