index
:
blackbird-op-linux
master
Blackbird™ Linux sources for OpenPOWER
Raptor Computing Systems
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
arch
/
x86
Commit message (
Expand
)
Author
Age
Files
Lines
...
|
*
|
|
|
|
|
|
|
KVM: X86: Add 'else' to unify fastop and execute call path
Miaohe Lin
2020-01-27
1
-4
/
+2
|
*
|
|
|
|
|
|
|
KVM: x86: inline memslot_valid_for_gpte
Paolo Bonzini
2020-01-27
1
-13
/
+4
|
*
|
|
|
|
|
|
|
KVM: x86/mmu: Use huge pages for DAX-backed files
Sean Christopherson
2020-01-27
1
-5
/
+4
|
*
|
|
|
|
|
|
|
KVM: x86/mmu: Remove lpage_is_disallowed() check from set_spte()
Sean Christopherson
2020-01-27
1
-36
/
+3
|
*
|
|
|
|
|
|
|
KVM: x86/mmu: Fold max_mapping_level() into kvm_mmu_hugepage_adjust()
Sean Christopherson
2020-01-27
2
-37
/
+30
|
*
|
|
|
|
|
|
|
KVM: x86/mmu: Zap any compound page when collapsing sptes
Sean Christopherson
2020-01-27
1
-1
/
+1
|
*
|
|
|
|
|
|
|
KVM: x86/mmu: Remove obsolete gfn restoration in FNAME(fetch)
Sean Christopherson
2020-01-27
1
-10
/
+3
|
*
|
|
|
|
|
|
|
KVM: x86/mmu: Rely on host page tables to find HugeTLB mappings
Sean Christopherson
2020-01-27
2
-70
/
+29
|
*
|
|
|
|
|
|
|
KVM: x86/mmu: Drop level optimization from fast_page_fault()
Sean Christopherson
2020-01-27
1
-4
/
+3
|
*
|
|
|
|
|
|
|
KVM: x86/mmu: Walk host page tables to find THP mappings
Sean Christopherson
2020-01-27
1
-2
/
+31
|
*
|
|
|
|
|
|
|
KVM: x86/mmu: Refactor THP adjust to prep for changing query
Sean Christopherson
2020-01-27
2
-24
/
+23
|
*
|
|
|
|
|
|
|
x86/mm: Introduce lookup_address_in_mm()
Sean Christopherson
2020-01-27
2
-0
/
+15
|
*
|
|
|
|
|
|
|
KVM: Use vcpu-specific gva->hva translation when querying host page size
Sean Christopherson
2020-01-27
1
-3
/
+3
|
*
|
|
|
|
|
|
|
mm: thp: KVM: Explicitly check for THP when populating secondary MMU
Sean Christopherson
2020-01-27
1
-2
/
+2
|
*
|
|
|
|
|
|
|
KVM: x86/mmu: Enforce max_level on HugeTLB mappings
Sean Christopherson
2020-01-27
1
-2
/
+3
|
*
|
|
|
|
|
|
|
kvm/x86: export kvm_vector_hashing_enabled() is unnecessary
Peng Hao
2020-01-27
1
-1
/
+0
|
*
|
|
|
|
|
|
|
KVM: VMX: remove duplicated segment cache clear
Miaohe Lin
2020-01-27
1
-2
/
+0
|
*
|
|
|
|
|
|
|
Adding 'else' to reduce checking.
Haiwei Li
2020-01-27
1
-2
/
+2
|
*
|
|
|
|
|
|
|
KVM: nVMX: Check GUEST_DR7 on vmentry of nested guests
Krish Sadhukhan
2020-01-27
3
-1
/
+11
|
*
|
|
|
|
|
|
|
KVM: X86: Drop x86_set_memory_region()
Peter Xu
2020-01-27
3
-18
/
+12
|
*
|
|
|
|
|
|
|
KVM: X86: Don't take srcu lock in init_rmode_identity_map()
Peter Xu
2020-01-27
1
-7
/
+3
|
*
|
|
|
|
|
|
|
x86/kvm/hyper-v: remove stale evmcs_already_enabled check from nested_enable_...
