KVM: x86: Fix re-execution of patched vmmcall
authorJan Kiszka <jan.kiszka@siemens.com>
Mon, 9 Mar 2015 19:27:43 +0000 (20:27 +0100)
committerMarcelo Tosatti <mtosatti@redhat.com>
Fri, 13 Mar 2015 16:27:54 +0000 (13:27 -0300)
commitb34a80517bfcd917bc59d9670d8f465a564af3b9
tree62ef3413dcba6273b8e59c892308ef8c5292e29c
parent5e57518d99725e8b4ee34cc94669afb79e4cfe4e
KVM: x86: Fix re-execution of patched vmmcall

For a very long time (since 2b3d2a20), the path handling a vmmcall
instruction of the guest on an Intel host only applied the patch but no
longer handled the hypercall. The reverse case, vmcall on AMD hosts, is
fine. As both em_vmcall and em_vmmcall actually have to do the same, we
can fix the issue by consolidating both into the same handler.

Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
arch/x86/kvm/emulate.c
This page took 0.024171 seconds and 5 git commands to generate.