From: Prasad Joshi <[email protected]>

SVM lock features allows software from preventing update to EFER.SVME.
Enable the SVM lock in guest if it is supported on host machine.

Signed-off-by: Prasad Joshi <[email protected]>
---
 arch/x86/kvm/svm.c |    4 ++++
 1 file changed, 4 insertions(+)

diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index e1b1ce2..fcdfdea 100644
--- a/arch/x86/kvm/svm.c
+++ b/arch/x86/kvm/svm.c
@@ -4031,6 +4031,10 @@ static void svm_set_supported_cpuid(u32 func, struct 
kvm_cpuid_entry2 *entry)
                if (boot_cpu_has(X86_FEATURE_NRIPS))
                        entry->edx |= SVM_FEATURE_NRIP;
 
+               /* support SVM Lock if host supports it */
+               if (boot_cpu_has(X86_FEATURE_SVML))
+                       entry->edx |= SVM_FEATURE_SVML;
+
                /* Support NPT for the guest if enabled */
                if (npt_enabled)
                        entry->edx |= SVM_FEATURE_NPT;
-- 
1.7.10.4

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to