summaryrefslogtreecommitdiffstats
path: root/arch/x86
Commit message (Expand)AuthorAgeFilesLines
* vfs: do bulk POLL* -> EPOLL* replacementLinus Torvalds2018-02-112-3/+3
* Merge tag 'kvm-4.16-1' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2018-02-1032-531/+2405
|\
| * Merge branch 'msr-bitmaps' of git://git.kernel.org/pub/scm/virt/kvm/kvmRadim Krčmář2018-02-091-143/+164
| |\
| * | KVM: x86: don't forget vcpu_put() in kvm_arch_vcpu_ioctl_set_sregs()Eric Biggers2018-02-021-1/+1
| * | Merge branch 'x86/hyperv' of git://git.kernel.org/pub/scm/linux/kernel/git/ti...Radim Krčmář2018-02-01207-1622/+6646
| |\ \
| | * | x86/kvm: Make it compile on 32bit and with HYPYERVISOR_GUEST=nThomas Gleixner2018-01-311-4/+4
| | * | x86/kvm: Support Hyper-V reenlightenmentVitaly Kuznetsov2018-01-301-0/+45
| | * | x86/kvm: Pass stable clocksource to guests when running nested on Hyper-VVitaly Kuznetsov2018-01-301-25/+68
| | * | x86/irq: Count Hyper-V reenlightenment interruptsVitaly Kuznetsov2018-01-303-0/+14
| | * | x86/hyperv: Redirect reenlightment notifications on CPU offliningVitaly Kuznetsov2018-01-301-1/+21
| | * | x86/hyperv: Reenlightenment notifications supportVitaly Kuznetsov2018-01-307-1/+143
| | * | x86/hyperv: Add a function to read both TSC and TSC page value simulateneouslyVitaly Kuznetsov2018-01-302-4/+20
| | * | x86/hyperv: Check for required priviliges in hyperv_init()Vitaly Kuznetsov2018-01-301-1/+8
| * | | kvm: x86: remove efer_reload entry in kvm_vcpu_statLongpeng(Mike)2018-01-312-2/+0
| * | | KVM: x86: AMD Processor Topology InformationStanislav Lanci2018-01-311-1/+2
| * | | x86/kvm/vmx: do not use vm-exit instruction length for fast MMIO when running...Vitaly Kuznetsov2018-01-312-2/+17
| * | | KVM: VMX: introduce X2APIC_MSR macroPaolo Bonzini2018-01-161-10/+9
| * | | KVM: vmx: speed up MSR bitmap mergePaolo Bonzini2018-01-161-36/+42
| * | | KVM: vmx: simplify MSR bitmap setupPaolo Bonzini2018-01-161-8/+6
| * | | KVM: nVMX: remove unnecessary vmwrite from L2->L1 vmexitPaolo Bonzini2018-01-161-3/+0
| * | | KVM: nVMX: initialize more non-shadowed fields in prepare_vmcs02_fullPaolo Bonzini2018-01-161-79/+83
| * | | KVM: nVMX: initialize descriptor cache fields in prepare_vmcs02_fullPaolo Bonzini2018-01-161-22/+34
| * | | KVM: nVMX: track dirty state of non-shadowed VMCS fieldsPaolo Bonzini2018-01-162-1/+34
| * | | KVM: VMX: split list of shadowed VMCS field to a separate filePaolo Bonzini2018-01-162-60/+75
| * | | kvm: vmx: Reduce size of vmcs_field_to_offset_tableJim Mattson2018-01-161-7/+13
| * | | kvm: vmx: Change vmcs_field_type to vmcs_field_widthJim Mattson2018-01-161-19/+19
| * | | kvm: vmx: Introduce VMCS12_MAX_FIELD_INDEXJim Mattson2018-01-161-1/+7
| * | | KVM: VMX: optimize shadow VMCS copyingPaolo Bonzini2018-01-161-78/+65
| * | | KVM: vmx: shadow more fields that are read/written on every vmexitsPaolo Bonzini2018-01-161-9/+23
| * | | KVM: nVMX: Fix races when sending nested PI while dest enters/leaves L2Liran Alon2018-01-161-2/+3
| * | | KVM: nVMX: Fix injection to L2 when L1 don't intercept external-interruptsLiran Alon2018-01-162-25/+18
| * | | KVM: nVMX: Re-evaluate L1 pending events when running L2 and L1 got posted-in...Liran Alon2018-01-161-1/+11
| * | | KVM: x86: Change __kvm_apic_update_irr() to also return if max IRR updatedLiran Alon2018-01-163-11/+21
| * | | KVM: x86: Optimization: Create SVM stubs for sync_pir_to_irr()Liran Alon2018-01-163-7/+6
| * | | KVM: nVMX: Fix bug of injecting L2 exception into L1Liran Alon2018-01-162-1/+1
| * | | kvm/vmx: Use local vmx variable in vmx_get_msr()Borislav Petkov2018-01-161-5/+6
| * | | KVM: MMU: consider host cache mode in MMIO page checkHaozhong Zhang2018-01-161-1/+13
| * | | x86/mm: add a function to check if a pfn is UC/UC-/WCHaozhong Zhang2018-01-162-0/+21
| * | | Merge branch 'kvm-insert-lfence'Paolo Bonzini2018-01-161-2/+10
| |\ \ \
| * | | | KVM: x86: prefer "depends on" to "select" for SEVPaolo Bonzini2018-01-161-3/+1
| * | | | Merge branch 'sev-v9-p2' of https://github.com/codomania/kvmPaolo Bonzini2018-01-1611-31/+1287
| |\ \ \ \
| | * | | | KVM: X86: Restart the guest when insn_len is zero and SEV is enabledBrijesh Singh2017-12-042-2/+14
| | * | | | KVM: SVM: Do not install #UD intercept when SEV is enabledBrijesh Singh2017-12-041-1/+3
| | * | | | KVM: SVM: Clear C-bit from the page fault addressBrijesh Singh2017-12-041-2/+2
| | * | | | KVM: SVM: Pin guest memory when SEV is activeBrijesh Singh2017-12-042-0/+133
| | * | | | KVM: SVM: Add support for SEV LAUNCH_SECRET commandBrijesh Singh2017-12-041-0/+68
| | * | | | KVM: SVM: Add support for SEV DEBUG_ENCRYPT commandBrijesh Singh2017-12-041-5/+93
| | * | | | KVM: SVM: Add support for SEV DEBUG_DECRYPT commandBrijesh Singh2017-12-041-0/+152
| | * | | | KVM: SVM: Add support for SEV GUEST_STATUS commandBrijesh Singh2017-12-041-0/+33
| | * | | | KVM: SVM: Add support for SEV LAUNCH_FINISH commandBrijesh Singh2017-12-041-0/+23