|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] [tip:x86/mm] x86, xen: Disable highmem PTE allocation even w
To: |
linux-tip-commits@xxxxxxxxxxxxxxx |
Subject: |
[Xen-devel] [tip:x86/mm] x86, xen: Disable highmem PTE allocation even when CONFIG_HIGHPTE=y |
From: |
tip-bot for Ian Campbell <ian.campbell@xxxxxxxxxx> |
Date: |
Sat, 27 Feb 2010 23:51:38 GMT |
Cc: |
jeremy@xxxxxxxx, xen-devel@xxxxxxxxxxxxxxxxxxx, ian.campbell@xxxxxxxxxx, linux-kernel@xxxxxxxxxxxxxxx, mingo@xxxxxxxxxx, hpa@xxxxxxxxx, tglx@xxxxxxxxxxxxx, mingo@xxxxxxx |
Delivery-date: |
Sat, 27 Feb 2010 15:52:45 -0800 |
Envelope-to: |
www-data@xxxxxxxxxxxxxxxxxxx |
Git-commit-id: |
817a824b75b1475f1b067c8cee318c7b4d66fcde |
In-reply-to: |
<1267204562-11844-1-git-send-email-ian.campbell@xxxxxxxxxx> |
List-help: |
<mailto:xen-devel-request@lists.xensource.com?subject=help> |
List-id: |
Xen developer discussion <xen-devel.lists.xensource.com> |
List-post: |
<mailto:xen-devel@lists.xensource.com> |
List-subscribe: |
<http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe> |
List-unsubscribe: |
<http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe> |
References: |
<1267204562-11844-1-git-send-email-ian.campbell@xxxxxxxxxx> |
Reply-to: |
mingo@xxxxxxxxxx, hpa@xxxxxxxxx, linux-kernel@xxxxxxxxxxxxxxx, pasik@xxxxxx, ian.campbell@xxxxxxxxxx, jeremy@xxxxxxxx, tglx@xxxxxxxxxxxxx, mingo@xxxxxxx, xen-devel@xxxxxxxxxxxxxxxxxxx |
Sender: |
xen-devel-bounces@xxxxxxxxxxxxxxxxxxx |
Commit-ID: 817a824b75b1475f1b067c8cee318c7b4d66fcde
Gitweb: http://git.kernel.org/tip/817a824b75b1475f1b067c8cee318c7b4d66fcde
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
AuthorDate: Fri, 26 Feb 2010 17:16:00 +0000
Committer: H. Peter Anvin <hpa@xxxxxxxxx>
CommitDate: Sat, 27 Feb 2010 14:41:01 -0800
x86, xen: Disable highmem PTE allocation even when CONFIG_HIGHPTE=y
There's a path in the pagefault code where the kernel deliberately
breaks its own locking rules by kmapping a high pte page without
holding the pagetable lock (in at least page_check_address). This
breaks Xen's ability to track the pinned/unpinned state of the
page. There does not appear to be a viable workaround for this
behaviour so simply disable HIGHPTE for all Xen guests.
Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
LKML-Reference: <1267204562-11844-1-git-send-email-ian.campbell@xxxxxxxxxx>
Cc: Jeremy Fitzhardinge <jeremy@xxxxxxxx>
Cc: Ingo Molnar <mingo@xxxxxxx>
Cc: Pasi Kärkkäinen <pasik@xxxxxx>
Cc: <stable@xxxxxxxxxx> # .32.x: 14315592: Allow highmem user page tables to be
disabled at boot time
Cc: <stable@xxxxxxxxxx> # .32.x
Cc: <xen-devel@xxxxxxxxxxxxxxxxxxx>
Signed-off-by: H. Peter Anvin <hpa@xxxxxxxxx>
---
arch/x86/xen/enlighten.c | 7 +++++++
arch/x86/xen/mmu.c | 11 ++++++-----
2 files changed, 13 insertions(+), 5 deletions(-)
diff --git a/arch/x86/xen/enlighten.c b/arch/x86/xen/enlighten.c
index 36daccb..b607239 100644
--- a/arch/x86/xen/enlighten.c
+++ b/arch/x86/xen/enlighten.c
@@ -50,6 +50,7 @@
#include <asm/traps.h>
#include <asm/setup.h>
#include <asm/desc.h>
+#include <asm/pgalloc.h>
#include <asm/pgtable.h>
#include <asm/tlbflush.h>
#include <asm/reboot.h>
@@ -1094,6 +1095,12 @@ asmlinkage void __init xen_start_kernel(void)
__supported_pte_mask |= _PAGE_IOMAP;
+ /*
+ * Prevent page tables from being allocated in highmem, even
+ * if CONFIG_HIGHPTE is enabled.
+ */
+ __userpte_alloc_gfp &= ~__GFP_HIGHMEM;
+
/* Work out if we support NX */
x86_configure_nx();
diff --git a/arch/x86/xen/mmu.c b/arch/x86/xen/mmu.c
index bf4cd6b..350a3de 100644
--- a/arch/x86/xen/mmu.c
+++ b/arch/x86/xen/mmu.c
@@ -1432,14 +1432,15 @@ static void *xen_kmap_atomic_pte(struct page *page,
enum km_type type)
{
pgprot_t prot = PAGE_KERNEL;
+ /*
+ * We disable highmem allocations for page tables so we should never
+ * see any calls to kmap_atomic_pte on a highmem page.
+ */
+ BUG_ON(PageHighMem(page));
+
if (PagePinned(page))
prot = PAGE_KERNEL_RO;
- if (0 && PageHighMem(page))
- printk("mapping highpte %lx type %d prot %s\n",
- page_to_pfn(page), type,
- (unsigned long)pgprot_val(prot) & _PAGE_RW ? "WRITE" :
"READ");
-
return kmap_atomic_prot(page, type, prot);
}
#endif
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|