[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] Crash VMX when guest NMI.


  • To: "Li, Xin B" <xin.b.li@xxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxx>
  • From: Keir Fraser <Keir.Fraser@xxxxxxxxxxxx>
  • Date: Wed, 08 Nov 2006 15:00:56 +0000
  • Delivery-date: Wed, 08 Nov 2006 07:01:20 -0800
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>
  • Thread-index: AccDN511UfGvNDRNTg6JySMxT0rV1wADxPNZ
  • Thread-topic: [Xen-devel] [PATCH] Crash VMX when guest NMI.



On 8/11/06 13:13, "Li, Xin B" <xin.b.li@xxxxxxxxx> wrote:

> Crash VMX when guest NMI.
> It's meanless to call do_nmi of Xen HV when guest NMI, and acturally
> guest NMI can only be injected, is it possible to happen inside guest?
> 
> Signed-off-by: Xin Li <xin.b.li@xxxxxxxxx>

That path is taken for real NMIs. We shouldn't take it for exceptions on
vector 2 as bit 2 is not set in the exception-intercept bitmap.

However, I'll add a patch to actually check the INTRO_INFO_TYPE_MASK before
calling do_nmi(). Certainly we should only do_nmi() if the type is NMI (2).

 -- Keir



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.