summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/vmx/vmx.h (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'kvm-x86-vmx-6.11' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2024-07-161-0/+1
|\
| * KVM: VMX: Split out the non-virtualization part of vmx_interrupt_blocked()Sean Christopherson2024-06-281-0/+1
* | KVM: x86: Move shadow_phys_bits into "kvm_host", as "maxphyaddr"Sean Christopherson2024-06-031-1/+1
|/
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2024-05-151-1/+5
|\
| * Merge tag 'loongarch-kvm-6.10' of git://git.kernel.org/pub/scm/linux/kernel/g...Paolo Bonzini2024-05-101-1/+5
| |\
| * | KVM: VMX: Introduce test mode related to EPT violation VEIsaku Yamahata2024-04-191-1/+5
* | | KVM: VMX: Move posted interrupt descriptor out of VMX codeJacob Pan2024-04-301-1/+1
| |/ |/|
* | KVM: VMX: Snapshot LBR capabilities during module initializationSean Christopherson2024-04-111-0/+2
* | KVM: VMX: Ignore MKTME KeyID bits when intercepting #PF for allow_smaller_max...Tao Su2024-04-081-1/+3
|/
* KVM: x86: Fully defer to vendor code to decide how to force immediate exitSean Christopherson2024-02-231-2/+0
* Merge tag 'kvm-x86-lam-6.8' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2024-01-081-0/+2
|\
| * KVM: x86: Untag addresses for LAM emulation where applicableBinbin Wu2023-11-291-0/+2
* | KVM: nVMX: Hide more stuff under CONFIG_KVM_HYPERVVitaly Kuznetsov2023-12-071-0/+2
* | KVM: nVMX: Move guest_cpuid_has_evmcs() to hyperv.hVitaly Kuznetsov2023-12-071-10/+0
|/
* KVM: nVMX: Use KVM-governed feature framework to track "nested VMX enabled"Sean Christopherson2023-08-171-1/+0
* KVM: VMX: Rename XSAVES control to follow KVM's preferred "ENABLE_XYZ"Sean Christopherson2023-08-171-1/+1
* KVM: x86/pmu: Move handling PERF_GLOBAL_CTRL and friends to common x86Like Xu2023-06-071-12/+0
* Merge tag 'kvm-x86-misc-6.4' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2023-04-261-0/+18
|\
| * KVM: VMX: Make CR0.WP a guest owned bitMathias Krause2023-03-221-0/+18
* | KVM: x86: Virtualize FLUSH_L1D and passthrough MSR_IA32_FLUSH_CMDSean Christopherson2023-04-061-1/+1
|/
* KVM: VMX: Always inline to_vmx() and to_kvm_vmx()Sean Christopherson2023-01-241-2/+2
* KVM: x86: Make vmx_get_exit_qual() and vmx_get_intr_info() noinstr-friendlySean Christopherson2023-01-241-8/+6
* KVM: VMX: Add missing CPU based VM execution controls to vmcs_configVitaly Kuznetsov2022-09-261-1/+5
* KVM: VMX: Add missing VMEXIT controls to vmcs_configVitaly Kuznetsov2022-09-261-0/+3
* KVM: VMX: Extend VMX controls macro shenanigansVitaly Kuznetsov2022-09-261-23/+132
* KVM: nVMX: Treat eVMCS as enabled for guest iff Hyper-V is also enabledSean Christopherson2022-09-261-0/+10
* KVM: VMX: Adjust number of LBR records for PERF_CAPABILITIES at refreshSean Christopherson2022-08-101-2/+5
* KVM: VMX: Use proper type-safe functions for vCPU => LBRs helpersSean Christopherson2022-08-101-9/+17
* Merge remote-tracking branch 'kvm/next' into kvm-next-5.20Paolo Bonzini2022-08-011-33/+62
|\
| * KVM: VMX: Add helper to check if the guest PMU has PERF_GLOBAL_CTRLSean Christopherson2022-07-281-0/+12
| * KVM: nVMX: Use kvm_vcpu_map() to get/pin vmcs12's APIC-access pageSean Christopherson2022-06-201-1/+1
| * KVM: nVMX: Rename nested.vmcs01_* fields to nested.pre_vmenter_*Sean Christopherson2022-06-201-3/+12
| * KVM: x86/cpuid: Refactor host/guest CPU model consistency checkLike Xu2022-06-081-1/+0
| * KVM: x86/pmu: Disable guest PEBS temporarily in two rare situationsLike Xu2022-06-081-0/+1
| * KVM: VMX: enable IPI virtualizationChao Gao2022-06-081-0/+7
| * KVM: VMX: Detect Tertiary VM-Execution control when setup VMCS configRobert Hoo2022-06-081-0/+1
| * KVM: VMX: Extend BUILD_CONTROLS_SHADOW macro to support 64-bit variationRobert Hoo2022-06-081-28/+28
* | KVM: VMX: Prevent RSB underflow before vmenterJosh Poimboeuf2022-06-271-2/+2
* | KVM: VMX: Prevent guest RSB poisoning attacks with eIBRSJosh Poimboeuf2022-06-271-0/+1
* | KVM: VMX: Convert launched argument to flagsJosh Poimboeuf2022-06-271-1/+4
* | KVM: x86/speculation: Disable Fill buffer clear within guestsPawan Gupta2022-05-211-0/+2
|/
* KVM: nVMX: Defer APICv updates while L2 is active until L1 is activeSean Christopherson2022-04-211-0/+1
* Revert "KVM: VMX: Save HOST_CR3 in vmx_set_host_fs_gs()"Sean Christopherson2022-02-251-3/+2
* KVM: Move x86 VMX's posted interrupt list_head to vcpu_vmxSean Christopherson2022-01-191-0/+3
* kvm: x86: Disable interception for IA32_XFD on demandKevin Tian2022-01-141-1/+1
* kvm: x86: Disable RDMSR interception of IA32_XFD_ERRJing Liu2022-01-141-1/+1
* KVM: VMX: Save HOST_CR3 in vmx_set_host_fs_gs()Lai Jiangshan2022-01-071-2/+3
* KVM: nVMX: Track whether changes in L0 require MSR bitmap for L2 to be rebuiltVitaly Kuznetsov2021-12-081-0/+9
* KVM: vmx, svm: clean up mass updates to regs_avail/regs_dirty bitsPaolo Bonzini2021-12-081-13/+15
* KVM: nVMX: Use a gfn_to_hva_cache for vmptrldDavid Woodhouse2021-11-181-0/+5