>From 2168285ffb30716f30e129c3ce98ce42d19c4d4e Mon Sep 17 00:00:00 2001 From: Stephan Baerwolf <stephan.baerwolf@xxxxxxxxxxxxx> Date: Tue, 10 Jan 2012 14:13:22 +0100 Subject: [PATCH 0/2] KVM guest-kernel panics double fault regarding: https://lkml.org/lkml/2011/12/28/170 On tested computers (Intel Core i5-2520M, Intel Xeon X5560 and AMD Opteron 6174 [plus some misc.]), 32bit kvm guests (tested with winxp and linux-3.1) crash during execute of "syscall" (opcode 0f05). (double fault due to zeroed call of empty STAR-registers?) 64bit Intel guests behave in 32bit protected compat like AMD and not like Intel. (which would have to #UD ...) While the crash is bad (esp. for admins using VMs to isolate), because every unpriv. user can execute 0f05 - the misbehaviour with GenuineIntel-cpuid is just a blemish. Best regards, Stephan Bärwolf Stephan Baerwolf (2): KVM: extend "struct x86_emulate_ops" with "get_cpuid" KVM: fix missing "illegal instruction"-trap in protected modes arch/x86/include/asm/kvm_emulate.h | 19 +++++++ arch/x86/kvm/emulate.c | 92 ++++++++++++++++++++++++++++++++++- arch/x86/kvm/x86.c | 21 ++++++++ 3 files changed, 129 insertions(+), 3 deletions(-) -- 1.7.3.4 -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html