summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm
Commit message (Expand)AuthorAgeFilesLines
...
| | * | | KVM: SEV: Add GHCB handling for termination requestsMichael Roth2024-05-071-0/+9
| | * | | KVM: SEV: Add GHCB handling for Hypervisor Feature Support requestsBrijesh Singh2024-05-071-0/+14
| | * | | KVM: SEV: Add support to handle AP reset MSR protocolTom Lendacky2024-05-072-8/+49
| * | | | Merge branch 'kvm-coco-pagefault-prep' into HEADPaolo Bonzini2024-05-105-77/+149
| |\ \ \ \
| | * | | | KVM: x86/mmu: Sanity check that __kvm_faultin_pfn() doesn't create noslot pfnsSean Christopherson2024-05-071-1/+1
| | * | | | KVM: x86/mmu: Initialize kvm_page_fault's pfn and hva to error valuesSean Christopherson2024-05-071-0/+3
| | * | | | KVM: x86/mmu: Set kvm_page_fault.hva to KVM_HVA_ERR_BAD for "no slot" faultsSean Christopherson2024-05-071-0/+1
| | * | | | KVM: x86/mmu: Handle no-slot faults at the beginning of kvm_faultin_pfn()Sean Christopherson2024-05-071-12/+17
| | * | | | KVM: x86/mmu: Move slot checks from __kvm_faultin_pfn() to kvm_faultin_pfn()Sean Christopherson2024-05-071-43/+44
| | * | | | KVM: x86/mmu: Explicitly disallow private accesses to emulated MMIOSean Christopherson2024-05-071-0/+5
| | * | | | KVM: x86/mmu: Don't force emulation of L2 accesses to non-APIC internal slotsSean Christopherson2024-05-071-4/+13
| | * | | | KVM: x86/mmu: Move private vs. shared check above slot validity checksSean Christopherson2024-05-071-5/+15
| | * | | | KVM: x86/mmu: WARN and skip MMIO cache on private, reserved page faultsSean Christopherson2024-05-071-0/+3
| | * | | | KVM: x86/mmu: check for invalid async page faults involving private memoryPaolo Bonzini2024-05-071-7/+11
| | * | | | KVM: x86/mmu: Use synthetic page fault error code to indicate private faultsSean Christopherson2024-05-072-1/+15
| | * | | | KVM: x86/mmu: WARN if upper 32 bits of legacy #PF error code are non-zeroSean Christopherson2024-05-071-0/+7
| | * | | | KVM: x86/mmu: Pass full 64-bit error code when handling page faultsIsaku Yamahata2024-05-073-5/+4
| | * | | | KVM: x86: Move synthetic PFERR_* sanity checks to SVM's #NPF handlerSean Christopherson2024-05-072-11/+12
| | * | | | KVM: x86: Remove separate "bit" defines for page fault error code masksSean Christopherson2024-05-071-3/+2
| | * | | | KVM: x86/mmu: Exit to userspace with -EFAULT if private fault hits emulationSean Christopherson2024-05-072-8/+19
| | |/ / /
| * | | | Merge branch 'kvm-vmx-ve' into HEADPaolo Bonzini2024-05-109-41/+137
| |\ \ \ \
| | * | | | KVM: VMX: Introduce test mode related to EPT violation VEIsaku Yamahata2024-04-194-4/+73
| | * | | | KVM, x86: add architectural support code for #VEPaolo Bonzini2024-04-191-0/+4
| | * | | | KVM: x86/mmu: Track shadow MMIO value on a per-VM basisSean Christopherson2024-04-194-10/+11
| | * | | | KVM: x86/mmu: Add Suppress VE bit to EPT shadow_mmio_mask/shadow_present_maskIsaku Yamahata2024-04-191-2/+4
| | * | | | KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTESean Christopherson2024-04-193-14/+28
| | * | | | KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTESean Christopherson2024-04-194-13/+19
| | |/ / /
| * | | | KVM: x86: Explicitly zero kvm_caps during vendor module loadSean Christopherson2024-05-071-0/+7
| * | | | KVM: x86: Fully re-initialize supported_mce_cap on vendor module loadSean Christopherson2024-05-071-3/+2
| * | | | KVM: x86: Fully re-initialize supported_vm_types on vendor module loadSean Christopherson2024-05-071-1/+2
| |/ / /
| * | | Merge x86 bugfixes from Linux 6.9-rc3Paolo Bonzini2024-04-193-1/+4
| |\ \ \ | | | |/ | | |/|
| * | | KVM: SEV: use u64_to_user_ptr throughoutPaolo Bonzini2024-04-121-22/+22
| * | | KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argumentSean Christopherson2024-04-121-9/+7
| * | | KVM: VMX: Move out vmx_x86_ops to 'main.c' to dispatch VMX and TDXPaolo Bonzini2024-04-124-270/+391
| * | | KVM: x86: Split core of hypercall emulation to helper functionSean Christopherson2024-04-121-18/+38
| * | | Merge branch 'kvm-sev-init2' into HEADPaolo Bonzini2024-04-127-129/+318
| |\ \ \
| | * | | KVM: SEV: allow SEV-ES DebugSwap againPaolo Bonzini2024-04-111-1/+1
| | * | | KVM: SEV: introduce KVM_SEV_INIT2 operationPaolo Bonzini2024-04-111-7/+46
| | * | | KVM: SEV: sync FPU and AVX state at LAUNCH_UPDATE_VMSA timePaolo Bonzini2024-04-112-8/+50
| | * | | KVM: SEV: define VM types for SEV and SEV-ESPaolo Bonzini2024-04-113-3/+25
| | * | | KVM: SEV: introduce to_kvm_sev_infoPaolo Bonzini2024-04-112-2/+7
| | * | | KVM: x86: Add supported_vm_types to kvm_capsPaolo Bonzini2024-04-112-6/+8
| | * | | KVM: x86: add fields to struct kvm_arch for CoCo featuresPaolo Bonzini2024-04-111-19/+74
| | * | | KVM: SEV: store VMSA features in kvm_sev_infoPaolo Bonzini2024-04-113-10/+24
| | * | | KVM: SEV: publish supported VMSA featuresPaolo Bonzini2024-04-113-2/+25
| | * | | KVM: introduce new vendor op for KVM_GET_DEVICE_ATTRPaolo Bonzini2024-04-111-14/+24
| | * | | KVM: x86: use u64_to_user_ptr()Paolo Bonzini2024-04-111-21/+3
| | * | | KVM: SVM: Compile sev.c if and only if CONFIG_KVM_AMD_SEV=yPaolo Bonzini2024-04-114-43/+38
| | * | | KVM: SVM: Invert handling of SEV and SEV_ES feature flagsSean Christopherson2024-04-112-5/+5
| * | | | KVM: delete .change_pte MMU notifier callbackPaolo Bonzini2024-04-115-125/+7
| |/ / /