summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/vmx.c
Commit message (Expand)AuthorAgeFilesLines
...
| * kvm: x86: avoid atomic operations on APICv vmentryPaolo Bonzini2016-11-031-1/+13
| * KVM: nVMX: support descriptor table exitsPaolo Bonzini2016-11-021-0/+3
| * kvm: x86: remove the misleading comment in vmx_handle_external_intrLongpeng(Mike)2016-11-021-5/+0
| * KVM: VMX: refactor setup of global page-sized bitmapsRadim Krčmář2016-11-021-82/+38
| * KVM: VMX: join functions that disable x2apic msr interceptsRadim Krčmář2016-11-021-36/+15
| * KVM: VMX: remove functions that enable msr interceptsRadim Krčmář2016-11-021-53/+4
| * kvm: nVMX: Update MSR load counts on a VMCS switchJim Mattson2016-11-021-0/+11
| * kvm: nVMX: Fetch VM_INSTRUCTION_ERROR from vmcs02 on vmx->failJim Mattson2016-11-021-1/+5
| * KVM: VMX: Better name x2apic msr bitmapsWanpeng Li2016-11-021-36/+36
* | Merge branch 'linus' into x86/fpu, to resolve conflictsIngo Molnar2016-11-231-45/+20
|\ \ | |/
| * kvm: nVMX: VMCLEAR an active shadow VMCS after last useJim Mattson2016-11-021-7/+15
| * KVM: x86: drop TSC offsetting kvm_x86_ops to fix KVM_GET/SET_CLOCKPaolo Bonzini2016-11-021-36/+3
| * kvm: nVMX: Fix kernel panics induced by illegal INVEPT/INVVPID typesJim Mattson2016-10-271-2/+2
* | x86/fpu, kvm: Remove host CR0.TS manipulationAndy Lutomirski2016-11-011-8/+4
|/
* Merge tag 'kvm-4.9-1' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2016-10-061-72/+135
|\
| * KVM: nVMX: Fix the NMI IDT-vectoring handlingWanpeng Li2016-09-231-15/+16
| * KVM: VMX: Enable MSR-BASED TPR shadow even if APICv is inactiveWanpeng Li2016-09-231-38/+94
| * KVM: nVMX: Fix reload apic access page warningWanpeng Li2016-09-231-1/+1
| * kvm: x86: drop read_tsc_offset()Luiz Capitulino2016-09-161-6/+0
| * KVM: nVMX: expose INS/OUTS information supportJan Dakinevich2016-09-071-0/+9
| * KVM: VMX: not use vmcs_config in setup_vmcs_configPaolo Bonzini2016-09-071-1/+1
| * KVM: x86: ratelimit and decrease severity for guest-triggered printkPaolo Bonzini2016-09-071-9/+9
| * KVM: nVMX: pass valid guest linear-address to the L1Jan Dakinevich2016-09-071-0/+3
| * KVM: nVMX: make emulated nested preemption timer pinnedWanpeng Li2016-09-071-1/+1
| * vmx: refine validity check for guest linear addressLiang Li2016-09-071-1/+1
* | Merge branch 'linus' into x86/asm, to pick up recent fixesIngo Molnar2016-09-151-67/+69
|\ \ | |/
| * kvm: nVMX: fix nested tsc scalingPeter Feiner2016-08-181-4/+12
| * KVM: nVMX: postpone VMCS changes on MSR_IA32_APICBASE writeRadim Krčmář2016-08-181-0/+13
| * KVM: nVMX: fix msr bitmaps to prevent L2 from accessing L0 x2APICRadim Krčmář2016-08-181-63/+44
* | x86: Apply more __ro_after_init and constKees Cook2016-08-101-1/+1
|/
* nvmx: mark ept single context invalidation as supportedBandan Das2016-08-041-7/+7
* nvmx: remove comment about missing nested vpid supportBandan Das2016-08-041-1/+0
* Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2016-08-021-46/+340
|\
| * KVM: VMX: Add VMCS to CPU's loaded VMCSs before VMPTRLDJim Mattson2016-08-011-11/+15
| * kvm: x86: nVMX: maintain internal copy of current VMCSDavid Matlack2016-08-011-3/+28
| * KVM: x86: add KVM_CAP_X2APIC_APIRadim Krčmář2016-07-141-1/+1
| * KVM: VMX: optimize APIC ID read with APICvRadim Krčmář2016-07-141-3/+0
| * kvm: vmx: advertise support for ept execute onlyBandan Das2016-07-141-0/+3
| * kvm: mmu: track read permission explicitly for shadow EPT page tablesBandan Das2016-07-141-6/+9
| * kvm: mmu: don't set the present bit unconditionallyBandan Das2016-07-141-0/+1
| * KVM: VMX: introduce vm_{entry,exit}_control_reset_shadowPaolo Bonzini2016-07-111-2/+12
| * KVM: nVMX: keep preemption timer enabled during L2 executionPaolo Bonzini2016-07-111-2/+13
| * KVM: nVMX: avoid incorrect preemption timer vmexit in nested guestWanpeng Li2016-07-111-0/+2
| * KVM: VMX: reflect broken preemption timer in vmcs_configPaolo Bonzini2016-07-111-3/+2
| * KVM: x86: Use ARRAY_SIZE instead of dividing sizeof array with sizeof an elementWei Yongjun2016-07-051-1/+1
| * KVM: vmx: fix underflow in TSC deadline calculationPaolo Bonzini2016-07-011-3/+3
| * KVM: x86: use guest_exit_irqoffPaolo Bonzini2016-07-011-3/+1
| * KVM: x86: always use "acknowledge interrupt on exit"Paolo Bonzini2016-07-011-4/+3
| * KVM: VMX: enable guest access to LMCE related MSRsAshok Raj2016-06-231-0/+29
| * KVM: VMX: validate individual bits of guest MSR_IA32_FEATURE_CONTROLHaozhong Zhang2016-06-231-1/+24
OpenPOWER on IntegriCloud