summaryrefslogtreecommitdiffstats
path: root/sys/amd64/vmm/intel
Commit message (Expand)AuthorAgeFilesLines
* If VMX isn't enabled so long as the lock bit isn't set yet in MSRtychon2014-05-301-1/+10
* - Rework the XSAVE/XRSTOR emulation to only expose XCR0 features to thejhb2014-05-271-2/+24
* Do the linear address calculation for the ins/outs emulation using a newneel2014-05-251-1/+0
* Consolidate all the information needed by the guest page table walker intoneel2014-05-241-10/+14
* When injecting a page fault into the guest also update the guest's %cr2 toneel2014-05-241-0/+2
* Add emulation of the "outsb" instruction. NetBSD guests use this to write toneel2014-05-231-8/+99
* Allow vmx_getdesc() and vmx_setdesc() to be called for a vcpu that is in theneel2014-05-223-10/+24
* Add PG_U (user/supervisor) checks when translating a guest linear addressneel2014-05-191-12/+27
* Make the vmx asm code dtrace-fbt-friendly bygrehan2014-05-182-7/+19
* Ignore writes to microcode update MSR. This MSR is accessed by RHEL7 guest.neel2014-04-301-0/+3
* Allow a virtual machine to be forcibly reset or powered off. This is doneneel2014-04-281-11/+2
* A VMCS is always inactive when it exits the vmx_run() loop.neel2014-04-261-8/+1
* Allow the guest to read the TSC via MSR 0x10.grehan2014-04-241-1/+7
* There is no need to save and restore the host's return address in theneel2014-04-113-11/+5
* Rework r264179.grehan2014-04-101-5/+19
* Make the vmm code compile with gcc too. Not entirely sure things areimp2014-04-051-1/+7
* Re-write bhyve's I/O MMU handling in terms of PCI RID.rstone2014-04-011-16/+12
* Revert PCI RID changes.rstone2014-04-011-12/+16
* Re-write bhyve's I/O MMU handling in terms of PCI RIDsrstone2014-04-011-16/+12
* Add an ioctl to suspend a virtual machine (VM_SUSPEND). The ioctl can be calledneel2014-03-261-3/+19
* Fix a race wherein the source of an interrupt vector is wronglytychon2014-03-151-7/+29
* Replace the userspace atpic stub with a more functional vmm.ko model.tychon2014-03-111-0/+6
* Correct VMware capitalization.jhb2014-02-281-1/+1
* Workaround an apparent bug in VMWare Fusion's nested VT support where itjhb2014-02-281-0/+7
* Queue pending exceptions in the 'struct vcpu' instead of directly updating theneel2014-02-262-123/+24
* Add support for x2APIC virtualization assist in Intel VT-x.neel2014-02-211-10/+142
* A first pass at adding support for injecting hardware exceptions forjhb2014-02-183-35/+130
* Add virtualized XSAVE support to bhyve which permits guests to use XSAVE andjhb2014-02-081-0/+37
* Add a counter to differentiate between VM-exits due to nested paging faultsneel2014-02-081-1/+2
* Fix a bug in the handling of VM-exits caused by non-maskable interrupts (NMI).neel2014-02-081-15/+36
* Add support for FreeBSD/i386 guests under bhyve.jhb2014-02-051-0/+28
* Avoid doing unnecessary nested TLB invalidations.neel2014-02-044-31/+39
* Support level triggered interrupts with VT-x virtual interrupt delivery.neel2014-01-252-3/+37
* Set "Interrupt Window Exiting" in the case where there is a vector to beneel2014-01-231-9/+28
* Handle a VM-exit due to a NMI properly by vectoring to the host's NMI handlerneel2014-01-221-0/+20
* Some processor's don't allow NMI injection if the STI_BLOCKING bit is set inneel2014-01-181-69/+80
* If the guest exits due to a fault while it is executing IRET then restoreneel2014-01-182-4/+68
* If a VM-exit happens during an NMI injection then clear the "NMI Blocking" bitneel2014-01-172-12/+26
* Add an API to rendezvous all active vcpus in a virtual machine. The rendezvousneel2014-01-141-5/+26
* Enable "Posted Interrupt Processing" if supported by the CPU. This lets usneel2014-01-113-14/+72
* Enable the "Acknowledge Interrupt on VM exit" VM-exit control.neel2014-01-116-13/+67
* Don't expose 'vmm_ipinum' as a global.neel2014-01-093-5/+5
* Use the 'Virtual Interrupt Delivery' feature of Intel VT-x if supported byneel2014-01-073-19/+440
* Fix a bug introduced in r260167 related to VM-exit tracing.neel2014-01-071-10/+11
* Allow vlapic_set_intr_ready() to return a value that indicates whether or notneel2014-01-071-2/+1
* Split the VMCS setup between 'vmcs_init()' that does initialization andneel2014-01-063-64/+27
* Use the same label name for ENTRY() and END() macros for 'vmx_enter_guest'.neel2014-01-031-1/+1
* Restructure the VMX code to enter and exit the guest. In large part this changeneel2014-01-014-410/+221
* In sys/amd64/vmm/intel/vmx.c, silence a (incorrect) gcc warning aboutdim2013-12-271-0/+1
* vlapic code restructuring to make it easy to support hardware-assist for APICneel2013-12-252-6/+44
OpenPOWER on IntegriCloud