summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/x86.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2021-01-091-6/+24
|\
| * KVM: x86: __kvm_vcpu_halt can be staticPaolo Bonzini2021-01-081-1/+1
| * KVM: SVM: Add support for booting APs in an SEV-ES guestTom Lendacky2021-01-081-5/+21
| * KVM: nSVM: cancel KVM_REQ_GET_NESTED_STATE_PAGES on nested vmexitMaxim Levitsky2021-01-081-1/+3
| * Merge branch 'kvm-master' into kvm-nextPaolo Bonzini2021-01-081-8/+10
| |\
* | | Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2020-12-201-116/+395
|\| |
| * | KVM: SVM: Provide an updated VMRUN invocation for SEV-ES guestsTom Lendacky2020-12-151-0/+6
| * | KVM: SVM: Provide support for SEV-ES vCPU loadingTom Lendacky2020-12-151-1/+2
| * | KVM: SVM: Guest FPU state save/restore not needed for SEV-ES guestTom Lendacky2020-12-151-10/+46
| * | KVM: SVM: Do not report support for SMM for an SEV-ES guestTom Lendacky2020-12-151-2/+2
| * | KVM: x86: Update __get_sregs() / __set_sregs() to support SEV-ESTom Lendacky2020-12-151-9/+18
| * | KVM: SVM: Add support for CR4 write traps for an SEV-ES guestTom Lendacky2020-12-151-4/+12
| * | KVM: SVM: Add support for CR0 write traps for an SEV-ES guestTom Lendacky2020-12-151-13/+20
| * | KVM: SVM: Support string IO operations for an SEV-ES guestTom Lendacky2020-12-151-0/+54
| * | KVM: SVM: Support MMIO for an SEV-ES guestTom Lendacky2020-12-151-0/+123
| * | KVM: SVM: Create trace events for VMGEXIT MSR protocol processingTom Lendacky2020-12-151-0/+2
| * | KVM: SVM: Create trace events for VMGEXIT processingTom Lendacky2020-12-151-0/+2
| * | KVM: SVM: Prevent debugging under SEV-ESTom Lendacky2020-12-151-0/+3
| * | KVM: SVM: Add required changes to support intercepts under SEV-ESTom Lendacky2020-12-151-2/+9
| * | KVM: x86: introduce complete_emulated_msr callbackPaolo Bonzini2020-12-151-4/+4
| * | KVM: x86: use kvm_complete_insn_gp in emulating RDMSR/WRMSRPaolo Bonzini2020-12-151-28/+16
| * | kvm: x86: Sink cpuid update into vendor-specific set_cr4 functionsJim Mattson2020-11-151-8/+0
| * | KVM: X86: Implement ring-based dirty memory trackingPeter Xu2020-11-151-0/+9
| * | KVM: X86: Don't track dirty for KVM_SET_[TSS_ADDR|IDENTITY_MAP_ADDR]Peter Xu2020-11-151-6/+31
| * | KVM: x86: hyper-v: allow KVM_GET_SUPPORTED_HV_CPUID as a system ioctlVitaly Kuznetsov2020-11-151-18/+27
| * | KVM: x86: Return bool instead of int for CR4 and SREGS validity checksSean Christopherson2020-11-151-16/+12
| * | KVM: x86: Move vendor CR4 validity check to dedicated kvm_x86_ops hookSean Christopherson2020-11-151-2/+4
* | | mm, kvm: account kvm_vcpu_mmap to kmemcgShakeel Butt2020-12-191-1/+1
| |/ |/|
* | KVM: x86: Fix split-irqchip vs interrupt injection window requestPaolo Bonzini2020-11-271-8/+10
|/
* KVM: x86: Introduce cr3_lm_rsvd_bits in kvm_vcpu_archBabu Moger2020-11-131-1/+1
* KVM: x86: handle MSR_IA32_DEBUGCTLMSR with report_ignored_msrsPankaj Gupta2020-11-081-3/+3
* kvm: x86: request masterclock update any time guest uses different msrOliver Upton2020-11-081-1/+1
* kvm: x86: ensure pv_cpuid.features is initialized when enabling capOliver Upton2020-11-081-0/+2
* kvm: x86: reads of restricted pv msrs should also result in #GPOliver Upton2020-11-081-0/+34
* KVM: x86: use positive error values for msr emulation that causes #GPMaxim Levitsky2020-11-081-13/+15
* KVM: x86: Fix NULL dereference at kvm_msr_ignored_check()Takashi Iwai2020-10-301-4/+4
* Merge branch 'kvm-fixes' into 'next'Paolo Bonzini2020-10-221-5/+6
|\
| * KVM: x86: Reset MMU context if guest toggles CR4.SMAP or CR4.PKESean Christopherson2020-09-251-1/+2
| * KVM: x86: fix MSR_IA32_TSC read for nested migrationMaxim Levitsky2020-09-241-2/+15
| * KVM: x86: VMX: Make smaller physical guest address space support user-configu...Mohammed Gamal2020-09-231-1/+1
* | KVM: x86: allow kvm_x86_ops.set_efer to return an error valueMaxim Levitsky2020-10-211-1/+6
* | KVM: x86: report negative values from wrmsr emulation to userspaceMaxim Levitsky2020-10-211-3/+6
* | KVM: x86: xen_hvm_config: cleanup return valuesMaxim Levitsky2020-10-211-14/+9
* | KVM: x86: allocate vcpu->arch.cpuid_entries dynamicallyVitaly Kuznetsov2020-10-211-0/+1
* | kvm: x86: only provide PV features if enabled in guest's CPUIDOliver Upton2020-10-211-5/+62
* | kvm: x86: set wall_clock in kvm_write_wall_clock()Oliver Upton2020-10-211-1/+2
* | kvm: x86: encapsulate wrmsr(MSR_KVM_SYSTEM_TIME) emulation in helper fnOliver Upton2020-10-211-26/+32
* | KVM: VMX: Forbid userspace MSR filters for x2APICPaolo Bonzini2020-10-211-1/+8
* | KVM: VMX: Ignore userspace MSR filters for x2APICSean Christopherson2020-10-211-2/+2
* | KVM: x86: do not attempt TSC synchronization on guest writesPaolo Bonzini2020-09-281-20/+10