|
[PATCH 0/4] Implementation of smpcall for lapic_pt VMs using NMI
Any comments?
By
Kaige Fu
· #26362
·
|
|
[PATCH 2/2] DM: Reset the INTx pinstate when configure lintr route
Ping ...
By
Kaige Fu
· #26361
·
|
|
[PATCH 1/2] DM: Fix pci_irq_assert/deassert
Ping ...
By
Kaige Fu
· #26360
·
|
|
[PATCH 4/4] HV: Remove unused function send_dest_ipi_mask
There are no callers of send_dest_ipi_mask. This patch removes it. Signed-off-by: Kaige Fu <kaige.fu@...> --- hypervisor/arch/x86/lapic.c | 22 ---------------------- hypervisor/include/arch/x86/
There are no callers of send_dest_ipi_mask. This patch removes it. Signed-off-by: Kaige Fu <kaige.fu@...> --- hypervisor/arch/x86/lapic.c | 22 ---------------------- hypervisor/include/arch/x86/
|
By
Kaige Fu
· #26337
·
|
|
[PATCH 3/4] HV: Implement smp call for lapic_pt VMs using NMI
There are some functions which rely on smp call, such as vcpu_dumpreg. This function is very useful when debug guest hang issue as it can provides the vCPU contexts where the guest hang at. So, this p
There are some functions which rely on smp call, such as vcpu_dumpreg. This function is very useful when debug guest hang issue as it can provides the vCPU contexts where the guest hang at. So, this p
|
By
Kaige Fu
· #26336
·
|
|
[PATCH 2/4] HV: Introduce new API exec_smp_call
This patch introduces a new exec_smp_call to execute the smp call funtion on target CPUs. Currently, it is only called by kick_notification. And we will call it in NMI notification function in coming
This patch introduces a new exec_smp_call to execute the smp call funtion on target CPUs. Currently, it is only called by kick_notification. And we will call it in NMI notification function in coming
|
By
Kaige Fu
· #26335
·
|
|
[PATCH 1/4] HV: Introduce a new local function notify_cpus
This patch introduces a new local function notify_cpus to replace send_dest_ipi_mask. And in following patch, we will check if the target cpu is for lapic_pt enabled vCPU in notify_cpus. If yes, we wi
This patch introduces a new local function notify_cpus to replace send_dest_ipi_mask. And in following patch, we will check if the target cpu is for lapic_pt enabled vCPU in notify_cpus. If yes, we wi
|
By
Kaige Fu
· #26334
·
|
|
[PATCH 0/4] Implementation of smpcall for lapic_pt VMs using NMI
There are some functions which rely on smp call, such as vcpu_dumpreg. This function is very useful when debug guest hang issue as it can provides the vCPU contexts where the guest hang at. So, this p
There are some functions which rely on smp call, such as vcpu_dumpreg. This function is very useful when debug guest hang issue as it can provides the vCPU contexts where the guest hang at. So, this p
|
By
Kaige Fu
· #26333
·
|
|
[PATCH 2/2] DM: Reset the INTx pinstate when configure lintr route
DM ACPI provides the guest with 'active low' for INTx polarity. So, the initial pin state should be 'HIGH' to indicate that there is no interrupts asserted. Signed-off-by: Kaige Fu <kaige.fu@...
DM ACPI provides the guest with 'active low' for INTx polarity. So, the initial pin state should be 'HIGH' to indicate that there is no interrupts asserted. Signed-off-by: Kaige Fu <kaige.fu@...
