summaryrefslogtreecommitdiffstats
path: root/arch (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2021-05-01144-3489/+7794
|\
| * KVM: x86: Take advantage of kvm_arch_dy_has_pending_interrupt()Haiwei Li2021-04-261-12/+9
| * KVM: SVM: Skip SEV cache flush if no ASIDs have been usedSean Christopherson2021-04-261-12/+13
| * KVM: SVM: Remove an unnecessary prototype declaration of sev_flush_asids()Sean Christopherson2021-04-261-1/+0
| * KVM: SVM: Drop redundant svm_sev_enabled() helperSean Christopherson2021-04-262-8/+3
| * KVM: SVM: Move SEV VMCB tracking allocation to sev.cSean Christopherson2021-04-263-8/+20
| * KVM: SVM: Explicitly check max SEV ASID during sev_hardware_setup()Sean Christopherson2021-04-261-2/+1
| * KVM: SVM: Unconditionally invoke sev_hardware_teardown()Sean Christopherson2021-04-261-2/+1
| * KVM: SVM: Enable SEV/SEV-ES functionality by default (when supported)Sean Christopherson2021-04-261-2/+2
| * KVM: SVM: Condition sev_enabled and sev_es_enabled on CONFIG_KVM_AMD_SEV=ySean Christopherson2021-04-261-1/+8
| * KVM: SVM: Append "_enabled" to module-scoped SEV/SEV-ES control variablesSean Christopherson2021-04-261-12/+12
| * KVM: SEV: Mask CPUID[0x8000001F].eax according to supported featuresPaolo Bonzini2021-04-265-1/+20
| * KVM: SVM: Move SEV module params/variables to sev.cSean Christopherson2021-04-263-16/+13
| * KVM: SVM: Disable SEV/SEV-ES if NPT is disabledSean Christopherson2021-04-261-15/+15
| * KVM: SVM: Free sev_asid_bitmap during init if SEV setup failsSean Christopherson2021-04-261-1/+4
| * KVM: SVM: Zero out the VMCB array used to track SEV ASID associationSean Christopherson2021-04-261-3/+2
| * x86/sev: Drop redundant and potentially misleading 'sev_enabled'Sean Christopherson2021-04-263-8/+4
| * KVM: x86: Move reverse CPUID helpers to separate header fileRicardo Koller2021-04-262-176/+186
| * KVM: x86: Rename GPR accessors to make mode-aware variants the defaultsSean Christopherson2021-04-267-36/+41
| * KVM: SVM: Use default rAX size for INVLPGA emulationSean Christopherson2021-04-261-3/+9
| * KVM: x86/xen: Drop RAX[63:32] when processing hypercallSean Christopherson2021-04-261-1/+1
| * KVM: nVMX: Truncate base/index GPR value on address calc in !64-bitSean Christopherson2021-04-261-2/+2
| * KVM: nVMX: Truncate bits 63:32 of VMCS field on nested check in !64-bitSean Christopherson2021-04-261-1/+1
| * KVM: VMX: Truncate GPR value for DR and CR reads in !64-bit modeSean Christopherson2021-04-261-3/+3
| * KVM: SVM: Truncate GPR value for DR and CR accesses in !64-bit modeSean Christopherson2021-04-261-4/+4
| * KVM: x86: Check CR3 GPA for validity regardless of vCPU modeSean Christopherson2021-04-261-3/+8
| * KVM: x86: Remove emulator's broken checks on CR0/CR3/CR4 loadsSean Christopherson2021-04-261-77/+3
| * KVM: VMX: Intercept FS/GS_BASE MSR accesses for 32-bit KVMSean Christopherson2021-04-262-0/+6
| * KVM: SVM: Delay restoration of host MSR_TSC_AUX until return to userspaceSean Christopherson2021-04-262-36/+24
| * KVM: SVM: Clear MSR_TSC_AUX[63:32] on writeSean Christopherson2021-04-261-1/+11
| * KVM: SVM: Inject #GP on guest MSR_TSC_AUX accesses if RDTSCP unsupportedSean Christopherson2021-04-261-0/+7
| * KVM: VMX: Invert the inlining of MSR interception helpersSean Christopherson2021-04-262-17/+15
| * KVM: X86: Fix failure to boost kernel lock holder candidate in SEV-ES guestsWanpeng Li2021-04-261-0/+3
| * KVM: x86: Properly handle APF vs disabled LAPIC situationVitaly Kuznetsov2021-04-262-1/+7
| * KVM: x86: Fix implicit enum conversion goof in scattered reverse CPUID codeSean Christopherson2021-04-232-3/+4
| * KVM: VMX: use EPT_VIOLATION_GVA_TRANSLATED instead of 0x100Isaku Yamahata2021-04-231-1/+1
| * Merge tag 'kvmarm-5.13' of git://git.kernel.org/pub/scm/linux/kernel/git/kvma...Paolo Bonzini2021-04-2389-657/+3317
| |\
| | * Merge branch 'kvm-arm64/kill_oprofile_dependency' into kvmarm-master/nextMarc Zyngier2021-04-224-47/+2
| | |\
| | | * sh: Get rid of oprofile leftoversMarc Zyngier2021-04-221-18/+0
| | | * s390: Get rid of oprofile leftoversMarc Zyngier2021-04-221-21/+0
| | | * KVM: arm64: Divorce the perf code from oprofile helpersMarc Zyngier2021-04-222-7/+2
| | * | Merge remote-tracking branch 'arm64/for-next/neon-softirqs-disabled' into kvm...Marc Zyngier2021-04-138-85/+39
| | |\ \
| | * \ \ Merge remote-tracking branch 'arm64/for-next/vhe-only' into kvmarm-master/nextMarc Zyngier2021-04-136-27/+88
| | |\ \ \
| | * \ \ \ Merge branch 'kvm-arm64/vlpi-save-restore' into kvmarm-master/nextMarc Zyngier2021-04-134-9/+102
| | |\ \ \ \
| | | * | | | KVM: arm64: GICv4.1: Give a chance to save VLPI stateShenming Lu2021-03-241-3/+3
| | | * | | | KVM: arm64: GICv4.1: Restore VLPI pending state to physical sideZenghui Yu2021-03-241-0/+19
| | | * | | | KVM: arm64: GICv4.1: Try to save VLPI state in save_pending_tablesShenming Lu2021-03-241-6/+60
| | | * | | | KVM: arm64: GICv4.1: Add function to get VLPI stateShenming Lu2021-03-242-0/+20
| | | | |_|/ | | | |/| |
| | * | | | Merge branch 'kvm-arm64/vgic-5.13' into kvmarm-master/nextMarc Zyngier2021-04-135-44/+67
| | |\ \ \ \
| | | * | | | KVM: arm/arm64: Fix KVM_VGIC_V3_ADDR_TYPE_REDIST readEric Auger2021-04-131-2/+2