From nobody Sun Feb 8 19:03:45 2026 Received: from jpms-ob01-os7.noc.sony.co.jp (jpms-ob01-os7.noc.sony.co.jp [211.125.139.71]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 166B11DA0E1; Thu, 6 Nov 2025 05:37:56 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=211.125.139.71 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1762407479; cv=none; b=A1YvX+qg0Tz21FNzvAe0iqWi41tms6NhxioDbh1oW8GvqSDHTOYjV/kwq1E1i93bDlqWuHBjxEthFMsxV5gGlQXtNtVB61886Co3h+9Y/LA4UJS5X5562BSb47VgvCotPQ+e/vfg3gzitE5ZwKTs9sQGxXQowdOHIIEPckN4dK0= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1762407479; c=relaxed/simple; bh=KtDaBvRA2fJKq5FwBl9OQltCRZcFTcs+e3TL7oJVie8=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=Jmjv2OFrUXgFh2ur7K8UQRHEm9VUpboM9BIKnkmVsSz9MYWhWauczbrh4yzUw1uSiCOdeihPNWQLL1BxI2zX/XsCKRe5APgxyJjbfYBiDHgK/g1W3Gq5vePCcywtx+V/3DphfO9Z6I3t47WIRMKUR+mw0frLCVM0FiUhWh5adAw= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=sony.com; spf=fail smtp.mailfrom=sony.com; dkim=pass (2048-bit key) header.d=sony.com header.i=@sony.com header.b=TT2BMl2B; arc=none smtp.client-ip=211.125.139.71 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=sony.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=sony.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=sony.com header.i=@sony.com header.b="TT2BMl2B" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sony.com; s=s1jp; t=1762407477; x=1793943477; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=sOIza1LHMgbtMb4oCMCdsnyxio0kWKIyeN8q8tWiwc0=; b=TT2BMl2BqydKfhRssFpVoymgw5rvDuoT5PMFJP8MQBsotYARZaj1k/ko ZWyaH6mDlZd7OgJPD6FHIz9VgIlQ3hCCPR/XmwX8iedfvMQB+VG6A2XBY hesZUQCRooeVrbHKBBNTyNMZJ2B/o422fjlg16kfW3VWZ4Nq83AqSSJwL 2RD1ojfUWNYNFgyjddlNe+hPkjfIv+xtWwKgIlUhULefJbad2VYE5fe0C SbkIWJk5fJHm2EJuCy+nAL3koQlgv6dE8abHsFf/GYPeSVTkpuJuKnDA8 QGGjQXnXhGHpR75UWh0peB3QOqoCYXSkMGh4dG4Ya5qRzTeVa1K5IohLe w==; Received: from unknown (HELO jpmta-ob02-os7.noc.sony.co.jp) ([IPv6:2001:cf8:acf:1104::7]) by jpms-ob01-os7.noc.sony.co.jp with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 06 Nov 2025 14:27:37 +0900 X-IronPort-AV: E=Sophos;i="6.19,227,1754924400"; d="scan'208";a="45532677" Received: from unknown (HELO Sukrit-OptiPlex-7080..) ([IPv6:2001:cf8:1:573:0:dddd:f9c9:5652]) by jpmta-ob02-os7.noc.sony.co.jp with ESMTP; 06 Nov 2025 14:27:37 +0900 From: Sukrit Bhatnagar To: Sean Christopherson , Paolo Bonzini , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , Yuan Yao Cc: Sukrit.Bhatnagar@sony.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] KVM: VMX: Fix check for valid GVA on an EPT violation Date: Thu, 6 Nov 2025 14:28:51 +0900 Message-ID: <20251106052853.3071088-1-Sukrit.Bhatnagar@sony.com> X-Mailer: git-send-email 2.43.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" On an EPT violation, bit 7 of the exit qualification is set if the guest linear-address is valid. The derived page fault error code should not be checked for this bit. Fixes: f3009482512e ("KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and on= ly if the GVA is valid") Signed-off-by: Sukrit Bhatnagar Reviewed-by: Xiaoyao Li --- arch/x86/kvm/vmx/common.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/kvm/vmx/common.h b/arch/x86/kvm/vmx/common.h index bc5ece76533a..412d0829d7a2 100644 --- a/arch/x86/kvm/vmx/common.h +++ b/arch/x86/kvm/vmx/common.h @@ -98,7 +98,7 @@ static inline int __vmx_handle_ept_violation(struct kvm_v= cpu *vcpu, gpa_t gpa, error_code |=3D (exit_qualification & EPT_VIOLATION_PROT_MASK) ? PFERR_PRESENT_MASK : 0; =20 - if (error_code & EPT_VIOLATION_GVA_IS_VALID) + if (exit_qualification & EPT_VIOLATION_GVA_IS_VALID) error_code |=3D (exit_qualification & EPT_VIOLATION_GVA_TRANSLATED) ? PFERR_GUEST_FINAL_MASK : PFERR_GUEST_PAGE_MASK; =20 --=20 2.43.0