diff options
author | Keir Fraser <keir.fraser@citrix.com> | 2009-12-01 14:02:00 +0000 |
---|---|---|
committer | Keir Fraser <keir.fraser@citrix.com> | 2009-12-01 14:02:00 +0000 |
commit | 95b697252f765f9433c45f7115ed9ce0abcbf170 (patch) | |
tree | 20d54c39a5b0fe47b65e9c5f94382faa3f7bfc37 /xen/include/asm-x86/traps.h | |
parent | 22b984ae9a41041ecbab3eb487de75e3f1ffb592 (diff) | |
download | xen-95b697252f765f9433c45f7115ed9ce0abcbf170.tar.gz xen-95b697252f765f9433c45f7115ed9ce0abcbf170.tar.bz2 xen-95b697252f765f9433c45f7115ed9ce0abcbf170.zip |
x86: fix MCE/NMI injection
This attempts to address all the concerns raised in
http://lists.xensource.com/archives/html/xen-devel/2009-11/msg01195.html,
but I'm nevertheless still not convinced that all aspects of the
injection handling really work reliably. In particular, while the
patch here on top of the fixes for the problems menioned in the
referenced mail also adds code to keep send_guest_trap() from
injecting multiple events at a time, I don't think the is the right
mechanism - it should be possible to handle NMI/MCE nested within
each other.
Another fix on top of the ones for the earlier described problems is
that the vCPU affinity restore logic didn't account for software
injected NMIs - these never set cpu_affinity_tmp, but due to it most
likely being different from cpu_affinity it would have got restored
(to a potentially random value) nevertheless.
Signed-off-by: Jan Beulich <jbeulich@novell.com>
Diffstat (limited to 'xen/include/asm-x86/traps.h')
-rw-r--r-- | xen/include/asm-x86/traps.h | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/xen/include/asm-x86/traps.h b/xen/include/asm-x86/traps.h index 7c2daf5877..b90257979b 100644 --- a/xen/include/asm-x86/traps.h +++ b/xen/include/asm-x86/traps.h @@ -29,6 +29,8 @@ struct softirq_trap { struct cpu_user_regs; extern void machine_check_vector(struct cpu_user_regs *regs, long error_code); + +void async_exception_cleanup(struct vcpu *); /** * guest_has_trap_callback |