All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] KVM: nVMX: pass valid guest linear-address to the L1
@ 2016-09-04 18:22 Jan Dakinevich
  2016-09-05  0:49 ` Wanpeng Li
  0 siblings, 1 reply; 5+ messages in thread
From: Jan Dakinevich @ 2016-09-04 18:22 UTC (permalink / raw)
  To: kvm; +Cc: pbonzini, rkrcmar, linux-kernel, ynorov, Jan Dakinevich

If EPT support is exposed to L1 hypervisor, guest linear-address field
of VMCS should contain GVA of L2, the access to which caused EPT violation.

Signed-off-by: Jan Dakinevich <jan.dakinevich@gmail.com>
---
 arch/x86/kvm/vmx.c | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 5cede40..a4bb2bd 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -10500,6 +10500,9 @@ static void prepare_vmcs12(struct kvm_vcpu *vcpu, struct vmcs12 *vmcs12,
 		vmcs12->guest_pdptr3 = vmcs_read64(GUEST_PDPTR3);
 	}
 
+	if (nested_cpu_has_ept(vmcs12))
+		vmcs12->guest_linear_address = vmcs_readl(GUEST_LINEAR_ADDRESS);
+
 	if (nested_cpu_has_vid(vmcs12))
 		vmcs12->guest_intr_status = vmcs_read16(GUEST_INTR_STATUS);
 
-- 
1.9.1

^ permalink raw reply related	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2016-09-06  0:45 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-09-04 18:22 [PATCH] KVM: nVMX: pass valid guest linear-address to the L1 Jan Dakinevich
2016-09-05  0:49 ` Wanpeng Li
2016-09-05 13:02   ` Jan Dakinevich
2016-09-05 13:16     ` Paolo Bonzini
2016-09-06  0:45     ` Wanpeng Li

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.