On 03/06/2012 07:33 PM, Nadav Har'El wrote: > On Tue, Mar 06, 2012, Nadav Har'El wrote about "Re: [PATCH] KVM: Enable VMX-related bits in MSR_IA32_FEATURE_CONTROL.": > > 2. handle_vmon() does not check the previous setting of this MSR. > > If the guest (or its BIOS) doesn't set both FEATURE_CONTROL_LOCKED > > and FEATURE_CONTROL_VMXON_ENABLED_OUTSIDE_SMX, it should get a > > By the way, am I right in my understanding that KVM doesn't support > SMX in the guest? Isn't nested vmx crazy enough? btw, any updates on nested EPT? Nested vmx is pointless without it. > I didn't see mention of CR4.SMXE or a GETSEC exit > handler, which is why I'm assuming that it doesn't... > If this assumption isn't true, I'll also need to worry about the > ..._INSIDE_SMX case. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html