kernel_optimize_test/drivers/kvm
Avi Kivity e6adf28365 KVM: Avoid saving and restoring some host CPU state on lightweight vmexit
Many msrs and the like will only be used by the host if we schedule() or
return to userspace.  Therefore, we avoid saving them if we handle the
exit within the kernel, and if a reschedule is not requested.

Based on a patch from Eddie Dong <eddie.dong@intel.com> with a couple of
fixes by me.

Signed-off-by: Yaozu(Eddie) Dong <eddie.dong@intel.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2007-07-16 12:05:38 +03:00
..
Kconfig [S390] Kconfig: refine depends statements. 2007-05-10 15:46:07 +02:00
kvm_main.c KVM: Avoid saving and restoring some host CPU state on lightweight vmexit 2007-07-16 12:05:38 +03:00
kvm_svm.h KVM: SVM: Only save/restore MSRs when needed 2007-05-03 10:52:32 +03:00
kvm.h KVM: Avoid saving and restoring some host CPU state on lightweight vmexit 2007-07-16 12:05:38 +03:00
Makefile [PATCH] kvm: userspace interface 2006-12-10 09:57:22 -08:00
mmu.c KVM: Assume that writes smaller than 4 bytes are to non-pagetable pages 2007-07-16 12:05:38 +03:00
paging_tmpl.h KVM: Per-vcpu statistics 2007-05-03 10:52:30 +03:00
segment_descriptor.h [PATCH] kvm: userspace interface 2006-12-10 09:57:22 -08:00
svm.c KVM: SVM: Allow direct guest access to PC debug port 2007-07-16 12:05:37 +03:00
svm.h KVM: SVM: forbid guest to execute monitor/mwait 2007-05-03 10:52:26 +03:00
vmx.c KVM: Avoid saving and restoring some host CPU state on lightweight vmexit 2007-07-16 12:05:38 +03:00
vmx.h [PATCH] kvm: vmx: handle triple faults by returning EXIT_REASON_SHUTDOWN to userspace 2007-02-12 09:48:40 -08:00
x86_emulate.c KVM: Allow passing 64-bit values to the emulated read/write API 2007-05-03 10:52:31 +03:00
x86_emulate.h KVM: Allow passing 64-bit values to the emulated read/write API 2007-05-03 10:52:31 +03:00