Alexander Graf 078dc4
From: Paolo Bonzini <pbonzini@redhat.com>
Alexander Graf 078dc4
Date: Fri, 11 Aug 2017 18:36:43 +0200
Alexander Graf 078dc4
Subject: KVM: SVM: limit kvm_handle_page_fault to #PF handling
Alexander Graf 078dc4
Patch-mainline: v4.15-rc1
Alexander Graf 078dc4
Git-commit: d0006530576f1c7a49b2010eac7afdcb5a3613ae
Alexander Graf 078dc4
References: bsc#1077761
Alexander Graf 078dc4
Alexander Graf 078dc4
It has always annoyed me a bit how SVM_EXIT_NPF is handled by
Alexander Graf 078dc4
pf_interception.  This is also the only reason behind the
Alexander Graf 078dc4
under-documented need_unprotect argument to kvm_handle_page_fault.
Alexander Graf 078dc4
Let NPF go straight to kvm_mmu_page_fault, just like VMX
Alexander Graf 078dc4
does in handle_ept_violation and handle_ept_misconfig.
Alexander Graf 078dc4
Alexander Graf 078dc4
Reviewed-by: Brijesh Singh <brijesh.singh@amd.com>
Alexander Graf 078dc4
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Alexander Graf 078dc4
Acked-by: Alexander Graf <agraf@suse.de>
Alexander Graf 078dc4
---
Alexander Graf 078dc4
 arch/x86/kvm/mmu.c |    5 ++---
Alexander Graf 078dc4
 arch/x86/kvm/mmu.h |    3 +--
Alexander Graf 078dc4
 arch/x86/kvm/svm.c |   15 +++++++++++++--
Alexander Graf 078dc4
 arch/x86/kvm/vmx.c |    3 +--
Alexander Graf 078dc4
 4 files changed, 17 insertions(+), 9 deletions(-)
Alexander Graf 078dc4
Alexander Graf 078dc4
--- a/arch/x86/kvm/mmu.c
Alexander Graf 078dc4
+++ b/arch/x86/kvm/mmu.c
Alexander Graf 078dc4
@@ -3820,8 +3820,7 @@
Alexander Graf 078dc4
 }
Alexander Graf 078dc4
 
Alexander Graf 078dc4
 int kvm_handle_page_fault(struct kvm_vcpu *vcpu, u64 error_code,
Alexander Graf 078dc4
-				u64 fault_address, char *insn, int insn_len,
Alexander Graf 078dc4
-				bool need_unprotect)
Alexander Graf 078dc4
+				u64 fault_address, char *insn, int insn_len)
Alexander Graf 078dc4
 {
Alexander Graf 078dc4
 	int r = 1;
Alexander Graf 078dc4
 
Alexander Graf 078dc4
@@ -3829,7 +3828,7 @@
Alexander Graf 078dc4
 	default:
Alexander Graf 078dc4
 		trace_kvm_page_fault(fault_address, error_code);
Alexander Graf 078dc4
 
Alexander Graf 078dc4
-		if (need_unprotect && kvm_event_needs_reinjection(vcpu))
Alexander Graf 078dc4
+		if (kvm_event_needs_reinjection(vcpu))
Alexander Graf 078dc4
 			kvm_mmu_unprotect_page_virt(vcpu, fault_address);
Alexander Graf 078dc4
 		r = kvm_mmu_page_fault(vcpu, fault_address, error_code, insn,
Alexander Graf 078dc4
 				insn_len);
Alexander Graf 078dc4
--- a/arch/x86/kvm/mmu.h
Alexander Graf 078dc4
+++ b/arch/x86/kvm/mmu.h
Alexander Graf 078dc4
@@ -65,8 +65,7 @@
Alexander Graf 078dc4
 			     bool accessed_dirty);
Alexander Graf 078dc4
 bool kvm_can_do_async_pf(struct kvm_vcpu *vcpu);
Alexander Graf 078dc4
 int kvm_handle_page_fault(struct kvm_vcpu *vcpu, u64 error_code,
Alexander Graf 078dc4
-				u64 fault_address, char *insn, int insn_len,
Alexander Graf 078dc4
-				bool need_unprotect);
Alexander Graf 078dc4
+				u64 fault_address, char *insn, int insn_len);
Alexander Graf 078dc4
 
