linux/arch/x86/kvm/svm
Paolo Bonzini ca46d739e3 KVM: nSVM: split nested_vmcb_check_controls
The authoritative state does not come from the VMCB once in guest mode,
but KVM_SET_NESTED_STATE can still perform checks on L1's provided SVM
controls because we get them from userspace.

Therefore, split out a function to do them.

Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2020-06-01 04:26:03 -04:00
..
avic.c KVM: SVM: Move AVIC code to separate file 2020-04-03 10:53:56 -04:00
nested.c KVM: nSVM: split nested_vmcb_check_controls 2020-06-01 04:26:03 -04:00
pmu.c
sev.c arch/x86/kvm/svm/sev.c: change flag passed to GUP fast in sev_pin_memory() 2020-05-07 19:27:20 -07:00
svm.c KVM: nSVM: remove HF_HIF_MASK 2020-06-01 04:26:02 -04:00
svm.h KVM: nSVM: remove HF_VINTR_MASK 2020-06-01 04:26:02 -04:00
vmenter.S KVM: SVM: Do not setup frame pointer in __svm_vcpu_run 2020-04-15 12:08:38 -04:00