commit | 3dcdf3ec6e48d918741ea11349d4436d0c5aac93 | [log] [tgz] |
---|---|---|
author | Jan Kiszka <jan.kiszka@siemens.com> | Mon Jun 16 13:59:41 2014 +0200 |
committer | Paolo Bonzini <pbonzini@redhat.com> | Thu Jun 19 12:52:12 2014 +0200 |
tree | 47595f1b874e4ac9b79ce8500e5f105226dc0f97 | |
parent | 3dbcd8da7b564194f93271b003a1c46ef404cbdb [diff] |
KVM: nVMX: Allow to disable CR3 access interception We already have this control enabled by exposing a broken MSR_IA32_VMX_PROCBASED_CTLS value. This will properly advertise our capability once the value is fixed by clearing the right bits in MSR_IA32_VMX_TRUE_PROCBASED_CTLS. We also have to ensure to test the right value on L2 entry. Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>