|
|
|
|
|
|
|
|
|
|
xen-devel
Re: [Xen-devel] trying to understand interrupts from xen->guest
>
> I'm enabling interrupts by this:
> _shared->vcpu_data[0].evtchan_upcall_pending = 0;
I presume you actually mean 'evtchn_upcall_mask'?
> I get an interrupt but the stack is really odd. I can't make sense of it.
> Nothing looks like it is in the right place, though bits and pieces are
> recognizable: I can see the address for _shared, for example on the stack.
The interrupt stack frame is identical to that for a real x86 hardware
interrupt. i.e.: EIP, CS, EFLAGS[, ESP, SS]. No pointers to
shared_info, or anything like that.
> I'm trying to find out where Xen might have invoked the interrupt but no
> luck. Plan 9 is mostly working and I want to get Xen interrupts going to
> it, but this last bit is puzzling.
>
> I do have the callback addresses set.
It will enter the callback address you specified via
HYPERVISOR_set_callbacks(). It has nothing to do with the 'virtual
IDT' you specify via HYPERVISOR_set_trap_table().
> Does xen interrupt on vector 0x82 to send interrupts to the guest? This is
> a guest in dom > 0.
No. 0x82 is the trap used to enter Xen from a guest OS.
-- Keir
-------------------------------------------------------
This SF.Net email sponsored by Black Hat Briefings & Training.
Attend Black Hat Briefings & Training, Las Vegas July 24-29 -
digital self defense, top technical experts, no vendor pitches,
unmatched networking opportunities. Visit www.blackhat.com
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxxx
https://lists.sourceforge.net/lists/listinfo/xen-devel
|
|
|
|
|