diff options
| author | Ladi Prosek <lprosek@redhat.com> | 2017-10-17 16:02:39 +0200 |
|---|---|---|
| committer | Radim Krčmář <rkrcmar@redhat.com> | 2017-10-18 21:21:22 +0200 |
| commit | cc3d967f7e32ceeb9b78dc962126ebcf1a2b24b2 (patch) | |
| tree | b5a6a7dc1f6c9c181be3bab24d05b5066b423ce0 /tools/perf/scripts/python/stackcollapse.py | |
| parent | KVM: x86: extend usage of RET_MMIO_PF_* constants (diff) | |
| download | linux-cc3d967f7e32ceeb9b78dc962126ebcf1a2b24b2.tar.gz linux-cc3d967f7e32ceeb9b78dc962126ebcf1a2b24b2.zip | |
KVM: SVM: detect opening of SMI window using STGI intercept
Commit 05cade71cf3b ("KVM: nSVM: fix SMI injection in guest mode") made
KVM mask SMI if GIF=0 but it didn't do anything to unmask it when GIF is
enabled.
The issue manifests for me as a significantly longer boot time of Windows
guests when running with SMM-enabled OVMF.
This commit fixes it by intercepting STGI instead of requesting immediate
exit if the reason why SMM was masked is GIF.
Fixes: 05cade71cf3b ("KVM: nSVM: fix SMI injection in guest mode")
Signed-off-by: Ladi Prosek <lprosek@redhat.com>
Signed-off-by: Radim Krčmář <rkrcmar@redhat.com>
Diffstat (limited to 'tools/perf/scripts/python/stackcollapse.py')
0 files changed, 0 insertions, 0 deletions
