[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen-unstable] Implement domctl_sendtrigger_nmi for x86 hvm.
# HG changeset patch # User kfraser@xxxxxxxxxxxxxxxxxxxxx # Date 1184330948 -3600 # Node ID 8b4518a6f81547ccb70cc05665ae086a4638a29c # Parent 0aa2a954a6d13578627ec4d0558786b77a8c8afc Implement domctl_sendtrigger_nmi for x86 hvm. This patch implements DOMCTL_SENDTRIGGER_NMI hypercall for x86 hvm domains. We can manually inject NMI into a domain by using 'xm trigger [domain] nmi [vcpu]'. Signed-off-by: Yosuke Iwamatsu <y-iwamatsu@xxxxxxxxxxxxx> --- xen/arch/x86/domctl.c | 40 ++++++++++++++++++++++++++++++++++++++++ 1 files changed, 40 insertions(+) diff -r 0aa2a954a6d1 -r 8b4518a6f815 xen/arch/x86/domctl.c --- a/xen/arch/x86/domctl.c Fri Jul 13 13:46:49 2007 +0100 +++ b/xen/arch/x86/domctl.c Fri Jul 13 13:49:08 2007 +0100 @@ -427,6 +427,46 @@ long arch_do_domctl( } break; + case XEN_DOMCTL_sendtrigger: + { + struct domain *d; + struct vcpu *v; + + ret = -ESRCH; + if ( (d = rcu_lock_domain_by_id(domctl->domain)) == NULL ) + break; + + ret = -EINVAL; + if ( domctl->u.sendtrigger.vcpu >= MAX_VIRT_CPUS ) + goto sendtrigger_out; + + ret = -ESRCH; + if ( (v = d->vcpu[domctl->u.sendtrigger.vcpu]) == NULL ) + goto sendtrigger_out; + + switch ( domctl->u.sendtrigger.trigger ) + { + case XEN_DOMCTL_SENDTRIGGER_NMI: + { + ret = -ENOSYS; + if ( !is_hvm_domain(d) ) + break; + + ret = 0; + if ( !test_and_set_bool(v->arch.hvm_vcpu.nmi_pending) ) + vcpu_kick(v); + } + break; + + default: + ret = -ENOSYS; + } + + sendtrigger_out: + rcu_unlock_domain(d); + } + break; + default: ret = -ENOSYS; break; _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |