diff options
author | David Hildenbrand <dahi@linux.vnet.ibm.com> | 2016-06-13 04:49:04 -0400 |
---|---|---|
committer | Christian Borntraeger <borntraeger@de.ibm.com> | 2016-06-20 03:55:20 -0400 |
commit | 01f719176f28016da1b588f6560a4eef18a98a93 (patch) | |
tree | 1ce75d8a85c078e46bd23733cf7fc098dc21b8dd /arch/s390/mm | |
parent | 5b6c963bcef5c3a857e3f8ba84aa9380069fc95f (diff) |
s390/mm: don't fault everything in read-write in gmap_pte_op_fixup()
Let's not fault in everything in read-write but limit it to read-only
where possible.
When restricting access rights, we already have the required protection
level in our hands. When reading from guest 2 storage (gmap_read_table),
it is obviously PROT_READ. When shadowing a pte, the required protection
level is given via the guest 2 provided pte.
Based on an initial patch by Martin Schwidefsky.
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: David Hildenbrand <dahi@linux.vnet.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Diffstat (limited to 'arch/s390/mm')
-rw-r--r-- | arch/s390/mm/gmap.c | 17 |
1 files changed, 11 insertions, 6 deletions
diff --git a/arch/s390/mm/gmap.c b/arch/s390/mm/gmap.c index d00e4abb559e..738d75495e56 100644 --- a/arch/s390/mm/gmap.c +++ b/arch/s390/mm/gmap.c | |||
@@ -811,19 +811,22 @@ static pte_t *gmap_pte_op_walk(struct gmap *gmap, unsigned long gaddr, | |||
811 | * @gmap: pointer to guest mapping meta data structure | 811 | * @gmap: pointer to guest mapping meta data structure |
812 | * @gaddr: virtual address in the guest address space | 812 | * @gaddr: virtual address in the guest address space |
813 | * @vmaddr: address in the host process address space | 813 | * @vmaddr: address in the host process address space |
814 | * @prot: indicates access rights: PROT_NONE, PROT_READ or PROT_WRITE | ||
814 | * | 815 | * |
815 | * Returns 0 if the caller can retry __gmap_translate (might fail again), | 816 | * Returns 0 if the caller can retry __gmap_translate (might fail again), |
816 | * -ENOMEM if out of memory and -EFAULT if anything goes wrong while fixing | 817 | * -ENOMEM if out of memory and -EFAULT if anything goes wrong while fixing |
817 | * up or connecting the gmap page table. | 818 | * up or connecting the gmap page table. |
818 | */ | 819 | */ |
819 | static int gmap_pte_op_fixup(struct gmap *gmap, unsigned long gaddr, | 820 | static int gmap_pte_op_fixup(struct gmap *gmap, unsigned long gaddr, |
820 | unsigned long vmaddr) | 821 | unsigned long vmaddr, int prot) |
821 | { | 822 | { |
822 | struct mm_struct *mm = gmap->mm; | 823 | struct mm_struct *mm = gmap->mm; |
824 | unsigned int fault_flags; | ||
823 | bool unlocked = false; | 825 | bool unlocked = false; |
824 | 826 | ||
825 | BUG_ON(gmap_is_shadow(gmap)); | 827 | BUG_ON(gmap_is_shadow(gmap)); |
826 | if (fixup_user_fault(current, mm, vmaddr, FAULT_FLAG_WRITE, &unlocked)) | 828 | fault_flags = (prot == PROT_WRITE) ? FAULT_FLAG_WRITE : 0; |
