diff options
author | Joerg Roedel <joerg.roedel@amd.com> | 2008-09-09 13:11:51 -0400 |
---|---|---|
committer | Avi Kivity <avi@qumranet.com> | 2008-09-11 04:39:25 -0400 |
commit | e5eab0cede4b1ffaca4ad857d840127622038e55 (patch) | |
tree | 1471ba4a46298778271f1440b14a5f4e795bc291 /arch/x86 | |
parent | 44874f84918e37b64bec6df1587e5fe2fdf6ab62 (diff) |
KVM: SVM: fix guest global tlb flushes with NPT
Accesses to CR4 are intercepted even with Nested Paging enabled. But the code
does not check if the guest wants to do a global TLB flush. So this flush gets
lost. This patch adds the check and the flush to svm_set_cr4.
Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Diffstat (limited to 'arch/x86')
-rw-r--r-- | arch/x86/kvm/svm.c | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index d1106cddab0d..8233b86c778c 100644 --- a/arch/x86/kvm/svm.c +++ b/arch/x86/kvm/svm.c | |||
@@ -879,6 +879,10 @@ set: | |||
879 | static void svm_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4) | 879 | static void svm_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4) |
880 | { | 880 | { |
881 | unsigned long host_cr4_mce = read_cr4() & X86_CR4_MCE; | 881 | unsigned long host_cr4_mce = read_cr4() & X86_CR4_MCE; |
882 | unsigned long old_cr4 = to_svm(vcpu)->vmcb->save.cr4; | ||
883 | |||
884 | if (npt_enabled && ((old_cr4 ^ cr4) & X86_CR4_PGE)) | ||
885 | force_new_asid(vcpu); | ||
882 | 886 | ||
883 | vcpu->arch.cr4 = cr4; | 887 | vcpu->arch.cr4 = cr4; |
884 | if (!npt_enabled) | 888 | if (!npt_enabled) |