search for: enable_apicv

Displaying 5 results from an estimated 5 matches for "enable_apicv".

2015 Nov 02
1
[kvm-unit-tests PATCH] x86: hyperv_synic: Hyper-V SynIC test
...; by the processor, and the auto-EOI behavior will be skipped. > > The solution is to have userspace enable KVM_CAP_HYPERV_SYNIC through > KVM_ENABLE_CAP, and modify vmx.c to not use apicv on VMs that have it > enabled. This requires some changes to the callbacks that only work if > enable_apicv or !enable_apicv: > > if (enable_apicv) > kvm_x86_ops->update_cr8_intercept = NULL; > else { > kvm_x86_ops->hwapic_irr_update = NULL; > kvm_x86_ops->hwapic_isr_update = NULL; > kvm_x86_ops-...
2015 Nov 02
1
[kvm-unit-tests PATCH] x86: hyperv_synic: Hyper-V SynIC test
...; by the processor, and the auto-EOI behavior will be skipped. > > The solution is to have userspace enable KVM_CAP_HYPERV_SYNIC through > KVM_ENABLE_CAP, and modify vmx.c to not use apicv on VMs that have it > enabled. This requires some changes to the callbacks that only work if > enable_apicv or !enable_apicv: > > if (enable_apicv) > kvm_x86_ops->update_cr8_intercept = NULL; > else { > kvm_x86_ops->hwapic_irr_update = NULL; > kvm_x86_ops->hwapic_isr_update = NULL; > kvm_x86_ops-...
2015 Oct 26
3
[kvm-unit-tests PATCH] x86: hyperv_synic: Hyper-V SynIC test
Hyper-V SynIC is a Hyper-V synthetic interrupt controller. The test runs on every vCPU and performs the following steps: * read from all Hyper-V SynIC MSR's * setup Hyper-V SynIC evt/msg pages * setup SINT's routing * inject SINT's into destination vCPU by 'hyperv-synic-test-device' * wait for SINT's isr's completion * clear Hyper-V SynIC evt/msg pages and destroy
2015 Oct 26
3
[kvm-unit-tests PATCH] x86: hyperv_synic: Hyper-V SynIC test
Hyper-V SynIC is a Hyper-V synthetic interrupt controller. The test runs on every vCPU and performs the following steps: * read from all Hyper-V SynIC MSR's * setup Hyper-V SynIC evt/msg pages * setup SINT's routing * inject SINT's into destination vCPU by 'hyperv-synic-test-device' * wait for SINT's isr's completion * clear Hyper-V SynIC evt/msg pages and destroy
2015 Nov 02
0
[kvm-unit-tests PATCH] x86: hyperv_synic: Hyper-V SynIC test
...ed in IRR can be injected by the processor, and the auto-EOI behavior will be skipped. The solution is to have userspace enable KVM_CAP_HYPERV_SYNIC through KVM_ENABLE_CAP, and modify vmx.c to not use apicv on VMs that have it enabled. This requires some changes to the callbacks that only work if enable_apicv or !enable_apicv: if (enable_apicv) kvm_x86_ops->update_cr8_intercept = NULL; else { kvm_x86_ops->hwapic_irr_update = NULL; kvm_x86_ops->hwapic_isr_update = NULL; kvm_x86_ops->deliver_posted_interrupt = NULL;...