summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
...
* KVM: x86: hyper-v: Inverse the default in hv_check_msr_access()Vitaly Kuznetsov2021-06-171-1/+1
* KVM: x86: hyper-v: Honor HV_FEATURE_DEBUG_MSRS_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+4
* KVM: x86: hyper-v: Honor HV_FEATURE_GUEST_CRASH_MSR_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+4
* KVM: x86: hyper-v: Honor HV_ACCESS_REENLIGHTENMENT privilege bitVitaly Kuznetsov2021-06-171-0/+5
* KVM: x86: hyper-v: Honor HV_ACCESS_FREQUENCY_MSRS privilege bitVitaly Kuznetsov2021-06-171-0/+4
* KVM: x86: hyper-v: Honor HV_MSR_APIC_ACCESS_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+7
* KVM: x86: hyper-v: Honor HV_MSR_SYNTIMER_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+10
* KVM: x86: hyper-v: Honor HV_MSR_SYNIC_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+8
* KVM: x86: hyper-v: Honor HV_MSR_REFERENCE_TSC_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+3
* KVM: x86: hyper-v: Honor HV_MSR_RESET_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+3
* KVM: x86: hyper-v: Honor HV_MSR_VP_INDEX_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+3
* KVM: x86: hyper-v: Honor HV_MSR_TIME_REF_COUNT_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+3
* KVM: x86: hyper-v: Honor HV_MSR_VP_RUNTIME_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+3
* KVM: x86: hyper-v: Honor HV_MSR_HYPERCALL_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+12
* KVM: x86: hyper-v: Prepare to check access to Hyper-V MSRsVitaly Kuznetsov2021-06-171-0/+18
* KVM: x86: hyper-v: Cache guest CPUID leaves determining features availabilityVitaly Kuznetsov2021-06-172-10/+47
* KVM: x86: hyper-v: Introduce KVM_CAP_HYPERV_ENFORCE_CPUIDVitaly Kuznetsov2021-06-176-0/+39
* asm-generic/hyperv: add HV_STATUS_ACCESS_DENIED definitionVitaly Kuznetsov2021-06-171-0/+1
* KVM: SVM: hyper-v: Direct Virtual Flush supportVineeth Pillai2021-06-174-0/+84
* KVM: SVM: hyper-v: Enlightened MSR-Bitmap supportVineeth Pillai2021-06-173-0/+35
* KVM: SVM: hyper-v: Remote TLB flush for SVMVineeth Pillai2021-06-172-0/+75
* KVM: SVM: Software reserved fieldsVineeth Pillai2021-06-173-4/+25
* KVM: x86: hyper-v: Move the remote TLB flush logic out of vmxVineeth Pillai2021-06-177-112/+150
* hyperv: SVM enlightened TLB flush support flagVineeth Pillai2021-06-171-0/+9
* hyperv: Detect Nested virtualization support for SVMVineeth Pillai2021-06-171-3/+7
* KVM: nVMX: nSVM: Add a new VCPU statistic to show if VCPU is in guest modeKrish Sadhukhan2021-06-174-0/+16
* KVM: nVMX: nSVM: 'nested_run' should count guest-entry attempts that make it ...Krish Sadhukhan2021-06-174-5/+18
* KVM: x86: Drop "pre_" from enter/leave_smm() helpersSean Christopherson2021-06-177-24/+23
* KVM: x86: Drop .post_leave_smm(), i.e. the manual post-RSM MMU resetSean Christopherson2021-06-173-9/+8
* KVM: x86: Rename SMM tracepoint to make it reflect realitySean Christopherson2021-06-172-2/+2
* KVM: x86: Move "entering SMM" tracepoint into kvm_smm_changed()Sean Christopherson2021-06-171-4/+2
* KVM: x86: Move (most) SMM hflags modifications into kvm_smm_changed()Sean Christopherson2021-06-171-13/+11
* KVM: x86: Invoke kvm_smm_changed() immediately after clearing SMM flagSean Christopherson2021-06-171-2/+2
* KVM: x86: Replace .set_hflags() with dedicated .exiting_smm() helperSean Christopherson2021-06-173-6/+5
* KVM: x86: Emulate triple fault shutdown if RSM emulation failsSean Christopherson2021-06-173-5/+14
* KVM: x86: Drop vendor specific functions for APICv/AVIC enablementVitaly Kuznetsov2021-06-174-6/+3
* KVM: x86: Use common 'enable_apicv' variable for both APICv and AVICVitaly Kuznetsov2021-06-177-22/+23
* kvm: x86: implement KVM PM-notifierSergey Senozhatsky2021-06-172-0/+37
* kvm: add PM-notifierSergey Senozhatsky2021-06-173-0/+47
* KVM: selftests: Introduce x2APIC register manipulation functionsJim Mattson2021-06-173-5/+14
* KVM: selftests: Hoist APIC functions out of individual testsJim Mattson2021-06-177-66/+83
* KVM: selftests: Move APIC definitions into a separate fileJim Mattson2021-06-173-47/+59
* KVM: nVMX: Disable vmcs02 posted interrupts if vmcs12 PID isn't mappableJim Mattson2021-06-171-1/+14
* KVM: nVMX: Fail on MMIO completion for nested posted interruptsJim Mattson2021-06-171-1/+5
* KVM: x86: Add a return code to kvm_apic_accept_eventsJim Mattson2021-06-173-11/+27
* KVM: x86: Add a return code to inject_pending_eventJim Mattson2021-06-171-10/+17
* KVM: nVMX: Add a return code to vmx_complete_nested_posted_interruptJim Mattson2021-06-171-6/+6
* KVM: x86: Remove guest mode check from kvm_check_nested_eventsJim Mattson2021-06-171-3/+0
* KVM: selftests: x86: Add vmx_nested_tsc_scaling_testIlias Stamatis2021-06-173-0/+244
* KVM: nVMX: Enable nested TSC scalingIlias Stamatis2021-06-171-6/+18