|  |  | 
  
    |  |  | 
 
  |   |  | 
  
    |  |  | 
  
    |  |  | 
  
    |   xen-ia64-devel
RE: [Xen-devel] Question about evtchn_callback reentry 
| Keir Fraser write on 2006年12月20日 16:31:
> On 20/12/06 3:03 am, "Xu, Anthony" <anthony.xu@xxxxxxxxx> wrote:
> 
> How did you implement nesting avoidance? It'll be a bit subtle to get
> right. 
I added another global_event_mask in share page.
1. before injecting to event_callback_handler, set global_event_mask to 1 to 
   disable event inject..
2. after event_callback_handler is executed, it will return to ia64_leave_kernel
    assembly code in dom0, in this assembly code, it sets global_event_mask to 0
    to enable event inject.
There is no other code operating the global_event_mask.
Global_event_mask is initiated to 0(unmask).
Only global_event_mask is 0 and vcpu->vcpu_info->evtchn_upcall_mask is 0,
Can XEN injects to event_callback_handler of dom0.
--Anthony
> 
>  -- Keir
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
 | 
 |  | 
  
    |  |  |