summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm
Commit message (Expand)AuthorAgeFilesLines
* Merge branch 'akpm' (patches from Andrew)Linus Torvalds2017-05-083-6/+6
|\
| * mm: introduce kv[mz]alloc helpersMichal Hocko2017-05-083-6/+6
* | Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2017-05-0822-1972/+446
|\ \ | |/ |/|
| * kvm: nVMX: Don't validate disabled secondary controlsJim Mattson2017-05-051-3/+4
| * Revert "KVM: Support vCPU-based gfn->hva cache"Paolo Bonzini2017-05-032-30/+33
| * KVM: x86: don't hold kvm->lock in KVM_SET_GSI_ROUTINGDavid Hildenbrand2017-05-023-17/+11
| * kvm: nVMX: Remove superfluous VMX instruction fault checksJim Mattson2017-04-271-43/+14
| * KVM: x86: fix emulation of RSM and IRET instructionsLadi Prosek2017-04-272-10/+21
| * KVM: add explicit barrier to kvm_vcpu_kickAndrew Jones2017-04-271-1/+1
| * KVM: x86: always use kvm_make_request instead of set_bitRadim Krčmář2017-04-271-8/+2
| * KVM: add kvm_{test,clear}_request to replace {test,clear}_bitRadim Krčmář2017-04-272-5/+5
| * KVM: x86: remove irq disablement around KVM_SET_CLOCK/KVM_GET_CLOCKMarcelo Tosatti2017-04-211-19/+3
| * kvm: better MWAIT emulation for guestsMichael S. Tsirkin2017-04-214-4/+48
| * KVM: x86: virtualize cpuid faultingKyle Huey2017-04-214-0/+47
| * KVM: VMX: drop vmm_exclusive module parameterDavid Hildenbrand2017-04-211-31/+7
| * KVM: nVMX: fix AD condition when handling EPT violationRadim Krčmář2017-04-131-1/+1
| * KVM: x86: Add MSR_AMD64_DC_CFG to the list of ignored MSRsLadi Prosek2017-04-121-0/+2
| * KVM: x86: fix maintaining of kvm_clock stability on guest CPU hotplugDenis Plotnikov2017-04-121-10/+19
| * KVM: x86: remaster kvm_write_tsc codeDenis Plotnikov2017-04-121-39/+13
| * KVM: x86: use irqchip_kernel() to check for pic+ioapicDavid Hildenbrand2017-04-121-1/+1
| * KVM: x86: simplify pic_ioport_read()David Hildenbrand2017-04-121-6/+3
| * KVM: x86: set data directly in picdev_read()David Hildenbrand2017-04-121-4/+3
| * KVM: x86: drop picdev_in_range()David Hildenbrand2017-04-121-23/+12
| * KVM: x86: make kvm_pic_reset() staticDavid Hildenbrand2017-04-122-3/+1
| * KVM: x86: simplify pic_unlock()David Hildenbrand2017-04-121-9/+4
| * KVM: x86: drop goto label in kvm_set_routing_entry()David Hildenbrand2017-04-121-12/+8
| * KVM: x86: rename kvm_vcpu_request_scan_ioapic()David Hildenbrand2017-04-121-1/+1
| * KVM: x86: directly call kvm_make_scan_ioapic_request() in ioapic.cDavid Hildenbrand2017-04-121-2/+2
| * KVM: x86: remove all-vcpu request from kvm_ioapic_init()David Hildenbrand2017-04-121-2/+0
| * KVM: x86: KVM_IRQCHIP_PIC_MASTER only has 8 pinsDavid Hildenbrand2017-04-121-9/+6
| * KVM: x86: push usage of slots_lock downDavid Hildenbrand2017-04-123-4/+4
| * KVM: x86: don't take kvm->irq_lock when creating IRQCHIPDavid Hildenbrand2017-04-121-2/+0
| * KVM: x86: convert kvm_(set|get)_ioapic() into voidDavid Hildenbrand2017-04-123-8/+6
| * KVM: x86: remove duplicate checks for ioapicDavid Hildenbrand2017-04-121-4/+0
| * KVM: x86: use ioapic_in_kernel() to check for ioapic existenceDavid Hildenbrand2017-04-121-3/+1
| * KVM: x86: get rid of ioapic_irqchip()David Hildenbrand2017-04-122-7/+2
| * KVM: x86: get rid of pic_irqchip()David Hildenbrand2017-04-125-23/+16
| * KVM: x86: check against irqchip_mode in ioapic_in_kernel()David Hildenbrand2017-04-121-3/+4
| * KVM: x86: check against irqchip_mode in pic_in_kernel()David Hildenbrand2017-04-121-3/+4
| * KVM: x86: check against irqchip_mode in kvm_set_routing_entry()David Hildenbrand2017-04-121-6/+8
| * KVM: x86: new irqchip mode KVM_IRQCHIP_INIT_IN_PROGRESSDavid Hildenbrand2017-04-122-6/+23
| * kvm: nVMX: Disallow userspace-injected exceptions in guest modeJim Mattson2017-04-071-1/+2
| * KVM: x86: fix user triggerable warning in kvm_apic_accept_events()David Hildenbrand2017-04-071-0/+12
| * kvm: make KVM_CAP_COALESCED_MMIO architecture agnosticPaolo Bonzini2017-04-071-3/+0
| * KVM: nVMX: support RDRAND and RDSEED exitingPaolo Bonzini2017-04-071-0/+5
| * kvm: nVMX: support EPT accessed/dirty bitsPaolo Bonzini2017-04-074-23/+49
| * kvm: x86: MMU support for EPT accessed/dirty bitsPaolo Bonzini2017-04-071-8/+15
| * KVM: VMX: remove bogus check for invalid EPT violationPaolo Bonzini2017-04-071-14/+0
| * KVM: nVMX: we support 1GB EPT pagesPaolo Bonzini2017-04-071-3/+3
| * KVM: x86: drop legacy device assignmentPaolo Bonzini2017-04-076-1473/+1