diff options
| author | Paolo Bonzini <[email protected]> | 2024-09-14 13:56:06 +0000 |
|---|---|---|
| committer | Paolo Bonzini <[email protected]> | 2024-09-17 16:41:23 +0000 |
| commit | 3f8df6285271d9d8f17d733433e5213a63b83a0b (patch) | |
| tree | 38010518e32047a3d798b4c3cd226810e0c8ab4b /drivers/pci/controller/dwc/pcie-qcom-common.c | |
| parent | Merge tag 'kvm-x86-svm-6.12' of https://github.com/kvm-x86/linux into HEAD (diff) | |
| parent | KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid (diff) | |
| download | kernel-3f8df6285271d9d8f17d733433e5213a63b83a0b.tar.gz kernel-3f8df6285271d9d8f17d733433e5213a63b83a0b.zip | |
Merge tag 'kvm-x86-vmx-6.12' of https://github.com/kvm-x86/linux into HEAD
KVM VMX changes for 6.12:
- Set FINAL/PAGE in the page fault error code for EPT Violations if and only
if the GVA is valid. If the GVA is NOT valid, there is no guest-side page
table walk and so stuffing paging related metadata is nonsensical.
- Fix a bug where KVM would incorrectly synthesize a nested VM-Exit instead of
emulating posted interrupt delivery to L2.
- Add a lockdep assertion to detect unsafe accesses of vmcs12 structures.
- Harden eVMCS loading against an impossible NULL pointer deref (really truly
should be impossible).
- Minor SGX fix and a cleanup.
Diffstat (limited to 'drivers/pci/controller/dwc/pcie-qcom-common.c')
0 files changed, 0 insertions, 0 deletions
