* Re: [PATCH v2] KVM: s390: Fix pfmf and conditional skey emulation
[not found] <11dc25a6-e00f-8dae-3a72-89604683ad79@de.ibm.com>
@ 2018-08-30 15:28 ` David Hildenbrand
2018-09-04 8:57 ` Christian Borntraeger
0 siblings, 1 reply; 2+ messages in thread
From: David Hildenbrand @ 2018-08-30 15:28 UTC (permalink / raw)
To: linux-s390
On 30.08.2018 17:25, Christian Borntraeger wrote:
>
>
> On 08/30/2018 04:22 PM, David Hildenbrand wrote:
>> On 30.08.2018 12:11, Christian Borntraeger wrote:
>>> Please re-add the "Fixes" tag. While not relevant for stable, it might be
>>> relevant for backport.
>>
>> Isn't that a potential endless loop in the pfmf handler? (!PFMF_SK)
>>
>> If so, this should be stable no?
>
> the patches made it in after 4.18 (for 4.19) so no stable if I got that
> right.
>
ahh right, missed that ...
--
Thanks,
David / dhildenb
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: [PATCH v2] KVM: s390: Fix pfmf and conditional skey emulation
2018-08-30 15:28 ` [PATCH v2] KVM: s390: Fix pfmf and conditional skey emulation David Hildenbrand
@ 2018-09-04 8:57 ` Christian Borntraeger
0 siblings, 0 replies; 2+ messages in thread
From: Christian Borntraeger @ 2018-09-04 8:57 UTC (permalink / raw)
To: linux-s390
On 08/30/2018 10:13 AM, Janosch Frank wrote:
> We should not return with a lock.
> We also have to increase the address when we do page clearing.
>
> Signed-off-by: Janosch Frank <frankja@linux.ibm.com>
> ---
>
> I knew there were more instances...
Thanks applied.
>
> ---
> arch/s390/kvm/priv.c | 30 ++++++++++++++++++------------
> 1 file changed, 18 insertions(+), 12 deletions(-)
>
> diff --git a/arch/s390/kvm/priv.c b/arch/s390/kvm/priv.c
> index d68f10441a16..8679bd74d337 100644
> --- a/arch/s390/kvm/priv.c
> +++ b/arch/s390/kvm/priv.c
> @@ -280,9 +280,11 @@ static int handle_iske(struct kvm_vcpu *vcpu)
> goto retry;
> }
> }
> - if (rc)
> - return kvm_s390_inject_program_int(vcpu, PGM_ADDRESSING);
> up_read(¤t->mm->mmap_sem);
> + if (rc == -EFAULT)
> + return kvm_s390_inject_program_int(vcpu, PGM_ADDRESSING);
> + if (rc < 0)
> + return rc;
> vcpu->run->s.regs.gprs[reg1] &= ~0xff;
> vcpu->run->s.regs.gprs[reg1] |= key;
> return 0;
> @@ -324,9 +326,11 @@ static int handle_rrbe(struct kvm_vcpu *vcpu)
> goto retry;
> }
> }
> - if (rc < 0)
> - return kvm_s390_inject_program_int(vcpu, PGM_ADDRESSING);
> up_read(¤t->mm->mmap_sem);
> + if (rc == -EFAULT)
> + return kvm_s390_inject_program_int(vcpu, PGM_ADDRESSING);
> + if (rc < 0)
> + return rc;
> kvm_s390_set_psw_cc(vcpu, rc);
> return 0;
> }
> @@ -390,12 +394,12 @@ static int handle_sske(struct kvm_vcpu *vcpu)
> FAULT_FLAG_WRITE, &unlocked);
> rc = !rc ? -EAGAIN : rc;
> }
> + up_read(¤t->mm->mmap_sem);
> if (rc == -EFAULT)
> return kvm_s390_inject_program_int(vcpu, PGM_ADDRESSING);
> -
> - up_read(¤t->mm->mmap_sem);
> - if (rc >= 0)
> - start += PAGE_SIZE;
> + if (rc < 0)
> + return rc;
> + start += PAGE_SIZE;
> }
>
> if (m3 & (SSKE_MC | SSKE_MR)) {
> @@ -1002,13 +1006,15 @@ static int handle_pfmf(struct kvm_vcpu *vcpu)
> FAULT_FLAG_WRITE, &unlocked);
> rc = !rc ? -EAGAIN : rc;
> }
> + up_read(¤t->mm->mmap_sem);
> if (rc == -EFAULT)
> return kvm_s390_inject_program_int(vcpu, PGM_ADDRESSING);
> -
> - up_read(¤t->mm->mmap_sem);
> - if (rc >= 0)
> - start += PAGE_SIZE;
> + if (rc == -EAGAIN)
> + continue;
> + if (rc < 0)
> + return rc;
> }
> + start += PAGE_SIZE;
> }
> if (vcpu->run->s.regs.gprs[reg1] & PFMF_FSC) {
> if (psw_bits(vcpu->arch.sie_block->gpsw).eaba == PSW_BITS_AMODE_64BIT) {
>
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2018-09-04 8:57 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <11dc25a6-e00f-8dae-3a72-89604683ad79@de.ibm.com>
2018-08-30 15:28 ` [PATCH v2] KVM: s390: Fix pfmf and conditional skey emulation David Hildenbrand
2018-09-04 8:57 ` Christian Borntraeger
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).