summaryrefslogtreecommitdiffstats
path: root/arch/x86
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2022-01-1660-875/+2030
|\
| * x86/fpu: Fix inline prefix warningsYang Zhong2022-01-142-2/+2
| * kvm: x86: Disable interception for IA32_XFD on demandKevin Tian2022-01-144-6/+29
| * x86/fpu: Provide fpu_sync_guest_vmexit_xfd_state()Thomas Gleixner2022-01-142-0/+26
| * kvm: x86: Add support for getting/setting expanded xstate bufferGuang Zeng2022-01-144-3/+62
| * x86/fpu: Add uabi_size to guest_fpuThomas Gleixner2022-01-143-0/+7
| * kvm: x86: Add CPUID support for Intel AMXJing Liu2022-01-142-2/+27
| * kvm: x86: Add XCR0 support for Intel AMXJing Liu2022-01-141-1/+6
| * kvm: x86: Disable RDMSR interception of IA32_XFD_ERRJing Liu2022-01-142-1/+7
| * kvm: x86: Emulate IA32_XFD_ERR for guestJing Liu2022-01-141-1/+20
| * kvm: x86: Intercept #NM for saving IA32_XFD_ERRJing Liu2022-01-143-0/+59
| * x86/fpu: Prepare xfd_err in struct fpu_guestJing Liu2022-01-141-0/+5
| * kvm: x86: Add emulation for IA32_XFDJing Liu2022-01-141-0/+27
| * x86/fpu: Provide fpu_update_guest_xfd() for IA32_XFD emulationKevin Tian2022-01-142-0/+18
| * kvm: x86: Enable dynamic xfeatures at KVM_SET_CPUID2Jing Liu2022-01-141-13/+29
| * x86/fpu: Provide fpu_enable_guest_xfd_features() for KVMSean Christopherson2022-01-142-0/+23
| * x86/fpu: Add guest support to xfd_enable_feature()Thomas Gleixner2022-01-142-39/+60
| * x86/fpu: Make XFD initialization in __fpstate_reset() a function argumentJing Liu2022-01-141-5/+6
| * kvm: x86: Exclude unpermitted xfeatures at KVM_GET_SUPPORTED_CPUIDJing Liu2022-01-071-3/+6
| * kvm: x86: Fix xstate_required_size() to follow XSTATE alignment ruleJing Liu2022-01-071-1/+5
| * x86/fpu: Prepare guest FPU for dynamically enabled FPU featuresThomas Gleixner2022-01-072-1/+38
| * x86/fpu: Extend fpu_xstate_prctl() with guest permissionsThomas Gleixner2022-01-077-28/+80
| * KVM: SVM: include CR3 in initial VMSA state for SEV-ES guestsMichael Roth2022-01-075-0/+24
| * KVM: VMX: Provide vmread version using asm-goto-with-outputsPeter Zijlstra2022-01-071-0/+27
| * KVM: x86: Fix wall clock writes in Xen shared_info not to mark page dirtyDavid Woodhouse2022-01-073-16/+49
| * KVM: x86/xen: Add KVM_IRQ_ROUTING_XEN_EVTCHN and event channel deliveryDavid Woodhouse2022-01-075-6/+281
| * KVM: x86/xen: Maintain valid mapping of Xen shared_info pageDavid Woodhouse2022-01-072-12/+15
| * KVM: Reinstate gfn_to_pfn_cache with invalidation supportDavid Woodhouse2022-01-071-0/+1
| * x86/kvm: Silence per-cpu pr_info noise about KVM clocks and steal timeDavid Woodhouse2022-01-072-4/+4
| * KVM: x86: Update vPMCs when retiring branch instructionsEric Hankland2022-01-074-26/+39
| * KVM: x86: Update vPMCs when retiring instructionsEric Hankland2022-01-073-0/+64
| * KVM: x86/pmu: Add pmc->intr to refactor kvm_perf_overflow{_intr}()Like Xu2022-01-072-30/+29
| * KVM: x86/pmu: Reuse pmc_perf_hw_id() and drop find_fixed_event()Like Xu2022-01-074-25/+8
| * KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id()Like Xu2022-01-074-17/+11
| * KVM: x86/pmu: Setup pmc->eventsel for fixed PMCsLike Xu2022-01-071-0/+16
| * KVM: x86: avoid out of bounds indices for fixed performance countersPaolo Bonzini2022-01-071-3/+4
| * KVM: VMX: Mark VCPU_EXREG_CR3 dirty when !CR0_PG -> CR0_PG if EPT + !URGLai Jiangshan2022-01-071-0/+7
| * KVM: x86/mmu: Reconstruct shadow page root if the guest PDPTEs is changedLai Jiangshan2022-01-071-0/+7
| * KVM: VMX: Save HOST_CR3 in vmx_set_host_fs_gs()Lai Jiangshan2022-01-073-14/+14
| * Revert "KVM: X86: Update mmu->pdptrs only when it is changed"Paolo Bonzini2022-01-071-6/+3
| * Merge remote-tracking branch 'kvm/master' into HEADPaolo Bonzini2021-12-2110-52/+107
| |\
| * | KVM: Add Makefile.kvm for common files, use it for x86David Woodhouse2021-12-091-6/+1
| * | KVM: Introduce CONFIG_HAVE_KVM_DIRTY_RINGDavid Woodhouse2021-12-091-0/+1
| * | KVM: VMX: Clean up PI pre/post-block WARNsSean Christopherson2021-12-091-12/+23
| * | KVM: nVMX: Ensure vCPU honors event request if posting nested IRQ failsSean Christopherson2021-12-091-0/+19
| * | KVM: x86: add a tracepoint for APICv/AVIC interrupt deliveryMaxim Levitsky2021-12-093-0/+28
| * | KVM: nVMX: Implement Enlightened MSR Bitmap featureVitaly Kuznetsov2021-12-082-0/+16
| * | KVM: nVMX: Track whether changes in L0 require MSR bitmap for L2 to be rebuiltVitaly Kuznetsov2021-12-083-1/+19
| * | KVM: VMX: Introduce vmx_msr_bitmap_l01_changed() helperVitaly Kuznetsov2021-12-081-4/+13
| * | Merge branch 'kvm-on-hv-msrbm-fix' into HEADPaolo Bonzini2021-12-0813-61/+171
| |\ \