index
:
starfive-tech/linux.git
JH7100_VisionFive_OH_dev
JH7110_VisionFive2_510_devel
JH7110_VisionFive2_6.1.y_devel
JH7110_VisionFive2_6.6.y_devel
JH7110_VisionFive2_devel
JH7110_VisionFive2_upstream
beaglev-5.13.y
beaglev_fedora_devel
buildroot-upstream
esmil_starlight
fedora-vic-7100_5.10.6
master
openwrt-6.1.y
rt-ethercat-release
rt-linux-6.6.y-release
rt-linux-release
rtthread_AMP
starfive-5.13
starfive-5.15-dubhe
starfive-6.1-dubhe
starfive-6.1.65-dubhe
starfive-6.6.10-dubhe
starfive-6.6.31-dubhe
starfive-6.6.48-dubhe
starlight-5.14.y
visionfive
visionfive-5.13.y-devel
visionfive-5.15.y
visionfive-5.15.y-devel
visionfive-5.15.y_fedora_devel
visionfive-5.16.y
visionfive-5.17.y
visionfive-5.18.y
visionfive-5.19.y
visionfive-6.4.y
visionfive_fedora_devel
StarFive Tech Linux Kernel for VisionFive (JH7110) boards (mirror)
Andrey V.Kosteltsev
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
arch
/
x86
/
kvm
Age
Commit message (
Expand
)
Author
Files
Lines
2024-07-16
Merge tag 'x86_alternatives_for_v6.11_rc1' of git://git.kernel.org/pub/scm/li...
Linus Torvalds
1
-1
/
+1
2024-07-01
x86/alternatives, kvm: Fix a couple of CALLs without a frame pointer
Borislav Petkov (AMD)
1
-1
/
+1
2024-06-21
KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests
Michael Roth
1
-2
/
+2
2024-06-20
KVM: x86: Always sync PIR to IRR prior to scanning I/O APIC routes
Sean Christopherson
1
-5
/
+4
2024-06-05
KVM: x86/mmu: Don't save mmu_invalidate_seq after checking private attr
Tao Su
1
-3
/
+0
2024-06-03
Merge branch 'kvm-fixes-6.10-1' into HEAD
Paolo Bonzini
13
-68
/
+159
2024-06-03
KVM: x86: Drop support for hand tuning APIC timer advancement from userspace
Sean Christopherson
3
-29
/
+23
2024-06-03
KVM: SEV-ES: Delegate LBR virtualization to the processor
Ravi Bangoria
3
-7
/
+17
2024-06-03
KVM: SEV-ES: Disallow SEV-ES guests when X86_FEATURE_LBRV is absent
Ravi Bangoria
3
-9
/
+14
2024-06-03
KVM: SEV-ES: Prevent MSR access post VMSA encryption
Nikunj A Dadhania
1
-0
/
+18
2024-05-23
KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked
Sean Christopherson
1
-8
/
+19
2024-05-23
KVM: x86: Force KVM_WERROR if the global WERROR is enabled
Sean Christopherson
1
-1
/
+2
2024-05-23
KVM: x86: Disable KVM_INTEL_PROVE_VE by default
Sean Christopherson
1
-3
/
+5
2024-05-23
KVM: x86/mmu: Print SPTEs on unexpected #VE
Sean Christopherson
2
-8
/
+37
2024-05-23
KVM: VMX: Dump VMCS on unexpected #VE
Sean Christopherson
1
-1
/
+3
2024-05-23
KVM: x86/mmu: Add sanity checks that KVM doesn't create EPT #VE SPTEs
Sean Christopherson
3
-0
/
+14
2024-05-23
KVM: nVMX: Always handle #VEs in L0 (never forward #VEs from L2 to L1)
Sean Christopherson
1
-0
/
+2
2024-05-23
KVM: nVMX: Initialize #VE info page for vmcs02 when proving #VE support
Sean Christopherson
1
-0
/
+3
2024-05-23
KVM: VMX: Don't kill the VM on an unexpected #VE
Sean Christopherson
1
-2
/
+2
2024-05-23
KVM: x86/mmu: Use SHADOW_NONPRESENT_VALUE for atomic zap in TDP MMU
Isaku Yamahata
1
-1
/
+1
2024-05-23
tracing/treewide: Remove second parameter of __assign_str()
Steven Rostedt (Google)
1
-1
/
+1
2024-05-16
Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm
Linus Torvalds
26
-776
/
+1333
2024-05-12
Merge tag 'kvm-x86-misc-6.10' of https://github.com/kvm-x86/linux into HEAD
Paolo Bonzini
6
-30
/
+52
2024-05-12
Merge tag 'kvm-x86-mmu-6.10' of https://github.com/kvm-x86/linux into HEAD
Paolo Bonzini
2
-29
/
+66
2024-05-12
Merge tag 'kvm-x86-vmx-6.10' of https://github.com/kvm-x86/linux into HEAD
Paolo Bonzini
4
-13
/
+34
2024-05-10
Merge tag 'loongarch-kvm-6.10' of git://git.kernel.org/pub/scm/linux/kernel/g...