Vitaly Kuznetsov
2020-01-27
1
-5
/
+0
|
*
|
|
|
|
|
|
|
KVM: x86: Perform non-canonical checks in 32-bit KVM
Sean Christopherson
2020-01-27
2
-10
/
+0
|
*
|
|
|
|
|
|
|
KVM: nVMX: WARN on failure to set IA32_PERF_GLOBAL_CTRL
Oliver Upton
2020-01-27
1
-14
/
+4
|
*
|
|
|
|
|
|
|
KVM: x86: Remove unused ctxt param from emulator's FPU accessors
Sean Christopherson
2020-01-27
1
-15
/
+13
|
*
|
|
|
|
|
|
|
KVM: x86: Revert "KVM: X86: Fix fpu state crash in kvm guest"
Sean Christopherson
2020-01-27
1
-6
/
+3
|
*
|
|
|
|
|
|
|
KVM: x86: Ensure guest's FPU state is loaded when accessing for emulation
Sean Christopherson
2020-01-27
1
-0
/
+39
|
*
|
|
|
|
|
|
|
KVM: x86: Handle TIF_NEED_FPU_LOAD in kvm_{load,put}_guest_fpu()
Sean Christopherson
2020-01-27
1
-2
/
+17
|
*
|
|
|
|
|
|
|
Revert "KVM: x86: Add a WARN on TIF_NEED_FPU_LOAD in kvm_load_guest_fpu()"
Paolo Bonzini
2020-01-27
1
-7
/
+0
|
*
|
|
|
|
|
|
|
KVM: apic: short-circuit kvm_apic_accept_pic_intr() when pic intr is accepted
Miaohe Lin
2020-01-27
1
-4
/
+3
|
*
|
|
|
|
|
|
|
KVM: x86: avoid clearing pending exception event twice
Miaohe Lin
2020-01-27
1
-1
/
+0
|
*
|
|
|
|
|
|
|
KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacks
Marios Pomonis
2020-01-27
1
-8
/
+16
|
*
|
|
|
|
|
|
|
KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacks
Marios Pomonis
2020-01-27
1
-2
/
+6
|
*
|
|
|
|
|
|
|
KVM: x86: Protect exit_reason from being used in Spectre-v1/L1TF attacks
Marios Pomonis
2020-01-27
1
-25
/
+32
|
*
|
|
|
|
|
|
|
KVM: x86: Refactor prefix decoding to prevent Spectre-v1/L1TF attacks
Marios Pomonis
2020-01-27
1
-2
/
+14
|
*
|
|
|
|
|
|
|
KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks i...
Marios Pomonis
2020-01-27
1
-2
/
+8
|
*
|
|
|
|
|
|
|
KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF ...
Marios Pomonis
2020-01-27
1
-4
/
+14
|
*
|
|
|
|
|
|
|
KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() fro...
Marios Pomonis
2020-01-27
1
-2
/
+6
|
*
|
|
|
|
|
|
|
KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacks
Marios Pomonis
2020-01-27
1
-4
/
+9
|
*
|
|
|
|
|
|
|
KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacks
Marios Pomonis
2020-01-27
1
-0
/
+1
|
*
|
|
|
|
|
|
|
KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacks
Marios Pomonis
2020-01-27
1
-6
/
+8
|
*
|
|
|
|
|
|
|
KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacks
Marios Pomonis
2020-01-27
1
-1
/
+5
|
*
|
|
|
|
|
|
|
KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacks
Marios Pomonis
2020-01-27
1
-4
/
+6
|
*
|
|
|
|
|
|
|
KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacks
Marios Pomonis
2020-01-27
1
-3
/
+8
|
*
|
|
|
|
|
|
|
kvm/svm: PKU not currently supported
John Allen
2020-01-27
5
-1
/
+16
|
*
|
|
|
|
|
|
|
KVM: Drop kvm_arch_vcpu_init() and kvm_arch_vcpu_uninit()
Sean Christopherson
2020-01-27
1
-10
/
+0
|
*
|
|
|
|
|
|
|
KVM: x86: Move all vcpu init code into kvm_arch_vcpu_create()
Sean Christopherson
2020-01-27
1
-98
/
+100
|
*
|
|
|
|
|
|
|
KVM: Drop kvm_arch_vcpu_setup()
Sean Christopherson
2020-01-27
1
-5
/
+0
|
*
|
|
|
|
|
|
|
KVM: x86: Move guts of kvm_arch_vcpu_setup() into kvm_arch_vcpu_create()
Sean Christopherson
2020-01-27
1
-4
/
+10
|
*
|
|
|
|
|
|
|
KVM: Move vcpu alloc and init invocation to common code
Sean Christopherson
2020-01-27
1
-26
/
+2
[prev]
[next]