* [PATCH 6.12.y] KVM: VMX: Fix check for valid GVA on an EPT violation
@ 2025-11-21 5:52 Sukrit Bhatnagar
2025-11-21 18:11 ` Sean Christopherson
0 siblings, 1 reply; 5+ messages in thread
From: Sukrit Bhatnagar @ 2025-11-21 5:52 UTC (permalink / raw)
To: sukrit.bhatnagar; +Cc: stable, Xiaoyao Li, Sean Christopherson
On an EPT violation, bit 7 of the exit qualification is set if the
guest linear-address is valid. The derived page fault error code
should not be checked for this bit.
Fixes: f3009482512e ("KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid")
Cc: stable@vger.kernel.org
Signed-off-by: Sukrit Bhatnagar <Sukrit.Bhatnagar@sony.com>
Reviewed-by: Xiaoyao Li <xiaoyao.li@intel.com>
Link: https://patch.msgid.link/20251106052853.3071088-1-Sukrit.Bhatnagar@sony.com
Signed-off-by: Sean Christopherson <seanjc@google.com>
(cherry picked from commit d0164c161923ac303bd843e04ebe95cfd03c6e19)
Signed-off-by: Sukrit Bhatnagar <Sukrit.Bhatnagar@sony.com>
---
arch/x86/kvm/vmx/vmx.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c
index 6c185a260c5b..d0387f543107 100644
--- a/arch/x86/kvm/vmx/vmx.c
+++ b/arch/x86/kvm/vmx/vmx.c
@@ -5810,7 +5810,7 @@ static int handle_ept_violation(struct kvm_vcpu *vcpu)
error_code |= (exit_qualification & EPT_VIOLATION_RWX_MASK)
? PFERR_PRESENT_MASK : 0;
- if (error_code & EPT_VIOLATION_GVA_IS_VALID)
+ if (exit_qualification & EPT_VIOLATION_GVA_IS_VALID)
error_code |= (exit_qualification & EPT_VIOLATION_GVA_TRANSLATED) ?
PFERR_GUEST_FINAL_MASK : PFERR_GUEST_PAGE_MASK;
--
2.43.0
^ permalink raw reply related [flat|nested] 5+ messages in thread
* [PATCH 6.12.y] KVM: VMX: Fix check for valid GVA on an EPT violation
2025-11-20 15:51 FAILED: patch "[PATCH] KVM: VMX: Fix check for valid GVA on an EPT violation" failed to apply to 6.12-stable tree gregkh
@ 2025-11-21 5:53 ` Sukrit Bhatnagar
0 siblings, 0 replies; 5+ messages in thread
From: Sukrit Bhatnagar @ 2025-11-21 5:53 UTC (permalink / raw)
To: stable, sukrit.bhatnagar; +Cc: Xiaoyao Li, Sean Christopherson
On an EPT violation, bit 7 of the exit qualification is set if the
guest linear-address is valid. The derived page fault error code
should not be checked for this bit.
Fixes: f3009482512e ("KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid")
Cc: stable@vger.kernel.org
Signed-off-by: Sukrit Bhatnagar <Sukrit.Bhatnagar@sony.com>
Reviewed-by: Xiaoyao Li <xiaoyao.li@intel.com>
Link: https://patch.msgid.link/20251106052853.3071088-1-Sukrit.Bhatnagar@sony.com
Signed-off-by: Sean Christopherson <seanjc@google.com>
(cherry picked from commit d0164c161923ac303bd843e04ebe95cfd03c6e19)
Signed-off-by: Sukrit Bhatnagar <Sukrit.Bhatnagar@sony.com>
---
arch/x86/kvm/vmx/vmx.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c
index 6c185a260c5b..d0387f543107 100644
--- a/arch/x86/kvm/vmx/vmx.c
+++ b/arch/x86/kvm/vmx/vmx.c
@@ -5810,7 +5810,7 @@ static int handle_ept_violation(struct kvm_vcpu *vcpu)
error_code |= (exit_qualification & EPT_VIOLATION_RWX_MASK)
? PFERR_PRESENT_MASK : 0;
- if (error_code & EPT_VIOLATION_GVA_IS_VALID)
+ if (exit_qualification & EPT_VIOLATION_GVA_IS_VALID)
error_code |= (exit_qualification & EPT_VIOLATION_GVA_TRANSLATED) ?
PFERR_GUEST_FINAL_MASK : PFERR_GUEST_PAGE_MASK;
--
2.43.0
^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: [PATCH 6.12.y] KVM: VMX: Fix check for valid GVA on an EPT violation
2025-11-21 5:52 [PATCH 6.12.y] KVM: VMX: Fix check for valid GVA on an EPT violation Sukrit Bhatnagar
@ 2025-11-21 18:11 ` Sean Christopherson
2025-11-23 10:08 ` Sukrit.Bhatnagar
0 siblings, 1 reply; 5+ messages in thread
From: Sean Christopherson @ 2025-11-21 18:11 UTC (permalink / raw)
To: Sukrit Bhatnagar; +Cc: stable, Xiaoyao Li
On Fri, Nov 21, 2025, Sukrit Bhatnagar wrote:
> On an EPT violation, bit 7 of the exit qualification is set if the
> guest linear-address is valid. The derived page fault error code
> should not be checked for this bit.
