summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2023-09-0734-809/+1196
|\
| * KVM: x86/mmu: Include mmu.h in spte.hSean Christopherson2023-08-311-0/+1
| * KVM: x86/mmu: Use dummy root, backed by zero page, for !visible guest rootsSean Christopherson2023-08-314-24/+47
| * KVM: x86/mmu: Disallow guest from using !visible slots for page tablesSean Christopherson2023-08-311-1/+6
| * KVM: x86/mmu: Harden TDP MMU iteration against root w/o shadow pageSean Christopherson2023-08-311-5/+6
| * KVM: x86/mmu: Harden new PGD against roots without shadow pagesSean Christopherson2023-08-311-6/+19
| * KVM: x86/mmu: Add helper to convert root hpa to shadow pageSean Christopherson2023-08-313-16/+23
| * KVM: x86/mmu: Handle KVM bookkeeping in page-track APIs, not callersSean Christopherson2023-08-311-6/+12
| * KVM: x86/mmu: Drop @slot param from exported/external page-track APIsSean Christopherson2023-08-313-24/+70
| * KVM: x86/mmu: Bug the VM if write-tracking is used but not enabledSean Christopherson2023-08-311-2/+2
| * KVM: x86/mmu: Assert that correct locks are held for page write-trackingSean Christopherson2023-08-311-6/+11
| * KVM: x86/mmu: Rename page-track APIs to reflect the new realitySean Christopherson2023-08-313-17/+15
| * KVM: x86/mmu: Drop infrastructure for multiple page-track modesSean Christopherson2023-08-313-85/+38
| * KVM: x86/mmu: Use page-track notifiers iff there are external usersSean Christopherson2023-08-312-9/+30
| * KVM: x86/mmu: Move KVM-only page-track declarations to internal headerSean Christopherson2023-08-314-8/+37
| * KVM: x86: Remove the unused page-track hook track_flush_slot()Yan Zhao2023-08-312-28/+0
| * KVM: x86: Add a new page-track hook to handle memslot deletionYan Zhao2023-08-312-2/+28
| * KVM: x86: Reject memslot MOVE operations if KVMGT is attachedSean Christopherson2023-08-312-0/+12
| * KVM: drm/i915/gvt: Drop @vcpu from KVM's ->track_write() hookSean Christopherson2023-08-311-1/+1
| * KVM: x86/mmu: Don't bounce through page-track mechanism for guest PTEsSean Christopherson2023-08-313-11/+6
| * KVM: x86/mmu: Don't rely on page-track mechanism to flush on memslot changeSean Christopherson2023-08-311-8/+2
| * KVM: x86/mmu: Move kvm_arch_flush_shadow_{all,memslot}() to mmu.cSean Christopherson2023-08-312-12/+12
| * KVM: x86/mmu: BUG() in rmap helpers iff CONFIG_BUG_ON_DATA_CORRUPTION=ySean Christopherson2023-08-311-11/+10
| * KVM: x86/mmu: Plumb "struct kvm" all the way to pte_list_remove()Mingwei Zhang2023-08-311-15/+18
| * KVM: x86/mmu: Use BUILD_BUG_ON_INVALID() for KVM_MMU_WARN_ON() stubSean Christopherson2023-08-311-1/+1
| * KVM: x86/mmu: Replace MMU_DEBUG with proper KVM_PROVE_MMU KconfigSean Christopherson2023-08-313-4/+15
| * KVM: x86/mmu: Bug the VM if a vCPU ends up in long mode without PAE enabledSean Christopherson2023-08-311-1/+11
| * KVM: x86/mmu: Convert "runtime" WARN_ON() assertions to WARN_ON_ONCE()Sean Christopherson2023-08-317-49/+49
| * KVM: x86/mmu: Rename MMU_WARN_ON() to KVM_MMU_WARN_ON()Sean Christopherson2023-08-314-12/+12
| * KVM: x86/mmu: Cleanup sanity check of SPTEs at SP freeSean Christopherson2023-08-311-10/+9
| * KVM: x86/mmu: Avoid pointer arithmetic when iterating over SPTEsSean Christopherson2023-08-311-5/+5
| * KVM: x86/mmu: Delete the "dbg" module paramSean Christopherson2023-08-312-7/+0
| * KVM: x86/mmu: Delete rmap_printk() and all its usageSean Christopherson2023-08-312-14/+0
| * KVM: x86/mmu: Delete pgprintk() and all its usageSean Christopherson2023-08-314-28/+0
| * KVM: x86/mmu: Guard against collision with KVM-defined PFERR_IMPLICIT_ACCESSSean Christopherson2023-08-311-0/+11
| * KVM: x86/mmu: Move the lockdep_assert of mmu_lock to inside clear_dirty_pt_ma...Like Xu2023-08-311-1/+2
| * Merge tag 'kvm-x86-misc-6.6' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini2023-08-3121-238/+411
| |\
| | * KVM: x86: Disallow guest CPUID lookups when IRQs are disabledSean Christopherson2023-08-171-0/+13
| | * KVM: nSVM: Use KVM-governed feature framework to track "vNMI enabled"Sean Christopherson2023-08-173-6/+3
| | * KVM: nSVM: Use KVM-governed feature framework to track "vGIF enabled"Sean Christopherson2023-08-174-5/+7
| | * KVM: nSVM: Use KVM-governed feature framework to track "Pause Filter enabled"Sean Christopherson2023-08-174-9/+12
| | * KVM: nSVM: Use KVM-governed feature framework to track "LBRv enabled"Sean Christopherson2023-08-174-14/+16
| | * KVM: nSVM: Use KVM-governed feature framework to track "vVM{SAVE,LOAD} enabled"Sean Christopherson2023-08-174-5/+9
| | * KVM: nSVM: Use KVM-governed feature framework to track "TSC scaling enabled"Sean Christopherson2023-08-174-6/+8
| | * KVM: nSVM: Use KVM-governed feature framework to track "NRIPS enabled"Sean Christopherson2023-08-174-7/+5
| | * KVM: nVMX: Use KVM-governed feature framework to track "nested VMX enabled"Sean Christopherson2023-08-174-19/+11
| | * KVM: x86: Use KVM-governed feature framework to track "XSAVES enabled"Sean Christopherson2023-08-174-23/+35
| | * KVM: VMX: Rename XSAVES control to follow KVM's preferred "ENABLE_XYZ"Sean Christopherson2023-08-176-8/+8
| | * KVM: VMX: Check KVM CPU caps, not just VMX MSR support, for XSAVE enablingSean Christopherson2023-08-171-1/+1
| | * KVM: VMX: Recompute "XSAVES enabled" only after CPUID updateSean Christopherson2023-08-171-13/+11