summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/vmx
Commit message (Expand)AuthorAgeFilesLines
* KVM: VMX: Use tabs instead of spaces for indentationRong Tao2023-03-141-2/+2
* KVM: VMX: Fix indentation coding style issueRong Tao2023-03-141-6/+6
* KVM: nVMX: remove unnecessary #ifdefPaolo Bonzini2023-03-141-7/+1
* KVM: nVMX: add missing consistency checks for CR0 and CR4Paolo Bonzini2023-03-141-2/+8
* Merge tag 'kvm-x86-apic-6.3' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2023-02-211-19/+21
|\
| * KVM: VMX: Intercept reads to invalid and write-only x2APIC registersSean Christopherson2023-01-241-4/+4
| * KVM: VMX: Always intercept accesses to unsupported "extended" x2APIC regsSean Christopherson2023-01-241-18/+20
* | Merge tag 'kvm-riscv-6.3-1' of https://github.com/kvm-riscv/linux into HEADPaolo Bonzini2023-02-151-12/+9
|\ \
| * | KVM: x86/vmx: Do not skip segment attributes if unusable bit is setHendrik Borghorst2023-01-221-12/+9
* | | Merge tag 'kvm-x86-vmx-6.3' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2023-02-157-110/+118
|\ \ \
| * | | KVM: VMX: Fix crash due to uninitialized current_vmcsAlexandru Matei2023-02-072-13/+7
| * | | KVM: nVMX: Simplify the setting of SECONDARY_EXEC_ENABLE_VMFUNC for nested.Yu Zhang2023-02-071-9/+5
| * | | KVM: VMX: Do not trap VMFUNC instructions for L1 guests.Yu Zhang2023-02-072-4/+9
| * | | KVM: VMX: Handle NMI VM-Exits in noinstr regionSean Christopherson2023-01-243-19/+27
| * | | KVM: VMX: Provide separate subroutines for invoking NMI vs. IRQ handlersSean Christopherson2023-01-242-46/+50
| * | | x86/entry: KVM: Use dedicated VMX NMI entry for 32-bit kernels tooSean Christopherson2023-01-241-2/+2
| * | | KVM: VMX: Always inline to_vmx() and to_kvm_vmx()Sean Christopherson2023-01-242-4/+5
| * | | KVM: VMX: Always inline eVMCS read/write helpersSean Christopherson2023-01-241-10/+10
| * | | KVM: VMX: Allow VM-Fail path of VMREAD helper to be instrumentedSean Christopherson2023-01-241-0/+2
| * | | KVM: x86: Make vmx_get_exit_qual() and vmx_get_intr_info() noinstr-friendlySean Christopherson2023-01-241-8/+6
| * | | KVM: VMX: don't use "unsigned long" in vmx_vcpu_enter_exit()Alexey Dobriyan2023-01-241-1/+1
| * | | KVM: VMX: Access @flags as a 32-bit value in __vmx_vcpu_run()Sean Christopherson2023-01-241-4/+4
| | |/ | |/|
* | | Merge tag 'kvm-x86-pmu-6.3' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2023-02-152-12/+15
|\ \ \
| * | | KVM: x86/pmu: Gate all "unimplemented MSR" prints on report_ignored_msrsSean Christopherson2023-01-261-3/+1
| * | | KVM: x86/pmu: Cap kvm_pmu_cap.num_counters_gp at KVM's internal maxSean Christopherson2023-01-261-0/+1
| * | | KVM: x86/pmu: Drop event_type and rename "struct kvm_event_hw_type_mapping"Like Xu2023-01-261-9/+12
| * | | KVM: x86/pmu: Correct the mask used in a pmu event filter lookupAaron Lewis2023-01-241-0/+1
| |/ /
* / / KVM: x86: Replace cpu_dirty_logging_count with nr_memslots_dirty_loggingDavid Matlack2023-01-241-3/+6
|/ /
* | Merge branch 'kvm-lapic-fix-and-cleanup' into HEADPaolo Bonzini2023-01-241-46/+12
|\ \
| * | KVM: x86: Track required APICv inhibits with variable, not callbackSean Christopherson2023-01-131-13/+11
| * | KVM: x86: Inhibit APICv/AVIC if the optimized physical map is disabledSean Christopherson2023-01-131-0/+1
| * | KVM: x86: Move APIC access page helper to common x86 codeSean Christopherson2023-01-131-34/+1
| * | KVM: VMX: Resurrect vmcs_conf sanitization for KVM-on-Hyper-VVitaly Kuznetsov2022-12-273-0/+40
| * | KVM: nVMX: Prepare to sanitize tertiary execution controls with eVMCSVitaly Kuznetsov2022-12-272-0/+6
| * | KVM: nVMX: Invert 'unsupported by eVMCSv1' checkVitaly Kuznetsov2022-12-272-36/+96
| * | KVM: nVMX: Sanitize primary processor-based VM-execution controls with eVMCS tooVitaly Kuznetsov2022-12-271-0/+12
| |/
* | KVM: x86: Do compatibility checks when onlining CPUChao Gao2022-12-291-5/+10
* | KVM: x86: Move CPU compat checks hook to kvm_x86_ops (from kvm_x86_init_ops)Sean Christopherson2022-12-293-10/+10
* | KVM: VMX: Shuffle support checks and hardware enabling code aroundSean Christopherson2022-12-291-108/+108
* | KVM: x86: Do VMX/SVM support checks directly in vendor codeSean Christopherson2022-12-291-17/+20
* | KVM: VMX: Use current CPU's info to perform "disabled by BIOS?" checksSean Christopherson2022-12-291-2/+2
* | KVM: x86: Unify pr_fmt to use module name for all KVM modulesSean Christopherson2022-12-299-33/+34
* | KVM: x86: Use KBUILD_MODNAME to specify vendor module nameSean Christopherson2022-12-291-1/+1
* | KVM: Drop kvm_arch_check_processor_compat() hookSean Christopherson2022-12-291-2/+2
* | KVM: x86: Do CPU compatibility checks in x86 codeSean Christopherson2022-12-291-1/+1
* | KVM: VMX: Make VMCS configuration/capabilities structs read-only after initSean Christopherson2022-12-292-4/+4
* | KVM: VMX: Do _all_ initialization before exposing /dev/kvm to userspaceSean Christopherson2022-12-291-11/+19
* | KVM: x86: Move guts of kvm_arch_init() to standalone helperSean Christopherson2022-12-291-6/+15
* | KVM: VMX: Move Hyper-V eVMCS initialization to helperSean Christopherson2022-12-291-30/+43
* | KVM: VMX: Don't bother disabling eVMCS static key on module exitSean Christopherson2022-12-291-4/+0