kernel-ark/drivers/kvm
Avi Kivity eff708bc2b KVM: VMX: Only reload guest msrs if they are already loaded
If we set an msr via an ioctl() instead of by handling a guest exit, we
have the host state loaded, so reloading the msrs would clobber host
state instead of guest state.

This fixes a host oops (and loss of a cpu) on a guest reboot.

Signed-off-by: Avi Kivity <avi@qumranet.com>
2007-07-16 12:05:41 +03:00
..
Kconfig [S390] Kconfig: refine depends statements. 2007-05-10 15:46:07 +02:00
kvm_main.c KVM: Implement IA32_EBL_CR_POWERON msr 2007-07-16 12:05:40 +03:00
kvm_svm.h KVM: SVM: Only save/restore MSRs when needed 2007-05-03 10:52:32 +03:00
kvm.h KVM: MMU: Store shadow page tables as kernel virtual addresses, not physical 2007-07-16 12:05:40 +03:00
Makefile
mmu.c KVM: MMU: Store shadow page tables as kernel virtual addresses, not physical 2007-07-16 12:05:40 +03:00
paging_tmpl.h KVM: MMU: Store shadow page tables as kernel virtual addresses, not physical 2007-07-16 12:05:40 +03:00
segment_descriptor.h
svm.c KVM: SVM: Allow direct guest access to PC debug port 2007-07-16 12:05:37 +03:00
svm.h KVM: SVM: forbid guest to execute monitor/mwait 2007-05-03 10:52:26 +03:00
vmx.c KVM: VMX: Only reload guest msrs if they are already loaded 2007-07-16 12:05:41 +03:00
vmx.h
x86_emulate.c KVM: Allow passing 64-bit values to the emulated read/write API 2007-05-03 10:52:31 +03:00
x86_emulate.h KVM: Allow passing 64-bit values to the emulated read/write API 2007-05-03 10:52:31 +03:00