|
|
|
|
|
|
|
|
|
|
xen-devel
The trap array in the vcpu structure is a virtual IDT for paravirtualised guests. It is not used for HVM guests. Xen does not actually care about the IDT of HVM guests at all — both AMDV and VT fully virtualise exception and interrupt delivery. All Xen has to do is say it wants an exception or interrupt injected into the guest, and the processor will do the rest. So actually the IDT base address etc is contained within AMDV’s VMCB or VT’s VMCS, and Xen never needs to fetch it or itself.
-- Keir
On 19/12/06 14:37, "Travis Johnson" <travis.jo@xxxxxxxxx> wrote:
When a guest domain does a "lidt" (the x86 instruction) to update the pointer to the IDT where does this information get stored inside Xen (assuming it does). I know Xen can interject interrupts into a domain and that the "guest_vcpu_context" struct contains an array that represents the virtual IDT but how does the virtual IDT relate to the actual IDT the guest OS uses and is pointed to by it's idtr. It seems logical to me that the idtr must be stored inside the vcpu at some point somewhere since I can run a "sidt" and get what seems like a reasonable address (from the guest's point of view). I've also used "lidt"'s without crashing the system so Xen handles the update correctly.
I'm using HVM(VMX) guests on 64bit Xen (3.0.3 - the stable tarball from xensource). The guests run FC6.
Thanks. This list is always a good read.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|