summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/svm
AgeCommit message (Expand)AuthorLines
2026-04-13KVM: x86: use inlines instead of macros for is_sev_*guestPaolo Bonzini-3/+13
2026-04-13Merge tag 'kvm-x86-svm-7.1' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini-268/+387
2026-04-13Merge tag 'kvm-x86-vmxon-7.1' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini-32/+13
2026-04-13Merge tag 'kvm-x86-nested-7.1' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini-399/+665
2026-04-13Merge tag 'kvm-x86-mmio-7.1' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini-14/+6
2026-04-13Merge tag 'kvm-x86-misc-7.1' of https://github.com/kvm-x86/linux into HEADPaolo Bonzini-29/+22
2026-04-09KVM: SEV: Goto an existing error label if charging misc_cg for an ASID failsSean Christopherson-6/+5
2026-04-09KVM: SVM: Move lock-protected allocation of SEV ASID into a separate helperCarlos López-14/+23
2026-04-09KVM: SEV: use mutex guard in snp_handle_guest_req()Carlos López-15/+8
2026-04-09KVM: SEV: use mutex guard in sev_mem_enc_unregister_region()Carlos López-15/+5
2026-04-09KVM: SEV: use mutex guard in sev_mem_enc_ioctl()Carlos López-17/+8
2026-04-09KVM: SEV: use mutex guard in snp_launch_update()Carlos López-19/+12
2026-04-09KVM: SEV: Assert that kvm->lock is held when querying SEV+ supportSean Christopherson-0/+25
2026-04-09KVM: SEV: Document that checking for SEV+ guests when reclaiming memory is "s...Sean Christopherson-1/+7
2026-04-09KVM: SEV: Hide "struct kvm_sev_info" behind CONFIG_KVM_AMD_SEV=ySean Christopherson-1/+7
2026-04-09KVM: SEV: WARN on unhandled VM type when initializing VMSean Christopherson-11/+18
2026-04-08KVM: SEV: Move SEV-specific VM initialization to sev.cSean Christopherson-11/+18
2026-04-08KVM: SEV: Move standard VM-scoped helpers to detect SEV+ guests to sev.cSean Christopherson-17/+14
2026-04-08KVM: SEV: Document the SEV-ES check when querying SMM support as "safe"Sean Christopherson-2/+10
2026-04-08KVM: SEV: Add quad-underscore version of VM-scoped APIs to detect SEV+ guestsSean Christopherson-7/+21
2026-04-08KVM: SEV: Provide vCPU-scoped accessors for detecting SEV+ guestsSean Christopherson-64/+82
2026-04-08KVM: SEV: Lock all vCPUs for the duration of SEV-ES VMSA synchronizationSean Christopherson-8/+7
2026-04-08KVM: SEV: Lock all vCPUs when synchronzing VMSAs for SNP launch finishSean Christopherson-4/+12
2026-04-03KVM: nSVM: Fail emulation of VMRUN/VMLOAD/VMSAVE if mapping vmcb12 failsYosry Ahmed-8/+4
2026-04-03KVM: SVM: Treat mapping failures equally in VMLOAD/VMSAVE emulationYosry Ahmed-4/+2
2026-04-03KVM: SVM: Check EFER.SVME and CPL on #GP intercept of SVM instructionsYosry Ahmed-0/+8
2026-04-03KVM: SVM: Move RAX legality check to SVM insn interception handlersYosry Ahmed-5/+21
2026-04-03KVM: SVM: Properly check RAX on #GP intercept of SVM instructionsYosry Ahmed-2/+2
2026-04-03KVM: SVM: Refactor SVM instruction handling on #GP interceptYosry Ahmed-51/+26
2026-04-03KVM: SEV: Disallow LAUNCH_FINISH if vCPUs are actively being createdSean Christopherson-2/+8
2026-04-03KVM: SEV: Protect *all* of sev_mem_enc_register_region() with kvm->lockSean Christopherson-4/+2
2026-04-03KVM: SEV: Reject attempts to sync VMSA of an already-launched/encrypted vCPUSean Christopherson-0/+3
2026-04-03KVM: SEV: Use kvzalloc_objs() when pinning userpagesSean Christopherson-11/+9
2026-04-03KVM: SEV: Use PFN_DOWN() to simplify "number of pages" math when pinning memorySean Christopherson-5/+2
2026-04-03KVM: SEV: Disallow pinning more pages than exist in the systemSean Christopherson-5/+9
2026-04-03KVM: SEV: Drop useless sanity checks in sev_mem_enc_register_region()Sean Christopherson-3/+0
2026-04-03KVM: SEV: Drop WARN on large size for KVM_MEMORY_ENCRYPT_REG_REGIONSean Christopherson-4/+7
2026-04-03KVM: x86: Suppress WARNs on nested_run_pending after userspace exitSean Christopherson-5/+8
2026-04-03KVM: x86: Move nested_run_pending to kvm_vcpu_archYosry Ahmed-21/+17
2026-03-13KVM: nSVM: Simplify error handling of nested_svm_copy_vmcb12_to_cache()Yosry Ahmed-11/+12
2026-03-13KVM: SVM: Add a helper to get LBR field pointer to dedup MSR accessesSean Christopherson-29/+20
2026-03-12KVM: x86: Move some EFER bits enablement to common codeYosry Ahmed-7/+0
2026-03-11KVM: x86: clarify leave_smm() return valuePaolo Bonzini-3/+3
2026-03-11KVM: SVM: check validity of VMCB controls when returning from SMMPaolo Bonzini-2/+15
2026-03-11KVM: SVM: Set/clear CR8 write interception when AVIC is (de)activatedSean Christopherson-5/+9
2026-03-11KVM: SVM: Initialize AVIC VMCB fields if AVIC is enabled with in-kernel APICSean Christopherson-2/+2
2026-03-04KVM: SVM: Triple fault L1 on unintercepted EFER.SVME clear by L2Yosry Ahmed-0/+13
2026-03-04KVM: x86: SVM: Remove vmcb_is_dirty()Jim Mattson-5/+0
2026-03-04KVM: nSVM: Only copy SVM_MISC_ENABLE_NP from VMCB01's misc_ctlYosry Ahmed-2/+10
2026-03-04KVM: nSVM: Sanitize INT/EVENTINJ fields when copying from vmcb12Yosry Ahmed-4/+4