summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/vmx.c
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'kvm-3.8-1' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2012-12-131-58/+145
|\
| * VMX: remove unneeded enable_unrestricted_guest checkGleb Natapov2012-12-111-1/+1
| * KVM: VMX: fix DPL during entry to protected modeGleb Natapov2012-12-111-0/+1
| * KVM: VMX: provide the vmclear function and a bitmap to support VMCLEAR in kdumpZhang Yanfei2012-12-061-0/+67
| * KVM: x86: Make register state after reset conform to specificationJulian Stecklina2012-12-051-8/+0
| * kvm: don't use bit24 for detecting address-specific invalidation capabilityZhang Xiantao2012-12-051-16/+0
| * kvm: remove unnecessary bit checking for ept violationZhang Xiantao2012-12-051-5/+0
| * KVM: x86: Emulate IA32_TSC_ADJUST MSRWill Auld2012-11-301-0/+9
| * KVM: x86: Add code to track call origin for msr assignmentWill Auld2012-11-301-6/+12
| * KVM: VMX: fix memory order between loading vmcs and clearing vmcsXiao Guangrong2012-11-291-0/+17
| * KVM: VMX: fix invalid cpu passed to smp_call_function_singleXiao Guangrong2012-11-281-3/+5
| * KVM: x86: add kvm_arch_vcpu_postcreate callback, move TSC initializationMarcelo Tosatti2012-11-271-2/+0
| * KVM: x86: pass host_tsc to read_l1_tscMarcelo Tosatti2012-11-271-3/+2
| * KVM: VMX: report internal error for MMIO #PF due to delivery eventXiao Guangrong2012-10-181-10/+16
| * KVM: VMX: report internal error for the unhandleable eventXiao Guangrong2012-10-181-4/+15
* | KVM: x86: Fix invalid secondary exec controls in vmx_cpuid_update()Takashi Iwai2012-11-161-4/+7
|/
* Merge tag 'kvm-3.7-1' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2012-10-041-136/+97
|\
| * KVM: x86: Fix guest debug across vcpu INIT resetJan Kiszka2012-09-231-13/+1
| * KVM: VMX: Make use of asm.hAvi Kivity2012-09-171-39/+30
| * KVM: VMX: Make lto-friendlyAvi Kivity2012-09-171-6/+11
| * KVM: VMX: constify lookup tablesMathias Krause2012-09-051-7/+7
| * KVM: VMX: Ignore segment G and D bits when considering whether we can virtualizeAvi Kivity2012-08-271-1/+1
| * KVM: VMX: Save all segment data in real modeAvi Kivity2012-08-271-0/+1
| * KVM: VMX: Preserve segment limit and access rights in real modeAvi Kivity2012-08-271-0/+3
| * KVM: VMX: Return real real-mode segment data even if emulate_invalid_guest_st...Avi Kivity2012-08-271-2/+1
| * KVM: VMX: Allow vm86 virtualization of big real modeAvi Kivity2012-08-271-1/+1
| * KVM: VMX: Allow real mode emulation using vm86 with dpl=0Avi Kivity2012-08-271-1/+1
| * KVM: VMX: Retain limit and attributes when entering protected modeAvi Kivity2012-08-271-6/+6
| * KVM: VMX: Use kvm_segment to save protected-mode segments when entering realmodeAvi Kivity2012-08-271-61/+24
| * KVM: VMX: Fix incorrect lookup of segment S flag in fix_pmode_dataseg()Avi Kivity2012-08-271-2/+2
| * KVM: VMX: Separate saving pre-realmode state from setting segmentsAvi Kivity2012-08-271-7/+13
| * KVM: VMX: Advertize RDTSC exiting to nested guestsAvi Kivity2012-08-131-1/+1
| * KVM: VMX: restore MSR_IA32_DEBUGCTLMSR after VMEXITGleb Natapov2012-08-131-0/+6
| * KVM: do not release the error pageXiao Guangrong2012-08-061-3/+2
| * Merge remote-tracking branch 'upstream' into nextAvi Kivity2012-08-051-7/+13
| |\
| * | KVM: VMX: Fix typosGuo Chao2012-07-201-3/+3
* | | Merge branch 'x86-fpu-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2012-10-011-3/+7
|\ \ \
| * | | x86, kvm: fix kvm's usage of kernel_fpu_begin/end()Suresh Siddha2012-09-211-3/+7
| | |/ | |/|
* | | arch/x86: Remove unecessary semicolonsPeter Senna Tschudin2012-09-191-1/+1
* | | KVM: fix error paths for failed gfn_to_page() callsXiao Guangrong2012-09-101-3/+16
* | | KVM: x86: Check INVPCID feature bit in EBX of leaf 7Ren, Yongjie2012-09-091-2/+2
|/ /
* | KVM: VMX: Fix ds/es corruption on i386 with preemptionAvi Kivity2012-08-011-7/+13
|/
* KVM: VMX: Implement PCID/INVPCID for guests with EPTMao, Junjie2012-07-121-1/+33
* KVM: VMX: export PFEC.P bit on eptXiao Guangrong2012-07-111-1/+8
* KVM: VMX: Emulate invalid guest state by defaultAvi Kivity2012-07-091-1/+1
* KVM: VMX: Improve error reporting during invalid guest state emulationAvi Kivity2012-07-091-1/+5
* KVM: VMX: Stop invalid guest state emulation on pending eventAvi Kivity2012-07-091-0/+3
* KVM: VMX: Continue emulating after batch exhaustedAvi Kivity2012-07-091-1/+1
* KVM: VMX: Fix interrupt exit condition during emulationAvi Kivity2012-07-091-2/+1
* KVM: VMX: Limit iterations with emulator_invalid_guest_stateAvi Kivity2012-07-091-1/+2
OpenPOWER on IntegriCloud