Il 23/10/2013 15:40, Jan Kiszka ha scritto: > As long as the hardware provides us 2MB EPT pages, we can also expose > them to the guest because our shadow EPT code already supports this > feature. > > Signed-off-by: Jan Kiszka <jan.kiszka@xxxxxxxxxxx> > --- > arch/x86/kvm/vmx.c | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > > diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c > index 06fd762..feef3a1 100644 > --- a/arch/x86/kvm/vmx.c > +++ b/arch/x86/kvm/vmx.c > @@ -2261,7 +2261,8 @@ static __init void nested_vmx_setup_ctls_msrs(void) > /* nested EPT: emulate EPT also to L1 */ > nested_vmx_secondary_ctls_high |= SECONDARY_EXEC_ENABLE_EPT; > nested_vmx_ept_caps = VMX_EPT_PAGE_WALK_4_BIT | > - VMX_EPTP_WB_BIT | VMX_EPT_INVEPT_BIT; > + VMX_EPTP_WB_BIT | VMX_EPT_2MB_PAGE_BIT | > + VMX_EPT_INVEPT_BIT; > nested_vmx_ept_caps &= vmx_capability.ept; > /* > * Since invept is completely emulated we support both global > Applied to kvm.git queue, thanks. Paolo -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html