From: Thomas Bogendoerfer Date: Fri, 13 Nov 2020 11:09:50 +0000 (+0100) Subject: MIPS: kvm: Use vm_get_page_prot to get protection bits X-Git-Tag: accepted/tizen/unified/20230118.172025~8266^2~26 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=411406a8c758d9ad6f908fab3a6cf1d3d89e1d08;p=platform%2Fkernel%2Flinux-rpi.git MIPS: kvm: Use vm_get_page_prot to get protection bits MIPS protection bits are setup during runtime so using defines like PAGE_SHARED ignores this runtime changes. Using vm_get_page_prot to get correct page protection fixes this. Signed-off-by: Thomas Bogendoerfer --- diff --git a/arch/mips/kvm/mmu.c b/arch/mips/kvm/mmu.c index 28c366d..3dabeda 100644 --- a/arch/mips/kvm/mmu.c +++ b/arch/mips/kvm/mmu.c @@ -1074,6 +1074,7 @@ int kvm_mips_handle_commpage_tlb_fault(unsigned long badvaddr, { kvm_pfn_t pfn; pte_t *ptep; + pgprot_t prot; ptep = kvm_trap_emul_pte_for_gva(vcpu, badvaddr); if (!ptep) { @@ -1083,7 +1084,8 @@ int kvm_mips_handle_commpage_tlb_fault(unsigned long badvaddr, pfn = PFN_DOWN(virt_to_phys(vcpu->arch.kseg0_commpage)); /* Also set valid and dirty, so refill handler doesn't have to */ - *ptep = pte_mkyoung(pte_mkdirty(pfn_pte(pfn, PAGE_SHARED))); + prot = vm_get_page_prot(VM_READ|VM_WRITE|VM_SHARED); + *ptep = pte_mkyoung(pte_mkdirty(pfn_pte(pfn, prot))); /* Invalidate this entry in the TLB, guest kernel ASID only */ kvm_mips_host_tlb_inv(vcpu, badvaddr, false, true);