|
By
Kaige Fu
· #26332
·
|
|
[PATCH 1/2] DM: Fix pci_irq_assert/deassert
DM ACPI provides the guest with 'active low' for INTx polarity. So, we should set 'LOW' to assert one interrupt and 'HIGH' to deassert one interrupt. Signed-off-by: Shuo Liu <shuo.a.liu@...> Sig
DM ACPI provides the guest with 'active low' for INTx polarity. So, we should set 'LOW' to assert one interrupt and 'HIGH' to deassert one interrupt. Signed-off-by: Shuo Liu <shuo.a.liu@...> Sig
|
By
Kaige Fu
· #26331
·
|
|
[PATCH 0/2] vIOAPIC INTx fix
vIOAPIC pinstate should be reset to initial state when configure lintr route according pin polarity. Currently, ACRN devicemodel provides guest with 'active low' polarity. This patchset resets the INT
vIOAPIC pinstate should be reset to initial state when configure lintr route according pin polarity. Currently, ACRN devicemodel provides guest with 'active low' polarity. This patchset resets the INT
|
By
Kaige Fu
· #26330
·
|
|
[PATCH v5 4/5] HV: Use NMI to replace INIT signal for lapic-pt VMs S5
Hi Eddie,
By
Kaige Fu
· #26141
·
|
|
[PATCH v5 3/5] HV: Use NMI-window exiting to address req missing issue
Hi Eddie,
By
Kaige Fu
· #26140
·
|
|
[PATCH v5 2/5] HV: Don't make NMI injection req when notifying vCPU
Hi Eddie,
By
Kaige Fu
· #26127
·
|
|
[PATCH v5 5/5] HV: Remove INIT signal notification related code
We don't use INIT signal notification method now. This patch removes them. Signed-off-by: Kaige Fu <kaige.fu@...> --- hypervisor/arch/x86/guest/vmexit.c | 21 +-------------------- hypervisor/arc
We don't use INIT signal notification method now. This patch removes them. Signed-off-by: Kaige Fu <kaige.fu@...> --- hypervisor/arch/x86/guest/vmexit.c | 21 +-------------------- hypervisor/arc
|
By
Kaige Fu
· #26119
·
|
|
[PATCH v5 4/5] HV: Use NMI to replace INIT signal for lapic-pt VMs S5
We have implemented a new notification method using NMI. So replace the INIT notification method with the NMI one. Then we can remove INIT notification related code later. Signed-off-by: Kaige Fu <kai
We have implemented a new notification method using NMI. So replace the INIT notification method with the NMI one. Then we can remove INIT notification related code later. Signed-off-by: Kaige Fu <kai
|
By
Kaige Fu
· #26118
·
|
|
[PATCH v5 3/5] HV: Use NMI-window exiting to address req missing issue
There is a window where we may miss the current request in the notification period when the work flow is as the following: CPUx + + CPUr | | | +--+ | | | Handle pending req | <--+ +--+ | | | Set req f
There is a window where we may miss the current request in the notification period when the work flow is as the following: CPUx + + CPUr | | | +--+ | | | Handle pending req | <--+ +--+ | | | Set req f
|
By
Kaige Fu
· #26117
·
|
|
[PATCH v5 2/5] HV: Don't make NMI injection req when notifying vCPU
The NMI for notification should not be inject to guest. So, this patch drops NMI injection request when we use NMI to notify vCPUs. Meanwhile, ACRN doesn't support vNMI well and there is no well-desig
The NMI for notification should not be inject to guest. So, this patch drops NMI injection request when we use NMI to notify vCPUs. Meanwhile, ACRN doesn't support vNMI well and there is no well-desig
|
By
Kaige Fu
· #26116
·
|
|
[PATCH v5 1/5] HV: Use NMI to kick lapic-pt vCPU's thread
ACRN hypervisor needs to kick vCPU off VMX non-root mode to do some operations in hypervisor, such as interrupt/exception injection, EPT flush etc. For non lapic-pt vCPUs, we can use IPI to do so. But
ACRN hypervisor needs to kick vCPU off VMX non-root mode to do some operations in hypervisor, such as interrupt/exception injection, EPT flush etc. For non lapic-pt vCPUs, we can use IPI to do so. But
|
By
Kaige Fu
· #26115
·
|
|
[PATCH v5 0/5] Use NMI to notify vCPUs with lapic-pt
ACRN hypervisor needs to kick vCPU off VMX non-root mode to do some operations in hypervisor, such as interrupt/exception injection, EPT flush etc. For non lapic-pt vCPUs, we can use IPI to do so. But
ACRN hypervisor needs to kick vCPU off VMX non-root mode to do some operations in hypervisor, such as interrupt/exception injection, EPT flush etc. For non lapic-pt vCPUs, we can use IPI to do so. But
|
By
Kaige Fu
· #26114
·
|