From patchwork Wed Dec 11 16:56:47 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Marc Zyngier X-Patchwork-Id: 11285741 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id A895A15AB for ; Wed, 11 Dec 2019 16:57:10 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 7DA052464B for ; Wed, 11 Dec 2019 16:57:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1576083430; bh=oJarIOt6t8dqOaeavUDWnTVs/9uhcPVOmAtL+ftiFO0=; h=From:To:Cc:Subject:Date:List-ID:From; b=z3T4QTeW2PJnjjps26FIKXNAWwg100925mm+b4qLzDtTqI83xIb2wiGbSOMv6a/2B K5HEeSyH1ALaBctg0UA4lBKGF6PhSd0UDfoGf6dKYuz5eMt9e2CYyFq66r8NMhgcwu 5z4NTICvAn4Z6rllpY6E4H9b9t6qifiodPqYLZD0= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730315AbfLKQ5I (ORCPT ); Wed, 11 Dec 2019 11:57:08 -0500 Received: from inca-roads.misterjones.org ([213.251.177.50]:58772 "EHLO inca-roads.misterjones.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730107AbfLKQ5H (ORCPT ); Wed, 11 Dec 2019 11:57:07 -0500 Received: from 78.163-31-62.static.virginmediabusiness.co.uk ([62.31.163.78] helo=why.lan) by cheepnis.misterjones.org with esmtpsa (TLSv1.2:DHE-RSA-AES128-GCM-SHA256:128) (Exim 4.80) (envelope-from ) id 1if5IN-00076q-Pr; Wed, 11 Dec 2019 17:57:04 +0100 From: Marc Zyngier To: kvm@vger.kernel.org, kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org Cc: James Morse , Julien Thierry , Suzuki K Poulose , Christoffer Dall , Alexandru Elisei Subject: [PATCH 0/3] KVM: arm/arm64: user_mem_abort() assorted fixes Date: Wed, 11 Dec 2019 16:56:47 +0000 Message-Id: <20191211165651.7889-1-maz@kernel.org> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 X-SA-Exim-Connect-IP: 62.31.163.78 X-SA-Exim-Rcpt-To: kvm@vger.kernel.org, kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, james.morse@arm.com, julien.thierry.kdev@gmail.com, suzuki.poulose@arm.com, Christoffer.Dall@arm.com, alexandru.elisei@arm.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on cheepnis.misterjones.org); SAEximRunCond expanded to false Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org Alexandru recently reported an interesting issue with our handling of device mapping in user_mem_abort(), which is sligtly less than correct. The first patch of the series address this issue, and is a stable candidate. While I was looking at this code, I spotted what I think is a potential issue when handling a poisoned page, where we can race with a VMA being removed. This second patch is mostly a RFC, as this is not my area of expertise. Finally, the last patch is a cleanup removing an unnecessary console output. Marc Zyngier (3): KVM: arm/arm64: Properly handle faulting of device mappings KVM: arm/arm64: Re-check VMA on detecting a poisoned page KVM: arm/arm64: Drop spurious message when faulting on a non-existent mapping virt/kvm/arm/mmu.c | 47 +++++++++++++++++++++++++++++++++++++++------- 1 file changed, 40 insertions(+), 7 deletions(-)