diff options
author | Avi Kivity <avi@redhat.com> | 2008-11-20 10:47:18 +0100 |
---|---|---|
committer | Avi Kivity <avi@redhat.com> | 2008-11-23 13:52:29 +0100 |
commit | bd2b3ca7686d9470b1b58df631daa03179486182 (patch) | |
tree | 73c041f6ecc0ae4616835b751fbb8d619bf3c196 /arch | |
parent | KVM: s390: Fix problem state handling in guest sigp handler (diff) | |
download | linux-bd2b3ca7686d9470b1b58df631daa03179486182.tar.xz linux-bd2b3ca7686d9470b1b58df631daa03179486182.zip |
KVM: VMX: Fix interrupt loss during race with NMI
If an interrupt cannot be injected for some reason (say, page fault
when fetching the IDT descriptor), the interrupt is marked for
reinjection. However, if an NMI is queued at this time, the NMI
will be injected instead and the NMI will be lost.
Fix by deferring the NMI injection until the interrupt has been
injected successfully.
Analyzed by Jan Kiszka.
Signed-off-by: Avi Kivity <avi@redhat.com>
Diffstat (limited to 'arch')
-rw-r--r-- | arch/x86/kvm/vmx.c | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index d06b4dc0e2ea..a4018b01e1f9 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -3149,7 +3149,9 @@ static void vmx_intr_assist(struct kvm_vcpu *vcpu) if (cpu_has_virtual_nmis()) { if (vcpu->arch.nmi_pending && !vcpu->arch.nmi_injected) { - if (vmx_nmi_enabled(vcpu)) { + if (vcpu->arch.interrupt.pending) { + enable_nmi_window(vcpu); + } else if (vmx_nmi_enabled(vcpu)) { vcpu->arch.nmi_pending = false; vcpu->arch.nmi_injected = true; } else { |