MSR_IA32_VMX_MISC[30] tells whehter "VM entry allows injection of a software interrupt, software exception, or privileged software exception with an instruction length of 0". In other words, it is not MBZ (must be zero), so do not check that it is cleared. Signed-off-by: Nadav Amit <namit@xxxxxxxxxx> --- x86/vmx.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/x86/vmx.c b/x86/vmx.c index d518102..647ab49 100644 --- a/x86/vmx.c +++ b/x86/vmx.c @@ -1486,7 +1486,7 @@ static void test_vmx_caps(void) report("MSR_IA32_VMX_MISC", (!(ctrl_cpu_rev[1].clr & CPU_URG) || val & (1ul << 5)) && ((val >> 16) & 0x1ff) <= 256 && - (val & 0xc0007e00) == 0); + (val & 0x80007e00) == 0); for (n = 0; n < ARRAY_SIZE(vmx_ctl_msr); n++) { ctrl.val = rdmsr(vmx_ctl_msr[n].index); -- 2.17.1