Some VM-entry checks can be offloaded from KVM to hardware. But if we want to do that, the current implementation of KVM creates a priority issue where the order in which VM-entry checks need to be performed according to the SDM, is not maintained. VM-entry fails in nested_vmx_enter_non_root_mode() if an error is encountered while processing the entries in VM-entry MSR-load area. This leads to VM-exit due to a VM-entry check that is supposed to be done after any guest-state checks done in hardware. This patch fixes this priority issue so that checks that can be offloaded to hardware can now be offloaded. [PATCH] nVMX: Defer error from VM-entry MSR-load area to until after arch/x86/kvm/vmx/nested.c | 34 +++++++++++++++++++++++++++++++--- arch/x86/kvm/vmx/nested.h | 14 ++++++++++++-- arch/x86/kvm/vmx/vmcs.h | 6 ++++++ 3 files changed, 49 insertions(+), 5 deletions(-) Krish Sadhukhan (1): nVMX: Defer error from VM-entry MSR-load area to until after hardware verifies VMCS guest state-area