summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
...
| * | KVM: s390: reverse bit ordering of irqs in pending maskMichael Mueller2018-01-262-33/+33
| * | KVM: s390: introduce and use kvm_s390_test_cpuflags()David Hildenbrand2018-01-245-14/+15
| * | KVM: s390: introduce and use kvm_s390_clear_cpuflags()David Hildenbrand2018-01-245-12/+16
| * | KVM: s390: reuse kvm_s390_set_cpuflags()David Hildenbrand2018-01-243-12/+11
| * | KVM: s390: rename __set_cpuflag() to kvm_s390_set_cpuflags()David Hildenbrand2018-01-242-17/+17
| * | KVM: s390: add vcpu stat counters for many instructionChristian Borntraeger2018-01-244-10/+65
| * | KVM: s390: diagnoses are instructions as wellChristian Borntraeger2018-01-241-6/+6
| * | s390x/mm: simplify gmap_protect_rmap()David Hildenbrand2018-01-241-9/+8
| * | KVM: s390: vsie: store guest addresses of satellite blocks in vsie_pageDavid Hildenbrand2018-01-241-15/+22
| * | KVM: s390: vsie: use READ_ONCE to access some SCB fieldsDavid Hildenbrand2018-01-241-19/+31
| * | s390/mm: Remove superfluous parameterJanosch Frank2018-01-231-2/+2
* | | KVM: VMX: introduce X2APIC_MSR macroPaolo Bonzini2018-01-161-10/+9
* | | KVM: vmx: speed up MSR bitmap mergePaolo Bonzini2018-01-161-36/+42
* | | KVM: vmx: simplify MSR bitmap setupPaolo Bonzini2018-01-161-8/+6
* | | KVM: nVMX: remove unnecessary vmwrite from L2->L1 vmexitPaolo Bonzini2018-01-161-3/+0
* | | KVM: nVMX: initialize more non-shadowed fields in prepare_vmcs02_fullPaolo Bonzini2018-01-161-79/+83
* | | KVM: nVMX: initialize descriptor cache fields in prepare_vmcs02_fullPaolo Bonzini2018-01-161-22/+34
* | | KVM: nVMX: track dirty state of non-shadowed VMCS fieldsPaolo Bonzini2018-01-162-1/+34
* | | KVM: VMX: split list of shadowed VMCS field to a separate filePaolo Bonzini2018-01-162-60/+75
* | | kvm: vmx: Reduce size of vmcs_field_to_offset_tableJim Mattson2018-01-161-7/+13
* | | kvm: vmx: Change vmcs_field_type to vmcs_field_widthJim Mattson2018-01-161-19/+19
* | | kvm: vmx: Introduce VMCS12_MAX_FIELD_INDEXJim Mattson2018-01-161-1/+7
* | | KVM: VMX: optimize shadow VMCS copyingPaolo Bonzini2018-01-161-78/+65
* | | KVM: vmx: shadow more fields that are read/written on every vmexitsPaolo Bonzini2018-01-161-9/+23
* | | Merge tag 'kvm-s390-next-4.16-1' of git://git.kernel.org/pub/scm/linux/kernel...Radim Krčmář2018-01-167-53/+44
|\| |
| * | KVM: s390: cleanup struct kvm_s390_float_interruptDavid Hildenbrand2018-01-165-29/+16
| * | kvm_config: add CONFIG_S390_GUESTChristian Borntraeger2018-01-161-0/+1
| * | KVM: s390: drop use of spin lock in __floating_irq_kickMichael Mueller2018-01-161-2/+0
| * | KVM: s390: add debug tracing for cpu features of CPU modelChristian Borntraeger2018-01-161-6/+18
| * | KVM: s390: use created_vcpus in more placesChristian Borntraeger2018-01-161-2/+2
| * | s390x/mm: cleanup gmap_pte_op_walk()David Hildenbrand2018-01-161-15/+8
| |/
* | KVM: nVMX: Fix races when sending nested PI while dest enters/leaves L2Liran Alon2018-01-161-2/+3
* | KVM: nVMX: Fix injection to L2 when L1 don't intercept external-interruptsLiran Alon2018-01-162-25/+18
* | KVM: nVMX: Re-evaluate L1 pending events when running L2 and L1 got posted-in...Liran Alon2018-01-161-1/+11
* | KVM: x86: Change __kvm_apic_update_irr() to also return if max IRR updatedLiran Alon2018-01-163-11/+21
* | KVM: x86: Optimization: Create SVM stubs for sync_pir_to_irr()Liran Alon2018-01-163-7/+6
* | KVM: nVMX: Fix bug of injecting L2 exception into L1Liran Alon2018-01-162-1/+1
* | kvm/vmx: Use local vmx variable in vmx_get_msr()Borislav Petkov2018-01-161-5/+6
* | KVM: MMU: consider host cache mode in MMIO page checkHaozhong Zhang2018-01-161-1/+13
* | x86/mm: add a function to check if a pfn is UC/UC-/WCHaozhong Zhang2018-01-162-0/+21
* | Merge branch 'kvm-insert-lfence'Paolo Bonzini2018-01-161-2/+10
|\ \
| * | KVM: x86: Add memory barrier on vmcs field lookupAndrew Honig2018-01-111-2/+10
* | | KVM: x86: prefer "depends on" to "select" for SEVPaolo Bonzini2018-01-161-3/+1
* | | Merge branch 'sev-v9-p2' of https://github.com/codomania/kvmPaolo Bonzini2018-01-1624-32/+3440
|\ \ \
| * | | KVM: X86: Restart the guest when insn_len is zero and SEV is enabledBrijesh Singh2017-12-042-2/+14
| * | | KVM: SVM: Do not install #UD intercept when SEV is enabledBrijesh Singh2017-12-041-1/+3
| * | | KVM: SVM: Clear C-bit from the page fault addressBrijesh Singh2017-12-041-2/+2
| * | | KVM: SVM: Pin guest memory when SEV is activeBrijesh Singh2017-12-042-0/+133
| * | | KVM: SVM: Add support for SEV LAUNCH_SECRET commandBrijesh Singh2017-12-041-0/+68
| * | | KVM: SVM: Add support for SEV DEBUG_ENCRYPT commandBrijesh Singh2017-12-041-5/+93