on a VMX capable processor, firmware has the capability to block use of
it.
WHen it is the case, bits of IA32_FEATURE_CONTROL are cleared.
At a minimum, a jailhouse system need to be able to use VMX outside SMX.
Signed-off-by: Francois-Frederic Ozog <f...@ozog.com>
---
tools/jailhouse-hardware-check | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/tools/jailhouse-hardware-check
b/tools/jailhouse-hardware-check
index 67d3b078..2e3b818f 100755
--- a/tools/jailhouse-hardware-check
+++ b/tools/jailhouse-hardware-check
@@ -182,8 +182,8 @@ if cpu_vendor == 'GenuineIntel':
check_feature('VT-x (VMX)', 'vmx' in cpu_features)
feature = msr.read(MSR.IA32_FEATURE_CONTROL)
- check_feature(' VMX without TXT',
- (feature & (1 << 0)) == 0 or feature & (1 << 2))
+ check_feature(' VMX outside SMX', feature & (1 << 2))
+ check_feature(' VMX inside SMX', feature & (1 << 1), True)
check_feature(' IA32_TRUE_*_CLTS',
msr.read(MSR.IA32_VMX_BASIC) & (1 << 55))
--
2.11.0
--
You received this message because you are subscribed to the Google Groups
"Jailhouse" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to jailhouse-dev+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.