summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm
Commit message (Expand)AuthorAgeFilesLines
* KVM: x86: lapic: don't touch irr_pending in kvm_apic_update_apicv when inhibi...Maxim Levitsky2022-02-081-1/+6
* KVM: x86: nSVM: deal with L1 hypervisor that intercepts interrupts but lets L...Maxim Levitsky2022-02-081-4/+13
* KVM: x86: nSVM: expose clean bit support to the guestMaxim Levitsky2022-02-081-0/+1
* KVM: x86: nSVM/nVMX: set nested_run_pending on VM entry which is a result of RSMMaxim Levitsky2022-02-082-0/+6
* KVM: x86: nSVM: mark vmcb01 as dirty when restoring SMM saved stateMaxim Levitsky2022-02-081-0/+2
* KVM: x86: nSVM: fix potential NULL derefernce on nested migrationMaxim Levitsky2022-02-081-12/+14
* KVM: x86: SVM: don't passthrough SMAP/SMEP/PKE bits in !NPT && !gCR0.PG caseMaxim Levitsky2022-02-081-2/+10
* Revert "svm: Add warning message for AVIC IPI invalid target"Sean Christopherson2022-02-081-2/+0
* Merge tag 'kvmarm-fixes-5.17-2' of git://git.kernel.org/pub/scm/linux/kernel/...Paolo Bonzini2022-02-0511-85/+71
|\
| * Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2022-01-2816-186/+416
| |\
| * \ Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2022-01-2219-521/+662
| |\ \
| * \ \ Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2022-01-1646-766/+1705
| |\ \ \
| * \ \ \ Merge tag 'x86_core_for_v5.17_rc1' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2022-01-124-30/+20
| |\ \ \ \
| | * | | | x86/vmx: Remove .fixup usagePeter Zijlstra2021-12-111-9/+7
| | * | | | x86/kvm: Remove .fixup usagePeter Zijlstra2021-12-111-12/+4
| | * | | | x86: Prepare inline-asm for straight-line-speculationPeter Zijlstra2021-12-081-2/+2
| | * | | | x86: Prepare asm files for straight-line-speculationPeter Zijlstra2021-12-082-9/+9
| * | | | | Merge tag 'perf_core_for_v5.17_rc1' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds2022-01-126-55/+50
| |\ \ \ \ \
| | * | | | | KVM: x86: Move Intel Processor Trace interrupt handler to vmx.cSean Christopherson2021-11-172-20/+22
| | * | | | | KVM: Move x86's perf guest info callbacks to generic KVMSean Christopherson2021-11-171-42/+11
| | * | | | | KVM: x86: More precisely identify NMI from guest when handling PMISean Christopherson2021-11-174-6/+15
| | * | | | | KVM: x86: Drop current_vcpu for kvm_running_vcpu + kvm_arch_vcpu variableSean Christopherson2021-11-173-14/+19
| | * | | | | perf: Force architectures to opt-in to guest callbacksSean Christopherson2021-11-171-0/+1
| | * | | | | perf/core: Rework guest callbacks to prepare for static_call supportLike Xu2021-11-172-19/+23
| | * | | | | KVM: x86: Register Processor Trace interrupt hook iff PT enabled in guestSean Christopherson2021-11-172-1/+5
| | * | | | | KVM: x86: Register perf callbacks after calling vendor's hardware_setup()Sean Christopherson2021-11-171-3/+4
| * | | | | | Merge tag 'x86_misc_for_v5.17_rc1' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2022-01-101-0/+1
| |\ \ \ \ \ \
| | * | | | | | x86/mtrr: Remove the mtrr_bp_init() stubChristoph Hellwig2021-12-221-0/+1
* | | | | | | | KVM: x86: Use ERR_PTR_USR() to return -EFAULT as a __user pointerSean Christopherson2022-02-041-3/+3
* | | | | | | | KVM: x86: Report deprecated x87 features in supported CPUIDJim Mattson2022-02-041-6/+7
* | | | | | | | kvm/x86: rework guest entry logicMark Rutland2022-02-014-50/+7
* | | | | | | | KVM: x86: Move delivery of non-APICv interrupt into vendor codeSean Christopherson2022-02-013-10/+34
| |_|_|_|_|_|/ |/| | | | | |
* | | | | | | KVM: nVMX: Allow VMREAD when Enlightened VMCS is in useVitaly Kuznetsov2022-01-282-16/+51
* | | | | | | KVM: nVMX: Implement evmcs_field_offset() suitable for handle_vmread()Vitaly Kuznetsov2022-01-282-10/+25
* | | | | | | KVM: nVMX: Rename vmcs_to_field_offset{,_table}Vitaly Kuznetsov2022-01-283-8/+8
* | | | | | | KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMERVitaly Kuznetsov2022-01-281-1/+3
* | | | | | | KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCSVitaly Kuznetsov2022-01-281-0/+1
* | | | | | | KVM: x86: add system attribute to retrieve full set of supported xsave statesPaolo Bonzini2022-01-281-0/+51
* | | | | | | KVM: x86: Add a helper to retrieve userspace address from kvm_device_attrSean Christopherson2022-01-281-6/+14
* | | | | | | KVM: x86: Sync the states size with the XCR0/IA32_XSS at, any timeLike Xu2022-01-261-2/+2
* | | | | | | KVM: x86: Update vCPU's runtime CPUID on write to MSR_IA32_XSSLike Xu2022-01-261-0/+1
* | | | | | | KVM: x86: Keep MSR_IA32_XSS unchanged for INITXiaoyao Li2022-01-261-2/+1
* | | | | | | KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2}Sean Christopherson2022-01-261-2/+8
* | | | | | | KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02Sean Christopherson2022-01-261-10/+12
* | | | | | | KVM: x86: Check .flags in kvm_cpuid_check_equal() tooVitaly Kuznetsov2022-01-261-0/+1
* | | | | | | KVM: x86: Forcibly leave nested virt when SMM state is toggledSean Christopherson2022-01-265-7/+11
* | | | | | | KVM: SVM: drop unnecessary code in svm_hv_vmcb_dirty_nested_enlightenments()Vitaly Kuznetsov2022-01-262-13/+1
* | | | | | | KVM: SVM: hyper-v: Enable Enlightened MSR-Bitmap support for realVitaly Kuznetsov2022-01-261-0/+3
* | | | | | | KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermodeSean Christopherson2022-01-261-1/+15
* | | | | | | KVM: SVM: Don't apply SEV+SMAP workaround on code fetch or PT accessSean Christopherson2022-01-261-9/+34