From mboxrd@z Thu Jan 1 00:00:00 1970 From: =?UTF-8?B?U3RlcGhhbiBCw6Ryd29sZg==?= Subject: [PATCH 0/2] KVM guest-kernel panics double fault Date: Thu, 12 Jan 2012 16:43:00 +0100 Message-ID: <4F0EFF84.8020500@tu-ilmenau.de> References: <4F0C0EBB.3090506@tu-ilmenau.de> <4F0C1369.9070607@redhat.com> <4F0C2C4E.3000703@tu-ilmenau.de> <4F0C3044.7050307@redhat.com> <4F0C33A0.6080509@tu-ilmenau.de> <4F0C4AA9.6000203@tu-ilmenau.de> <20120111190927.GA13298@amt.cnet> <4F0DEA86.90503@tu-ilmenau.de> <20120111212150.GA18948@amt.cnet> <4F0E0B06.2090708@tu-ilmenau.de> <20120112104756.GB31635@amt.cnet> Reply-To: stephan.baerwolf@tu-ilmenau.de Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="------------070101010004070700010903" Cc: kvm@vger.kernel.org To: Marcelo Tosatti Return-path: Received: from wega.rz.tu-ilmenau.de ([141.24.4.159]:45291 "EHLO wega.rz.tu-ilmenau.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754033Ab2ALPon (ORCPT ); Thu, 12 Jan 2012 10:44:43 -0500 In-Reply-To: <20120112104756.GB31635@amt.cnet> Sender: kvm-owner@vger.kernel.org List-ID: This is a multi-part message in MIME format. --------------070101010004070700010903 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit >>From d62ca9897e9970d777aec1d399318b0df44489bd Mon Sep 17 00:00:00 2001 From: Stephan Baerwolf Date: Thu, 12 Jan 2012 16:32:46 +0100 Subject: [PATCH 0/2] KVM guest-kernel panics double fault regarding: https://lkml.org/lkml/2011/12/28/170 On tested computers (Intel Core i5-2520M, Intel Xeon X5560 and AMD Opteron 6174 [plus some misc.]), 32bit kvm guests (tested with winxp and linux-3.1) crash during execute of "syscall" (opcode 0f05). (double fault due to zeroed call of empty STAR-registers?) 64bit Intel guests behave in 32bit protected compat like AMD and not like Intel. (which would have to #UD ...) While the crash is bad (esp. for admins using VMs to isolate), because every unpriv. user can execute 0f05 - the misbehaviour with GenuineIntel-cpuid is just a blemish. Best regards, Stephan Bärwolf Stephan Baerwolf (2): KVM: extend "struct x86_emulate_ops" with "get_cpuid" KVM: fix missing "illegal instruction"-trap in protected modes arch/x86/include/asm/kvm_emulate.h | 19 ++++++++ arch/x86/kvm/emulate.c | 80 ++++++++++++++++++++++++++++++++++- arch/x86/kvm/x86.c | 21 +++++++++ 3 files changed, 117 insertions(+), 3 deletions(-) -- 1.7.3.4 --------------070101010004070700010903 Content-Type: text/x-patch; name="0000-cover-letter.patch" Content-Transfer-Encoding: 8bit Content-Disposition: attachment; filename="0000-cover-letter.patch" >>From d62ca9897e9970d777aec1d399318b0df44489bd Mon Sep 17 00:00:00 2001 From: Stephan Baerwolf Date: Thu, 12 Jan 2012 16:32:46 +0100 Subject: [PATCH 0/2] KVM guest-kernel panics double fault regarding: https://lkml.org/lkml/2011/12/28/170 On tested computers (Intel Core i5-2520M, Intel Xeon X5560 and AMD Opteron 6174 [plus some misc.]), 32bit kvm guests (tested with winxp and linux-3.1) crash during execute of "syscall" (opcode 0f05). (double fault due to zeroed call of empty STAR-registers?) 64bit Intel guests behave in 32bit protected compat like AMD and not like Intel. (which would have to #UD ...) While the crash is bad (esp. for admins using VMs to isolate), because every unpriv. user can execute 0f05 - the misbehaviour with GenuineIntel-cpuid is just a blemish. Best regards, Stephan Bärwolf Stephan Baerwolf (2): KVM: extend "struct x86_emulate_ops" with "get_cpuid" KVM: fix missing "illegal instruction"-trap in protected modes arch/x86/include/asm/kvm_emulate.h | 19 ++++++++ arch/x86/kvm/emulate.c | 80 ++++++++++++++++++++++++++++++++++- arch/x86/kvm/x86.c | 21 +++++++++ 3 files changed, 117 insertions(+), 3 deletions(-) -- 1.7.3.4 --------------070101010004070700010903--