summaryrefslogtreecommitdiffstats
path: root/arch/x86
Commit message (Expand)AuthorAgeFilesLines
* KVM: SVM: Add AP_JUMP_TABLE support in prep for AP bootingTom Lendacky2020-12-152-0/+29
* KVM: SVM: Provide support to launch and run an SEV-ES guestTom Lendacky2020-12-151-0/+104
* KVM: SVM: Provide an updated VMRUN invocation for SEV-ES guestsTom Lendacky2020-12-154-9/+77
* KVM: SVM: Provide support for SEV-ES vCPU loadingTom Lendacky2020-12-156-23/+103
* KVM: SVM: Provide support for SEV-ES vCPU creation/loadingTom Lendacky2020-12-154-5/+92
* KVM: SVM: Update ASID allocation to support SEV-ES guestsTom Lendacky2020-12-151-11/+14
* KVM: SVM: Set the encryption mask for the SVM host save areaTom Lendacky2020-12-153-2/+4
* KVM: SVM: Add NMI support for an SEV-ES guestTom Lendacky2020-12-152-7/+17
* KVM: SVM: Guest FPU state save/restore not needed for SEV-ES guestTom Lendacky2020-12-153-10/+56
* KVM: SVM: Do not report support for SMM for an SEV-ES guestTom Lendacky2020-12-154-5/+18
* KVM: x86: Update __get_sregs() / __set_sregs() to support SEV-ESTom Lendacky2020-12-151-9/+18
* KVM: SVM: Add support for CR8 write traps for an SEV-ES guestTom Lendacky2020-12-152-1/+7
* KVM: SVM: Add support for CR4 write traps for an SEV-ES guestTom Lendacky2020-12-154-4/+21
* KVM: SVM: Add support for CR0 write traps for an SEV-ES guestTom Lendacky2020-12-154-13/+64
* KVM: SVM: Add support for EFER write traps for an SEV-ES guestTom Lendacky2020-12-152-0/+22
* KVM: SVM: Support string IO operations for an SEV-ES guestTom Lendacky2020-12-156-5/+83
* KVM: SVM: Support MMIO for an SEV-ES guestTom Lendacky2020-12-154-0/+258
* KVM: SVM: Create trace events for VMGEXIT MSR protocol processingTom Lendacky2020-12-153-0/+52
* KVM: SVM: Create trace events for VMGEXIT processingTom Lendacky2020-12-153-0/+61
* KVM: SVM: Add support for SEV-ES GHCB MSR protocol function 0x100Tom Lendacky2020-12-152-0/+19
* KVM: SVM: Add support for SEV-ES GHCB MSR protocol function 0x004Tom Lendacky2020-12-152-2/+63
* KVM: SVM: Add support for SEV-ES GHCB MSR protocol function 0x002Tom Lendacky2020-12-152-1/+42
* KVM: SVM: Add initial support for a VMGEXIT VMEXITTom Lendacky2020-12-155-3/+292
* KVM: SVM: Prepare for SEV-ES exit handling in the sev.c fileTom Lendacky2020-12-151-26/+38
* KVM: SVM: Cannot re-initialize the VMCB after shutdown with SEV-ESTom Lendacky2020-12-151-0/+7
* KVM: SVM: Do not allow instruction emulation under SEV-ESTom Lendacky2020-12-151-0/+6
* KVM: SVM: Prevent debugging under SEV-ESTom Lendacky2020-12-153-14/+35
* KVM: SVM: Add required changes to support intercepts under SEV-ESTom Lendacky2020-12-153-13/+84
* KVM: x86: introduce complete_emulated_msr callbackPaolo Bonzini2020-12-154-4/+7
* KVM: x86: use kvm_complete_insn_gp in emulating RDMSR/WRMSRPaolo Bonzini2020-12-151-28/+16
* KVM: x86: remove bogus #GP injectionPaolo Bonzini2020-12-151-5/+1
* KVM: x86: Mark GPRs dirty when writtenTom Lendacky2020-12-141-25/+26
* KVM: SVM: Add support for the SEV-ES VMSATom Lendacky2020-12-144-2/+97
* KVM: SVM: Add GHCB accessor functions for retrieving fieldsTom Lendacky2020-12-142-6/+16
* KVM: SVM: Add support for SEV-ES capability in KVMTom Lendacky2020-12-144-32/+77
* KVM: SVM: Remove the call to sev_platform_status() during setupTom Lendacky2020-12-141-21/+1
* x86/cpu: Add VM page flush MSR availablility as a CPUID featureTom Lendacky2020-12-143-0/+3
* KVM/VMX/SVM: Move kvm_machine_check function to x86.hUros Bizjak2020-12-143-40/+20
* KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bitsPaolo Bonzini2020-12-113-14/+22
* KVM: x86: Expose AVX512_FP16 for supported CPUIDCathy Zhang2020-12-111-1/+1
* x86: Enumerate AVX512 FP16 CPUID feature flagKyung Min Park2020-12-112-0/+2
* KVM/VMX: Use TEST %REG,%REG instead of CMP $0,%REG in vmenter.SUros Bizjak2020-12-111-1/+1
* KVM: x86: ignore SIPIs that are received while not in wait-for-sipi stateMaxim Levitsky2020-12-091-7/+8
* KVM: x86: adjust SEV for commit 7e8e6eed75ePaolo Bonzini2020-12-031-1/+1
* KVM: nSVM: set fixed bits by handPaolo Bonzini2020-11-271-4/+5
* kvm: x86/mmu: Add TDP MMU SPTE changed trace pointBen Gardon2020-11-192-0/+31
* kvm: x86/mmu: Add existing trace points to TDP MMUBen Gardon2020-11-191-1/+11
* KVM: SVM: check CR4 changes against vcpu->archPaolo Bonzini2020-11-161-1/+1
* KVM: SVM: Move asid to vcpu_svmCathy Avery2020-11-162-3/+8
* x86/kvm: remove unused macro HV_CLOCK_SIZEAlex Shi2020-11-161-1/+0