From: Dave.Martin@arm.com (Dave Martin)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v6 14/15] KVM: arm64: Fold redundant exit code checks out of fixup_guest_exit()
Date: Tue, 8 May 2018 17:44:59 +0100 [thread overview]
Message-ID: <1525797900-5548-15-git-send-email-Dave.Martin@arm.com> (raw)
In-Reply-To: <1525797900-5548-1-git-send-email-Dave.Martin@arm.com>
The entire tail of fixup_guest_exit() is contained in if statements
of the form if (x && *exit_code == ARM_EXCEPTION_TRAP). As a result,
we can check just once and bail out of the function early, allowing
the remaining if conditions to be simplified.
The only awkward case is where *exit_code is changed to
ARM_EXCEPTION_EL1_SERROR in the case of an illegal GICv2 CPU
interface access: in that case, the GICv3 trap handling code is
skipped using a goto. This avoids pointlessly evaluating the
static branch check for the GICv3 case, even though we can't have
vgic_v2_cpuif_trap and vgic_v3_cpuif_trap true simultaneously
unless we have a GICv3 and GICv2 on the host: that sounds stupid,
but I haven't satisfied myself that it can't happen.
No functional change.
Signed-off-by: Dave Martin <Dave.Martin@arm.com>
---
Changes since v5:
Requested by Marc Zyngier:
* Move "goto exit" to the end of the data abort handling code under
gicv2 cpuif trap handling, since the gicv3-specific handling is only
for sysreg traps.
---
arch/arm64/kvm/hyp/switch.c | 12 ++++++++----
1 file changed, 8 insertions(+), 4 deletions(-)
diff --git a/arch/arm64/kvm/hyp/switch.c b/arch/arm64/kvm/hyp/switch.c
index 21e5543..5be472d 100644
--- a/arch/arm64/kvm/hyp/switch.c
+++ b/arch/arm64/kvm/hyp/switch.c
@@ -386,11 +386,13 @@ static bool __hyp_text fixup_guest_exit(struct kvm_vcpu *vcpu, u64 *exit_code)
* same PC once the SError has been injected, and replay the
* trapping instruction.
*/
- if (*exit_code == ARM_EXCEPTION_TRAP && !__populate_fault_info(vcpu))
+ if (*exit_code != ARM_EXCEPTION_TRAP)
+ goto exit;
+
+ if (!__populate_fault_info(vcpu))
return true;
- if (static_branch_unlikely(&vgic_v2_cpuif_trap) &&
- *exit_code == ARM_EXCEPTION_TRAP) {
+ if (static_branch_unlikely(&vgic_v2_cpuif_trap)) {
bool valid;
valid = kvm_vcpu_trap_get_class(vcpu) == ESR_ELx_EC_DABT_LOW &&
@@ -416,11 +418,12 @@ static bool __hyp_text fixup_guest_exit(struct kvm_vcpu *vcpu, u64 *exit_code)
*vcpu_cpsr(vcpu) &= ~DBG_SPSR_SS;
*exit_code = ARM_EXCEPTION_EL1_SERROR;
}
+
+ goto exit;
}
}
if (static_branch_unlikely(&vgic_v3_cpuif_trap) &&
- *exit_code == ARM_EXCEPTION_TRAP &&
(kvm_vcpu_trap_get_class(vcpu) == ESR_ELx_EC_SYS64 ||
kvm_vcpu_trap_get_class(vcpu) == ESR_ELx_EC_CP15_32)) {
int ret = __vgic_v3_perform_cpuif_access(vcpu);
@@ -429,6 +432,7 @@ static bool __hyp_text fixup_guest_exit(struct kvm_vcpu *vcpu, u64 *exit_code)
return true;
}
+exit:
/* Return to the host kernel and handle the exit */
return false;
}
--
2.1.4
next prev parent reply other threads:[~2018-05-08 16:44 UTC|newest]
Thread overview: 31+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-05-08 16:44 [PATCH v6 00/15] KVM: arm64: Optimise FPSIMD context switching Dave Martin
2018-05-08 16:44 ` [PATCH v6 01/15] thread_info: Add update_thread_flag() helpers Dave Martin
2018-05-08 17:08 ` Steven Rostedt
2018-05-09 9:07 ` Marc Zyngier
2018-05-08 16:44 ` [PATCH v6 02/15] arm64: Use update{,_tsk}_thread_flag() Dave Martin
2018-05-09 9:09 ` Marc Zyngier
2018-05-08 16:44 ` [PATCH v6 03/15] KVM: arm/arm64: Introduce kvm_arch_vcpu_run_pid_change Dave Martin
2018-05-08 16:44 ` [PATCH v6 04/15] KVM: arm64: Convert lazy FPSIMD context switch trap to C Dave Martin
2018-05-08 16:44 ` [PATCH v6 05/15] arm64: fpsimd: Generalise context saving for non-task contexts Dave Martin
2018-05-08 16:44 ` [PATCH v6 06/15] KVM: arm64: Repurpose vcpu_arch.debug_flags for general-purpose flags Dave Martin
2018-05-09 8:27 ` Marc Zyngier
2018-05-08 16:44 ` [PATCH v6 07/15] KVM: arm64: Optimise FPSIMD handling to reduce guest/host thrashing Dave Martin
2018-05-09 8:24 ` Marc Zyngier
2018-05-09 9:17 ` Dave Martin
2018-05-09 9:46 ` Marc Zyngier
2018-05-09 10:00 ` Dave Martin
2018-05-08 16:44 ` [PATCH v6 08/15] arm64/sve: Move read_zcr_features() out of cpufeature.h Dave Martin
2018-05-09 8:28 ` Marc Zyngier
2018-05-08 16:44 ` [PATCH v6 09/15] arm64/sve: Switch sve_pffr() argument from task to thread Dave Martin
2018-05-09 8:44 ` Marc Zyngier
2018-05-08 16:44 ` [PATCH v6 10/15] arm64/sve: Move sve_pffr() to fpsimd.h and make inline Dave Martin
2018-05-09 8:46 ` Marc Zyngier
2018-05-08 16:44 ` [PATCH v6 11/15] KVM: arm64: Save host SVE context as appropriate Dave Martin
2018-05-09 8:50 ` Marc Zyngier
2018-05-09 9:30 ` Dave Martin
2018-05-08 16:44 ` [PATCH v6 12/15] KVM: arm64: Remove eager host SVE state saving Dave Martin
2018-05-09 8:56 ` Marc Zyngier
2018-05-08 16:44 ` [PATCH v6 13/15] KVM: arm64: Remove redundant *exit_code changes in fpsimd_guest_exit() Dave Martin
2018-05-08 16:44 ` Dave Martin [this message]
2018-05-09 9:05 ` [PATCH v6 14/15] KVM: arm64: Fold redundant exit code checks out of fixup_guest_exit() Marc Zyngier
2018-05-08 16:45 ` [PATCH v6 15/15] KVM: arm64: Invoke FPSIMD context switch trap from C Dave Martin
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1525797900-5548-15-git-send-email-Dave.Martin@arm.com \
--to=dave.martin@arm.com \
--cc=linux-arm-kernel@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).