[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-devel] Question about evtchn_callback reentry



Keir Fraser write on 2006年12月20日 16:31:
> On 20/12/06 3:03 am, "Xu, Anthony" <anthony.xu@xxxxxxxxx> wrote:
> 
> How did you implement nesting avoidance? It'll be a bit subtle to get
> right. 

I added another global_event_mask in share page.

1. before injecting to event_callback_handler, set global_event_mask to 1 to 
   disable event inject..
2. after event_callback_handler is executed, it will return to ia64_leave_kernel
    assembly code in dom0, in this assembly code, it sets global_event_mask to 0
    to enable event inject.

There is no other code operating the global_event_mask.
Global_event_mask is initiated to 0(unmask).

Only global_event_mask is 0 and vcpu->vcpu_info->evtchn_upcall_mask is 0,
Can XEN injects to event_callback_handler of dom0.

--Anthony





> 
>  -- Keir

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.