1. 03 1月, 2009 19 次提交
  2. 02 1月, 2009 10 次提交
  3. 01 1月, 2009 10 次提交
  4. 31 12月, 2008 1 次提交
    • J
      KVM: x86: Rework user space NMI injection as KVM_CAP_USER_NMI · 4531220b
      Jan Kiszka 提交于
      There is no point in doing the ready_for_nmi_injection/
      request_nmi_window dance with user space. First, we don't do this for
      in-kernel irqchip anyway, while the code path is the same as for user
      space irqchip mode. And second, there is nothing to loose if a pending
      NMI is overwritten by another one (in contrast to IRQs where we have to
      save the number). Actually, there is even the risk of raising spurious
      NMIs this way because the reason for the held-back NMI might already be
      handled while processing the first one.
      
      Therefore this patch creates a simplified user space NMI injection
      interface, exporting it under KVM_CAP_USER_NMI and dropping the old
      KVM_CAP_NMI capability. And this time we also take care to provide the
      interface only on archs supporting NMIs via KVM (right now only x86).
      Signed-off-by: NJan Kiszka <jan.kiszka@siemens.com>
      Signed-off-by: NAvi Kivity <avi@redhat.com>
      4531220b