summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/vmx/vmx.c
Commit message (Expand)AuthorAgeFilesLines
...
* | | | | KVM: x86: Pass emulation type to can_emulate_instruction()Sean Christopherson2022-01-261-3/+4
* | | | | KVM: VMX: Remove vmcs_config.orderJim Mattson2022-01-261-3/+2
* | | | | KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadowSean Christopherson2022-01-251-0/+25
* | | | | KVM: VMX: Zero host's SYSENTER_ESP iff SYSENTER is NOT usedSean Christopherson2022-01-241-3/+7
| |_|_|/ |/| | |
* | | | KVM: VMX: Fold fallback path into triggering posted IRQ helperSean Christopherson2022-01-191-8/+10
* | | | KVM: VMX: Pass desired vector instead of bool for triggering posted IRQSean Christopherson2022-01-191-5/+3
* | | | KVM: VMX: Don't do full kick when triggering posted interrupt "fails"Sean Christopherson2022-01-191-2/+2
* | | | KVM: x86: Remove defunct pre_block/post_block kvm_x86_ops hooksSean Christopherson2022-01-191-13/+0
* | | | KVM: VMX: Move preemption timer <=> hrtimer dance to common x86Sean Christopherson2022-01-191-5/+1
* | | | KVM: Move x86 VMX's posted interrupt list_head to vcpu_vmxSean Christopherson2022-01-191-0/+2
* | | | KVM: VMX: Handle PI descriptor updates during vcpu_put/loadSean Christopherson2022-01-191-5/+0
* | | | KVM: VMX: Reject KVM_RUN if emulation is required with pending exceptionSean Christopherson2022-01-191-2/+20
| |_|/ |/| |
* | | kvm: x86: Disable interception for IA32_XFD on demandKevin Tian2022-01-141-5/+19
* | | kvm: x86: Disable RDMSR interception of IA32_XFD_ERRJing Liu2022-01-141-0/+6
* | | kvm: x86: Intercept #NM for saving IA32_XFD_ERRJing Liu2022-01-141-0/+48
* | | KVM: SVM: include CR3 in initial VMSA state for SEV-ES guestsMichael Roth2022-01-071-0/+1
* | | KVM: VMX: Mark VCPU_EXREG_CR3 dirty when !CR0_PG -> CR0_PG if EPT + !URGLai Jiangshan2022-01-071-0/+7
* | | KVM: VMX: Save HOST_CR3 in vmx_set_host_fs_gs()Lai Jiangshan2022-01-071-11/+9
* | | Merge remote-tracking branch 'kvm/master' into HEADPaolo Bonzini2021-12-211-13/+32
|\| |
| * | KVM: VMX: Wake vCPU when delivering posted IRQ even if vCPU == this vCPUSean Christopherson2021-12-211-2/+1
| * | KVM: nVMX: Synthesize TRIPLE_FAULT for L2 if emulation is requiredSean Christopherson2021-12-201-8/+24
| * | KVM: VMX: Always clear vmx->fail on emulation_requiredSean Christopherson2021-12-201-3/+1
| * | KVM: x86: Always set kvm_run->if_flagMarc Orr2021-12-201-0/+6
* | | KVM: nVMX: Ensure vCPU honors event request if posting nested IRQ failsSean Christopherson2021-12-091-0/+19
* | | KVM: nVMX: Track whether changes in L0 require MSR bitmap for L2 to be rebuiltVitaly Kuznetsov2021-12-081-0/+2
* | | KVM: VMX: Introduce vmx_msr_bitmap_l01_changed() helperVitaly Kuznetsov2021-12-081-4/+13
* | | Merge branch 'kvm-on-hv-msrbm-fix' into HEADPaolo Bonzini2021-12-081-9/+13
|\| |
| * | KVM: nVMX: Don't use Enlightened MSR Bitmap for L3Vitaly Kuznetsov2021-12-081-9/+13
* | | KVM: VMX: Use ept_caps_to_lpage_level() in hardware_setup()Lai Jiangshan2021-12-081-10/+2
* | | KVM: VMX: Change comments about vmx_get_msr()Lai Jiangshan2021-12-081-1/+1
* | | KVM: VMX: Use kvm_set_msr_common() for MSR_IA32_TSC_ADJUST in the default wayLai Jiangshan2021-12-081-3/+0
* | | KVM: VMX: Save HOST_CR3 in vmx_prepare_switch_to_guest()Lai Jiangshan2021-12-081-7/+10
* | | KVM: VMX: Update msr value after kvm_set_user_return_msr() succeedsLai Jiangshan2021-12-081-5/+3
* | | KVM: VMX: Avoid to rdmsrl(MSR_IA32_SYSENTER_ESP)Lai Jiangshan2021-12-081-3/+11
* | | KVM: vmx, svm: clean up mass updates to regs_avail/regs_dirty bitsPaolo Bonzini2021-12-081-1/+2
* | | KVM: VMX: Update vmcs.GUEST_CR3 only when the guest CR3 is dirtyLai Jiangshan2021-12-081-2/+2
* | | KVM: VMX: Add and use X86_CR4_PDPTR_BITS when !enable_eptLai Jiangshan2021-12-081-1/+3
* | | KVM: VMX: Add and use X86_CR4_TLBFLUSH_BITS when !enable_eptLai Jiangshan2021-12-081-1/+1
* | | KVM: VMX: Mark VCPU_EXREG_PDPTR available in ept_save_pdptrs()Lai Jiangshan2021-12-081-1/+1
* | | KVM: x86: Tweak halt emulation helper names to free up kvm_vcpu_halt()Sean Christopherson2021-12-081-2/+2
* | | KVM: x86/MMU: Simplify flow of vmx_get_mt_maskBen Gardon2021-12-081-16/+7
|/ /
* | KVM: ensure APICv is considered inactive if there is no APICPaolo Bonzini2021-12-021-0/+1
* | KVM: VMX: clear vmx_x86_ops.sync_pir_to_irr if APICv is disabledPaolo Bonzini2021-11-301-2/+2
* | KVM: VMX: prepare sync_pir_to_irr for running with APICv disabledPaolo Bonzini2021-11-301-14/+25
* | KVM: nVMX: Flush current VPID (L1 vs. L2) for KVM_REQ_TLB_FLUSH_GUESTSean Christopherson2021-11-261-9/+14
|/
* Merge branch 'kvm-5.16-fixes' into kvm-masterPaolo Bonzini2021-11-111-63/+10
|\
| * KVM: Move INVPCID type check from vmx and svm to the common kvm_handle_invpcid()Vipin Sharma2021-11-111-5/+0
| * KVM: VMX: Add a helper function to retrieve the GPR index for INVPCID, INVVPI...Vipin Sharma2021-11-111-1/+3
| * KVM: nVMX: Handle dynamic MSR intercept togglingSean Christopherson2021-11-111-53/+2
| * KVM: nVMX: Query current VMCS when determining if MSR bitmaps are in useSean Christopherson2021-11-111-4/+4