Alexander Graf 078dc4
 static inline unsigned int kvm_mmu_available_pages(struct kvm *kvm)
Alexander Graf 078dc4
 {
Alexander Graf 078dc4
--- a/arch/x86/kvm/svm.c
Alexander Graf 078dc4
+++ b/arch/x86/kvm/svm.c
Alexander Graf 078dc4
@@ -2140,7 +2140,18 @@
Alexander Graf 078dc4
 
Alexander Graf 078dc4
 	return kvm_handle_page_fault(&svm->vcpu, error_code, fault_address,
Alexander Graf 078dc4
 			svm->vmcb->control.insn_bytes,
Alexander Graf 078dc4
-			svm->vmcb->control.insn_len, !npt_enabled);
Alexander Graf 078dc4
+			svm->vmcb->control.insn_len);
Alexander Graf 078dc4
+}
Alexander Graf 078dc4
+
Alexander Graf 078dc4
+static int npf_interception(struct vcpu_svm *svm)
Alexander Graf 078dc4
+{
Alexander Graf 078dc4
+	u64 fault_address = svm->vmcb->control.exit_info_2;
Alexander Graf 078dc4
+	u64 error_code = svm->vmcb->control.exit_info_1;
Alexander Graf 078dc4
+
Alexander Graf 078dc4
+	trace_kvm_page_fault(fault_address, error_code);
Alexander Graf 078dc4
+	return kvm_mmu_page_fault(&svm->vcpu, fault_address, error_code,
Alexander Graf 078dc4
+			svm->vmcb->control.insn_bytes,
Alexander Graf 078dc4
+			svm->vmcb->control.insn_len);
Alexander Graf 078dc4
 }
Alexander Graf 078dc4
 
Alexander Graf 078dc4
 static int db_interception(struct vcpu_svm *svm)
Alexander Graf 078dc4
@@ -4127,7 +4138,7 @@
Alexander Graf 078dc4
 	[SVM_EXIT_MONITOR]			= monitor_interception,
Alexander Graf 078dc4
 	[SVM_EXIT_MWAIT]			= mwait_interception,
Alexander Graf 078dc4
 	[SVM_EXIT_XSETBV]			= xsetbv_interception,
Alexander Graf 078dc4
-	[SVM_EXIT_NPF]				= pf_interception,
Alexander Graf 078dc4
+	[SVM_EXIT_NPF]				= npf_interception,
Alexander Graf 078dc4
 	[SVM_EXIT_RSM]                          = emulate_on_interception,
Alexander Graf 078dc4
 	[SVM_EXIT_AVIC_INCOMPLETE_IPI]		= avic_incomplete_ipi_interception,
Alexander Graf 078dc4
 	[SVM_EXIT_AVIC_UNACCELERATED_ACCESS]	= avic_unaccelerated_access_interception,
Alexander Graf 078dc4
--- a/arch/x86/kvm/vmx.c
Alexander Graf 078dc4
+++ b/arch/x86/kvm/vmx.c
Alexander Graf 078dc4
@@ -5881,8 +5881,7 @@
Alexander Graf 078dc4
 		cr2 = vmcs_readl(EXIT_QUALIFICATION);
Alexander Graf 078dc4
 		/* EPT won't cause page fault directly */
Alexander Graf 078dc4
 		WARN_ON_ONCE(!vcpu->arch.apf.host_apf_reason && enable_ept);
Alexander Graf 078dc4
-		return kvm_handle_page_fault(vcpu, error_code, cr2, NULL, 0,
Alexander Graf 078dc4
-				true);
Alexander Graf 078dc4
+		return kvm_handle_page_fault(vcpu, error_code, cr2, NULL, 0);
Alexander Graf 078dc4
 	}
Alexander Graf 078dc4
 
Alexander Graf 078dc4
 	ex_no = intr_info & INTR_INFO_VECTOR_MASK;