on a VMX capable processor, firmware has the capability to block use of it.
WHen it is the case, bits of IA32_FEATURE_CONTROL are cleared.
At a minimum, a jailhouse system need to be able to use VMX outside SMX.

Signed-off-by: Francois-Frederic Ozog <f...@ozog.com>
---
 tools/jailhouse-hardware-check | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/tools/jailhouse-hardware-check b/tools/jailhouse-hardware-check
index 67d3b078..2e3b818f 100755
--- a/tools/jailhouse-hardware-check
+++ b/tools/jailhouse-hardware-check
@@ -182,8 +182,8 @@ if cpu_vendor == 'GenuineIntel':
     check_feature('VT-x (VMX)', 'vmx' in cpu_features)

     feature = msr.read(MSR.IA32_FEATURE_CONTROL)
-    check_feature('  VMX without TXT',
-                  (feature & (1 << 0)) == 0 or feature & (1 << 2))
+    check_feature('  VMX outside SMX', feature & (1 << 2))
+    check_feature('  VMX inside SMX', feature & (1 << 1), True)
     check_feature('  IA32_TRUE_*_CLTS',
                   msr.read(MSR.IA32_VMX_BASIC) & (1 << 55))

--
2.11.0

--
You received this message because you are subscribed to the Google Groups 
"Jailhouse" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to jailhouse-dev+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to