aboutsummaryrefslogtreecommitdiffstats
path: root/arch/s390/mm
diff options
context:
space:
mode:
authorDavid Hildenbrand <dahi@linux.vnet.ibm.com>2016-06-13 04:49:04 -0400
committerChristian Borntraeger <borntraeger@de.ibm.com>2016-06-20 03:55:20 -0400
commit01f719176f28016da1b588f6560a4eef18a98a93 (patch)
tree1ce75d8a85c078e46bd23733cf7fc098dc21b8dd /arch/s390/mm
parent5b6c963bcef5c3a857e3f8ba84aa9380069fc95f (diff)
s390/mm: don't fault everything in read-write in gmap_pte_op_fixup()
Let's not fault in everything in read-write but limit it to read-only where possible. When restricting access rights, we already have the required protection level in our hands. When reading from guest 2 storage (gmap_read_table), it is obviously PROT_READ. When shadowing a pte, the required protection level is given via the guest 2 provided pte. Based on an initial patch by Martin Schwidefsky. Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com> Signed-off-by: David Hildenbrand <dahi@linux.vnet.ibm.com> Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Diffstat (limited to 'arch/s390/mm')
-rw-r--r--arch/s390/mm/gmap.c17
1 files changed, 11 insertions, 6 deletions
diff --git a/arch/s390/mm/gmap.c b/arch/s390/mm/gmap.c
index d00e4abb559e..738d75495e56 100644
--- a/arch/s390/mm/gmap.c
+++ b/arch/s390/mm/gmap.c
@@ -811,19 +811,22 @@ static pte_t *gmap_pte_op_walk(struct gmap *gmap, unsigned long gaddr,
811 * @gmap: pointer to guest mapping meta data structure 811 * @gmap: pointer to guest mapping meta data structure
812 * @gaddr: virtual address in the guest address space 812 * @gaddr: virtual address in the guest address space
813 * @vmaddr: address in the host process address space 813 * @vmaddr: address in the host process address space
814 * @prot: indicates access rights: PROT_NONE, PROT_READ or PROT_WRITE
814 * 815 *
815 * Returns 0 if the caller can retry __gmap_translate (might fail again), 816 * Returns 0 if the caller can retry __gmap_translate (might fail again),
816 * -ENOMEM if out of memory and -EFAULT if anything goes wrong while fixing 817 * -ENOMEM if out of memory and -EFAULT if anything goes wrong while fixing
817 * up or connecting the gmap page table. 818 * up or connecting the gmap page table.
818 */ 819 */
819static int gmap_pte_op_fixup(struct gmap *gmap, unsigned long gaddr, 820static int gmap_pte_op_fixup(struct gmap *gmap, unsigned long gaddr,
820 unsigned long vmaddr) 821 unsigned long vmaddr, int prot)
821{ 822{
822 struct mm_struct *mm = gmap->mm; 823 struct mm_struct *mm = gmap->mm;
824 unsigned int fault_flags;
823 bool unlocked = false; 825 bool unlocked = false;
824 826
825 BUG_ON(gmap_is_shadow(gmap)); 827 BUG_ON(gmap_is_shadow(gmap));
826 if (fixup_user_fault(current, mm, vmaddr, FAULT_FLAG_WRITE, &unlocked)) 828 fault_flags = (prot == PROT_WRITE) ? FAULT_FLAG_WRITE : 0;
829 if (fixup_user_fault(current, mm, vmaddr, fault_flags, &unlocked))
827 return -EFAULT; 830 return -EFAULT;
828 if (unlocked) 831 if (unlocked)
829 /* lost mmap_sem, caller has to retry __gmap_translate */ 832 /* lost mmap_sem, caller has to retry __gmap_translate */
@@ -875,7 +878,7 @@ static int gmap_protect_range(struct gmap *gmap, unsigned long gaddr,
875 vmaddr = __gmap_translate(gmap, gaddr); 878 vmaddr = __gmap_translate(gmap, gaddr);
876 if (IS_ERR_VALUE(vmaddr)) 879 if (IS_ERR_VALUE(vmaddr))
877 return vmaddr; 880 return vmaddr;
878 rc = gmap_pte_op_fixup(gmap, gaddr, vmaddr); 881 rc = gmap_pte_op_fixup(gmap, gaddr, vmaddr, prot);
879 if (rc) 882 if (rc)
880 return rc; 883 return rc;
881 continue; 884 continue;
@@ -957,7 +960,7 @@ int gmap_read_table(struct gmap *gmap, unsigned long gaddr, unsigned long *val)
957 rc = vmaddr; 960 rc = vmaddr;
958 break; 961 break;
959 } 962 }
960 rc = gmap_pte_op_fixup(gmap, gaddr, vmaddr); 963 rc = gmap_pte_op_fixup(gmap, gaddr, vmaddr, PROT_READ);
961 if (rc) 964 if (rc)
962 break; 965 break;
963 } 966 }
@@ -1041,7 +1044,7 @@ static int gmap_protect_rmap(struct gmap *sg, unsigned long raddr,
1041 radix_tree_preload_end(); 1044 radix_tree_preload_end();
1042 if (rc) { 1045 if (rc) {
1043 kfree(rmap); 1046 kfree(rmap);
1044 rc = gmap_pte_op_fixup(parent, paddr, vmaddr); 1047 rc = gmap_pte_op_fixup(parent, paddr, vmaddr, prot);
1045 if (rc) 1048 if (rc)
1046 return rc; 1049 return rc;
1047 continue; 1050 continue;
@@ -1910,10 +1913,12 @@ int gmap_shadow_page(struct gmap *sg, unsigned long saddr, pte_t pte)
1910 unsigned long vmaddr, paddr; 1913 unsigned long vmaddr, paddr;
1911 spinlock_t *ptl; 1914 spinlock_t *ptl;
1912 pte_t *sptep, *tptep; 1915 pte_t *sptep, *tptep;
1916 int prot;
1913 int rc; 1917 int rc;
1914 1918
1915 BUG_ON(!gmap_is_shadow(sg)); 1919 BUG_ON(!gmap_is_shadow(sg));
1916 parent = sg->parent; 1920 parent = sg->parent;
1921 prot = (pte_val(pte) & _PAGE_PROTECT) ? PROT_READ : PROT_WRITE;
1917 1922
1918 rmap = kzalloc(sizeof(*rmap), GFP_KERNEL); 1923 rmap = kzalloc(sizeof(*rmap), GFP_KERNEL);
1919 if (!rmap) 1924 if (!rmap)
@@ -1955,7 +1960,7 @@ int gmap_shadow_page(struct gmap *sg, unsigned long saddr, pte_t pte)
1955 radix_tree_preload_end(); 1960 radix_tree_preload_end();
1956 if (!rc) 1961 if (!rc)
1957 break; 1962 break;
1958 rc = gmap_pte_op_fixup(parent, paddr, vmaddr); 1963 rc = gmap_pte_op_fixup(parent, paddr, vmaddr, prot);
1959 if (rc) 1964 if (rc)
1960 break; 1965 break;
1961 } 1966 }