summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm
Commit message (Expand)AuthorAgeFilesLines
* KVM: x86: clflushopt should be treated as a no-op by emulationDavid Edmondson2020-11-221-1/+7
* KVM: x86: emulating RDPID failure shall return #UD rather than #GPRobert Hoo2020-10-291-1/+1
* KVM: Remove CREATE_IRQCHIP/SET_PIT2 raceSteve Rutherford2020-10-011-2/+8
* KVM: VMX: Don't freeze guest when event delivery causes an APIC-access exitWanpeng Li2020-09-231-0/+1
* KVM: x86: bit 8 of non-leaf PDPEs is not reservedPaolo Bonzini2020-07-221-1/+1
* KVM: X86: Fix MSR range of APIC registers in X2APIC modeXiaoyao Li2020-06-291-2/+2
* KVM: nVMX: Consult only the "basic" exit reason when routing nested exitSean Christopherson2020-06-201-1/+1
* KVM: nSVM: leave ASID aside in copy_vmcb_control_areaPaolo Bonzini2020-06-201-1/+1
* KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mceJim Mattson2020-05-201-1/+1
* KVM: VMX: Enable machine check support for 32bit targetsUros Bizjak2020-05-021-1/+1
* kvm: x86: Host feature SSBD doesn't imply guest feature SPEC_CTRL_SSBDJim Mattson2020-04-241-1/+2
* KVM: x86: Allocate new rmap and large page tracking when moving memslotSean Christopherson2020-04-241-0/+11
* KVM: VMX: Do not allow reexecute_instruction() when skipping MMIO instrSean Christopherson2020-04-021-2/+2
* KVM: x86: clear stale x86_emulate_ctxt->intercept valueVitaly Kuznetsov2020-03-201-0/+1
* KVM: apic: avoid calculating pending eoi from an uninitialized valMiaohe Lin2020-02-281-1/+3
* KVM: nVMX: Check IO instruction VM-exit conditionsOliver Upton2020-02-281-7/+52
* KVM: nVMX: Refactor IO bitmap checks into helper functionOliver Upton2020-02-281-13/+27
* KVM: nVMX: Don't emulate instructions in guest modePaolo Bonzini2020-02-281-1/+1
* Revert "KVM: VMX: Add non-canonical check on writes to RTIT address MSRs"Sasha Levin2020-02-281-8033/+0
* KVM: x86: emulate RDPIDPaolo Bonzini2020-02-283-2/+42
* KVM: nVMX: vmread should not set rflags to specify success in case of #PFMiaohe Lin2020-02-141-1/+3
* KVM: VMX: Add non-canonical check on writes to RTIT address MSRsSean Christopherson2020-02-141-0/+8033
* KVM: x86/mmu: Apply max PA check for MMIO sptes to 32-bit KVMSean Christopherson2020-02-141-2/+0
* KVM: x86: Protect kvm_lapic_reg_write() from Spectre-v1/L1TF attacksMarios Pomonis2020-02-141-3/+10
* KVM: x86: Protect pmu_intel.c from Spectre-v1/L1TF attacksMarios Pomonis2020-02-141-8/+16
* KVM: x86: Refactor picdev_write() to prevent Spectre-v1/L1TF attacksMarios Pomonis2020-02-141-1/+5
* KVM: x86: drop picdev_in_range()David Hildenbrand2020-02-141-23/+12
* KVM: x86: Free wbinvd_dirty_mask if vCPU creation failsSean Christopherson2020-02-141-1/+1
* KVM: x86: Protect MSR-based index computations in fixed_msr_to_seg_unit() fro...Marios Pomonis2020-02-141-2/+7
* KVM: x86: Protect x86_decode_insn from Spectre-v1/L1TF attacksMarios Pomonis2020-02-141-3/+9
* KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks i...Marios Pomonis2020-02-141-2/+8
* KVM: x86: Protect ioapic_read_indirect() from Spectre-v1/L1TF attacksMarios Pomonis2020-02-141-6/+7
* KVM: x86: Protect MSR-based index computations in pmu.h from Spectre-v1/L1TF ...Marios Pomonis2020-02-141-4/+14
* KVM: x86: Protect ioapic_write_indirect() from Spectre-v1/L1TF attacksMarios Pomonis2020-02-141-0/+2
* KVM: x86: Protect kvm_hv_msr_[get|set]_crash_data() from Spectre-v1/L1TF attacksMarios Pomonis2020-02-141-4/+7
* KVM: x86: Protect DR-based index computations from Spectre-v1/L1TF attacksMarios Pomonis2020-02-141-2/+7
* KVM: x86: Refactor prefix decoding to prevent Spectre-v1/L1TF attacksMarios Pomonis2020-02-141-2/+14
* KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)Paolo Bonzini2019-12-211-1/+4
* KVM: x86: fix presentation of TSX feature in ARCH_CAPABILITIESPaolo Bonzini2019-12-211-2/+7
* KVM: x86: do not modify masked bits of shared MSRsPaolo Bonzini2019-12-211-2/+3
* KVM/x86: Fix invvpid and invept register operand size in 64-bit modeUros Bizjak2019-11-281-2/+2
* kvm/x86: Export MDS_NO=0 to guests when TSX is enabledPawan Gupta2019-11-161-0/+19
* KVM: x86: use Intel speculation bugs and features as derived in generic x86 codePaolo Bonzini2019-11-162-0/+15
* kvm: x86: IA32_ARCH_CAPABILITIES is always supportedJim Mattson2019-11-161-0/+5
* KVM: x86: Emulate MSR_IA32_ARCH_CAPABILITIES on AMD hostsSean Christopherson2019-11-162-14/+12
* KVM: Introduce kvm_get_arch_capabilities()Ben Hutchings2019-11-162-2/+11
* kvm: mmu: Don't read PDPTEs when paging is not enabledJunaid Shahid2019-11-161-2/+2
* KVM: nVMX: handle page fault in vmread fixJack Wang2019-10-171-1/+1
* KVM: x86: Manually calculate reserved bits when loading PDPTRSSean Christopherson2019-10-051-3/+8
* KVM: x86: set ctxt->have_exception in x86_decode_insn()Jan Dakinevich2019-10-052-0/+8