>
> Fixes: f3009482512e ("KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid")
> Cc: stable@vger.kernel.org
> Signed-off-by: Sukrit Bhatnagar <Sukrit.Bhatnagar@sony.com>
> Reviewed-by: Xiaoyao Li <xiaoyao.li@intel.com>
> Link: https://patch.msgid.link/20251106052853.3071088-1-Sukrit.Bhatnagar@sony.com
> Signed-off-by: Sean Christopherson <seanjc@google.com>
> (cherry picked from commit d0164c161923ac303bd843e04ebe95cfd03c6e19)
> Signed-off-by: Sukrit Bhatnagar <Sukrit.Bhatnagar@sony.com>
> ---
No need for the manual "backport", commits that are tagged for stable@ are
automically pulled into LTS kernels so long as they apply cleanly (and obviously
don't cause problems).
^ permalink raw reply [flat|nested] 5+ messages in thread
* RE: [PATCH 6.12.y] KVM: VMX: Fix check for valid GVA on an EPT violation
2025-11-21 18:11 ` Sean Christopherson
@ 2025-11-23 10:08 ` Sukrit.Bhatnagar
2025-11-24 15:47 ` Sean Christopherson
0 siblings, 1 reply; 5+ messages in thread
From: Sukrit.Bhatnagar @ 2025-11-23 10:08 UTC (permalink / raw)
To: Sean Christopherson; +Cc: stable@vger.kernel.org, Xiaoyao Li
On 2025-11-22 03:11, Sean Christopherson wrote:
>
> No need for the manual "backport", commits that are tagged for stable@ are
> automically pulled into LTS kernels so long as they apply cleanly (and obviously
> don't cause problems).
This commit did not apply cleanly to the 6.12-stable tree,
as notified earlier by Greg's mail. 6.17-stable seemed to
have no issues.
The function handle_ept_violation got some changes in v6.16
c8563d1b6998 ("KVM: VMX: Split out guts of EPT violation to common/exposed function")
which moved the code from vmx/vmx.c to vmx/common.h.
So, v6.16+ is ok, but not the earlier ones.
I think this manual backport commit is needed.
Please let me know if my understanding is not correct.
--
Thanks
Sukrit
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH 6.12.y] KVM: VMX: Fix check for valid GVA on an EPT violation
2025-11-23 10:08 ` Sukrit.Bhatnagar
@ 2025-11-24 15:47 ` Sean Christopherson
0 siblings, 0 replies; 5+ messages in thread
From: Sean Christopherson @ 2025-11-24 15:47 UTC (permalink / raw)
To: Sukrit.Bhatnagar@sony.com; +Cc: stable@vger.kernel.org, Xiaoyao Li
On Sun, Nov 23, 2025, Sukrit.Bhatnagar@sony.com wrote:
> On 2025-11-22 03:11, Sean Christopherson wrote:
> >
> > No need for the manual "backport", commits that are tagged for stable@ are
> > automically pulled into LTS kernels so long as they apply cleanly (and obviously
> > don't cause problems).
>
>
> This commit did not apply cleanly to the 6.12-stable tree,
> as notified earlier by Greg's mail. 6.17-stable seemed to
> have no issues.
>
> The function handle_ept_violation got some changes in v6.16
> c8563d1b6998 ("KVM: VMX: Split out guts of EPT violation to common/exposed function")
> which moved the code from vmx/vmx.c to vmx/common.h.
> So, v6.16+ is ok, but not the earlier ones.
>
> I think this manual backport commit is needed.
> Please let me know if my understanding is not correct.
Ah, your understanding is correct. I saw that the commit was queue for 6.12 (and
landed in 6.12 as commit 3010739f53438) and assumed it was a clean backport. But
I missed Sasha's Stable-dep-of magic intervention[2].
So this backport is _now_ unnecessary, but was necessary when you sent the patch.
Thanks for the backport and follow-up, much appreciated even though Sasha-bot
stole your thunder :-)
[1] https://lore.kernel.org/all/20251121130150.019304053@linuxfoundation.org
[2] https://lore.kernel.org/all/20251120181940.1924069-1-sashal@kernel.org
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2025-11-24 15:47 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-11-21 5:52 [PATCH 6.12.y] KVM: VMX: Fix check for valid GVA on an EPT violation Sukrit Bhatnagar
2025-11-21 18:11 ` Sean Christopherson
2025-11-23 10:08 ` Sukrit.Bhatnagar
2025-11-24 15:47 ` Sean Christopherson
-- strict thread matches above, loose matches on Subject: below --
2025-11-20 15:51 FAILED: patch "[PATCH] KVM: VMX: Fix check for valid GVA on an EPT violation" failed to apply to 6.12-stable tree gregkh
2025-11-21 5:53 ` [PATCH 6.12.y] KVM: VMX: Fix check for valid GVA on an EPT violation Sukrit Bhatnagar
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).