summaryrefslogtreecommitdiffstats
path: root/arch/x86 (follow)
Commit message (Expand)AuthorAgeFilesLines
...
| * | | | | | kvm: x86/mmu: Support dirty logging for the TDP MMUBen Gardon2020-10-234-5/+325
| * | | | | | kvm: x86/mmu: Support changed pte notifier in tdp MMUBen Gardon2020-10-233-1/+67
| * | | | | | kvm: x86/mmu: Add access tracking for tdp_mmuBen Gardon2020-10-233-7/+128
| * | | | | | kvm: x86/mmu: Support invalidate range MMU notifier for TDP MMUBen Gardon2020-10-233-6/+86
| * | | | | | kvm: x86/mmu: Allocate struct kvm_mmu_pages for all pages in TDP MMUBen Gardon2020-10-232-3/+14
| * | | | | | kvm: x86/mmu: Add TDP MMU PF handlerBen Gardon2020-10-235-37/+194
| * | | | | | kvm: x86/mmu: Remove disallowed_hugepage_adjust shadow_walk_iterator argBen Gardon2020-10-222-7/+9
| * | | | | | kvm: x86/mmu: Support zapping SPTEs in the TDP MMUBen Gardon2020-10-225-0/+136
| * | | | | | kvm: x86/mmu: Add functions to handle changed TDP SPTEsBen Gardon2020-10-223-1/+115
| * | | | | | kvm: x86/mmu: Allocate and free TDP MMU rootsBen Gardon2020-10-225-6/+146
| * | | | | | kvm: x86/mmu: Init / Uninit the TDP MMUBen Gardon2020-10-225-1/+55
| * | | | | | kvm: x86/mmu: Introduce tdp_iterBen Gardon2020-10-223-1/+234
| * | | | | | KVM: mmu: extract spte.h and spte.cPaolo Bonzini2020-10-225-548/+607
| * | | | | | KVM: mmu: Separate updating a PTE from kvm_set_pte_rmappPaolo Bonzini2020-10-221-7/+17
| * | | | | | kvm: x86/mmu: Separate making SPTEs from set_spteBen Gardon2020-10-221-16/+33
| * | | | | | kvm: mmu: Separate making non-leaf sptes from link_shadow_pageBen Gardon2020-10-221-6/+15
| * | | | | | Merge branch 'kvm-fixes' into 'next'Paolo Bonzini2020-10-224-22/+39
| |\ \ \ \ \ \
| * | | | | | | KVM: x86: Let the guest own CR4.FSGSBASELai Jiangshan2020-10-211-1/+1
| * | | | | | | KVM: VMX: Intercept guest reserved CR4 bits to inject #GP faultSean Christopherson2020-10-211-5/+10
| * | | | | | | KVM: x86: Move call to update_exception_bitmap() into VMX codeSean Christopherson2020-10-212-1/+3
| * | | | | | | KVM: x86: Invoke vendor's vcpu_after_set_cpuid() after all common updatesSean Christopherson2020-10-211-2/+3
| * | | | | | | KVM: x86: Intercept LA57 to inject #GP fault when it's reservedLai Jiangshan2020-10-211-1/+1
| * | | | | | | KVM: SVM: Initialize prev_ga_tag before useSuravee Suthikulpanit2020-10-211-0/+1
| * | | | | | | KVM: nSVM: implement on demand allocation of the nested stateMaxim Levitsky2020-10-213-28/+83
| * | | | | | | KVM: x86: allow kvm_x86_ops.set_efer to return an error valueMaxim Levitsky2020-10-216-7/+15
| * | | | | | | KVM: x86: report negative values from wrmsr emulation to userspaceMaxim Levitsky2020-10-212-5/+8
| * | | | | | | KVM: x86: xen_hvm_config: cleanup return valuesMaxim Levitsky2020-10-211-14/+9
| * | | | | | | kvm x86/mmu: Make struct kernel_param_ops definitions constJoe Perches2020-10-211-2/+2
| * | | | | | | KVM: x86: bump KVM_MAX_CPUID_ENTRIESVitaly Kuznetsov2020-10-211-1/+1
| * | | | | | | KVM: x86: allocate vcpu->arch.cpuid_entries dynamicallyVitaly Kuznetsov2020-10-213-39/+53
| * | | | | | | KVM: x86: disconnect kvm_check_cpuid() from vcpu->arch.cpuid_entriesVitaly Kuznetsov2020-10-211-15/+23
| * | | | | | | kvm: x86: only provide PV features if enabled in guest's CPUIDOliver Upton2020-10-214-5/+94
| * | | | | | | kvm: x86: set wall_clock in kvm_write_wall_clock()Oliver Upton2020-10-211-1/+2
| * | | | | | | kvm: x86: encapsulate wrmsr(MSR_KVM_SYSTEM_TIME) emulation in helper fnOliver Upton2020-10-211-26/+32
| * | | | | | | x86/kvm: Update the comment about asynchronous page fault in exc_page_fault()Vitaly Kuznetsov2020-10-211-5/+8
| * | | | | | | x86/kvm: hide KVM options from menuconfig when KVM is not compiledMatteo Croce2020-10-211-0/+1
| * | | | | | | KVM: VMX: Forbid userspace MSR filters for x2APICPaolo Bonzini2020-10-211-1/+8
| * | | | | | | KVM: VMX: Ignore userspace MSR filters for x2APICSean Christopherson2020-10-212-18/+31
| * | | | | | | KVM: VMX: Fix x2APIC MSR intercept handling on !APICV platformsPeter Xu2020-10-191-2/+3
| * | | | | | | KVM: VMX: vmx_uret_msrs_list[] can be statickernel test robot2020-09-291-1/+1
| * | | | | | | KVM: x86: do not attempt TSC synchronization on guest writesPaolo Bonzini2020-09-281-20/+10
| * | | | | | | KVM: nSVM: delay MSR permission processing to first nested VM runPaolo Bonzini2020-09-281-3/+18
| * | | | | | | KVM: x86: rename KVM_REQ_GET_VMCS12_PAGESPaolo Bonzini2020-09-283-8/+8
| * | | | | | | KVM: x86: Introduce MSR filteringAlexander Graf2020-09-283-1/+176
| * | | | | | | KVM: x86: VMX: Prevent MSR passthrough when MSR access is deniedAlexander Graf2020-09-282-52/+181
| * | | | | | | KVM: x86: SVM: Prevent MSR passthrough when MSR access is deniedAlexander Graf2020-09-282-8/+76
| * | | | | | | KVM: x86: Prepare MSR bitmaps for userspace tracked MSRsAaron Lewis2020-09-284-70/+77
| * | | | | | | KVM: x86: Add infrastructure for MSR filteringAlexander Graf2020-09-284-0/+10
| * | | | | | | KVM: x86: Allow deflecting unknown MSR accesses to user spaceAlexander Graf2020-09-283-6/+135
| * | | | | | | KVM: x86: Return -ENOENT on unimplemented MSRsAlexander Graf2020-09-281-1/+1