summaryrefslogtreecommitdiffstats
path: root/arch (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'kvm-s390-next-6.2-1' of https://git.kernel.org/pub/scm/linux/kerne...Paolo Bonzini2022-11-2816-157/+562
|\
| * KVM: s390: remove unused gisa_clear_ipm_gisc() functionHeiko Carstens2022-11-231-5/+0
| * KVM: s390: pv: module parameter to fence asynchronous destroyClaudio Imbrenda2022-11-231-1/+7
| * KVM: s390: pv: support for Destroy fast UVCClaudio Imbrenda2022-11-232-8/+63
| * KVM: s390: pv: avoid export before import if possibleClaudio Imbrenda2022-11-231-0/+7
| * KVM: s390: pv: add KVM_CAP_S390_PROTECTED_ASYNC_DISABLEClaudio Imbrenda2022-11-231-0/+3
| * KVM: s390: pv: asynchronous destroy for rebootClaudio Imbrenda2022-11-234-18/+331
| * s390/mm: fix virtual-physical address confusion for swiotlbNico Boehr2022-11-072-8/+8
| * KVM: s390: VSIE: sort out virtual/physical address in pin_guest_pageNico Boehr2022-10-261-2/+2
| * KVM: s390: pv: sort out physical vs virtual pointers usageNico Boehr2022-10-261-4/+5
| * KVM: s390: sida: sort out physical vs virtual pointers usageNico Boehr2022-10-265-15/+15
| * KVM: s390: sort out physical vs virtual pointers usageNico Boehr2022-10-264-22/+30
| * s390/entry: sort out physical vs virtual pointers usage in sie64aNico Boehr2022-10-264-12/+24
| * s390/mm: gmap: sort out physical vs virtual pointers usageNico Boehr2022-10-261-71/+76
* | KVM: x86: Advertise PREFETCHIT0/1 CPUID to user spaceJiaxi Chen2022-11-282-1/+2
* | KVM: x86: Advertise AVX-NE-CONVERT CPUID to user spaceJiaxi Chen2022-11-282-1/+2
* | KVM: x86: Advertise AVX-VNNI-INT8 CPUID to user spaceJiaxi Chen2022-11-282-1/+10
* | x86: KVM: Advertise AVX-IFMA CPUID to user spaceJiaxi Chen2022-11-282-1/+3
* | x86: KVM: Advertise AMX-FP16 CPUID to user spaceChang S. Bae2022-11-282-1/+2
* | x86: KVM: Advertise CMPccXADD CPUID to user spaceJiaxi Chen2022-11-282-1/+2
* | KVM: x86: Update KVM-only leaf handling to allow for 100% KVM-only leafsSean Christopherson2022-11-282-7/+19
* | KVM: x86: Add BUILD_BUG_ON() to detect bad usage of "scattered" flagsSean Christopherson2022-11-281-1/+7
* | KVM: x86/xen: Add CPL to Xen hypercall tracepointDavid Woodhouse2022-11-282-7/+10
* | Merge branch 'kvm-dwmw2-fixes' into HEADPaolo Bonzini2022-11-241-9/+23
|\ \
| * | KVM: x86/xen: Only do in-kernel acceleration of hypercalls for guest CPL0David Woodhouse2022-11-241-1/+11
| * | KVM: x86/xen: Validate port number in SCHEDOP_pollDavid Woodhouse2022-11-241-8/+12
* | | KVM: x86: Expose Hyper-V L2 TLB flush featureVitaly Kuznetsov2022-11-181-0/+1
* | | KVM: nSVM: hyper-v: Enable L2 TLB flushVitaly Kuznetsov2022-11-185-2/+70
* | | KVM: x86: Make kvm_hv_get_assist_page() return 0/-errnoVitaly Kuznetsov2022-11-183-6/+6
* | | KVM: nVMX: hyper-v: Enable L2 TLB flushVitaly Kuznetsov2022-11-184-0/+47
* | | KVM: nVMX: hyper-v: Cache VP assist page in 'struct kvm_vcpu_hv'Vitaly Kuznetsov2022-11-186-24/+20
* | | KVM: x86: hyper-v: Introduce fast guest_hv_cpuid_has_l2_tlb_flush() checkVitaly Kuznetsov2022-11-181-0/+8
* | | KVM: x86: hyper-v: L2 TLB flushVitaly Kuznetsov2022-11-183-24/+80
* | | KVM: x86: hyper-v: Introduce kvm_hv_is_tlb_flush_hcall()Vitaly Kuznetsov2022-11-181-0/+17
* | | KVM: x86: Introduce .hv_inject_synthetic_vmexit_post_tlb_flush() nested hookVitaly Kuznetsov2022-11-188-1/+23
* | | KVM: nSVM: Keep track of Hyper-V hv_vm_id/hv_vp_idVitaly Kuznetsov2022-11-182-0/+17
* | | KVM: nVMX: Keep track of hv_vm_id/hv_vp_id when eVMCS is in useVitaly Kuznetsov2022-11-182-0/+21
* | | KVM: x86: hyper-v: Use preallocated buffer in 'struct kvm_vcpu_hv' instead of...Vitaly Kuznetsov2022-11-182-2/+7
* | | KVM: x86: hyper-v: Create a separate fifo for L2 TLB flushVitaly Kuznetsov2022-11-183-8/+30
* | | KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()Vitaly Kuznetsov2022-11-181-11/+31
* | | KVM: x86: hyper-v: Use HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK inst...Vitaly Kuznetsov2022-11-181-7/+6
* | | KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAsVitaly Kuznetsov2022-11-181-0/+14
* | | KVM: x86: hyper-v: Expose support for extended gva ranges for flush hypercallsVitaly Kuznetsov2022-11-182-0/+3
* | | KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gentlyVitaly Kuznetsov2022-11-181-16/+95
* | | KVM: x86: hyper-v: Add helper to read hypercall data for arraySean Christopherson2022-11-181-20/+33
* | | KVM: x86: hyper-v: Introduce TLB flush fifoVitaly Kuznetsov2022-11-185-3/+92
* | | KVM: x86: hyper-v: Resurrect dedicated KVM_REQ_HV_TLB_FLUSH flagVitaly Kuznetsov2022-11-184-2/+20
* | | KVM: x86: Move clearing of TLB_FLUSH_CURRENT to kvm_vcpu_flush_tlb_all()Sean Christopherson2022-11-181-4/+10
* | | KVM: VMX: Rename "vmx/evmcs.{ch}" to "vmx/hyperv.{ch}"Vitaly Kuznetsov2022-11-186-9/+8
* | | KVM: x86: Rename 'enable_direct_tlbflush' to 'enable_l2_tlb_flush'Vitaly Kuznetsov2022-11-186-12/+12