index
:
starfive-tech/linux.git
JH7100_VisionFive_OH_dev
JH7110_VisionFive2_510_devel
JH7110_VisionFive2_6.1.y_devel
JH7110_VisionFive2_6.6.y_devel
JH7110_VisionFive2_devel
JH7110_VisionFive2_upstream
beaglev-5.13.y
beaglev_fedora_devel
buildroot-upstream
esmil_starlight
fedora-vic-7100_5.10.6
master
openwrt-6.1.y
rt-ethercat-release
rt-linux-6.6.y-release
rt-linux-release
rtthread_AMP
starfive-5.13
starfive-5.15-dubhe
starfive-6.1-dubhe
starfive-6.1.65-dubhe
starfive-6.6.10-dubhe
starfive-6.6.31-dubhe
starfive-6.6.48-dubhe
starlight-5.14.y
visionfive
visionfive-5.13.y-devel
visionfive-5.15.y
visionfive-5.15.y-devel
visionfive-5.15.y_fedora_devel
visionfive-5.16.y
visionfive-5.17.y
visionfive-5.18.y
visionfive-5.19.y
visionfive-6.4.y
visionfive_fedora_devel
StarFive Tech Linux Kernel for VisionFive (JH7110) boards (mirror)
Andrey V.Kosteltsev
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
arch
/
x86
/
kvm
Age
Commit message (
Expand
)
Author
Files
Lines
2024-06-28
KVM: x86: WARN if a vCPU gets a valid wakeup that KVM can't yet inject
Sean Christopherson
1
-1
/
+4
2024-06-28
KVM: nVMX: Fold requested virtual interrupt check into has_nested_events()
Sean Christopherson
5
-31
/
+5
2024-06-28
KVM: nVMX: Check for pending posted interrupts when looking for nested events
Sean Christopherson
1
-2
/
+34
2024-06-28
KVM: VMX: Split out the non-virtualization part of vmx_interrupt_blocked()
Sean Christopherson
2
-3
/
+9
2024-06-28
KVM: nVMX: Request immediate exit iff pending nested event needs injection
Sean Christopherson
2
-3
/
+3
2024-06-28
KVM: nVMX: Add a helper to get highest pending from Posted Interrupt vector
Sean Christopherson
2
-2
/
+13
2024-06-28
KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in vmx_exit()
Kai Huang
1
-1
/
+1
2024-06-28
KVM: VMX: Remove unnecessary INVEPT[GLOBAL] from hardware enable path
Sean Christopherson
1
-3
/
+0
2024-06-28
KVM: nVMX: Update VMCS12_REVISION comment to state it should never change
Sean Christopherson
1
-6
/
+8
2024-06-28
KVM: SVM: Use sev_es_host_save_area() helper when initializing tsc_aux
Sean Christopherson
1
-9
/
+6
2024-06-28
KVM: SVM: Force sev_es_host_save_area() to be inlined (for noinstr usage)
Sean Christopherson
1
-1
/
+1
2024-06-28
KVM: x86: Add missing MODULE_DESCRIPTION() macros
Jeff Johnson
2
-0
/
+2
2024-06-28
KVM: Validate hva in kvm_gpc_activate_hva() to fix __kvm_gpc_refresh() WARN
Pei Li
1
-1
/
+1
2024-06-21
KVM: SEV-ES: Fix svm_get_msr()/svm_set_msr() for KVM_SEV_ES_INIT guests
Michael Roth
1
-2
/
+2
2024-06-21
KVM: x86/tdp_mmu: Take a GFN in kvm_tdp_mmu_fast_pf_get_last_sptep()
Rick Edgecombe
3
-4
/
+3
2024-06-21
KVM: x86/tdp_mmu: Rename REMOVED_SPTE to FROZEN_SPTE
Rick Edgecombe
4
-28
/
+28
2024-06-21
Merge branch 'kvm-6.10-fixes' into HEAD
Paolo Bonzini
2
-8
/
+4
2024-06-21
KVM: x86/tdp_mmu: Sprinkle __must_check
Isaku Yamahata
1
-6
/
+7
2024-06-20
KVM: x86: Always sync PIR to IRR prior to scanning I/O APIC routes
Sean Christopherson
1
-5
/
+4
2024-06-18
KVM: Introduce vcpu->wants_to_run
David Matlack
1
-2
/
+2
2024-06-18
KVM: x86: Prevent excluding the BSP on setting max_vcpu_ids
