KVM: VMX: Fix bypass_guest_pf enabling when disable EPT in module parameter

Signed-off-by: Sheng Yang <sheng.yang@intel.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>

authored by

Sheng Yang and committed by
Avi Kivity
5ec5726a c93cd3a5

+1 -1
+1 -1
arch/x86/kvm/vmx.c
··· 3305 3305 vmx_disable_intercept_for_msr(vmx_msr_bitmap, MSR_IA32_SYSENTER_ESP); 3306 3306 vmx_disable_intercept_for_msr(vmx_msr_bitmap, MSR_IA32_SYSENTER_EIP); 3307 3307 3308 - if (cpu_has_vmx_ept()) 3308 + if (vm_need_ept()) 3309 3309 bypass_guest_pf = 0; 3310 3310 3311 3311 if (bypass_guest_pf)