index
:
starfive-tech/linux.git
JH7100_VisionFive_OH_dev
JH7110_VisionFive2_510_devel
JH7110_VisionFive2_6.1.y_devel
JH7110_VisionFive2_6.6.y_devel
JH7110_VisionFive2_devel
JH7110_VisionFive2_upstream
beaglev-5.13.y
beaglev_fedora_devel
buildroot-upstream
esmil_starlight
fedora-vic-7100_5.10.6
master
openwrt-6.1.y
rt-ethercat-release
rt-linux-6.6.y-release
rt-linux-release
rtthread_AMP
starfive-5.13
starfive-5.15-dubhe
starfive-6.1-dubhe
starfive-6.1.65-dubhe
starfive-6.6.10-dubhe
starfive-6.6.31-dubhe
starlight-5.14.y
visionfive
visionfive-5.13.y-devel
visionfive-5.15.y
visionfive-5.15.y-devel
visionfive-5.15.y_fedora_devel
visionfive-5.16.y
visionfive-5.17.y
visionfive-5.18.y
visionfive-5.19.y
visionfive-6.4.y
visionfive_fedora_devel
StarFive Tech Linux Kernel for VisionFive (JH7110) boards (mirror)
Andrey V.Kosteltsev
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
arch
/
x86
/
kvm
/
vmx
Age
Commit message (
Expand
)
Author
Files
Lines
2022-08-01
Merge remote-tracking branch 'kvm/next' into kvm-next-5.20
Paolo Bonzini
12
-306
/
+659
2022-07-28
KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIP
Sean Christopherson
1
-0
/
+3
2022-07-28
Revert "KVM: nVMX: Expose load IA32_PERF_GLOBAL_CTRL VM-{Entry,Exit} control"
Paolo Bonzini
3
-27
/
+0
2022-07-28
KVM: nVMX: Attempt to load PERF_GLOBAL_CTRL on nVMX xfer iff it exists
Sean Christopherson
1
-1
/
+3
2022-07-28
KVM: VMX: Add helper to check if the guest PMU has PERF_GLOBAL_CTRL
Sean Christopherson
2
-2
/
+14
2022-07-28
KVM: VMX: Mark all PERF_GLOBAL_(OVF)_CTRL bits reserved if there's no vPMU
Sean Christopherson
1
-0
/
+2
2022-07-28
Revert "KVM: nVMX: Do not expose MPX VMX controls when guest MPX disabled"
Paolo Bonzini
1
-20
/
+1
2022-07-28
KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value
Sean Christopherson
1
-33
/
+37
2022-07-28
KVM: nVMX: Rename handle_vm{on,off}() to handle_vmx{on,off}()
Sean Christopherson
1
-4
/
+4
2022-07-28
KVM: nVMX: Inject #UD if VMXON is attempted with incompatible CR0/CR4
Sean Christopherson
1
-9
/
+14
2022-07-28
KVM: nVMX: Account for KVM reserved CR4 bits in consistency checks
Sean Christopherson
1
-1
/
+2
2022-07-28
KVM: x86: Split kvm_is_valid_cr4() and export only the non-vendor bits
Sean Christopherson
1
-2
/
+2
2022-07-14
KVM: x86: Restrict get_mt_mask() to a u8, use KVM_X86_OP_OPTIONAL_RET0
Sean Christopherson
1
-1
/
+1
2022-07-14
KVM: x86: Add dedicated helper to get CPUID entry with significant index
Sean Christopherson
3
-9
/
+9
2022-07-14
Merge commit 'kvm-vmx-nested-tsc-fix' into kvm-master
Paolo Bonzini
1
-1
/
+0
2022-07-14
KVM: nVMX: Always enable TSC scaling for L2 when it was enabled for L1
Vitaly Kuznetsov
1
-1
/
+0
2022-07-14
KVM: VMX: Update PT MSR intercepts during filter change iff PT in host+guest
Sean Christopherson
1
-1
/
+3
2022-07-13
KVM: x86/mmu: Replace UNMAPPED_GVA with INVALID_GPA for gva_to_gpa()
Hou Wenlong
1
-1
/
+1
2022-07-12
KVM: nVMX: Always enable TSC scaling for L2 when it was enabled for L1
Vitaly Kuznetsov
1
-1
/
+0
2022-06-27
KVM: VMX: Prevent RSB underflow before vmenter
