kvmarm.lists.cs.columbia.edu archive mirror
 help / color / mirror / Atom feed
* [PATCH v3 0/2] KVM: arm64: Skip more of the SError vaxorcism
@ 2019-06-18 15:18 James Morse
  2019-06-18 15:18 ` [PATCH v3 1/2] KVM: arm64: Re-mask SError after the one instruction window James Morse
  2019-06-18 15:18 ` [PATCH v3 2/2] KVM: arm64: Skip more of the SError vaxorcism James Morse
  0 siblings, 2 replies; 3+ messages in thread
From: James Morse @ 2019-06-18 15:18 UTC (permalink / raw)
  To: linux-arm-kernel, kvmarm; +Cc: Marc Zyngier

In guest_enter we used ISR_EL1 to know if an SError is pending as we
really don't want to take it as an exception. We can do the same
in guest_exit, which saves toggling bits in pstate.

This lets us leave SError masked for the remainder of world-switch
without having to toggle pstate twice.

Changes since v2:
 * Added patch 1 of this series to make the 'SError remains masked'
   behaviour explicit
 * Added missing isb before the isr_el1 read.

James Morse (2):
  KVM: arm64: Re-mask SError after the one instruction window
  KVM: arm64: Skip more of the SError vaxorcism

 arch/arm64/kvm/hyp/entry.S | 16 ++++++++++++----
 1 file changed, 12 insertions(+), 4 deletions(-)

-- 
2.20.1

_______________________________________________
kvmarm mailing list
kvmarm@lists.cs.columbia.edu
https://lists.cs.columbia.edu/mailman/listinfo/kvmarm

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2019-06-18 15:18 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-06-18 15:18 [PATCH v3 0/2] KVM: arm64: Skip more of the SError vaxorcism James Morse
2019-06-18 15:18 ` [PATCH v3 1/2] KVM: arm64: Re-mask SError after the one instruction window James Morse
2019-06-18 15:18 ` [PATCH v3 2/2] KVM: arm64: Skip more of the SError vaxorcism James Morse

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).