1. 15 11月, 2019 18 次提交
  2. 22 10月, 2019 17 次提交
  3. 03 10月, 2019 1 次提交
  4. 01 10月, 2019 1 次提交
    • J
      kvm: vmx: Limit guest PMCs to those supported on the host · e1fba49c
      Jim Mattson 提交于
      KVM can only virtualize as many PMCs as the host supports.
      
      Limit the number of generic counters and fixed counters to the number
      of corresponding counters supported on the host, rather than to
      INTEL_PMC_MAX_GENERIC and INTEL_PMC_MAX_FIXED, respectively.
      
      Note that INTEL_PMC_MAX_GENERIC is currently 32, which exceeds the 18
      contiguous MSR indices reserved by Intel for event selectors. Since
      the existing code relies on a contiguous range of MSR indices for
      event selectors, it can't possibly work for more than 18 general
      purpose counters.
      
      Fixes: f5132b01 ("KVM: Expose a version 2 architectural PMU to a guests")
      Signed-off-by: NJim Mattson <jmattson@google.com>
      Reviewed-by: NMarc Orr <marcorr@google.com>
      Signed-off-by: NPaolo Bonzini <pbonzini@redhat.com>
      e1fba49c
  5. 28 9月, 2019 1 次提交
    • W
      KVM: VMX: Set VMENTER_L1D_FLUSH_NOT_REQUIRED if !X86_BUG_L1TF · 19a36d32
      Waiman Long 提交于
      The l1tf_vmx_mitigation is only set to VMENTER_L1D_FLUSH_NOT_REQUIRED
      when the ARCH_CAPABILITIES MSR indicates that L1D flush is not required.
      However, if the CPU is not affected by L1TF, l1tf_vmx_mitigation will
      still be set to VMENTER_L1D_FLUSH_AUTO. This is certainly not the best
      option for a !X86_BUG_L1TF CPU.
      
      So force l1tf_vmx_mitigation to VMENTER_L1D_FLUSH_NOT_REQUIRED to make it
      more explicit in case users are checking the vmentry_l1d_flush parameter.
      Signed-off-by: NWaiman Long <longman@redhat.com>
      [Patch rewritten accoring to Borislav Petkov's suggestion. - Paolo]
      Signed-off-by: NPaolo Bonzini <pbonzini@redhat.com>
      19a36d32
  6. 26 9月, 2019 1 次提交
  7. 25 9月, 2019 1 次提交