From mboxrd@z Thu Jan 1 00:00:00 1970 From: Joerg Roedel Subject: Re: [PATCH 02/11] KVM: SVM: Fix wrong interrupt injection in enable_irq_windows Date: Mon, 22 Feb 2010 11:29:09 +0100 Message-ID: <20100222102909.GB4210@amd.com> References: <1266592990-8911-1-git-send-email-joerg.roedel@amd.com> <1266592990-8911-3-git-send-email-joerg.roedel@amd.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, stable@kernel.org To: Avi Kivity , Marcelo Tosatti Return-path: Received: from tx2ehsobe005.messaging.microsoft.com ([65.55.88.15]:41106 "EHLO TX2EHSOBE010.bigfish.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751251Ab0BVK3T (ORCPT ); Mon, 22 Feb 2010 05:29:19 -0500 Content-Disposition: inline In-Reply-To: <1266592990-8911-3-git-send-email-joerg.roedel@amd.com> Sender: kvm-owner@vger.kernel.org List-ID: Hi Avi, forgot this one? I did not find it in your tree. Joerg On Fri, Feb 19, 2010 at 04:23:01PM +0100, Joerg Roedel wrote: > The nested_svm_intr() function does not execute the vmexit > anymore. Therefore we may still be in the nested state after > that function ran. This patch changes the nested_svm_intr() > function to return wether the irq window could be enabled. > > Cc: stable@kernel.org > Signed-off-by: Joerg Roedel > --- > arch/x86/kvm/svm.c | 17 ++++++++--------- > 1 files changed, 8 insertions(+), 9 deletions(-) > > diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c > index 63ecd4d..f87fc98 100644 > --- a/arch/x86/kvm/svm.c > +++ b/arch/x86/kvm/svm.c > @@ -1389,16 +1389,17 @@ static int nested_svm_check_exception(struct vcpu_svm *svm, unsigned nr, > return nested_svm_exit_handled(svm); > } > > -static inline int nested_svm_intr(struct vcpu_svm *svm) > +/* This function returns true if it is save to enable the irq window */ > +static inline bool nested_svm_intr(struct vcpu_svm *svm) > { > if (!is_nested(svm)) > - return 0; > + return true; > > if (!(svm->vcpu.arch.hflags & HF_VINTR_MASK)) > - return 0; > + return true; > > if (!(svm->vcpu.arch.hflags & HF_HIF_MASK)) > - return 0; > + return false; > > svm->vmcb->control.exit_code = SVM_EXIT_INTR; > > @@ -1411,10 +1412,10 @@ static inline int nested_svm_intr(struct vcpu_svm *svm) > */ > svm->nested.exit_required = true; > trace_kvm_nested_intr_vmexit(svm->vmcb->save.rip); > - return 1; > + return false; > } > > - return 0; > + return true; > } > > static void *nested_svm_map(struct vcpu_svm *svm, u64 gpa, struct page **_page) > @@ -2563,13 +2564,11 @@ static void enable_irq_window(struct kvm_vcpu *vcpu) > { > struct vcpu_svm *svm = to_svm(vcpu); > > - nested_svm_intr(svm); > - > /* In case GIF=0 we can't rely on the CPU to tell us when > * GIF becomes 1, because that's a separate STGI/VMRUN intercept. > * The next time we get that intercept, this function will be > * called again though and we'll get the vintr intercept. */ > - if (gif_set(svm)) { > + if (gif_set(svm) && nested_svm_intr(svm)) { > svm_set_vintr(svm); > svm_inject_irq(svm, 0x0); > } > -- > 1.6.6 >