diff options
author | 2020-04-22 19:25:48 -0700 | |
---|---|---|
committer | 2020-05-13 12:14:47 -0400 | |
commit | db438592807e059e3b730f556c22ae201f4d4ebc (patch) | |
tree | a49486ba2019e8d736000d6110825e9535344bcd /include/linux/rcuwait.h | |
parent | KVM: x86: WARN on injected+pending exception even in nested case (diff) | |
download | linux-rng-db438592807e059e3b730f556c22ae201f4d4ebc.tar.xz linux-rng-db438592807e059e3b730f556c22ae201f4d4ebc.zip |
KVM: VMX: Use vmx_interrupt_blocked() directly from vmx_handle_exit()
Use vmx_interrupt_blocked() instead of bouncing through
vmx_interrupt_allowed() when handling edge cases in vmx_handle_exit().
The nested_run_pending check in vmx_interrupt_allowed() should never
evaluate true in the VM-Exit path.
Hoist the WARN in handle_invalid_guest_state() up to vmx_handle_exit()
to enforce the above assumption for the !enable_vnmi case, and to detect
any other potential bugs with nested VM-Enter.
Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com>
Message-Id: <20200423022550.15113-12-sean.j.christopherson@intel.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'include/linux/rcuwait.h')
0 files changed, 0 insertions, 0 deletions