summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm
Commit message (Expand)AuthorAgeFilesLines
* KVM: x86/mmu: Don't save mmu_invalidate_seq after checking private attrTao Su13 days1-3/+0
* Merge branch 'kvm-fixes-6.10-1' into HEADPaolo Bonzini2024-06-0313-68/+159
|\
| * KVM: x86: Drop support for hand tuning APIC timer advancement from userspaceSean Christopherson2024-06-033-29/+23
| * KVM: SEV-ES: Delegate LBR virtualization to the processorRavi Bangoria2024-06-033-7/+17
| * KVM: SEV-ES: Disallow SEV-ES guests when X86_FEATURE_LBRV is absentRavi Bangoria2024-06-033-9/+14
| * KVM: SEV-ES: Prevent MSR access post VMSA encryptionNikunj A Dadhania2024-06-031-0/+18
| * KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright maskedSean Christopherson2024-05-231-8/+19
| * KVM: x86: Force KVM_WERROR if the global WERROR is enabledSean Christopherson2024-05-231-1/+2
| * KVM: x86: Disable KVM_INTEL_PROVE_VE by defaultSean Christopherson2024-05-231-3/+5
| * KVM: x86/mmu: Print SPTEs on unexpected #VESean Christopherson2024-05-232-8/+37
| * KVM: VMX: Dump VMCS on unexpected #VESean Christopherson2024-05-231-1/+3
| * KVM: x86/mmu: Add sanity checks that KVM doesn't create EPT #VE SPTEsSean Christopherson2024-05-233-0/+14
| * KVM: nVMX: Always handle #VEs in L0 (never forward #VEs from L2 to L1)Sean Christopherson2024-05-231-0/+2
| * KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE supportSean Christopherson2024-05-231-0/+3
| * KVM: VMX: Don't kill the VM on an unexpected #VESean Christopherson2024-05-231-2/+2
| * KVM: x86/mmu: Use SHADOW_NONPRESENT_VALUE for atomic zap in TDP MMUIsaku Yamahata2024-05-231-1/+1
* | tracing/treewide: Remove second parameter of __assign_str()Steven Rostedt (Google)2024-05-221-1/+1
* | Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2024-05-1526-776/+1333
|\|
| * Merge tag 'kvm-x86-misc-6.10' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2024-05-126-30/+52
| |\
| | * KVM: x86: Remove VT-d mention in posted interrupt tracepointAlejandro Jimenez2024-05-021-2/+2
| | * KVM: x86: Only set APICV_INHIBIT_REASON_ABSENT if APICv is enabledAlejandro Jimenez2024-05-021-7/+4
| | * KVM: x86: Allow, don't ignore, same-value writes to immutable MSRsSean Christopherson2024-05-021-7/+4
| | * KVM: Use vfree for memory allocated by vcalloc()/__vcalloc()Li RongQing2024-04-092-4/+4
| | * KVM: x86: Advertise max mappable GPA in CPUID.0x80000008.GuestPhysBitsGerd Hoffmann2024-04-093-3/+32
| | * KVM: x86: Don't advertise guest.MAXPHYADDR as host.MAXPHYADDR in CPUIDGerd Hoffmann2024-04-091-11/+10
| * | Merge tag 'kvm-x86-mmu-6.10' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2024-05-122-29/+66
| |\ \
| | * | KVM: x86/mmu: Fix a largely theoretical race in kvm_mmu_track_write()Sean Christopherson2024-05-021-3/+17
| | * | KVM: x86/mmu: Process atomically-zapped SPTEs after TLB flushDavid Matlack2024-04-091-26/+49
| | |/
| * | Merge tag 'kvm-x86-vmx-6.10' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2024-05-124-13/+34
| |\ \
| | * | KVM: nVMX: Add a sanity check that nested PML Full stems from EPT ViolationsSean Christopherson2024-04-091-0/+10
| | * | KVM: x86: Move nEPT exit_qualification field from kvm_vcpu_arch to x86_exceptionSean Christopherson2024-04-094-11/+20
| | * | KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT MisconfigSean Christopherson2024-04-091-2/+4
| | |/
| * | Merge tag 'loongarch-kvm-6.10' of git://git.kernel.org/pub/scm/linux/kernel/g...Paolo Bonzini2024-05-1017-115/+159
| |\ \
| * \ \ Merge branch 'kvm-sev-es-ghcbv2' into HEADPaolo Bonzini2024-05-102-11/+102
| |\ \ \
| | * | | KVM: SEV: Allow per-guest configuration of GHCB protocol versionMichael Roth2024-05-072-3/+30
| | * | | KVM: SEV: Add GHCB handling for termination requestsMichael Roth2024-05-071-0/+9
| | * | | KVM: SEV: Add GHCB handling for Hypervisor Feature Support requestsBrijesh Singh2024-05-071-0/+14
| | * | | KVM: SEV: Add support to handle AP reset MSR protocolTom Lendacky2024-05-072-8/+49
| * | | | Merge branch 'kvm-coco-pagefault-prep' into HEADPaolo Bonzini2024-05-105-77/+149
| |\ \ \ \
| | * | | | KVM: x86/mmu: Sanity check that __kvm_faultin_pfn() doesn't create noslot pfnsSean Christopherson2024-05-071-1/+1
| | * | | | KVM: x86/mmu: Initialize kvm_page_fault's pfn and hva to error valuesSean Christopherson2024-05-071-0/+3
| | * | | | KVM: x86/mmu: Set kvm_page_fault.hva to KVM_HVA_ERR_BAD for "no slot" faultsSean Christopherson2024-05-071-0/+1
| | * | | | KVM: x86/mmu: Handle no-slot faults at the beginning of kvm_faultin_pfn()Sean Christopherson2024-05-071-12/+17
| | * | | | KVM: x86/mmu: Move slot checks from __kvm_faultin_pfn() to kvm_faultin_pfn()Sean Christopherson2024-05-071-43/+44
| | * | | | KVM: x86/mmu: Explicitly disallow private accesses to emulated MMIOSean Christopherson2024-05-071-0/+5
| | * | | | KVM: x86/mmu: Don't force emulation of L2 accesses to non-APIC internal slotsSean Christopherson2024-05-071-4/+13
| | * | | | KVM: x86/mmu: Move private vs. shared check above slot validity checksSean Christopherson2024-05-071-5/+15
| | * | | | KVM: x86/mmu: WARN and skip MMIO cache on private, reserved page faultsSean Christopherson2024-05-071-0/+3
| | * | | | KVM: x86/mmu: check for invalid async page faults involving private memoryPaolo Bonzini2024-05-071-7/+11
| | * | | | KVM: x86/mmu: Use synthetic page fault error code to indicate private faultsSean Christopherson2024-05-072-1/+15