summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTamas K Lengyel <tlengyel@novetta.com>2015-08-28 12:17:05 +0200
committerJan Beulich <jbeulich@suse.com>2015-08-28 12:17:05 +0200
commit340ade2f0ef692efce01a708ad98629af985f978 (patch)
tree05dbcee49549fd3c7715e595d37e9ebb9e7b1bac
parent6a05af24592b4a577361ff318a721b4fb2e8cd0c (diff)
downloadxen-smoked.tar.gz
x86/vmx: fix vmx_is_singlestep_supported return valuesmoked
The function supposed to return a boolean but instead it returned the value 0x8000000 which is the Intel internal flag for MTF. This has caused various checks using this function to falsely report no MTF capability. Signed-off-by: Tamas K Lengyel <tlengyel@novetta.com> Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com> Acked-by: Kevin Tian <kevin.tian@intel.com> Release-acked-by: Wei Liu <wei.liu2@citrix.com>
-rw-r--r--xen/arch/x86/hvm/vmx/vmx.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
index 999defeaa3..2582cddf67 100644
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -1768,7 +1768,7 @@ static void vmx_enable_msr_exit_interception(struct domain *d)
static bool_t vmx_is_singlestep_supported(void)
{
- return cpu_has_monitor_trap_flag;
+ return !!cpu_has_monitor_trap_flag;
}
static void vmx_vcpu_update_eptp(struct vcpu *v)