aboutsummaryrefslogtreecommitdiff
path: root/arch/x86/kvm
AgeCommit message (Expand)AuthorFilesLines
12 daysKVM: x86/mmu: Don't save mmu_invalidate_seq after checking private attrGravatar Tao Su 1-3/+0
13 daysMerge branch 'kvm-fixes-6.10-1' into HEADGravatar Paolo Bonzini 13-68/+159
13 daysKVM: x86: Drop support for hand tuning APIC timer advancement from userspaceGravatar Sean Christopherson 3-29/+23
13 daysKVM: SEV-ES: Delegate LBR virtualization to the processorGravatar Ravi Bangoria 3-7/+17
13 daysKVM: SEV-ES: Disallow SEV-ES guests when X86_FEATURE_LBRV is absentGravatar Ravi Bangoria 3-9/+14
13 daysKVM: SEV-ES: Prevent MSR access post VMSA encryptionGravatar Nikunj A Dadhania 1-0/+18
2024-05-23KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright maskedGravatar Sean Christopherson 1-8/+19
2024-05-23KVM: x86: Force KVM_WERROR if the global WERROR is enabledGravatar Sean Christopherson 1-1/+2
2024-05-23KVM: x86: Disable KVM_INTEL_PROVE_VE by defaultGravatar Sean Christopherson 1-3/+5
2024-05-23KVM: x86/mmu: Print SPTEs on unexpected #VEGravatar Sean Christopherson 2-8/+37
2024-05-23KVM: VMX: Dump VMCS on unexpected #VEGravatar Sean Christopherson 1-1/+3
2024-05-23KVM: x86/mmu: Add sanity checks that KVM doesn't create EPT #VE SPTEsGravatar Sean Christopherson 3-0/+14
2024-05-23KVM: nVMX: Always handle #VEs in L0 (never forward #VEs from L2 to L1)Gravatar Sean Christopherson 1-0/+2
2024-05-23KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE supportGravatar Sean Christopherson 1-0/+3
2024-05-23KVM: VMX: Don't kill the VM on an unexpected #VEGravatar Sean Christopherson 1-2/+2
2024-05-23KVM: x86/mmu: Use SHADOW_NONPRESENT_VALUE for atomic zap in TDP MMUGravatar Isaku Yamahata 1-1/+1
2024-05-22tracing/treewide: Remove second parameter of __assign_str()Gravatar Steven Rostedt (Google) 1-1/+1
2024-05-15Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmGravatar Linus Torvalds 26-776/+1333
2024-05-12Merge tag 'kvm-x86-misc-6.10' of https://github.com/kvm-x86/linux into HEADGravatar Paolo Bonzini 6-30/+52
2024-05-12Merge tag 'kvm-x86-mmu-6.10' of https://github.com/kvm-x86/linux into HEADGravatar Paolo Bonzini 2-29/+66
2024-05-12Merge tag 'kvm-x86-vmx-6.10' of https://github.com/kvm-x86/linux into HEADGravatar Paolo Bonzini 4-13/+34
2024-05-10Merge tag 'loongarch-kvm-6.10' of git://git.kernel.org/pub/scm/linux/kernel/g...Gravatar Paolo Bonzini 17-115/+159
2024-05-10Merge branch 'kvm-sev-es-ghcbv2' into HEADGravatar Paolo Bonzini 2-11/+102
2024-05-10Merge branch 'kvm-coco-pagefault-prep' into HEADGravatar Paolo Bonzini 5-77/+149
2024-05-10Merge branch 'kvm-vmx-ve' into HEADGravatar Paolo Bonzini 9-41/+137
2024-05-07KVM: SEV: Allow per-guest configuration of GHCB protocol versionGravatar Michael Roth 2-3/+30
2024-05-07KVM: SEV: Add GHCB handling for termination requestsGravatar Michael Roth 1-0/+9
2024-05-07KVM: SEV: Add GHCB handling for Hypervisor Feature Support requestsGravatar Brijesh Singh 1-0/+14
2024-05-07KVM: SEV: Add support to handle AP reset MSR protocolGravatar Tom Lendacky 2-8/+49
2024-05-07KVM: x86: Explicitly zero kvm_caps during vendor module loadGravatar Sean Christopherson 1-0/+7
2024-05-07KVM: x86: Fully re-initialize supported_mce_cap on vendor module loadGravatar Sean Christopherson 1-3/+2
2024-05-07KVM: x86: Fully re-initialize supported_vm_types on vendor module loadGravatar Sean Christopherson 1-1/+2
2024-05-07KVM: x86/mmu: Sanity check that __kvm_faultin_pfn() doesn't create noslot pfnsGravatar Sean Christopherson 1-1/+1
2024-05-07KVM: x86/mmu: Initialize kvm_page_fault's pfn and hva to error valuesGravatar Sean Christopherson 1-0/+3
2024-05-07KVM: x86/mmu: Set kvm_page_fault.hva to KVM_HVA_ERR_BAD for "no slot" faultsGravatar Sean Christopherson 1-0/+1
2024-05-07KVM: x86/mmu: Handle no-slot faults at the beginning of kvm_faultin_pfn()Gravatar Sean Christopherson 1-12/+17
2024-05-07KVM: x86/mmu: Move slot checks from __kvm_faultin_pfn() to kvm_faultin_pfn()Gravatar Sean Christopherson 1-43/+44
2024-05-07KVM: x86/mmu: Explicitly disallow private accesses to emulated MMIOGravatar Sean Christopherson 1-0/+5
2024-05-07KVM: x86/mmu: Don't force emulation of L2 accesses to non-APIC internal slotsGravatar Sean Christopherson 1-4/+13
2024-05-07KVM: x86/mmu: Move private vs. shared check above slot validity checksGravatar Sean Christopherson 1-5/+15
2024-05-07KVM: x86/mmu: WARN and skip MMIO cache on private, reserved page faultsGravatar Sean Christopherson 1-0/+3
2024-05-07KVM: x86/mmu: check for invalid async page faults involving private memoryGravatar Paolo Bonzini 1-7/+11
2024-05-07KVM: x86/mmu: Use synthetic page fault error code to indicate private faultsGravatar Sean Christopherson 2-1/+15
2024-05-07KVM: x86/mmu: WARN if upper 32 bits of legacy #PF error code are non-zeroGravatar Sean Christopherson 1-0/+7
2024-05-07KVM: x86/mmu: Pass full 64-bit error code when handling page faultsGravatar Isaku Yamahata 3-5/+4
2024-05-07KVM: x86: Move synthetic PFERR_* sanity checks to SVM's #NPF handlerGravatar Sean Christopherson 2-11/+12
2024-05-07KVM: x86: Remove separate "bit" defines for page fault error code masksGravatar Sean Christopherson 1-3/+2
2024-05-07KVM: x86/mmu: Exit to userspace with -EFAULT if private fault hits emulationGravatar Sean Christopherson 2-8/+19
2024-05-02KVM: x86: Remove VT-d mention in posted interrupt tracepointGravatar Alejandro Jimenez 1-2/+2
2024-05-02KVM: x86: Only set APICV_INHIBIT_REASON_ABSENT if APICv is enabledGravatar Alejandro Jimenez 1-7/+4