On Thu, Jun 17, 2010, Gleb Natapov wrote about "Re: [PATCH 16/24] Implement 
VMLAUNCH and VMRESUME":
> > +static int handle_launch_or_resume(struct kvm_vcpu *vcpu, bool launch)
> > +{
> > +   if (!nested_vmx_check_permission(vcpu))
>...
> Should also check MOV SS blocking. Why Intel decided that vm entry
> should fail in this case? How knows, but spec says so.

Thanks. Added the check:

if (vmcs_read32(GUEST_INTERRUPTIBILITY_INFO) & GUEST_INTR_STATE_MOV_SS){
        nested_vmx_failValid(vcpu,
                VMXERR_ENTRY_EVENTS_BLOCKED_BY_MOV_SS);
        skip_emulated_instruction(vcpu);
        return 1;
}

Like you, I don't understand why this test is at all necessary...

-- 
Nadav Har'El                        |     Thursday, Sep 16 2010, 8 Tishri 5771
n...@math.technion.ac.il             |-----------------------------------------
Phone +972-523-790466, ICQ 13349191 |Help Microsoft stamp out piracy. Give
http://nadav.harel.org.il           |Linux to a friend today!
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to