summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/vmx (follow)
Commit message (Expand)AuthorAgeFilesLines
* KVM: vmx: remove unreachable statement in vmx_get_msr_feature()Miaohe Lin2020-01-081-2/+0
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2019-12-042-11/+9
|\
| * kvm: vmx: Stop wasting a page for guest_msrsJim Mattson2019-12-042-11/+9
* | Merge branch 'x86-iopl-for-linus' of git://git.kernel.org/pub/scm/linux/kerne...Linus Torvalds2019-11-261-8/+0
|\ \
| * | x86/tss: Fix and move VMX BUILD_BUG_ON()Thomas Gleixner2019-11-161-8/+0
* | | Merge branch 'x86-asm-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2019-11-261-6/+6
|\ \ \ | |_|/ |/| |
| * | x86/asm: Change all ENTRY+ENDPROC to SYM_FUNC_*Jiri Slaby2019-10-181-6/+6
* | | kvm: nVMX: Relax guest IA32_FEATURE_CONTROL constraintsJim Mattson2019-11-231-1/+3
* | | KVM: nVMX: Remove unnecessary TLB flushes on L1<->L2 switches when L1 use api...Liran Alon2019-11-211-7/+0
* | | KVM: nVMX: Do not mark vmcs02->apic_access_page as dirty when unpinningLiran Alon2019-11-211-3/+3
* | | Merge branch 'kvm-tsx-ctrl' into HEADPaolo Bonzini2019-11-214-60/+147
|\ \ \
| * | | KVM: vmx: use MSR_IA32_TSX_CTRL to hard-disable TSX on guest that lack itPaolo Bonzini2019-11-211-14/+30
| * | | KVM: vmx: implement MSR_IA32_TSX_CTRL disable RTM functionalityPaolo Bonzini2019-11-211-3/+35
| * | | KVM: VMX: Introduce pi_is_pir_empty() helperJoao Martins2019-11-122-3/+7
| * | | KVM: VMX: Do not change PID.NDST when loading a blocked vCPUJoao Martins2019-11-122-0/+20
| * | | KVM: VMX: Consider PID.PIR to determine if vCPU has pending interruptsJoao Martins2019-11-121-1/+5
| * | | KVM: VMX: Fix comment to specify PID.ON instead of PIR.ONLiran Alon2019-11-121-1/+1
| | |/ | |/|
| * | KVM: vmx, svm: always run with EFER.NXE=1 when shadow paging is activePaolo Bonzini2019-10-311-11/+3
| * | KVM: nVMX: Don't leak L1 MMIO regions to L2Jim Mattson2019-10-222-29/+48
* | | KVM: nVMX: Assume TLB entries of L1 and L2 are tagged differently if L0 use EPTLiran Alon2019-11-201-2/+4
* | | KVM: nVMX: add CR4_LA57 bit to nested CR4_FIXED1Chenyi Qiang2019-11-201-0/+1
* | | KVM: nVMX: Use semi-colon instead of comma for exit-handlers initializationLiran Alon2019-11-201-13/+13
* | | KVM: nVMX: Add support for capturing highest observable L2 TSCAaron Lewis2019-11-153-7/+101
* | | kvm: vmx: Rename function find_msr() to vmx_find_msr_index()Aaron Lewis2019-11-151-5/+5
* | | kvm: vmx: Rename NR_AUTOLOAD_MSRS to NR_LOADSTORE_MSRSAaron Lewis2019-11-152-4/+4
* | | kvm: nested: Introduce read_and_check_msr_entry()Aaron Lewis2019-11-151-13/+22
* | | KVM: nVMX: mark functions in the header as "static inline"Paolo Bonzini2019-11-151-3/+3
* | | KVM: nVMX: Expose load IA32_PERF_GLOBAL_CTRL VM-{Entry,Exit} controlOliver Upton2019-11-153-0/+25
* | | KVM: nVMX: Load GUEST_IA32_PERF_GLOBAL_CTRL MSR on VM-EntryOliver Upton2019-11-151-0/+5
* | | KVM: nVMX: Use kvm_set_msr to load IA32_PERF_GLOBAL_CTRL on VM-ExitOliver Upton2019-11-151-2/+12
* | | KVM: nVMX: Check HOST_IA32_PERF_GLOBAL_CTRL on VM-EntryOliver Upton2019-11-151-0/+5
* | | KVM: nVMX: Check GUEST_IA32_PERF_GLOBAL_CTRL on VM-EntryOliver Upton2019-11-151-0/+6
* | | KVM: VMX: Add helper to check reserved bits in IA32_PERF_GLOBAL_CTRLOliver Upton2019-11-151-1/+1
* | | KVM: x86/vPMU: Add lazy mechanism to release perf_event per vPMCLike Xu2019-11-151-0/+6
* | | KVM: x86/vPMU: Reuse perf_event to avoid unnecessary pmc_reprogram_counterLike Xu2019-11-151-0/+2
* | | KVM: x86/vPMU: Introduce a new kvm_pmu_ops->msr_idx_to_pmc callbackLike Xu2019-11-151-0/+13
* | | KVM: x86/vPMU: Rename pmu_ops callbacks from msr_idx to rdpmc_ecxLike Xu2019-11-151-5/+5
* | | KVM: nVMX: Update vmcs01 TPR_THRESHOLD if L2 changed L1 TPRLiran Alon2019-11-153-1/+10
* | | KVM: VMX: Refactor update_cr8_intercept()Liran Alon2019-11-151-6/+3
* | | KVM: VMX: Consume pending LAPIC INIT event when exit on INIT_SIGNALLiran Alon2019-11-151-0/+1
* | | KVM: retpolines: x86: eliminate retpoline from vmx.c exit handlersAndrea Arcangeli2019-11-151-2/+16
* | | KVM: x86: optimize more exit handlers in vmx.cAndrea Arcangeli2019-11-151-25/+5
* | | kvm: x86: Move IA32_XSS to kvm_{get,set}_msr_commonAaron Lewis2019-10-221-18/+0
* | | KVM: x86: Move IA32_XSS-swapping on VM-entry/VM-exit to common x86 codeAaron Lewis2019-10-221-25/+2
* | | KVM: VMX: Use wrmsr for switching between guest and host IA32_XSS on IntelAaron Lewis2019-10-221-7/+18
* | | KVM: VMX: Fix conditions for guest IA32_XSS supportAaron Lewis2019-10-221-13/+11
* | | KVM: x86: Introduce vcpu->arch.xsaves_enabledAaron Lewis2019-10-221-0/+5
* | | KVM: VMX: Rename {vmx,nested_vmx}_vcpu_setup()Xiaoyao Li2019-10-223-6/+7
* | | KVM: VMX: Initialize vmx->guest_msrs[] right after allocationXiaoyao Li2019-10-221-18/+16
* | | KVM: VMX: Remove vmx->hv_deadline_tsc initialization from vmx_vcpu_setup()Xiaoyao Li2019-10-221-1/+0