summaryrefslogtreecommitdiffstats
path: root/arch/x86
Commit message (Expand)AuthorAgeFilesLines
...
| * | | | | kvm: x86/mmu: Separate making SPTEs from set_spteBen Gardon2020-10-211-16/+33
| * | | | | kvm: mmu: Separate making non-leaf sptes from link_shadow_pageBen Gardon2020-10-211-6/+15
| * | | | | Merge branch 'kvm-fixes' into 'next'Paolo Bonzini2020-10-214-22/+39
| |\ \ \ \ \
| * | | | | | KVM: x86: Let the guest own CR4.FSGSBASELai Jiangshan2020-10-211-1/+1
| * | | | | | KVM: VMX: Intercept guest reserved CR4 bits to inject #GP faultSean Christopherson2020-10-211-5/+10
| * | | | | | KVM: x86: Move call to update_exception_bitmap() into VMX codeSean Christopherson2020-10-212-1/+3
| * | | | | | KVM: x86: Invoke vendor's vcpu_after_set_cpuid() after all common updatesSean Christopherson2020-10-211-2/+3
| * | | | | | KVM: x86: Intercept LA57 to inject #GP fault when it's reservedLai Jiangshan2020-10-211-1/+1
| * | | | | | KVM: SVM: Initialize prev_ga_tag before useSuravee Suthikulpanit2020-10-211-0/+1
| * | | | | | KVM: nSVM: implement on demand allocation of the nested stateMaxim Levitsky2020-10-213-28/+83
| * | | | | | KVM: x86: allow kvm_x86_ops.set_efer to return an error valueMaxim Levitsky2020-10-216-7/+15
| * | | | | | KVM: x86: report negative values from wrmsr emulation to userspaceMaxim Levitsky2020-10-212-5/+8
| * | | | | | KVM: x86: xen_hvm_config: cleanup return valuesMaxim Levitsky2020-10-211-14/+9
| * | | | | | kvm x86/mmu: Make struct kernel_param_ops definitions constJoe Perches2020-10-211-2/+2
| * | | | | | KVM: x86: bump KVM_MAX_CPUID_ENTRIESVitaly Kuznetsov2020-10-211-1/+1
| * | | | | | KVM: x86: allocate vcpu->arch.cpuid_entries dynamicallyVitaly Kuznetsov2020-10-213-39/+53
| * | | | | | KVM: x86: disconnect kvm_check_cpuid() from vcpu->arch.cpuid_entriesVitaly Kuznetsov2020-10-211-15/+23
| * | | | | | kvm: x86: only provide PV features if enabled in guest's CPUIDOliver Upton2020-10-214-5/+94
| * | | | | | kvm: x86: set wall_clock in kvm_write_wall_clock()Oliver Upton2020-10-211-1/+2
| * | | | | | kvm: x86: encapsulate wrmsr(MSR_KVM_SYSTEM_TIME) emulation in helper fnOliver Upton2020-10-211-26/+32
| * | | | | | x86/kvm: Update the comment about asynchronous page fault in exc_page_fault()Vitaly Kuznetsov2020-10-211-5/+8
| * | | | | | x86/kvm: hide KVM options from menuconfig when KVM is not compiledMatteo Croce2020-10-211-0/+1
| * | | | | | KVM: VMX: Forbid userspace MSR filters for x2APICPaolo Bonzini2020-10-211-1/+8
| * | | | | | KVM: VMX: Ignore userspace MSR filters for x2APICSean Christopherson2020-10-212-18/+31
| * | | | | | KVM: VMX: Fix x2APIC MSR intercept handling on !APICV platformsPeter Xu2020-10-191-2/+3
| * | | | | | KVM: VMX: vmx_uret_msrs_list[] can be statickernel test robot2020-09-291-1/+1
| * | | | | | KVM: x86: do not attempt TSC synchronization on guest writesPaolo Bonzini2020-09-281-20/+10
| * | | | | | KVM: nSVM: delay MSR permission processing to first nested VM runPaolo Bonzini2020-09-281-3/+18
| * | | | | | KVM: x86: rename KVM_REQ_GET_VMCS12_PAGESPaolo Bonzini2020-09-283-8/+8
| * | | | | | KVM: x86: Introduce MSR filteringAlexander Graf2020-09-283-1/+176
| * | | | | | KVM: x86: VMX: Prevent MSR passthrough when MSR access is deniedAlexander Graf2020-09-282-52/+181
| * | | | | | KVM: x86: SVM: Prevent MSR passthrough when MSR access is deniedAlexander Graf2020-09-282-8/+76
| * | | | | | KVM: x86: Prepare MSR bitmaps for userspace tracked MSRsAaron Lewis2020-09-284-70/+77
| * | | | | | KVM: x86: Add infrastructure for MSR filteringAlexander Graf2020-09-284-0/+10
| * | | | | | KVM: x86: Allow deflecting unknown MSR accesses to user spaceAlexander Graf2020-09-283-6/+135
| * | | | | | KVM: x86: Return -ENOENT on unimplemented MSRsAlexander Graf2020-09-281-1/+1
| * | | | | | KVM: VMX: Rename vmx_uret_msr's "index" to "slot"Sean Christopherson2020-09-282-5/+5
| * | | | | | KVM: VMX: Rename "vmx_msr_index" to "vmx_uret_msrs_list"Sean Christopherson2020-09-281-8/+8
| * | | | | | KVM: VMX: Rename "vmx_set_guest_msr" to "vmx_set_guest_uret_msr"Sean Christopherson2020-09-281-3/+4
| * | | | | | KVM: VMX: Rename "find_msr_entry" to "vmx_find_uret_msr"Sean Christopherson2020-09-283-7/+7
| * | | | | | KVM: VMX: Add vmx_setup_uret_msr() to handle lookup and swapSean Christopherson2020-09-281-31/+18
| * | | | | | KVM: VMX: Move uret MSR lookup into update_transition_efer()Sean Christopherson2020-09-281-12/+19
| * | | | | | KVM: VMX: Check guest support for RDTSCP before processing MSR_TSC_AUXSean Christopherson2020-09-281-3/+5
| * | | | | | KVM: VMX: Rename "__find_msr_index" to "__vmx_find_uret_msr"Sean Christopherson2020-09-281-8/+8
| * | | | | | KVM: VMX: Rename vcpu_vmx's "guest_msrs_ready" to "guest_uret_msrs_loaded"Sean Christopherson2020-09-282-5/+5
| * | | | | | KVM: VMX: Rename vcpu_vmx's "save_nmsrs" to "nr_active_uret_msrs"Sean Christopherson2020-09-282-12/+12
| * | | | | | KVM: VMX: Rename vcpu_vmx's "nmsrs" to "nr_uret_msrs"Sean Christopherson2020-09-282-4/+4
| * | | | | | KVM: VMX: Rename the "shared_msr_entry" struct to "vmx_uret_msr"Sean Christopherson2020-09-283-35/+35
| * | | | | | KVM: VMX: Rename "vmx_find_msr_index" to "vmx_find_loadstore_msr_slot"Sean Christopherson2020-09-283-14/+14
| * | | | | | KVM: VMX: Prepend "MAX_" to MSR array size definesSean Christopherson2020-09-283-9/+9