summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/svm
Commit message (Expand)AuthorAgeFilesLines
* x86: KVM: SVM: add support for Invalid IPI Vector interceptionMaxim Levitsky2023-10-121-1/+4
* x86: KVM: SVM: always update the x2avic msr interceptionMaxim Levitsky2023-10-121-2/+1
* KVM: SVM: Do not use user return MSR support for virtualized TSC_AUXTom Lendacky2023-09-231-1/+33
* KVM: SVM: Fix TSC_AUX virtualization setupTom Lendacky2023-09-233-12/+29
* KVM: SVM: INTERCEPT_RDTSCP is never intercepted anywayPaolo Bonzini2023-09-231-4/+1
* Merge tag 'kvm-x86-misc-6.6' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2023-08-313-84/+141
|\
| * KVM: nSVM: Use KVM-governed feature framework to track "vNMI enabled"Sean Christopherson2023-08-172-6/+2
| * KVM: nSVM: Use KVM-governed feature framework to track "vGIF enabled"Sean Christopherson2023-08-173-5/+6
| * KVM: nSVM: Use KVM-governed feature framework to track "Pause Filter enabled"Sean Christopherson2023-08-173-9/+10
| * KVM: nSVM: Use KVM-governed feature framework to track "LBRv enabled"Sean Christopherson2023-08-173-14/+15
| * KVM: nSVM: Use KVM-governed feature framework to track "vVM{SAVE,LOAD} enabled"Sean Christopherson2023-08-173-5/+8
| * KVM: nSVM: Use KVM-governed feature framework to track "TSC scaling enabled"Sean Christopherson2023-08-173-6/+7
| * KVM: nSVM: Use KVM-governed feature framework to track "NRIPS enabled"Sean Christopherson2023-08-173-7/+4
| * KVM: x86: Use KVM-governed feature framework to track "XSAVES enabled"Sean Christopherson2023-08-171-3/+14
| * KVM: nSVM: Skip writes to MSR_AMD64_TSC_RATIO if guest state isn't loadedSean Christopherson2023-08-031-1/+2
| * KVM: x86: Always write vCPU's current TSC offset/ratio in vendor hooksSean Christopherson2023-08-033-7/+7
| * KVM: SVM: Clean up preemption toggling related to MSR_AMD64_TSC_RATIOSean Christopherson2023-08-031-5/+3
| * KVM: nSVM: Use the "outer" helper for writing multiplier to MSR_AMD64_TSC_RATIOSean Christopherson2023-08-033-6/+5
| * KVM: nSVM: Load L1's TSC multiplier based on L1 state, not L2 stateSean Christopherson2023-08-031-2/+2
| * KVM: nSVM: Check instead of asserting on nested TSC scaling supportSean Christopherson2023-08-031-3/+2
| * KVM: SVM: Use "standard" stgi() helper when disabling SVMSean Christopherson2023-08-031-10/+3
| * KVM: x86: Force kvm_rebooting=true during emergency reboot/crashSean Christopherson2023-08-031-0/+2
| * x86/virt: KVM: Move "disable SVM" helper into KVM SVMSean Christopherson2023-08-031-4/+25
| * KVM: SVM: Check that the current CPU supports SVM in kvm_is_svm_supported()Sean Christopherson2023-08-031-6/+19
| * x86/virt: KVM: Open code cpu_has_svm() into kvm_is_svm_supported()Sean Christopherson2023-08-031-3/+8
| * x86/reboot: KVM: Disable SVM during reboot via virt/KVM reboot callbackSean Christopherson2023-08-031-2/+17
* | Merge tag 'kvm-x86-svm-6.6' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2023-08-314-134/+247
|\ \
| * | KVM: SVM: Require nrips support for SEV guests (and beyond)Sean Christopherson2023-08-253-8/+6
| * | KVM: SVM: Don't inject #UD if KVM attempts to skip SEV guest insnSean Christopherson2023-08-251-8/+27
| * | KVM: SVM: Skip VMSA init in sev_es_init_vmcb() if pointer is NULLSean Christopherson2023-08-251-2/+5
| * | KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migrationSean Christopherson2023-08-251-1/+1
| * | KVM: SVM: Set target pCPU during IRTE update if target vCPU is runningSean Christopherson2023-08-171-0/+28
| * | KVM: SVM: Take and hold ir_list_lock when updating vCPU's Physical ID entrySean Christopherson2023-08-171-8/+23
| * | KVM: SVM: Use svm_get_lbr_vmcb() helper to handle writes to DEBUGCTLSean Christopherson2023-08-021-6/+1
| * | KVM: SVM: Clean up handling of LBR virtualization enabledSean Christopherson2023-08-021-9/+4
| * | KVM: SVM: Fix dead KVM_BUG() code in LBR MSR virtualizationSean Christopherson2023-08-021-29/+16
| * | KVM: SVM: Don't try to pointlessly single-step SEV-ES guests for NMI windowSean Christopherson2023-07-281-0/+13
| * | KVM: SVM: Don't defer NMI unblocking until next exit for SEV-ES guestsSean Christopherson2023-07-282-6/+9
| * | KVM: SEV-ES: Eliminate #DB intercept when DebugSwap enabledAlexey Kardashevskiy2023-07-281-0/+11
| * | KVM: SEV: Enable data breakpoints in SEV-ESAlexey Kardashevskiy2023-07-281-3/+33
| * | KVM: SVM/SEV/SEV-ES: Rework interceptsAlexey Kardashevskiy2023-07-282-23/+20
| * | KVM: SEV-ES: explicitly disable debugAlexey Kardashevskiy2023-07-282-1/+13
| * | KVM: SVM: Rewrite sev_es_prepare_switch_to_guest()'s comment about swap typesSean Christopherson2023-07-281-10/+15
| * | KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEVAlexey Kardashevskiy2023-07-282-6/+8
| * | KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the headerAlexey Kardashevskiy2023-07-282-42/+42
| |/
* | x86/cpu/kvm: Provide UNTRAIN_RET_VMPeter Zijlstra2023-08-161-5/+2
* | x86/CPU/AMD: Fix the DIV(0) initial fix attemptBorislav Petkov (AMD)2023-08-141-0/+2
* | Merge tag 'x86_bugs_srso' of git://git.kernel.org/pub/scm/linux/kernel/git/ti...Linus Torvalds2023-08-072-1/+6
|\ \
| * | x86/srso: Add IBPB on VMEXITBorislav Petkov (AMD)2023-07-272-1/+6
| |/
* | KVM: SEV: remove ghcb variable declarationsPaolo Bonzini2023-08-041-18/+12