summaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python/stackcollapse.py
diff options
context:
space:
mode:
authorIvan Orlov <iorlov@amazon.com>2024-12-17 21:14:54 +0300
committerSean Christopherson <seanjc@google.com>2024-12-19 02:14:43 +0300
commit704fc6021b9ecd1e5db4c099bb8ed226760d2159 (patch)
tree32c87d672c4fd21ca2a217b0bbb0eceb605dfb13 /tools/perf/scripts/python/stackcollapse.py
parent5c9cfc48663606f26455e4113fd5a1f29b19ddc9 (diff)
downloadlinux-704fc6021b9ecd1e5db4c099bb8ed226760d2159.tar.xz
KVM: x86: Try to unprotect and retry on unhandleable emulation failure
If emulation is "rejected" by check_emulate_instruction(), try to unprotect and retry instruction execution before reporting the error to userspace. Currently, check_emulate_instruction() never signals failure when "unprotect and retry" is possible, but that will change in the future as both VMX and SVM will reject emulation due to coincident exception vectoring. E.g. if there is a write to a shadowed page table when vectoring an event, then unprotecting the gfn and retrying the instruction will allow the guest to make forward progress in most cases, i.e. will allow the vCPU to keep running instead of returning an error to userspace. This ensures that the subsequent patches won't make KVM exit to userspace when handling an intercepted #PF during vectoring without checking whether unprotect and retry is possible. Suggested-by: Sean Christopherson <seanjc@google.com> Signed-off-by: Ivan Orlov <iorlov@amazon.com> Link: https://lore.kernel.org/r/20241217181458.68690-4-iorlov@amazon.com [sean: massage changelog to clarify this is a nop for the current code] Signed-off-by: Sean Christopherson <seanjc@google.com>
Diffstat (limited to 'tools/perf/scripts/python/stackcollapse.py')
0 files changed, 0 insertions, 0 deletions