summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm
Commit message (Expand)AuthorAgeFilesLines
* KVM: x86: Ignore MSR_AMD64_TW_CFG accessMaciej S. Szmigiero2023-11-281-0/+2
* KVM: x86: Mask LVTPC when handling a PMIJim Mattson2023-10-251-2/+6
* x86: Move gds_ucode_mitigated() declaration to headerArnd Bergmann2023-08-161-2/+0
* KVM: Add GDS_NO support to KVMDaniel Sneddon2023-08-081-0/+5
* KVM: nVMX: Emulate NOPs in L2, and PAUSE if it's not interceptedSean Christopherson2023-05-171-0/+15
* KVM: nVMX: add missing consistency checks for CR0 and CR4Paolo Bonzini2023-04-201-2/+8
* kvm: initialize all of the kvm_debugregs structure before sending it to users...Greg Kroah-Hartman2023-02-221-2/+1
* KVM: x86/vmx: Do not skip segment attributes if unusable bit is setHendrik Borghorst2023-02-221-12/+9
* KVM: VMX: Move caching of MSR_IA32_XSS to hardware_setup()Sean Christopherson2023-02-221-3/+3
* KVM: VMX: Move VMX specific files to a "vmx" subdirectorySean Christopherson2023-02-225-1/+1
* nVMX x86: Check VMX-preemption timer controls on vmentry of L2 guestsKrish Sadhukhan2023-02-221-0/+10
* x86/cpu: Restore AMD's DE_CFG MSR after resumeBorislav Petkov2022-11-252-6/+6
* x86/speculation: Add RSB VM Exit protectionsDaniel Sneddon2022-11-231-2/+2
* x86/speculation: Fill RSB on vmexit for IBRSJosh Poimboeuf2022-11-231-2/+2
* KVM: VMX: Fix IBRS handling after vmexitJosh Poimboeuf2022-11-231-2/+6
* KVM: VMX: Prevent guest RSB poisoning attacks with eIBRSJosh Poimboeuf2022-11-231-6/+40
* x86/cpu: Add a steppings field to struct x86_cpu_idMark Gross2022-11-232-5/+5
* x86/devicetable: Move x86 specific macro out of generic codeThomas Gleixner2022-11-232-0/+2
* Revert "x86/speculation: Add RSB VM Exit protections"Suleiman Souhlal2022-11-231-3/+3
* KVM: x86: emulator: update the emulation mode after CR0 writeMaxim Levitsky2022-11-101-1/+15
* KVM: x86: emulator: introduce emulator_recalc_and_set_modeMaxim Levitsky2022-11-101-28/+57
* KVM: x86: emulator: em_sysexit should update ctxt->modeMaxim Levitsky2022-11-101-0/+1
* KVM: x86: Mask off reserved bits in CPUID.80000008HJim Mattson2022-11-101-0/+1
* KVM: nVMX: Unconditionally purge queued/injected events on nested "exit"Sean Christopherson2022-10-261-8/+11
* KVM: x86/emulator: Fix handing of POP SS to correctly set interruptibilityMichal Luczaj2022-10-261-1/+1
* KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_a...Vitaly Kuznetsov2022-08-251-0/+4
* KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irqVitaly Kuznetsov2022-08-251-0/+3
* KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GPSean Christopherson2022-08-251-2/+2
* KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checksSean Christopherson2022-08-251-10/+9
* KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0Maciej S. Szmigiero2022-08-251-2/+0
* x86/speculation: Add RSB VM Exit protectionsDaniel Sneddon2022-08-111-3/+3
* KVM: x86/speculation: Disable Fill buffer clear within guestsPawan Gupta2022-06-162-1/+77
* x86/speculation/mmio: Add mitigation for Processor MMIO Stale DataPawan Gupta2022-06-161-0/+3
* kvm: x86/cpuid: Only provide CPUID leaf 0xA if host has architectural PMUSandipan Das2022-05-121-0/+5
* KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRsJim Mattson2022-04-151-5/+3
* KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn't activatedVitaly Kuznetsov2022-04-151-1/+16
* KVM: x86/emulator: Defer not-present segment check in __load_segment_descript...Hou Wenlong2022-04-151-5/+9
* KVM: x86: Fix emulation in writing cr8Zhenzhong Duan2022-04-151-4/+1
* KVM: x86/pmu: Use AMD64_RAW_EVENT_MASK for PERF_TYPE_RAWJim Mattson2022-02-231-1/+1
* Revert "x86/kvm: fix vcpu-id indexed array sizes"Juergen Gross2021-11-122-3/+3
* KVM: x86: Update vCPU's hv_clock before back to guest when tsc_offset is adju...Zelin Deng2021-09-221-0/+4
* KVM: x86/mmu: Treat NX as used (not reserved) for all !TDP shadow MMUsSean Christopherson2021-09-031-1/+10
* KVM: nSVM: avoid picking up unsupported bits from L2 in int_ctl (CVE-2021-3653)Maxim Levitsky2021-08-261-7/+8
* KVM: nSVM: always intercept VMLOAD/VMSAVE when nested (CVE-2021-3656)Maxim Levitsky2021-08-261-0/+3
* KVM: X86: MMU: Use the correct inherited permissions to get shadow pageLai Jiangshan2021-08-151-5/+9
* KVM: SVM: Fix off-by-one indexing when nullifying last used SEV VMCBSean Christopherson2021-08-151-1/+1
* KVM: x86/mmu: Fix per-cpu counter corruption on 32-bit buildsSean Christopherson2021-08-121-1/+1
* KVM: x86: accept userspace interrupt only if no event is injectedPaolo Bonzini2021-08-121-2/+11
* x86/kvm: fix vcpu-id indexed array sizesJuergen Gross2021-08-042-3/+3
* KVM: x86: determine if an exception has an error code only when injecting it.Maxim Levitsky2021-07-311-4/+9