diff options
| author | David Woodhouse <dwmw@amazon.co.uk> | 2022-03-03 15:41:18 +0000 |
|---|---|---|
| committer | Paolo Bonzini <pbonzini@redhat.com> | 2022-04-02 05:41:14 -0400 |
| commit | 35025735a79eaa894c43837b94fd33c9d6b122df (patch) | |
| tree | 8a6c706b671a61c0e7db7b16f37637b03fa35ab4 /tools/perf/scripts/python/bin/stackcollapse-record | |
| parent | 8733068b9bdbc7a54f02dcc59eb0e4789cd60942 (diff) | |
| download | linux-35025735a79eaa894c43837b94fd33c9d6b122df.tar.gz linux-35025735a79eaa894c43837b94fd33c9d6b122df.zip | |
KVM: x86/xen: Support direct injection of event channel events
This adds a KVM_XEN_HVM_EVTCHN_SEND ioctl which allows direct injection
of events given an explicit { vcpu, port, priority } in precisely the
same form that those fields are given in the IRQ routing table.
Userspace is currently able to inject 2-level events purely by setting
the bits in the shared_info and vcpu_info, but FIFO event channels are
harder to deal with; we will need the kernel to take sole ownership of
delivery when we support those.
A patch advertising this feature with a new bit in the KVM_CAP_XEN_HVM
ioctl will be added in a subsequent patch.
Signed-off-by: David Woodhouse <dwmw@amazon.co.uk>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Message-Id: <20220303154127.202856-9-dwmw2@infradead.org>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'tools/perf/scripts/python/bin/stackcollapse-record')
0 files changed, 0 insertions, 0 deletions
