diff options
author | Sean Christopherson <seanjc@google.com> | 2024-10-01 08:00:44 +0300 |
---|---|---|
committer | Sean Christopherson <seanjc@google.com> | 2025-02-25 18:23:07 +0300 |
commit | b50cb2b1555d8714e12a566b9b49fcac56a04a3f (patch) | |
tree | 08676d48c466cbf38e0f0528cbf9c26d80339d53 /tools/perf/scripts/python/task-analyzer.py | |
parent | 4fa0efb43a781055d146298a7ae886d529488d82 (diff) | |
download | linux-b50cb2b1555d8714e12a566b9b49fcac56a04a3f.tar.xz |
KVM: x86: Use a dedicated flow for queueing re-injected exceptions
Open code the filling of vcpu->arch.exception in kvm_requeue_exception()
instead of bouncing through kvm_multiple_exception(), as re-injection
doesn't actually share that much code with "normal" injection, e.g. the
VM-Exit interception check, payload delivery, and nested exception code
is all bypassed as those flows only apply during initial injection.
When FRED comes along, the special casing will only get worse, as FRED
explicitly tracks nested exceptions and essentially delivers the payload
on the stack frame, i.e. re-injection will need more inputs, and normal
injection will have yet more code that needs to be bypassed when KVM is
re-injecting an exception.
No functional change intended.
Signed-off-by: Xin Li (Intel) <xin@zytor.com>
Tested-by: Shan Kang <shan.kang@intel.com>
Link: https://lore.kernel.org/r/20241001050110.3643764-2-xin@zytor.com
Signed-off-by: Sean Christopherson <seanjc@google.com>
Diffstat (limited to 'tools/perf/scripts/python/task-analyzer.py')
0 files changed, 0 insertions, 0 deletions