Age | Commit message (Expand) | Author | Files | Lines |
2021-10-21 | KVM: nVMX: promptly process interrupts delivered while in guest mode | Paolo Bonzini | 1 | -11/+6 |
2021-10-18 | KVM: VMX: Remove redundant handling of bus lock vmexit | Hao Xiang | 1 | -6/+9 |
2021-09-27 | KVM: VMX: Fix a TSX_CTRL_CPUID_CLEAR field mask issue | Zhenzhong Duan | 1 | -1/+1 |
2021-09-22 | KVM: x86: nVMX: re-evaluate emulation_required on nested VM exit | Maxim Levitsky | 1 | -4/+4 |
2021-09-22 | KVM: x86: nVMX: don't fail nested VM entry on invalid guest state if !from_vm... | Maxim Levitsky | 1 | -1/+4 |
2021-09-22 | KVM: x86: VMX: synthesize invalid VM exit when emulating invalid guest state | Maxim Levitsky | 1 | -3/+14 |
2021-09-22 | KVM: nVMX: Filter out all unsupported controls when eVMCS was activated | Vitaly Kuznetsov | 1 | -4/+5 |
2021-09-06 | KVM: VMX: avoid running vmx_handle_exit_irqoff in case of emulation | Maxim Levitsky | 1 | -0/+3 |
2021-08-20 | KVM: x86: Allow CPU to force vendor-specific TDP level | Wei Huang | 1 | -1/+2 |
2021-08-13 | KVM: VMX: Hide VMCS control calculators in vmx.c | Sean Christopherson | 1 | -3/+27 |
2021-08-13 | KVM: VMX: Drop caching of KVM's desired sec exec controls for vmcs01 | Sean Christopherson | 1 | -12/+8 |
2021-08-13 | KVM: VMX: Reset DR6 only when KVM_DEBUGREG_WONT_EXIT | Paolo Bonzini | 1 | -0/+6 |
2021-08-13 | KVM: X86: Set host DR6 only on VMX and for KVM_DEBUGREG_WONT_EXIT | Paolo Bonzini | 1 | -0/+4 |
2021-08-02 | KVM: VMX: Move RESET-only VMWRITE sequences to init_vmcs() | Sean Christopherson | 1 | -15/+13 |
2021-08-02 | KVM: VMX: Remove redundant write to set vCPU as active at RESET/INIT | Sean Christopherson | 1 | -2/+0 |
2021-08-02 | KVM: VMX: Smush x2APIC MSR bitmap adjustments into single function | Sean Christopherson | 1 | -34/+21 |
2021-08-02 | KVM: VMX: Remove unnecessary initialization of msr_bitmap_mode | Sean Christopherson | 1 | -1/+0 |
2021-08-02 | KVM: VMX: Don't redo x2APIC MSR bitmaps when userspace filter is changed | Sean Christopherson | 1 | -1/+0 |
2021-08-02 | KVM: nVMX: Remove obsolete MSR bitmap refresh at nested transitions | Sean Christopherson | 1 | -1/+1 |
2021-08-02 | KVM: VMX: Remove obsolete MSR bitmap refresh at vCPU RESET/INIT | Sean Christopherson | 1 | -3/+0 |
2021-08-02 | KVM: x86: Move setting of sregs during vCPU RESET/INIT to common x86 | Sean Christopherson | 1 | -9/+0 |
2021-08-02 | KVM: VMX: Don't _explicitly_ reconfigure user return MSRs on vCPU INIT | Sean Christopherson | 1 | -2/+2 |
2021-08-02 | KVM: VMX: Refresh list of user return MSRs after setting guest CPUID | Sean Christopherson | 1 | -0/+2 |
2021-08-02 | KVM: VMX: Skip pointless MSR bitmap update when setting EFER | Sean Christopherson | 1 | -9/+10 |
2021-08-02 | KVM: nVMX: Don't evaluate "emulation required" on nested VM-Exit | Sean Christopherson | 1 | -4/+2 |
