summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2023-07-0322-279/+470
|\
| * Merge tag 'kvm-x86-vmx-6.5' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2023-07-018-37/+73
| |\
| | * KVM: x86/mmu: Trigger APIC-access page reload iff vendor code caresSean Christopherson2023-06-061-1/+2
| | * KVM: x86: Use standard mmu_notifier invalidate hooks for APIC access pageSean Christopherson2023-06-062-14/+3
| | * KVM: VMX: Retry APIC-access page reload if invalidation is in-progressSean Christopherson2023-06-061-5/+45
| | * KVM: VMX: Inject #GP, not #UD, if SGX2 ENCLS leafs are unsupportedSean Christopherson2023-06-021-6/+9
| | * KVM: VMX: Inject #GP on ENCLS if vCPU has paging disabled (CR0.PG==0)Sean Christopherson2023-06-021-1/+1
| | * KVM: VMX: restore vmx_vmexit alignmentJon Kohler2023-06-011-1/+1
| | * KVM: x86/pmu: Remove redundant check for MSR_IA32_DS_AREA set handlerJinrong Liang2023-06-011-2/+0
| | * KVM: VMX: Use proper accessor to read guest CR4 in handle_desc()Sean Christopherson2023-05-261-1/+7
| | * KVM: VMX: Treat UMIP as emulated if and only if the host doesn't have UMIPSean Christopherson2023-05-263-5/+4
| | * KVM: VMX: Move the comment of CR4.MCE handling right above the codeXiaoyao Li2023-05-261-2/+2
| | * KVM: VMX: Use kvm_read_cr4() to get cr4 valueXiaoyao Li2023-05-261-1/+1
| * | Merge tag 'kvm-x86-svm-6.5' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2023-07-013-35/+13
| |\ \
| | * | KVM: SVM: WARN, but continue, if misc_cg_set_capacity() failsSean Christopherson2023-06-131-6/+2
| | * | KVM: SVM: enhance info printk's in SEV initAlexander Mikhalitsyn2023-06-061-2/+9
| | * | KVM: SVM: Invoke trace_kvm_exit() for fastpath VM-ExitsSean Christopherson2023-06-021-2/+2
| | * | KVM: SVM: Remove TSS reloading code after VMEXITMingwei Zhang2023-06-012-25/+0
| | |/
| * | Merge tag 'kvm-x86-pmu-6.5' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2023-07-0110-116/+259
| |\ \
| | * | KVM: x86/cpuid: Add AMD CPUID ExtPerfMonAndDbg leaf 0x80000022Like Xu2023-06-062-1/+31
| | * | KVM: x86/svm/pmu: Add AMD PerfMonV2 supportLike Xu2023-06-063-11/+72
| | * | KVM: x86/cpuid: Add a KVM-only leaf to redirect AMD PerfMonV2 flagLike Xu2023-06-061-0/+7
| | * | KVM: x86/pmu: Constrain the num of guest counters with kvm_pmu_capLike Xu2023-06-061-0/+3
| | * | KVM: x86/pmu: Advertise PERFCTR_CORE iff the min nr of counters is metLike Xu2023-06-061-3/+12
| | * | KVM: x86/pmu: Disable vPMU if the minimum num of counters isn't metLike Xu2023-06-063-4/+12
| | * | KVM: x86: Explicitly zero cpuid "0xa" leaf when PMU is disabledLike Xu2023-06-061-1/+1
| | * | KVM: x86/pmu: Provide Intel PMU's pmc_is_enabled() as generic x86 codeLike Xu2023-06-064-28/+16
| | * | KVM: x86/pmu: Move handling PERF_GLOBAL_CTRL and friends to common x86Like Xu2023-06-065-62/+86
| | * | KVM: x86/pmu: Reject userspace attempts to set reserved GLOBAL_STATUS bitsLike Xu2023-06-061-0/+3
| | * | KVM: x86/pmu: Move reprogram_counters() to pmu.hLike Xu2023-06-062-12/+12
| | * | KVM: x86/pmu: Rename global_ovf_ctrl_mask to global_status_maskSean Christopherson2023-06-061-4/+14
| | |/
| * | Merge tag 'kvm-x86-mmu-6.5' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2023-07-012-6/+48
| |\ \
| | * | KVM: x86/mmu: Add "never" option to allow sticky disabling of nx_huge_pagesSean Christopherson2023-06-131-5/+36
| | * | KVM: x86/mmu: Assert on @mmu in the __kvm_mmu_invalidate_addr()Like Xu2023-05-261-0/+8
| | * | KVM: x86/mmu: Add comment on try_cmpxchg64 usage in tdp_mmu_set_spte_atomicUros Bizjak2023-05-261-1/+4
| | |/
| * | Merge tag 'kvm-x86-misc-6.5' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2023-07-018-85/+77
| |\ \
| | * | KVM: x86: Remove PRIx* definitions as they are solely for user spaceAndy Shevchenko2023-06-161-5/+0
| | * | KVM: x86: Update comments about MSR lists exposed to userspaceSean Christopherson2023-06-131-14/+13
| | * | KVM: x86: Clean up: remove redundant bool conversionsMichal Luczaj2023-06-062-2/+2
| | * | KVM: x86: Use cpu_feature_enabled() for PKU instead of #ifdefSean Christopherson2023-06-061-6/+2
| | * | KVM: x86: Correct the name for skipping VMENTER l1d flushChao Gao2023-06-061-1/+1
| | * | KVM: x86: Update number of entries for KVM_GET_CPUID2 on success, not failureSean Christopherson2023-06-011-9/+4
| | * | KVM: x86: Fix poll commandJinliang Zheng2023-06-011-0/+3
| | * | KVM: x86: Move common handling of PAT MSR writes to kvm_set_msr_common()Sean Christopherson2023-06-013-13/+7
| | * | KVM: x86: Make kvm_mtrr_valid() static now that there are no external usersSean Christopherson2023-06-012-3/+1
| | * | KVM: x86: Move PAT MSR handling out of mtrr.cSean Christopherson2023-06-012-13/+19
| | * | KVM: x86: Use MTRR macros to define possible MTRR MSR rangesSean Christopherson2023-06-012-7/+10
| | * | KVM: x86: Add helper to get variable MTRR range from MSR indexSean Christopherson2023-06-011-10/+13
| | * | KVM: x86: Add helper to query if variable MTRR MSR is base (versus mask)Sean Christopherson2023-06-011-7/+9
| | * | KVM: SVM: Use kvm_pat_valid() directly instead of kvm_mtrr_valid()Ke Guo2023-06-011-1/+1