summaryrefslogtreecommitdiffstats
path: root/arch/x86
Commit message (Expand)AuthorAgeFilesLines
* KVM: VMX: Split out the non-virtualization part of vmx_interrupt_blocked()Sean Christopherson2024-06-282-3/+9
* KVM: nVMX: Request immediate exit iff pending nested event needs injectionSean Christopherson2024-06-283-4/+4
* KVM: nVMX: Add a helper to get highest pending from Posted Interrupt vectorSean Christopherson2024-06-282-2/+13
* KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in vmx_exit()Kai Huang2024-06-281-1/+1
* KVM: VMX: Remove unnecessary INVEPT[GLOBAL] from hardware enable pathSean Christopherson2024-06-281-3/+0
* KVM: nVMX: Update VMCS12_REVISION comment to state it should never changeSean Christopherson2024-06-281-6/+8
* Merge branch 'kvm-6.10-fixes' into HEADPaolo Bonzini2024-06-202-8/+4
|\
| * KVM: x86: Always sync PIR to IRR prior to scanning I/O APIC routesSean Christopherson2024-06-201-5/+4
| * KVM: x86/mmu: Don't save mmu_invalidate_seq after checking private attrTao Su2024-06-051-3/+0
| * Merge branch 'kvm-fixes-6.10-1' into HEADPaolo Bonzini2024-06-0315-69/+161
| |\
* | | KVM: x86/tdp_mmu: Sprinkle __must_checkIsaku Yamahata2024-06-201-6/+7
* | | KVM: SNP: Fix LBR Virtualization for SNP guestRavi Bangoria2024-06-051-0/+8
* | | Merge branch 'kvm-6.11-sev-snp' into HEADPaolo Bonzini2024-06-0314-25/+1614
|\ \ \
| * | | KVM: SVM: Remove the need to trigger an UNBLOCK event on AP creationTom Lendacky2024-06-033-23/+1
| * | | KVM: SEV: Don't WARN() if RMP lookup fails when invalidating gmem pagesPaolo Bonzini2024-06-031-5/+4
| * | | KVM: SEV: Automatically switch reclaimed pages to sharedMichael Roth2024-06-031-24/+31
| * | | KVM: SVM: Add module parameter to enable SEV-SNPBrijesh Singh2024-05-121-1/+2
| * | | KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNPAshish Kalra2024-05-121-1/+7
| * | | KVM: x86: Implement hook for determining max NPT mapping levelMichael Roth2024-05-123-0/+21
| * | | KVM: SEV: Implement gmem hook for invalidating private pagesMichael Roth2024-05-124-0/+68
| * | | KVM: SEV: Implement gmem hook for initializing private pagesMichael Roth2024-05-125-0/+111
| * | | KVM: SEV: Support SEV-SNP AP Creation NAE eventTom Lendacky2024-05-126-3/+266
| * | | KVM: SEV: Add support to handle RMP nested page faultsBrijesh Singh2024-05-129-6/+159
| * | | KVM: SEV: Add support to handle Page State Change VMGEXITMichael Roth2024-05-123-0/+204
| * | | KVM: SEV: Add support to handle MSR based Page State Change VMGEXITMichael Roth2024-05-122-0/+54
| * | | KVM: SEV: Add support to handle GHCB GPA register VMGEXITBrijesh Singh2024-05-123-6/+57
| * | | KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH commandBrijesh Singh2024-05-122-0/+144
| * | | KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE commandBrijesh Singh2024-05-122-0/+249
| * | | KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START commandBrijesh Singh2024-05-123-3/+185
| * | | KVM: SEV: Add initial SEV-SNP supportBrijesh Singh2024-05-125-3/+42
| * | | KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=yMichael Roth2024-05-121-0/+1
| * | | KVM: MMU: Disable fast path if KVM_EXIT_MEMORY_FAULT is neededMichael Roth2024-05-121-2/+22
| * | | Merge branch 'kvm-coco-hooks' into HEADPaolo Bonzini2024-05-124-2/+40
| |\ \ \
| | * | | KVM: x86: Add hook for determining max NPT mapping levelMichael Roth2024-05-103-2/+23
| | * | | KVM: guest_memfd: Add hook for invalidating memoryMichael Roth2024-05-103-0/+9
| | * | | KVM: guest_memfd: Add hook for initializing memoryPaolo Bonzini2024-05-103-0/+8
* | | | | Merge branch 'kvm-fixes-6.10-1' into HEADPaolo Bonzini2024-06-0315-69/+161
|\ \ \ \ \ | |_|_|/ / |/| | | / | | |_|/ | |/| |
| * | | KVM: x86: Drop support for hand tuning APIC timer advancement from userspaceSean Christopherson2024-06-033-29/+23
| * | | KVM: SEV-ES: Delegate LBR virtualization to the processorRavi Bangoria2024-06-033-7/+17
| * | | KVM: SEV-ES: Disallow SEV-ES guests when X86_FEATURE_LBRV is absentRavi Bangoria2024-06-033-9/+14
| * | | KVM: SEV-ES: Prevent MSR access post VMSA encryptionNikunj A Dadhania2024-06-031-0/+18
| * | | KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright maskedSean Christopherson2024-05-231-8/+19
| * | | KVM: x86: Force KVM_WERROR if the global WERROR is enabledSean Christopherson2024-05-231-1/+2
| * | | KVM: x86: Disable KVM_INTEL_PROVE_VE by defaultSean Christopherson2024-05-231-3/+5
| * | | KVM: VMX: Enumerate EPT Violation #VE support in /proc/cpuinfoSean Christopherson2024-05-231-1/+1
| * | | KVM: x86/mmu: Print SPTEs on unexpected #VESean Christopherson2024-05-233-8/+38
| * | | KVM: VMX: Dump VMCS on unexpected #VESean Christopherson2024-05-231-1/+3
| * | | KVM: x86/mmu: Add sanity checks that KVM doesn't create EPT #VE SPTEsSean Christopherson2024-05-233-0/+14
| * | | KVM: nVMX: Always handle #VEs in L0 (never forward #VEs from L2 to L1)Sean Christopherson2024-05-231-0/+2
| * | | KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE supportSean Christopherson2024-05-231-0/+3