From nobody Tue Feb 10 05:17:23 2026 Received: from mail-pl1-f201.google.com (mail-pl1-f201.google.com [209.85.214.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 92934329E52 for ; Thu, 13 Nov 2025 22:56:40 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763074602; cv=none; b=NaWwMMWioNsQ8m8dcrcalJkQeiInRdIqBb4C/KHdSBShMO1dZH1Z+BQ4744pVJFSXD0jQulMUhZbryf1HcUk3J5UoLarFIZH/DBf08Iihd5K6GCBmztkRMG2vb4Mdi4Ne0x1EpVbClJ0tyxIegMfEZsp1Zz48llM+YXROIsaNpE= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1763074602; c=relaxed/simple; bh=+X6sod/HQNu/SJbZY670DshcFgt84tBrtiEH6SU0y2k=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=mb8gMRtSS0f7TB6qe/ERsb1eyz1nwywHJr7ddClvTQoKQw4CdbgWuLoyT8+hxKfP6n7WAHEkkNnMgMu9TVZjc81pT5nbVnJR1EweLT1Uvwq0KE4kQXX5GZG9w695rL/RFOtBXpcXjukX9Z45tjhSRqKOtcqJcFrfhvdwhxB3a78= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=QfRGepqE; arc=none smtp.client-ip=209.85.214.201 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="QfRGepqE" Received: by mail-pl1-f201.google.com with SMTP id d9443c01a7336-297ddb3c707so12408555ad.2 for ; Thu, 13 Nov 2025 14:56:40 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1763074600; x=1763679400; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:from:to:cc:subject:date:message-id:reply-to; bh=yCySYnLm9S91HvD17dKSq/J5PnFR2ZVykwVecEeKkWU=; b=QfRGepqEstcQBwfs5YonUBrj2TXS+O+pBasgqFDz6SM+eXAaEnYhbAXF7CTXhI1dUM SlhsqZbPHxUwAOlakgb0jg+PVeAk5XZBrA9cp4umYbnVJYFkiiLCczphYPoiAWcVhPDf lS14UYXfUeqa0cH5kSWi4XLe1yWZOVI7IkFbCzdluKfOR+/i5KDY+i+EJgIMnoffolv1 H/wmvzllyCLuZ+tnEZVDpYwy3f4iBV2FA2cT5ss7HmJNe0oeTRec0E3Yk4+hGZnjZsy3 K7zMGUr1sFCYya2EqmGxxaQoCL9eyfPUQRYEyXF9jd9hdGTTFff4+lnCGYnvzD8EKPp5 W67g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1763074600; x=1763679400; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=yCySYnLm9S91HvD17dKSq/J5PnFR2ZVykwVecEeKkWU=; b=ApUlfNXlrTAZNTW+5vfcIhgnLcKoBsg7c+86RqgIvKR3AbfL5I03UYRzTLGQg4/jgq n4CC+TtLWbKvQkBflmo6vVcO7TNnSiLaJKSOa+ucizuJr6jWER32OLew/ohrYzkhquMy cNA+ED//5vVD0OHviBoj0SgiHi0Stzm1PZsajTfCYi7VyQUBQ8n39iimw7RTNiMYbuF3 S1RkwmPRsICf+qOJCZN4BH9zeE1S1MUsJ1Lv/my5DfN/8uFiLogDzrL9P5oRLtVF6RB2 8kGv44EotKtYkwoKuReqnjNdoJGJ11HiQyixd2DRX7tFlRU4molYIX3yXpb0EviQKXZz tmaw== X-Forwarded-Encrypted: i=1; AJvYcCWeRzcU0H2wcdGjGTRdyU0GuOgJUvjtFJkqqy2yDBB7Fva0X/MOzE1aDuU/leItdaif50vn2D07h6HjBJs=@vger.kernel.org X-Gm-Message-State: AOJu0YwbwU90EIxdKqzpNUXFTe4bRSiOr5FUCm1LO4Afsxf+ygOZlD4Q 0q8IQaQC7cR1E+Veb0uACpWEoUdIuRdnj2QnfpImZDnBOxlczyXc6P8+aIPA38j9AtHyVQTfDSr RMwFVUQ== X-Google-Smtp-Source: AGHT+IG6E24XApKx+zIhb5ajqLukds5HfcT59hf6lWOOA+2i4xJxuR1Z5mbdRMsu25A7WJP7cMfpNSjAepA= X-Received: from pjboj14.prod.google.com ([2002:a17:90b:4d8e:b0:33b:c211:1fa9]) (user=seanjc