|
|
|
|
|
|
|
|
|
|
xen-devel
Re: [Xen-devel] [PATCH 15 of 20] Switch shadow/virtual VMCS between n1/n
Hi,
> +asmlinkage void nvmx_switch_guest(void)
> +{
> + struct vcpu *v = current;
> + struct nestedvcpu *nvcpu = &vcpu_nestedhvm(v);
> + struct cpu_user_regs *regs = guest_cpu_user_regs();
> +
> + /*
> + * a softirq may interrupt us between a virtual vmentry is
> + * just handled and the true vmentry. If during this window,
> + * a L1 virtual interrupt causes another virtual vmexit, we
> + * cannot let that happen or VM_ENTRY_INTR_INFO will be lost.
> + */
> + if ( unlikely(nvcpu->nv_vmswitch_in_progress) )
> + return;
> +
> + if ( nestedhvm_vcpu_in_guestmode(v) && nvcpu->nv_vmexit_pending )
> + {
> + local_irq_enable();
Why? Is this function every called with interrupts disabled? And if
so, will its caller deal with having them enabled when it exits?
> + virtual_vmexit(regs);
> + }
> + else if ( !nestedhvm_vcpu_in_guestmode(v) && nvcpu->nv_vmentry_pending )
> + {
> + local_irq_enable();
ditto.
Tim.
--
Tim Deegan <Tim.Deegan@xxxxxxxxxx>
Principal Software Engineer, Xen Platform Team
Citrix Systems UK Ltd. (Company #02937203, SL9 0BG)
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-devel] [PATCH 13 of 20] Emulation of VMRESUME/VMLAUNCH, (continued)
- [Xen-devel] [PATCH 13 of 20] Emulation of VMRESUME/VMLAUNCH, Eddie Dong
- [Xen-devel] [PATCH 11 of 20] Emulation of guest VMREAD, Eddie Dong
- [Xen-devel] [PATCH 04 of 20] Add APIs for nestedhvm_ops, Eddie Dong
- [Xen-devel] [PATCH 06 of 20] Define structure and access APIs for virtual VMCS, Eddie Dong
- [Xen-devel] [PATCH 08 of 20] Emulation of guest VMPTRST, Eddie Dong
- [Xen-devel] [PATCH 18 of 20] Lazy FPU for n2 guest, Eddie Dong
- [Xen-devel] [PATCH 10 of 20] Emulation of guest VMWRITE, Eddie Dong
- [Xen-devel] [PATCH 15 of 20] Switch shadow/virtual VMCS between n1/n2 guests, Eddie Dong
- [Xen-devel] [PATCH 14 of 20] Extend VMCS control fields for n2 guest, Eddie Dong
- [Xen-devel] [PATCH 17 of 20] VM exit handler of n2-guest, Eddie Dong
- [Xen-devel] [PATCH 12 of 20] Add APIs to switch n1/n2 VMCS, Eddie Dong
- [Xen-devel] [PATCH 20 of 20] n2 MSR handling and capability exposure, Eddie Dong
|
|
|
|
|