summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/vmx (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2021-05-104-122/+142
|\
| * KVM: X86: Expose bus lock debug exception to guestPaolo Bonzini2021-05-072-0/+6
| * KVM: x86: Tie Intel and AMD behavior for MSR_TSC_AUX to guest CPU modelSean Christopherson2021-05-071-15/+0
| * KVM: x86: Move uret MSR slot management to common x86Sean Christopherson2021-05-071-15/+4
| * KVM: VMX: Disable loading of TSX_CTRL MSR the more conventional waySean Christopherson2021-05-071-12/+10
| * KVM: VMX: Use common x86's uret MSR list as the one true listSean Christopherson2021-05-071-57/+40
| * KVM: VMX: Use flag to indicate "active" uret MSRs instead of sorting listSean Christopherson2021-05-072-40/+42
| * KVM: VMX: Configure list of user return MSRs at module initSean Christopherson2021-05-072-21/+50
| * KVM: x86: Add support for RDPID without RDTSCPSean Christopherson2021-05-071-4/+23
| * KVM: VMX: Disable preemption when probing user return MSRsSean Christopherson2021-05-071-4/+1
| * KVM: x86: Move RDPID emulation intercept to its own enumSean Christopherson2021-05-071-1/+2
| * KVM: VMX: Do not advertise RDPID if ENABLE_RDTSCP control is unsupportedSean Christopherson2021-05-071-2/+4
| * KVM: nVMX: Always make an attempt to map eVMCS after migrationVitaly Kuznetsov2021-05-071-10/+19
* | KVM: x86: Consolidate guest enter/exit logic to common helpersSean Christopherson2021-05-051-37/+2
* | KVM: x86: Defer vtime accounting 'til after IRQ handlingWanpeng Li2021-05-051-3/+3
* | KVM/VMX: Invoke NMI non-IST entry instead of IST entryLai Jiangshan2021-05-051-7/+9
|/
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2021-05-019-232/+872
|\
| * KVM: x86: Rename GPR accessors to make mode-aware variants the defaultsSean Christopherson2021-04-262-16/+16
| * KVM: nVMX: Truncate base/index GPR value on address calc in !64-bitSean Christopherson2021-04-261-2/+2
| * KVM: nVMX: Truncate bits 63:32 of VMCS field on nested check in !64-bitSean Christopherson2021-04-261-1/+1
| * KVM: VMX: Truncate GPR value for DR and CR reads in !64-bit modeSean Christopherson2021-04-261-3/+3
| * KVM: VMX: Intercept FS/GS_BASE MSR accesses for 32-bit KVMSean Christopherson2021-04-262-0/+6
| * KVM: VMX: Invert the inlining of MSR interception helpersSean Christopherson2021-04-262-17/+15
| * KVM: VMX: use EPT_VIOLATION_GVA_TRANSLATED instead of 0x100Isaku Yamahata2021-04-231-1/+1
| * KVM: VMX: Enable SGX virtualization for SGX1, SGX2 and LCSean Christopherson2021-04-207-7/+149
| * KVM: VMX: Add ENCLS[EINIT] handler to support SGX Launch Control (LC)Sean Christopherson2021-04-201-0/+64
| * KVM: VMX: Add emulation of SGX Launch Control LE hash MSRsSean Christopherson2021-04-204-0/+75
| * KVM: VMX: Add SGX ENCLS[ECREATE] handler to enforce CPUID restrictionsSean Christopherson2021-04-201-0/+275
| * KVM: VMX: Frame in ENCLS handler for SGX virtualizationSean Christopherson2021-04-203-3/+71
| * KVM: VMX: Add basic handling of VM-Exit from SGX enclaveSean Christopherson2021-04-202-2/+45
| * KVM: vmx: add mismatched size assertions in vmcs_check32()Haiwei Li2021-04-201-0/+4
| * KVM: x86: pending exceptions must not be blocked by an injected eventMaxim Levitsky2021-04-171-2/+8
| * KVM: x86: dump_vmcs should include the autoload/autostore MSR listsDavid Edmondson2021-04-171-0/+16
| * KVM: x86: dump_vmcs should show the effective EFERDavid Edmondson2021-04-172-5/+17
| * KVM: x86: dump_vmcs should consider only the load controls of EFER/PATDavid Edmondson2021-04-171-4/+2
| * KVM: x86: dump_vmcs should not conflate EFER and PAT presence in VMCSDavid Edmondson2021-04-171-9/+10
| * KVM: x86: dump_vmcs should not assume GUEST_IA32_EFER is validDavid Edmondson2021-04-171-6/+3
| * KVM: x86: Account a variety of miscellaneous allocationsSean Christopherson2021-04-171-1/+1
| * KVM: VMX: Track root HPA instead of EPTP for paravirt Hyper-V TLB flushSean Christopherson2021-03-152-47/+42
| * KVM: VMX: Skip additional Hyper-V TLB EPTP flushes if one failsSean Christopherson2021-03-151-1/+9
| * KVM: VMX: Define Hyper-V paravirt TLB flush fields iff Hyper-V is enabledSean Christopherson2021-03-152-1/+8
| * KVM: VMX: Explicitly check for hv_remote_flush_tlb when loading pgdSean Christopherson2021-03-151-7/+16
| * KVM: VMX: Don't invalidate hv_tlb_eptp if the new EPTP matchesSean Christopherson2021-03-151-1/+2
| * KVM: VMX: Invalidate hv_tlb_eptp to denote an EPTP mismatchSean Christopherson2021-03-152-19/+23
| * KVM: VMX: Do Hyper-V TLB flush iff vCPU's EPTP hasn't been flushedSean Christopherson2021-03-151-15/+8
| * KVM: VMX: Fold Hyper-V EPTP checking into it's only callerSean Christopherson2021-03-151-24/+20
| * KVM: VMX: Stash kvm_vmx in a local variable for Hyper-V paravirt TLB flushSean Christopherson2021-03-151-6/+7
| * KVM: VMX: Track common EPTP for Hyper-V's paravirt TLB flushSean Christopherson2021-03-152-11/+10
| * KVM: x86: Get active PCID only when writing a CR3 valueSean Christopherson2021-03-152-9/+7
| * KVM: x86/mmu: Move logic for setting SPTE masks for EPT into the MMU properSean Christopherson2021-03-151-18/+2