From patchwork Sun Sep 19 16:41:27 2010 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Gleb Natapov X-Patchwork-Id: 193792 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by demeter1.kernel.org (8.14.4/8.14.3) with ESMTP id o8JGfalI018150 for ; Sun, 19 Sep 2010 16:41:36 GMT Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754851Ab0ISQle (ORCPT ); Sun, 19 Sep 2010 12:41:34 -0400 Received: from mx1.redhat.com ([209.132.183.28]:27094 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754814Ab0ISQle (ORCPT ); Sun, 19 Sep 2010 12:41:34 -0400 Received: from int-mx03.intmail.prod.int.phx2.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.16]) by mx1.redhat.com (8.13.8/8.13.8) with ESMTP id o8JGfTPs032726 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Sun, 19 Sep 2010 12:41:29 -0400 Received: from dhcp-1-237.tlv.redhat.com (dhcp-1-237.tlv.redhat.com [10.35.1.237]) by int-mx03.intmail.prod.int.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id o8JGfSlK014160; Sun, 19 Sep 2010 12:41:28 -0400 Received: by dhcp-1-237.tlv.redhat.com (Postfix, from userid 13519) id F263018D46C; Sun, 19 Sep 2010 18:41:27 +0200 (IST) Date: Sun, 19 Sep 2010 18:41:27 +0200 From: Gleb Natapov To: kvm@vger.kernel.org, avi@redhat.com, mtosatti@redhat.com Cc: joerg.roedel@amd.com, agraf@suse.de Subject: [PATCH] SVM: do not generate "external interrupt exit" if other exit is pending Message-ID: <20100919164127.GC3008@redhat.com> MIME-Version: 1.0 Content-Disposition: inline X-Scanned-By: MIMEDefang 2.67 on 10.5.11.16 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org X-Greylist: IP, sender and recipient auto-whitelisted, not delayed by milter-greylist-4.2.3 (demeter1.kernel.org [140.211.167.41]); Sun, 19 Sep 2010 16:41:36 +0000 (UTC) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 43f5558..1a1f86b 100644 --- a/arch/x86/kvm/svm.c +++ b/arch/x86/kvm/svm.c @@ -1707,6 +1707,9 @@ static inline bool nested_svm_intr(struct vcpu_svm *svm) if (!(svm->vcpu.arch.hflags & HF_HIF_MASK)) return false; + if (svm->nested.exit_required) + return false; + svm->vmcb->control.exit_code = SVM_EXIT_INTR; svm->vmcb->control.exit_info_1 = 0; svm->vmcb->control.exit_info_2 = 0;