Paolo Bonzini
17
-115
/
+159
2024-05-10
Merge branch 'kvm-sev-es-ghcbv2' into HEAD
Paolo Bonzini
2
-11
/
+102
2024-05-10
Merge branch 'kvm-coco-pagefault-prep' into HEAD
Paolo Bonzini
5
-77
/
+149
2024-05-10
Merge branch 'kvm-vmx-ve' into HEAD
Paolo Bonzini
9
-41
/
+137
2024-05-07
KVM: SEV: Allow per-guest configuration of GHCB protocol version
Michael Roth
2
-3
/
+30
2024-05-07
KVM: SEV: Add GHCB handling for termination requests
Michael Roth
1
-0
/
+9
2024-05-07
KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
Brijesh Singh
1
-0
/
+14
2024-05-07
KVM: SEV: Add support to handle AP reset MSR protocol
Tom Lendacky
2
-8
/
+49
2024-05-07
KVM: x86: Explicitly zero kvm_caps during vendor module load
Sean Christopherson
1
-0
/
+7
2024-05-07
KVM: x86: Fully re-initialize supported_mce_cap on vendor module load
Sean Christopherson
1
-3
/
+2
2024-05-07
KVM: x86: Fully re-initialize supported_vm_types on vendor module load
Sean Christopherson
1
-1
/
+2
2024-05-07
KVM: x86/mmu: Sanity check that __kvm_faultin_pfn() doesn't create noslot pfns
Sean Christopherson
1
-1
/
+1
2024-05-07
KVM: x86/mmu: Initialize kvm_page_fault's pfn and hva to error values
Sean Christopherson
1
-0
/
+3
2024-05-07
KVM: x86/mmu: Set kvm_page_fault.hva to KVM_HVA_ERR_BAD for "no slot" faults
Sean Christopherson
1
-0
/
+1
2024-05-07
KVM: x86/mmu: Handle no-slot faults at the beginning of kvm_faultin_pfn()
Sean Christopherson
1
-12
/
+17
2024-05-07
KVM: x86/mmu: Move slot checks from __kvm_faultin_pfn() to kvm_faultin_pfn()
Sean Christopherson
1
-43
/
+44
2024-05-07
KVM: x86/mmu: Explicitly disallow private accesses to emulated MMIO
Sean Christopherson
1
-0
/
+5
2024-05-07
KVM: x86/mmu: Don't force emulation of L2 accesses to non-APIC internal slots
Sean Christopherson
1
-4
/
+13
2024-05-07
KVM: x86/mmu: Move private vs. shared check above slot validity checks
Sean Christopherson
1
-5
/
+15
2024-05-07
KVM: x86/mmu: WARN and skip MMIO cache on private, reserved page faults
Sean Christopherson
1
-0
/
+3
2024-05-07
KVM: x86/mmu: check for invalid async page faults involving private memory
Paolo Bonzini
1
-7
/
+11
2024-05-07
KVM: x86/mmu: Use synthetic page fault error code to indicate private faults
Sean Christopherson
2
-1
/
+15
2024-05-07
KVM: x86/mmu: WARN if upper 32 bits of legacy #PF error code are non-zero
Sean Christopherson
1
-0
/
+7
2024-05-07
KVM: x86/mmu: Pass full 64-bit error code when handling page faults
Isaku Yamahata
3
-5
/
+4
2024-05-07
KVM: x86: Move synthetic PFERR_* sanity checks to SVM's #NPF handler
Sean Christopherson
2
-11
/
+12
[next]