Josh Poimboeuf
5
-13
/
+34
2022-06-27
x86/speculation: Fill RSB on vmexit for IBRS
Josh Poimboeuf
1
-3
/
+3
2022-06-27
KVM: VMX: Fix IBRS handling after vmexit
Josh Poimboeuf
1
-1
/
+6
2022-06-27
KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
Josh Poimboeuf
4
-31
/
+68
2022-06-27
KVM: VMX: Convert launched argument to flags
Josh Poimboeuf
5
-9
/
+31
2022-06-27
KVM: VMX: Flatten __vmx_vcpu_run()
Josh Poimboeuf
1
-73
/
+46
2022-06-27
x86/kvm/vmx: Make noinstr clean
Peter Zijlstra
1
-3
/
+3
2022-06-24
KVM: nVMX: clean up posted interrupt descriptor try_cmpxchg
Paolo Bonzini
1
-7
/
+8
2022-06-24
KVM: x86: Enable CMCI capability by default and handle injected UCNA errors
Jue Wang
1
-0
/
+1
2022-06-20
KVM: VMX: Use vcpu_get_perf_capabilities() to get guest-visible value
Sean Christopherson
1
-4
/
+7
2022-06-20
Revert "KVM: x86: always allow host-initiated writes to PMU MSRs"
Sean Christopherson
1
-17
/
+10
2022-06-20
KVM: VMX: Give host userspace full control of MSR_IA32_PERF_CAPABILITIES
Sean Christopherson
1
-2
/
+0
2022-06-20
KVM: x86: Give host userspace full control of MSR_IA32_MISC_ENABLES
Sean Christopherson
1
-5
/
+0
2022-06-20
KVM: nVMX: Use kvm_vcpu_map() to get/pin vmcs12's APIC-access page
Sean Christopherson
2
-28
/
+13
2022-06-20
KVM: VMX: Refactor 32-bit PSE PT creation to avoid using MMU macro
Sean Christopherson
1
-1
/
+1
2022-06-20
KVM: x86: Move "apicv_active" into "struct kvm_lapic"
Sean Christopherson
1
-1
/
+2
2022-06-20
KVM: x86: Drop @vcpu parameter from kvm_x86_ops.hwapic_isr_update()
Sean Christopherson
1
-1
/
+1
2022-06-20
KVM: nVMX: Update vmcs12 on BNDCFGS write, not at vmcs02=>vmcs12 sync
Sean Christopherson
2
-3
/
+6
2022-06-20
KVM: nVMX: Save BNDCFGS to vmcs12 iff relevant controls are exposed to L1
Sean Christopherson
1
-1
/
+2
2022-06-20
KVM: nVMX: Rename nested.vmcs01_* fields to nested.pre_vmenter_*
Sean Christopherson
3
-7
/
+23
2022-06-20
KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case
Sean Christopherson
1
-1
/
+2
2022-06-20
KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case
Sean Christopherson
1
-1
/
+2
2022-06-15
KVM: VMX: Use try_cmpxchg64 in pi_try_set_control
Uros Bizjak
1
-1
/
+1
2022-06-15
KVM: VMX: Skip filter updates for MSRs that KVM is already intercepting
Sean Christopherson
1
-7
/
+11
2022-06-14
Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm
Linus Torvalds
1
-1
/
+3
2022-06-14
Merge tag 'x86-bugs-2022-06-01' of git://git.kernel.org/pub/scm/linux/kernel/...
Linus Torvalds
2
-0
/
+74
2022-06-09
Merge branch 'kvm-5.20-early'
Paolo Bonzini
10
-146
/
+511
2022-06-09
KVM: x86: inhibit APICv/AVIC on changes to APIC ID or APIC base
Maxim Levitsky
1
-1
/
+3
2022-06-09
Merge tag 'kvm-riscv-fixes-5.19-1' of https://github.com/kvm-riscv/linux into...
Paolo Bonzini
1
-1
/
+1
2022-06-08
KVM: VMX: Reject kvm_intel if an inconsistent VMCS config is detected
Sean Christopherson
1
-3
/
+17
2022-06-08
KVM: VMX: Sanitize VM-Entry/VM-Exit control pairs at kvm_intel load time
Sean Christopherson
2
-7
/
+34
[next]