]> git.ipfire.org Git - thirdparty/kernel/stable.git/commit
KVM: VMX: Fix check for valid GVA on an EPT violation
authorSukrit Bhatnagar <Sukrit.Bhatnagar@sony.com>
Thu, 6 Nov 2025 05:28:51 +0000 (14:28 +0900)
committerSean Christopherson <seanjc@google.com>
Thu, 6 Nov 2025 14:06:18 +0000 (06:06 -0800)
commitd0164c161923ac303bd843e04ebe95cfd03c6e19
treeed41845392eadfb6cea8edb8484110e8b6cdfba7
parentae431059e75d36170a5ae6b44cc4d06d43613215
KVM: VMX: Fix check for valid GVA on an EPT violation

On an EPT violation, bit 7 of the exit qualification is set if the
guest linear-address is valid. The derived page fault error code
should not be checked for this bit.

Fixes: f3009482512e ("KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid")
Cc: stable@vger.kernel.org
Signed-off-by: Sukrit Bhatnagar <Sukrit.Bhatnagar@sony.com>
Reviewed-by: Xiaoyao Li <xiaoyao.li@intel.com>
Link: https://patch.msgid.link/20251106052853.3071088-1-Sukrit.Bhatnagar@sony.com
Signed-off-by: Sean Christopherson <seanjc@google.com>
arch/x86/kvm/vmx/common.h