summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/vmx.c
Commit message (Expand)AuthorAgeFilesLines
* Merge branch 'speck-v20' of git://git.kernel.org/pub/scm/linux/kernel/git/tip...Linus Torvalds2018-05-211-12/+19
|\
| * KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBDTom Lendacky2018-05-171-3/+15
| * x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRLThomas Gleixner2018-05-171-2/+2
| * x86/speculation: Use synthetic bits for IBRS/IBPB/STIBPBorislav Petkov2018-05-171-7/+2
| * x86/bugs: Rename _RDS to _SSBDKonrad Rzeszutek Wilk2018-05-091-3/+3
| * x86/speculation: Create spec-ctrl.h to avoid include hellThomas Gleixner2018-05-031-1/+1
| * x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guestKonrad Rzeszutek Wilk2018-05-031-3/+5
| * x86/bugs, KVM: Support the combination of guest and host IBRSKonrad Rzeszutek Wilk2018-05-031-4/+2
* | KVM: vmx: update sec exec controls for UMIP iff emulating UMIPSean Christopherson2018-05-111-13/+15
|/
* kvm: apic: Flush TLB after APIC mode/address change if VPIDs are in useJunaid Shahid2018-04-271-10/+4
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2018-04-161-40/+55
|\
| * kvm: x86: move MSR_IA32_TSC handling to x86.cPaolo Bonzini2018-04-161-20/+0
| * X86/KVM: Properly update 'tsc_offset' to represent the running guestKarimAllah Ahmed2018-04-161-19/+35
| * x86: Add check for APIC access address for vmentry of L2 guestsKrish Sadhukhan2018-04-121-0/+13
| * KVM: X86: fix incorrect reference of trace_kvm_pi_irte_updatehu huajun2018-04-111-1/+1
| * X86/VMX: Disable VMX preemption timer if MWAIT is not interceptedKarimAllah Ahmed2018-04-101-4/+10
* | Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2018-04-091-354/+737
|\|
| * kvm: x86: fix a prototype warningPeng Hao2018-04-061-1/+1
| * KVM: X86: Introduce handle_ud()Wanpeng Li2018-04-041-8/+2
| * KVM: vmx: unify adjacent #ifdefsPaolo Bonzini2018-04-041-7/+3
| * x86: kvm: hide the unused 'cpu' variableArnd Bergmann2018-04-041-0/+2
| * KVM: VMX: remove bogus WARN_ON in handle_ept_misconfigSean Christopherson2018-04-041-12/+1
| * KVM: VMX: raise internal error for exception during invalid protected mode stateSean Christopherson2018-04-041-6/+14
| * KVM: nVMX: Optimization: Dont set KVM_REQ_EVENT when VMExit with nested_run_p...Liran Alon2018-03-281-8/+0
| * KVM: x86: Rename interrupt.pending to interrupt.injectedLiran Alon2018-03-281-1/+1
| * x86/kvm: use Enlightened VMCS when running on Hyper-VVitaly Kuznetsov2018-03-281-10/+291
| * KVM: VMX: Bring the common code to header fileBabu Moger2018-03-281-42/+9
| * KVM: VMX: Remove ple_window_actual_maxBabu Moger2018-03-281-25/+6
| * KVM: VMX: Fix the module parameters for vmxBabu Moger2018-03-281-13/+14
| * KVM: x86: Fix perf timer mode IP reportingAndi Kleen2018-03-281-2/+2
| * KVM: VMX: add struct kvm_vmx to hold VMX specific KVM varsSean Christopherson2018-03-231-15/+31
| * KVM: x86: move setting of ept_identity_map_addr to vmx.cSean Christopherson2018-03-231-0/+7
| * KVM: x86: define SVM/VMX specific kvm_arch_[alloc|free]_vmSean Christopherson2018-03-231-0/+12
| * KVM: nVMX: fix vmentry failure code when L2 state would require emulationPaolo Bonzini2018-03-211-1/+3
| * x86/kvm/vmx: avoid expensive rdmsr for MSR_GS_BASEVitaly Kuznetsov2018-03-161-1/+2
| * x86/kvm/vmx: read MSR_{FS,KERNEL_GS}_BASE from current->threadVitaly Kuznetsov2018-03-161-3/+10
| * KVM: X86: Provide a capability to disable PAUSE interceptsWanpeng Li2018-03-161-4/+13
| * KVM: X86: Provide a capability to disable HLT interceptsWanpeng Li2018-03-161-0/+24
| * KVM: X86: Provide a capability to disable MWAIT interceptsWanpeng Li2018-03-161-4/+5
| * KVM: x86: VMX: Intercept #GP to support access to VMware backdoor portsLiran Alon2018-03-161-0/+24
| * KVM: x86: add kvm_fast_pio() to consolidate fast PIO codeSean Christopherson2018-03-161-11/+2
| * KVM: VMX: use kvm_fast_pio_in for handling IN I/OSean Christopherson2018-03-161-3/+6
| * KVM: vVMX: signal failure for nested VMEntry if emulation_requiredSean Christopherson2018-03-161-0/+15
| * KVM: VMX: WARN on a MOV CR3 exit w/ unrestricted guestSean Christopherson2018-03-161-0/+2
| * KVM: VMX: give unrestricted guest full control of CR3Sean Christopherson2018-03-161-2/+2
| * KVM: VMX: don't force CR4.PAE/PSE for unrestricted guestSean Christopherson2018-03-161-14/+22
| * KVM: VMX: remove CR0.WP from ..._ALWAYS_ON_UNRESTRICTED_GUESTSean Christopherson2018-03-161-3/+4
| * KVM: VMX: don't configure EPT identity map for unrestricted guestSean Christopherson2018-03-161-2/+3
| * KVM: VMX: don't configure RM TSS for unrestricted guestSean Christopherson2018-03-161-0/+3
| * KVM: nVMX: Enforce NMI controls on vmentry of L2 guestsKrish Sadhukhan2018-03-081-2/+27