KVM: VMX: Fix bypass_guest_pf enabling when disable EPT in module parameter
Signed-off-by: Sheng Yang <sheng.yang@intel.com> Signed-off-by: Avi Kivity <avi@qumranet.com>
This commit is contained in:
parent
c93cd3a588
commit
5ec5726a16
|
@ -3305,7 +3305,7 @@ static int __init vmx_init(void)
|
|||
vmx_disable_intercept_for_msr(vmx_msr_bitmap, MSR_IA32_SYSENTER_ESP);
|
||||
vmx_disable_intercept_for_msr(vmx_msr_bitmap, MSR_IA32_SYSENTER_EIP);
|
||||
|
||||
if (cpu_has_vmx_ept())
|
||||
if (vm_need_ept())
|
||||
bypass_guest_pf = 0;
|
||||
|
||||
if (bypass_guest_pf)
|
||||
|
|
Loading…
Reference in New Issue