Avi Kivity wrote:
> Jan Kiszka wrote:
>> Sheng,
>>
>> out of curiosity: vmx_vcpu_run invokes 'int $2' to trigger a host NMI if
>> the VM exited due to an external NMI event. According to Intel specs I
>> have, software-triggered NMIs do not block hardware NMIs. So are we
>> facing the risk to receive another NMI while running the first handler?
>> Or will the VM be left with the hardware blocking logic armed? Or does
>> Linux not care about NMI handler re-entrance?
>>   
> 
> All good questions.  Usually this doesn't happen since NMI sources are
> far apart (oprofile, watchdog).
> 
> Maybe the answer is to generate the local nmi via an IPI-to-self command
> to the local apic.

Going this way leaves me with a few questions: Will it be OK for the
related mainainers to export the required service? And is it safe to
assume VMX == LAPIC available and usable?

However, this is how it would look like. Yet untested, /me has to
replace his host kernel first...

Jan

---
 arch/x86/kernel/genapic_64.c |    1 +
 arch/x86/kernel/ipi.c        |    1 +
 arch/x86/kvm/vmx.c           |    6 +++---
 3 files changed, 5 insertions(+), 3 deletions(-)

Index: b/arch/x86/kernel/genapic_64.c
===================================================================
--- a/arch/x86/kernel/genapic_64.c
+++ b/arch/x86/kernel/genapic_64.c
@@ -65,6 +65,7 @@ void send_IPI_self(int vector)
 {
        __send_IPI_shortcut(APIC_DEST_SELF, vector, APIC_DEST_PHYSICAL);
 }
+EXPORT_SYMBOL_GPL(send_IPI_self);
 
 int __init acpi_madt_oem_check(char *oem_id, char *oem_table_id)
 {
Index: b/arch/x86/kernel/ipi.c
===================================================================
--- a/arch/x86/kernel/ipi.c
+++ b/arch/x86/kernel/ipi.c
@@ -77,6 +77,7 @@ void send_IPI_self(int vector)
 {
        __send_IPI_shortcut(APIC_DEST_SELF, vector);
 }
+EXPORT_SYMBOL_GPL(send_IPI_self);
 
 /*
  * This is used to send an IPI with no shorthand notation (the destination is
Index: b/arch/x86/kvm/vmx.c
===================================================================
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -2488,7 +2488,7 @@ static int handle_exception(struct kvm_v
                set_bit(irq / BITS_PER_LONG, &vcpu->arch.irq_summary);
        }
 
-       if ((intr_info & INTR_INFO_INTR_TYPE_MASK) == 0x200) /* nmi */
+       if ((intr_info & INTR_INFO_INTR_TYPE_MASK) == INTR_TYPE_NMI_INTR)
                return 1;  /* already handled by vmx_vcpu_run() */
 
        if (is_no_device(intr_info)) {
@@ -3321,10 +3321,10 @@ static void vmx_vcpu_run(struct kvm_vcpu
        intr_info = vmcs_read32(VM_EXIT_INTR_INFO);
 
        /* We need to handle NMIs before interrupts are enabled */
-       if ((intr_info & INTR_INFO_INTR_TYPE_MASK) == 0x200 &&
+       if ((intr_info & INTR_INFO_INTR_TYPE_MASK) == INTR_TYPE_NMI_INTR &&
            (intr_info & INTR_INFO_VALID_MASK)) {
                KVMTRACE_0D(NMI, vcpu, handler);
-               asm("int $2");
+               send_IPI_self(APIC_DM_NMI);
        }
 
        vmx_complete_interrupts(vmx);
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to