diff options
author | James Morse <james.morse@arm.com> | 2019-06-18 18:18:09 +0300 |
---|---|---|
committer | Marc Zyngier <marc.zyngier@arm.com> | 2019-07-05 15:03:34 +0300 |
commit | 11b41626bd5327332f5805ad8f8580365a363067 (patch) | |
tree | 4e095c4c6bb322627ab61f4cdb3fc74389436eb7 /virt/kvm | |
parent | dad6321ffacadbd1235faaf84897b63050b81a5f (diff) | |
download | linux-11b41626bd5327332f5805ad8f8580365a363067.tar.xz |
KVM: arm64: Skip more of the SError vaxorcism
During __guest_exit() we need to consume any SError left pending by the
guest so it doesn't contaminate the host. With v8.2 we use the
ESB-instruction. For systems without v8.2, we use dsb+isb and unmask
SError. We do this on every guest exit.
Use the same dsb+isr_el1 trick, this lets us know if an SError is pending
after the dsb, allowing us to skip the isb and self-synchronising PSTATE
write if its not.
This means SError remains masked during KVM's world-switch, so any SError
that occurs during this time is reported by the host, instead of causing
a hyp-panic.
As we're benchmarking this code lets polish the layout. If you give gcc
likely()/unlikely() hints in an if() condition, it shuffles the generated
assembly so that the likely case is immediately after the branch. Lets
do the same here.
Signed-off-by: James Morse <james.morse@arm.com>
Changes since v2:
* Added isb after the dsb to prevent an early read
Signed-off-by: Marc Zyngier <marc.zyngier@arm.com>
Diffstat (limited to 'virt/kvm')
0 files changed, 0 insertions, 0 deletions