summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/vmx (follow)
Commit message (Expand)AuthorAgeFilesLines
* KVM: nVMX: promptly process interrupts delivered while in guest modePaolo Bonzini2021-10-211-11/+6
* KVM: VMX: Remove redundant handling of bus lock vmexitHao Xiang2021-10-181-6/+9
* KVM: VMX: Fix a TSX_CTRL_CPUID_CLEAR field mask issueZhenzhong Duan2021-09-271-1/+1
* KVM: x86: nVMX: re-evaluate emulation_required on nested VM exitMaxim Levitsky2021-09-223-4/+7
* KVM: x86: nVMX: don't fail nested VM entry on invalid guest state if !from_vm...Maxim Levitsky2021-09-222-2/+10
* KVM: x86: VMX: synthesize invalid VM exit when emulating invalid guest stateMaxim Levitsky2021-09-221-3/+14
* KVM: nVMX: Filter out all unsupported controls when eVMCS was activatedVitaly Kuznetsov2021-09-222-7/+14
* KVM: nVMX: Fix nested bus lock VM exitChenyi Qiang2021-09-221-0/+6
* KVM: nVMX: fix comments of handle_vmon()Yu Zhang2021-09-221-8/+1
* KVM: VMX: Remove defunct "nr_active_uret_msrs" fieldSean Christopherson2021-09-221-4/+0
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2021-09-0710-228/+219
|\
| * KVM: VMX: avoid running vmx_handle_exit_irqoff in case of emulationMaxim Levitsky2021-09-061-0/+3
| * KVM: x86: Allow CPU to force vendor-specific TDP levelWei Huang2021-08-201-1/+2
| * KVM: nVMX: Unconditionally clear nested.pi_pending on nested VM-EnterSean Christopherson2021-08-131-4/+3
| * KVM: x86: Clean up redundant ROL16(val, n) macro definitionLike Xu2021-08-135-10/+2
| * KVM: x86: Move declaration of kvm_spurious_fault() to x86.hUros Bizjak2021-08-131-1/+1
| * KVM: x86: Kill off __ex() and __kvm_handle_fault_on_reboot()Sean Christopherson2021-08-131-2/+0
| * KVM: VMX: Hide VMCS control calculators in vmx.cSean Christopherson2021-08-132-29/+27
| * KVM: VMX: Drop caching of KVM's desired sec exec controls for vmcs01Sean Christopherson2021-08-132-14/+9
| * KVM: nVMX: Pull KVM L0's desired controls directly from vmcs01Sean Christopherson2021-08-132-10/+21
| * KVM: VMX: Reset DR6 only when KVM_DEBUGREG_WONT_EXITPaolo Bonzini2021-08-131-0/+6
| * KVM: X86: Set host DR6 only on VMX and for KVM_DEBUGREG_WONT_EXITPaolo Bonzini2021-08-131-0/+4
| * Merge branch 'kvm-vmx-secctl' into HEADPaolo Bonzini2021-08-101-1/+1
| |\
| * | KVM: x86/pmu: Introduce pmc->is_paused to reduce the call time of perf interf...Like Xu2021-08-041-2/+2
| * | KVM: VMX: Move RESET-only VMWRITE sequences to init_vmcs()Sean Christopherson2021-08-021-15/+13
| * | KVM: VMX: Remove redundant write to set vCPU as active at RESET/INITSean Christopherson2021-08-021-2/+0
| * | KVM: VMX: Smush x2APIC MSR bitmap adjustments into single functionSean Christopherson2021-08-022-35/+22
| * | KVM: VMX: Remove unnecessary initialization of msr_bitmap_modeSean Christopherson2021-08-021-1/+0
| * | KVM: VMX: Don't redo x2APIC MSR bitmaps when userspace filter is changedSean Christopherson2021-08-021-1/+0
| * | KVM: nVMX: Remove obsolete MSR bitmap refresh at nested transitionsSean Christopherson2021-08-023-8/+1
| * | KVM: VMX: Remove obsolete MSR bitmap refresh at vCPU RESET/INITSean Christopherson2021-08-021-3/+0
| * | KVM: x86: Move setting of sregs during vCPU RESET/INIT to common x86Sean Christopherson2021-08-021-9/+0
| * | KVM: VMX: Don't _explicitly_ reconfigure user return MSRs on vCPU INITSean Christopherson2021-08-021-2/+2
| * | KVM: VMX: Refresh list of user return MSRs after setting guest CPUIDSean Christopherson2021-08-021-0/+2
| * | KVM: VMX: Skip pointless MSR bitmap update when setting EFERSean Christopherson2021-08-021-9/+10
| * | KVM: nVMX: Don't evaluate "emulation required" on nested VM-ExitSean Christopherson2021-08-023-13/+11
| * | KVM: VMX: Skip emulation required checks during pmode/rmode transitionsSean Christopherson2021-08-021-6/+12
| * | KVM: VMX: Process CR0.PG side effects after setting CR0 assetsSean Christopherson2021-08-021-11/+12
| * | KVM: VMX: Pull GUEST_CR3 from the VMCS iff CR3 load exiting is disabledSean Christopherson2021-08-021-2/+5
| * | KVM: nVMX: Do not clear CR3 load/store exiting bits if L1 wants 'emSean Christopherson2021-08-021-9/+37
| * | KVM: VMX: Fold ept_update_paging_mode_cr0() back into vmx_set_cr0()Sean Christopherson2021-08-021-23/+17
| * | KVM: VMX: Remove direct write to vcpu->arch.cr0 during vCPU RESET/INITSean Christopherson2021-08-021-4/+1
| * | KVM: VMX: Invert handling of CR0.WP for EPT without unrestricted guestSean Christopherson2021-08-021-9/+5
| * | KVM: x86: Move EDX initialization at vCPU RESET to common codeSean Christopherson2021-08-021-6/+0
| * | KVM: x86: Consolidate APIC base RESET initialization codeSean Christopherson2021-08-021-7/+0
| * | KVM: VMX: Stuff vcpu->arch.apic_base directly at vCPU RESETSean Christopherson2021-08-021-6/+3
| * | KVM: VMX: Remove explicit MMU reset in enter_rmode()Sean Christopherson2021-08-021-2/+0
| * | KVM: VMX: Set EDX at INIT with CPUID.0x1, Family-Model-SteppingSean Christopherson2021-08-021-1/+6
| * | KVM: nVMX: Set LDTR to its architecturally defined value on nested VM-ExitSean Christopherson2021-08-021-0/+4
| * | KVM: x86: Use KVM_BUG/KVM_BUG_ON to handle bugs that are fatal to the VMSean Christopherson2021-08-021-9/+14