Il 23/10/2013 15:40, Jan Kiszka ha scritto:
> As long as the hardware provides us 2MB EPT pages, we can also expose
> them to the guest because our shadow EPT code already supports this
> feature.
> 
> Signed-off-by: Jan Kiszka <[email protected]>
> ---
>  arch/x86/kvm/vmx.c | 3 ++-
>  1 file changed, 2 insertions(+), 1 deletion(-)
> 
> diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
> index 06fd762..feef3a1 100644
> --- a/arch/x86/kvm/vmx.c
> +++ b/arch/x86/kvm/vmx.c
> @@ -2261,7 +2261,8 @@ static __init void nested_vmx_setup_ctls_msrs(void)
>               /* nested EPT: emulate EPT also to L1 */
>               nested_vmx_secondary_ctls_high |= SECONDARY_EXEC_ENABLE_EPT;
>               nested_vmx_ept_caps = VMX_EPT_PAGE_WALK_4_BIT |
> -                      VMX_EPTP_WB_BIT | VMX_EPT_INVEPT_BIT;
> +                      VMX_EPTP_WB_BIT | VMX_EPT_2MB_PAGE_BIT |
> +                      VMX_EPT_INVEPT_BIT;
>               nested_vmx_ept_caps &= vmx_capability.ept;
>               /*
>                * Since invept is completely emulated we support both global
> 

Applied to kvm.git queue, thanks.

Paolo
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to