| Commit message (Expand) | Author | Age | Files | Lines |
* | KVM: x86: Re-split x2APIC ICR into ICR+ICR2 for AMD (x2AVIC) | Sean Christopherson | 2024-10-04 | 3 | -12/+34 |
* | KVM: x86: Make x2APIC ID 100% readonly | Sean Christopherson | 2024-10-04 | 1 | -7/+15 |
* | KVM: x86: Drop unused check_apicv_inhibit_reasons() callback definition | Hou Wenlong | 2024-10-04 | 1 | -1/+0 |
* | KVM: x86: Move x2APIC ICR helper above kvm_apic_write_nodecode() | Sean Christopherson | 2024-10-04 | 1 | -23/+23 |
* | KVM: x86: Enforce x2APIC's must-be-zero reserved ICR bits | Sean Christopherson | 2024-10-04 | 1 | -1/+14 |
* | KVM: SVM: Don't advertise Bus Lock Detect to guest if SVM support is missing | Ravi Bangoria | 2024-09-12 | 1 | -0/+3 |
* | KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE | Maxim Levitsky | 2024-09-12 | 1 | -0/+12 |
* | KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU_EVENTS | Sean Christopherson | 2024-09-12 | 1 | -0/+2 |
* | KVM: nVMX: Fold requested virtual interrupt check into has_nested_events() | Sean Christopherson | 2024-08-03 | 5 | -31/+5 |
* | KVM: nVMX: Check for pending posted interrupts when looking for nested events | Sean Christopherson | 2024-08-03 | 1 | -2/+34 |
* | KVM: nVMX: Request immediate exit iff pending nested event needs injection | Sean Christopherson | 2024-08-03 | 2 | -3/+3 |
* | KVM: nVMX: Add a helper to get highest pending from Posted Interrupt vector | Sean Christopherson | 2024-08-03 | 2 | -2/+13 |
* | KVM: VMX: Split out the non-virtualization part of vmx_interrupt_blocked() | Sean Christopherson | 2024-08-03 | 2 | -3/+9 |
* | KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests | Michael Roth | 2024-06-21 | 1 | -2/+2 |
* | KVM: x86: Always sync PIR to IRR prior to scanning I/O APIC routes | Sean Christopherson | 2024-06-20 | 1 | -5/+4 |
* | KVM: x86/mmu: Don't save mmu_invalidate_seq after checking private attr | Tao Su | 2024-06-05 | 1 | -3/+0 |
* | Merge branch 'kvm-fixes-6.10-1' into HEAD | Paolo Bonzini | 2024-06-03 | 13 | -68/+159 |
|\ |
|
| * | KVM: x86: Drop support for hand tuning APIC timer advancement from userspace | Sean Christopherson | 2024-06-03 | 3 | -29/+23 |
| * | KVM: SEV-ES: Delegate LBR virtualization to the processor | Ravi Bangoria | 2024-06-03 | 3 | -7/+17 |
| * | KVM: SEV-ES: Disallow SEV-ES guests when X86_FEATURE_LBRV is absent | Ravi Bangoria | 2024-06-03 | 3 | -9/+14 |
| * | KVM: SEV-ES: Prevent MSR access post VMSA encryption | Nikunj A Dadhania | 2024-06-03 | 1 | -0/+18 |
| * | KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked | Sean Christopherson | 2024-05-23 | 1 | -8/+19 |
| * | KVM: x86: Force KVM_WERROR if the global WERROR is enabled | Sean Christopherson | 2024-05-23 | 1 | -1/+2 |
| * | KVM: x86: Disable KVM_INTEL_PROVE_VE by default | Sean Christopherson | 2024-05-23 | 1 | -3/+5 |
| * | KVM: x86/mmu: Print SPTEs on unexpected #VE | Sean Christopherson | 2024-05-23 | 2 | -8/+37 |
| * | KVM: VMX: Dump VMCS on unexpected #VE | Sean Christopherson | 2024-05-23 | 1 | -1/+3 |
