KVM: nVMX: Clean up and fix pin-based execution controls
authorJan Kiszka <jan.kiszka@siemens.com>
Wed, 13 Mar 2013 10:30:50 +0000 (11:30 +0100)
committerGleb Natapov <gleb@redhat.com>
Wed, 13 Mar 2013 14:14:40 +0000 (16:14 +0200)
commiteabeaaccfca0ed61b8e00a09b8cfa703c4f11b59
treeb66ec7c86baaabb2963b530ab7538242a7fd099b
parent66450a21f99636af4fafac2afd33f1a40631bc3a
KVM: nVMX: Clean up and fix pin-based execution controls

Only interrupt and NMI exiting are mandatory for KVM to work, thus can
be exposed to the guest unconditionally, virtual NMI exiting is
optional. So we must not advertise it unless the host supports it.

Introduce the symbolic constant PIN_BASED_ALWAYSON_WITHOUT_TRUE_MSR at
this chance.

Reviewed-by:: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
Signed-off-by: Gleb Natapov <gleb@redhat.com>
arch/x86/include/asm/vmx.h
arch/x86/kvm/vmx.c