Sean Christopherson
1
-1
/
+3
2024-06-18
KVM: x86: Limit check IDs for KVM_SET_BOOT_CPU_ID
Mathias Krause
1
-0
/
+3
2024-06-14
KVM: x86/mmu: Avoid reacquiring RCU if TDP MMU fails to allocate an SP
David Matlack
1
-7
/
+5
2024-06-14
KVM: x86/mmu: Unnest TDP MMU helpers that allocate SPs for eager splitting
David Matlack
1
-30
/
+18
2024-06-14
KVM: x86/mmu: Hard code GFP flags for TDP MMU eager split allocations
David Matlack
1
-6
/
+4
2024-06-14
KVM: x86/mmu: Always drop mmu_lock to allocate TDP MMU SPs for eager splitting
David Matlack
1
-15
/
+1
2024-06-14
KVM: x86/mmu: Rephrase comment about synthetic PFERR flags in #PF handler
Sean Christopherson
1
-1
/
+4
2024-06-12
KVM: x86: Drop now-superflous setting of l1tf_flush_l1d in vcpu_run()
Sean Christopherson
2
-4
/
+4
2024-06-12
KVM: x86: Unconditionally set l1tf_flush_l1d during vCPU load
Sean Christopherson
1
-6
/
+5
2024-06-12
KVM: Delete the now unused kvm_arch_sched_in()
Sean Christopherson
2
-8
/
+3
2024-06-12
KVM: x86: Fold kvm_arch_sched_in() into kvm_arch_vcpu_load()
Sean Christopherson
5
-24
/
+16
2024-06-12
KVM: VMX: Move PLE grow/shrink helpers above vmx_vcpu_load()
Sean Christopherson
1
-32
/
+32
2024-06-12
KVM: x86: Don't re-setup empty IRQ routing when KVM_CAP_SPLIT_IRQCHIP
Yi Wang
3
-11
/
+0
2024-06-11
KVM: x86/pmu: Add a helper to enable bits in FIXED_CTR_CTRL
Sean Christopherson
1
-10
/
+12
2024-06-11
KVM: x86: Add KVM_RUN_X86_GUEST_MODE kvm_run flag
Thomas Prescher
1
-0
/
+3
2024-06-11
KVM: x86: Bury guest_cpuid_is_amd_or_hygon() in cpuid.c
Sean Christopherson
2
-10
/
+12
2024-06-11
KVM: x86: Open code vendor_intel() in string_registers_quirk()
Sean Christopherson
1
-12
/
+8
2024-06-11
KVM: x86: Allow SYSENTER in Compatibility Mode for all Intel compat vCPUs
Sean Christopherson
1
-4
/
+6
2024-06-11
KVM: SVM: Emulate SYSENTER RIP/RSP behavior for all Intel compat vCPUs
Sean Christopherson
2
-15
/
+7
2024-06-11
KVM: x86: Use "is Intel compatible" helper to emulate SYSCALL in !64-bit
Sean Christopherson
3
-36
/
+16
2024-06-11
KVM: x86: Inhibit code #DBs in MOV-SS shadow for all Intel compat vCPUs
Sean Christopherson
1
-8
/
+6
2024-06-11
KVM: x86: Apply Intel's TSC_AUX reserved-bit behavior to Intel compat vCPUs
Sean Christopherson
1
-4
/
+4
2024-06-11
KVM: x86/pmu: Squash period for checkpointed events based on host HLE/RTM
Sean Christopherson
1
-1
/
+1
2024-06-10
KVM: VMX: Remove unused declaration of vmx_request_immediate_exit()
Binbin Wu
1
-1
/
+0
2024-06-10
KVM: x86: Drop unused check_apicv_inhibit_reasons() callback definition
Hou Wenlong
1
-1
/
+0
2024-06-07
KVM: VMX: Always honor guest PAT on CPUs that support self-snoop
Sean Christopherson
2
-7
/
+11
2024-06-07
KVM: x86: Ensure a full memory barrier is emitted in the VM-Exit path
Yan Zhao
1
-0
/
+6
2024-06-05
KVM: VMX: Drop support for forcing UC memory when guest CR0.CD=1
Sean Christopherson
2
-10
/
+0
2024-06-05
KVM: x86: Remove VMX support for virtualizing guest MTRR memtypes
Sean Christopherson
6
-684
/
+58
2024-06-05
KVM: x86: Keep consistent naming for APICv/AVIC inhibit reasons
Alejandro Jimenez
3
-3
/
+3
[prev]
[next]