job=prod-delivery.src-stubby-dispatcher) by 2002:a17:903:a8f:b0:295:7453:b58b with SMTP id d9443c01a7336-2986a6b56b4mr7439355ad.4.1763074599984; Thu, 13 Nov 2025 14:56:39 -0800 (PST) Reply-To: Sean Christopherson Date: Thu, 13 Nov 2025 14:56:19 -0800 In-Reply-To: <20251113225621.1688428-1-seanjc@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20251113225621.1688428-1-seanjc@google.com> X-Mailer: git-send-email 2.52.0.rc1.455.g30608eb744-goog Message-ID: <20251113225621.1688428-8-seanjc@google.com> Subject: [PATCH 7/9] KVM: SVM: Treat exit_code as an unsigned 64-bit value through all of KVM From: Sean Christopherson To: Sean Christopherson , Paolo Bonzini , Vitaly Kuznetsov , "K. Y. Srinivasan" , Haiyang Zhang , Wei Liu , Dexuan Cui Cc: kvm@vger.kernel.org, linux-hyperv@vger.kernel.org, linux-kernel@vger.kernel.org, Jim Mattson , Yosry Ahmed Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Fix KVM's long-standing buggy handling of SVM's exit_code as a 32-bit value. Per the APM and Xen commit d1bd157fbc ("Big merge the HVM full-virtualisation abstractions.") (which is arguably more trustworthy than KVM), offset 0x70 is a single 64-bit value: 070h 63:0 EXITCODE Track exit_code as a single u64 to prevent reintroducing bugs where KVM neglects to correctly set bits 63:32. Fixes: 6aa8b732ca01 ("[PATCH] kvm: userspace interface") Cc: Jim Mattson Cc: Yosry Ahmed Signed-off-by: Sean Christopherson Reviewed-by: Yosry Ahmed --- arch/x86/include/asm/svm.h | 3 +-- arch/x86/include/uapi/asm/svm.h | 32 ++++++++++++++--------------- arch/x86/kvm/svm/hyperv.c | 1 - arch/x86/kvm/svm/nested.c | 13 +++--------- arch/x86/kvm/svm/sev.c | 36 +++++++++++---------------------- arch/x86/kvm/svm/svm.c | 7 ++----- arch/x86/kvm/svm/svm.h | 4 +--- arch/x86/kvm/trace.h | 2 +- include/hyperv/hvgdk.h | 2 +- 9 files changed, 37 insertions(+), 63 deletions(-) diff --git a/arch/x86/include/asm/svm.h b/arch/x86/include/asm/svm.h index e69b6d0dedcf..66b22cffedfc 100644 --- a/arch/x86/include/asm/svm.h +++ b/arch/x86/include/asm/svm.h @@ -136,8 +136,7 @@ struct __attribute__ ((__packed__)) vmcb_control_area { u32 int_vector; u32 int_state; u8 reserved_3[4]; - u32 exit_code; - u32 exit_code_hi; + u64 exit_code; u64 exit_info_1; u64 exit_info_2; u32 exit_int_info; diff --git a/arch/x86/include/uapi/asm/svm.h b/arch/x86/include/uapi/asm/sv= m.h index 650e3256ea7d..010a45c9f614 100644 --- a/arch/x86/include/uapi/asm/svm.h +++ b/arch/x86/include/uapi/asm/svm.h @@ -103,38 +103,38 @@ #define SVM_EXIT_VMGEXIT 0x403 =20 /* SEV-ES software-defined VMGEXIT events */ -#define SVM_VMGEXIT_MMIO_READ 0x80000001 -#define SVM_VMGEXIT_MMIO_WRITE 0x80000002 -#define