From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from [140.186.70.92] (port=53700 helo=eggs.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1PQxaA-0006Cn-Fh for qemu-devel@nongnu.org; Fri, 10 Dec 2010 02:39:59 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1PQxa8-00060P-T9 for qemu-devel@nongnu.org; Fri, 10 Dec 2010 02:39:58 -0500 Received: from [222.73.24.84] (port=49814 helo=song.cn.fujitsu.com) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1PQxa8-0005rx-Ew for qemu-devel@nongnu.org; Fri, 10 Dec 2010 02:39:56 -0500 Message-ID: <4D01D9FD.8020801@cn.fujitsu.com> Date: Fri, 10 Dec 2010 15:42:53 +0800 From: Lai Jiangshan MIME-Version: 1.0 References: <4D007E2C.4070308@cn.fujitsu.com> <4D00845F.9000503@siemens.com> In-Reply-To: <4D00845F.9000503@siemens.com> Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=UTF-8 Subject: [Qemu-devel] [PATCH V2] qemu, kvm: Enable user space NMI injection for kvm guest List-Id: qemu-devel.nongnu.org List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Jan Kiszka Cc: Avi Kivity , "kvm@vger.kernel.org" , "qemu-devel@nongnu.org" Make use of the new KVM_NMI IOCTL to send NMIs into the KVM guest if the user space raised them. (example: qemu monitor's "nmi" command) Signed-off-by: Lai Jiangshan --- diff --git a/configure b/configure index 2917874..f6f9362 100755 --- a/configure +++ b/configure @@ -1646,6 +1646,9 @@ if test "$kvm" != "no" ; then #if !defined(KVM_CAP_DESTROY_MEMORY_REGION_WORKS) #error Missing KVM capability KVM_CAP_DESTROY_MEMORY_REGION_WORKS #endif +#if !defined(KVM_CAP_USER_NMI) +#error Missing KVM capability KVM_CAP_USER_NMI +#endif int main(void) { return 0; } EOF if test "$kerneldir" != "" ; then diff --git a/target-i386/kvm.c b/target-i386/kvm.c index 7dfc357..755f8c9 100644 --- a/target-i386/kvm.c +++ b/target-i386/kvm.c @@ -1417,6 +1417,13 @@ int kvm_arch_get_registers(CPUState *env) int kvm_arch_pre_run(CPUState *env, struct kvm_run *run) { + /* Inject NMI */ + if (env->interrupt_request & CPU_INTERRUPT_NMI) { + env->interrupt_request &= ~CPU_INTERRUPT_NMI; + DPRINTF("injected NMI\n"); + kvm_vcpu_ioctl(env, KVM_NMI); + } + /* Try to inject an interrupt if the guest can accept it */ if (run->ready_for_interrupt_injection && (env->interrupt_request & CPU_INTERRUPT_HARD) &&