diff options
author | 2019-10-01 09:21:23 -0700 | |
---|---|---|
committer | 2019-10-03 12:32:44 +0200 | |
commit | 567926cca99ba1750be8aae9c4178796bf9bb90b (patch) | |
tree | 09629b2fce3fdbb2b62a4071797a5b7df0e565a8 /scripts/gdb/linux/utils.py | |
parent | Merge tag 'kvmarm-fixes-5.4-1' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD (diff) | |
download | wireguard-linux-567926cca99ba1750be8aae9c4178796bf9bb90b.tar.xz wireguard-linux-567926cca99ba1750be8aae9c4178796bf9bb90b.zip |
KVM: nVMX: Fix consistency check on injected exception error code
Current versions of Intel's SDM incorrectly state that "bits 31:15 of
the VM-Entry exception error-code field" must be zero. In reality, bits
31:16 must be zero, i.e. error codes are 16-bit values.
The bogus error code check manifests as an unexpected VM-Entry failure
due to an invalid code field (error number 7) in L1, e.g. when injecting
a #GP with error_code=0x9f00.
Nadav previously reported the bug[*], both to KVM and Intel, and fixed
the associated kvm-unit-test.
[*] https://patchwork.kernel.org/patch/11124749/
Reported-by: Nadav Amit <namit@vmware.com>
Cc: stable@vger.kernel.org
Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com>
Reviewed-by: Jim Mattson <jmattson@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'scripts/gdb/linux/utils.py')
0 files changed, 0 insertions, 0 deletions