From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2F3D5C433E0 for ; Tue, 16 Jun 2020 10:44:43 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 067CC207C4 for ; Tue, 16 Jun 2020 10:44:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592304283; bh=lloVmChK9OrXmXzlKaLD+6PLK2LH0ZIP65WT9nuFkUc=; h=Subject:To:Cc:From:Date:List-ID:From; b=fbnAtQ40OTC0r8OAUOjAzWZjzpgDjULuSlmMPkQAi3lv1K/KTufWmRN/VRXa9fAc9 k2lYPczxArFc9aZv65mbUAhTUz7de44YkMfT0mQxHX1lk/yCEpqT54kcP89b1meG1w gEXW9tg10whzdU8zHN3SOjmAYZMjwQZx+OlHSs9A= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728414AbgFPKom (ORCPT ); Tue, 16 Jun 2020 06:44:42 -0400 Received: from forward5-smtp.messagingengine.com ([66.111.4.239]:35379 "EHLO forward5-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728154AbgFPKol (ORCPT ); Tue, 16 Jun 2020 06:44:41 -0400 Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailforward.nyi.internal (Postfix) with ESMTP id CC62C19405F4; Tue, 16 Jun 2020 06:44:40 -0400 (EDT) Received: from mailfrontend2 ([10.202.2.163]) by compute1.internal (MEProxy); Tue, 16 Jun 2020 06:44:40 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :date:from:message-id:mime-version:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=aeBR1G A/4R/Pi8n5N1SH6C5bRNs/CGdvlmaErqk/OWE=; b=NNiRhz0Uoy/lBrVt53GXl2 G802xhcwMwSy8HGjkrLnFIl3RBi2OmLP6rQANL27NExhrPAIrYLpTYKI1PKUBcXK 5y0oLcGxJzPNUypImEW0N7jMc+zETUyalIffKzVTbaUaZmGDw3hLELRXp1BLcl87 iKNR2TExSK3ZFIpP566GbIfTNPGhyhv2I7dnyKycnwlU5E4yB6oWNwmHYovH94Yj GNY5WVVaYxcegW2I/EY7xCo4cTP62jAZKlazlt7KtCzdHIU+TfisvvCIKVciGVhA r7Q95XfOXZ+Xrs66kHBforBBxEUuDkmPrpYbBXshJQ47jvCx3BSsHkX6VQ4c/g6Q == X-ME-Sender: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduhedrudejtddgfeehucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpefuvffhfffkgggtgfesthekredttd dtlfenucfhrhhomhepoehgrhgvghhkhheslhhinhhugihfohhunhgurghtihhonhdrohhr gheqnecuggftrfgrthhtvghrnhepudeuhedvvddutdekveffueeiffduvedtudetgfdutd ekvefhudekleevfeeghfelnecuffhomhgrihhnpegrphhfrdhhohhsthenucfkphepkeef rdekiedrkeelrddutdejnecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrg hilhhfrhhomhepghhrvghgsehkrhhorghhrdgtohhm X-ME-Proxy: Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) by mail.messagingengine.com (Postfix) with ESMTPA id 2BA3B3061DC5; Tue, 16 Jun 2020 06:44:40 -0400 (EDT) Subject: FAILED: patch "[PATCH] KVM: nSVM: fix condition for filtering async PF" failed to apply to 4.4-stable tree To: pbonzini@redhat.com, sean.j.christopherson@intel.com Cc: From: Date: Tue, 16 Jun 2020 12:44:32 +0200 Message-ID: <15923042722669@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=ANSI_X3.4-1968 Content-Transfer-Encoding: 8bit Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org The patch below does not apply to the 4.4-stable tree. If someone wants it applied there, or to any other stable or longterm tree, then please email the backport, including the original git commit id to . thanks, greg k-h ------------------ original commit in Linus's tree ------------------ >From a3535be731c2a343912578465021f50937f7b099 Mon Sep 17 00:00:00 2001 From: Paolo Bonzini Date: Sat, 16 May 2020 09:19:06 -0400 Subject: [PATCH] KVM: nSVM: fix condition for filtering async PF Async page faults have to be trapped in the host (L1 in this case), since the APF reason was passed from L0 to L1 and stored in the L1 APF data page. This was completely reversed: the page faults were passed to the guest, a L2 hypervisor. Cc: stable@vger.kernel.org Reviewed-by: Sean Christopherson Signed-off-by: Paolo Bonzini diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c index a89a166d1cb8..f4cd2d0cc360 100644 --- a/arch/x86/kvm/svm/nested.c +++ b/arch/x86/kvm/svm/nested.c @@ -880,8 +880,8 @@ int nested_svm_exit_special(struct vcpu_svm *svm) return NESTED_EXIT_HOST; break; case SVM_EXIT_EXCP_BASE + PF_VECTOR: - /* When we're shadowing, trap PFs, but not async PF */ - if (!npt_enabled && svm->vcpu.arch.apf.host_apf_reason == 0) + /* Trap async PF even if not shadowing */ + if (!npt_enabled || svm->vcpu.arch.apf.host_apf_reason) return NESTED_EXIT_HOST; break; default: