summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/hyperv.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge remote-tracking branch 'kvm/master' into HEADPaolo Bonzini2021-12-211-2/+5
|\
| * KVM: x86: Ignore sparse banks size for an "all CPUs", non-sparse IPI reqSean Christopherson2021-12-101-2/+5
* | KVM: nVMX: Implement Enlightened MSR Bitmap featureVitaly Kuznetsov2021-12-081-0/+2
* | KVM: Use 'unsigned long' as kvm_for_each_vcpu()'s indexMarc Zyngier2021-12-081-3/+4
|/
* KVM: x86: Assume a 64-bit hypercall for guests with protected stateTom Lendacky2021-11-181-2/+2
* KVM: x86: Rename kvm_lapic_enable_pv_eoi()Vitaly Kuznetsov2021-11-111-2/+2
* KVM: x86: Use rw_semaphore for APICv lock to allow vCPU parallelismSean Christopherson2021-10-221-2/+2
* KVM: Make kvm_make_vcpus_request_mask() use pre-allocated cpu_kick_maskVitaly Kuznetsov2021-09-301-4/+1
* KVM: Drop 'except' parameter from kvm_make_vcpus_request_mask()Vitaly Kuznetsov2021-09-301-1/+1
* KVM: x86: hyper-v: Avoid calling kvm_make_vcpus_request_mask() with vcpu_mask...Vitaly Kuznetsov2021-09-301-6/+9
* KVM: x86: Query vcpu->vcpu_idx directly and drop its accessorSean Christopherson2021-09-221-4/+3
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2021-09-071-6/+26
|\
| * KVM: x86: hyper-v: Deactivate APICv only when AutoEOI feature is in useVitaly Kuznetsov2021-08-201-6/+26
* | KVM: x86: remove dead initializationPaolo Bonzini2021-08-131-1/+1
|/
* KVM: x86: hyper-v: Check if guest is allowed to use XMM registers for hyperca...Vitaly Kuznetsov2021-08-031-2/+11
* KVM: x86: Introduce trace_kvm_hv_hypercall_done()Vitaly Kuznetsov2021-08-031-0/+1
* KVM: x86: hyper-v: Check access to hypercall before reading XMM registersVitaly Kuznetsov2021-08-031-3/+3
* KVM: nVMX: Sync all PGDs on nested transition with shadow pagingSean Christopherson2021-06-171-1/+1
* KVM: x86: hyper-v: Honor HV_X64_EX_PROCESSOR_MASKS_RECOMMENDED bitVitaly Kuznetsov2021-06-171-0/+8
* KVM: x86: hyper-v: Honor HV_X64_CLUSTER_IPI_RECOMMENDED bitVitaly Kuznetsov2021-06-171-0/+4
* KVM: x86: hyper-v: Honor HV_X64_REMOTE_TLB_FLUSH_RECOMMENDED bitVitaly Kuznetsov2021-06-171-0/+6
* KVM: x86: hyper-v: Honor HV_DEBUGGING privilege bitVitaly Kuznetsov2021-06-171-0/+9
* KVM: x86: hyper-v: Honor HV_SIGNAL_EVENTS privilege bitVitaly Kuznetsov2021-06-171-0/+2
* KVM: x86: hyper-v: Honor HV_POST_MESSAGES privilege bitVitaly Kuznetsov2021-06-171-0/+2
* KVM: x86: hyper-v: Check access to HVCALL_NOTIFY_LONG_SPIN_WAIT hypercallVitaly Kuznetsov2021-06-171-0/+11
* KVM: x86: hyper-v: Prepare to check access to Hyper-V hypercallsVitaly Kuznetsov2021-06-171-0/+11
* KVM: x86: hyper-v: Honor HV_STIMER_DIRECT_MODE_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+6
* KVM: x86: hyper-v: Inverse the default in hv_check_msr_access()Vitaly Kuznetsov2021-06-171-1/+1
* KVM: x86: hyper-v: Honor HV_FEATURE_DEBUG_MSRS_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+4
* KVM: x86: hyper-v: Honor HV_FEATURE_GUEST_CRASH_MSR_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+4
* KVM: x86: hyper-v: Honor HV_ACCESS_REENLIGHTENMENT privilege bitVitaly Kuznetsov2021-06-171-0/+5
* KVM: x86: hyper-v: Honor HV_ACCESS_FREQUENCY_MSRS privilege bitVitaly Kuznetsov2021-06-171-0/+4
* KVM: x86: hyper-v: Honor HV_MSR_APIC_ACCESS_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+7
* KVM: x86: hyper-v: Honor HV_MSR_SYNTIMER_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+10
* KVM: x86: hyper-v: Honor HV_MSR_SYNIC_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+8
* KVM: x86: hyper-v: Honor HV_MSR_REFERENCE_TSC_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+3
* KVM: x86: hyper-v: Honor HV_MSR_RESET_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+3
* KVM: x86: hyper-v: Honor HV_MSR_VP_INDEX_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+3
* KVM: x86: hyper-v: Honor HV_MSR_TIME_REF_COUNT_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+3
* KVM: x86: hyper-v: Honor HV_MSR_VP_RUNTIME_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+3
* KVM: x86: hyper-v: Honor HV_MSR_HYPERCALL_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+12
* KVM: x86: hyper-v: Prepare to check access to Hyper-V MSRsVitaly Kuznetsov2021-06-171-0/+18
* KVM: x86: hyper-v: Cache guest CPUID leaves determining features availabilityVitaly Kuznetsov2021-06-171-10/+39
* KVM: x86: hyper-v: Introduce KVM_CAP_HYPERV_ENFORCE_CPUIDVitaly Kuznetsov2021-06-171-0/+21
* KVM: hyper-v: Advertise support for fast XMM hypercallsSiddharth Chandrasekaran2021-06-171-0/+1
* KVM: x86: kvm_hv_flush_tlb use inputs from XMM registersSiddharth Chandrasekaran2021-06-171-19/+71
* KVM: hyper-v: Collect hypercall params into structSiddharth Chandrasekaran2021-06-171-68/+79
* KVM: X86: hyper-v: Task srcu lock when accessing kvm_memslots()Wanpeng Li2021-05-271-0/+8
* KVM: x86: hyper-v: Don't touch TSC page values when guest opted for re-enligh...Vitaly Kuznetsov2021-03-181-1/+25
* KVM: x86: hyper-v: Track Hyper-V TSC page statusVitaly Kuznetsov2021-03-181-14/+35