Home
last modified time | relevance | path

Searched hist:d11974dc5f208ae1c0fe62a9bcb47c0cdcd7b081 (Results 1 – 2 of 2) sorted by relevance

/linux/arch/arm64/kvm/
H A Dmmio.cdiff d11974dc5f208ae1c0fe62a9bcb47c0cdcd7b081 Thu Oct 26 22:53:06 CEST 2023 Oliver Upton <oliver.upton@linux.dev> KVM: arm64: Add tracepoint for MMIO accesses where ISV==0

It is a pretty well known fact that KVM does not support MMIO emulation
without valid instruction syndrome information (ESR_EL2.ISV == 0). The
current kvm_pr_unimpl() is pretty useless, as it contains zero context
to relate the event to a vCPU.

Replace it with a precise tracepoint that dumps the relevant context
so the user can make sense of what the guest is doing.

Acked-by: Zenghui Yu <yuzenghui@huawei.com>
Acked-by: Marc Zyngier <maz@kernel.org>
Link: https://lore.kernel.org/r/20231026205306.3045075-1-oliver.upton@linux.dev
Signed-off-by: Oliver Upton <oliver.upton@linux.dev>
H A Dtrace_arm.hdiff d11974dc5f208ae1c0fe62a9bcb47c0cdcd7b081 Thu Oct 26 22:53:06 CEST 2023 Oliver Upton <oliver.upton@linux.dev> KVM: arm64: Add tracepoint for MMIO accesses where ISV==0

It is a pretty well known fact that KVM does not support MMIO emulation
without valid instruction syndrome information (ESR_EL2.ISV == 0). The
current kvm_pr_unimpl() is pretty useless, as it contains zero context
to relate the event to a vCPU.

Replace it with a precise tracepoint that dumps the relevant context
so the user can make sense of what the guest is doing.

Acked-by: Zenghui Yu <yuzenghui@huawei.com>
Acked-by: Marc Zyngier <maz@kernel.org>
Link: https://lore.kernel.org/r/20231026205306.3045075-1-oliver.upton@linux.dev
Signed-off-by: Oliver Upton <oliver.upton@linux.dev>