diff options
author | Jan Kiszka <jan.kiszka@siemens.com> | 2014-06-16 07:59:41 -0400 |
---|---|---|
committer | Paolo Bonzini <pbonzini@redhat.com> | 2014-06-19 06:52:12 -0400 |
commit | 3dcdf3ec6e48d918741ea11349d4436d0c5aac93 (patch) | |
tree | 47595f1b874e4ac9b79ce8500e5f105226dc0f97 /arch/x86/include/asm/vmx.h | |
parent | 3dbcd8da7b564194f93271b003a1c46ef404cbdb (diff) |
KVM: nVMX: Allow to disable CR3 access interception
We already have this control enabled by exposing a broken
MSR_IA32_VMX_PROCBASED_CTLS value. This will properly advertise our
capability once the value is fixed by clearing the right bits in
MSR_IA32_VMX_TRUE_PROCBASED_CTLS. We also have to ensure to test the
right value on L2 entry.
Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'arch/x86/include/asm/vmx.h')
0 files changed, 0 insertions, 0 deletions