summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* KVM: X86: Introduce KVM_HC_MAP_GPA_RANGE hypercallAshish Kalra2021-06-179-0/+123
* KVM: switch per-VM stats to u64Paolo Bonzini2021-06-175-18/+18
* KVM: x86/mmu: Grab nx_lpage_splits as an unsigned long before divisionSean Christopherson2021-06-171-1/+2
* KVM: x86: Check for pending interrupts when APICv is getting disabledVitaly Kuznetsov2021-06-171-0/+9
* KVM: nVMX: Drop redundant checks on vmcs12 in EPTP switching emulationSean Christopherson2021-06-171-3/+1
* KVM: nVMX: WARN if subtly-impossible VMFUNC conditions occurSean Christopherson2021-06-171-0/+10
* KVM: x86: Drop pointless @reset_roots from kvm_init_mmu()Sean Christopherson2021-06-175-15/+6
* KVM: x86: Defer MMU sync on PCID invalidationSean Christopherson2021-06-171-1/+1
* KVM: nVMX: Use fast PGD switch when emulating VMFUNC[EPTP_SWITCH]Sean Christopherson2021-06-171-6/+13
* KVM: x86: Use KVM_REQ_TLB_FLUSH_GUEST to handle INVPCID(ALL) emulationSean Christopherson2021-06-171-1/+1
* KVM: nVMX: Free only guest_mode (L2) roots on INVVPID w/o EPTSean Christopherson2021-06-173-4/+31
* KVM: nVMX: Consolidate VM-Enter/VM-Exit TLB flush and MMU sync logicSean Christopherson2021-06-171-64/+23
* KVM: x86: Drop skip MMU sync and TLB flush params from "new PGD" helpersSean Christopherson2021-06-175-19/+11
* KVM: nSVM: Move TLB flushing logic (or lack thereof) to dedicated helperSean Christopherson2021-06-172-10/+30
* KVM: x86: Uncondtionally skip MMU sync/TLB flush in MOV CR3's PGD switchSean Christopherson2021-06-171-1/+1
* KVM: x86: Invalidate all PGDs for the current PCID on MOV CR3 w/ flushSean Christopherson2021-06-171-27/+42
* KVM: nVMX: Don't clobber nested MMU's A/D status on EPTP switchSean Christopherson2021-06-171-7/+0
* KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmapSean Christopherson2021-06-171-1/+1
* KVM: nVMX: Sync all PGDs on nested transition with shadow pagingSean Christopherson2021-06-174-8/+15
* KVM: selftests: evmcs_test: Test that KVM_STATE_NESTED_EVMCS is never lostVitaly Kuznetsov2021-06-171-26/+38
* KVM: nVMX: Request to sync eVMCS from VMCS12 after migrationVitaly Kuznetsov2021-06-171-0/+6
* KVM: nVMX: Reset eVMCS clean fields data from prepare_vmcs02()Vitaly Kuznetsov2021-06-171-6/+13
* KVM: nVMX: Force enlightened VMCS sync from nested_vmx_failValid()Vitaly Kuznetsov2021-06-171-2/+6
* KVM: nVMX: Ignore 'hv_clean_fields' data when eVMCS data is copied in vmx_get...Vitaly Kuznetsov2021-06-171-18/+25
* KVM: nVMX: Release enlightened VMCS on VMCLEARVitaly Kuznetsov2021-06-171-0/+2
* KVM: nVMX: Introduce 'EVMPTR_MAP_PENDING' post-migration stateVitaly Kuznetsov2021-06-173-11/+9
* KVM: nVMX: Make copy_vmcs12_to_enlightened()/copy_enlightened_to_vmcs12() ret...Vitaly Kuznetsov2021-06-171-4/+4
* KVM: nVMX: Release eVMCS when enlightened VMENTRY was disabledVitaly Kuznetsov2021-06-171-1/+3
* KVM: nVMX: Don't set 'dirty_vmcs12' flag on enlightened VMPTRLDVitaly Kuznetsov2021-06-171-1/+0
* KVM: nVMX: Use '-1' in 'hv_evmcs_vmptr' to indicate that eVMCS is not in useVitaly Kuznetsov2021-06-175-28/+40
* KVM: x86: avoid loading PDPTRs after migration when possibleMaxim Levitsky2021-06-174-2/+13
* KVM: x86: Introduce KVM_GET_SREGS2 / KVM_SET_SREGS2Maxim Levitsky2021-06-175-27/+185
* KVM: x86: introduce kvm_register_clear_availableMaxim Levitsky2021-06-172-4/+9
* KVM: nVMX: delay loading of PDPTRs to KVM_REQ_GET_NESTED_STATE_PAGESMaxim Levitsky2021-06-171-5/+18
* KVM: nSVM: refactor the CR3 reload on migrationMaxim Levitsky2021-06-171-7/+25
* KVM: x86: Always load PDPTRs on CR3 load for SVM w/o NPT and a PAE guestSean Christopherson2021-06-172-33/+2
* KVM: nSVM: Drop pointless pdptrs_changed() check on nested transitionSean Christopherson2021-06-171-4/+2
* KVM: nVMX: Drop obsolete (and pointless) pdptrs_changed() checkSean Christopherson2021-06-171-5/+3
* KVM: selftests: Introduce hyperv_features testVitaly Kuznetsov2021-06-174-0/+817
* KVM: selftests: Move evmcs.h to x86_64/Vitaly Kuznetsov2021-06-171-1/+1
* KVM: selftests: move Hyper-V MSR definitions to hyperv.hVitaly Kuznetsov2021-06-172-7/+20
* KVM: x86: hyper-v: Honor HV_X64_EX_PROCESSOR_MASKS_RECOMMENDED bitVitaly Kuznetsov2021-06-171-0/+8
* KVM: x86: hyper-v: Honor HV_X64_CLUSTER_IPI_RECOMMENDED bitVitaly Kuznetsov2021-06-171-0/+4
* KVM: x86: hyper-v: Honor HV_X64_REMOTE_TLB_FLUSH_RECOMMENDED bitVitaly Kuznetsov2021-06-171-0/+6
* KVM: x86: hyper-v: Honor HV_DEBUGGING privilege bitVitaly Kuznetsov2021-06-171-0/+9
* KVM: x86: hyper-v: Honor HV_SIGNAL_EVENTS privilege bitVitaly Kuznetsov2021-06-171-0/+2
* KVM: x86: hyper-v: Honor HV_POST_MESSAGES privilege bitVitaly Kuznetsov2021-06-171-0/+2
* KVM: x86: hyper-v: Check access to HVCALL_NOTIFY_LONG_SPIN_WAIT hypercallVitaly Kuznetsov2021-06-171-0/+11
* KVM: x86: hyper-v: Prepare to check access to Hyper-V hypercallsVitaly Kuznetsov2021-06-171-0/+11
* KVM: x86: hyper-v: Honor HV_STIMER_DIRECT_MODE_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+6