Yang, Sheng wrote:
> From 4942a5c35c97e5edb6fe1303e04fb86f25cac345 Mon Sep 17 00:00:00 2001
> From: Sheng Yang <[EMAIL PROTECTED]>
> Date: Thu, 8 May 2008 16:00:57 +0800
> Subject: [PATCH 3/4] KVM: VMX: Enable NMI with in-kernel irqchip
>
>
> static void kvm_do_inject_irq(struct kvm_vcpu *vcpu)
> {
> int word_index = __ffs(vcpu->arch.irq_summary);
> @@ -2146,9 +2159,11 @@ static void do_interrupt_requests(struct kvm_vcpu
> *vcpu,
> /*
> * Interrupts blocked. Wait for unblock.
> */
> - cpu_based_vm_exec_control |= CPU_BASED_VIRTUAL_INTR_PENDING;
> + cpu_based_vm_exec_control |=
> + CPU_BASED_VIRTUAL_INTR_PENDING;
> else
> - cpu_based_vm_exec_control &= ~CPU_BASED_VIRTUAL_INTR_PENDING;
> + cpu_based_vm_exec_control &=
> + ~CPU_BASED_VIRTUAL_INTR_PENDING;
>
This seems spurious.
> /* We need to handle NMIs before interrupts are enabled */
> - if ((intr_info & INTR_INFO_INTR_TYPE_MASK) == 0x200) { /* nmi */
> + if ((intr_info & INTR_INFO_INTR_TYPE_MASK) == 0x200) {
> KVMTRACE_0D(NMI, vcpu, handler);
> - asm("int $2");
> + if (!cpu_has_virtual_nmis())
> + asm("int $2");
> }
> }
>
That's a host nmi. So does the PIN_BASED_VIRTUAL_NMI mean NMIs are
handled like unacked host interrupts?
--
Do not meddle in the internals of kernels, for they are subtle and quick to
panic.
-------------------------------------------------------------------------
This SF.net email is sponsored by the 2008 JavaOne(SM) Conference
Don't miss this year's exciting event. There's still time to save $100.
Use priority code J8TL2D2.
http://ad.doubleclick.net/clk;198757673;13503038;p?http://java.sun.com/javaone
_______________________________________________
kvm-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/kvm-devel