[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Xen-devel] [PATCH v18 14/16] x86/VPMU: NMI-based VPMU support
 
- To: Jan Beulich <JBeulich@xxxxxxxx>
 
- From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
 
- Date: Fri, 20 Feb 2015 11:24:34 -0500
 
- Cc: kevin.tian@xxxxxxxxx, suravee.suthikulpanit@xxxxxxx,	andrew.cooper3@xxxxxxxxxx, tim@xxxxxxx,	dietmar.hahn@xxxxxxxxxxxxxx, xen-devel@xxxxxxxxxxxxx,	Aravind.Gopalakrishnan@xxxxxxx, jun.nakajima@xxxxxxxxx,	dgdegra@xxxxxxxxxxxxx
 
- Delivery-date: Fri, 20 Feb 2015 16:24:51 +0000
 
- List-id: Xen developer discussion <xen-devel.lists.xen.org>
 
 
 
On 02/20/2015 10:03 AM, Jan Beulich wrote:
 
On 16.02.15 at 23:26, <boris.ostrovsky@xxxxxxxxxx> wrote:
 
 
 
+int pmu_nmi_interrupt(const struct cpu_user_regs *regs, int cpu)
 
 
static
 
+{
+    return vpmu_do_interrupt(regs);
 
That function returning 1 makes do_nmi() not do _anything_ else, i.e.
ignore eventual SERR or IOCHK events. That's not acceptable. I guess
you'll need to make nmi_callback() return values tristate and adjust
do_nmi() to deal with both cases. Albeit - the other two users are
breaking this too, so perhaps do_nmi() should be adjusted in a prereq
(and backportable) patch to not bail in that case. Yet a tristate may
still be needed, since alternative_instructions() legitimately wants to
suppress them getting handled - it would just need to invoke their
handling once done with patching.
 
 
I think I will separate this patch from the series then and submit it later.
-boris
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
 
 
    
     |