|
[PATCH v2 4/7] HV: ignore the NMI injection request for lapic-pt vCPUs
Hi Like,
By
Kaige Fu
· #25980
·
|
|
[PATCH v2 5/7] HV: Use NMI-window exiting to address req missing issue
If the reason of NMI is not due to hypervisor related notification. There are no request bits set in pending request. So, we will do nothing in next nmi-window exiting. It is harmless except for extra
If the reason of NMI is not due to hypervisor related notification. There are no request bits set in pending request. So, we will do nothing in next nmi-window exiting. It is harmless except for extra
|
By
Kaige Fu
· #25972
·
|
|
[PATCH v2 7/7] HV: Remove INIT signal notification related code
We don't use INIT signal notification method now. This patch removes them. Signed-off-by: Kaige Fu <kaige.fu@...> --- hypervisor/arch/x86/guest/vmexit.c | 21 +-------------------- hypervisor/arc
We don't use INIT signal notification method now. This patch removes them. Signed-off-by: Kaige Fu <kaige.fu@...> --- hypervisor/arch/x86/guest/vmexit.c | 21 +-------------------- hypervisor/arc
|
By
Kaige Fu
· #25962
·
|
|
[PATCH v2 6/7] HV: Use NMI to replace INIT signal for lapic-pt VMs S5
We have implemented a new notification method using NMI. So replace the INIT notification method with the NMI one. Then we can remove INIT notification related code later. Signed-off-by: Kaige Fu <kai
We have implemented a new notification method using NMI. So replace the INIT notification method with the NMI one. Then we can remove INIT notification related code later. Signed-off-by: Kaige Fu <kai
|
By
Kaige Fu
· #25961
·
|
|
[PATCH v2 5/7] HV: Use NMI-window exiting to address req missing issue
There is a window where we may miss the current request in the notification period when the work flow is as the following: CPUx + + CPUr | | | +--+ | | | Handle pending req | <--+ +--+ | | | Set req f
There is a window where we may miss the current request in the notification period when the work flow is as the following: CPUx + + CPUr | | | +--+ | | | Handle pending req | <--+ +--+ | | | Set req f
|
By
Kaige Fu
· #25960
·
|
|
[PATCH v2 4/7] HV: ignore the NMI injection request for lapic-pt vCPUs
NMI will be used as notification signal for lapic-pt vCPUs and ACRN doesn't support vNMI for lapic-pt vCPUs. Because it is not possible to distinguish between notification NMIs and external NMIs for l
NMI will be used as notification signal for lapic-pt vCPUs and ACRN doesn't support vNMI for lapic-pt vCPUs. Because it is not possible to distinguish between notification NMIs and external NMIs for l
|
By
Kaige Fu
· #25959
·
|
|
[PATCH v2 3/7] HV: Use NMI to kick lapic-pt vCPU's thread
ACRN hypervisor needs to kick vCPU off VMX non-root mode to do some operations in hypervisor, such as interrupt/exception injection, EPT flush etc. For non lapic-pt vCPUs, we can use IPI to do so. But
ACRN hypervisor needs to kick vCPU off VMX non-root mode to do some operations in hypervisor, such as interrupt/exception injection, EPT flush etc. For non lapic-pt vCPUs, we can use IPI to do so. But
|
By
Kaige Fu
· #25958
·
|
|
[PATCH v2 2/7] HV: Add helper function send_single_nmi
This patch adds a helper function send_single_nmi. The fisrt caller will soon come with the following patch. Signed-off-by: Kaige Fu <kaige.fu@...> --- hypervisor/arch/x86/lapic.c | 15 +++++++++
This patch adds a helper function send_single_nmi. The fisrt caller will soon come with the following patch. Signed-off-by: Kaige Fu <kaige.fu@...> --- hypervisor/arch/x86/lapic.c | 15 +++++++++
|
By
Kaige Fu
· #25957
·
|
|
[PATCH v2 1/7] HV: Push NMI vector on to the exception stack
This patch pushs the NMI vector (2) on to the exception stack. So, we can get the right vector in dispatch_exception. Signed-off-by: Kaige Fu <kaige.fu@...> --- hypervisor/arch/x86/idt.S | 6 +++
This patch pushs the NMI vector (2) on to the exception stack. So, we can get the right vector in dispatch_exception. Signed-off-by: Kaige Fu <kaige.fu@...> --- hypervisor/arch/x86/idt.S | 6 +++
|
By
Kaige Fu
· #25956
·
|
|
[PATCH v2 0/7] Use NMI to nofity vCPUs with lapic-pt
ACRN hypervisor needs to kick vCPU off VMX non-root mode to do some operations in hypervisor, such as interrupt/exception injection, EPT flush etc. For non lapic-pt vCPUs, we can use IPI to do so. But
ACRN hypervisor needs to kick vCPU off VMX non-root mode to do some operations in hypervisor, such as interrupt/exception injection, EPT flush etc. For non lapic-pt vCPUs, we can use IPI to do so. But
|
By
Kaige Fu
· #25955
·
|
|
[PATCH 0/7] Use NMI to nofity vCPUs with lapic-pt
Hi Sainath,
By
Kaige Fu
· #25944
·
|
|
[PATCH 0/7] Use NMI to nofity vCPUs with lapic-pt
Hi Sainath, Thanks for your review. Comment inline.
