You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
…d 'pmu'
* generic:
kvm/eventfd: use list_for_each_entry when deassign ioeventfd
KVM: destruct kvm_io_device while unregistering it from kvm_io_bus
KVM: Clean up kvm_vm_ioctl_create_vcpu()
KVM: Fix comment for KVM_ENABLE_CAP
KVM: Don't kfree(NULL) on kzalloc() failure in kvm_assign_ioeventfd_idx()
KVM: allow KVM_BUG/KVM_BUG_ON to handle 64-bit cond
KVM: Protect vcpu->pid dereference via debugfs with RCU
* misc:
Documentation/process: Add a maintainer handbook for KVM x86
Documentation/process: Add a label for the tip tree handbook's coding style
KVM: x86: Remove PRIx* definitions as they are solely for user space
KVM: x86: Update comments about MSR lists exposed to userspace
KVM: x86: Clean up: remove redundant bool conversions
KVM: x86: Use cpu_feature_enabled() for PKU instead of #ifdef
KVM: x86: Correct the name for skipping VMENTER l1d flush
KVM: x86: Fix a typo in Documentation/virt/kvm/x86/mmu.rst
KVM: selftests: Extend cpuid_test to verify KVM_GET_CPUID2 "nent" updates
KVM: x86: Update number of entries for KVM_GET_CPUID2 on success, not failure
KVM: x86: Fix poll command
KVM: x86: Move common handling of PAT MSR writes to kvm_set_msr_common()
KVM: x86: Make kvm_mtrr_valid() static now that there are no external users
KVM: x86: Move PAT MSR handling out of mtrr.c
KVM: x86: Use MTRR macros to define possible MTRR MSR ranges
KVM: x86: Add helper to get variable MTRR range from MSR index
KVM: x86: Add helper to query if variable MTRR MSR is base (versus mask)
KVM: SVM: Use kvm_pat_valid() directly instead of kvm_mtrr_valid()
KVM: VMX: Open code writing vCPU's PAT in VMX's MSR handler
* mmu:
KVM: x86/mmu: Add "never" option to allow sticky disabling of nx_huge_pages
KVM: x86/mmu: Assert on @mmu in the __kvm_mmu_invalidate_addr()
KVM: x86/mmu: Add comment on try_cmpxchg64 usage in tdp_mmu_set_spte_atomic
* selftests:
KVM: selftests: Add new CFLAGS to generate dependency files
KVM: selftests: Allow specify physical cpu list in demand paging test
KVM: selftests: Add dirty logging page splitting test
KVM: selftests: Move dirty logging functions to memstress.(c|h)
KVM: selftests: touch all pages of args on each memstress iteration
KVM: selftests: Allow dumping per-vcpu info for uffd threads
KVM: selftests: Setup vcpu_alias only for minor mode test
KVM: selftests: Fix spelling mistake "miliseconds" -> "milliseconds"
KVM: selftests: Refactor stable TSC check to use TEST_REQUIRE()
* svm:
KVM: SVM: WARN, but continue, if misc_cg_set_capacity() fails
KVM: SVM: enhance info printk's in SEV init
KVM: SVM: Invoke trace_kvm_exit() for fastpath VM-Exits
KVM: SVM: Remove TSS reloading code after VMEXIT
* vmx:
KVM: x86/mmu: Trigger APIC-access page reload iff vendor code cares
KVM: x86: Use standard mmu_notifier invalidate hooks for APIC access page
KVM: VMX: Retry APIC-access page reload if invalidation is in-progress
KVM: VMX: Inject #GP, not #UD, if SGX2 ENCLS leafs are unsupported
KVM: VMX: Inject #GP on ENCLS if vCPU has paging disabled (CR0.PG==0)
KVM: VMX: restore vmx_vmexit alignment
KVM: x86/pmu: Remove redundant check for MSR_IA32_DS_AREA set handler
KVM: VMX: Use proper accessor to read guest CR4 in handle_desc()
KVM: VMX: Treat UMIP as emulated if and only if the host doesn't have UMIP
KVM: VMX: Move the comment of CR4.MCE handling right above the code
KVM: VMX: Use kvm_read_cr4() to get cr4 value
* pmu:
KVM: x86/cpuid: Add AMD CPUID ExtPerfMonAndDbg leaf 0x80000022
KVM: x86/svm/pmu: Add AMD PerfMonV2 support
KVM: x86/cpuid: Add a KVM-only leaf to redirect AMD PerfMonV2 flag
KVM: x86/pmu: Constrain the num of guest counters with kvm_pmu_cap
KVM: x86/pmu: Advertise PERFCTR_CORE iff the min nr of counters is met
KVM: x86/pmu: Disable vPMU if the minimum num of counters isn't met
KVM: x86: Explicitly zero cpuid "0xa" leaf when PMU is disabled
KVM: x86/pmu: Provide Intel PMU's pmc_is_enabled() as generic x86 code
KVM: x86/pmu: Move handling PERF_GLOBAL_CTRL and friends to common x86
KVM: x86/pmu: Reject userspace attempts to set reserved GLOBAL_STATUS bits
KVM: x86/pmu: Move reprogram_counters() to pmu.h
KVM: x86/pmu: Rename global_ovf_ctrl_mask to global_status_mask