summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/vmx (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge remote-tracking branch 'kvm/next' into kvm-next-5.20Paolo Bonzini2022-08-0112-306/+659
|\
| * KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIPSean Christopherson2022-07-281-0/+3
| * Revert "KVM: nVMX: Expose load IA32_PERF_GLOBAL_CTRL VM-{Entry,Exit} control"Paolo Bonzini2022-07-283-27/+0
| * KVM: nVMX: Attempt to load PERF_GLOBAL_CTRL on nVMX xfer iff it existsSean Christopherson2022-07-281-1/+3
| * KVM: VMX: Add helper to check if the guest PMU has PERF_GLOBAL_CTRLSean Christopherson2022-07-282-2/+14
| * KVM: VMX: Mark all PERF_GLOBAL_(OVF)_CTRL bits reserved if there's no vPMUSean Christopherson2022-07-281-0/+2
| * Revert "KVM: nVMX: Do not expose MPX VMX controls when guest MPX disabled"Paolo Bonzini2022-07-281-20/+1
| * KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported valueSean Christopherson2022-07-281-33/+37
| * KVM: nVMX: Rename handle_vm{on,off}() to handle_vmx{on,off}()Sean Christopherson2022-07-281-4/+4
| * KVM: nVMX: Inject #UD if VMXON is attempted with incompatible CR0/CR4Sean Christopherson2022-07-281-9/+14
| * KVM: nVMX: Account for KVM reserved CR4 bits in consistency checksSean Christopherson2022-07-281-1/+2
| * KVM: x86: Split kvm_is_valid_cr4() and export only the non-vendor bitsSean Christopherson2022-07-281-2/+2
| * KVM: x86: Restrict get_mt_mask() to a u8, use KVM_X86_OP_OPTIONAL_RET0Sean Christopherson2022-07-141-1/+1
| * KVM: x86: Add dedicated helper to get CPUID entry with significant indexSean Christopherson2022-07-143-9/+9
| * KVM: VMX: Update PT MSR intercepts during filter change iff PT in host+guestSean Christopherson2022-07-141-1/+3
| * KVM: x86/mmu: Replace UNMAPPED_GVA with INVALID_GPA for gva_to_gpa()Hou Wenlong2022-07-131-1/+1
| * KVM: nVMX: Always enable TSC scaling for L2 when it was enabled for L1Vitaly Kuznetsov2022-07-121-1/+0
| * KVM: nVMX: clean up posted interrupt descriptor try_cmpxchgPaolo Bonzini2022-06-241-7/+8
| * KVM: x86: Enable CMCI capability by default and handle injected UCNA errorsJue Wang2022-06-241-0/+1
| * KVM: VMX: Use vcpu_get_perf_capabilities() to get guest-visible valueSean Christopherson2022-06-201-4/+7
| * Revert "KVM: x86: always allow host-initiated writes to PMU MSRs"Sean Christopherson2022-06-201-17/+10
| * KVM: VMX: Give host userspace full control of MSR_IA32_PERF_CAPABILITIESSean Christopherson2022-06-201-2/+0
| * KVM: x86: Give host userspace full control of MSR_IA32_MISC_ENABLESSean Christopherson2022-06-201-5/+0
| * KVM: nVMX: Use kvm_vcpu_map() to get/pin vmcs12's APIC-access pageSean Christopherson2022-06-202-28/+13
| * KVM: VMX: Refactor 32-bit PSE PT creation to avoid using MMU macroSean Christopherson2022-06-201-1/+1
| * KVM: x86: Move "apicv_active" into "struct kvm_lapic"Sean Christopherson2022-06-201-1/+2
| * KVM: x86: Drop @vcpu parameter from kvm_x86_ops.hwapic_isr_update()Sean Christopherson2022-06-201-1/+1
| * KVM: nVMX: Update vmcs12 on BNDCFGS write, not at vmcs02=>vmcs12 syncSean Christopherson2022-06-202-3/+6
| * KVM: nVMX: Save BNDCFGS to vmcs12 iff relevant controls are exposed to L1Sean Christopherson2022-06-201-1/+2
| * KVM: nVMX: Rename nested.vmcs01_* fields to nested.pre_vmenter_*Sean Christopherson2022-06-203-7/+23
| * KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending caseSean Christopherson2022-06-201-1/+2
| * KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending caseSean Christopherson2022-06-201-1/+2
| * KVM: VMX: Use try_cmpxchg64 in pi_try_set_controlUros Bizjak2022-06-151-1/+1
| * KVM: VMX: Skip filter updates for MSRs that KVM is already interceptingSean Christopherson2022-06-151-7/+11
| * Merge branch 'kvm-5.20-early'Paolo Bonzini2022-06-0910-146/+511
| |\
| | * KVM: VMX: Reject kvm_intel if an inconsistent VMCS config is detectedSean Christopherson2022-06-081-3/+17
| | * KVM: VMX: Sanitize VM-Entry/VM-Exit control pairs at kvm_intel load timeSean Christopherson2022-06-082-7/+34
| | * KVM: x86/pmu: Restrict advanced features based on module enable_pmuLike Xu2022-06-082-1/+8
| | * KVM: x86/pmu: Avoid exposing Intel BTS featureLike Xu2022-06-081-1/+2
| | * KVM: VMX: Enable Notify VM exitTao Xu2022-06-083-2/+52
| | * KVM: x86: Introduce "struct kvm_caps" to track misc caps/settingsSean Christopherson2022-06-082-13/+13
| | * KVM: x86/pmu: Drop amd_event_mapping[] in the KVM contextLike Xu2022-06-081-7/+4
| | * KVM: x86/pmu: Use only the uniform interface reprogram_counter()Paolo Bonzini2022-06-081-2/+2
| | * KVM: x86/pmu: Drop "u8 ctrl, int idx" for reprogram_fixed_counter()Like Xu2022-06-081-7/+7
| | * KVM: x86/pmu: Drop "u64 eventsel" for reprogram_gp_counter()Like Xu2022-06-081-1/+2
| | * KVM: x86/pmu: Pass only "struct kvm_pmc *pmc" to reprogram_counter()Like Xu2022-06-081-14/+18
| | * KVM: x86: always allow host-initiated writes to PMU MSRsPaolo Bonzini2022-06-081-10/+17
| | * KVM: vmx, pmu: accept 0 for host-initiated write to MSR_IA32_DS_AREAPaolo Bonzini2022-06-081-0/+2
| | * KVM: x86/pmu: Ignore pmu->global_ctrl check if vPMU doesn't support global_ctrlLike Xu2022-06-081-0/+3
| | * KVM: x86/pmu: Don't overwrite the pmu->global_ctrl when refreshingLike Xu2022-06-081-4/+5