[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [RFC PATCH 19/19] i386: Disable SMM mode for X86_SW_PROTECTED_VM
From: |
Isaku Yamahata |
Subject: |
Re: [RFC PATCH 19/19] i386: Disable SMM mode for X86_SW_PROTECTED_VM |
Date: |
Wed, 2 Aug 2023 15:27:56 -0700 |
On Mon, Jul 31, 2023 at 12:22:01PM -0400,
Xiaoyao Li <xiaoyao.li@intel.com> wrote:
> Signed-off-by: Xiaoyao Li <xiaoyao.li@intel.com>
> ---
> target/i386/kvm/kvm.c | 7 +++++++
> 1 file changed, 7 insertions(+)
>
> diff --git a/target/i386/kvm/kvm.c b/target/i386/kvm/kvm.c
> index a96640512dbc..62f237068a3a 100644
> --- a/target/i386/kvm/kvm.c
> +++ b/target/i386/kvm/kvm.c
> @@ -2654,6 +2654,13 @@ int kvm_arch_init(MachineState *ms, KVMState *s)
>
> if (x86ms->vm_type == KVM_X86_SW_PROTECTED_VM) {
> memory_listener_register(&kvm_x86_sw_protected_vm_memory_listener,
> &address_space_memory);
> +
> + if (x86ms->smm == ON_OFF_AUTO_AUTO) {
> + x86ms->smm = ON_OFF_AUTO_OFF;
> + } else if (x86ms->smm == ON_OFF_AUTO_ON) {
> + error_report("X86_SW_PROTECTED_VM doesn't support SMM");
> + return -EINVAL;
> + }
> }
>
If we use confidential guest support, this check should go to there.
--
Isaku Yamahata <isaku.yamahata@gmail.com>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- Re: [RFC PATCH 19/19] i386: Disable SMM mode for X86_SW_PROTECTED_VM,
Isaku Yamahata <=