On 04/29/2010 07:09 PM, Shane Wang wrote:
Per document, for feature control MSR
Bit 1 enables VMXON in SMX operation. If the bit is clear, execution of VMXON 
in SMX operation causes a general-protection exception.
Bit 2 enables VMXON outside SMX operation. If the bit is clear, execution of 
VMXON outside SMX operation causes a general-protection exception.

This patch is to enable this kind of check with SMX for VMXON in KVM.


Looks good.

@@ -1176,9 +1177,16 @@ static __init int vmx_disabled_by_bios(v
        u64 msr;

        rdmsrl(MSR_IA32_FEATURE_CONTROL, msr);
-       return (msr&  (FEATURE_CONTROL_LOCKED |
-                      FEATURE_CONTROL_VMXON_ENABLED))
-           == FEATURE_CONTROL_LOCKED;
+       if (!!(msr&  FEATURE_CONTROL_LOCKED)) {

!! not really necessary here (no need to resend, we can fix while applying).

--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to