diff options
author | 2021-12-16 10:19:38 +0800 | |
---|---|---|
committer | 2022-01-07 10:44:40 -0500 | |
commit | 5b61178cd2fd67890a70ae9febbd4df20bbd8c40 (patch) | |
tree | e13580841f5eef612b1162895b6ecfd8260fbd51 /tools/perf/scripts/python | |
parent | KVM: x86/mmu: Reconstruct shadow page root if the guest PDPTEs is changed (diff) | |
download | linux-dev-5b61178cd2fd67890a70ae9febbd4df20bbd8c40.tar.xz linux-dev-5b61178cd2fd67890a70ae9febbd4df20bbd8c40.zip |
KVM: VMX: Mark VCPU_EXREG_CR3 dirty when !CR0_PG -> CR0_PG if EPT + !URG
When !CR0_PG -> CR0_PG, vcpu->arch.cr3 becomes active, but GUEST_CR3 is
still vmx->ept_identity_map_addr if EPT + !URG. So VCPU_EXREG_CR3 is
considered to be dirty and GUEST_CR3 needs to be updated in this case.
Reported-by: Maxim Levitsky <mlevitsk@redhat.com>
Suggested-by: Sean Christopherson <seanjc@google.com>
Signed-off-by: Lai Jiangshan <laijs@linux.alibaba.com>
Message-Id: <20211216021938.11752-4-jiangshanlai@gmail.com>
Fixes: c62c7bd4f95b ("KVM: VMX: Update vmcs.GUEST_CR3 only when the guest CR3 is dirty")
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'tools/perf/scripts/python')
0 files changed, 0 insertions, 0 deletions