From mboxrd@z Thu Jan 1 00:00:00 1970 From: =?UTF-8?B?U3RlcGhhbiBCw6Ryd29sZg==?= Subject: [PATCH 0/2] KVM guest-kernel panics double fault Date: Tue, 10 Jan 2012 15:26:42 +0100 Message-ID: <4F0C4AA2.2090005@tu-ilmenau.de> References: <4EFBC973.1040905@tu-ilmenau.de> <4EFC3B17.1040601@redhat.com> <4F09001D.1050701@tu-ilmenau.de> <4F096E26.4090201@redhat.com> <4F0C0EBB.3090506@tu-ilmenau.de> <4F0C1369.9070607@redhat.com> <4F0C2C4E.3000703@tu-ilmenau.de> <4F0C3044.7050307@redhat.com> <4F0C33A0.6080509@tu-ilmenau.de> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: QUOTED-PRINTABLE To: kvm@vger.kernel.org Return-path: Received: from wega.rz.tu-ilmenau.de ([141.24.4.159]:56061 "EHLO wega.rz.tu-ilmenau.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752078Ab2AJO7N (ORCPT ); Tue, 10 Jan 2012 09:59:13 -0500 Received: from [192.168.49.131] (x31.theoinf.tu-ilmenau.de [141.24.211.31]) (authenticated bits=0) by wega.rz.tu-ilmenau.de (8.12.11/8.12.11/Debian-3) with ESMTP id q0AESGOK016562 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT) for ; Tue, 10 Jan 2012 15:28:16 +0100 In-Reply-To: <4F0C33A0.6080509@tu-ilmenau.de> Sender: kvm-owner@vger.kernel.org List-ID: =46rom 2168285ffb30716f30e129c3ce98ce42d19c4d4e Mon Sep 17 00:00:00 200= 1 =46rom: Stephan Baerwolf Date: Tue, 10 Jan 2012 14:13:22 +0100 Subject: [PATCH 0/2] KVM guest-kernel panics double fault regarding: https://lkml.org/lkml/2011/12/28/170 On tested computers (Intel Core i5-2520M, Intel Xeon X5560 and AMD Opteron 6174 [plus some misc.]), 32bit kvm guests (tested with winxp and linux-3.1) crash during execute of "syscall" (opcode 0f05). (double fault due to zeroed call of empty STAR-registers?) 64bit Intel guests behave in 32bit protected compat like AMD and not like Intel. (which would have to #UD ...) While the crash is bad (esp. for admins using VMs to isolate), because every unpriv. user can execute 0f05 - the misbehaviour with GenuineIntel-cpuid is just a blemish. Best regards, Stephan B=C3=A4rwolf Stephan Baerwolf (2): KVM: extend "struct x86_emulate_ops" with "get_cpuid" KVM: fix missing "illegal instruction"-trap in protected modes arch/x86/include/asm/kvm_emulate.h | 19 +++++++ arch/x86/kvm/emulate.c | 92 ++++++++++++++++++++++++++++++++++- arch/x86/kvm/x86.c | 21 ++++++++ 3 files changed, 129 insertions(+), 3 deletions(-) --=20 1.7.3.4