From: Jan Kiszka Date: Wed, 23 Oct 2013 13:40:31 +0000 (+0100) Subject: KVM: nVMX: Report 2MB EPT pages as supported X-Git-Tag: v3.13-rc1~80^2~37 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=d3134dbf2046076b6e52b05890e812442d5257fb;p=platform%2Fkernel%2Flinux-exynos.git KVM: nVMX: Report 2MB EPT pages as supported As long as the hardware provides us 2MB EPT pages, we can also expose them to the guest because our shadow EPT code already supports this feature. Signed-off-by: Jan Kiszka Signed-off-by: Paolo Bonzini --- diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index 06fd762..feef3a1 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -2261,7 +2261,8 @@ static __init void nested_vmx_setup_ctls_msrs(void) /* nested EPT: emulate EPT also to L1 */ nested_vmx_secondary_ctls_high |= SECONDARY_EXEC_ENABLE_EPT; nested_vmx_ept_caps = VMX_EPT_PAGE_WALK_4_BIT | - VMX_EPTP_WB_BIT | VMX_EPT_INVEPT_BIT; + VMX_EPTP_WB_BIT | VMX_EPT_2MB_PAGE_BIT | + VMX_EPT_INVEPT_BIT; nested_vmx_ept_caps &= vmx_capability.ept; /* * Since invept is completely emulated we support both global