KVM: nVMX: Allow to disable CR3 access interception
authorJan Kiszka <jan.kiszka@siemens.com>
Mon, 16 Jun 2014 11:59:41 +0000 (13:59 +0200)
committerPaolo Bonzini <pbonzini@redhat.com>
Thu, 19 Jun 2014 10:52:12 +0000 (12:52 +0200)
commit3dcdf3ec6e48d918741ea11349d4436d0c5aac93
tree47595f1b874e4ac9b79ce8500e5f105226dc0f97
parent3dbcd8da7b564194f93271b003a1c46ef404cbdb
KVM: nVMX: Allow to disable CR3 access interception

We already have this control enabled by exposing a broken
MSR_IA32_VMX_PROCBASED_CTLS value. This will properly advertise our
capability once the value is fixed by clearing the right bits in
MSR_IA32_VMX_TRUE_PROCBASED_CTLS. We also have to ensure to test the
right value on L2 entry.

Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
arch/x86/kvm/vmx.c