KVM: VMX: Fix bypass_guest_pf enabling when disable EPT in module parameter
authorSheng Yang <sheng.yang@intel.com>
Wed, 16 Jul 2008 01:21:22 +0000 (09:21 +0800)
committerAvi Kivity <avi@qumranet.com>
Sun, 27 Jul 2008 08:34:10 +0000 (11:34 +0300)
Signed-off-by: Sheng Yang <sheng.yang@intel.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
arch/x86/kvm/vmx.c

index b918fc83435c992a032246557a16676b54e4b845..f71151d999e498a43ad706001fa8b456b669a61e 100644 (file)
@@ -3305,7 +3305,7 @@ static int __init vmx_init(void)
        vmx_disable_intercept_for_msr(vmx_msr_bitmap, MSR_IA32_SYSENTER_ESP);
        vmx_disable_intercept_for_msr(vmx_msr_bitmap, MSR_IA32_SYSENTER_EIP);
 
-       if (cpu_has_vmx_ept())
+       if (vm_need_ept())
                bypass_guest_pf = 0;
 
        if (bypass_guest_pf)