aboutsummaryrefslogtreecommitdiffstats
path: root/common/recipes-kernel/linux/linux-yocto-4.9.21/0029-KVM-async_pf-Fix-DF-due-to-inject-Page-not-Present-a.patch
diff options
context:
space:
mode:
Diffstat (limited to 'common/recipes-kernel/linux/linux-yocto-4.9.21/0029-KVM-async_pf-Fix-DF-due-to-inject-Page-not-Present-a.patch')
-rw-r--r--common/recipes-kernel/linux/linux-yocto-4.9.21/0029-KVM-async_pf-Fix-DF-due-to-inject-Page-not-Present-a.patch105
1 files changed, 0 insertions, 105 deletions
diff --git a/common/recipes-kernel/linux/linux-yocto-4.9.21/0029-KVM-async_pf-Fix-DF-due-to-inject-Page-not-Present-a.patch b/common/recipes-kernel/linux/linux-yocto-4.9.21/0029-KVM-async_pf-Fix-DF-due-to-inject-Page-not-Present-a.patch
deleted file mode 100644
index b50d5453..00000000
--- a/common/recipes-kernel/linux/linux-yocto-4.9.21/0029-KVM-async_pf-Fix-DF-due-to-inject-Page-not-Present-a.patch
+++ /dev/null
@@ -1,105 +0,0 @@
-From 8e13680f134458dd1b0529ccb636ae5895fa8a4d Mon Sep 17 00:00:00 2001
-From: Wanpeng Li <wanpeng.li@hotmail.com>
-Date: Thu, 14 Sep 2017 03:54:16 -0700
-Subject: [PATCH 29/33] KVM: async_pf: Fix #DF due to inject "Page not Present"
- and "Page Ready" exceptions simultaneously
-MIME-Version: 1.0
-Content-Type: text/plain; charset=UTF-8
-Content-Transfer-Encoding: 8bit
-
-commit 9a6e7c39810e4a8bc7fc95056cefb40583fe07ef upstream.
-
-qemu-system-x86-8600 [004] d..1 7205.687530: kvm_entry: vcpu 2
-qemu-system-x86-8600 [004] .... 7205.687532: kvm_exit: reason EXCEPTION_NMI rip 0xffffffffa921297d info ffffeb2c0e44e018 80000b0e
-qemu-system-x86-8600 [004] .... 7205.687532: kvm_page_fault: address ffffeb2c0e44e018 error_code 0
-qemu-system-x86-8600 [004] .... 7205.687620: kvm_try_async_get_page: gva = 0xffffeb2c0e44e018, gfn = 0x427e4e
-qemu-system-x86-8600 [004] .N.. 7205.687628: kvm_async_pf_not_present: token 0x8b002 gva 0xffffeb2c0e44e018
- kworker/4:2-7814 [004] .... 7205.687655: kvm_async_pf_completed: gva 0xffffeb2c0e44e018 address 0x7fcc30c4e000
-qemu-system-x86-8600 [004] .... 7205.687703: kvm_async_pf_ready: token 0x8b002 gva 0xffffeb2c0e44e018
-qemu-system-x86-8600 [004] d..1 7205.687711: kvm_entry: vcpu 2
-
-After running some memory intensive workload in guest, I catch the kworker
-which completes the GUP too quickly, and queues an "Page Ready" #PF exception
-after the "Page not Present" exception before the next vmentry as the above
-trace which will result in #DF injected to guest.
-
-This patch fixes it by clearing the queue for "Page not Present" if "Page Ready"
-occurs before the next vmentry since the GUP has already got the required page
-and shadow page table has already been fixed by "Page Ready" handler.
-
-Cc: Paolo Bonzini <pbonzini@redhat.com>
-Cc: Radim Krčmář <rkrcmar@redhat.com>
-Signed-off-by: Wanpeng Li <wanpeng.li@hotmail.com>
-Fixes: 7c90705bf2a3 ("KVM: Inject asynchronous page fault into a PV guest if page is swapped out.")
-[Changed indentation and added clearing of injected. - Radim]
-Signed-off-by: Radim Krčmář <rkrcmar@redhat.com>
-[port from upstream v4.14-rc1, Don't assign to kvm_queued_exception::injected or
- x86_exception::async_page_fault]
-Signed-off-by: Jack Wang <jinpu.wang@profitbricks.com>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- arch/x86/kvm/x86.c | 34 ++++++++++++++++++++++++++--------
- 1 file changed, 26 insertions(+), 8 deletions(-)
-
-diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
-index af333e1..9f0f7e2 100644
---- a/arch/x86/kvm/x86.c
-+++ b/arch/x86/kvm/x86.c
-@@ -8370,6 +8370,13 @@ static int apf_put_user(struct kvm_vcpu *vcpu, u32 val)
- sizeof(val));
- }
-
-+static int apf_get_user(struct kvm_vcpu *vcpu, u32 *val)
-+{
-+
-+ return kvm_read_guest_cached(vcpu->kvm, &vcpu->arch.apf.data, val,
-+ sizeof(u32));
-+}
-+
- void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
- struct kvm_async_pf *work)
- {
-@@ -8396,6 +8403,7 @@ void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
- struct kvm_async_pf *work)
- {
- struct x86_exception fault;
-+ u32 val;
-
- trace_kvm_async_pf_ready(work->arch.token, work->gva);
- if (work->wakeup_all)
-@@ -8403,14 +8411,24 @@ void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
- else
- kvm_del_async_pf_gfn(vcpu, work->arch.gfn);
-
-- if ((vcpu->arch.apf.msr_val & KVM_ASYNC_PF_ENABLED) &&
-- !apf_put_user(vcpu, KVM_PV_REASON_PAGE_READY)) {
-- fault.vector = PF_VECTOR;
-- fault.error_code_valid = true;
-- fault.error_code = 0;
-- fault.nested_page_fault = false;
-- fault.address = work->arch.token;
-- kvm_inject_page_fault(vcpu, &fault);
-+ if (vcpu->arch.apf.msr_val & KVM_ASYNC_PF_ENABLED &&
-+ !apf_get_user(vcpu, &val)) {
-+ if (val == KVM_PV_REASON_PAGE_NOT_PRESENT &&
-+ vcpu->arch.exception.pending &&
-+ vcpu->arch.exception.nr == PF_VECTOR &&
-+ !apf_put_user(vcpu, 0)) {
-+ vcpu->arch.exception.pending = false;
-+ vcpu->arch.exception.nr = 0;
-+ vcpu->arch.exception.has_error_code = false;
-+ vcpu->arch.exception.error_code = 0;
-+ } else if (!apf_put_user(vcpu, KVM_PV_REASON_PAGE_READY)) {
-+ fault.vector = PF_VECTOR;
-+ fault.error_code_valid = true;
-+ fault.error_code = 0;
-+ fault.nested_page_fault = false;
-+ fault.address = work->arch.token;
-+ kvm_inject_page_fault(vcpu, &fault);
-+ }
- }
- vcpu->arch.apf.halted = false;
- vcpu->arch.mp_state = KVM_MP_STATE_RUNNABLE;
---
-2.7.4
-