summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm
Commit message (Expand)AuthorAgeFilesLines
* tracing/treewide: Remove second parameter of __assign_str()Steven Rostedt (Google)2024-05-221-1/+1
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2024-05-1526-776/+1333
|\
| * Merge tag 'kvm-x86-misc-6.10' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2024-05-126-30/+52
| |\
| | * KVM: x86: Remove VT-d mention in posted interrupt tracepointAlejandro Jimenez2024-05-021-2/+2
| | * KVM: x86: Only set APICV_INHIBIT_REASON_ABSENT if APICv is enabledAlejandro Jimenez2024-05-021-7/+4
| | * KVM: x86: Allow, don't ignore, same-value writes to immutable MSRsSean Christopherson2024-05-021-7/+4
| | * KVM: Use vfree for memory allocated by vcalloc()/__vcalloc()Li RongQing2024-04-092-4/+4
| | * KVM: x86: Advertise max mappable GPA in CPUID.0x80000008.GuestPhysBitsGerd Hoffmann2024-04-093-3/+32
| | * KVM: x86: Don't advertise guest.MAXPHYADDR as host.MAXPHYADDR in CPUIDGerd Hoffmann2024-04-091-11/+10
| * | Merge tag 'kvm-x86-mmu-6.10' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2024-05-122-29/+66
| |\ \
| | * | KVM: x86/mmu: Fix a largely theoretical race in kvm_mmu_track_write()Sean Christopherson2024-05-021-3/+17
| | * | KVM: x86/mmu: Process atomically-zapped SPTEs after TLB flushDavid Matlack2024-04-091-26/+49
| | |/
| * | Merge tag 'kvm-x86-vmx-6.10' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2024-05-124-13/+34
| |\ \
| | * | KVM: nVMX: Add a sanity check that nested PML Full stems from EPT ViolationsSean Christopherson2024-04-091-0/+10
| | * | KVM: x86: Move nEPT exit_qualification field from kvm_vcpu_arch to x86_exceptionSean Christopherson2024-04-094-11/+20
| | * | KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT MisconfigSean Christopherson2024-04-091-2/+4
| | |/
| * | Merge tag 'loongarch-kvm-6.10' of git://git.kernel.org/pub/scm/linux/kernel/g...Paolo Bonzini2024-05-1017-115/+159
| |\ \
| * \ \ Merge branch 'kvm-sev-es-ghcbv2' into HEADPaolo Bonzini2024-05-102-11/+102
| |\ \ \
| | * | | KVM: SEV: Allow per-guest configuration of GHCB protocol versionMichael Roth2024-05-072-3/+30
| | * | | KVM: SEV: Add GHCB handling for termination requestsMichael Roth2024-05-071-0/+9
| | * | | KVM: SEV: Add GHCB handling for Hypervisor Feature Support requestsBrijesh Singh2024-05-071-0/+14
| | * | | KVM: SEV: Add support to handle AP reset MSR protocolTom Lendacky2024-05-072-8/+49
| * | | | Merge branch 'kvm-coco-pagefault-prep' into HEADPaolo Bonzini2024-05-105-77/+149
| |\ \ \ \
| | * | | | KVM: x86/mmu: Sanity check that __kvm_faultin_pfn() doesn't create noslot pfnsSean Christopherson2024-05-071-1/+1
| | * | | | KVM: x86/mmu: Initialize kvm_page_fault's pfn and hva to error valuesSean Christopherson2024-05-071-0/+3
| | * | | | KVM: x86/mmu: Set kvm_page_fault.hva to KVM_HVA_ERR_BAD for "no slot" faultsSean Christopherson2024-05-071-0/+1
| | * | | | KVM: x86/mmu: Handle no-slot faults at the beginning of kvm_faultin_pfn()Sean Christopherson2024-05-071-12/+17
| | * | | | KVM: x86/mmu: Move slot checks from __kvm_faultin_pfn() to kvm_faultin_pfn()Sean Christopherson2024-05-071-43/+44
| | * | | | KVM: x86/mmu: Explicitly disallow private accesses to emulated MMIOSean Christopherson2024-05-071-0/+5
| | * | | | KVM: x86/mmu: Don't force emulation of L2 accesses to non-APIC internal slotsSean Christopherson2024-05-071-4/+13
| | * | | | KVM: x86/mmu: Move private vs. shared check above slot validity checksSean Christopherson2024-05-071-5/+15
| | * | | | KVM: x86/mmu: WARN and skip MMIO cache on private, reserved page faultsSean Christopherson2024-05-071-0/+3
| | * | | | KVM: x86/mmu: check for invalid async page faults involving private memoryPaolo Bonzini2024-05-071-7/+11
| | * | | | KVM: x86/mmu: Use synthetic page fault error code to indicate private faultsSean Christopherson2024-05-072-1/+15
| | * | | | KVM: x86/mmu: WARN if upper 32 bits of legacy #PF error code are non-zeroSean Christopherson2024-05-071-0/+7
| | * | | | KVM: x86/mmu: Pass full 64-bit error code when handling page faultsIsaku Yamahata2024-05-073-5/+4
| | * | | | KVM: x86: Move synthetic PFERR_* sanity checks to SVM's #NPF handlerSean Christopherson2024-05-072-11/+12
| | * | | | KVM: x86: Remove separate "bit" defines for page fault error code masksSean Christopherson2024-05-071-3/+2
| | * | | | KVM: x86/mmu: Exit to userspace with -EFAULT if private fault hits emulationSean Christopherson2024-05-072-8/+19
| | |/ / /
| * | | | Merge branch 'kvm-vmx-ve' into HEADPaolo Bonzini2024-05-109-41/+137
| |\ \ \ \
| | * | | | KVM: VMX: Introduce test mode related to EPT violation VEIsaku Yamahata2024-04-194-4/+73
| | * | | | KVM, x86: add architectural support code for #VEPaolo Bonzini2024-04-191-0/+4
| | * | | | KVM: x86/mmu: Track shadow MMIO value on a per-VM basisSean Christopherson2024-04-194-10/+11
| | * | | | KVM: x86/mmu: Add Suppress VE bit to EPT shadow_mmio_mask/shadow_present_maskIsaku Yamahata2024-04-191-2/+4
| | * | | | KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTESean Christopherson2024-04-193-14/+28
| | * | | | KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTESean Christopherson2024-04-194-13/+19
| | |/ / /
| * | | | KVM: x86: Explicitly zero kvm_caps during vendor module loadSean Christopherson2024-05-071-0/+7
| * | | | KVM: x86: Fully re-initialize supported_mce_cap on vendor module loadSean Christopherson2024-05-071-3/+2
| * | | | KVM: x86: Fully re-initialize supported_vm_types on vendor module loadSean Christopherson2024-05-071-1/+2
| |/ / /
| * | | Merge x86 bugfixes from Linux 6.9-rc3Paolo Bonzini2024-04-193-1/+4
| |\ \ \ | | | |/ | | |/|