summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm
Commit message (Expand)AuthorAgeFilesLines
* x86/kvm: Fix compilation warning in non-x86_64 buildsLeonardo Bras2022-02-181-0/+4
* x86/kvm/fpu: Remove kvm_vcpu_arch.guest_supported_xcr0Leonardo Bras2022-02-172-7/+16
* x86/kvm/fpu: Limit guest user_xfeatures to supported bits of XCR0Leonardo Bras2022-02-171-0/+2
* kvm: x86: Disable KVM_HC_CLOCK_PAIRING if tsc is in always catchup modeAnton Romanov2022-02-171-0/+7
* KVM: x86: Add KVM_CAP_ENABLE_CAP to x86Aaron Lewis2022-02-171-0/+1
* KVM: x86/pmu: Use AMD64_RAW_EVENT_MASK for PERF_TYPE_RAWJim Mattson2022-02-141-1/+1
* KVM: x86/pmu: Don't truncate the PerfEvtSeln MSR when creating a perf eventJim Mattson2022-02-141-2/+3
* KVM: SVM: fix race between interrupt delivery and AVIC inhibitionMaxim Levitsky2022-02-114-49/+55
* KVM: SVM: set IRR in svm_deliver_interruptPaolo Bonzini2022-02-112-3/+1
* KVM: SVM: extract avic_ring_doorbellMaxim Levitsky2022-02-111-11/+20
* KVM: x86/xen: Fix runstate updates to be atomic when preempting vCPUDavid Woodhouse2022-02-101-30/+67
* KVM: x86: SVM: move avic definitions from AMD's spec to svm.hMaxim Levitsky2022-02-082-32/+1
* KVM: x86: lapic: don't touch irr_pending in kvm_apic_update_apicv when inhibi...Maxim Levitsky2022-02-081-1/+6
* KVM: x86: nSVM: deal with L1 hypervisor that intercepts interrupts but lets L...Maxim Levitsky2022-02-081-4/+13
* KVM: x86: nSVM: expose clean bit support to the guestMaxim Levitsky2022-02-081-0/+1
* KVM: x86: nSVM/nVMX: set nested_run_pending on VM entry which is a result of RSMMaxim Levitsky2022-02-082-0/+6
* KVM: x86: nSVM: mark vmcb01 as dirty when restoring SMM saved stateMaxim Levitsky2022-02-081-0/+2
* KVM: x86: nSVM: fix potential NULL derefernce on nested migrationMaxim Levitsky2022-02-081-12/+14
* KVM: x86: SVM: don't passthrough SMAP/SMEP/PKE bits in !NPT && !gCR0.PG caseMaxim Levitsky2022-02-081-2/+10
* Revert "svm: Add warning message for AVIC IPI invalid target"Sean Christopherson2022-02-081-2/+0
* Merge tag 'kvmarm-fixes-5.17-2' of git://git.kernel.org/pub/scm/linux/kernel/...Paolo Bonzini2022-02-0511-85/+71
|\
| * Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2022-01-2816-186/+416
| |\
| * \ Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2022-01-2219-521/+662
| |\ \
| * \ \ Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2022-01-1646-766/+1705
| |\ \ \
| * \ \ \ Merge tag 'x86_core_for_v5.17_rc1' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2022-01-124-30/+20
| |\ \ \ \
| | * | | | x86/vmx: Remove .fixup usagePeter Zijlstra2021-12-111-9/+7
| | * | | | x86/kvm: Remove .fixup usagePeter Zijlstra2021-12-111-12/+4
| | * | | | x86: Prepare inline-asm for straight-line-speculationPeter Zijlstra2021-12-081-2/+2
| | * | | | x86: Prepare asm files for straight-line-speculationPeter Zijlstra2021-12-082-9/+9
| * | | | | Merge tag 'perf_core_for_v5.17_rc1' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds2022-01-126-55/+50
| |\ \ \ \ \
| | * | | | | KVM: x86: Move Intel Processor Trace interrupt handler to vmx.cSean Christopherson2021-11-172-20/+22
| | * | | | | KVM: Move x86's perf guest info callbacks to generic KVMSean Christopherson2021-11-171-42/+11
| | * | | | | KVM: x86: More precisely identify NMI from guest when handling PMISean Christopherson2021-11-174-6/+15
| | * | | | | KVM: x86: Drop current_vcpu for kvm_running_vcpu + kvm_arch_vcpu variableSean Christopherson2021-11-173-14/+19
| | * | | | | perf: Force architectures to opt-in to guest callbacksSean Christopherson2021-11-171-0/+1
| | * | | | | perf/core: Rework guest callbacks to prepare for static_call supportLike Xu2021-11-172-19/+23
| | * | | | | KVM: x86: Register Processor Trace interrupt hook iff PT enabled in guestSean Christopherson2021-11-172-1/+5
| | * | | | | KVM: x86: Register perf callbacks after calling vendor's hardware_setup()Sean Christopherson2021-11-171-3/+4
| * | | | | | Merge tag 'x86_misc_for_v5.17_rc1' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2022-01-101-0/+1
| |\ \ \ \ \ \
| | * | | | | | x86/mtrr: Remove the mtrr_bp_init() stubChristoph Hellwig2021-12-221-0/+1
* | | | | | | | KVM: x86: Use ERR_PTR_USR() to return -EFAULT as a __user pointerSean Christopherson2022-02-041-3/+3
* | | | | | | | KVM: x86: Report deprecated x87 features in supported CPUIDJim Mattson2022-02-041-6/+7
* | | | | | | | kvm/x86: rework guest entry logicMark Rutland2022-02-014-50/+7
* | | | | | | | KVM: x86: Move delivery of non-APICv interrupt into vendor codeSean Christopherson2022-02-013-10/+34
| |_|_|_|_|_|/ |/| | | | | |
* | | | | | | KVM: nVMX: Allow VMREAD when Enlightened VMCS is in useVitaly Kuznetsov2022-01-282-16/+51
* | | | | | | KVM: nVMX: Implement evmcs_field_offset() suitable for handle_vmread()Vitaly Kuznetsov2022-01-282-10/+25
* | | | | | | KVM: nVMX: Rename vmcs_to_field_offset{,_table}Vitaly Kuznetsov2022-01-283-8/+8
* | | | | | | KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMERVitaly Kuznetsov2022-01-281-1/+3
* | | | | | | KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCSVitaly Kuznetsov2022-01-281-0/+1
* | | | | | | KVM: x86: add system attribute to retrieve full set of supported xsave statesPaolo Bonzini2022-01-281-0/+51