summaryrefslogtreecommitdiff
path: root/crypto/seed.c
diff options
context:
space:
mode:
authorJames Hogan <james.hogan@imgtec.com>2017-01-03 20:43:00 +0300
committerRadim Krčmář <rkrcmar@redhat.com>2017-01-05 16:56:32 +0300
commit4c881451d3017033597ea186cf79ae41a73e1ef8 (patch)
tree42bdc78c93316c57e3d93c232ad6c88039eeb762 /crypto/seed.c
parent6ef4e07ecd2db21025c446327ecf34414366498b (diff)
downloadlinux-4c881451d3017033597ea186cf79ae41a73e1ef8.tar.xz
KVM: MIPS: Don't clobber CP0_Status.UX
On 64-bit kernels, MIPS KVM will clear CP0_Status.UX to prevent the guest (running in user mode) from accessing the 64-bit memory segments. However the previous value of CP0_Status.UX is never restored when exiting from the guest. If the user process uses 64-bit addressing (the n64 ABI) this can result in address error exceptions from the kernel if it needs to deliver a signal before returning to user mode, as the kernel will need to write a sigframe to high user addresses on the user stack which are disallowed by CP0_Status.UX=0. This is fixed by explicitly setting SX and UX again when exiting from the guest, and explicitly clearing those bits when returning to the guest. Having the SX and UX bits set when handling guest exits (rather than only when exiting to userland) will be helpful when we support VZ, since we shouldn't need to directly read or write guest memory, so it will be valid for cache management IPIs to access host user addresses. Signed-off-by: James Hogan <james.hogan@imgtec.com> Cc: Paolo Bonzini <pbonzini@redhat.com> Cc: "Radim Krčmář" <rkrcmar@redhat.com> Cc: Ralf Baechle <ralf@linux-mips.org> Cc: linux-mips@linux-mips.org Cc: kvm@vger.kernel.org Cc: <stable@vger.kernel.org> # 4.8.x- Signed-off-by: Radim Krčmář <rkrcmar@redhat.com>
Diffstat (limited to 'crypto/seed.c')
0 files changed, 0 insertions, 0 deletions