aboutsummaryrefslogtreecommitdiffstats
path: root/tools/perf/scripts/python/libxed.py
diff options
context:
space:
mode:
authorPrasad Pandit <[email protected]>2024-01-03 07:53:43 +0000
committerSean Christopherson <[email protected]>2024-01-31 15:35:07 +0000
commit6231c9e1a9f35b535c66709aa8a6eda40dbc4132 (patch)
tree861d45dcf4ab2792e7f67f00aa0513238d2ad856 /tools/perf/scripts/python/libxed.py
parentLinux 6.8-rc2 (diff)
downloadkernel-6231c9e1a9f35b535c66709aa8a6eda40dbc4132.tar.gz
kernel-6231c9e1a9f35b535c66709aa8a6eda40dbc4132.zip
KVM: x86: make KVM_REQ_NMI request iff NMI pending for vcpu
kvm_vcpu_ioctl_x86_set_vcpu_events() routine makes 'KVM_REQ_NMI' request for a vcpu even when its 'events->nmi.pending' is zero. Ex: qemu_thread_start kvm_vcpu_thread_fn qemu_wait_io_event qemu_wait_io_event_common process_queued_cpu_work do_kvm_cpu_synchronize_post_init/_reset kvm_arch_put_registers kvm_put_vcpu_events (cpu, level=[2|3]) This leads vCPU threads in QEMU to constantly acquire & release the global mutex lock, delaying the guest boot due to lock contention. Add check to make KVM_REQ_NMI request only if vcpu has NMI pending. Fixes: bdedff263132 ("KVM: x86: Route pending NMIs from userspace through process_nmi()") Cc: [email protected] Signed-off-by: Prasad Pandit <[email protected]> Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Sean Christopherson <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/libxed.py')
0 files changed, 0 insertions, 0 deletions