summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/vmx/capabilities.h (follow)
Commit message (Expand)AuthorAgeFilesLines
* KVM VMX: Move MSR_IA32_VMX_MISC bit defines to asm/vmx.hSean Christopherson2024-08-221-2/+2
* KVM: VMX: Track CPU's MSR_IA32_VMX_BASIC as a single 64-bit valueXin Li2024-08-221-4/+2
* KVM: VMX: Rename XSAVES control to follow KVM's preferred "ENABLE_XYZ"Sean Christopherson2023-08-171-1/+1
* KVM: VMX: Treat UMIP as emulated if and only if the host doesn't have UMIPSean Christopherson2023-05-261-2/+2
* KVM: VMX: Make VMCS configuration/capabilities structs read-only after initSean Christopherson2022-12-291-2/+2
* KVM: x86: Track supported PERF_CAPABILITIES in kvm_capsSean Christopherson2022-11-091-25/+0
* perf/x86/core: Zero @lbr instead of returning -1 in x86_perf_get_lbr() stubSean Christopherson2022-11-091-1/+2
* KVM: VMX: Fold vmx_supported_debugctl() into vcpu_supported_debugctl()Sean Christopherson2022-11-021-15/+0
* KVM: VMX: Advertise PMU LBRs if and only if perf supports LBRsSean Christopherson2022-11-021-1/+3
* KVM: VMX: Cache MSR_IA32_VMX_MISC in vmcs_configVitaly Kuznetsov2022-09-261-8/+3
* KVM: VMX: Check CPU_BASED_{INTR,NMI}_WINDOW_EXITING in setup_vmcs_config()Vitaly Kuznetsov2022-09-261-1/+2
* Merge remote-tracking branch 'kvm/next' into kvm-next-5.20Paolo Bonzini2022-08-011-16/+41
|\
| * KVM: VMX: Sanitize VM-Entry/VM-Exit control pairs at kvm_intel load timeSean Christopherson2022-06-081-7/+3
| * KVM: x86/pmu: Restrict advanced features based on module enable_pmuLike Xu2022-06-081-0/+4
| * KVM: VMX: Enable Notify VM exitTao Xu2022-06-081-0/+6
| * KVM: x86/pmu: Expose CPUIDs feature bits PDCM, DS, DTES64Like Xu2022-06-081-11/+17
| * KVM: VMX: enable IPI virtualizationChao Gao2022-06-081-0/+6
| * KVM: VMX: Detect Tertiary VM-Execution control when setup VMCS configRobert Hoo2022-06-081-0/+7
* | KVM: VMX: Prevent RSB underflow before vmenterJosh Poimboeuf2022-06-271-2/+2
|/
* KVM: VMX: Remove vmcs_config.orderJim Mattson2022-01-261-1/+0
* KVM: x86: Making the module parameter of vPMU more commonLike Xu2022-01-171-0/+4
* KVM: X86: Add parameter huge_page_level to kvm_init_shadow_ept_mmu()Lai Jiangshan2021-12-081-0/+9
* KVM: x86: Use common 'enable_apicv' variable for both APICv and AVICVitaly Kuznetsov2021-06-171-1/+0
* KVM: VMX: Drop unneeded CONFIG_X86_LOCAL_APIC checkVitaly Kuznetsov2021-05-241-2/+1
* KVM: X86: Expose bus lock debug exception to guestPaolo Bonzini2021-05-071-0/+3
* KVM: vmx/pmu: Expose LBR_FMT in the MSR_IA32_PERF_CAPABILITIESLike Xu2021-02-041-1/+8
* KVM: vmx/pmu: Emulate legacy freezing LBRs on virtual PMILike Xu2021-02-041-1/+3
* KVM: vmx/pmu: Add PMU_CAP_LBR_FMT check when guest LBR is enabledLike Xu2021-02-041-1/+6
* KVM: vmx/pmu: Add PMU_CAP_LBR_FMT check when guest LBR is enabledPaolo Bonzini2021-02-041-0/+1
* KVM: VMX: read/write MSR_IA32_DEBUGCTLMSR from GUEST_IA32_DEBUGCTLLike Xu2021-02-041-0/+5
* KVM: VMX: Enable bus lock VM exitChenyi Qiang2021-02-041-0/+6
* KVM: VMX: Rename RDTSCP secondary exec control name to insert "ENABLE"Sean Christopherson2020-09-281-1/+1
* KVM: VMX: Rename vmx_*_supported() helpers to cpu_has_vmx_*()Sean Christopherson2020-09-281-4/+4
* KVM: x86/pmu: Support full width countingLike Xu2020-06-011-0/+11
* KVM: x86: Handle PKU CPUID adjustment in VMX codeSean Christopherson2020-03-161-5/+0
* KVM: x86: Use supported_xcr0 to detect MPX supportSean Christopherson2020-03-161-1/+1
* KVM: VMX: Add helpers to query Intel PT modeSean Christopherson2020-03-161-0/+18
* KVM: nVMX: clear PIN_BASED_POSTED_INTR from nested pinbased_ctls only when ap...Vitaly Kuznetsov2020-02-211-0/+1
* kvm/svm: PKU not currently supportedJohn Allen2020-01-271-0/+5
* KVM: x86: Add support for user wait instructionsTao Xu2019-09-241-0/+6
* KVM: VMX: Include architectural defs header in capabilities.hSean Christopherson2019-04-301-0/+2
* KVM: x86: Add Intel PT virtualization work modeChao Peng2018-12-211-0/+15
* KVM: VMX: Expose various module param vars via capabilities.hSean Christopherson2018-12-141-0/+7
* KVM: VMX: Move capabilities structs and helpers to dedicated fileSean Christopherson2018-12-141-0/+321