SVM_VMGEXIT_NMI_COMPLETE 0x80000003 -#define SVM_VMGEXIT_AP_HLT_LOOP 0x80000004 -#define SVM_VMGEXIT_AP_JUMP_TABLE 0x80000005 +#define SVM_VMGEXIT_MMIO_READ 0x80000001ull +#define SVM_VMGEXIT_MMIO_WRITE 0x80000002ull +#define SVM_VMGEXIT_NMI_COMPLETE 0x80000003ull +#define SVM_VMGEXIT_AP_HLT_LOOP 0x80000004ull +#define SVM_VMGEXIT_AP_JUMP_TABLE 0x80000005ull #define SVM_VMGEXIT_SET_AP_JUMP_TABLE 0 #define SVM_VMGEXIT_GET_AP_JUMP_TABLE 1 -#define SVM_VMGEXIT_PSC 0x80000010 -#define SVM_VMGEXIT_GUEST_REQUEST 0x80000011 -#define SVM_VMGEXIT_EXT_GUEST_REQUEST 0x80000012 -#define SVM_VMGEXIT_AP_CREATION 0x80000013 +#define SVM_VMGEXIT_PSC 0x80000010ull +#define SVM_VMGEXIT_GUEST_REQUEST 0x80000011ull +#define SVM_VMGEXIT_EXT_GUEST_REQUEST 0x80000012ull +#define SVM_VMGEXIT_AP_CREATION 0x80000013ull #define SVM_VMGEXIT_AP_CREATE_ON_INIT 0 #define SVM_VMGEXIT_AP_CREATE 1 #define SVM_VMGEXIT_AP_DESTROY 2 -#define SVM_VMGEXIT_SNP_RUN_VMPL 0x80000018 -#define SVM_VMGEXIT_SAVIC 0x8000001a +#define SVM_VMGEXIT_SNP_RUN_VMPL 0x80000018ull +#define SVM_VMGEXIT_SAVIC 0x8000001aull #define SVM_VMGEXIT_SAVIC_REGISTER_GPA 0 #define SVM_VMGEXIT_SAVIC_UNREGISTER_GPA 1 #define SVM_VMGEXIT_SAVIC_SELF_GPA ~0ULL -#define SVM_VMGEXIT_HV_FEATURES 0x8000fffd -#define SVM_VMGEXIT_TERM_REQUEST 0x8000fffe +#define SVM_VMGEXIT_HV_FEATURES 0x8000fffdull +#define SVM_VMGEXIT_TERM_REQUEST 0x8000fffeull #define SVM_VMGEXIT_TERM_REASON(reason_set, reason_code) \ /* SW_EXITINFO1[3:0] */ \ (((((u64)reason_set) & 0xf)) | \ /* SW_EXITINFO1[11:4] */ \ ((((u64)reason_code) & 0xff) << 4)) -#define SVM_VMGEXIT_UNSUPPORTED_EVENT 0x8000ffff +#define SVM_VMGEXIT_UNSUPPORTED_EVENT 0x8000ffffull =20 /* Exit code reserved for hypervisor/software use */ -#define SVM_EXIT_SW 0xf0000000 +#define SVM_EXIT_SW 0xf0000000ull =20 -#define SVM_EXIT_ERR -1 +#define SVM_EXIT_ERR -1ull =20 #define SVM_EXIT_REASONS \ { SVM_EXIT_READ_CR0, "read_cr0" }, \ diff --git a/arch/x86/kvm/svm/hyperv.c b/arch/x86/kvm/svm/hyperv.c index 088f6429b24c..3ec580d687f5 100644 --- a/arch/x86/kvm/svm/hyperv.c +++ b/arch/x86/kvm/svm/hyperv.c @@ -11,7 +11,6 @@ void svm_hv_inject_synthetic_vmexit_post_tlb_flush(struct= kvm_vcpu *vcpu) struct vcpu_svm *svm =3D to_svm(vcpu); =20 svm->vmcb->control.exit_code =3D HV_SVM_EXITCODE_ENL; - svm->vmcb->control.exit_code_hi =3D 0; svm->vmcb->control.exit_info_1 =3D HV_SVM_ENL_EXITCODE_TRAP_AFTER_FLUSH; svm->vmcb->control.exit_info_2 =3D 0; nested_svm_vmexit(svm); diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c index 8070e20ed5a7..89120245cd22 100644 --- a/arch/x86/kvm/svm/nested.c +++ b/arch/x86/kvm/svm/nested.c @@ -45,7 +45,6 @@ static void nested_svm_inject_npf_exit(struct kvm_vcpu *v= cpu, * correctly fill in the high bits of exit_info_1. */ vmcb->control.exit_code =3D SVM_EXIT_NPF; - vmcb->control.exit_code_hi =3D 0; vmcb->control.exit_info_1 =3D (1ULL << 32); vmcb->control.exit_info_2 =3D fault->address; } @@ -421,7 +420,6 @@ void __nested_copy_vmcb_control_to_cache(struct kvm_vcp= u *vcpu, to->int_vector =3D from->int_vector; to->int_state =3D from->int_state; to->exit_code =3D from->exit_code; - to->exit_code_hi =3D from->exit_code_hi; to->exit_info_1 =3D from->exit_info_1; to->exit_info_2 =3D from->exit_info_2; to->exit_int_info =3D from->exit_int_info; @@ -727,8 +725,8 @@ static void nested_vmcb02_prepare_control(struct vcpu_s= vm *svm, enter_guest_mode(vcpu); =20 /* - * Filled at exit: exit_code, exit_code_hi, exit_info_1, exit_info_2, - * exit_int_info, exit_int_info_err, next_rip, insn_len, insn_bytes. + * Filled at exit: exit_code, exit_info_1, exit_info_2, exit_int_info, + * exit_int_info_err, next_rip, insn_len, insn_bytes. */ =20 if (guest_cpu_cap_has(vcpu, X86_FEATURE_VGIF) && @@ -985,7 +983,6 @@ int nested_svm_vmrun(struct kvm_vcpu *vcpu) if (!nested_vmcb_check_save(vcpu) || !nested_vmcb_check_controls(vcpu)) { vmcb12->control.exit_code =3D SVM_EXIT_ERR; - vmcb12->control.exit_code_hi =3D -1u; vmcb12->control.exit_info_1 =3D 0; vmcb12->control.exit_info_2 =3D 0; goto out; @@ -1018,7 +1015,6 @@ int nested_svm_vmrun(struct kvm_vcpu *vcpu) svm->soft_int_injected =3D false; =20 svm->vmcb->control.exit_code =3D SVM_EXIT_ERR; - svm->vmcb->control.exit_code_hi =3D -1u; svm->vmcb->control.exit_info_1 =3D 0; svm->vmcb->control.exit_info_2 =3D 0; =20 @@ -1130,7 +1126,6 @@ int nested_svm_vmexit(struct vcpu_svm *svm) =20 vmcb12->control.int_state =3D vmcb02->control.int_state; vmcb12->control.exit_code =3D vmcb02->control.exit_code; - vmcb12->control.exit_code_hi =3D vmcb02->control.exit_code_hi; vmcb12->control.exit_info_1 =3D vmcb02->control.exit_info_1; vmcb12->control.exit_info_2 =3D vmcb02->control.exit_info_2; =20 @@ -1422,7 +1417,7 @@ static int nested_svm_intercept_ioio(struct vcpu_svm = *svm) =20 static int nested_svm_intercept(struct vcpu_svm *svm) { - u32 exit_code =3D svm->vmcb->control.exit_code; + u64 exit_code =3D svm->vmcb->control.exit_code; int vmexit =3D NESTED_EXIT_HOST; =20 if (svm_is_vmrun_failure(exit_code)) @@ -1494,7 +1489,6 @@ static void nested_svm_inject_exception_vmexit(struct= kvm_vcpu *vcpu) struct vmcb *vmcb =3D svm->vmcb; =20 vmcb->control.exit_code =3D SVM_EXIT_EXCP_BASE + ex->vector; - vmcb->control.exit_code_hi =3D 0; =20 if (ex->has_error_code) vmcb->control.exit_info_1 =3D ex->error_code; @@ -1669,7 +1663,6 @@ static void nested_copy_vmcb_cache_to_control(struct = vmcb_control_area *dst, dst->int_vector =3D from->int_vector; dst->int_state =3D from->int_state; dst->exit_code =3D from->exit_code; - dst->exit_code_hi =3D from->exit_code_hi; dst->exit_info_1 =3D from->exit_info_1; dst->exit_info_2 =3D from->exit_info_2; dst->exit_int_info =3D from->exit_int_info; diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c index 0835c664fbfd..5aedd07194aa 100644 --- a/arch/x86/kvm/svm/sev.c +++ b/arch/x86/kvm/svm/sev.c @@ -3264,11 +3264,6 @@ void sev_free_vcpu(struct kvm_vcpu *vcpu) kvfree(svm->sev_es.ghcb_sa); } =20 -static u64 kvm_get_cached_sw_exit_code(struct vmcb_control_area *control) -{ - return (((u64)control->exit_code_hi) << 32) | control->exit_code; -} - static void dump_ghcb(struct vcpu_svm *svm) { struct vmcb_control_area *control =3D &svm->vmcb->control; @@ -3290,7 +3285,7 @@ static void dump_ghcb(struct vcpu_svm *svm) */ pr_err("GHCB (GPA=3D%016llx) snapshot:\n", svm->vmcb->control.ghcb_gpa); pr_err("%-20s%016llx is_valid: %u\n", "sw_exit_code", - kvm_get_cached_sw_exit_code(control), kvm_ghcb_sw_exit_code_is_val= id(svm)); + control->exit_code, kvm_ghcb_sw_exit_code_is_valid(svm)); pr_err("%-20s%016llx is_valid: %u\n", "sw_exit_info_1", control->exit_info_1, kvm_ghcb_sw_exit_info_1_is_valid(svm)); pr_err("%-20s%016llx is_valid: %u\n", "sw_exit_info_2", @@ -3324,7 +3319,6 @@ static void sev_es_sync_from_ghcb(struct vcpu_svm *sv= m) struct vmcb_control_area *control =3D &svm->vmcb->control; struct kvm_vcpu *vcpu =3D &svm->vcpu; struct ghcb *ghcb =3D svm->sev_es.ghcb; - u64 exit_code; =20 /* * The GHCB protocol so far allows for the following data @@ -3358,9 +3352,7 @@ static void sev_es_sync_from_ghcb(struct vcpu_svm *sv= m) __kvm_emulate_msr_write(vcpu, MSR_IA32_XSS, kvm_ghcb_get_xss(svm)); =20 /* Copy the GHCB exit information into the VMCB fields */ - exit_code =3D kvm_ghcb_get_sw_exit_code(svm); - control->exit_code =3D lower_32_bits(exit_code); - control->exit_code_hi =3D upper_32_bits(exit_code); + control->exit_code =3D kvm_ghcb_get_sw_exit_code(svm); control->exit_info_1 =3D kvm_ghcb_get_sw_exit_info_1(svm); control->exit_info_2 =3D kvm_ghcb_get_sw_exit_info_2(svm); svm->sev_es.sw_scratch =3D kvm_ghcb_get_sw_scratch_if_valid(svm); @@ -3373,15 +3365,8 @@ static int sev_es_validate_vmgexit(struct vcpu_svm *= svm) { struct vmcb_control_area *control =3D &svm->vmcb->control; struct kvm_vcpu *vcpu =3D &svm->vcpu; - u64 exit_code; u64 reason; =20 - /* - * Retrieve the exit code now even though it may not be marked valid - * as it could help with debugging. - */ - exit_code =3D kvm_get_cached_sw_exit_code(control); - /* Only GHCB Usage code 0 is supported */ if (svm->sev_es.ghcb->ghcb_usage) { reason =3D