Re: [PATCH 1/1] Disable GUEST_INTR_STATE_STI flag before injecting NMI to guest on VMX

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 08/27/10 11:59, Avi Kivity wrote:
>  On 08/27/2010 12:56 PM, Jes Sorensen wrote:
>>
>>> Well, in light of Jan's comment re sti; hlt being clobbered by this, we
>>> should think about requesting an interrupt window instead...
>>>
>> Ok, I heading onto thin ice here :)
>>
>> How does one do that, just a call to
>>      kvm_x86_ops->enable_nmi_window(vcpu);
>> or is something else needed, like setting vcpu->arch.nmi_pending ?
> 
> ->enable_irq_window()
> 
> And need to update ->nmi_allowed() to disallow nmi if blocked-by-sti.
> 
> I've asked the vendor about this, so let's wait for their reply first.
> 

Ok, let me know when you hear back.

Cheers,
Jes

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux