From patchwork Wed Sep 16 13:24:16 2009 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Joerg Roedel X-Patchwork-Id: 47986 Received: from vger.kernel.org (vger.kernel.org [209.132.176.167]) by demeter.kernel.org (8.14.2/8.14.2) with ESMTP id n8GDTPRa004915 for ; Wed, 16 Sep 2009 13:29:26 GMT Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752585AbZIPN1L (ORCPT ); Wed, 16 Sep 2009 09:27:11 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1755430AbZIPN1J (ORCPT ); Wed, 16 Sep 2009 09:27:09 -0400 Received: from va3ehsobe005.messaging.microsoft.com ([216.32.180.15]:12515 "EHLO VA3EHSOBE005.bigfish.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752585AbZIPNYv (ORCPT ); Wed, 16 Sep 2009 09:24:51 -0400 Received: from mail65-va3-R.bigfish.com (10.7.14.252) by VA3EHSOBE005.bigfish.com (10.7.40.25) with Microsoft SMTP Server id 8.1.340.0; Wed, 16 Sep 2009 13:24:54 +0000 Received: from mail65-va3 (localhost.localdomain [127.0.0.1]) by mail65-va3-R.bigfish.com (Postfix) with ESMTP id 3D948E8154; Wed, 16 Sep 2009 13:24:54 +0000 (UTC) X-SpamScore: 3 X-BigFish: VPS3(zzzz1202hzzz32i203h43j62h) X-Spam-TCS-SCL: 1:0 Received: by mail65-va3 (MessageSwitch) id 1253107492991249_18164; Wed, 16 Sep 2009 13:24:52 +0000 (UCT) Received: from ausb3extmailp01.amd.com (unknown [163.181.251.8]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail65-va3.bigfish.com (Postfix) with ESMTP id D7456D18051; Wed, 16 Sep 2009 13:24:52 +0000 (UTC) Received: from ausb3twp02.amd.com ([163.181.250.38]) by ausb3extmailp01.amd.com (Switch-3.2.7/Switch-3.2.7) with ESMTP id n8GDOm7U028941; Wed, 16 Sep 2009 08:24:51 -0500 X-WSS-ID: 0KQ2FX8-02-2UT-02 X-M-MSG: Received: from sausexbh1.amd.com (sausexbh1.amd.com [163.181.22.101]) by ausb3twp02.amd.com (Tumbleweed MailGate 3.7.0) with ESMTP id 21878C852F; Wed, 16 Sep 2009 08:24:43 -0500 (CDT) Received: from sausexmb5.amd.com ([163.181.49.129]) by sausexbh1.amd.com with Microsoft SMTPSVC(6.0.3790.3959); Wed, 16 Sep 2009 08:24:47 -0500 Received: from SDRSEXMB1.amd.com ([172.20.3.116]) by sausexmb5.amd.com with Microsoft SMTPSVC(6.0.3790.3959); Wed, 16 Sep 2009 08:24:47 -0500 Received: from seurexmb1.amd.com ([165.204.9.130]) by SDRSEXMB1.amd.com with Microsoft SMTPSVC(6.0.3790.3959); Wed, 16 Sep 2009 15:24:31 +0200 Received: from lemmy.amd.com ([165.204.15.93]) by seurexmb1.amd.com with Microsoft SMTPSVC(6.0.3790.3959); Wed, 16 Sep 2009 15:24:23 +0200 Received: by lemmy.amd.com (Postfix, from userid 41430) id B7E43C9AEA; Wed, 16 Sep 2009 15:24:22 +0200 (CEST) From: Joerg Roedel To: Avi Kivity CC: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Alexander Graf , Joerg Roedel Subject: [PATCH 2/5] KVM: SVM: don't copy exit_int_info on nested vmrun Date: Wed, 16 Sep 2009 15:24:16 +0200 Message-ID: <1253107459-8967-3-git-send-email-joerg.roedel@amd.com> X-Mailer: git-send-email 1.6.3.3 In-Reply-To: <1253107459-8967-1-git-send-email-joerg.roedel@amd.com> References: <1253107459-8967-1-git-send-email-joerg.roedel@amd.com> X-OriginalArrivalTime: 16 Sep 2009 13:24:23.0171 (UTC) FILETIME=[01523530:01CA36D1] MIME-Version: 1.0 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org The exit_int_info field is only written by the hardware and never read. So it does not need to be copied on a vmrun emulation. Signed-off-by: Joerg Roedel --- arch/x86/kvm/svm.c | 2 -- 1 files changed, 0 insertions(+), 2 deletions(-) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 668460c..80f5309 100644 --- a/arch/x86/kvm/svm.c +++ b/arch/x86/kvm/svm.c @@ -1790,8 +1790,6 @@ static bool nested_svm_vmrun(struct vcpu_svm *svm) svm->nested.intercept = nested_vmcb->control.intercept; force_new_asid(&svm->vcpu); - svm->vmcb->control.exit_int_info = nested_vmcb->control.exit_int_info; - svm->vmcb->control.exit_int_info_err = nested_vmcb->control.exit_int_info_err; svm->vmcb->control.int_ctl = nested_vmcb->control.int_ctl | V_INTR_MASKING_MASK; if (nested_vmcb->control.int_ctl & V_IRQ_MASK) { nsvm_printk("nSVM Injecting Interrupt: 0x%x\n",