linux/arch/x86/kvm/svm
Maxim Levitsky 91f673b3e1 KVM: x86: nSVM: expose clean bit support to the guest
KVM already honours few clean bits thus it makes sense
to let the nested guest know about it.

Note that KVM also doesn't check if the hardware supports
clean bits, and therefore nested KVM was
already setting clean bits and L0 KVM
was already honouring them.

Signed-off-by: Maxim Levitsky <mlevitsk@redhat.com>
Message-Id: <20220207155447.840194-6-mlevitsk@redhat.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2022-02-08 13:30:49 -05:00
..
avic.c Revert "svm: Add warning message for AVIC IPI invalid target" 2022-02-08 13:30:46 -05:00
nested.c KVM: x86: nSVM: fix potential NULL derefernce on nested migration 2022-02-08 13:30:47 -05:00
pmu.c KVM: x86: Making the module parameter of vPMU more common 2022-01-17 12:56:03 -05:00
sev.c KVM: SVM: Explicitly require DECODEASSISTS to enable SEV support 2022-01-26 12:15:00 -05:00
svm_onhyperv.c KVM: SVM: hyper-v: Direct Virtual Flush support 2021-06-17 13:09:38 -04:00
svm_onhyperv.h KVM: SVM: drop unnecessary code in svm_hv_vmcb_dirty_nested_enlightenments() 2022-01-26 12:15:03 -05:00
svm_ops.h x86/kvm: Always inline vmload() / vmsave() 2021-09-15 15:51:45 +02:00
svm.c KVM: x86: nSVM: expose clean bit support to the guest 2022-02-08 13:30:49 -05:00
svm.h KVM: x86: Forcibly leave nested virt when SMM state is toggled 2022-01-26 12:15:03 -05:00
vmenter.S x86: Prepare asm files for straight-line-speculation 2021-12-08 12:25:37 +01:00