summaryrefslogtreecommitdiffstats
path: root/arch
Commit message (Expand)AuthorAgeFilesLines
* KVM: x86: Reject memslot MOVE operations if KVMGT is attachedSean Christopherson2023-08-313-0/+15
* KVM: drm/i915/gvt: Drop @vcpu from KVM's ->track_write() hookSean Christopherson2023-08-312-4/+3
* KVM: x86/mmu: Don't bounce through page-track mechanism for guest PTEsSean Christopherson2023-08-314-12/+6
* KVM: x86/mmu: Don't rely on page-track mechanism to flush on memslot changeSean Christopherson2023-08-311-8/+2
* KVM: x86/mmu: Move kvm_arch_flush_shadow_{all,memslot}() to mmu.cSean Christopherson2023-08-313-13/+12
* KVM: x86/mmu: BUG() in rmap helpers iff CONFIG_BUG_ON_DATA_CORRUPTION=ySean Christopherson2023-08-311-11/+10
* KVM: x86/mmu: Plumb "struct kvm" all the way to pte_list_remove()Mingwei Zhang2023-08-311-15/+18
* KVM: x86/mmu: Use BUILD_BUG_ON_INVALID() for KVM_MMU_WARN_ON() stubSean Christopherson2023-08-311-1/+1
* KVM: x86/mmu: Replace MMU_DEBUG with proper KVM_PROVE_MMU KconfigSean Christopherson2023-08-313-4/+15
* KVM: x86/mmu: Bug the VM if a vCPU ends up in long mode without PAE enabledSean Christopherson2023-08-311-1/+11
* KVM: x86/mmu: Convert "runtime" WARN_ON() assertions to WARN_ON_ONCE()Sean Christopherson2023-08-317-49/+49
* KVM: x86/mmu: Rename MMU_WARN_ON() to KVM_MMU_WARN_ON()Sean Christopherson2023-08-314-12/+12
* KVM: x86/mmu: Cleanup sanity check of SPTEs at SP freeSean Christopherson2023-08-311-10/+9
* KVM: x86/mmu: Avoid pointer arithmetic when iterating over SPTEsSean Christopherson2023-08-311-5/+5
* KVM: x86/mmu: Delete the "dbg" module paramSean Christopherson2023-08-312-7/+0
* KVM: x86/mmu: Delete rmap_printk() and all its usageSean Christopherson2023-08-312-14/+0
* KVM: x86/mmu: Delete pgprintk() and all its usageSean Christopherson2023-08-314-28/+0
* KVM: x86/mmu: Guard against collision with KVM-defined PFERR_IMPLICIT_ACCESSSean Christopherson2023-08-311-0/+11
* KVM: x86/mmu: Move the lockdep_assert of mmu_lock to inside clear_dirty_pt_ma...Like Xu2023-08-311-1/+2
* Merge tag 'kvm-x86-misc-6.6' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2023-08-3128-445/+490
|\
| * KVM: x86: Disallow guest CPUID lookups when IRQs are disabledSean Christopherson2023-08-171-0/+13
| * KVM: nSVM: Use KVM-governed feature framework to track "vNMI enabled"Sean Christopherson2023-08-173-6/+3
| * KVM: nSVM: Use KVM-governed feature framework to track "vGIF enabled"Sean Christopherson2023-08-174-5/+7
| * KVM: nSVM: Use KVM-governed feature framework to track "Pause Filter enabled"Sean Christopherson2023-08-174-9/+12
| * KVM: nSVM: Use KVM-governed feature framework to track "LBRv enabled"Sean Christopherson2023-08-174-14/+16
| * KVM: nSVM: Use KVM-governed feature framework to track "vVM{SAVE,LOAD} enabled"Sean Christopherson2023-08-174-5/+9
| * KVM: nSVM: Use KVM-governed feature framework to track "TSC scaling enabled"Sean Christopherson2023-08-174-6/+8
| * KVM: nSVM: Use KVM-governed feature framework to track "NRIPS enabled"Sean Christopherson2023-08-174-7/+5
| * KVM: nVMX: Use KVM-governed feature framework to track "nested VMX enabled"Sean Christopherson2023-08-174-19/+11
| * KVM: x86: Use KVM-governed feature framework to track "XSAVES enabled"Sean Christopherson2023-08-175-24/+35
| * KVM: VMX: Rename XSAVES control to follow KVM's preferred "ENABLE_XYZ"Sean Christopherson2023-08-177-9/+9
| * KVM: VMX: Check KVM CPU caps, not just VMX MSR support, for XSAVE enablingSean Christopherson2023-08-171-1/+1
| * KVM: VMX: Recompute "XSAVES enabled" only after CPUID updateSean Christopherson2023-08-171-13/+11
| * KVM: x86/mmu: Use KVM-governed feature framework to track "GBPAGES enabled"Sean Christopherson2023-08-173-17/+22
| * KVM: x86: Add a framework for enabling KVM-governed x86 featuresSean Christopherson2023-08-174-0/+78
| * x86: kvm: x86: Remove unnecessary initial values of variablesLi zeming2023-08-171-2/+2
| * KVM: x86: Remove WARN sanity check on hypervisor timer vs. UNINITIALIZED vCPUSean Christopherson2023-08-171-4/+9
| * KVM: x86: Remove break statements that will never be executedLike Xu2023-08-173-4/+0
| * KVM: nSVM: Skip writes to MSR_AMD64_TSC_RATIO if guest state isn't loadedSean Christopherson2023-08-031-1/+2
| * KVM: x86: Always write vCPU's current TSC offset/ratio in vendor hooksSean Christopherson2023-08-036-16/+15
| * KVM: SVM: Clean up preemption toggling related to MSR_AMD64_TSC_RATIOSean Christopherson2023-08-031-5/+3
| * KVM: nSVM: Use the "outer" helper for writing multiplier to MSR_AMD64_TSC_RATIOSean Christopherson2023-08-033-6/+5
| * KVM: nSVM: Load L1's TSC multiplier based on L1 state, not L2 stateSean Christopherson2023-08-031-2/+2
| * KVM: nSVM: Check instead of asserting on nested TSC scaling supportSean Christopherson2023-08-031-3/+2
| * KVM: x86: Advertise AMX-COMPLEX CPUID to userspaceTao Su2023-08-032-1/+3
| * KVM: VMX: Skip VMCLEAR logic during emergency reboots if CR4.VMXE=0Sean Christopherson2023-08-031-2/+10
| * KVM: SVM: Use "standard" stgi() helper when disabling SVMSean Christopherson2023-08-031-10/+3
| * KVM: x86: Force kvm_rebooting=true during emergency reboot/crashSean Christopherson2023-08-032-0/+4
| * x86/virt: KVM: Move "disable SVM" helper into KVM SVMSean Christopherson2023-08-032-54/+25
| * KVM: VMX: Ensure CPU is stable when probing basic VMX supportSean Christopherson2023-08-031-3/+14