summaryrefslogtreecommitdiffstats
path: root/arch (follow)
Commit message (Expand)AuthorAgeFilesLines
* KVM: nVMX: Request immediate exit iff pending nested event needs injectionSean Christopherson2024-06-283-4/+4
* KVM: nVMX: Add a helper to get highest pending from Posted Interrupt vectorSean Christopherson2024-06-282-2/+13
* KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in vmx_exit()Kai Huang2024-06-281-1/+1
* KVM: VMX: Remove unnecessary INVEPT[GLOBAL] from hardware enable pathSean Christopherson2024-06-281-3/+0
* KVM: nVMX: Update VMCS12_REVISION comment to state it should never changeSean Christopherson2024-06-281-6/+8
* Merge branch 'kvm-6.10-fixes' into HEADPaolo Bonzini2024-06-2025-86/+401
|\
| * KVM: x86: Always sync PIR to IRR prior to scanning I/O APIC routesSean Christopherson2024-06-201-5/+4
| * KVM: x86/mmu: Don't save mmu_invalidate_seq after checking private attrTao Su2024-06-051-3/+0
| * Merge tag 'kvmarm-fixes-6.10-1' of git://git.kernel.org/pub/scm/linux/kernel/...Paolo Bonzini2024-06-0521-73/+391
| |\
| | * KVM: arm64: Ensure that SME controls are disabled in protected modeFuad Tabba2024-06-042-0/+18
| | * KVM: arm64: Refactor CPACR trap bit setting/clearing to use ELx formatFuad Tabba2024-06-046-19/+14
| | * KVM: arm64: Consolidate initializing the host data's fpsimd_state/sve in pKVMFuad Tabba2024-06-045-21/+22
| | * KVM: arm64: Eagerly restore host fpsimd/sve state in pKVMFuad Tabba2024-06-044-5/+93
| | * KVM: arm64: Allocate memory mapped at hyp for host sve state in pKVMFuad Tabba2024-06-047-0/+124
| | * KVM: arm64: Specialize handling of host fpsimd state on trapFuad Tabba2024-06-043-1/+13
| | * KVM: arm64: Abstract set/clear of CPTR_EL2 bits behind helperFuad Tabba2024-06-044-19/+73
| | * KVM: arm64: Fix prototype for __sve_save_state/__sve_restore_stateFuad Tabba2024-06-042-3/+4
| | * KVM: arm64: Reintroduce __sve_save_stateFuad Tabba2024-06-042-0/+7
| | * KVM: arm64: nv: Expose BTI and CSV_frac to a guest hypervisorMarc Zyngier2024-05-301-2/+4
| | * KVM: arm64: nv: Fix relative priorities of exceptions generated by ERETAxMarc Zyngier2024-05-301-10/+11
| | * KVM: arm64: AArch32: Fix spurious trapping of conditional instructionsMarc Zyngier2024-05-271-2/+16
| | * KVM: arm64: Allow AArch32 PSTATE.M to be restored as System modeMarc Zyngier2024-05-271-0/+1
| | * KVM: arm64: Fix AArch32 register narrowing on userspace writeMarc Zyngier2024-05-271-1/+1
| * | Merge tag 'kvm-riscv-fixes-6.10-1' of https://github.com/kvm-riscv/linux into...Paolo Bonzini2024-06-032-5/+6
| |\ \
| | * | RISC-V: KVM: Fix incorrect reg_subtype labels in kvm_riscv_vcpu_set_reg_isa_e...Quan Zhou2024-05-311-2/+2
| | * | RISC-V: KVM: No need to use mask when hart-index-bit is 0Yong-Xuan Wang2024-05-311-3/+4
| | |/
| * | Merge branch 'kvm-fixes-6.10-1' into HEADPaolo Bonzini2024-06-0315-69/+161
| |\ \
* | | | KVM: x86/tdp_mmu: Sprinkle __must_checkIsaku Yamahata2024-06-201-6/+7
* | | | KVM: SNP: Fix LBR Virtualization for SNP guestRavi Bangoria2024-06-051-0/+8
* | | | Merge branch 'kvm-6.11-sev-snp' into HEADPaolo Bonzini2024-06-0314-25/+1614
|\ \ \ \
| * | | | KVM: SVM: Remove the need to trigger an UNBLOCK event on AP creationTom Lendacky2024-06-033-23/+1
| * | | | KVM: SEV: Don't WARN() if RMP lookup fails when invalidating gmem pagesPaolo Bonzini2024-06-031-5/+4
| * | | | KVM: SEV: Automatically switch reclaimed pages to sharedMichael Roth2024-06-031-24/+31
| * | | | KVM: SVM: Add module parameter to enable SEV-SNPBrijesh Singh2024-05-121-1/+2
| * | | | KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNPAshish Kalra2024-05-121-1/+7
| * | | | KVM: x86: Implement hook for determining max NPT mapping levelMichael Roth2024-05-123-0/+21
| * | | | KVM: SEV: Implement gmem hook for invalidating private pagesMichael Roth2024-05-124-0/+68
| * | | | KVM: SEV: Implement gmem hook for initializing private pagesMichael Roth2024-05-125-0/+111
| * | | | KVM: SEV: Support SEV-SNP AP Creation NAE eventTom Lendacky2024-05-126-3/+266
| * | | | KVM: SEV: Add support to handle RMP nested page faultsBrijesh Singh2024-05-129-6/+159
| * | | | KVM: SEV: Add support to handle Page State Change VMGEXITMichael Roth2024-05-123-0/+204
| * | | | KVM: SEV: Add support to handle MSR based Page State Change VMGEXITMichael Roth2024-05-122-0/+54
| * | | | KVM: SEV: Add support to handle GHCB GPA register VMGEXITBrijesh Singh2024-05-123-6/+57
| * | | | KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH commandBrijesh Singh2024-05-122-0/+144
| * | | | KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE commandBrijesh Singh2024-05-122-0/+249
| * | | | KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START commandBrijesh Singh2024-05-123-3/+185
| * | | | KVM: SEV: Add initial SEV-SNP supportBrijesh Singh2024-05-125-3/+42
| * | | | KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=yMichael Roth2024-05-121-0/+1
| * | | | KVM: MMU: Disable fast path if KVM_EXIT_MEMORY_FAULT is neededMichael Roth2024-05-121-2/+22
| * | | | Merge branch 'kvm-coco-hooks' into HEADPaolo Bonzini2024-05-124-2/+40
| |\ \ \ \