summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm (follow)
Commit message (Expand)AuthorAgeFilesLines
...
| * | KVM: VMX: Fix x2APIC MSR intercept handling on !APICV platformsPeter Xu2020-10-191-2/+3
| * | KVM: VMX: vmx_uret_msrs_list[] can be statickernel test robot2020-09-291-1/+1
| * | KVM: x86: do not attempt TSC synchronization on guest writesPaolo Bonzini2020-09-281-20/+10
| * | KVM: nSVM: delay MSR permission processing to first nested VM runPaolo Bonzini2020-09-281-3/+18
| * | KVM: x86: rename KVM_REQ_GET_VMCS12_PAGESPaolo Bonzini2020-09-282-6/+6
| * | KVM: x86: Introduce MSR filteringAlexander Graf2020-09-281-1/+144
| * | KVM: x86: VMX: Prevent MSR passthrough when MSR access is deniedAlexander Graf2020-09-282-52/+181
| * | KVM: x86: SVM: Prevent MSR passthrough when MSR access is deniedAlexander Graf2020-09-282-8/+76
| * | KVM: x86: Prepare MSR bitmaps for userspace tracked MSRsAaron Lewis2020-09-284-70/+77
| * | KVM: x86: Add infrastructure for MSR filteringAlexander Graf2020-09-282-0/+7
| * | KVM: x86: Allow deflecting unknown MSR accesses to user spaceAlexander Graf2020-09-282-6/+132
| * | KVM: x86: Return -ENOENT on unimplemented MSRsAlexander Graf2020-09-281-1/+1
| * | KVM: VMX: Rename vmx_uret_msr's "index" to "slot"Sean Christopherson2020-09-282-5/+5
| * | KVM: VMX: Rename "vmx_msr_index" to "vmx_uret_msrs_list"Sean Christopherson2020-09-281-8/+8
| * | KVM: VMX: Rename "vmx_set_guest_msr" to "vmx_set_guest_uret_msr"Sean Christopherson2020-09-281-3/+4
| * | KVM: VMX: Rename "find_msr_entry" to "vmx_find_uret_msr"Sean Christopherson2020-09-283-7/+7
| * | KVM: VMX: Add vmx_setup_uret_msr() to handle lookup and swapSean Christopherson2020-09-281-31/+18
| * | KVM: VMX: Move uret MSR lookup into update_transition_efer()Sean Christopherson2020-09-281-12/+19
| * | KVM: VMX: Check guest support for RDTSCP before processing MSR_TSC_AUXSean Christopherson2020-09-281-3/+5
| * | KVM: VMX: Rename "__find_msr_index" to "__vmx_find_uret_msr"Sean Christopherson2020-09-281-8/+8
| * | KVM: VMX: Rename vcpu_vmx's "guest_msrs_ready" to "guest_uret_msrs_loaded"Sean Christopherson2020-09-282-5/+5
| * | KVM: VMX: Rename vcpu_vmx's "save_nmsrs" to "nr_active_uret_msrs"Sean Christopherson2020-09-282-12/+12
| * | KVM: VMX: Rename vcpu_vmx's "nmsrs" to "nr_uret_msrs"Sean Christopherson2020-09-282-4/+4
| * | KVM: VMX: Rename the "shared_msr_entry" struct to "vmx_uret_msr"Sean Christopherson2020-09-283-35/+35
| * | KVM: VMX: Rename "vmx_find_msr_index" to "vmx_find_loadstore_msr_slot"Sean Christopherson2020-09-283-14/+14
| * | KVM: VMX: Prepend "MAX_" to MSR array size definesSean Christopherson2020-09-283-9/+9
| * | KVM: x86: Rename "shared_msrs" to "user_return_msrs"Sean Christopherson2020-09-282-54/+58
| * | KVM: x86/mmu: Move individual kvm_mmu initialization into common helperSean Christopherson2020-09-281-16/+9
| * | KVM: nVMX: Read EXIT_QUAL and INTR_INFO only when needed for nested exitSean Christopherson2020-09-281-3/+2
| * | KVM: x86: Use common definition for kvm_nested_vmexit tracepointSean Christopherson2020-09-283-43/+3
| * | KVM: x86: Add macro wrapper for defining kvm_exit tracepointSean Christopherson2020-09-281-33/+36
| * | KVM: x86: Add intr/vectoring info and error code to kvm_exit tracepointSean Christopherson2020-09-283-6/+33
| * | KVM: VMX: Add a helper to test for a valid error code given an intr infoSean Christopherson2020-09-282-3/+8
| * | KVM: x86: Read guest RIP from within the kvm_nested_vmexit tracepointSean Christopherson2020-09-283-5/+5
| * | KVM: x86: Add RIP to the kvm_entry, i.e. VM-Enter, tracepointSean Christopherson2020-09-282-5/+7
| * | KVM: nVMX: WARN on attempt to switch the currently loaded VMCSSean Christopherson2020-09-281-1/+1
| * | KVM: nVMX: Drop redundant VMCS switch and free_nested() callSean Christopherson2020-09-281-2/+0
| * | KVM: nVMX: Ensure vmcs01 is the loaded VMCS when freeing nested stateSean Christopherson2020-09-281-0/+3
| * | KVM: nVMX: Move free_nested() below vmx_switch_vmcs()Sean Christopherson2020-09-281-38/+38
| * | KVM: nVMX: Explicitly check for valid guest state for !unrestricted guestSean Christopherson2020-09-283-7/+10
| * | KVM: nVMX: Reload vmcs01 if getting vmcs12's pages failsSean Christopherson2020-09-281-1/+3
| * | KVM: nVMX: Reset the segment cache when stuffing guest segsSean Christopherson2020-09-281-0/+2
| * | KVM: x86/mmu: Track write/user faults using boolsSean Christopherson2020-09-282-7/+7
| * | KVM: x86/mmu: Hoist ITLB multi-hit workaround check up a levelSean Christopherson2020-09-282-3/+4
| * | KVM: x86/mmu: Rename 'hlevel' to 'level' in FNAME(fetch)Sean Christopherson2020-09-281-5/+5
| * | KVM: x86/mmu: Account NX huge page disallowed iff huge page was requestedSean Christopherson2020-09-282-2/+3
| * | KVM: x86/mmu: Capture requested page level before NX huge page workaroundSean Christopherson2020-09-282-12/+18
| * | KVM: x86/mmu: Move "huge page disallowed" calculation into mapping helpersSean Christopherson2020-09-282-20/+26
| * | KVM: x86/mmu: Refactor the zap loop for recovering NX lpagesSean Christopherson2020-09-281-4/+6
| * | KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpagesSean Christopherson2020-09-281-0/+1