mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-14 15:54:15 +08:00
KVM: arm64: nv: Enforce S2 alignment when contiguous bit is set
Despite KVM not using the contiguous bit for anything related to
TLBs, the spec does require that the alignment defined by the
contiguous bit for the page size and the level is enforced.
Add the required checks to offset the point where PA and VA merge.
Fixes: 61e30b9eef
("KVM: arm64: nv: Implement nested Stage-2 page table walk logic")
Reported-by: Alexandru Elisei <alexandru.elisei@arm.com>
Signed-off-by: Marc Zyngier <maz@kernel.org>
This commit is contained in:
parent
5fddf9abc3
commit
4155539bc5
@ -205,4 +205,26 @@ static inline u64 kvm_encode_nested_level(struct kvm_s2_trans *trans)
|
||||
return FIELD_PREP(KVM_NV_GUEST_MAP_SZ, trans->level);
|
||||
}
|
||||
|
||||
/* Adjust alignment for the contiguous bit as per StageOA() */
|
||||
#define contiguous_bit_shift(d, wi, l) \
|
||||
({ \
|
||||
u8 shift = 0; \
|
||||
\
|
||||
if ((d) & PTE_CONT) { \
|
||||
switch (BIT((wi)->pgshift)) { \
|
||||
case SZ_4K: \
|
||||
shift = 4; \
|
||||
break; \
|
||||
case SZ_16K: \
|
||||
shift = (l) == 2 ? 5 : 7; \
|
||||
break; \
|
||||
case SZ_64K: \
|
||||
shift = 5; \
|
||||
break; \
|
||||
} \
|
||||
} \
|
||||
\
|
||||
shift; \
|
||||
})
|
||||
|
||||
#endif /* __ARM64_KVM_NESTED_H */
|
||||
|
@ -282,11 +282,6 @@ static int walk_nested_s2_pgd(phys_addr_t ipa,
|
||||
return 1;
|
||||
}
|
||||
|
||||
/*
|
||||
* We don't use the contiguous bit in the stage-2 ptes, so skip check
|
||||
* for misprogramming of the contiguous bit.
|
||||
*/
|
||||
|
||||
if (check_output_size(wi, desc)) {
|
||||
out->esr = compute_fsc(level, ESR_ELx_FSC_ADDRSZ);
|
||||
out->upper_attr = desc;
|
||||
@ -299,6 +294,8 @@ static int walk_nested_s2_pgd(phys_addr_t ipa,
|
||||
return 1;
|
||||
}
|
||||
|
||||
addr_bottom += contiguous_bit_shift(desc, wi, level);
|
||||
|
||||
/* Calculate and return the result */
|
||||
paddr = (desc & GENMASK_ULL(47, addr_bottom)) |
|
||||
(ipa & GENMASK_ULL(addr_bottom - 1, 0));
|
||||
|
Loading…
Reference in New Issue
Block a user