index
:
linux-dev
linus/master
master
Linux kernel development work - see feature branches
Jason A. Donenfeld
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
arch
/
x86
/
kvm
/
vmx
/
nested.c
(
unfollow
)
Age
Commit message (
Expand
)
Author
Files
Lines
2021-06-17
KVM: nVMX: Consolidate VM-Enter/VM-Exit TLB flush and MMU sync logic
Sean Christopherson
1
-64
/
+23
2021-06-17
KVM: x86: Drop skip MMU sync and TLB flush params from "new PGD" helpers
Sean Christopherson
5
-19
/
+11
2021-06-17
KVM: nSVM: Move TLB flushing logic (or lack thereof) to dedicated helper
Sean Christopherson
2
-10
/
+30
2021-06-17
KVM: x86: Uncondtionally skip MMU sync/TLB flush in MOV CR3's PGD switch
Sean Christopherson
1
-1
/
+1
2021-06-17
KVM: x86: Invalidate all PGDs for the current PCID on MOV CR3 w/ flush
Sean Christopherson
1
-27
/
+42
2021-06-17
KVM: nVMX: Don't clobber nested MMU's A/D status on EPTP switch
Sean Christopherson
1
-7
/
+0
2021-06-17
KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap
Sean Christopherson
1
-1
/
+1
2021-06-17
KVM: nVMX: Sync all PGDs on nested transition with shadow paging
Sean Christopherson
4
-8
/
+15
2021-06-17
KVM: selftests: evmcs_test: Test that KVM_STATE_NESTED_EVMCS is never lost
Vitaly Kuznetsov
1
-26
/
+38
2021-06-17
KVM: nVMX: Request to sync eVMCS from VMCS12 after migration
Vitaly Kuznetsov
1
-0
/
+6
2021-06-17
KVM: nVMX: Reset eVMCS clean fields data from prepare_vmcs02()
Vitaly Kuznetsov
1
-6
/
+13
2021-06-17
KVM: nVMX: Force enlightened VMCS sync from nested_vmx_failValid()
Vitaly Kuznetsov
1
-2
/
+6
2021-06-17
KVM: nVMX: Ignore 'hv_clean_fields' data when eVMCS data is copied in vmx_get_nested_state()
Vitaly Kuznetsov
1
-18
/
+25
2021-06-17
KVM: nVMX: Release enlightened VMCS on VMCLEAR
Vitaly Kuznetsov
1
-0
/
+2
2021-06-17
KVM: nVMX: Introduce 'EVMPTR_MAP_PENDING' post-migration state
Vitaly Kuznetsov
3
-11
/
+9
2021-06-17
KVM: nVMX: Make copy_vmcs12_to_enlightened()/copy_enlightened_to_vmcs12() return 'void'
Vitaly Kuznetsov
1
-4
/
+4
2021-06-17
KVM: nVMX: Release eVMCS when enlightened VMENTRY was disabled
Vitaly Kuznetsov
1
-1
/
+3
2021-06-17
KVM: nVMX: Don't set 'dirty_vmcs12' flag on enlightened VMPTRLD
Vitaly Kuznetsov
1
-1
/
+0
2021-06-17
KVM: nVMX: Use '-1' in 'hv_evmcs_vmptr' to indicate that eVMCS is not in use
Vitaly Kuznetsov
5
-28
/
+40
2021-06-17
KVM: x86: avoid loading PDPTRs after migration when possible
Maxim Levitsky
4
-2
/
+13
2021-06-17
KVM: x86: Introduce KVM_GET_SREGS2 / KVM_SET_SREGS2
Maxim Levitsky
5
-27
/
+185
2021-06-17
KVM: x86: introduce kvm_register_clear_available
Maxim Levitsky
2
-4
/
+9
2021-06-17
KVM: nVMX: delay loading of PDPTRs to KVM_REQ_GET_NESTED_STATE_PAGES
Maxim Levitsky
1
-5
/
+18
2021-06-17
