summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* KVM: x86: add system attribute to retrieve full set of supported xsave statesPaolo Bonzini2022-01-284-1/+58
* KVM: x86: Add a helper to retrieve userspace address from kvm_device_attrSean Christopherson2022-01-281-6/+14
* selftests: kvm: move vm_xsave_req_perm call to amx_testPaolo Bonzini2022-01-265-14/+9
* KVM: x86: Sync the states size with the XCR0/IA32_XSS at, any timeLike Xu2022-01-261-2/+2
* KVM: x86: Update vCPU's runtime CPUID on write to MSR_IA32_XSSLike Xu2022-01-261-0/+1
* KVM: x86: Keep MSR_IA32_XSS unchanged for INITXiaoyao Li2022-01-261-2/+1
* KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2}Sean Christopherson2022-01-261-2/+8
* KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02Sean Christopherson2022-01-261-10/+12
* KVM: selftests: Don't skip L2's VMCALL in SMM test for SVM guestSean Christopherson2022-01-261-1/+0
* KVM: x86: Check .flags in kvm_cpuid_check_equal() tooVitaly Kuznetsov2022-01-261-0/+1
* KVM: x86: Forcibly leave nested virt when SMM state is toggledSean Christopherson2022-01-266-7/+12
* KVM: SVM: drop unnecessary code in svm_hv_vmcb_dirty_nested_enlightenments()Vitaly Kuznetsov2022-01-262-13/+1
* KVM: SVM: hyper-v: Enable Enlightened MSR-Bitmap support for realVitaly Kuznetsov2022-01-261-0/+3
* KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermodeSean Christopherson2022-01-261-1/+15
* KVM: SVM: Don't apply SEV+SMAP workaround on code fetch or PT accessSean Christopherson2022-01-261-9/+34
* KVM: SVM: Inject #UD on attempted emulation for SEV guest w/o insn bufferSean Christopherson2022-01-261-34/+55
* KVM: SVM: WARN if KVM attempts emulation on #UD or #GP for SEV guestsSean Christopherson2022-01-261-0/+5
* KVM: x86: Pass emulation type to can_emulate_instruction()Sean Christopherson2022-01-264-7/+17
* KVM: SVM: Explicitly require DECODEASSISTS to enable SEV supportSean Christopherson2022-01-261-2/+7
* KVM: SVM: Don't intercept #GP for SEV guestsSean Christopherson2022-01-261-3/+8
* Revert "KVM: SVM: avoid infinite loop on NPF from bad address"Sean Christopherson2022-01-262-8/+0
* KVM: SVM: Never reject emulation due to SMAP errata for !SEV guestsSean Christopherson2022-01-261-4/+6
* KVM: x86: nSVM: skip eax alignment check for non-SVM instructionsDenis Valeev2022-01-261-5/+6
* KVM: x86/cpuid: Exclude unpermitted xfeatures sizes at KVM_GET_SUPPORTED_CPUIDLike Xu2022-01-261-12/+13
* KVM: LAPIC: Also cancel preemption timer during SET_LAPICWanpeng Li2022-01-261-1/+1
* KVM: VMX: Remove vmcs_config.orderJim Mattson2022-01-262-4/+2
* KVM/X86: Make kvm_vcpu_reload_apic_access_page() staticQuanfa Fu2022-01-252-2/+1
* KVM: selftests: Re-enable access_tracking_perf_testDavid Matlack2022-01-251-0/+1
* KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadowSean Christopherson2022-01-251-0/+25
* KVM: x86: Move CPUID.(EAX=0x12,ECX=1) mangling to __kvm_update_cpuid_runtime()Vitaly Kuznetsov2022-01-251-21/+33
* KVM: remove async parameter of hva_to_pfn_remapped()Xianting Tian2022-01-241-4/+3
* x86,kvm/xen: Remove superfluous .fixup usagePeter Zijlstra2022-01-241-8/+2
* KVM: VMX: Zero host's SYSENTER_ESP iff SYSENTER is NOT usedSean Christopherson2022-01-241-3/+7
* docs: kvm: fix WARNINGs from api.rstWei Wang2022-01-201-3/+3
* selftests: kvm/x86: Fix the warning in lib/x86_64/processor.cJinrong Liang2022-01-201-0/+1
* selftests: kvm/x86: Fix the warning in pmu_event_filter_test.cJinrong Liang2022-01-201-4/+0
* kvm: selftests: Do not indent with spacesPaolo Bonzini2022-01-196-59/+61
* kvm: selftests: sync uapi/linux/kvm.h with Linux headerPaolo Bonzini2022-01-191-3/+16
* selftests: kvm: add amx_test to .gitignoreMuhammad Usama Anjum2022-01-191-0/+1
* KVM: SVM: Nullify vcpu_(un)blocking() hooks if AVIC is disabledSean Christopherson2022-01-193-6/+9
* KVM: SVM: Move svm_hardware_setup() and its helpers below svm_x86_opsSean Christopherson2022-01-191-233/+234
* KVM: SVM: Drop AVIC's intermediate avic_set_running() helperSean Christopherson2022-01-191-20/+36
* KVM: VMX: Don't do full kick when handling posted interrupt wakeupSean Christopherson2022-01-191-1/+1
* KVM: VMX: Fold fallback path into triggering posted IRQ helperSean Christopherson2022-01-191-8/+10
* KVM: VMX: Pass desired vector instead of bool for triggering posted IRQSean Christopherson2022-01-191-5/+3
* KVM: VMX: Don't do full kick when triggering posted interrupt "fails"Sean Christopherson2022-01-192-6/+7
* KVM: SVM: Skip AVIC and IRTE updates when loading blocking vCPUSean Christopherson2022-01-191-14/+18
* KVM: SVM: Use kvm_vcpu_is_blocking() in AVIC load to handle preemptionSean Christopherson2022-01-193-12/+9
* KVM: SVM: Remove unnecessary APICv/AVIC update in vCPU unblocking pathSean Christopherson2022-01-191-2/+0
* KVM: SVM: Don't bother checking for "running" AVIC when kicking for IPIsSean Christopherson2022-01-192-17/+9