summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm (follow)
Commit message (Expand)AuthorAgeFilesLines
* nVMX: Advertise PML to L1 hypervisorBandan Das2017-05-091-5/+11
* nVMX: Implement emulated Page Modification LoggingBandan Das2017-05-091-2/+79
* kvm: x86: Add a hook for arch specific dirty logging emulationBandan Das2017-05-093-0/+20
* kvm: nVMX: Validate CR3 target count on nested VM-entryJim Mattson2017-05-091-0/+8
* Merge branch 'akpm' (patches from Andrew)Linus Torvalds2017-05-093-6/+6
|\
| * mm: introduce kv[mz]alloc helpersMichal Hocko2017-05-093-6/+6
* | Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2017-05-0822-1972/+446
|\ \ | |/ |/|
| * kvm: nVMX: Don't validate disabled secondary controlsJim Mattson2017-05-051-3/+4
| * Revert "KVM: Support vCPU-based gfn->hva cache"Paolo Bonzini2017-05-032-30/+33
| * KVM: x86: don't hold kvm->lock in KVM_SET_GSI_ROUTINGDavid Hildenbrand2017-05-023-17/+11
| * kvm: nVMX: Remove superfluous VMX instruction fault checksJim Mattson2017-04-271-43/+14
| * KVM: x86: fix emulation of RSM and IRET instructionsLadi Prosek2017-04-272-10/+21
| * KVM: add explicit barrier to kvm_vcpu_kickAndrew Jones2017-04-271-1/+1
| * KVM: x86: always use kvm_make_request instead of set_bitRadim Krčmář2017-04-271-8/+2
| * KVM: add kvm_{test,clear}_request to replace {test,clear}_bitRadim Krčmář2017-04-272-5/+5
| * KVM: x86: remove irq disablement around KVM_SET_CLOCK/KVM_GET_CLOCKMarcelo Tosatti2017-04-211-19/+3
| * kvm: better MWAIT emulation for guestsMichael S. Tsirkin2017-04-214-4/+48
| * KVM: x86: virtualize cpuid faultingKyle Huey2017-04-214-0/+47
| * KVM: VMX: drop vmm_exclusive module parameterDavid Hildenbrand2017-04-211-31/+7
| * KVM: nVMX: fix AD condition when handling EPT violationRadim Krčmář2017-04-131-1/+1
| * KVM: x86: Add MSR_AMD64_DC_CFG to the list of ignored MSRsLadi Prosek2017-04-121-0/+2
| * KVM: x86: fix maintaining of kvm_clock stability on guest CPU hotplugDenis Plotnikov2017-04-121-10/+19
| * KVM: x86: remaster kvm_write_tsc codeDenis Plotnikov2017-04-121-39/+13
| * KVM: x86: use irqchip_kernel() to check for pic+ioapicDavid Hildenbrand2017-04-121-1/+1
| * KVM: x86: simplify pic_ioport_read()David Hildenbrand2017-04-121-6/+3
| * KVM: x86: set data directly in picdev_read()David Hildenbrand2017-04-121-4/+3
| * KVM: x86: drop picdev_in_range()David Hildenbrand2017-04-121-23/+12
| * KVM: x86: make kvm_pic_reset() staticDavid Hildenbrand2017-04-122-3/+1
| * KVM: x86: simplify pic_unlock()David Hildenbrand2017-04-121-9/+4
| * KVM: x86: drop goto label in kvm_set_routing_entry()David Hildenbrand2017-04-121-12/+8
| * KVM: x86: rename kvm_vcpu_request_scan_ioapic()David Hildenbrand2017-04-121-1/+1
| * KVM: x86: directly call kvm_make_scan_ioapic_request() in ioapic.cDavid Hildenbrand2017-04-121-2/+2
| * KVM: x86: remove all-vcpu request from kvm_ioapic_init()David Hildenbrand2017-04-121-2/+0
| * KVM: x86: KVM_IRQCHIP_PIC_MASTER only has 8 pinsDavid Hildenbrand2017-04-121-9/+6
| * KVM: x86: push usage of slots_lock downDavid Hildenbrand2017-04-123-4/+4
| * KVM: x86: don't take kvm->irq_lock when creating IRQCHIPDavid Hildenbrand2017-04-121-2/+0
| * KVM: x86: convert kvm_(set|get)_ioapic() into voidDavid Hildenbrand2017-04-123-8/+6
| * KVM: x86: remove duplicate checks for ioapicDavid Hildenbrand2017-04-121-4/+0
| * KVM: x86: use ioapic_in_kernel() to check for ioapic existenceDavid Hildenbrand2017-04-121-3/+1
| * KVM: x86: get rid of ioapic_irqchip()David Hildenbrand2017-04-122-7/+2
| * KVM: x86: get rid of pic_irqchip()David Hildenbrand2017-04-125-23/+16
| * KVM: x86: check against irqchip_mode in ioapic_in_kernel()David Hildenbrand2017-04-121-3/+4
| * KVM: x86: check against irqchip_mode in pic_in_kernel()David Hildenbrand2017-04-121-3/+4
| * KVM: x86: check against irqchip_mode in kvm_set_routing_entry()David Hildenbrand2017-04-121-6/+8
| * KVM: x86: new irqchip mode KVM_IRQCHIP_INIT_IN_PROGRESSDavid Hildenbrand2017-04-122-6/+23
| * kvm: nVMX: Disallow userspace-injected exceptions in guest modeJim Mattson2017-04-071-1/+2
| * KVM: x86: fix user triggerable warning in kvm_apic_accept_events()David Hildenbrand2017-04-071-0/+12
| * kvm: make KVM_CAP_COALESCED_MMIO architecture agnosticPaolo Bonzini2017-04-071-3/+0
| * KVM: nVMX: support RDRAND and RDSEED exitingPaolo Bonzini2017-04-071-0/+5
| * kvm: nVMX: support EPT accessed/dirty bitsPaolo Bonzini2017-04-074-23/+49