mirror-linux/arch/x86/kvm
Paolo Bonzini 4b7d440de2 KVM TDX fixes for 6.16
- Fix a formatting goof in the TDX documentation.
 
  - Reject KVM_SET_TSC_KHZ for guests with a protected TSC (currently only TDX).
 
  - Ensure struct kvm_tdx_capabilities fields that are not explicitly set by KVM
    are zeroed.
 -----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCgAdFiEEKTobbabEP7vbhhN9OlYIJqCjN/0FAmh5C9oACgkQOlYIJqCj
 N/1IlRAArAgX2C69qzTWougXFbwl0qiJhY3RpM+jCkiQsSkgICs8kTBSp5OFDRKE
 njtMvdCrhDSXGabRmOlTOjlbauZUU7Ady9Z9GIevVskTu/feknU3I33CQJMBUjCI
 49NG3o3p1vUWluK+WzzclHeojgAFVrPdoWZ3SLhgZf/N9s/hElI46bqpNN/zZOYd
 x2oDC1YJiRDoQmAF/hGDZxvQSZB7ZWvufUEi/lFomjSbWMecn26ynNaFe8jMdjyj
 cBXmsIn41qLMOdVZt+C5h7btcSar1uf0CZ4BfgZbKiAwZn6YH76rzBrAARP15rsI
 iKRfnOTaENx2SkKEX17Xlh1mOFKIMFP5wl2oQbW0pHMEObdUgIcwUlzOtKHmN/Nz
 dCN3W1sYat0fGec4lcx7emNmDDW8EfhmznS9eGo67okGKEbtUnzsDR01Ob335oVN
 F8ORqT1vthn2d3Na1FyAo3a5NKhL2/J67lNThDKzfdiQ7UxYeTjsFW4ys3Li6jDM
 H+LIcXpxLfEwbesbuCHAoyPbAcROFLuNgbTBr1CNm3zsfeqHzxeZAk7aUX6wbBV1
 +F7C7ANfvhae8OBkZoAgJJ3aJEbeloXboQUiijzM12l6Qz+shcpfqmIy5ZrZHQeI
 SKJhHlKDa11vy488sT23Pz1go23sQU83ZbB0x7sdcyOH+1dqCYQ=
 =V3cQ
 -----END PGP SIGNATURE-----

Merge tag 'kvm-x86-fixes-6.16-rc7' of https://github.com/kvm-x86/linux into HEAD

KVM TDX fixes for 6.16

 - Fix a formatting goof in the TDX documentation.

 - Reject KVM_SET_TSC_KHZ for guests with a protected TSC (currently only TDX).

 - Ensure struct kvm_tdx_capabilities fields that are not explicitly set by KVM
   are zeroed.
2025-07-17 17:06:13 +02:00
..
mmu KVM: x86/mmu: Reject direct bits in gpa passed to KVM_PRE_FAULT_MEMORY 2025-06-12 00:51:42 -04:00
svm ARM: 2025-07-10 09:06:53 -07:00
vmx KVM TDX fixes for 6.16 2025-07-17 17:06:13 +02:00
.gitignore
Kconfig Merge branch 'kvm-tdx-initial' into HEAD 2025-04-07 07:36:33 -04:00
Makefile KVM: VMX: Initialize TDX during KVM module load 2025-03-14 14:20:50 -04:00
cpuid.c KVM: SVM: Advertise TSA CPUID bits to guests 2025-06-17 17:17:12 +02:00
cpuid.h Merge branch 'kvm-tdx-initial' into HEAD 2025-04-07 07:36:33 -04:00
debugfs.c
emulate.c KVM: x86: Plumb the emulator's starting RIP into nested intercept checks 2025-02-24 09:01:07 -08:00
fpu.h
hyperv.c KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush 2025-06-25 09:15:24 -07:00
hyperv.h
i8254.c KVM: x86: Switch to use hrtimer_setup() 2025-02-18 10:32:31 +01:00
i8254.h
i8259.c KVM: x86: Wake vCPU for PIC interrupt injection iff a valid IRQ was found 2025-02-12 10:05:01 -08:00
ioapic.c KVM: x86: Add a helper to deduplicate I/O APIC EOI interception logic 2025-04-24 11:18:36 -07:00
ioapic.h KVM: x86: Add a helper to deduplicate I/O APIC EOI interception logic 2025-04-24 11:18:36 -07:00
irq.c KVM: TDX: Add support for find pending IRQ in a protected local APIC 2025-03-14 14:20:55 -04:00
irq.h
irq_comm.c KVM: x86: Rescan I/O APIC routes after EOI interception for old routing 2025-04-24 11:18:36 -07:00
kvm-asm-offsets.c
kvm_cache_regs.h KVM: x86: Add lockdep-guarded asserts on register cache usage 2024-11-01 09:22:22 -07:00
kvm_emulate.h KVM: x86: Add a #define for the architectural max instruction length 2025-02-24 09:01:07 -08:00
kvm_onhyperv.c
kvm_onhyperv.h
lapic.c KVM x86 posted interrupt changes for 6.16: 2025-05-27 12:15:01 -04:00
lapic.h x86/irq: KVM: Track PIR bitmap as an "unsigned long" array 2025-04-24 11:19:38 -07:00
mmu.h LoongArch KVM changes for v6.16 2025-05-26 16:12:13 -04:00
mtrr.c KVM: x86: drop x86.h include from cpuid.h 2024-11-01 09:22:23 -07:00
pmu.c KVM: x86/pmu: Drop now-redundant refresh() during init() 2024-12-18 14:19:33 -08:00
pmu.h
reverse_cpuid.h KVM: SVM: Advertise TSA CPUID bits to guests 2025-06-17 17:17:12 +02:00
smm.c KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception 2025-04-24 11:17:58 -07:00
smm.h KVM: TDX: Handle SMI request as !CONFIG_KVM_SMM 2025-03-14 14:20:56 -04:00
trace.h KVM: x86: Do not use kvm_rip_read() unconditionally in KVM tracepoints 2025-04-24 09:52:31 -04:00
tss.h
x86.c KVM TDX fixes for 6.16 2025-07-17 17:06:13 +02:00
x86.h KVM: x86: Generalize IBRS virtualization on emulated VM-exit 2025-04-24 11:18:32 -07:00
xen.c KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table. 2025-06-24 12:20:17 -07:00
xen.h KVM: x86: Update Xen TSC leaves during CPUID emulation 2025-02-25 07:09:55 -08:00