summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/vmx/vmx.c
Commit message (Expand)AuthorAgeFilesLines
* KVM: SVM: Do not report support for SMM for an SEV-ES guestTom Lendacky2020-12-151-1/+5
* KVM: x86: introduce complete_emulated_msr callbackPaolo Bonzini2020-12-151-0/+1
* KVM/VMX/SVM: Move kvm_machine_check function to x86.hUros Bizjak2020-12-141-20/+0
* KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bitsPaolo Bonzini2020-12-111-4/+4
* kvm: x86: Sink cpuid update into vendor-specific set_cr4 functionsJim Mattson2020-11-151-0/+4
* KVM: X86: Implement ring-based dirty memory trackingPeter Xu2020-11-151-0/+7
* KVM: X86: Don't track dirty for KVM_SET_[TSS_ADDR|IDENTITY_MAP_ADDR]Peter Xu2020-11-151-46/+42
* KVM: x86: fix apic_accept_events vs check_nested_eventsPaolo Bonzini2020-11-151-1/+1
* KVM: x86: Return bool instead of int for CR4 and SREGS validity checksSean Christopherson2020-11-151-1/+1
* KVM: x86: Move vendor CR4 validity check to dedicated kvm_x86_ops hookSean Christopherson2020-11-151-13/+18
* KVM: VMX: Drop explicit 'nested' check from vmx_set_cr4()Sean Christopherson2020-11-151-12/+7
* KVM: VMX: Drop guest CPUID check for VMXE in vmx_set_cr4()Sean Christopherson2020-11-151-2/+3
* KVM: vmx: remove unused variablePaolo Bonzini2020-10-311-2/+0
* KVM: VMX: eVMCS: make evmcs_sanitize_exec_ctrls() work againVitaly Kuznetsov2020-10-311-1/+3
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2020-10-241-1/+1
|\
| * KVM: vmx: rename pi_init to avoid conflict with paridePaolo Bonzini2020-10-241-1/+1
* | Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2020-10-231-778/+481
|\|
| * Merge branch 'kvm-fixes' into 'next'Paolo Bonzini2020-10-211-15/+22
| |\
| * | KVM: VMX: Intercept guest reserved CR4 bits to inject #GP faultSean Christopherson2020-10-211-5/+10
| * | KVM: x86: Move call to update_exception_bitmap() into VMX codeSean Christopherson2020-10-211-0/+3
| * | KVM: x86: allow kvm_x86_ops.set_efer to return an error valueMaxim Levitsky2020-10-211-2/+4
| * | KVM: VMX: Ignore userspace MSR filters for x2APICSean Christopherson2020-10-211-16/+29
| * | KVM: VMX: Fix x2APIC MSR intercept handling on !APICV platformsPeter Xu2020-10-191-2/+3
| * | KVM: VMX: vmx_uret_msrs_list[] can be statickernel test robot2020-09-291-1/+1
| * | KVM: x86: VMX: Prevent MSR passthrough when MSR access is deniedAlexander Graf2020-09-281-52/+174
| * | KVM: x86: Prepare MSR bitmaps for userspace tracked MSRsAaron Lewis2020-09-281-43/+40
| * | KVM: VMX: Rename vmx_uret_msr's "index" to "slot"Sean Christopherson2020-09-281-4/+4
| * | KVM: VMX: Rename "vmx_msr_index" to "vmx_uret_msrs_list"Sean Christopherson2020-09-281-8/+8
| * | KVM: VMX: Rename "vmx_set_guest_msr" to "vmx_set_guest_uret_msr"Sean Christopherson2020-09-281-3/+4
| * | KVM: VMX: Rename "find_msr_entry" to "vmx_find_uret_msr"Sean Christopherson2020-09-281-5/+5
| * | KVM: VMX: Add vmx_setup_uret_msr() to handle lookup and swapSean Christopherson2020-09-281-31/+18
| * | KVM: VMX: Move uret MSR lookup into update_transition_efer()Sean Christopherson2020-09-281-12/+19
| * | KVM: VMX: Check guest support for RDTSCP before processing MSR_TSC_AUXSean Christopherson2020-09-281-3/+5
| * | KVM: VMX: Rename "__find_msr_index" to "__vmx_find_uret_msr"Sean Christopherson2020-09-281-8/+8
| * | KVM: VMX: Rename vcpu_vmx's "guest_msrs_ready" to "guest_uret_msrs_loaded"Sean Christopherson2020-09-281-4/+4
| * | KVM: VMX: Rename vcpu_vmx's "save_nmsrs" to "nr_active_uret_msrs"Sean Christopherson2020-09-281-11/+11
| * | KVM: VMX: Rename vcpu_vmx's "nmsrs" to "nr_uret_msrs"Sean Christopherson2020-09-281-3/+3
| * | KVM: VMX: Rename the "shared_msr_entry" struct to "vmx_uret_msr"Sean Christopherson2020-09-281-29/+29
| * | KVM: VMX: Rename "vmx_find_msr_index" to "vmx_find_loadstore_msr_slot"Sean Christopherson2020-09-281-5/+5
| * | KVM: VMX: Prepend "MAX_" to MSR array size definesSean Christopherson2020-09-281-3/+3
| * | KVM: x86: Rename "shared_msrs" to "user_return_msrs"Sean Christopherson2020-09-281-6/+5
| * | KVM: x86: Add intr/vectoring info and error code to kvm_exit tracepointSean Christopherson2020-09-281-2/+16
| * | KVM: nVMX: Explicitly check for valid guest state for !unrestricted guestSean Christopherson2020-09-281-6/+2
| * | KVM: VMX: Rename ops.h to vmx_ops.hSean Christopherson2020-09-281-1/+0
| * | KVM: VMX: Extract posted interrupt support to separate filesXiaoyao Li2020-09-281-315/+5
| * | KVM: VMX: Add a helper and macros to reduce boilerplate for sec exec ctlsSean Christopherson2020-09-281-87/+64
| * | KVM: VMX: Rename RDTSCP secondary exec control name to insert "ENABLE"Sean Christopherson2020-09-281-5/+5
| * | KVM: VMX: Unconditionally clear CPUID.INVPCID if !CPUID.PCIDSean Christopherson2020-09-281-5/+11
| * | KVM: VMX: Rename vmx_*_supported() helpers to cpu_has_vmx_*()Sean Christopherson2020-09-281-7/+7
| * | KVM: VMX: Use "illegal GPA" helper for PT/RTIT output base checkSean Christopherson2020-09-281-1/+1