GHCB_ERR_INVALID_USAGE; @@ -3395,7 +3380,7 @@ static int sev_es_validate_vmgexit(struct vcpu_svm *s= vm) !kvm_ghcb_sw_exit_info_2_is_valid(svm)) goto vmgexit_err; =20 - switch (exit_code) { + switch (control->exit_code) { case SVM_EXIT_READ_DR7: break; case SVM_EXIT_WRITE_DR7: @@ -3496,15 +3481,19 @@ static int sev_es_validate_vmgexit(struct vcpu_svm = *svm) return 0; =20 vmgexit_err: + /* + * Print the exit code even though it may not be marked valid as it + * could help with debugging. + */ if (reason =3D=3D GHCB_ERR_INVALID_USAGE) { vcpu_unimpl(vcpu, "vmgexit: ghcb usage %#x is not valid\n", svm->sev_es.ghcb->ghcb_usage); } else if (reason =3D=3D GHCB_ERR_INVALID_EVENT) { vcpu_unimpl(vcpu, "vmgexit: exit code %#llx is not valid\n", - exit_code); + control->exit_code); } else { vcpu_unimpl(vcpu, "vmgexit: exit code %#llx input is not valid\n", - exit_code); + control->exit_code); dump_ghcb(svm); } =20 @@ -4343,7 +4332,7 @@ int sev_handle_vmgexit(struct kvm_vcpu *vcpu) { struct vcpu_svm *svm =3D to_svm(vcpu); struct vmcb_control_area *control =3D &svm->vmcb->control; - u64 ghcb_gpa, exit_code; + u64 ghcb_gpa; int ret; =20 /* Validate the GHCB */ @@ -4385,8 +4374,7 @@ int sev_handle_vmgexit(struct kvm_vcpu *vcpu) =20 svm_vmgexit_success(svm, 0); =20 - exit_code =3D kvm_get_cached_sw_exit_code(control); - switch (exit_code) { + switch (control->exit_code) { case SVM_VMGEXIT_MMIO_READ: ret =3D setup_vmgexit_scratch(svm, true, control->exit_info_2); if (ret) @@ -4478,7 +4466,7 @@ int sev_handle_vmgexit(struct kvm_vcpu *vcpu) ret =3D -EINVAL; break; default: - ret =3D svm_invoke_exit_handler(vcpu, exit_code); + ret =3D svm_invoke_exit_handler(vcpu, control->exit_code); } =20 return ret; diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c index 3b05476296d0..85bc99f93275 100644 --- a/arch/x86/kvm/svm/svm.c +++ b/arch/x86/kvm/svm/svm.c @@ -2433,7 +2433,6 @@ static bool check_selective_cr0_intercepted(struct kv= m_vcpu *vcpu, =20 if (cr0 ^ val) { svm->vmcb->control.exit_code =3D SVM_EXIT_CR0_SEL_WRITE; - svm->vmcb->control.exit_code_hi =3D 0; ret =3D (nested_svm_exit_handled(svm) =3D=3D NESTED_EXIT_DONE); } =20 @@ -3265,7 +3264,7 @@ static void dump_vmcb(struct kvm_vcpu *vcpu) pr_err("%-20s%08x\n", "int_ctl:", control->int_ctl); pr_err("%-20s%08x\n", "int_vector:", control->int_vector); pr_err("%-20s%08x\n", "int_state:", control->int_state); - pr_err("%-20s%08x\n", "exit_code:", control->exit_code); + pr_err("%-20s%016llx\n", "exit_code:", control->exit_code); pr_err("%-20s%016llx\n", "exit_info1:", control->exit_info_1); pr_err("%-20s%016llx\n", "exit_info2:", control->exit_info_2); pr_err("%-20s%08x\n", "exit_int_info:", control->exit_int_info); @@ -3515,7 +3514,6 @@ static int svm_handle_exit(struct kvm_vcpu *vcpu, fas= tpath_t exit_fastpath) { struct vcpu_svm *svm =3D to_svm(vcpu); struct kvm_run *kvm_run =3D vcpu->run; - u32 exit_code =3D svm->vmcb->control.exit_code; =20 /* SEV-ES guests must use the CR write traps to track CR registers. */ if (!sev_es_guest(vcpu->kvm)) { @@ -3551,7 +3549,7 @@ static int svm_handle_exit(struct kvm_vcpu *vcpu, fas= tpath_t exit_fastpath) if (exit_fastpath !=3D EXIT_FASTPATH_NONE) return 1; =20 - return svm_invoke_exit_handler(vcpu, exit_code); + return svm_invoke_exit_handler(vcpu, svm->vmcb->control.exit_code); } =20 static int pre_svm_run(struct kvm_vcpu *vcpu) @@ -4618,7 +4616,6 @@ static int svm_check_intercept(struct kvm_vcpu *vcpu, if (static_cpu_has(X86_FEATURE_NRIPS)) vmcb->control.next_rip =3D info->next_rip; vmcb->control.exit_code =3D icpt_info.exit_code; - vmcb->control.exit_code_hi =3D 0; vmexit =3D nested_svm_exit_handled(svm); =20 ret =3D (vmexit =3D=3D NESTED_EXIT_DONE) ? X86EMUL_INTERCEPTED diff --git a/arch/x86/kvm/svm/svm.h b/arch/x86/kvm/svm/svm.h index 6b35925e3a33..31ee4f65dcc2 100644 --- a/arch/x86/kvm/svm/svm.h +++ b/arch/x86/kvm/svm/svm.h @@ -162,8 +162,7 @@ struct vmcb_ctrl_area_cached { u32 int_ctl; u32 int_vector; u32 int_state; - u32 exit_code; - u32 exit_code_hi; + u64 exit_code; u64 exit_info_1; u64 exit_info_2; u32 exit_int_info; @@ -769,7 +768,6 @@ int nested_svm_vmexit(struct vcpu_svm *svm); static inline int nested_svm_simple_vmexit(struct vcpu_svm *svm, u32 exit_= code) { svm->vmcb->control.exit_code =3D exit_code; - svm->vmcb->control.exit_code_hi =3D 0; svm->vmcb->control.exit_info_1 =3D 0; svm->vmcb->control.exit_info_2 =3D 0; return nested_svm_vmexit(svm); diff --git a/arch/x86/kvm/trace.h b/arch/x86/kvm/trace.h index e79bc9cb7162..4c7a5cd10990 100644 --- a/arch/x86/kvm/trace.h +++ b/arch/x86/kvm/trace.h @@ -781,7 +781,7 @@ TRACE_EVENT_KVM_EXIT(kvm_nested_vmexit); * Tracepoint for #VMEXIT reinjected to the guest */ TRACE_EVENT(kvm_nested_vmexit_inject, - TP_PROTO(__u32 exit_code, + TP_PROTO(__u64 exit_code, __u64 exit_info1, __u64 exit_info2, __u32 exit_int_info, __u32 exit_int_info_err, __u32 isa), TP_ARGS(exit_code, exit_info1, exit_info2, diff --git a/include/hyperv/hvgdk.h b/include/hyperv/hvgdk.h index dd6d4939ea29..56b695873a72 100644 --- a/include/hyperv/hvgdk.h +++ b/include/hyperv/hvgdk.h @@ -281,7 +281,7 @@ struct hv_vmcb_enlightenments { #define HV_VMCB_NESTED_ENLIGHTENMENTS 31 =20 /* Synthetic VM-Exit */ -#define HV_SVM_EXITCODE_ENL 0xf0000000 +#define HV_SVM_EXITCODE_ENL 0xf0000000u #define HV_SVM_ENL_EXITCODE_TRAP_AFTER_FLUSH (1) =20 /* VM_PARTITION_ASSIST_PAGE */ --=20 2.52.0.rc1.455.g30608eb744-goog