public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: Avi Kivity <avi@redhat.com>
To: Marcelo Tosatti <mtosatti@redhat.com>
Cc: kvm@vger.kernel.org, Mohammed Gamal <m.gamal005@gmail.com>
Subject: Re: [PATCH 3/4] KVM: VMX: Emulated real mode interrupt injection
Date: Tue, 21 Sep 2010 18:00:08 +0200	[thread overview]
Message-ID: <4C98D688.2080303@redhat.com> (raw)
In-Reply-To: <20100921153638.GA21304@amt.cnet>

  On 09/21/2010 05:36 PM, Marcelo Tosatti wrote:
> On Tue, Sep 21, 2010 at 01:56:50PM +0200, Avi Kivity wrote:
> >   On 09/20/2010 07:30 PM, Marcelo Tosatti wrote:
> >  >>    static void __vmx_complete_interrupts(struct vcpu_vmx *vmx,
> >  >>    				u32 idt_vectoring_info,
> >  >>    				int instr_len_field,
> >  >>   @@ -3864,9 +3814,6 @@ static void __vmx_complete_interrupts(struct vcpu_vmx *vmx,
> >  >>    	int type;
> >  >>    	bool idtv_info_valid;
> >  >>
> >  >>   -	if (vmx->rmode.irq.pending)
> >  >>   -		fixup_rmode_irq(vmx,&idt_vectoring_info);
> >  >>   -
> >  >
> >  >Don't you have to undo kvm_inject_realmode_interrupt if injection fails?
> >  >
> >  >
> >
> >  Injection cannot fail (at least, in the same sense as the vmx
> >  injections).  It's actually not about failures, it's about guest
> >  entry being cancelled due to a signal or some KVM_REQ that needs
> >  attention.  For vmx style injections, we need to undo the injection
> >  to keep things in a consistent state.  To realmode emulated
> >  injection, everything is in a consistent state already, so no need
> >  to undo anything (it's also impossible, since we overwrote memory on
> >  the stack).
>
> Aren't you going to push EFLAGS,CS,EIP on the stack twice if that
> occurs?
>

No, since we clear the pending flag (we do that even for vmx-injected 
interrupts; then cancel or injection failure re-sets the flag).

-- 
error compiling committee.c: too many arguments to function


  reply	other threads:[~2010-09-21 16:00 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-09-19 12:34 [PATCH 0/4] Real mode interrupt injection emulation Avi Kivity
2010-09-19 12:34 ` [PATCH 1/4] KVM: x86 emulator: Expose emulate_int_real() Avi Kivity
2010-09-19 12:34 ` [PATCH 2/4] KVM: Add kvm_inject_realmode_interrupt() wrapper Avi Kivity
2010-09-19 12:34 ` [PATCH 3/4] KVM: VMX: Emulated real mode interrupt injection Avi Kivity
2010-09-20 17:30   ` Marcelo Tosatti
2010-09-21 11:56     ` Avi Kivity
2010-09-21 15:36       ` Marcelo Tosatti
2010-09-21 16:00         ` Avi Kivity [this message]
2010-09-19 12:34 ` [PATCH 4/4] KVM: VMX: Respect interrupt window in big real mode Avi Kivity
2010-09-19 15:25 ` [PATCH 0/4] Real mode interrupt injection emulation Avi Kivity
2010-09-21 18:32 ` Marcelo Tosatti

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4C98D688.2080303@redhat.com \
    --to=avi@redhat.com \
    --cc=kvm@vger.kernel.org \
    --cc=m.gamal005@gmail.com \
    --cc=mtosatti@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox