summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'kvmarm-fixes-5.17-2' of git://git.kernel.org/pub/scm/linux/kernel/...Paolo Bonzini2022-02-0511-85/+71
|\
| * Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2022-01-2816-186/+416
| |\
| * \ Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2022-01-2219-521/+662
| |\ \
| * \ \ Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2022-01-1646-766/+1705
| |\ \ \
| * \ \ \ Merge tag 'x86_core_for_v5.17_rc1' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2022-01-134-30/+20
| |\ \ \ \
| | * | | | x86/vmx: Remove .fixup usagePeter Zijlstra2021-12-111-9/+7
| | * | | | x86/kvm: Remove .fixup usagePeter Zijlstra2021-12-111-12/+4
| | * | | | x86: Prepare inline-asm for straight-line-speculationPeter Zijlstra2021-12-081-2/+2
| | * | | | x86: Prepare asm files for straight-line-speculationPeter Zijlstra2021-12-082-9/+9
| * | | | | Merge tag 'perf_core_for_v5.17_rc1' of git://git.kernel.org/pub/scm/linux/ker...Linus Torvalds2022-01-136-55/+50
| |\ \ \ \ \
| | * | | | | KVM: x86: Move Intel Processor Trace interrupt handler to vmx.cSean Christopherson2021-11-172-20/+22
| | * | | | | KVM: Move x86's perf guest info callbacks to generic KVMSean Christopherson2021-11-171-42/+11
| | * | | | | KVM: x86: More precisely identify NMI from guest when handling PMISean Christopherson2021-11-174-6/+15
| | * | | | | KVM: x86: Drop current_vcpu for kvm_running_vcpu + kvm_arch_vcpu variableSean Christopherson2021-11-173-14/+19
| | * | | | | perf: Force architectures to opt-in to guest callbacksSean Christopherson2021-11-171-0/+1
| | * | | | | perf/core: Rework guest callbacks to prepare for static_call supportLike Xu2021-11-172-19/+23
| | * | | | | KVM: x86: Register Processor Trace interrupt hook iff PT enabled in guestSean Christopherson2021-11-172-1/+5
| | * | | | | KVM: x86: Register perf callbacks after calling vendor's hardware_setup()Sean Christopherson2021-11-171-3/+4
| * | | | | | Merge tag 'x86_misc_for_v5.17_rc1' of git://git.kernel.org/pub/scm/linux/kern...Linus Torvalds2022-01-101-0/+1
| |\ \ \ \ \ \
| | * | | | | | x86/mtrr: Remove the mtrr_bp_init() stubChristoph Hellwig2021-12-221-0/+1
* | | | | | | | KVM: x86: Use ERR_PTR_USR() to return -EFAULT as a __user pointerSean Christopherson2022-02-041-3/+3
* | | | | | | | KVM: x86: Report deprecated x87 features in supported CPUIDJim Mattson2022-02-041-6/+7
* | | | | | | | kvm/x86: rework guest entry logicMark Rutland2022-02-014-50/+7
* | | | | | | | KVM: x86: Move delivery of non-APICv interrupt into vendor codeSean Christopherson2022-02-013-10/+34
| |_|_|_|_|_|/ |/| | | | | |
* | | | | | | KVM: nVMX: Allow VMREAD when Enlightened VMCS is in useVitaly Kuznetsov2022-01-282-16/+51
* | | | | | | KVM: nVMX: Implement evmcs_field_offset() suitable for handle_vmread()Vitaly Kuznetsov2022-01-282-10/+25
* | | | | | | KVM: nVMX: Rename vmcs_to_field_offset{,_table}Vitaly Kuznetsov2022-01-283-8/+8
* | | | | | | KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMERVitaly Kuznetsov2022-01-281-1/+3
* | | | | | | KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCSVitaly Kuznetsov2022-01-281-0/+1
* | | | | | | KVM: x86: add system attribute to retrieve full set of supported xsave statesPaolo Bonzini2022-01-281-0/+51
* | | | | | | KVM: x86: Add a helper to retrieve userspace address from kvm_device_attrSean Christopherson2022-01-281-6/+14
* | | | | | | KVM: x86: Sync the states size with the XCR0/IA32_XSS at, any timeLike Xu2022-01-261-2/+2
* | | | | | | KVM: x86: Update vCPU's runtime CPUID on write to MSR_IA32_XSSLike Xu2022-01-261-0/+1
* | | | | | | KVM: x86: Keep MSR_IA32_XSS unchanged for INITXiaoyao Li2022-01-261-2/+1
* | | | | | | KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2}Sean Christopherson2022-01-261-2/+8
* | | | | | | KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02Sean Christopherson2022-01-261-10/+12
* | | | | | | KVM: x86: Check .flags in kvm_cpuid_check_equal() tooVitaly Kuznetsov2022-01-261-0/+1
* | | | | | | KVM: x86: Forcibly leave nested virt when SMM state is toggledSean Christopherson2022-01-265-7/+11
* | | | | | | KVM: SVM: drop unnecessary code in svm_hv_vmcb_dirty_nested_enlightenments()Vitaly Kuznetsov2022-01-262-13/+1
* | | | | | | KVM: SVM: hyper-v: Enable Enlightened MSR-Bitmap support for realVitaly Kuznetsov2022-01-261-0/+3
* | | | | | | KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermodeSean Christopherson2022-01-261-1/+15
* | | | | | | KVM: SVM: Don't apply SEV+SMAP workaround on code fetch or PT accessSean Christopherson2022-01-261-9/+34
* | | | | | | KVM: SVM: Inject #UD on attempted emulation for SEV guest w/o insn bufferSean Christopherson2022-01-261-34/+55
* | | | | | | KVM: SVM: WARN if KVM attempts emulation on #UD or #GP for SEV guestsSean Christopherson2022-01-261-0/+5
* | | | | | | KVM: x86: Pass emulation type to can_emulate_instruction()Sean Christopherson2022-01-263-6/+15
* | | | | | | KVM: SVM: Explicitly require DECODEASSISTS to enable SEV supportSean Christopherson2022-01-261-2/+7
* | | | | | | KVM: SVM: Don't intercept #GP for SEV guestsSean Christopherson2022-01-261-3/+8
* | | | | | | Revert "KVM: SVM: avoid infinite loop on NPF from bad address"Sean Christopherson2022-01-261-7/+0
* | | | | | | KVM: SVM: Never reject emulation due to SMAP errata for !SEV guestsSean Christopherson2022-01-261-4/+6
* | | | | | | KVM: x86: nSVM: skip eax alignment check for non-SVM instructionsDenis Valeev2022-01-261-5/+6