|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [PATCH] x86/PV: guest_get_eff_kern_l1e() may still need to switch page tables
While indeed unnecessary for pv_ro_page_fault(), pv_map_ldt_shadow_page()
may run when guest user mode is active, and hence may need to switch to
the kernel page tables in order to retrieve an LDT page mapping.
Fixes: 9ff970564764 ("x86/mm: drop guest_get_eff_l1e()")
Reported-by: Manuel Bouyer <bouyer@xxxxxxxxxxxxxxx>
Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
---
Manuel, could you test this again, just to be on the safe side
before we throw it in (at which point we could then also again
add a Tested-by)? Thanks.
--- a/xen/arch/x86/pv/mm.h
+++ b/xen/arch/x86/pv/mm.h
@@ -11,10 +11,15 @@ int new_guest_cr3(mfn_t mfn);
*/
static inline l1_pgentry_t guest_get_eff_kern_l1e(unsigned long linear)
{
+ struct vcpu *curr = current;
+ bool user_mode = !(curr->arch.flags & TF_kernel_mode);
l1_pgentry_t l1e;
- ASSERT(!paging_mode_translate(current->domain));
- ASSERT(!paging_mode_external(current->domain));
+ ASSERT(!paging_mode_translate(curr->domain));
+ ASSERT(!paging_mode_external(curr->domain));
+
+ if ( user_mode )
+ toggle_guest_pt(curr);
if ( unlikely(!__addr_ok(linear)) ||
__copy_from_user(&l1e,
@@ -22,6 +27,9 @@ static inline l1_pgentry_t guest_get_eff
sizeof(l1_pgentry_t)) )
l1e = l1e_empty();
+ if ( user_mode )
+ toggle_guest_pt(curr);
+
return l1e;
}
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |