lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAAhV-H705XKtA0CrvWU5pneHcOST7WFWS=JTSc3oESDwvjxG-w@mail.gmail.com>
Date: Sat, 4 Jan 2025 22:04:38 +0800
From: Huacai Chen <chenhuacai@...nel.org>
To: Bibo Mao <maobibo@...ngson.cn>
Cc: Tianrui Zhao <zhaotianrui@...ngson.cn>, WANG Xuerui <kernel@...0n.name>, kvm@...r.kernel.org, 
	loongarch@...ts.linux.dev, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] LoongArch: KVM: Clear LLBCTL if secondary mmu mapping is changed

Queued, thanks.

Huacai

On Thu, Jan 2, 2025 at 4:36 PM Bibo Mao <maobibo@...ngson.cn> wrote:
>
> Register LLBCTL is separated CSR register from host, host exception
> eret instruction will clear host LLBCTL CSR register, guest
> exception will clear guest LLBCTL CSR register.
>
> VCPU0 atomic64_fetch_add_unless     VCPU1 atomic64_fetch_add_unless
>      ll.d    %[p],  %[c]
>      beq     %[p],  %[u], 1f
> Here secondary mmu mapping is changed, host hpa page is replaced
> with new page. And VCPU1 executed atomic instruction on new
> page.
>                                        ll.d    %[p],  %[c]
>                                        beq     %[p],  %[u], 1f
>                                        add.d   %[rc], %[p], %[a]
>                                        sc.d    %[rc], %[c]
>      add.d   %[rc], %[p], %[a]
>      sc.d    %[rc], %[c]
> LLBCTL is set on VCPU0 and it represents the memory is not modified
> bt other VCPUs, sc.d will modify the memory directly.
>
> Here clear guest LLBCTL_WCLLB register when mapping is the changed.
>
> Signed-off-by: Bibo Mao <maobibo@...ngson.cn>
> ---
>  arch/loongarch/kvm/main.c | 18 ++++++++++++++++++
>  1 file changed, 18 insertions(+)
>
> diff --git a/arch/loongarch/kvm/main.c b/arch/loongarch/kvm/main.c
> index 396fed2665a5..7566fa85f8e7 100644
> --- a/arch/loongarch/kvm/main.c
> +++ b/arch/loongarch/kvm/main.c
> @@ -245,6 +245,24 @@ void kvm_check_vpid(struct kvm_vcpu *vcpu)
>                 trace_kvm_vpid_change(vcpu, vcpu->arch.vpid);
>                 vcpu->cpu = cpu;
>                 kvm_clear_request(KVM_REQ_TLB_FLUSH_GPA, vcpu);
> +
> +               /*
> +                * LLBCTL is separated CSR register from host, general exception
> +                * eret instruction in host mode clears host LLBCTL register,
> +                * and clears guest register in guest mode. eret in refill
> +                * exception does not clear LLBCTL register.
> +                *
> +                * When second mmu mapping is changed, guest OS does not know
> +                * even if the content is changed after mapping is changed
> +                *
> +                * Here clear guest LLBCTL register when mapping is changed,
> +                * else if mapping is changed when guest is executing
> +                * LL/SC pair, LL loads with old address and set LLBCTL flag,
> +                * SC checks LLBCTL flag and store new address successfully
> +                * since LLBCTL_WCLLB is on, even if memory with new address is
> +                * changed on other VCPUs.
> +                */
> +               set_gcsr_llbctl(CSR_LLBCTL_WCLLB);
>         }
>
>         /* Restore GSTAT(0x50).vpid */
>
> base-commit: fc033cf25e612e840e545f8d5ad2edd6ba613ed5
> --
> 2.39.3
>
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