829 | if (fixup_user_fault(current, mm, vmaddr, fault_flags, &unlocked)) | ||
827 | return -EFAULT; | 830 | return -EFAULT; |
828 | if (unlocked) | 831 | if (unlocked) |
829 | /* lost mmap_sem, caller has to retry __gmap_translate */ | 832 | /* lost mmap_sem, caller has to retry __gmap_translate */ |
@@ -875,7 +878,7 @@ static int gmap_protect_range(struct gmap *gmap, unsigned long gaddr, | |||
875 | vmaddr = __gmap_translate(gmap, gaddr); | 878 | vmaddr = __gmap_translate(gmap, gaddr); |
876 | if (IS_ERR_VALUE(vmaddr)) | 879 | if (IS_ERR_VALUE(vmaddr)) |
877 | return vmaddr; | 880 | return vmaddr; |
878 | rc = gmap_pte_op_fixup(gmap, gaddr, vmaddr); | 881 | rc = gmap_pte_op_fixup(gmap, gaddr, vmaddr, prot); |
879 | if (rc) | 882 | if (rc) |
880 | return rc; | 883 | return rc; |
881 | continue; | 884 | continue; |
@@ -957,7 +960,7 @@ int gmap_read_table(struct gmap *gmap, unsigned long gaddr, unsigned long *val) | |||
957 | rc = vmaddr; | 960 | rc = vmaddr; |
958 | break; | 961 | break; |
959 | } | 962 | } |
960 | rc = gmap_pte_op_fixup(gmap, gaddr, vmaddr); | 963 | rc = gmap_pte_op_fixup(gmap, gaddr, vmaddr, PROT_READ); |
961 | if (rc) | 964 | if (rc) |
962 | break; | 965 | break; |
963 | } | 966 | } |
@@ -1041,7 +1044,7 @@ static int gmap_protect_rmap(struct gmap *sg, unsigned long raddr, | |||
1041 | radix_tree_preload_end(); | 1044 | radix_tree_preload_end(); |
1042 | if (rc) { | 1045 | if (rc) { |
1043 | kfree(rmap); | 1046 | kfree(rmap); |
1044 | rc = gmap_pte_op_fixup(parent, paddr, vmaddr); | 1047 | rc = gmap_pte_op_fixup(parent, paddr, vmaddr, prot); |
1045 | if (rc) | 1048 | if (rc) |
1046 | return rc; | 1049 | return rc; |
1047 | continue; | 1050 | continue; |
@@ -1910,10 +1913,12 @@ int gmap_shadow_page(struct gmap *sg, unsigned long saddr, pte_t pte) | |||
1910 | unsigned long vmaddr, paddr; | 1913 | unsigned long vmaddr, paddr; |
1911 | spinlock_t *ptl; | 1914 | spinlock_t *ptl; |
1912 | pte_t *sptep, *tptep; | 1915 | pte_t *sptep, *tptep; |
1916 | int prot; | ||
1913 | int rc; | 1917 | int rc; |
1914 | 1918 | ||
1915 | BUG_ON(!gmap_is_shadow(sg)); | 1919 | BUG_ON(!gmap_is_shadow(sg)); |
1916 | parent = sg->parent; | 1920 | parent = sg->parent; |
1921 | prot = (pte_val(pte) & _PAGE_PROTECT) ? PROT_READ : PROT_WRITE; | ||
1917 | 1922 | ||
1918 | rmap = kzalloc(sizeof(*rmap), GFP_KERNEL); | 1923 | rmap = kzalloc(sizeof(*rmap), GFP_KERNEL); |
1919 | if (!rmap) | 1924 | if (!rmap) |
@@ -1955,7 +1960,7 @@ int gmap_shadow_page(struct gmap *sg, unsigned long saddr, pte_t pte) | |||
1955 | radix_tree_preload_end(); | 1960 | radix_tree_preload_end(); |
1956 | if (!rc) | 1961 | if (!rc) |
1957 | break; | 1962 | break; |
1958 | rc = gmap_pte_op_fixup(parent, paddr, vmaddr); | 1963 | rc = gmap_pte_op_fixup(parent, paddr, vmaddr, prot); |
1959 | if (rc) | 1964 | if (rc) |
1960 | break; | 1965 | break; |
1961 | } | 1966 | } |