This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


[Xen-devel] [SVM][PATCH] fix NMI vmexit handling

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] [SVM][PATCH] fix NMI vmexit handling
From: "Woller, Thomas" <thomas.woller@xxxxxxx>
Date: Tue, 25 Jul 2006 14:58:21 -0500
Delivery-date: Tue, 25 Jul 2006 12:58:54 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcawJK55XxDMghb3QkGSknGt7uUEtg==
Thread-topic: [SVM][PATCH] fix NMI vmexit handling
Attached SVM patch fixes a problem when an NMI is intercepted while
running an SVM guest.  
Basically the NMI handler (do_nmi()) was being called twice, once when
global interrupts was enabled, and then second when the vmexit nmi
handler executed.  
This patch moves enablement of the global interrupts (STGI) from the asm
exits.S files to the vmexit handler (svm.c), and then enables interrupts
after the do_nmi() handling.

Tested on 32bit and 64bit hypervisors, also with the most recent
xenoprofile patches to enable hvm oprofile functionality.

Applies cleanly to 10729.
Please apply to xen-unstable.hg.

Signed-off-by: Tom Woller <thomas.woller@xxxxxxx>

Attachment: svm_stgi_nmi.patch
Description: svm_stgi_nmi.patch

Xen-devel mailing list
<Prev in Thread] Current Thread [Next in Thread>