From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: [PATCH v3 0/2] Keep cr3 cached in VMCS Date: Wed, 22 Dec 2010 16:20:49 +0200 Message-ID: <1293027651-14401-1-git-send-email-avi@redhat.com> To: Marcelo Tosatti , kvm@vger.kernel.org Return-path: Received: from mx1.redhat.com ([209.132.183.28]:1025 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751681Ab0LVOVE (ORCPT ); Wed, 22 Dec 2010 09:21:04 -0500 Received: from int-mx09.intmail.prod.int.phx2.redhat.com (int-mx09.intmail.prod.int.phx2.redhat.com [10.5.11.22]) by mx1.redhat.com (8.13.8/8.13.8) with ESMTP id oBMEL38V019902 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK) for ; Wed, 22 Dec 2010 09:21:03 -0500 Received: from cleopatra.tlv.redhat.com (cleopatra.tlv.redhat.com [10.35.255.11]) by int-mx09.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id oBMEL2bF005627 for ; Wed, 22 Dec 2010 09:21:03 -0500 Sender: kvm-owner@vger.kernel.org List-ID: This patchset keeps cr3 cached in the VMCS (GUEST_CR3) instead of syncing it every exit. Saves a VMREAD/VMWRITE on Intel with EPT enabled. Avi Kivity (2): KVM: Replace reads of vcpu->arch.cr3 by an accessor KVM: Fetch guest cr3 from hardware on demand v3: mark cr3 as available when we write it remove misleading comment in vmx_decache_cr3() v2: fix ept identity pagetable leak into guest cr3 arch/x86/include/asm/kvm_host.h | 2 ++ arch/x86/kvm/kvm_cache_regs.h | 7 +++++++ arch/x86/kvm/mmu.c | 6 +++--- arch/x86/kvm/svm.c | 13 +++++++++---- arch/x86/kvm/vmx.c | 29 ++++++++++++++++++++--------- arch/x86/kvm/x86.c | 21 ++++++++++++--------- 6 files changed, 53 insertions(+), 25 deletions(-)