Re: [PATCH] kvm: x86: vmx: add checks on guest RIP

2014-12-03 Thread Paolo Bonzini
On 03/12/2014 23:56, Andy Lutomirski wrote: > > This check is off by one. It is checking bits 63:47 instead of bits > > 63:48 (this quirk is intentionally part of the specification, so that > > you can reenter a guest at 0x8000 after e.g. a VMCALL vmexit and > > cause a general protectio

Re: [PATCH] kvm: x86: vmx: add checks on guest RIP

2014-12-03 Thread Andy Lutomirski
On 12/01/2014 08:27 AM, Paolo Bonzini wrote: > > > On 29/11/2014 16:27, Eugene Korenevsky wrote: >> Signed-off-by: Eugene Korenevsky >> --- >> >> Notes: >> This patch adds checks on Guest RIP specified in Intel Software >> Developer Manual. >> >> The following checks are performed

Re: [PATCH] kvm: x86: vmx: add checks on guest RIP

2014-12-01 Thread Paolo Bonzini
On 29/11/2014 16:27, Eugene Korenevsky wrote: > Signed-off-by: Eugene Korenevsky > --- > > Notes: > This patch adds checks on Guest RIP specified in Intel Software Developer > Manual. > > The following checks are performed on processors that support Intel 64 > architecture: >

[PATCH] kvm: x86: vmx: add checks on guest RIP

2014-11-29 Thread Eugene Korenevsky
Signed-off-by: Eugene Korenevsky --- Notes: This patch adds checks on Guest RIP specified in Intel Software Developer Manual. The following checks are performed on processors that support Intel 64 architecture: - Bits 63:32 must be 0 if the "IA-32e mode guest" VM-entry control