From 7c0162738894e12cd6aa91094567b971c88c7bc1 Mon Sep 17 00:00:00 2001 From: Jan Kiszka Date: Tue, 3 Jul 2018 01:24:29 -0400 Subject: [PATCH] target-i386: Add NMI interception to SVM Check for SVM interception prior to injecting an NMI. Tested via the Jailhouse hypervisor. Backports commit 02f7fd25a446a220905c2e5cb0fc3655d7f63b29 from qemu --- qemu/target/i386/seg_helper.c | 1 + 1 file changed, 1 insertion(+) diff --git a/qemu/target/i386/seg_helper.c b/qemu/target/i386/seg_helper.c index e813eacd..8663bae8 100644 --- a/qemu/target/i386/seg_helper.c +++ b/qemu/target/i386/seg_helper.c @@ -1337,6 +1337,7 @@ bool x86_cpu_exec_interrupt(CPUState *cs, int interrupt_request) ret = true; } else if ((interrupt_request & CPU_INTERRUPT_NMI) && !(env->hflags2 & HF2_NMI_MASK)) { + cpu_svm_check_intercept_param(env, SVM_EXIT_NMI, 0, 0); cs->interrupt_request &= ~CPU_INTERRUPT_NMI; env->hflags2 |= HF2_NMI_MASK; do_interrupt_x86_hardirq(env, EXCP02_NMI, 1);