|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] [PATCH]Implement domctl_sendtrigger_nmi for x86 hvm
Hi there,
This patch implements DOMCTL_SENDTRIGGER_NMI hypercall
for x86 hvm domains.
we can manually inject NMI into a domain by using
'xm trigger [domain] nmi [vcpu]'.
Regards,
-------------------
Yosuke Iwamatsu
NEC Corporation
# HG changeset patch
# User Yosuke Iwamatsu <y-iwamatsu@xxxxxxxxxxxxx>
# Date 1184291863 -32400
# Node ID aa538b0b8a496fee48a1c75ae0bec78ea7f31dfc
# Parent 1f348e70a5affdea9b44c1e39cd5ef094ad4a0bf
Implement DOMCTL_SENDTRIGGER_NMI for x86 hvm
Signed-off-by: Yosuke Iwamatsu <y-iwamatsu@xxxxxxxxxxxxx>
diff -r 1f348e70a5af -r aa538b0b8a49 xen/arch/x86/domctl.c
--- a/xen/arch/x86/domctl.c Tue Jul 10 11:10:38 2007 +0100
+++ b/xen/arch/x86/domctl.c Fri Jul 13 10:57:43 2007 +0900
@@ -427,6 +427,46 @@ long arch_do_domctl(
}
break;
+ case XEN_DOMCTL_sendtrigger:
+ {
+ struct domain *d;
+ struct vcpu *v;
+
+ ret = -ESRCH;
+ if ( (d = rcu_lock_domain_by_id(domctl->domain)) == NULL )
+ break;
+
+ ret = -EINVAL;
+ if ( domctl->u.sendtrigger.vcpu >= MAX_VIRT_CPUS )
+ goto sendtrigger_out;
+
+ ret = -ESRCH;
+ if ( (v = d->vcpu[domctl->u.sendtrigger.vcpu]) == NULL )
+ goto sendtrigger_out;
+
+ switch (domctl->u.sendtrigger.trigger)
+ {
+ case XEN_DOMCTL_SENDTRIGGER_NMI:
+ {
+ ret = -ENOSYS;
+ if ( !is_hvm_domain(d) )
+ break;
+
+ ret = 0;
+ if ( !test_and_set_bool(v->arch.hvm_vcpu.nmi_pending) )
+ vcpu_kick(v);
+ }
+ break;
+
+ default:
+ ret = -ENOSYS;
+ }
+
+ sendtrigger_out:
+ rcu_unlock_domain(d);
+ }
+ break;
+
default:
ret = -ENOSYS;
break;
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-devel] [PATCH]Implement domctl_sendtrigger_nmi for x86 hvm,
Yosuke Iwamatsu <=
|
|
|
|
|