]> xenbits.xensource.com Git - xen.git/commitdiff
VMX: don't bypass vmx_update_secondary_exec_control()
authorJan Beulich <jbeulich@suse.com>
Mon, 26 Sep 2016 15:20:36 +0000 (17:20 +0200)
committerJan Beulich <jbeulich@suse.com>
Mon, 26 Sep 2016 15:20:36 +0000 (17:20 +0200)
While putting together another patch modifying the secondary exec
controls I noticed that vmx_vcpu_update_vmfunc_ve() does a raw VMWRITE
instead of going through the designated function. I assume that is not
how it should be.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Kevin Tian <kevin.tian@intel.com>
xen/arch/x86/hvm/vmx/vmx.c

index 50cbfed4dc5edcc202d5d8d6587b94481d3cb639..b9102cebed84d6c56dc90ce21423134485d4cb02 100644 (file)
@@ -2062,9 +2062,7 @@ static void vmx_vcpu_update_vmfunc_ve(struct vcpu *v)
     else
         v->arch.hvm_vmx.secondary_exec_control &= ~mask;
 
-    __vmwrite(SECONDARY_VM_EXEC_CONTROL,
-              v->arch.hvm_vmx.secondary_exec_control);
-
+    vmx_update_secondary_exec_control(v);
     vmx_vmcs_exit(v);
 }