| * | KVM: x86/mmu: Add sanity checks that KVM doesn't create EPT #VE SPTEs | Sean Christopherson | 2024-05-23 | 3 | -0/+14 |
| * | KVM: nVMX: Always handle #VEs in L0 (never forward #VEs from L2 to L1) | Sean Christopherson | 2024-05-23 | 1 | -0/+2 |
| * | KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE support | Sean Christopherson | 2024-05-23 | 1 | -0/+3 |
| * | KVM: VMX: Don't kill the VM on an unexpected #VE | Sean Christopherson | 2024-05-23 | 1 | -2/+2 |
| * | KVM: x86/mmu: Use SHADOW_NONPRESENT_VALUE for atomic zap in TDP MMU | Isaku Yamahata | 2024-05-23 | 1 | -1/+1 |
* | | tracing/treewide: Remove second parameter of __assign_str() | Steven Rostedt (Google) | 2024-05-22 | 1 | -1/+1 |
* | | Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm | Linus Torvalds | 2024-05-15 | 26 | -776/+1333 |
|\| |
|
| * | Merge tag 'kvm-x86-misc-6.10' of https://github.com/kvm-x86/linux into HEAD | Paolo Bonzini | 2024-05-12 | 6 | -30/+52 |
| |\ |
|
| | * | KVM: x86: Remove VT-d mention in posted interrupt tracepoint | Alejandro Jimenez | 2024-05-02 | 1 | -2/+2 |
| | * | KVM: x86: Only set APICV_INHIBIT_REASON_ABSENT if APICv is enabled | Alejandro Jimenez | 2024-05-02 | 1 | -7/+4 |
| | * | KVM: x86: Allow, don't ignore, same-value writes to immutable MSRs | Sean Christopherson | 2024-05-02 | 1 | -7/+4 |
| | * | KVM: Use vfree for memory allocated by vcalloc()/__vcalloc() | Li RongQing | 2024-04-09 | 2 | -4/+4 |
| | * | KVM: x86: Advertise max mappable GPA in CPUID.0x80000008.GuestPhysBits | Gerd Hoffmann | 2024-04-09 | 3 | -3/+32 |
| | * | KVM: x86: Don't advertise guest.MAXPHYADDR as host.MAXPHYADDR in CPUID | Gerd Hoffmann | 2024-04-09 | 1 | -11/+10 |
| * | | Merge tag 'kvm-x86-mmu-6.10' of https://github.com/kvm-x86/linux into HEAD | Paolo Bonzini | 2024-05-12 | 2 | -29/+66 |
| |\ \ |
|
| | * | | KVM: x86/mmu: Fix a largely theoretical race in kvm_mmu_track_write() | Sean Christopherson | 2024-05-02 | 1 | -3/+17 |
| | * | | KVM: x86/mmu: Process atomically-zapped SPTEs after TLB flush | David Matlack | 2024-04-09 | 1 | -26/+49 |
| | |/ |
|
| * | | Merge tag 'kvm-x86-vmx-6.10' of https://github.com/kvm-x86/linux into HEAD | Paolo Bonzini | 2024-05-12 | 4 | -13/+34 |
| |\ \ |
|
| | * | | KVM: nVMX: Add a sanity check that nested PML Full stems from EPT Violations | Sean Christopherson | 2024-04-09 | 1 | -0/+10 |
| | * | | KVM: x86: Move nEPT exit_qualification field from kvm_vcpu_arch to x86_exception | Sean Christopherson | 2024-04-09 | 4 | -11/+20 |
| | * | | KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig | Sean Christopherson | 2024-04-09 | 1 | -2/+4 |
| | |/ |
|
| * | | Merge tag 'loongarch-kvm-6.10' of git://git.kernel.org/pub/scm/linux/kernel/g... | Paolo Bonzini | 2024-05-10 | 17 | -115/+159 |
| |\ \ |
|
| * \ \ | Merge branch 'kvm-sev-es-ghcbv2' into HEAD | Paolo Bonzini | 2024-05-10 | 2 | -11/+102 |
| |\ \ \ |
|
| | * | | | KVM: SEV: Allow per-guest configuration of GHCB protocol version | Michael Roth | 2024-05-07 | 2 | -3/+30 |