hvm/svm: enable EMUL_UNIMPLEMENTED events on svm
authorAlexandru Isaila <aisaila@bitdefender.com>
Thu, 5 Jul 2018 13:20:23 +0000 (15:20 +0200)
committerJan Beulich <jbeulich@suse.com>
Thu, 5 Jul 2018 13:20:23 +0000 (15:20 +0200)
Signed-off-by: Alexandru Isaila <aisaila@bitdefender.com>
Acked-by: Tamas K Lengyel <tamas@tklengyel.com>
xen/include/asm-x86/monitor.h

index c5a86d1109bc5da494672f4db503500be8bbdf64..4f1c7ffe0afb4c075b69c0d1c7281186738930a9 100644 (file)
@@ -83,16 +83,11 @@ static inline uint32_t arch_monitor_get_capabilities(struct domain *d)
                     (1U << XEN_DOMCTL_MONITOR_EVENT_INTERRUPT) |
                     (1U << XEN_DOMCTL_MONITOR_EVENT_CPUID) |
                     (1U << XEN_DOMCTL_MONITOR_EVENT_DEBUG_EXCEPTION) |
-                    (1U << XEN_DOMCTL_MONITOR_EVENT_WRITE_CTRLREG));
+                    (1U << XEN_DOMCTL_MONITOR_EVENT_WRITE_CTRLREG) |
+                    (1U << XEN_DOMCTL_MONITOR_EVENT_EMUL_UNIMPLEMENTED));
 
-    if ( cpu_has_vmx )
-    {
-        capabilities |= (1U << XEN_DOMCTL_MONITOR_EVENT_EMUL_UNIMPLEMENTED);
-
-        /* Since we know this is on VMX, we can just call the hvm func */
-        if ( hvm_is_singlestep_supported() )
-            capabilities |= (1U << XEN_DOMCTL_MONITOR_EVENT_SINGLESTEP);
-    }
+    if ( hvm_is_singlestep_supported() )
+        capabilities |= (1U << XEN_DOMCTL_MONITOR_EVENT_SINGLESTEP);
 
     if ( hvm_funcs.set_descriptor_access_exiting )
         capabilities |= (1U << XEN_DOMCTL_MONITOR_EVENT_DESC_ACCESS);