summaryrefslogtreecommitdiffstats
path: root/arch/x86
Commit message (Expand)AuthorAgeFilesLines
* KVM: x86: fix out-of-bounds write in KVM_GET_EMULATED_CPUID (CVE-2019-19332)Paolo Bonzini2019-12-131-1/+4
* KVM: x86: Grab KVM's srcu lock when setting nested stateSean Christopherson2019-12-131-0/+3
* KVM: x86: Remove a spurious export of a static functionSean Christopherson2019-12-131-1/+0
* KVM: x86: fix presentation of TSX feature in ARCH_CAPABILITIESPaolo Bonzini2019-12-131-2/+8
* KVM: x86: do not modify masked bits of shared MSRsPaolo Bonzini2019-12-131-2/+3
* KVM: nVMX: Always write vmcs02.GUEST_CR3 during nested VM-EnterSean Christopherson2019-12-132-3/+17
* x86/PCI: Avoid AMD FCH XHCI USB PME# from D0 defectKai-Heng Feng2019-12-131-0/+11
* x86/mm/32: Sync only to VMALLOC_END in vmalloc_sync_all()Joerg Roedel2019-12-131-1/+1
* x86/resctrl: Fix potential lockdep warningXiaochen Shen2019-12-131-4/+0
* x86/fpu: Don't cache access to fpu_fpregs_owner_ctxSebastian Andrzej Siewior2019-12-041-1/+1
* x86/tsc: Respect tsc command line paraemeter for clocksource_tsc_earlyMichael Zhivich2019-12-041-0/+3
* x86/resctrl: Prevent NULL pointer dereference when reading mondataXiaochen Shen2019-12-041-0/+4
* x86/entry/32: Fix FIXUP_ESPFIX_STACK with user CR3Andy Lutomirski2019-11-291-3/+18
* x86/pti/32: Calculate the various PTI cpu_entry_area sizes correctly, make th...Ingo Molnar2019-11-293-10/+14
* x86/entry/32: Fix NMI vs ESPFIXPeter Zijlstra2019-11-291-12/+41
* x86/entry/32: Unwind the ESPFIX stack earlier on exception entryAndy Lutomirski2019-11-291-14/+16
* x86/entry/32: Move FIXUP_FRAME after pushing %fs in SAVE_ALLAndy Lutomirski2019-11-291-31/+35
* x86/entry/32: Use %ss segment where requiredAndy Lutomirski2019-11-291-5/+14
* x86/entry/32: Fix IRET exceptionPeter Zijlstra2019-11-291-1/+1
* x86/cpu_entry_area: Add guard page for entry stack on 32bitThomas Gleixner2019-11-291-1/+5
* x86/pti/32: Size initial_page_table correctlyThomas Gleixner2019-11-291-0/+10
* x86/doublefault/32: Fix stack canaries in the double fault handlerAndy Lutomirski2019-11-291-0/+3
* x86/xen/32: Simplify ring check in xen_iret_crit_fixup()Jan Beulich2019-11-291-11/+4
* x86/xen/32: Make xen_iret_crit_fixup() independent of frame layoutJan Beulich2019-11-292-55/+33
* x86/stackframe/32: Repair 32-bit Xen PVJan Beulich2019-11-292-2/+14
* x86/speculation: Fix redundant MDS mitigation messageWaiman Long2019-11-291-0/+13
* x86/speculation: Fix incorrect MDS/TAA mitigation statusWaiman Long2019-11-291-2/+15
* x86/insn: Fix awk regexp warningsAlexander Kapshuk2019-11-291-2/+2
* x86/quirks: Disable HPET on Intel Coffe Lake platformsKai-Heng Feng2019-11-201-0/+2
* KVM: MMU: Do not treat ZONE_DEVICE pages as being reservedSean Christopherson2019-11-201-4/+4
* kvm: x86: mmu: Recovery of shattered NX large pagesJunaid Shahid2019-11-124-0/+148
* kvm: mmu: ITLB_MULTIHIT mitigationPaolo Bonzini2019-11-125-13/+181
* kvm: x86, powerpc: do not allow clearing largepages debugfs entryPaolo Bonzini2019-11-121-3/+3
* x86/cpu: Add Tremont to the cpu vulnerability whitelistPawan Gupta2019-11-121-0/+2
* x86/bugs: Add ITLB_MULTIHIT bug infrastructureVineela Tummalapalli2019-11-124-29/+55
* x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUsJosh Poimboeuf2019-11-121-4/+0
* x86/tsx: Add config options to set tsx=on|off|autoMichal Hocko2019-11-122-6/+61
* x86/tsx: Add "auto" option to the tsx= cmdline parameterPawan Gupta2019-11-121-1/+6
* kvm/x86: Export MDS_NO=0 to guests when TSX is enabledPawan Gupta2019-11-121-0/+19
* x86/speculation/taa: Add sysfs reporting for TSX Async AbortPawan Gupta2019-11-121-0/+23
* x86/speculation/taa: Add mitigation for TSX Async AbortPawan Gupta2019-11-126-2/+137
* x86/cpu: Add a "tsx=" cmdline option with TSX disabled by defaultPawan Gupta2019-11-125-1/+149
* x86/cpu: Add a helper function x86_read_arch_cap_msr()Pawan Gupta2019-11-122-4/+13
* x86/msr: Add the IA32_TSX_CTRL MSRPawan Gupta2019-11-121-0/+5
* x86, efi: Never relocate kernel below lowest acceptable addressKairui Song2019-11-121-1/+3
* perf/x86/uncore: Fix event group supportKan Liang2019-11-122-18/+38
* perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h)Kim Phillips2019-11-121-2/+4
* perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP...Kim Phillips2019-11-121-1/+1
* x86/apic/32: Avoid bogus LDR warningsJan Beulich2019-11-121-13/+15
* x86/dumpstack/64: Don't evaluate exception stacks before setupThomas Gleixner2019-11-121-0/+7