The patch titled KVM: SVM: intercept SMI to handle it at host level has been added to the -mm tree. Its filename is kvm-svm-intercept-smi-to-handle-it-at-host-level.patch *** Remember to use Documentation/SubmitChecklist when testing your code *** See http://www.zip.com.au/~akpm/linux/patches/stuff/added-to-mm.txt to find out what to do about this ------------------------------------------------------ Subject: KVM: SVM: intercept SMI to handle it at host level From: Joerg Roedel <joerg.roedel@xxxxxxx> Change the SVM code to intercept SMIs and handle it outside the guest. Signed-off-by: Joerg Roedel <joerg.roedel@xxxxxxx> Signed-off-by: Avi Kivity <avi@xxxxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- drivers/kvm/svm.c | 1 + 1 files changed, 1 insertion(+) diff -puN drivers/kvm/svm.c~kvm-svm-intercept-smi-to-handle-it-at-host-level drivers/kvm/svm.c --- a/drivers/kvm/svm.c~kvm-svm-intercept-smi-to-handle-it-at-host-level +++ a/drivers/kvm/svm.c @@ -486,6 +486,7 @@ static void init_vmcb(struct vmcb *vmcb) control->intercept = (1ULL << INTERCEPT_INTR) | (1ULL << INTERCEPT_NMI) | + (1ULL << INTERCEPT_SMI) | /* * selective cr0 intercept bug? * 0: 0f 22 d8 mov %eax,%cr3 _ Patches currently in -mm which might be from joerg.roedel@xxxxxxx are kvm-vmx-hack-set_cr0_no_modeswitch-to-actually-do.patch kvm-svm-intercept-smi-to-handle-it-at-host-level.patch - To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html