From mboxrd@z Thu Jan 1 00:00:00 1970 From: Gleb Natapov Subject: Re: [PATCH] KVM: VMX: Fix locking order in handle_invalid_guest_state Date: Thu, 30 Jul 2009 14:16:16 +0300 Message-ID: <20090730111616.GL30449@redhat.com> References: <4A678A56.7050901@web.de> <20090723214553.GA10152@amt.cnet> <20090729122456.GA16868@amt.cnet> <4A704424.1090602@redhat.com> <20090729140716.GA18751@amt.cnet> <4A71810E.5010105@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Marcelo Tosatti , Jan Kiszka , kvm-devel To: Avi Kivity Return-path: Received: from mx2.redhat.com ([66.187.237.31]:33479 "EHLO mx2.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752647AbZG3LQT (ORCPT ); Thu, 30 Jul 2009 07:16:19 -0400 Content-Disposition: inline In-Reply-To: <4A71810E.5010105@redhat.com> Sender: kvm-owner@vger.kernel.org List-ID: On Thu, Jul 30, 2009 at 02:16:30PM +0300, Avi Kivity wrote: > On 07/29/2009 05:07 PM, Marcelo Tosatti wrote: >>> The downside is that we're moving a vmx specific hack to common code. >>> >>> I think this could be simplified if interrupt injection happened outside >>> the critical section. This is needed anyway because emulated interrupt >>> injection needs to access guest memory (IVT and the stack). >>> >> >> Why can't it happen now (outside of the critical section), other than >> the kvm_vcpu_kick thing? >> > > I think there's little reason now. One thing we need to do is make it > possible to call the injection code twice without entering the guest. I > think right now it assumes nothing has been injected. > I Looked at this and it seems the current code handle this case. Injection puts an event on a queue and if we haven't entered a guest after this point on the next entry event is injected from the queue, just like if injection failed due to IDT access. What may happen is that at the time of irq injection there will be irq with higher irr pending in APIC, But it looks like this already may happen if injection failed on IDT access, but this is rare. > We need either to cancel a previous injection (a variant of > vmx_complete_interrupts()), or avoid reinjecting if we already did. > > -- > error compiling committee.c: too many arguments to function -- Gleb.