[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Hypercalls in Intel-VT


  • To: xen-devel@xxxxxxxxxxxxxxxxxxx
  • From: "Ashish Bijlani" <ashish.bijlani@xxxxxxxxx>
  • Date: Thu, 25 Oct 2007 19:44:03 -0400
  • Delivery-date: Thu, 25 Oct 2007 16:44:44 -0700
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:in-reply-to:mime-version:content-type:references; b=Rie6X5GdQMUA/l9BeTLKwMKRxS/+HFpzUX7FL1pU0hT+vIr1JJ7hKh7peNYLJT8d77+0SOCWDYI6dZ+cY5xdptzx1WzvyYl+8xx82kGmoP9tNew6Yhn/ZhPob9LAcbxVsm7E+P5GVyXSt7Vvc6b1osswaFDFbMCp2NaNjvlAIkY=
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>

if I push xen's some addr (cs & eip) on the target guest os krnl stack when an interrupt occurs, would the guest os krnl return to xen immediately upon executing iret (as iret pops cs, eip from the krnl stack)? or would it make a vmexit coz of some illegal addr access
 
On 10/25/07, Cui, Dexuan <dexuan.cui@xxxxxxxxx > wrote:
HVM's hypercalls are implemented by VMCALL(a VMX instruction).
 
When HVM guest executes VMCALL, a EXIT_REASON_VMCALL VMexit occurs -- see xen/arch/x86/hvm/vmx/vmx.c: vmx_vmexit_handler() -> hvm_do_hypercall().
 
-- Dexuan


From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx [mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Ashish Bijlani
Sent: 2007年10月26日 7:04
To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] Hypercalls in Intel-VT

folks,

how are hypercalls made in intel-vt? do they cause any vmenter/vmexit? thanks.

-a

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.