KVM: nSVM: refactor the CR3 reload on migration
Maxim Levitsky
1
-7
/
+25
2021-06-17
KVM: x86: Always load PDPTRs on CR3 load for SVM w/o NPT and a PAE guest
Sean Christopherson
2
-33
/
+2
2021-06-17
KVM: nSVM: Drop pointless pdptrs_changed() check on nested transition
Sean Christopherson
1
-4
/
+2
2021-06-17
KVM: nVMX: Drop obsolete (and pointless) pdptrs_changed() check
Sean Christopherson
1
-5
/
+3
2021-06-17
KVM: selftests: Introduce hyperv_features test
Vitaly Kuznetsov
4
-0
/
+817
2021-06-17
KVM: selftests: Move evmcs.h to x86_64/
Vitaly Kuznetsov
1
-1
/
+1
2021-06-17
KVM: selftests: move Hyper-V MSR definitions to hyperv.h
Vitaly Kuznetsov
2
-7
/
+20
2021-06-17
KVM: x86: hyper-v: Honor HV_X64_EX_PROCESSOR_MASKS_RECOMMENDED bit
Vitaly Kuznetsov
1
-0
/
+8
2021-06-17
KVM: x86: hyper-v: Honor HV_X64_CLUSTER_IPI_RECOMMENDED bit
Vitaly Kuznetsov
1
-0
/
+4
2021-06-17
KVM: x86: hyper-v: Honor HV_X64_REMOTE_TLB_FLUSH_RECOMMENDED bit
Vitaly Kuznetsov
1
-0
/
+6
2021-06-17
KVM: x86: hyper-v: Honor HV_DEBUGGING privilege bit
Vitaly Kuznetsov
1
-0
/
+9
2021-06-17
KVM: x86: hyper-v: Honor HV_SIGNAL_EVENTS privilege bit
Vitaly Kuznetsov
1
-0
/
+2
2021-06-17
KVM: x86: hyper-v: Honor HV_POST_MESSAGES privilege bit
Vitaly Kuznetsov
1
-0
/
+2
2021-06-17
KVM: x86: hyper-v: Check access to HVCALL_NOTIFY_LONG_SPIN_WAIT hypercall
Vitaly Kuznetsov
1
-0
/
+11
2021-06-17
KVM: x86: hyper-v: Prepare to check access to Hyper-V hypercalls
Vitaly Kuznetsov
1
-0
/
+11
2021-06-17
KVM: x86: hyper-v: Honor HV_STIMER_DIRECT_MODE_AVAILABLE privilege bit
Vitaly Kuznetsov
1
-0
/
+6
2021-06-17
KVM: x86: hyper-v: Inverse the default in hv_check_msr_access()
Vitaly Kuznetsov
1
-1
/
+1
2021-06-17
KVM: x86: hyper-v: Honor HV_FEATURE_DEBUG_MSRS_AVAILABLE privilege bit
Vitaly Kuznetsov
1
-0
/
+4
2021-06-17
KVM: x86: hyper-v: Honor HV_FEATURE_GUEST_CRASH_MSR_AVAILABLE privilege bit
Vitaly Kuznetsov
1
-0
/
+4
2021-06-17
KVM: x86: hyper-v: Honor HV_ACCESS_REENLIGHTENMENT privilege bit
Vitaly Kuznetsov
1
-0
/
+5
2021-06-17
KVM: x86: hyper-v: Honor HV_ACCESS_FREQUENCY_MSRS privilege bit
Vitaly Kuznetsov
1
-0
/
+4
2021-06-17
KVM: x86: hyper-v: Honor HV_MSR_APIC_ACCESS_AVAILABLE privilege bit
Vitaly Kuznetsov
1
-0
/
+7
2021-06-17
KVM: x86: hyper-v: Honor HV_MSR_SYNTIMER_AVAILABLE privilege bit
Vitaly Kuznetsov
1
-0
/
+10
2021-06-17
KVM: x86: hyper-v: Honor HV_MSR_SYNIC_AVAILABLE privilege bit
Vitaly Kuznetsov
1
-0
/
+8
2021-06-17
KVM: x86: hyper-v: Honor HV_MSR_REFERENCE_TSC_AVAILABLE privilege bit
Vitaly Kuznetsov
1
-0
/
+3
2021-06-17
KVM: x86: hyper-v: Honor HV_MSR_RESET_AVAILABLE privilege bit
Vitaly Kuznetsov
1
-0
/
+3
2021-06-17
KVM: x86: hyper-v: Honor HV_MSR_VP_INDEX_AVAILABLE privilege bit
Vitaly Kuznetsov
1
-0
/
+3
[prev]
[next]