On Thu, Jun 17, 2010, Gleb Natapov wrote about "Re: [PATCH 16/24] Implement VMLAUNCH and VMRESUME": > > +static int handle_launch_or_resume(struct kvm_vcpu *vcpu, bool launch) > > +{ > > + if (!nested_vmx_check_permission(vcpu)) >... > Should also check MOV SS blocking. Why Intel decided that vm entry > should fail in this case? How knows, but spec says so. Thanks. Added the check: if (vmcs_read32(GUEST_INTERRUPTIBILITY_INFO) & GUEST_INTR_STATE_MOV_SS){ nested_vmx_failValid(vcpu, VMXERR_ENTRY_EVENTS_BLOCKED_BY_MOV_SS); skip_emulated_instruction(vcpu); return 1; } Like you, I don't understand why this test is at all necessary... -- Nadav Har'El | Thursday, Sep 16 2010, 8 Tishri 5771 nyh@xxxxxxxxxxxxxxxxxxx |----------------------------------------- Phone +972-523-790466, ICQ 13349191 |Help Microsoft stamp out piracy. Give http://nadav.harel.org.il |Linux to a friend today! -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html