Re: Xen (HVM) and NMI

2019-11-08 Thread Roger Pau Monné
On Fri, Nov 08, 2019 at 03:15:40PM +0200, Andriy Gapon wrote: > On 08/11/2019 11:57, Roger Pau Monné wrote: > > On Fri, Nov 08, 2019 at 10:19:01AM +0200, Andriy Gapon wrote: > >>> I found this in Linux code: > >>> HYPERVISOR_vcpu_op(VCPUOP_send_nmi, xen_vcpu_nr(cpu), NULL); > >>> It's in

Re: Xen (HVM) and NMI

2019-11-08 Thread Roger Pau Monné
On Fri, Nov 08, 2019 at 10:19:01AM +0200, Andriy Gapon wrote: > On 08/11/2019 10:03, Andriy Gapon wrote: > > On 07/11/2019 20:08, Andriy Gapon wrote: > >> For CPUs that do get interrupted I see stack traces like: > >> cpustop_handler+0x28 ipi_nmi_handler+0x44 xen_cpustophard_handler+0x9 > >>

Re: Xen (HVM) and NMI

2019-11-08 Thread Andriy Gapon
On 08/11/2019 10:03, Andriy Gapon wrote: > On 07/11/2019 20:08, Andriy Gapon wrote: >> For CPUs that do get interrupted I see stack traces like: >> cpustop_handler+0x28 ipi_nmi_handler+0x44 xen_cpustophard_handler+0x9 >> intr_event_handle+0x8b intr_execute_handlers+0x58 >>

Re: Xen (HVM) and NMI

2019-11-08 Thread Andriy Gapon
On 07/11/2019 20:08, Andriy Gapon wrote: > For CPUs that do get interrupted I see stack traces like: > cpustop_handler+0x28 ipi_nmi_handler+0x44 xen_cpustophard_handler+0x9 > intr_event_handle+0x8b intr_execute_handlers+0x58 xen_intr_handle_upcall+0x15a > xen_intr_upcall_u+0x96 ... > So, it looks