Alexander Graf wrote:

On 30.10.2008, at 20:16, Anthony Liguori wrote:

Instead of doing this as a module parameter, we could either avoid advertising SVM support in cpuid from userspace or we could disable SVM in the BIOS.

I really like the later approach because it gives a better error message within the guest. We could also keep the module parameter but it would be nice to support disabling SVM in userspace too.

That's a really good idea. We'd only have to check the MSR value on EFER set, to know if setting SVME is allowed. That would allow for a really easy control over the SVM feature on a per-guest basis and from userspace.

And with Gleb's BIOS configuration changes that are now upstream, it's really easy to communicate to the BIOS whether SVM should be enabled.

Regards,

Anthony LIguori

Cool,

Alex

Regards,

Anthony Liguori

static void kvm_reput_irq(struct vcpu_svm *svm);
static void svm_flush_tlb(struct kvm_vcpu *vcpu);
@@ -457,6 +460,9 @@ static __init int svm_hardware_setup(void)
    if (boot_cpu_has(X86_FEATURE_NX))
        kvm_enable_efer_bits(EFER_NX);
+    if (nested)
+        kvm_enable_efer_bits(MSR_EFER_SVME_MASK);
+
    for_each_online_cpu(cpu) {
        r = svm_cpu_init(cpu);
        if (r)




--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to