[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [Xen-devel] NMI delivery not correctly working
Keir: Processor disables calls to subsequent NMIs till it receives next IRET instruction (via masking of maskable interrupts). I guess, what I am not clear about is how a fully-virtualized guest whould issue a IRET hypercall? -Kaushik -----Original Message----- From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx [mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Keir Fraser Sent: Tuesday, July 24, 2007 10:08 AM To: Christoph Egger; xen-devel@xxxxxxxxxxxxxxxxxxx Subject: Re: [Xen-devel] NMI delivery not correctly working On 24/7/07 16:47, "Christoph Egger" <Christoph.Egger@xxxxxxx> wrote: > I know, there is a line "current->nmi_masked = 0;" in do_iret() in > xen/arch/x86/x86_(32|64)/traps.c, but this is actually never called > after NMI delivery. Guests *must* use the iret hypercall when returning from their NMI handler. This is giving a virtualised equivalent of the 'NMI-blocking' latch implemented in x86 processors, which is reset by the IRET instruction. -- Keir _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |