nEPT: Add nEPT violation/misconfigration support
Inject nEPT fault to L1 guest. This patch is original from Xinhao. Reviewed-by: Xiao Guangrong <xiaoguangrong@linux.vnet.ibm.com> Signed-off-by: Jun Nakajima <jun.nakajima@intel.com> Signed-off-by: Xinhao Xu <xinhao.xu@intel.com> Signed-off-by: Yang Zhang <yang.z.zhang@Intel.com> Signed-off-by: Gleb Natapov <gleb@redhat.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
This commit is contained in:

committed by
Paolo Bonzini

parent
53166229e9
commit
25d92081ae
@@ -286,6 +286,7 @@ struct kvm_mmu {
|
||||
u64 *pae_root;
|
||||
u64 *lm_root;
|
||||
u64 rsvd_bits_mask[2][4];
|
||||
u64 bad_mt_xwr;
|
||||
|
||||
/*
|
||||
* Bitmap: bit set = last pte in walk
|
||||
@@ -512,6 +513,9 @@ struct kvm_vcpu_arch {
|
||||
* instruction.
|
||||
*/
|
||||
bool write_fault_to_shadow_pgtable;
|
||||
|
||||
/* set at EPT violation at this point */
|
||||
unsigned long exit_qualification;
|
||||
};
|
||||
|
||||
struct kvm_lpage_info {
|
||||
|
Reference in New Issue
Block a user