summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/vmx (follow)
Commit message (Expand)AuthorAgeFilesLines
* KVM: x86: nSVM/nVMX: set nested_run_pending on VM entry which is a result of RSMMaxim Levitsky2022-02-081-0/+1
* Merge tag 'kvmarm-fixes-5.17-2' of git://git.kernel.org/pub/scm/linux/kernel/...Paolo Bonzini2022-02-053-17/+38
|\
| * Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2022-01-287-54/+138
| |\
| * \ Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2022-01-226-146/+140
| |\ \
| * \ \ Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2022-01-169-195/+385
| |\ \ \
| * \ \ \ Merge tag 'x86_core_for_v5.17_rc1' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2022-01-132-16/+14
| |\ \ \ \
| | * | | | x86/vmx: Remove .fixup usagePeter Zijlstra2021-12-111-9/+7
| | * | | | x86: Prepare asm files for straight-line-speculationPeter Zijlstra2021-12-081-7/+7
| * | | | | Merge tag 'perf_core_for_v5.17_rc1' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds2022-01-131-1/+24
| |\ \ \ \ \
| | * | | | | KVM: x86: Move Intel Processor Trace interrupt handler to vmx.cSean Christopherson2021-11-171-1/+21
| | * | | | | KVM: x86: More precisely identify NMI from guest when handling PMISean Christopherson2021-11-171-1/+3
| | * | | | | KVM: x86: Register Processor Trace interrupt hook iff PT enabled in guestSean Christopherson2021-11-171-0/+1
* | | | | | | kvm/x86: rework guest entry logicMark Rutland2022-02-011-2/+2
* | | | | | | KVM: x86: Move delivery of non-APICv interrupt into vendor codeSean Christopherson2022-02-011-1/+16
| |_|_|_|_|/ |/| | | | |
* | | | | | KVM: nVMX: Allow VMREAD when Enlightened VMCS is in useVitaly Kuznetsov2022-01-282-16/+51
* | | | | | KVM: nVMX: Implement evmcs_field_offset() suitable for handle_vmread()Vitaly Kuznetsov2022-01-282-10/+25
* | | | | | KVM: nVMX: Rename vmcs_to_field_offset{,_table}Vitaly Kuznetsov2022-01-283-8/+8
* | | | | | KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMERVitaly Kuznetsov2022-01-281-1/+3
* | | | | | KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCSVitaly Kuznetsov2022-01-281-0/+1
* | | | | | KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02Sean Christopherson2022-01-261-10/+12
* | | | | | KVM: x86: Forcibly leave nested virt when SMM state is toggledSean Christopherson2022-01-261-0/+1
* | | | | | KVM: x86: Pass emulation type to can_emulate_instruction()Sean Christopherson2022-01-261-3/+4
* | | | | | KVM: VMX: Remove vmcs_config.orderJim Mattson2022-01-262-4/+2
* | | | | | KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadowSean Christopherson2022-01-251-0/+25
* | | | | | KVM: VMX: Zero host's SYSENTER_ESP iff SYSENTER is NOT usedSean Christopherson2022-01-241-3/+7
| |_|_|_|/ |/| | | |
* | | | | KVM: VMX: Don't do full kick when handling posted interrupt wakeupSean Christopherson2022-01-191-1/+1
* | | | | KVM: VMX: Fold fallback path into triggering posted IRQ helperSean Christopherson2022-01-191-8/+10
* | | | | KVM: VMX: Pass desired vector instead of bool for triggering posted IRQSean Christopherson2022-01-191-5/+3
* | | | | KVM: VMX: Don't do full kick when triggering posted interrupt "fails"Sean Christopherson2022-01-191-2/+2
* | | | | KVM: x86: Remove defunct pre_block/post_block kvm_x86_ops hooksSean Christopherson2022-01-191-13/+0
* | | | | KVM: VMX: Move preemption timer <=> hrtimer dance to common x86Sean Christopherson2022-01-191-5/+1
* | | | | KVM: Move x86 VMX's posted interrupt list_head to vcpu_vmxSean Christopherson2022-01-193-19/+25
* | | | | KVM: VMX: Handle PI descriptor updates during vcpu_put/loadSean Christopherson2022-01-193-93/+70
* | | | | Merge branch 'kvm-pi-raw-spinlock' into HEADPaolo Bonzini2022-01-191-8/+8
|\ \ \ \ \
| * | | | | KVM: VMX: switch blocked_vcpu_on_cpu_lock to raw spinlockMarcelo Tosatti2022-01-181-8/+8
| |/ / / /
* | | | | KVM: VMX: Reject KVM_RUN if emulation is required with pending exceptionSean Christopherson2022-01-191-2/+20
* | | | | KVM: x86: Making the module parameter of vPMU more commonLike Xu2022-01-172-1/+5
* | | | | KVM: x86/pmu: Fix available_event_types check for REF_CPU_CYCLES eventLike Xu2022-01-171-6/+12
| |_|_|/ |/| | |
* | | | kvm: x86: Disable interception for IA32_XFD on demandKevin Tian2022-01-142-6/+20
* | | | kvm: x86: Disable RDMSR interception of IA32_XFD_ERRJing Liu2022-01-142-1/+7
* | | | kvm: x86: Intercept #NM for saving IA32_XFD_ERRJing Liu2022-01-142-0/+53
* | | | KVM: SVM: include CR3 in initial VMSA state for SEV-ES guestsMichael Roth2022-01-071-0/+1
* | | | KVM: VMX: Provide vmread version using asm-goto-with-outputsPeter Zijlstra2022-01-071-0/+27
* | | | KVM: x86: Update vPMCs when retiring branch instructionsEric Hankland2022-01-071-2/+5
* | | | KVM: x86/pmu: Reuse pmc_perf_hw_id() and drop find_fixed_event()Like Xu2022-01-071-16/+3
* | | | KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id()Like Xu2022-01-071-4/+5
* | | | KVM: x86/pmu: Setup pmc->eventsel for fixed PMCsLike Xu2022-01-071-0/+16
* | | | KVM: x86: avoid out of bounds indices for fixed performance countersPaolo Bonzini2022-01-071-3/+4
* | | | KVM: VMX: Mark VCPU_EXREG_CR3 dirty when !CR0_PG -> CR0_PG if EPT + !URGLai Jiangshan2022-01-071-0/+7
* | | | KVM: VMX: Save HOST_CR3 in vmx_set_host_fs_gs()Lai Jiangshan2022-01-073-14/+14