summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm
Commit message (Expand)AuthorAgeFilesLines
...
* KVM: x86: always stop emulation on page faultJan Dakinevich2019-10-051-1/+3
* KVM: nVMX: handle page fault in vmreadPaolo Bonzini2019-09-211-2/+5
* KVM: x86: work around leak of uninitialized stack contentsFuqian Huang2019-09-211-0/+7
* KVM: x86: Don't update RIP or do single-step on faulting emulationSean Christopherson2019-09-061-4/+5
* x86/vdso: Remove direct HPET access through the vDSOAndy Lutomirski2019-08-251-2/+1
* KVM: x86/vPMU: refine kvm_pmu err msg when event creation failedLike Xu2019-08-041-2/+2
* KVM: x86: protect KVM_CREATE_PIT/KVM_CREATE_PIT2 with kvm->lockPaolo Bonzini2019-07-212-4/+5
* kvm: x86: avoid warning on repeated KVM_SET_TSS_ADDRPaolo Bonzini2019-07-211-1/+1
* KVM: x86: degrade WARN to pr_warn_ratelimitedPaolo Bonzini2019-07-101-3/+3
* KVM: X86: Fix scan ioapic use-before-initializationWanpeng Li2019-07-101-1/+2
* KVM: x86/pmu: do not mask the value that is written to fixed PMUsPaolo Bonzini2019-06-221-5/+8
* KVM: x86: fix return value for reserved EFERPaolo Bonzini2019-06-111-1/+1
* KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writesSean Christopherson2019-06-111-11/+22
* x86/kvm: Expose X86_FEATURE_MD_CLEAR to guestsAndi Kleen2019-05-161-1/+1
* kvm: x86: Report STIBP on GET_SUPPORTED_CPUIDEduardo Habkost2019-05-161-2/+3
* KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabledThomas Gleixner2019-05-161-4/+4
* x86/bugs: Add AMD's SPEC_CTRL MSR usageKonrad Rzeszutek Wilk2019-05-163-4/+10
* x86/bugs: Add AMD's variant of SSB_NOKonrad Rzeszutek Wilk2019-05-161-1/+1
* KVM: x86: avoid misreporting level-triggered irqs as edge-triggered in tracingVitaly Kuznetsov2019-05-161-2/+2
* KVM: fail KVM_SET_VCPU_EVENTS with invalid exception numberPaolo Bonzini2019-05-161-0/+4
* KVM: x86: Don't clear EFER during SMM transitions for 32-bit vCPUSean Christopherson2019-04-271-10/+11
* KVM: X86: Fix residual mmio emulation request to userspaceWanpeng Li2019-03-232-0/+2
* KVM: nVMX: Ignore limit checks on VMX instructions using flat segmentsSean Christopherson2019-03-231-3/+9
* KVM: nVMX: Sign extend displacements of VMX instr's mem operandsSean Christopherson2019-03-231-0/+4
* KVM: nSVM: clear events pending from svm_complete_interrupts() when exiting t...Vitaly Kuznetsov2019-03-231-0/+8
* KVM: VMX: Fix x2apic check in vmx_msr_bitmap_mode()Joerg Roedel2019-02-231-1/+3
* KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7...Peter Shier2019-02-201-0/+1
* KVM: x86: work around leak of uninitialized stack contents (CVE-2019-7222)Paolo Bonzini2019-02-201-0/+7
* KVM: x86: svm: report MSR_IA32_MCG_EXT_CTL as unsupportedVitaly Kuznetsov2019-02-201-0/+7
* KVM: x86: Fix single-step debuggingAlexander Popov2019-02-061-2/+1
* x86/kvm/vmx: do not use vm-exit instruction length for fast MMIO when running...Vitaly Kuznetsov2019-01-132-3/+19
* KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBDTom Lendacky2018-12-175-16/+56
* x86/speculation: Use synthetic bits for IBRS/IBPB/STIBPBorislav Petkov2018-12-172-7/+7
* x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRLThomas Gleixner2018-12-172-4/+12
* KVM: SVM: Move spec control call after restore of GSThomas Gleixner2018-12-171-12/+12
* x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guestKonrad Rzeszutek Wilk2018-12-174-8/+8
* x86/bugs, KVM: Support the combination of guest and host IBRSKonrad Rzeszutek Wilk2018-12-172-8/+4
* KVM/x86: Remove indirect MSR op calls from SPEC_CTRLPaolo Bonzini2018-12-172-6/+8
* KVM/SVM: Allow direct access to MSR_IA32_SPEC_CTRLKarimAllah Ahmed2018-12-171-0/+88
* KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRLKarimAllah Ahmed2018-12-174-6/+118
* KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIESKarimAllah Ahmed2018-12-174-2/+33
* KVM/x86: Add IBPB supportAshok Raj2018-12-174-3/+127
* KVM: VMX: make MSR bitmaps per-VCPUPaolo Bonzini2018-12-171-142/+112
* KVM: VMX: introduce alloc_loaded_vmcsPaolo Bonzini2018-12-171-13/+22
* KVM: nVMX: Eliminate vmcs02 poolJim Mattson2018-12-171-122/+22
* KVM: nVMX: mark vmcs12 pages dirty on L2 exitDavid Matlack2018-12-171-10/+43
* KVM: nVMX: fix msr bitmaps to prevent L2 from accessing L0 x2APICRadim Krčmář2018-12-171-58/+38
* KVM: x86: fix empty-body warningsYi Wang2018-12-171-1/+1
* kvm: mmu: Fix race in emulated page table writesJunaid Shahid2018-12-131-18/+9
* x86/fpu: Remove use_eager_fpu()Andy Lutomirski2018-10-202-13/+1