This patchset changes interrupt injection to be done from normal process context instead of interrupts disabled context. This is useful for real mode interrupt injection on Intel without the current hacks (injecting as a software interrupt of a vm86 task), reducing latencies, and later, for allowing nested virtualization code to use kvm_read_guest()/kvm_write_guest() instead of kmap() to access the guest vmcb/vmcs. Seems to survive a hack that cancels every 16th entry, after injection has already taken place. Note: not yet ready, hangs fairly early on AMD. Seems to work well on Intel. Please review carefully, esp. the first patch. Any missing kvm_make_request() there may result in a hung guest. v3: close new race between injection and entry fix Intel real-mode injection cancellation v2: svm support (easier than expected) fix silly vmx warning Avi Kivity (6): KVM: Check for pending events before attempting injection KVM: VMX: Split up vmx_complete_interrupts() KVM: VMX: Move real-mode interrupt injection fixup to vmx_complete_interrupts() KVM: VMX: Parameterize vmx_complete_interrupts() for both exit and entry KVM: Non-atomic interrupt injection KVM: VMX: Move fixup_rmode_irq() to avoid forward declaration arch/x86/include/asm/kvm_host.h | 1 + arch/x86/kvm/i8259.c | 1 + arch/x86/kvm/lapic.c | 12 +++- arch/x86/kvm/svm.c | 20 ++++++- arch/x86/kvm/vmx.c | 116 ++++++++++++++++++++++++++------------ arch/x86/kvm/x86.c | 44 ++++++++++---- include/linux/kvm_host.h | 1 + 7 files changed, 142 insertions(+), 53 deletions(-) -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html