]> git.baikalelectronics.ru Git - kernel.git/commitdiff
xen/arm: do not setup the runstate info page if kpti is enabled
authorStefano Stabellini <stefano.stabellini@xilinx.com>
Thu, 24 Sep 2020 23:49:55 +0000 (16:49 -0700)
committerBoris Ostrovsky <boris.ostrovsky@oracle.com>
Sun, 4 Oct 2020 23:41:33 +0000 (18:41 -0500)
The VCPUOP_register_runstate_memory_area hypercall takes a virtual
address of a buffer as a parameter. The semantics of the hypercall are
such that the virtual address should always be valid.

When KPTI is enabled and we are running userspace code, the virtual
address is not valid, thus, Linux is violating the semantics of
VCPUOP_register_runstate_memory_area.

Do not call VCPUOP_register_runstate_memory_area when KPTI is enabled.

Signed-off-by: Stefano Stabellini <stefano.stabellini@xilinx.com>
CC: Bertrand Marquis <Bertrand.Marquis@arm.com>
CC: boris.ostrovsky@oracle.com
CC: jgross@suse.com
Link: https://lore.kernel.org/r/20200924234955.15455-1-sstabellini@kernel.org
Reviewed-by: Bertrand Marquis <bertrand.marquis@arm.com>
Signed-off-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>
arch/arm/include/asm/xen/page.h
arch/arm/xen/enlighten.c
arch/arm64/include/asm/xen/page.h

index 31bbc803cecb274bd7f100d0b9459288aa98903b..dc7f6e91aafada0155d9cd780e0780fa46133533 100644 (file)
@@ -1 +1,6 @@
 #include <xen/arm/page.h>
+
+static inline bool xen_kernel_unmapped_at_usr(void)
+{
+       return false;
+}
index e93145d72c26e04533f4b61c4dee167a4b10f87f..ea76562af1e9a4dba9f51606671830954e587db2 100644 (file)
@@ -158,7 +158,8 @@ static int xen_starting_cpu(unsigned int cpu)
        BUG_ON(err);
        per_cpu(xen_vcpu, cpu) = vcpup;
 
-       xen_setup_runstate_info(cpu);
+       if (!xen_kernel_unmapped_at_usr())
+               xen_setup_runstate_info(cpu);
 
 after_register_vcpu_info:
        enable_percpu_irq(xen_events_irq, 0);
@@ -387,7 +388,8 @@ static int __init xen_guest_init(void)
                return -EINVAL;
        }
 
-       xen_time_setup_guest();
+       if (!xen_kernel_unmapped_at_usr())
+               xen_time_setup_guest();
 
        if (xen_initial_domain())
                pvclock_gtod_register_notifier(&xen_pvclock_gtod_notifier);
index 31bbc803cecb274bd7f100d0b9459288aa98903b..dffdc773221bf01007bc38e9471aa0636d0c6ae9 100644 (file)
@@ -1 +1,7 @@
 #include <xen/arm/page.h>
+#include <asm/mmu.h>
+
+static inline bool xen_kernel_unmapped_at_usr(void)
+{
+       return arm64_kernel_unmapped_at_el0();
+}