On 09/24/2010 01:07 AM, Ian Campbell wrote:
> NMI injection on 2.6.18 was one of the first Xen things I worked on (for
> injecting h/w NMI button faults) so something worked once upon a time. I
> can see CALLBACKTYPE_nmi and VCPUOP_send_nmi which seems promising that
> it's still around (and extended since I didn't do VCPUOP_send_nmi), even
> if its bit-rotted or not made it to pvops yet. 
>
> In 2.6.18-xen the guest side of receiving an NMI was pretty ugly IIRC
> since we needed to force a return via the iret hypercall (to allow the
> hypervisor to simulate the NMI interrupt window).
>
> There is a small amount of residual support even in pvops
> (XEN_EFLAGS_NMI is defined, and tested once on 32 bit, but never set).
> It might be possible to do something nicer with all the pvops
> infrastructure, I'm also not sure it isn't a premature optimisation to
> save a compare by putting the NMI flag into a reserved bit of the saved
> EFLAGS anyway.
>

I think the Intel MCE people have made NMI work in pvops, but I didn't
look closely.

But from a pvops perspective, I think the tricky part is sending an NMI
rather than receiving.  As I said in my mail to Timo, the simplest
option is to disable that code for now.

    J



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4c9cf394.90...@goop.org

Reply via email to