summaryrefslogtreecommitdiffstats
path: root/arch/x86
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2020-10-2344-2359/+5013
|\
| * kvm: x86/mmu: NX largepage recovery for TDP MMUBen Gardon2020-10-233-4/+18
| * kvm: x86/mmu: Don't clear write flooding count for direct rootsBen Gardon2020-10-231-1/+7
| * kvm: x86/mmu: Support MMIO in the TDP MMUBen Gardon2020-10-233-21/+72
| * kvm: x86/mmu: Support write protection for nesting in tdp MMUBen Gardon2020-10-233-0/+57
| * kvm: x86/mmu: Support disabling dirty logging for the tdp MMUBen Gardon2020-10-233-0/+63
| * kvm: x86/mmu: Support dirty logging for the TDP MMUBen Gardon2020-10-234-5/+325
| * kvm: x86/mmu: Support changed pte notifier in tdp MMUBen Gardon2020-10-233-1/+67
| * kvm: x86/mmu: Add access tracking for tdp_mmuBen Gardon2020-10-233-7/+128
| * kvm: x86/mmu: Support invalidate range MMU notifier for TDP MMUBen Gardon2020-10-233-6/+86
| * kvm: x86/mmu: Allocate struct kvm_mmu_pages for all pages in TDP MMUBen Gardon2020-10-232-3/+14
| * kvm: x86/mmu: Add TDP MMU PF handlerBen Gardon2020-10-235-37/+194
| * kvm: x86/mmu: Remove disallowed_hugepage_adjust shadow_walk_iterator argBen Gardon2020-10-212-7/+9
| * kvm: x86/mmu: Support zapping SPTEs in the TDP MMUBen Gardon2020-10-215-0/+136
| * kvm: x86/mmu: Add functions to handle changed TDP SPTEsBen Gardon2020-10-213-1/+115
| * kvm: x86/mmu: Allocate and free TDP MMU rootsBen Gardon2020-10-215-6/+146
| * kvm: x86/mmu: Init / Uninit the TDP MMUBen Gardon2020-10-215-1/+55
| * kvm: x86/mmu: Introduce tdp_iterBen Gardon2020-10-213-1/+234
| * KVM: mmu: extract spte.h and spte.cPaolo Bonzini2020-10-215-548/+607
| * KVM: mmu: Separate updating a PTE from kvm_set_pte_rmappPaolo Bonzini2020-10-211-7/+17
| * kvm: x86/mmu: Separate making SPTEs from set_spteBen Gardon2020-10-211-16/+33
| * kvm: mmu: Separate making non-leaf sptes from link_shadow_pageBen Gardon2020-10-211-6/+15
| * Merge branch 'kvm-fixes' into 'next'Paolo Bonzini2020-10-214-22/+39
| |\
| * | KVM: x86: Let the guest own CR4.FSGSBASELai Jiangshan2020-10-211-1/+1
| * | KVM: VMX: Intercept guest reserved CR4 bits to inject #GP faultSean Christopherson2020-10-211-5/+10
| * | KVM: x86: Move call to update_exception_bitmap() into VMX codeSean Christopherson2020-10-212-1/+3
| * | KVM: x86: Invoke vendor's vcpu_after_set_cpuid() after all common updatesSean Christopherson2020-10-211-2/+3
| * | KVM: x86: Intercept LA57 to inject #GP fault when it's reservedLai Jiangshan2020-10-211-1/+1
| * | KVM: SVM: Initialize prev_ga_tag before useSuravee Suthikulpanit2020-10-211-0/+1
| * | KVM: nSVM: implement on demand allocation of the nested stateMaxim Levitsky2020-10-213-28/+83
| * | KVM: x86: allow kvm_x86_ops.set_efer to return an error valueMaxim Levitsky2020-10-216-7/+15
| * | KVM: x86: report negative values from wrmsr emulation to userspaceMaxim Levitsky2020-10-212-5/+8
| * | KVM: x86: xen_hvm_config: cleanup return valuesMaxim Levitsky2020-10-211-14/+9
| * | kvm x86/mmu: Make struct kernel_param_ops definitions constJoe Perches2020-10-211-2/+2
| * | KVM: x86: bump KVM_MAX_CPUID_ENTRIESVitaly Kuznetsov2020-10-211-1/+1
| * | KVM: x86: allocate vcpu->arch.cpuid_entries dynamicallyVitaly Kuznetsov2020-10-213-39/+53
| * | KVM: x86: disconnect kvm_check_cpuid() from vcpu->arch.cpuid_entriesVitaly Kuznetsov2020-10-211-15/+23
| * | kvm: x86: only provide PV features if enabled in guest's CPUIDOliver Upton2020-10-214-5/+94
| * | kvm: x86: set wall_clock in kvm_write_wall_clock()Oliver Upton2020-10-211-1/+2
| * | kvm: x86: encapsulate wrmsr(MSR_KVM_SYSTEM_TIME) emulation in helper fnOliver Upton2020-10-211-26/+32
| * | x86/kvm: Update the comment about asynchronous page fault in exc_page_fault()Vitaly Kuznetsov2020-10-211-5/+8
| * | x86/kvm: hide KVM options from menuconfig when KVM is not compiledMatteo Croce2020-10-211-0/+1
| * | KVM: VMX: Forbid userspace MSR filters for x2APICPaolo Bonzini2020-10-211-1/+8
| * | KVM: VMX: Ignore userspace MSR filters for x2APICSean Christopherson2020-10-212-18/+31
| * | KVM: VMX: Fix x2APIC MSR intercept handling on !APICV platformsPeter Xu2020-10-191-2/+3
| * | KVM: VMX: vmx_uret_msrs_list[] can be statickernel test robot2020-09-291-1/+1
| * | KVM: x86: do not attempt TSC synchronization on guest writesPaolo Bonzini2020-09-281-20/+10
| * | KVM: nSVM: delay MSR permission processing to first nested VM runPaolo Bonzini2020-09-281-3/+18
| * | KVM: x86: rename KVM_REQ_GET_VMCS12_PAGESPaolo Bonzini2020-09-283-8/+8
| * | KVM: x86: Introduce MSR filteringAlexander Graf2020-09-283-1/+176