|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH] VMX: don't needlessly write CR4 guest/host mask
In shadow mode the field never changes from ~0UL, so there's no need for
a VMWRITE (or an update of its cached value).
Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -1585,14 +1585,12 @@ static void vmx_update_guest_cr(struct v
__vmwrite(GUEST_CR4, v->arch.hvm_vcpu.hw_cr[4]);
- if ( !paging_mode_hap(v->domain) )
- /*
- * Shadow path has not been optimized because it requires
- * unconditionally trapping more CR4 bits, at which point the
- * performance benefit of doing this is quite dubious.
- */
- v->arch.hvm_vmx.cr4_host_mask = ~0UL;
- else
+ /*
+ * Shadow path has not been optimized because it requires
+ * unconditionally trapping more CR4 bits, at which point the
+ * performance benefit of doing this is quite dubious.
+ */
+ if ( paging_mode_hap(v->domain) )
{
/*
* Update CR4 host mask to only trap when the guest tries to set
@@ -1617,8 +1615,9 @@ static void vmx_update_guest_cr(struct v
/* Add the nested host mask to get the more restrictive one. */
v->arch.hvm_vmx.cr4_host_mask |= get_vvmcs(v,
CR4_GUEST_HOST_MASK);
+
+ __vmwrite(CR4_GUEST_HOST_MASK, v->arch.hvm_vmx.cr4_host_mask);
}
- __vmwrite(CR4_GUEST_HOST_MASK, v->arch.hvm_vmx.cr4_host_mask);
break;
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |