summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm
Commit message (Expand)AuthorAgeFilesLines
* KVM/VMX: Optimize vmx_vcpu_run() and svm_vcpu_run() by marking the RDMSR path...Paolo Bonzini2018-02-232-2/+2
* KVM/x86: Remove indirect MSR op calls from SPEC_CTRLPaolo Bonzini2018-02-232-6/+8
* Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2018-02-142-8/+11
|\
| * KVM/nVMX: Set the CPU_BASED_USE_MSR_BITMAPS if we have a valid L02 MSR bitmapKarimAllah Ahmed2018-02-131-1/+2
| * X86/nVMX: Properly set spec_ctrl and pred_cmd before merging MSRsKarimAllah Ahmed2018-02-131-2/+2
| * KVM/x86: Reduce retpoline performance impact in slot_handle_level_range(), by...David Woodhouse2018-02-131-5/+5
* | Merge tag 'kvm-4.16-1' of git://git.kernel.org/pub/scm/virt/kvm/kvmLinus Torvalds2018-02-1013-500/+2054
|\ \
| * \ Merge branch 'msr-bitmaps' of git://git.kernel.org/pub/scm/virt/kvm/kvmRadim Krčmář2018-02-091-143/+164
| |\ \
| * | | KVM: x86: don't forget vcpu_put() in kvm_arch_vcpu_ioctl_set_sregs()Eric Biggers2018-02-021-1/+1
| * | | Merge branch 'x86/hyperv' of git://git.kernel.org/pub/scm/linux/kernel/git/ti...Radim Krčmář2018-02-015-63/+230
| |\ \ \
| | * | | x86/kvm: Make it compile on 32bit and with HYPYERVISOR_GUEST=nThomas Gleixner2018-01-311-4/+4
| | * | | x86/kvm: Support Hyper-V reenlightenmentVitaly Kuznetsov2018-01-301-0/+45
| | * | | x86/kvm: Pass stable clocksource to guests when running nested on Hyper-VVitaly Kuznetsov2018-01-301-25/+68
| * | | | kvm: x86: remove efer_reload entry in kvm_vcpu_statLongpeng(Mike)2018-01-311-1/+0
| * | | | KVM: x86: AMD Processor Topology InformationStanislav Lanci2018-01-311-1/+2
| * | | | x86/kvm/vmx: do not use vm-exit instruction length for fast MMIO when running...Vitaly Kuznetsov2018-01-312-2/+17
| * | | | KVM: VMX: introduce X2APIC_MSR macroPaolo Bonzini2018-01-161-10/+9
| * | | | KVM: vmx: speed up MSR bitmap mergePaolo Bonzini2018-01-161-36/+42
| * | | | KVM: vmx: simplify MSR bitmap setupPaolo Bonzini2018-01-161-8/+6
| * | | | KVM: nVMX: remove unnecessary vmwrite from L2->L1 vmexitPaolo Bonzini2018-01-161-3/+0
| * | | | KVM: nVMX: initialize more non-shadowed fields in prepare_vmcs02_fullPaolo Bonzini2018-01-161-79/+83
| * | | | KVM: nVMX: initialize descriptor cache fields in prepare_vmcs02_fullPaolo Bonzini2018-01-161-22/+34
| * | | | KVM: nVMX: track dirty state of non-shadowed VMCS fieldsPaolo Bonzini2018-01-162-1/+34
| * | | | KVM: VMX: split list of shadowed VMCS field to a separate filePaolo Bonzini2018-01-162-60/+75
| * | | | kvm: vmx: Reduce size of vmcs_field_to_offset_tableJim Mattson2018-01-161-7/+13
| * | | | kvm: vmx: Change vmcs_field_type to vmcs_field_widthJim Mattson2018-01-161-19/+19
| * | | | kvm: vmx: Introduce VMCS12_MAX_FIELD_INDEXJim Mattson2018-01-161-1/+7
| * | | | KVM: VMX: optimize shadow VMCS copyingPaolo Bonzini2018-01-161-78/+65
| * | | | KVM: vmx: shadow more fields that are read/written on every vmexitsPaolo Bonzini2018-01-161-9/+23
| * | | | KVM: nVMX: Fix races when sending nested PI while dest enters/leaves L2Liran Alon2018-01-161-2/+3
| * | | | KVM: nVMX: Fix injection to L2 when L1 don't intercept external-interruptsLiran Alon2018-01-162-25/+18
| * | | | KVM: nVMX: Re-evaluate L1 pending events when running L2 and L1 got posted-in...Liran Alon2018-01-161-1/+11
| * | | | KVM: x86: Change __kvm_apic_update_irr() to also return if max IRR updatedLiran Alon2018-01-163-11/+21
| * | | | KVM: x86: Optimization: Create SVM stubs for sync_pir_to_irr()Liran Alon2018-01-163-7/+6
| * | | | KVM: nVMX: Fix bug of injecting L2 exception into L1Liran Alon2018-01-162-1/+1
| * | | | kvm/vmx: Use local vmx variable in vmx_get_msr()Borislav Petkov2018-01-161-5/+6
| * | | | KVM: MMU: consider host cache mode in MMIO page checkHaozhong Zhang2018-01-161-1/+13
| * | | | Merge branch 'kvm-insert-lfence'Paolo Bonzini2018-01-161-2/+10
| |\ \ \ \
| * | | | | KVM: x86: prefer "depends on" to "select" for SEVPaolo Bonzini2018-01-161-3/+1
| * | | | | Merge branch 'sev-v9-p2' of https://github.com/codomania/kvmPaolo Bonzini2018-01-165-11/+1219
| |\ \ \ \ \
| | * | | | | KVM: X86: Restart the guest when insn_len is zero and SEV is enabledBrijesh Singh2017-12-042-2/+14
| | * | | | | KVM: SVM: Do not install #UD intercept when SEV is enabledBrijesh Singh2017-12-041-1/+3
| | * | | | | KVM: SVM: Clear C-bit from the page fault addressBrijesh Singh2017-12-041-2/+2
| | * | | | | KVM: SVM: Pin guest memory when SEV is activeBrijesh Singh2017-12-041-0/+132
| | * | | | | KVM: SVM: Add support for SEV LAUNCH_SECRET commandBrijesh Singh2017-12-041-0/+68
| | * | | | | KVM: SVM: Add support for SEV DEBUG_ENCRYPT commandBrijesh Singh2017-12-041-5/+93
| | * | | | | KVM: SVM: Add support for SEV DEBUG_DECRYPT commandBrijesh Singh2017-12-041-0/+152
| | * | | | | KVM: SVM: Add support for SEV GUEST_STATUS commandBrijesh Singh2017-12-041-0/+33
| | * | | | | KVM: SVM: Add support for SEV LAUNCH_FINISH commandBrijesh Singh2017-12-041-0/+23
| | * | | | | KVM: SVM: Add support for KVM_SEV_LAUNCH_MEASURE commandBrijesh Singh2017-12-041-0/+74
OpenPOWER on IntegriCloud