[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20211118110814.2568-1-jiangshanlai@gmail.com>
Date: Thu, 18 Nov 2021 19:07:59 +0800
From: Lai Jiangshan <jiangshanlai@...il.com>
To: linux-kernel@...r.kernel.org
Cc: kvm@...r.kernel.org, Lai Jiangshan <laijs@...ux.alibaba.com>
Subject: [PATCH 00/15] KVM: X86: Miscellaneous cleanups
From: Lai Jiangshan <laijs@...ux.alibaba.com>
All are just cleanups and independent to each other except the last 3
patches.
Lai Jiangshan (15):
KVM: VMX: Use x86 core API to access to fs_base and inactive gs_base
KVM: VMX: Avoid to rdmsrl(MSR_IA32_SYSENTER_ESP)
KVM: VMX: Update msr value after kvm_set_user_return_msr() succeeds
KVM: VMX: Save HOST_CR3 in vmx_prepare_switch_to_guest()
KVM: VMX: Add document to state that write to uret msr should always
be intercepted
KVM: VMX: Use kvm_set_msr_common() for MSR_IA32_TSC_ADJUST in the
default way
KVM: VMX: Change comments about vmx_get_msr()
KVM: SVM: Rename get_max_npt_level() to get_npt_level()
KVM: SVM: Allocate sd->save_area with __GFP_ZERO
KVM: X86: Skip allocating pae_root for vcpu->arch.guest_mmu when
!tdp_enabled
KVM: X86: Fix comment in __kvm_mmu_create()
KVM: X86: Remove unused declaration of __kvm_mmu_free_some_pages()
KVM: X86: Remove useless code to set role.gpte_is_8_bytes when
role.direct
KVM: X86: Calculate quadrant when !role.gpte_is_8_bytes
KVM: X86: Always set gpte_is_8_bytes when direct map
Documentation/virt/kvm/mmu.rst | 2 +-
arch/x86/include/asm/kvm_host.h | 11 ------
arch/x86/kernel/process_64.c | 2 ++
arch/x86/kvm/mmu/mmu.c | 12 ++++---
arch/x86/kvm/svm/svm.c | 12 +++----
arch/x86/kvm/vmx/nested.c | 8 +----
arch/x86/kvm/vmx/vmx.c | 64 +++++++++++++++++++--------------
7 files changed, 53 insertions(+), 58 deletions(-)
--
2.19.1.6.gb485710b
Powered by blists - more mailing lists