Hi Sainath, Thanks for your review. Comment inline.
|
By
Kaige Fu
· #25943
·
|
|
[PATCH 1/7] HV: Push NMI vector on to the exception stack
Hi Eddie,
By
Kaige Fu
· #25933
·
|
|
[PATCH 7/7] HV: Remove INIT signal notification related code
We don't use INIT signal notification method now. This patch removes them. Signed-off-by: Kaige Fu <kaige.fu@...> --- hypervisor/arch/x86/guest/vmexit.c | 21 +-------------------- hypervisor/arc
We don't use INIT signal notification method now. This patch removes them. Signed-off-by: Kaige Fu <kaige.fu@...> --- hypervisor/arch/x86/guest/vmexit.c | 21 +-------------------- hypervisor/arc
|
By
Kaige Fu
· #25920
·
|
|
[PATCH 6/7] HV: Use NMI to replace INIT signal for lapic-pt VMs S5
We have implemented a new notification method using NMI. So replace the INIT notification method with the NMI one. Then we can remove INIT notification related code later. Signed-off-by: Kaige Fu <kai
We have implemented a new notification method using NMI. So replace the INIT notification method with the NMI one. Then we can remove INIT notification related code later. Signed-off-by: Kaige Fu <kai
|
By
Kaige Fu
· #25919
·
|
|
[PATCH 5/7] HV: Use NMI-window exiting to address req missing issue
There is a window where we may miss the current request in the notification period when the work flow is as the following: CPUx + + CPUr | | | +--+ | | | Handle pending req | <--+ +--+ | | | Set req f
There is a window where we may miss the current request in the notification period when the work flow is as the following: CPUx + + CPUr | | | +--+ | | | Handle pending req | <--+ +--+ | | | Set req f
|
By
Kaige Fu
· #25918
·
|
|
[PATCH 4/7] HV: ignore the NMI injection request for lapic-pt vCPUs
NMI will be used as notification signal for lapic-pt vCPUs and we don't support vNMI yet. So, this patch ignore the pending NMI request and EXCP with vector 2. Signed-off-by: Kaige Fu <kaige.fu@intel.
NMI will be used as notification signal for lapic-pt vCPUs and we don't support vNMI yet. So, this patch ignore the pending NMI request and EXCP with vector 2. Signed-off-by: Kaige Fu <kaige.fu@intel.
|
By
Kaige Fu
· #25917
·
|
|
[PATCH 3/7] HV: Use NMI to kick lapic-pt vCPU's thread
ACRN hypervisor needs to kick vCPU off VMX non-root mode to do some operations in hypervisor, such as interrupt/exception injection, EPT flush etc. For non lapic-pt vCPUs, we can use IPI to do so. But
ACRN hypervisor needs to kick vCPU off VMX non-root mode to do some operations in hypervisor, such as interrupt/exception injection, EPT flush etc. For non lapic-pt vCPUs, we can use IPI to do so. But
|
By
Kaige Fu
· #25916
·
|
|
[PATCH 2/7] HV: Add helper function send_single_nmi
This patch adds a helper function send_single_nmi. The fisrt caller will soon come with the following patch. Signed-off-by: Kaige Fu <kaige.fu@...> --- hypervisor/arch/x86/lapic.c | 15 +++++++++
This patch adds a helper function send_single_nmi. The fisrt caller will soon come with the following patch. Signed-off-by: Kaige Fu <kaige.fu@...> --- hypervisor/arch/x86/lapic.c | 15 +++++++++
|
By
Kaige Fu
· #25915
·
|
|
[PATCH 1/7] HV: Push NMI vector on to the exception stack
This patch pushs the NMI vector (2) on to the exception stack. So, we can get the right vector in dispatch_exception. Signed-off-by: Kaige Fu <kaige.fu@...> --- hypervisor/arch/x86/idt.S | 6 +++
This patch pushs the NMI vector (2) on to the exception stack. So, we can get the right vector in dispatch_exception. Signed-off-by: Kaige Fu <kaige.fu@...> --- hypervisor/arch/x86/idt.S | 6 +++
|
By
Kaige Fu
· #25914
·
|