From mboxrd@z Thu Jan 1 00:00:00 1970 From: prasadjoshi.linux@gmail.com Subject: [PATCH] kvm:x86/svm: enable SVM lock if host supports it Date: Wed, 17 Apr 2013 23:03:33 +0530 Message-ID: <1366220013-2107-1-git-send-email-prasadjoshi.linux@gmail.com> Cc: kvm@vger.kernel.org, joro@8bytes.org, mtosatti@redhat.com, gleb@redhat.com To: prasadjoshi.linux@gmail.com Return-path: Received: from mail-pd0-f180.google.com ([209.85.192.180]:49825 "EHLO mail-pd0-f180.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965409Ab3DQRdo (ORCPT ); Wed, 17 Apr 2013 13:33:44 -0400 Received: by mail-pd0-f180.google.com with SMTP id q11so987036pdj.11 for ; Wed, 17 Apr 2013 10:33:43 -0700 (PDT) Sender: kvm-owner@vger.kernel.org List-ID: From: Prasad Joshi SVM lock features allows software from preventing update to EFER.SVME. Enable the SVM lock in guest if it is supported on host machine. Signed-off-by: Prasad Joshi --- arch/x86/kvm/svm.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index e1b1ce2..fcdfdea 100644 --- a/arch/x86/kvm/svm.c +++ b/arch/x86/kvm/svm.c @@ -4031,6 +4031,10 @@ static void svm_set_supported_cpuid(u32 func, struct kvm_cpuid_entry2 *entry) if (boot_cpu_has(X86_FEATURE_NRIPS)) entry->edx |= SVM_FEATURE_NRIP; + /* support SVM Lock if host supports it */ + if (boot_cpu_has(X86_FEATURE_SVML)) + entry->edx |= SVM_FEATURE_SVML; + /* Support NPT for the guest if enabled */ if (npt_enabled) entry->edx |= SVM_FEATURE_NPT; -- 1.7.10.4