From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933162AbcCHLoi (ORCPT ); Tue, 8 Mar 2016 06:44:38 -0500 Received: from mail-wm0-f68.google.com ([74.125.82.68]:33147 "EHLO mail-wm0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932641AbcCHLoc (ORCPT ); Tue, 8 Mar 2016 06:44:32 -0500 From: Paolo Bonzini To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: guangrong.xiao@linux.intel.com Subject: [PATCH 0/2] KVM: MMU: fix ept=0/pte.u=0/pte.w=0/CR0.WP=0/CR4.SMEP=1/EFER.NX=0 Date: Tue, 8 Mar 2016 12:44:25 +0100 Message-Id: <1457437467-65707-1-git-send-email-pbonzini@redhat.com> X-Mailer: git-send-email 1.8.3.1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org I found this while testing the permission_fault patch with ept=0. Paolo Bonzini (2): KVM: MMU: fix ept=0/pte.u=0/pte.w=0/CR0.WP=0/CR4.SMEP=1/EFER.NX=0 combo KVM: MMU: fix reserved bit check for pte.u=0/pte.w=0/CR0.WP=0/CR4.SMEP=1/EFER.NX=0 Documentation/virtual/kvm/mmu.txt | 3 ++- arch/x86/kvm/mmu.c | 4 +++- arch/x86/kvm/vmx.c | 25 +++++++++++++++---------- 3 files changed, 20 insertions(+), 12 deletions(-) -- 1.8.3.1