summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/svm
Commit message (Expand)AuthorAgeFilesLines
* KVM: x86: nSVM: disallow userspace setting of MSR_AMD64_TSC_RATIO to non defa...Maxim Levitsky2022-02-241-2/+17
* KVM: SVM: fix race between interrupt delivery and AVIC inhibitionMaxim Levitsky2022-02-113-48/+52
* KVM: SVM: set IRR in svm_deliver_interruptPaolo Bonzini2022-02-112-3/+1
* KVM: SVM: extract avic_ring_doorbellMaxim Levitsky2022-02-111-11/+20
* KVM: x86: SVM: move avic definitions from AMD's spec to svm.hMaxim Levitsky2022-02-082-32/+1
* KVM: x86: nSVM: deal with L1 hypervisor that intercepts interrupts but lets L...Maxim Levitsky2022-02-081-4/+13
* KVM: x86: nSVM: expose clean bit support to the guestMaxim Levitsky2022-02-081-0/+1
* KVM: x86: nSVM/nVMX: set nested_run_pending on VM entry which is a result of RSMMaxim Levitsky2022-02-081-0/+5
* KVM: x86: nSVM: mark vmcb01 as dirty when restoring SMM saved stateMaxim Levitsky2022-02-081-0/+2
* KVM: x86: nSVM: fix potential NULL derefernce on nested migrationMaxim Levitsky2022-02-081-12/+14
* KVM: x86: SVM: don't passthrough SMAP/SMEP/PKE bits in !NPT && !gCR0.PG caseMaxim Levitsky2022-02-081-2/+10
* Revert "svm: Add warning message for AVIC IPI invalid target"Sean Christopherson2022-02-081-2/+0
* Merge tag 'kvmarm-fixes-5.17-2' of git://git.kernel.org/pub/scm/linux/kernel/...Paolo Bonzini2022-02-052-3/+3
|\
| * Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2022-01-285-75/+139
| |\
| * \ Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2022-01-224-301/+331
| |\ \
| * \ \ Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2022-01-166-139/+308
| |\ \ \
| * \ \ \ Merge tag 'x86_core_for_v5.17_rc1' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2022-01-121-2/+2
| |\ \ \ \
| | * | | | x86: Prepare asm files for straight-line-speculationPeter Zijlstra2021-12-081-2/+2
| * | | | | Merge tag 'perf_core_for_v5.17_rc1' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds2022-01-121-1/+1
| |\ \ \ \ \
| | * | | | | KVM: x86: More precisely identify NMI from guest when handling PMISean Christopherson2021-11-171-1/+1
* | | | | | | kvm/x86: rework guest entry logicMark Rutland2022-02-011-2/+2
* | | | | | | KVM: x86: Move delivery of non-APICv interrupt into vendor codeSean Christopherson2022-02-011-1/+16
| |_|_|_|_|/ |/| | | | |
* | | | | | KVM: x86: Forcibly leave nested virt when SMM state is toggledSean Christopherson2022-01-263-6/+7
* | | | | | KVM: SVM: drop unnecessary code in svm_hv_vmcb_dirty_nested_enlightenments()Vitaly Kuznetsov2022-01-262-13/+1
* | | | | | KVM: SVM: hyper-v: Enable Enlightened MSR-Bitmap support for realVitaly Kuznetsov2022-01-261-0/+3
* | | | | | KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermodeSean Christopherson2022-01-261-1/+15
* | | | | | KVM: SVM: Don't apply SEV+SMAP workaround on code fetch or PT accessSean Christopherson2022-01-261-9/+34
* | | | | | KVM: SVM: Inject #UD on attempted emulation for SEV guest w/o insn bufferSean Christopherson2022-01-261-34/+55
* | | | | | KVM: SVM: WARN if KVM attempts emulation on #UD or #GP for SEV guestsSean Christopherson2022-01-261-0/+5
* | | | | | KVM: x86: Pass emulation type to can_emulate_instruction()Sean Christopherson2022-01-261-1/+2
* | | | | | KVM: SVM: Explicitly require DECODEASSISTS to enable SEV supportSean Christopherson2022-01-261-2/+7
* | | | | | KVM: SVM: Don't intercept #GP for SEV guestsSean Christopherson2022-01-261-3/+8
* | | | | | Revert "KVM: SVM: avoid infinite loop on NPF from bad address"Sean Christopherson2022-01-261-7/+0
* | | | | | KVM: SVM: Never reject emulation due to SMAP errata for !SEV guestsSean Christopherson2022-01-261-4/+6
* | | | | | KVM: x86: nSVM: skip eax alignment check for non-SVM instructionsDenis Valeev2022-01-261-5/+6
| |_|_|_|/ |/| | | |
* | | | | KVM: SVM: Nullify vcpu_(un)blocking() hooks if AVIC is disabledSean Christopherson2022-01-193-6/+9
* | | | | KVM: SVM: Move svm_hardware_setup() and its helpers below svm_x86_opsSean Christopherson2022-01-191-233/+234
* | | | | KVM: SVM: Drop AVIC's intermediate avic_set_running() helperSean Christopherson2022-01-191-20/+36
* | | | | KVM: SVM: Skip AVIC and IRTE updates when loading blocking vCPUSean Christopherson2022-01-191-14/+18
* | | | | KVM: SVM: Use kvm_vcpu_is_blocking() in AVIC load to handle preemptionSean Christopherson2022-01-193-12/+9
* | | | | KVM: SVM: Remove unnecessary APICv/AVIC update in vCPU unblocking pathSean Christopherson2022-01-191-2/+0
* | | | | KVM: SVM: Don't bother checking for "running" AVIC when kicking for IPIsSean Christopherson2022-01-192-17/+9
* | | | | KVM: SVM: Signal AVIC doorbell iff vCPU is in guest modeSean Christopherson2022-01-191-2/+20
* | | | | Merge branch 'kvm-pi-raw-spinlock' into HEADPaolo Bonzini2022-01-191-1/+1
|\| | | |
| * | | | KVM: SEV: Mark nested locking of kvm->lockWanpeng Li2022-01-071-1/+1
* | | | | KVM: VMX: Reject KVM_RUN if emulation is required with pending exceptionSean Christopherson2022-01-191-0/+6
* | | | | KVM: x86: Making the module parameter of vPMU more commonLike Xu2022-01-173-8/+3
| |_|_|/ |/| | |
* | | | KVM: SVM: include CR3 in initial VMSA state for SEV-ES guestsMichael Roth2022-01-071-0/+19
* | | | KVM: x86/pmu: Reuse pmc_perf_hw_id() and drop find_fixed_event()Like Xu2022-01-071-7/+4
* | | | KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id()Like Xu2022-01-071-4/+4