summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm
Commit message (Expand)AuthorAgeFilesLines
* KVM: Add VT-x machine check supportAndi Kleen2009-06-101-2/+48
* KVM: VMX: Rename rmode.active to rmode.vm86_activeNitin A Kamble2009-06-101-14/+14
* KVM: Move "exit due to NMI" handling into vmx_complete_interrupts()Gleb Natapov2009-06-101-11/+10
* KVM: Disable CR8 intercept if tpr patching is activeGleb Natapov2009-06-101-5/+6
* KVM: Do not migrate pending software interrupts.Gleb Natapov2009-06-101-1/+1
* KVM: inject NMI after IRET from a previous NMI, not before.Gleb Natapov2009-06-101-12/+50
* KVM: Always request IRQ/NMI window if an interrupt is pendingGleb Natapov2009-06-101-18/+12
* KVM: Do not re-execute INTn instruction.Gleb Natapov2009-06-104-17/+43
* KVM: skip_emulated_instruction() decode instruction if size is not knownGleb Natapov2009-06-101-6/+5
* KVM: Remove irq_pending bitmapGleb Natapov2009-06-103-41/+13
* KVM: Do not allow interrupt injection from userspace if there is a pending ev...Gleb Natapov2009-06-101-2/+3
* KVM: Unprotect a page if #PF happens during NMI injection.Gleb Natapov2009-06-103-3/+8
* KVM: Expand on "help" info to specify kvm intel and amd module namesRobert P. J. Day2009-06-101-0/+6
* KVM: x86: check for cr3 validity in mmu_alloc_rootsMarcelo Tosatti2009-06-102-4/+24
* KVM: MMU: protect kvm_mmu_change_mmu_pages with mmu_lockMarcelo Tosatti2009-06-102-2/+6
* KVM: Deal with interrupt shadow state for emulated instructionsGlauber Costa2009-06-102-1/+25
* KVM: Replace ->drop_interrupt_shadow() by ->set_interrupt_shadow()Glauber Costa2009-06-103-25/+58
* KVM: use smp_send_reschedule in kvm_vcpu_kickMarcelo Tosatti2009-06-101-25/+11
* KVM: Update cpuid 1.ecx reportingAvi Kivity2009-06-101-1/+7
* KVM: Add AMD cpuid bit: cr8_legacy, abm, misaligned sse, sse4, 3dnow prefetchAvi Kivity2009-06-101-33/+38
* KVM: Fix cpuid feature misreportingAvi Kivity2009-06-101-2/+5
* KVM: Drop request_nmi from statsJan Kiszka2009-06-101-1/+0
* KVM: SVM: Don't reinject event that caused a task switchGleb Natapov2009-06-101-2/+21
* KVM: SVM: Fix cross vendor migration issue in segment segment descriptorAndre Przywara2009-06-101-0/+9
* KVM: fix apic_debug instancesGlauber Costa2009-06-101-2/+2
* KVM: Enable snooping control for supported hardwareSheng Yang2009-06-101-2/+17
* KVM: Replace get_mt_mask_shift with get_mt_maskSheng Yang2009-06-104-23/+21
* KVM: Wake up waitqueue before calling get_cpu()Jan Blunck2009-06-101-1/+2
* KVM: Get rid of get_irq() callbackGleb Natapov2009-06-103-23/+5
* KVM: Fix userspace IRQ chip migrationGleb Natapov2009-06-101-6/+6
* KVM: SVM: Add NMI injection supportGleb Natapov2009-06-103-108/+138
* KVM: Get rid of arch.interrupt_window_open & arch.nmi_window_openGleb Natapov2009-06-102-29/+12
* KVM: Do not report TPR write to userspace if new value bigger or equal to a p...Gleb Natapov2009-06-102-7/+16
* KVM: sync_lapic_to_cr8() should always sync cr8 to V_TPRGleb Natapov2009-06-101-4/+1
* KVM: Remove kvm_push_irq()Gleb Natapov2009-06-101-7/+0
* KVM: Remove inject_pending_vectors() callbackGleb Natapov2009-06-103-5/+1
* KVM: Remove exception_injected() callback.Gleb Natapov2009-06-103-14/+0
* KVM: SVM: Coalesce userspace/kernel irqchip interrupt injection logicGleb Natapov2009-06-101-102/+85
* KVM: Use kvm_arch_interrupt_allowed() instead of checking interrupt_window_op...Gleb Natapov2009-06-101-3/+2
* KVM: VMX: Cleanup vmx_intr_assist()Gleb Natapov2009-06-101-25/+30
* KVM: VMX: Consolidate userspace and kernel interrupt injection for VMXGleb Natapov2009-06-103-57/+18
* KVM: Make kvm_cpu_(has|get)_interrupt() work for userspace irqchip tooGleb Natapov2009-06-104-15/+25
* KVM: MMU: Fix auditing codeJan Kiszka2009-06-101-3/+5
* KVM: x86: check for cr3 validity in ioctl_set_sregsMarcelo Tosatti2009-06-101-1/+7
* KVM: Replace kvmclock open-coded get_cpu_var() with the real thingAvi Kivity2009-06-101-5/+6
* KVM: SVM: Skip instruction on a task switch only when appropriateGleb Natapov2009-06-101-2/+9
* KVM: x86 emulator: Add new mode of instruction emulation: skipGleb Natapov2009-06-101-0/+5
* KVM: x86 emulator: Decode soft interrupt instructionsGleb Natapov2009-06-101-1/+2
* KVM: x86 emulator: Completely decode in/out at decoding stageGleb Natapov2009-06-101-4/+4
* KVM: x86 emulator: Add unsigned byte immediate decodeGleb Natapov2009-06-101-6/+11