From: Mircea Cîrjaliu <[email protected]>

This change is needed because the introspection tool can write-protect
guest page tables or exec-protect heap/stack pages.

Signed-off-by: Mircea Cîrjaliu <[email protected]>
Signed-off-by: Adalbert Lazăr <[email protected]>
---
 arch/x86/kvm/mmu/mmu.c | 9 +++++++--
 1 file changed, 7 insertions(+), 2 deletions(-)

diff --git a/arch/x86/kvm/mmu/mmu.c b/arch/x86/kvm/mmu/mmu.c
index 7c6368ddc6a5..35be9f2a2fc7 100644
--- a/arch/x86/kvm/mmu/mmu.c
+++ b/arch/x86/kvm/mmu/mmu.c
@@ -5536,8 +5536,13 @@ int kvm_mmu_page_fault(struct kvm_vcpu *vcpu, gpa_t 
cr2_or_gpa, u64 error_code,
        if (WARN_ON(!VALID_PAGE(vcpu->arch.mmu->root_hpa)))
                return RET_PF_RETRY;
 
-       /* With shadow page tables, fault_address contains a GVA or nGPA.  */
-       if (vcpu->arch.mmu->direct_map) {
+       /*
+        * With shadow page tables, fault_address contains a GVA or nGPA.
+        * On a fetch fault, fault_address contains the instruction pointer.
+        */
+       if (vcpu->arch.mmu->direct_map &&
+           likely(!(error_code & PFERR_FETCH_MASK)) &&
+           (error_code & PFERR_GUEST_FINAL_MASK)) {
                vcpu->arch.gpa_available = true;
                vcpu->arch.gpa_val = cr2_or_gpa;
        }
_______________________________________________
Virtualization mailing list
[email protected]
https://lists.linuxfoundation.org/mailman/listinfo/virtualization

Reply via email to