linux/arch/x86/kvm/vmx
Sukrit Bhatnagar d0164c1619 KVM: VMX: Fix check for valid GVA on an EPT violation
On an EPT violation, bit 7 of the exit qualification is set if the
guest linear-address is valid. The derived page fault error code
should not be checked for this bit.

Fixes: f300948251 ("KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid")
Cc: stable@vger.kernel.org
Signed-off-by: Sukrit Bhatnagar <Sukrit.Bhatnagar@sony.com>
Reviewed-by: Xiaoyao Li <xiaoyao.li@intel.com>
Link: https://patch.msgid.link/20251106052853.3071088-1-Sukrit.Bhatnagar@sony.com
Signed-off-by: Sean Christopherson <seanjc@google.com>
2025-11-06 06:06:18 -08:00
..
capabilities.h KVM: x86: Enable CET virtualization for VMX and advertise to userspace 2025-09-23 09:22:32 -07:00
common.h KVM: VMX: Fix check for valid GVA on an EPT violation 2025-11-06 06:06:18 -08:00
hyperv.c
hyperv.h
hyperv_evmcs.c
hyperv_evmcs.h
main.c KVM x86 changes for 6.18 2025-09-30 13:36:41 -04:00
nested.c KVM: VMX: Inject #UD if guest tries to execute SEAMCALL or TDCALL 2025-10-20 09:37:04 -07:00
nested.h KVM: nVMX: Virtualize NO_HW_ERROR_CODE_CC for L1 event injection to L2 2025-09-23 09:24:11 -07:00
pmu_intel.c KVM: x86/pmu: Restrict GLOBAL_{CTRL,STATUS}, fixed PMCs, and PEBS to PMU v2+ 2025-09-18 12:58:15 -07:00
pmu_intel.h
posted_intr.c KVM: VMX: WARN if VT-d Posted IRQs aren't possible when starting IRQ bypass 2025-06-23 09:50:47 -07:00
posted_intr.h KVM: x86: Decouple device assignment from IRQ bypass 2025-06-23 09:50:46 -07:00
run_flags.h KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest 2025-06-25 08:42:51 -07:00
sgx.c
sgx.h
tdx.c Generic: 2025-10-06 12:37:34 -07:00
tdx.h KVM: TDX: Move TDX hardware setup from main.c to tdx.c 2025-06-20 13:11:16 -07:00
tdx_arch.h
tdx_errno.h
vmcs.h
vmcs12.c KVM: nVMX: Prepare for enabling CET support for nested guest 2025-09-23 09:24:30 -07:00
vmcs12.h KVM: nVMX: Prepare for enabling CET support for nested guest 2025-09-23 09:24:30 -07:00
vmcs_shadow_fields.h
vmenter.S objtool: Validate kCFI calls 2025-08-18 14:23:09 +02:00
vmx.c KVM: VMX: Inject #UD if guest tries to execute SEAMCALL or TDCALL 2025-10-20 09:37:04 -07:00
vmx.h KVM: nVMX: Prepare for enabling CET support for nested guest 2025-09-23 09:24:30 -07:00
vmx_onhyperv.c
vmx_onhyperv.h
vmx_ops.h
x86_ops.h KVM x86 changes for 6.18 2025-09-30 13:36:41 -04:00