Skip to content

Commit 0741f52

Browse files
James Hoganrkrcmar
authored andcommitted
MIPS: KVM: Fix gfn range check in kseg0 tlb faults
Two consecutive gfns are loaded into host TLB, so ensure the range check isn't off by one if guest_pmap_npages is odd. Fixes: 858dd5d ("KVM/MIPS32: MMU/TLB operations for the Guest.") Signed-off-by: James Hogan <james.hogan@imgtec.com> Cc: Paolo Bonzini <pbonzini@redhat.com> Cc: "Radim Krčmář" <rkrcmar@redhat.com> Cc: Ralf Baechle <ralf@linux-mips.org> Cc: linux-mips@linux-mips.org Cc: kvm@vger.kernel.org Cc: <stable@vger.kernel.org> # 3.10.x- Signed-off-by: Radim Krčmář <rkrcmar@redhat.com>
1 parent 8985d50 commit 0741f52

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

arch/mips/kvm/mmu.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ int kvm_mips_handle_kseg0_tlb_fault(unsigned long badvaddr,
9999
}
100100

101101
gfn = (KVM_GUEST_CPHYSADDR(badvaddr) >> PAGE_SHIFT);
102-
if (gfn >= kvm->arch.guest_pmap_npages) {
102+
if ((gfn | 1) >= kvm->arch.guest_pmap_npages) {
103103
kvm_err("%s: Invalid gfn: %#llx, BadVaddr: %#lx\n", __func__,
104104
gfn, badvaddr);
105105
kvm_mips_dump_host_tlbs();

0 commit comments

Comments
 (0)