summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2021-01-0912-95/+161
|\
| * KVM: x86: __kvm_vcpu_halt can be staticPaolo Bonzini2021-01-081-1/+1
| * KVM: SVM: Add support for booting APs in an SEV-ES guestTom Lendacky2021-01-086-6/+58
| * KVM: nSVM: cancel KVM_REQ_GET_NESTED_STATE_PAGES on nested vmexitMaxim Levitsky2021-01-083-1/+8
| * KVM: nSVM: mark vmcb as dirty when forcingly leaving the guest modeMaxim Levitsky2021-01-081-0/+1
| * KVM: nSVM: correctly restore nested_run_pending on migrationMaxim Levitsky2021-01-081-0/+4
| * KVM: x86/mmu: Ensure TDP MMU roots are freed after yieldBen Gardon2021-01-081-56/+48
| * KVM: x86: change in pv_eoi_get_pending() to make code more readableStephen Zhang2021-01-081-1/+1
| * KVM: x86: fix shift out of bounds reported by UBSANPaolo Bonzini2021-01-081-1/+1
| * KVM/SVM: Remove leftover __svm_vcpu_run prototype from svm.cUros Bizjak2021-01-081-2/+0
| * KVM: SVM: Add register operand to vmsave call in sev_es_vcpu_loadNathan Chancellor2021-01-081-1/+1
| * Merge branch 'kvm-master' into kvm-nextPaolo Bonzini2021-01-0810-102/+112
| |\
| | * KVM: x86/mmu: Optimize not-present/MMIO SPTE check in get_mmio_spte()Sean Christopherson2021-01-081-7/+13
| | * KVM: x86/mmu: Use raw level to index into MMIO walks' sptes arraySean Christopherson2021-01-082-9/+8
| | * KVM: x86/mmu: Get root level from walkers when retrieving MMIO SPTESean Christopherson2021-01-083-11/+13
| | * KVM: x86/mmu: Use -1 to flag an undefined spte in get_mmio_spte()Sean Christopherson2021-01-082-2/+7
* | | Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2020-12-2026-482/+2203
|\| |
| * | KVM: SVM: fix 32-bit compilationPaolo Bonzini2020-12-161-0/+2
| * | Merge tag 'kvmarm-5.11' of git://git.kernel.org/pub/scm/linux/kernel/git/kvma...Paolo Bonzini2020-12-151-1/+3
| |\ \
| * | | KVM: SVM: Add AP_JUMP_TABLE support in prep for AP bootingTom Lendacky2020-12-152-0/+29
| * | | KVM: SVM: Provide support to launch and run an SEV-ES guestTom Lendacky2020-12-151-0/+104
| * | | KVM: SVM: Provide an updated VMRUN invocation for SEV-ES guestsTom Lendacky2020-12-154-9/+77
| * | | KVM: SVM: Provide support for SEV-ES vCPU loadingTom Lendacky2020-12-155-20/+96
| * | | KVM: SVM: Provide support for SEV-ES vCPU creation/loadingTom Lendacky2020-12-153-4/+78
| * | | KVM: SVM: Update ASID allocation to support SEV-ES guestsTom Lendacky2020-12-151-11/+14
| * | | KVM: SVM: Set the encryption mask for the SVM host save areaTom Lendacky2020-12-153-2/+4
| * | | KVM: SVM: Add NMI support for an SEV-ES guestTom Lendacky2020-12-152-7/+17
| * | | KVM: SVM: Guest FPU state save/restore not needed for SEV-ES guestTom Lendacky2020-12-152-10/+54
| * | | KVM: SVM: Do not report support for SMM for an SEV-ES guestTom Lendacky2020-12-153-4/+17
| * | | KVM: x86: Update __get_sregs() / __set_sregs() to support SEV-ESTom Lendacky2020-12-151-9/+18
| * | | KVM: SVM: Add support for CR8 write traps for an SEV-ES guestTom Lendacky2020-12-151-1/+6
| * | | KVM: SVM: Add support for CR4 write traps for an SEV-ES guestTom Lendacky2020-12-152-4/+19
| * | | KVM: SVM: Add support for CR0 write traps for an SEV-ES guestTom Lendacky2020-12-152-13/+46
| * | | KVM: SVM: Add support for EFER write traps for an SEV-ES guestTom Lendacky2020-12-151-0/+20
| * | | KVM: SVM: Support string IO operations for an SEV-ES guestTom Lendacky2020-12-155-5/+82
| * | | KVM: SVM: Support MMIO for an SEV-ES guestTom Lendacky2020-12-154-0/+258
| * | | KVM: SVM: Create trace events for VMGEXIT MSR protocol processingTom Lendacky2020-12-153-0/+52
| * | | KVM: SVM: Create trace events for VMGEXIT processingTom Lendacky2020-12-153-0/+61
| * | | KVM: SVM: Add support for SEV-ES GHCB MSR protocol function 0x100Tom Lendacky2020-12-152-0/+19
| * | | KVM: SVM: Add support for SEV-ES GHCB MSR protocol function 0x004Tom Lendacky2020-12-152-2/+63
| * | | KVM: SVM: Add support for SEV-ES GHCB MSR protocol function 0x002Tom Lendacky2020-12-152-1/+42
| * | | KVM: SVM: Add initial support for a VMGEXIT VMEXITTom Lendacky2020-12-153-2/+284
| * | | KVM: SVM: Prepare for SEV-ES exit handling in the sev.c fileTom Lendacky2020-12-151-26/+38
| * | | KVM: SVM: Cannot re-initialize the VMCB after shutdown with SEV-ESTom Lendacky2020-12-151-0/+7
| * | | KVM: SVM: Do not allow instruction emulation under SEV-ESTom Lendacky2020-12-151-0/+6
| * | | KVM: SVM: Prevent debugging under SEV-ESTom Lendacky2020-12-153-14/+35
| * | | KVM: SVM: Add required changes to support intercepts under SEV-ESTom Lendacky2020-12-152-12/+82
| * | | KVM: x86: introduce complete_emulated_msr callbackPaolo Bonzini2020-12-153-4/+6
| * | | KVM: x86: use kvm_complete_insn_gp in emulating RDMSR/WRMSRPaolo Bonzini2020-12-151-28/+16
| * | | KVM: x86: remove bogus #GP injectionPaolo Bonzini2020-12-151-5/+1