On 09/27/2010 11:55 PM, H. Peter Anvin wrote:
On 09/27/2010 02:27 AM, Avi Kivity wrote:
>
>  I don't have write permissions for the spec.  If you can verify that all
>  existing and future hardware will mask NMI after STI and convince the
>  spec owners to update the specifications, I'm all for it; it's certainly
>  a cleaner solution.
>

I'm trying to see if this is doable.  As you can well imagine, though,
it takes time.

Joerg, can you look at this from the AMD side?

First, do AMD processors block NMI after an IF-enabling STI? The documentation explicitly states that they don't:

Sets the interrupt flag (IF) in the rFLAGS register to 1, thereby allowing external interrupts received on the INTR input. Interrupts received on the non-maskable interrupt (NMI) input are not affected by this
instruction.

though that may refer to the general effect of EFLAGS.IF, not STI.

Second, if NMIs are blocked, is it possible to retro-document this?

Personally I think the safer route is to take the patch. There are other processors besides Intel and AMD and we can't test all of them, not to mention various emulators and virtual machine monitors out there.

--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to