2021-08-02 | KVM: VMX: Skip emulation required checks during pmode/rmode transitions | Sean Christopherson | 1 | -6/+12 |
2021-08-02 | KVM: VMX: Process CR0.PG side effects after setting CR0 assets | Sean Christopherson | 1 | -11/+12 |
2021-08-02 | KVM: VMX: Pull GUEST_CR3 from the VMCS iff CR3 load exiting is disabled | Sean Christopherson | 1 | -2/+5 |
2021-08-02 | KVM: nVMX: Do not clear CR3 load/store exiting bits if L1 wants 'em | Sean Christopherson | 1 | -9/+37 |
2021-08-02 | KVM: VMX: Fold ept_update_paging_mode_cr0() back into vmx_set_cr0() | Sean Christopherson | 1 | -23/+17 |
2021-08-02 | KVM: VMX: Remove direct write to vcpu->arch.cr0 during vCPU RESET/INIT | Sean Christopherson | 1 | -4/+1 |
2021-08-02 | KVM: VMX: Invert handling of CR0.WP for EPT without unrestricted guest | Sean Christopherson | 1 | -9/+5 |
2021-08-02 | KVM: x86: Move EDX initialization at vCPU RESET to common code | Sean Christopherson | 1 | -6/+0 |
2021-08-02 | KVM: x86: Consolidate APIC base RESET initialization code | Sean Christopherson | 1 | -7/+0 |
2021-08-02 | KVM: VMX: Stuff vcpu->arch.apic_base directly at vCPU RESET | Sean Christopherson | 1 | -6/+3 |
2021-08-02 | KVM: VMX: Remove explicit MMU reset in enter_rmode() | Sean Christopherson | 1 | -2/+0 |
2021-08-02 | KVM: VMX: Set EDX at INIT with CPUID.0x1, Family-Model-Stepping | Sean Christopherson | 1 | -1/+6 |
2021-08-02 | KVM: x86: Use KVM_BUG/KVM_BUG_ON to handle bugs that are fatal to the VM | Sean Christopherson | 1 | -9/+14 |
2021-06-25 | KVM: x86: rename apic_access_page_done to apic_access_memslot_enabled | Maxim Levitsky | 1 | -2/+2 |
2021-06-25 | kvm: x86: disable the narrow guest module parameter on unload | Aaron Lewis | 1 | -0/+2 |
2021-06-24 | KVM: nVMX: Handle split-lock #AC exceptions that happen in L2 | Sean Christopherson | 1 | -2/+2 |
2021-06-24 | KVM: x86: Print CPU of last attempted VM-entry when dumping VMCS/VMCB | Jim Mattson | 1 | -0/+2 |
2021-06-21 | KVM: VMX: Skip #PF(RSVD) intercepts when emulating smaller maxphyaddr | Jim Mattson | 1 | -9/+14 |
2021-06-18 | KVM: VMX: Refuse to load kvm_intel if EPT and NX are disabled | Sean Christopherson | 1 | -0/+6 |
2021-06-17 | KVM: nVMX: Use '-1' in 'hv_evmcs_vmptr' to indicate that eVMCS is not in use | Vitaly Kuznetsov | 1 | -0/+1 |
2021-06-17 | KVM: x86: hyper-v: Move the remote TLB flush logic out of vmx | Vineeth Pillai | 1 | -103/+2 |
2021-06-17 | KVM: nVMX: nSVM: 'nested_run' should count guest-entry attempts that make it ... | Krish Sadhukhan | 1 | -1/+12 |
2021-06-17 | KVM: x86: Drop "pre_" from enter/leave_smm() helpers | Sean Christopherson | 1 | -4/+4 |
2021-06-17 | KVM: x86: Drop vendor specific functions for APICv/AVIC enablement | Vitaly Kuznetsov | 1 | -1/+0 |
2021-06-17 | KVM: x86: Use common 'enable_apicv' variable for both APICv and AVIC | Vitaly Kuznetsov | 1 | -1/+0 |