summaryrefslogtreecommitdiffstats
path: root/arch/x86
Commit message (Expand)AuthorAgeFilesLines
...
| * | | | | | Merge tag 'perf-urgent-2021-03-21' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2021-03-212-1/+4
| |\ \ \ \ \ \
| | * | | | | | perf/x86/intel: Fix unchecked MSR access error caused by VLBR_EVENTKan Liang2021-03-161-0/+3
| | * | | | | | perf/x86/intel: Fix a crash caused by zero PEBS statusKan Liang2021-03-161-1/+1
| * | | | | | | Merge tag 'x86_urgent_for_v5.12-rc4' of git://git.kernel.org/pub/scm/linux/ke...Linus Torvalds2021-03-215-33/+30
| |\ \ \ \ \ \ \
| | * | | | | | | x86/apic/of: Fix CPU devicetree-node lookupsJohan Hovold2021-03-191-0/+5
| | * | | | | | | x86/ioapic: Ignore IRQ2 againThomas Gleixner2021-03-191-0/+10
| | * | | | | | | x86: Introduce restart_block->arch_data to remove TS_COMPAT_RESTARTOleg Nesterov2021-03-162-11/+3
| | * | | | | | | x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall()Oleg Nesterov2021-03-162-24/+14
| | * | | | | | | x86: Move TS_COMPAT back to asm/thread_info.hOleg Nesterov2021-03-162-9/+9
| | |/ / / / / /
| * | | | | | | Merge tag 'riscv-for-linus-5.12-rc4' of git://git.kernel.org/pub/scm/linux/ke...Linus Torvalds2021-03-201-1/+1
| |\ \ \ \ \ \ \
| | * | | | | | | ftrace: Fix spelling mistake "disabed" -> "disabled"Colin Ian King2021-03-161-1/+1
| * | | | | | | | Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2021-03-199-114/+227
| |\ \ \ \ \ \ \ \
| | * | | | | | | | x86/kvm: Fix broken irq restoration in kvm_waitWanpeng Li2021-03-181-13/+10
| | * | | | | | | | KVM: X86: Fix missing local pCPU when executing wbinvd on all dirty pCPUsWanpeng Li2021-03-181-1/+1
| | * | | | | | | | KVM: x86: Protect userspace MSR filter with SRCU, and set atomically-ishSean Christopherson2021-03-182-52/+74
| | * | | | | | | | KVM: x86: hyper-v: Don't touch TSC page values when guest opted for re-enligh...Vitaly Kuznetsov2021-03-181-1/+25
| | * | | | | | | | KVM: x86: hyper-v: Track Hyper-V TSC page statusVitaly Kuznetsov2021-03-182-14/+52
| | * | | | | | | | KVM: x86: hyper-v: Prevent using not-yet-updated TSC page by secondary CPUsVitaly Kuznetsov2021-03-173-0/+26
| | * | | | | | | | KVM: x86: hyper-v: Limit guest to writing zero to HV_X64_MSR_TSC_EMULATION_ST...Vitaly Kuznetsov2021-03-171-0/+3
| * | | | | | | | | module: remove never implemented MODULE_SUPPORTED_DEVICELeon Romanovsky2021-03-171-1/+0
| | |_|/ / / / / / | |/| | | | | | |
* | | | | | | | | KVM: SVM: Allocate SEV command structures on local stackSean Christopherson2021-04-211-305/+173
* | | | | | | | | KVM: SVM: Add KVM_SEV_RECEIVE_FINISH commandBrijesh Singh2021-04-211-0/+23
* | | | | | | | | KVM: SVM: Add KVM_SEV_RECEIVE_UPDATE_DATA commandBrijesh Singh2021-04-211-0/+79
* | | | | | | | | KVM: SVM: Add support for KVM_SEV_RECEIVE_START commandBrijesh Singh2021-04-211-0/+81
* | | | | | | | | KVM: SVM: Add support for KVM_SEV_SEND_CANCEL commandSteve Rutherford2021-04-211-0/+23
* | | | | | | | | KVM: SVM: Add KVM_SEV_SEND_FINISH commandBrijesh Singh2021-04-211-0/+23
* | | | | | | | | KVM: SVM: Add KVM_SEND_UPDATE_DATA commandBrijesh Singh2021-04-211-0/+125
* | | | | | | | | KVM: SVM: Add KVM_SEV SEND_START commandBrijesh Singh2021-04-211-0/+128
* | | | | | | | | KVM: Boost vCPU candidate in user mode which is delivering interruptWanpeng Li2021-04-211-0/+8
* | | | | | | | | KVM: x86: Support KVM VMs sharing SEV contextNathan Tempelman2021-04-215-1/+101
* | | | | | | | | nSVM: Check addresses of MSR and IO permission mapsKrish Sadhukhan2021-04-211-3/+22
* | | | | | | | | KVM: SVM: Define actual size of IOPM and MSRPM tablesKrish Sadhukhan2021-04-202-10/+13
* | | | | | | | | KVM: x86: Add capability to grant VM access to privileged SGX attributeSean Christopherson2021-04-202-1/+22
* | | | | | | | | KVM: VMX: Enable SGX virtualization for SGX1, SGX2 and LCSean Christopherson2021-04-208-9/+204
* | | | | | | | | KVM: VMX: Add ENCLS[EINIT] handler to support SGX Launch Control (LC)Sean Christopherson2021-04-201-0/+64
* | | | | | | | | KVM: VMX: Add emulation of SGX Launch Control LE hash MSRsSean Christopherson2021-04-204-0/+75
* | | | | | | | | KVM: VMX: Add SGX ENCLS[ECREATE] handler to enforce CPUID restrictionsSean Christopherson2021-04-202-0/+278
* | | | | | | | | KVM: VMX: Frame in ENCLS handler for SGX virtualizationSean Christopherson2021-04-204-3/+73
* | | | | | | | | KVM: VMX: Add basic handling of VM-Exit from SGX enclaveSean Christopherson2021-04-204-2/+47
* | | | | | | | | KVM: x86: Add reverse-CPUID lookup support for scattered SGX featuresSean Christopherson2021-04-201-2/+13
* | | | | | | | | KVM: x86: Add support for reverse CPUID lookup of scattered featuresSean Christopherson2021-04-202-10/+61
* | | | | | | | | KVM: x86: Define new #PF SGX error code bitSean Christopherson2021-04-201-0/+2
* | | | | | | | | KVM: x86: Export kvm_mmu_gva_to_gpa_{read,write}() for SGX (VMX)Sean Christopherson2021-04-201-0/+2
* | | | | | | | | KVM: vmx: add mismatched size assertions in vmcs_check32()Haiwei Li2021-04-201-0/+4
* | | | | | | | | KVM: x86: Remove unused function declarationKeqian Zhu2021-04-201-2/+0
* | | | | | | | | KVM: SVM: Enhance and clean up the vmcb tracking comment in pre_svm_run()Sean Christopherson2021-04-201-5/+4
* | | | | | | | | KVM: SVM: Add a comment to clarify what vcpu_svm.vmcb points atSean Christopherson2021-04-201-0/+1
* | | | | | | | | KVM: SVM: Drop vcpu_svm.vmcb_paSean Christopherson2021-04-202-4/+9
* | | | | | | | | KVM: SVM: Don't set current_vmcb->cpu when switching vmcbSean Christopherson2021-04-201-8/+0
* | | | | | | | | KVM: SVM: Make sure GHCB is mapped before updatingTom Lendacky2021-04-192-1/+4