diff options
author | Avi Kivity <avi@qumranet.com> | 2008-08-28 18:27:15 +0300 |
---|---|---|
committer | Avi Kivity <avi@qumranet.com> | 2008-10-15 10:15:24 +0200 |
commit | 48d150394999c542b2e828f03da226842950d46a (patch) | |
tree | 980bd74d0b9df6c68aa0244f679e7edbdc34fff7 /arch/x86 | |
parent | 3201b5d9f0f7ef392886cd76dcd2c69186d9d5cd (diff) | |
download | linux-48d150394999c542b2e828f03da226842950d46a.tar.gz linux-48d150394999c542b2e828f03da226842950d46a.tar.bz2 linux-48d150394999c542b2e828f03da226842950d46a.zip |
KVM: SVM: No need to unprotect memory during event injection when using npt
No memory is protected anyway.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Diffstat (limited to 'arch/x86')
-rw-r--r-- | arch/x86/kvm/svm.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index be86c096385b..60228888d1b5 100644 --- a/arch/x86/kvm/svm.c +++ b/arch/x86/kvm/svm.c @@ -1021,7 +1021,7 @@ static int pf_interception(struct vcpu_svm *svm, struct kvm_run *kvm_run) if (npt_enabled) svm_flush_tlb(&svm->vcpu); - if (event_injection) + if (!npt_enabled && event_injection) kvm_mmu_unprotect_page_virt(&svm->vcpu, fault_address); return kvm_mmu_page_fault(&svm->vcpu, fault_address, error_code); } |