|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 4/7] vm-event/x86: use vm_event_vcpu_enter properly
>>> On 16.06.16 at 16:09, <czuzu@xxxxxxxxxxxxxxx> wrote:
> @@ -2199,7 +2153,9 @@ int hvm_set_cr0(unsigned long value, bool_t may_defer)
>
> if ( hvm_event_crX(CR0, value, old_value) )
> {
> - /* The actual write will occur in hvm_do_resume(), if permitted.
> */
> + /* The actual write will occur in vcpu_enter_write_data(), if
> + * permitted.
> + */
Coding style.
> @@ -1432,18 +1430,16 @@ static void vmx_update_guest_cr(struct vcpu *v,
> unsigned int cr)
> if ( paging_mode_hap(v->domain) )
> {
> /* Manage GUEST_CR3 when CR0.PE=0. */
> + uint32_t old_ctls = v->arch.hvm_vmx.exec_control;
> uint32_t cr3_ctls = (CPU_BASED_CR3_LOAD_EXITING |
> CPU_BASED_CR3_STORE_EXITING);
> +
> v->arch.hvm_vmx.exec_control &= ~cr3_ctls;
> if ( !hvm_paging_enabled(v) && !vmx_unrestricted_guest(v) )
> v->arch.hvm_vmx.exec_control |= cr3_ctls;
>
> - /* Trap CR3 updates if CR3 memory events are enabled. */
> - if ( v->domain->arch.monitor.write_ctrlreg_enabled &
> - monitor_ctrlreg_bitmask(VM_EVENT_X86_CR3) )
> - v->arch.hvm_vmx.exec_control |= CPU_BASED_CR3_LOAD_EXITING;
> -
> - vmx_update_cpu_exec_control(v);
> + if ( old_ctls != v->arch.hvm_vmx.exec_control )
> + vmx_update_cpu_exec_control(v);
> }
How does this match up with the rest of this patch?
> @@ -179,6 +182,105 @@ void vm_event_fill_regs(vm_event_request_t *req)
> req->data.regs.x86.cs_arbytes = seg.attr.bytes;
> }
>
> +static inline void vcpu_enter_write_data(struct vcpu *v)
Please allow the compiler to decide whether to inline such larger
functions.
> +void arch_vm_event_vcpu_enter(struct vcpu *v)
> +{
> + /* vmx only */
> + ASSERT( cpu_has_vmx );
Stray blanks.
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |