diff options
author | Tamas K Lengyel <tlengyel@novetta.com> | 2015-08-28 12:17:05 +0200 |
---|---|---|
committer | Jan Beulich <jbeulich@suse.com> | 2015-08-28 12:17:05 +0200 |
commit | 340ade2f0ef692efce01a708ad98629af985f978 (patch) | |
tree | 05dbcee49549fd3c7715e595d37e9ebb9e7b1bac | |
parent | 6a05af24592b4a577361ff318a721b4fb2e8cd0c (diff) | |
download | xen-smoked.tar.gz |
x86/vmx: fix vmx_is_singlestep_supported return valuesmoked
The function supposed to return a boolean but instead it returned
the value 0x8000000 which is the Intel internal flag for MTF. This has
caused various checks using this function to falsely report no MTF
capability.
Signed-off-by: Tamas K Lengyel <tlengyel@novetta.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: Kevin Tian <kevin.tian@intel.com>
Release-acked-by: Wei Liu <wei.liu2@citrix.com>
-rw-r--r-- | xen/arch/x86/hvm/vmx/vmx.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c index 999defeaa3..2582cddf67 100644 --- a/xen/arch/x86/hvm/vmx/vmx.c +++ b/xen/arch/x86/hvm/vmx/vmx.c @@ -1768,7 +1768,7 @@ static void vmx_enable_msr_exit_interception(struct domain *d) static bool_t vmx_is_singlestep_supported(void) { - return cpu_has_monitor_trap_flag; + return !!cpu_has_monitor_trap_flag; } static void vmx_vcpu_update_eptp(struct vcpu *v) |