summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
...
| * KVM: Add kvm_arch_vcpu_{un}blocking callbacksChristoffer Dall2015-10-228-0/+20
| * arm/arm64: KVM: Fix disabled distributor operationChristoffer Dall2015-10-201-5/+6
| * arm/arm64: KVM: Clear map->active on pend/active clearChristoffer Dall2015-10-201-1/+31
| * arm/arm64: KVM: Fix arch timer behavior for disabled interruptsChristoffer Dall2015-10-202-32/+30
| * KVM: arm: use GIC support unconditionallyArnd Bergmann2015-10-201-0/+1
| * KVM: arm/arm64: Fix memory leak if timer initialization failsPavel Fedin2015-10-201-1/+1
| * KVM: arm/arm64: Do not inject spurious interruptsPavel Fedin2015-10-201-2/+7
* | Merge branch 'kvm-ppc-next' of git://git.kernel.org/pub/scm/linux/kernel/git/...Paolo Bonzini2015-11-029-11/+63
|\ \
| * | KVM: PPC: Book3S HV: Handle H_DOORBELL on the guest exit pathGautham R. Shenoy2015-10-211-3/+14
| * | KVM: PPC: Implement extension to report number of memslotsNikunj A Dadhania2015-10-211-0/+3
| * | KVM: PPC: Book3S HV: Make H_REMOVE return correct HPTE value for absent HPTEsPaul Mackerras2015-10-211-0/+2
| * | KVM: PPC: Book3S HV: Don't fall back to smaller HPT size in allocation ioctlPaul Mackerras2015-10-211-1/+2
| * | KVM: PPC: Book3S HV: Deliver machine check with MSR(RI=0) to guest as MCEMahesh Salgaonkar2015-10-161-4/+8
| * | KVM: PPC: e500: fix couple of shift operations on 64 bitsTudor Laurentiu2015-10-151-2/+2
| * | KVM: PPC: e500: Emulate TMCFG0 TMRN registerTudor Laurentiu2015-10-152-0/+24
| * | KVM: PPC: e500: fix handling local_sid_lookup resultAndrzej Hajda2015-10-151-1/+2
| * | powerpc/e6500: add TMCFG0 register definitionTudor Laurentiu2015-10-151-0/+6
* | | Merge tag 'kvm-s390-next-20151028' of git://git.kernel.org/pub/scm/linux/kern...Paolo Bonzini2015-11-022-26/+28
|\ \ \
| * | | KVM: s390: use simple switch statement as multiplexerChristian Borntraeger2015-10-291-21/+21
| * | | KVM: s390: drop useless newline in debugging dataChristian Borntraeger2015-10-291-4/+4
| * | | KVM: s390: SCA must not cross page boundariesDavid Hildenbrand2015-10-291-1/+3
* | | | KVM: x86: MMU: Initialize force_pt_level before calling mapping_level()Takuya Yoshikawa2015-10-192-4/+5
* | | | kvm: x86: zero EFER on INITPaolo Bonzini2015-10-192-8/+6
* | | | kvm/irqchip: allow only multiple irqchip routes per GSIAndrey Smetanin2015-10-161-3/+3
* | | | kvm/eventfd: add arch-specific set_irqAndrey Smetanin2015-10-162-1/+16
* | | | kvm/eventfd: factor out kvm_notify_acked_gsi()Andrey Smetanin2015-10-162-5/+12
* | | | kvm/eventfd: avoid loop inside irqfd_update()Andrey Smetanin2015-10-161-8/+5
* | | | KVM: x86: move steal time initialization to vcpu entry timeMarcelo Tosatti2015-10-161-7/+2
* | | | KVM: x86: MMU: Eliminate an extra memory slot search in mapping_level()Takuya Yoshikawa2015-10-161-6/+11
* | | | KVM: x86: MMU: Remove mapping_level_dirty_bitmap()Takuya Yoshikawa2015-10-161-8/+16
* | | | KVM: x86: MMU: Move mapping_level_dirty_bitmap() call in mapping_level()Takuya Yoshikawa2015-10-162-18/+17
* | | | KVM: x86: MMU: Simplify force_pt_level calculation code in FNAME(page_fault)()Takuya Yoshikawa2015-10-161-8/+7
* | | | KVM: x86: MMU: Make force_pt_level boolTakuya Yoshikawa2015-10-162-6/+6
* | | | kvm: svm: Only propagate next_rip when guest supports itJoerg Roedel2015-10-162-1/+31
* | | | KVM: x86: manually unroll bad_mt_xwr loopPaolo Bonzini2015-10-161-8/+10
* | | | KVM: nVMX: expose VPID capability to L1Wanpeng Li2015-10-161-2/+7
* | | | KVM: nVMX: nested VPID emulationWanpeng Li2015-10-161-7/+32
* | | | KVM: nVMX: emulate the INVVPID instructionWanpeng Li2015-10-162-1/+61
* | | | KVM: VMX: introduce __vmx_flush_tlb to handle specific vpidWanpeng Li2015-10-141-8/+13
* | | | KVM: VMX: adjust interface to allocate/free_vpidWanpeng Li2015-10-141-13/+12
* | | | kvm: fix waitqueue_active without memory barrier in virt/kvm/async_pf.cKosuke Tatsukawa2015-10-141-0/+4
* | | | KVM: x86: don't notify userspace IOAPIC on edge EOIRadim Krčmář2015-10-141-2/+4
* | | | KVM: x86: fix edge EOI and IOAPIC reconfig raceRadim Krčmář2015-10-142-2/+6
* | | | kvm: x86: set KVM_REQ_EVENT when updating IRRRadim Krčmář2015-10-141-0/+2
* | | | Merge branch 'kvm-master' into HEADPaolo Bonzini2015-10-142-4/+8
|\ \ \ \
| * | | | KVM: x86: fix RSM into 64-bit protected modePaolo Bonzini2015-10-141-3/+7
| * | | | KVM: x86: fix previous commit for 32-bitPaolo Bonzini2015-10-141-1/+1
* | | | | Merge branch 'kvm-master' into HEADPaolo Bonzini2015-10-133-84/+83
|\| | | |
| * | | | KVM: x86: fix SMI to halted VCPUPaolo Bonzini2015-10-131-0/+3
| * | | | KVM: x86: clean up kvm_arch_vcpu_runnablePaolo Bonzini2015-10-131-10/+29