summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/hyperv.c
Commit message (Expand)AuthorAgeFilesLines
* Merge branch 'kvm-hv-xmm-hypercall-fixes' into HEADPaolo Bonzini2022-02-251-36/+49
|\
| * KVM: x86: hyper-v: HVCALL_SEND_IPI_EX is an XMM fast hypercallVitaly Kuznetsov2022-02-251-18/+34
| * KVM: x86: hyper-v: Fix the maximum number of sparse banks for XMM fast TLB fl...Vitaly Kuznetsov2022-02-251-1/+2
| * KVM: x86: hyper-v: Drop redundant 'ex' parameter from kvm_hv_flush_tlb()Vitaly Kuznetsov2022-02-251-17/+6
| * KVM: x86: hyper-v: Drop redundant 'ex' parameter from kvm_hv_send_ipi()Vitaly Kuznetsov2022-02-251-4/+4
* | KVM: nSVM: Implement Enlightened MSR-Bitmap featureVitaly Kuznetsov2022-02-101-6/+1
* | KVM: x86: Make kvm_hv_hypercall_enabled() static inlineVitaly Kuznetsov2022-02-101-5/+0
* | KVM: x86: Add checks for reserved-to-zero Hyper-V hypercall fieldsSean Christopherson2022-02-101-0/+5
* | KVM: x86: Reject fixeds-size Hyper-V hypercalls with non-zero "var_cnt"Sean Christopherson2022-02-101-6/+6
* | KVM: x86: Shove vp_bitmap handling down into sparse_set_to_vcpu_mask()Sean Christopherson2022-02-101-27/+38
* | KVM: x86: Don't bother reading sparse banks that end up being ignoredSean Christopherson2022-02-101-3/+16
* | KVM: x86: Add a helper to get the sparse VP_SET for IPIs and TLB flushesSean Christopherson2022-02-101-16/+16
* | KVM: x86: Refactor kvm_hv_flush_tlb() to reduce indentationSean Christopherson2022-02-101-19/+21
* | KVM: x86: Get the number of Hyper-V sparse banks from the VARHEAD fieldSean Christopherson2022-02-101-14/+21
* | KVM: x86: Skip APICv update if APICv is disable at the module levelSean Christopherson2022-02-101-0/+3
* | Merge remote-tracking branch 'kvm/master' into HEADPaolo Bonzini2021-12-211-2/+5
|\|
| * KVM: x86: Ignore sparse banks size for an "all CPUs", non-sparse IPI reqSean Christopherson2021-12-101-2/+5
* | KVM: nVMX: Implement Enlightened MSR Bitmap featureVitaly Kuznetsov2021-12-081-0/+2
* | KVM: Use 'unsigned long' as kvm_for_each_vcpu()'s indexMarc Zyngier2021-12-081-3/+4
|/
* KVM: x86: Assume a 64-bit hypercall for guests with protected stateTom Lendacky2021-11-181-2/+2
* KVM: x86: Rename kvm_lapic_enable_pv_eoi()Vitaly Kuznetsov2021-11-111-2/+2
* KVM: x86: Use rw_semaphore for APICv lock to allow vCPU parallelismSean Christopherson2021-10-221-2/+2
* KVM: Make kvm_make_vcpus_request_mask() use pre-allocated cpu_kick_maskVitaly Kuznetsov2021-09-301-4/+1
* KVM: Drop 'except' parameter from kvm_make_vcpus_request_mask()Vitaly Kuznetsov2021-09-301-1/+1
* KVM: x86: hyper-v: Avoid calling kvm_make_vcpus_request_mask() with vcpu_mask...Vitaly Kuznetsov2021-09-301-6/+9
* KVM: x86: Query vcpu->vcpu_idx directly and drop its accessorSean Christopherson2021-09-221-4/+3
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2021-09-071-6/+26
|\
| * KVM: x86: hyper-v: Deactivate APICv only when AutoEOI feature is in useVitaly Kuznetsov2021-08-201-6/+26
* | KVM: x86: remove dead initializationPaolo Bonzini2021-08-131-1/+1
|/
* KVM: x86: hyper-v: Check if guest is allowed to use XMM registers for hyperca...Vitaly Kuznetsov2021-08-031-2/+11
* KVM: x86: Introduce trace_kvm_hv_hypercall_done()Vitaly Kuznetsov2021-08-031-0/+1
* KVM: x86: hyper-v: Check access to hypercall before reading XMM registersVitaly Kuznetsov2021-08-031-3/+3
* KVM: nVMX: Sync all PGDs on nested transition with shadow pagingSean Christopherson2021-06-171-1/+1
* KVM: x86: hyper-v: Honor HV_X64_EX_PROCESSOR_MASKS_RECOMMENDED bitVitaly Kuznetsov2021-06-171-0/+8
* KVM: x86: hyper-v: Honor HV_X64_CLUSTER_IPI_RECOMMENDED bitVitaly Kuznetsov2021-06-171-0/+4
* KVM: x86: hyper-v: Honor HV_X64_REMOTE_TLB_FLUSH_RECOMMENDED bitVitaly Kuznetsov2021-06-171-0/+6
* KVM: x86: hyper-v: Honor HV_DEBUGGING privilege bitVitaly Kuznetsov2021-06-171-0/+9
* KVM: x86: hyper-v: Honor HV_SIGNAL_EVENTS privilege bitVitaly Kuznetsov2021-06-171-0/+2
* KVM: x86: hyper-v: Honor HV_POST_MESSAGES privilege bitVitaly Kuznetsov2021-06-171-0/+2
* KVM: x86: hyper-v: Check access to HVCALL_NOTIFY_LONG_SPIN_WAIT hypercallVitaly Kuznetsov2021-06-171-0/+11
* KVM: x86: hyper-v: Prepare to check access to Hyper-V hypercallsVitaly Kuznetsov2021-06-171-0/+11
* KVM: x86: hyper-v: Honor HV_STIMER_DIRECT_MODE_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+6
* KVM: x86: hyper-v: Inverse the default in hv_check_msr_access()Vitaly Kuznetsov2021-06-171-1/+1
* KVM: x86: hyper-v: Honor HV_FEATURE_DEBUG_MSRS_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+4
* KVM: x86: hyper-v: Honor HV_FEATURE_GUEST_CRASH_MSR_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+4
* KVM: x86: hyper-v: Honor HV_ACCESS_REENLIGHTENMENT privilege bitVitaly Kuznetsov2021-06-171-0/+5
* KVM: x86: hyper-v: Honor HV_ACCESS_FREQUENCY_MSRS privilege bitVitaly Kuznetsov2021-06-171-0/+4
* KVM: x86: hyper-v: Honor HV_MSR_APIC_ACCESS_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+7
* KVM: x86: hyper-v: Honor HV_MSR_SYNTIMER_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+10
* KVM: x86: hyper-v: Honor HV_MSR_SYNIC_AVAILABLE privilege bitVitaly Kuznetsov2021-06-171-0/+8