summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* KVM: Call kvm_arch_flush_shadow_memslot() on the old slot in kvm_invalidate_m...Maciej S. Szmigiero2021-12-081-1/+1
* KVM: Keep memslots in tree-based structures instead of array-based onesMaciej S. Szmigiero2021-12-0811-478/+503
* KVM: s390: Introduce kvm_s390_get_gfn_end()Maciej S. Szmigiero2021-12-083-4/+14
* KVM: Use interval tree to do fast hva lookup in memslotsMaciej S. Szmigiero2021-12-087-14/+47
* KVM: Resolve memslot ID via a hash table instead of via a static arrayMaciej S. Szmigiero2021-12-082-29/+91
* KVM: Move WARN on invalid memslot index to update_memslots()Maciej S. Szmigiero2021-12-081-2/+4
* KVM: Integrate gfn_to_memslot_approx() into search_memslots()Maciej S. Szmigiero2021-12-083-46/+36
* KVM: x86: Use nr_memslot_pages to avoid traversing the memslots arrayMaciej S. Szmigiero2021-12-083-29/+8
* KVM: x86: Don't call kvm_mmu_change_mmu_pages() if the count hasn't changedMaciej S. Szmigiero2021-12-081-1/+2
* KVM: Don't make a full copy of the old memslot in __kvm_set_memory_region()Sean Christopherson2021-12-081-22/+13
* KVM: s390: Skip gfn/size sanity checks on memslot DELETE or FLAGS_ONLYSean Christopherson2021-12-081-4/+9
* KVM: x86: Don't assume old/new memslots are non-NULL at memslot commitSean Christopherson2021-12-081-4/+6
* KVM: Use prepare/commit hooks to handle generic memslot metadata updatesSean Christopherson2021-12-081-43/+66
* KVM: Stop passing kvm_userspace_memory_region to arch memslot hooksSean Christopherson2021-12-088-19/+4
* KVM: RISC-V: Use "new" memslot instead of userspace memory regionSean Christopherson2021-12-081-9/+13
* KVM: x86: Use "new" memslot instead of userspace memory regionSean Christopherson2021-12-081-4/+3
* KVM: s390: Use "new" memslot instead of userspace memory regionSean Christopherson2021-12-081-5/+8
* KVM: PPC: Avoid referencing userspace memory region in memslot updatesSean Christopherson2021-12-086-23/+7
* KVM: MIPS: Drop pr_debug from memslot commit to avoid using "mem"Sean Christopherson2021-12-081-4/+0
* KVM: arm64: Use "new" memslot instead of userspace memory regionSean Christopherson2021-12-081-4/+6
* KVM: Let/force architectures to deal with arch specific memslot dataSean Christopherson2021-12-0813-42/+59
* KVM: Use "new" memslot's address space ID instead of dedicated paramSean Christopherson2021-12-081-13/+9
* KVM: Resync only arch fields when slots_arch_lock gets reacquiredMaciej S. Szmigiero2021-12-081-20/+25
* KVM: Open code kvm_delete_memslot() into its only callerSean Christopherson2021-12-081-25/+17
* KVM: Require total number of memslot pages to fit in an unsigned longSean Christopherson2021-12-082-0/+20
* KVM: Convert kvm_for_each_vcpu() to using xa_for_each_range()Marc Zyngier2021-12-081-5/+3
* KVM: Use 'unsigned long' as kvm_for_each_vcpu()'s indexMarc Zyngier2021-12-0839-104/+118
* KVM: Convert the kvm->vcpus array to a xarrayMarc Zyngier2021-12-082-8/+12
* KVM: s390: Use kvm_get_vcpu() instead of open-coded accessMarc Zyngier2021-12-081-3/+5
* KVM: mips: Use kvm_get_vcpu() instead of open-coded accessMarc Zyngier2021-12-082-3/+3
* KVM: Move wiping of the kvm->vcpus array to common codeMarc Zyngier2021-12-088-75/+22
* KVM: MMU: update comment on the number of page role combinationsPaolo Bonzini2021-12-081-12/+18
* KVM: SVM: Do not terminate SEV-ES guests on GHCB validation failureTom Lendacky2021-12-052-46/+71
* KVM: SEV: Fall back to vmalloc for SEV-ES scratch area if necessarySean Christopherson2021-12-051-4/+4
* KVM: SEV: Return appropriate error codes if SEV-ES scratch setup failsSean Christopherson2021-12-051-13/+17
* KVM: x86/mmu: Retry page fault if root is invalidated by memslot updateSean Christopherson2021-12-022-3/+23
* KVM: VMX: Set failure code in prepare_vmcs02()Dan Carpenter2021-12-021-1/+3
* KVM: ensure APICv is considered inactive if there is no APICPaolo Bonzini2021-12-024-4/+8
* KVM: x86/pmu: Fix reserved bits for AMD PerfEvtSeln registerLike Xu2021-12-021-1/+1
* KVM: fix avic_set_running for preemptable kernelsPaolo Bonzini2021-11-301-7/+9
* KVM: VMX: clear vmx_x86_ops.sync_pir_to_irr if APICv is disabledPaolo Bonzini2021-11-301-2/+2
* KVM: SEV: accept signals in sev_lock_two_vmsPaolo Bonzini2021-11-301-6/+16
* KVM: SEV: do not take kvm->lock when destroyingPaolo Bonzini2021-11-301-4/+0
* KVM: SEV: Prohibit migration of a VM that has mirrorsPaolo Bonzini2021-11-303-1/+59
* KVM: SEV: Do COPY_ENC_CONTEXT_FROM with both VMs lockedPaolo Bonzini2021-11-301-42/+24
* selftests: sev_migrate_tests: add tests for KVM_CAP_VM_COPY_ENC_CONTEXT_FROMPaolo Bonzini2021-11-301-7/+105
* KVM: SEV: move mirror status to destination of KVM_CAP_VM_MOVE_ENC_CONTEXT_FROMPaolo Bonzini2021-11-301-0/+2
* KVM: SEV: initialize regions_list of a mirror VMPaolo Bonzini2021-11-301-0/+1
* KVM: SEV: cleanup locking for KVM_CAP_VM_MOVE_ENC_CONTEXT_FROMPaolo Bonzini2021-11-301-26/+27
* KVM: SEV: do not use list_replace_init on an empty listPaolo Bonzini2021-11-301-2/+1