diff options
author | Will Deacon <will@kernel.org> | 2020-10-29 14:47:16 +0000 |
---|---|---|
committer | Marc Zyngier <maz@kernel.org> | 2020-10-29 19:49:03 +0000 |
commit | e2fc6a9f686d037cbd9b08b9fb657685b4a722d3 (patch) | |
tree | c7362c1a7526b438a27376f8333ee9560921ed9d /block/mq-deadline.c | |
parent | 4a1c2c7f63c52ccb11770b5ae25920a6b79d3548 (diff) | |
download | linux-stable-e2fc6a9f686d037cbd9b08b9fb657685b4a722d3.tar.gz linux-stable-e2fc6a9f686d037cbd9b08b9fb657685b4a722d3.tar.bz2 linux-stable-e2fc6a9f686d037cbd9b08b9fb657685b4a722d3.zip |
KVM: arm64: Fix masks in stage2_pte_cacheable()
stage2_pte_cacheable() tries to figure out whether the mapping installed
in its 'pte' parameter is cacheable or not. Unfortunately, it fails
miserably because it extracts the memory attributes from the entry using
FIELD_GET(), which returns the attributes shifted down to bit 0, but then
compares this with the unshifted value generated by the PAGE_S2_MEMATTR()
macro.
A direct consequence of this bug is that cache maintenance is silently
skipped, which in turn causes 32-bit guests to crash early on when their
set/way maintenance is trapped but not emulated correctly.
Fix the broken masks by avoiding the use of FIELD_GET() altogether.
Fixes: 6d9d2115c480 ("KVM: arm64: Add support for stage-2 map()/unmap() in generic page-table")
Reported-by: Marc Zyngier <maz@kernel.org>
Signed-off-by: Will Deacon <will@kernel.org>
Signed-off-by: Marc Zyngier <maz@kernel.org>
Cc: Quentin Perret <qperret@google.com>
Link: https://lore.kernel.org/r/20201029144716.30476-1-will@kernel.org
Diffstat (limited to 'block/mq-deadline.c')
0 files changed, 0 insertions, 0 deletions