diff options
author | Marc Zyngier <maz@kernel.org> | 2023-01-05 18:25:54 +0300 |
---|---|---|
committer | Marc Zyngier <maz@kernel.org> | 2023-01-05 18:25:54 +0300 |
commit | afbb1b1caef7fb8b23f31f32162dd5756d877dd5 (patch) | |
tree | 628e6df3305d1c38ba277363bd37b82533da518b /tools/perf/scripts/python/export-to-postgresql.py | |
parent | d5b4d07bb361fa893244cf55ce5eb053e29b5562 (diff) | |
parent | b0803ba72b558957fdcfe845939ee788b7ce5919 (diff) | |
download | linux-afbb1b1caef7fb8b23f31f32162dd5756d877dd5.tar.xz |
Merge branch kvm-arm64/s1ptw-write-fault into kvmarm-master/fixes
* kvm-arm64/s1ptw-write-fault:
: .
: Fix S1PTW fault handling that was until then always taken
: as a write. From the cover letter:
:
: `Recent developments on the EFI front have resulted in guests that
: simply won't boot if the page tables are in a read-only memslot and
: that you're a bit unlucky in the way S2 gets paged in... The core
: issue is related to the fact that we treat a S1PTW as a write, which
: is close enough to what needs to be done. Until to get to RO memslots.
:
: The first patch fixes this and is definitely a stable candidate. It
: splits the faulting of page tables in two steps (RO translation fault,
: followed by a writable permission fault -- should it even happen).
: The second one documents the slightly odd behaviour of PTW writes to
: RO memslot, which do not result in a KVM_MMIO exit. The last patch is
: totally optional, only tangentially related, and randomly repainting
: stuff (maybe that's contagious, who knows)."
:
: .
KVM: arm64: Convert FSC_* over to ESR_ELx_FSC_*
KVM: arm64: Document the behaviour of S1PTW faults on RO memslots
KVM: arm64: Fix S1PTW handling on RO memslots
Signed-off-by: Marc Zyngier <maz@kernel.org>
Diffstat (limited to 'tools/perf/scripts/python/export-to-postgresql.py')
0 files changed, 0 insertions, 0 deletions